SlideShare a Scribd company logo
1 of 18
Services in a 
Converged WAN 
Accessing the WAN – Chapter 1 
© 2006 Cisco Systems, Inc. All rights Version 4.0 reserved. Cisco Public 1
Objectives 
 Describe how the Cisco Enterprise Composite 
Model (ECNM) provides integrated services 
over an Enterprise network. 
 Describe the key WAN technology concepts. 
 Identify the appropriate WAN technologies to 
use when matching ECNM best practices with 
typical enterprise requirements for WAN 
communications. 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Describe How ECNM Provides Integrated 
Services over an Enterprise Network 
 Explain the purpose and function of WANs 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Describe How ECNM Provides Integrated 
Services over an Enterprise Network 
 Describe the stages of business growth, the 
corresponding business requirements for services and 
how those requirements are reflected in the 
Enterprise’s changing network topology 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Describe How ECNM Provides Integrated 
Services over an Enterprise Network 
 Describe the problems with the Hierarchical Design 
Model that Cisco's Enterprise Composite Model has 
been designed to address 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Describe How ECNM Provides Integrated 
Services over an Enterprise Network 
 Explain the purpose of Cisco Enterprise Architectures 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Describe the Key WAN Technology 
Concepts 
 Describe WAN functions in terms of the OSI Reference 
Model 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Describe the Key WAN Technology 
Concepts 
 Describe the key WAN physical layer concepts for 
network and Internet communications 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Describe the Key WAN Technology 
Concepts 
 Describe the key WAN data link layer protocols used in 
today’s Enterprise WAN networks 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Describe the Key WAN Technology 
Concepts 
 Describe the switching technologies used for WANs in 
an Enterprise setting 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Select the Appropriate WAN Technology to meet 
ECNM Requirements 
 List the various options for connecting subscribers to 
the WAN 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Select the Appropriate WAN Technology to meet 
ECNM Requirements 
 Describe how Enterprises use leased line services to 
provide a WAN connection 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Select the Appropriate WAN Technology to meet 
ECNM Requirements 
 Describe the circuit switching options available to 
provide a WAN connection 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Select the Appropriate WAN Technology to meet 
ECNM Requirements 
 Describe the packet switching options available to 
provide a WAN connection 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Select the Appropriate WAN Technology to meet 
ECNM Requirements 
 List factors to consider when selecting a WAN 
connection 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Summary 
 A WAN is defined as 
A data communications network that operates beyond the 
geographic scope of a LAN 
 WAN primarily operate on layer 1 & 2 of the OSI model 
 WAN technologies include 
–Leased line 
–ISDN 
–Frame relay 
–X.25 
–ATM 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Summary 
 Cisco Enterprise Architecture 
–This is an expansion of the hierarchical model that further 
divides the enterprise network into 
•Physical areas 
•Logical areas 
•Functional areas 
 Selecting the appropriate WAN technology requires 
considering some of the following: 
–WAN’s purpose 
–Geographic scope of WAN 
–Traffic requirements 
–If WAN uses a public or private infrastructure 
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18

More Related Content

What's hot

IBM DB2 for zOSのソースエンドポイントとしての利用
IBM DB2 for zOSのソースエンドポイントとしての利用IBM DB2 for zOSのソースエンドポイントとしての利用
IBM DB2 for zOSのソースエンドポイントとしての利用QlikPresalesJapan
 
Requirements Management for Safety-Critical Products
Requirements Management for Safety-Critical ProductsRequirements Management for Safety-Critical Products
Requirements Management for Safety-Critical ProductsDavid Hetherington
 
TECHTALK 20201117 ビッグデータへのアプローチ ー チャートをリアルタイムに更新するDynamic Views とオンデマンドアプリ生成
TECHTALK 20201117 ビッグデータへのアプローチ ー チャートをリアルタイムに更新するDynamic Views とオンデマンドアプリ生成TECHTALK 20201117 ビッグデータへのアプローチ ー チャートをリアルタイムに更新するDynamic Views とオンデマンドアプリ生成
TECHTALK 20201117 ビッグデータへのアプローチ ー チャートをリアルタイムに更新するDynamic Views とオンデマンドアプリ生成QlikPresalesJapan
 
AWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design PatternsAWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design PatternsAmazon Web Services
 
Amazon S3のターゲットエンドポイントとしての利用
Amazon S3のターゲットエンドポイントとしての利用Amazon S3のターゲットエンドポイントとしての利用
Amazon S3のターゲットエンドポイントとしての利用QlikPresalesJapan
 
データからアクションを自動化!Qlik Application Automationのご紹介
データからアクションを自動化!Qlik Application Automationのご紹介データからアクションを自動化!Qlik Application Automationのご紹介
データからアクションを自動化!Qlik Application Automationのご紹介QlikPresalesJapan
 
はじめてのOracle Cloud Infrastructure (Oracle Cloudウェビナーシリーズ: 2021年9月22日)
はじめてのOracle Cloud Infrastructure (Oracle Cloudウェビナーシリーズ: 2021年9月22日)はじめてのOracle Cloud Infrastructure (Oracle Cloudウェビナーシリーズ: 2021年9月22日)
はじめてのOracle Cloud Infrastructure (Oracle Cloudウェビナーシリーズ: 2021年9月22日)オラクルエンジニア通信
 
Manage your kubernetes cluster with cluster api, azure and git ops
Manage your kubernetes cluster with cluster api, azure and git opsManage your kubernetes cluster with cluster api, azure and git ops
Manage your kubernetes cluster with cluster api, azure and git opsJorge Arteiro
 
AWS Summit Seoul 2023 | 금융 디지털 서비스 혁신을 리딩하는 교보정보통신의 클라우드 마이그레이션 사례 소개
AWS Summit Seoul 2023 | 금융 디지털 서비스 혁신을 리딩하는 교보정보통신의 클라우드 마이그레이션 사례 소개AWS Summit Seoul 2023 | 금융 디지털 서비스 혁신을 리딩하는 교보정보통신의 클라우드 마이그레이션 사례 소개
AWS Summit Seoul 2023 | 금융 디지털 서비스 혁신을 리딩하는 교보정보통신의 클라우드 마이그레이션 사례 소개Amazon Web Services Korea
 
MySQL Document Store를 활용한 NoSQL 개발
MySQL Document Store를 활용한 NoSQL 개발MySQL Document Store를 활용한 NoSQL 개발
MySQL Document Store를 활용한 NoSQL 개발Oracle Korea
 
Software architecture
Software architectureSoftware architecture
Software architectureUdayna
 
Azure 仮想マシンとRemoteAppの超概要
Azure 仮想マシンとRemoteAppの超概要Azure 仮想マシンとRemoteAppの超概要
Azure 仮想マシンとRemoteAppの超概要Daiyu Hatakeyama
 
Qlik AutoMLによる機械学習モデル生成の自動化
Qlik AutoMLによる機械学習モデル生成の自動化Qlik AutoMLによる機械学習モデル生成の自動化
Qlik AutoMLによる機械学習モデル生成の自動化QlikPresalesJapan
 
Amazon EKS - Elastic Container Service for Kubernetes
Amazon EKS - Elastic Container Service for KubernetesAmazon EKS - Elastic Container Service for Kubernetes
Amazon EKS - Elastic Container Service for KubernetesAmazon Web Services
 
AWS初心者向けWebinar これで完璧、AWSの運用監視
AWS初心者向けWebinar これで完璧、AWSの運用監視AWS初心者向けWebinar これで完璧、AWSの運用監視
AWS初心者向けWebinar これで完璧、AWSの運用監視Amazon Web Services Japan
 
An Introduction To Infarstructures For Cloud Computing V0.2
An Introduction To Infarstructures For Cloud Computing V0.2An Introduction To Infarstructures For Cloud Computing V0.2
An Introduction To Infarstructures For Cloud Computing V0.2Ignacio M. Llorente
 
cloud-migrations.pptx
cloud-migrations.pptxcloud-migrations.pptx
cloud-migrations.pptxJohn Mulhall
 
TECHTALK_20220802 Direct Query.pdf
TECHTALK_20220802 Direct Query.pdfTECHTALK_20220802 Direct Query.pdf
TECHTALK_20220802 Direct Query.pdfQlikPresalesJapan
 

What's hot (20)

IBM DB2 for zOSのソースエンドポイントとしての利用
IBM DB2 for zOSのソースエンドポイントとしての利用IBM DB2 for zOSのソースエンドポイントとしての利用
IBM DB2 for zOSのソースエンドポイントとしての利用
 
Requirements Management for Safety-Critical Products
Requirements Management for Safety-Critical ProductsRequirements Management for Safety-Critical Products
Requirements Management for Safety-Critical Products
 
TECHTALK 20201117 ビッグデータへのアプローチ ー チャートをリアルタイムに更新するDynamic Views とオンデマンドアプリ生成
TECHTALK 20201117 ビッグデータへのアプローチ ー チャートをリアルタイムに更新するDynamic Views とオンデマンドアプリ生成TECHTALK 20201117 ビッグデータへのアプローチ ー チャートをリアルタイムに更新するDynamic Views とオンデマンドアプリ生成
TECHTALK 20201117 ビッグデータへのアプローチ ー チャートをリアルタイムに更新するDynamic Views とオンデマンドアプリ生成
 
AWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design PatternsAWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design Patterns
 
Amazon S3のターゲットエンドポイントとしての利用
Amazon S3のターゲットエンドポイントとしての利用Amazon S3のターゲットエンドポイントとしての利用
Amazon S3のターゲットエンドポイントとしての利用
 
CI/CD for Modern Applications
CI/CD for Modern ApplicationsCI/CD for Modern Applications
CI/CD for Modern Applications
 
データからアクションを自動化!Qlik Application Automationのご紹介
データからアクションを自動化!Qlik Application Automationのご紹介データからアクションを自動化!Qlik Application Automationのご紹介
データからアクションを自動化!Qlik Application Automationのご紹介
 
はじめてのOracle Cloud Infrastructure (Oracle Cloudウェビナーシリーズ: 2021年9月22日)
はじめてのOracle Cloud Infrastructure (Oracle Cloudウェビナーシリーズ: 2021年9月22日)はじめてのOracle Cloud Infrastructure (Oracle Cloudウェビナーシリーズ: 2021年9月22日)
はじめてのOracle Cloud Infrastructure (Oracle Cloudウェビナーシリーズ: 2021年9月22日)
 
Manage your kubernetes cluster with cluster api, azure and git ops
Manage your kubernetes cluster with cluster api, azure and git opsManage your kubernetes cluster with cluster api, azure and git ops
Manage your kubernetes cluster with cluster api, azure and git ops
 
AWS Summit Seoul 2023 | 금융 디지털 서비스 혁신을 리딩하는 교보정보통신의 클라우드 마이그레이션 사례 소개
AWS Summit Seoul 2023 | 금융 디지털 서비스 혁신을 리딩하는 교보정보통신의 클라우드 마이그레이션 사례 소개AWS Summit Seoul 2023 | 금융 디지털 서비스 혁신을 리딩하는 교보정보통신의 클라우드 마이그레이션 사례 소개
AWS Summit Seoul 2023 | 금융 디지털 서비스 혁신을 리딩하는 교보정보통신의 클라우드 마이그레이션 사례 소개
 
MySQL Document Store를 활용한 NoSQL 개발
MySQL Document Store를 활용한 NoSQL 개발MySQL Document Store를 활용한 NoSQL 개발
MySQL Document Store를 활용한 NoSQL 개발
 
Software architecture
Software architectureSoftware architecture
Software architecture
 
Azure 仮想マシンとRemoteAppの超概要
Azure 仮想マシンとRemoteAppの超概要Azure 仮想マシンとRemoteAppの超概要
Azure 仮想マシンとRemoteAppの超概要
 
Qlik AutoMLによる機械学習モデル生成の自動化
Qlik AutoMLによる機械学習モデル生成の自動化Qlik AutoMLによる機械学習モデル生成の自動化
Qlik AutoMLによる機械学習モデル生成の自動化
 
Amazon EKS - Elastic Container Service for Kubernetes
Amazon EKS - Elastic Container Service for KubernetesAmazon EKS - Elastic Container Service for Kubernetes
Amazon EKS - Elastic Container Service for Kubernetes
 
AWS初心者向けWebinar これで完璧、AWSの運用監視
AWS初心者向けWebinar これで完璧、AWSの運用監視AWS初心者向けWebinar これで完璧、AWSの運用監視
AWS初心者向けWebinar これで完璧、AWSの運用監視
 
An Introduction To Infarstructures For Cloud Computing V0.2
An Introduction To Infarstructures For Cloud Computing V0.2An Introduction To Infarstructures For Cloud Computing V0.2
An Introduction To Infarstructures For Cloud Computing V0.2
 
AWS VPC
AWS VPCAWS VPC
AWS VPC
 
cloud-migrations.pptx
cloud-migrations.pptxcloud-migrations.pptx
cloud-migrations.pptx
 
TECHTALK_20220802 Direct Query.pdf
TECHTALK_20220802 Direct Query.pdfTECHTALK_20220802 Direct Query.pdf
TECHTALK_20220802 Direct Query.pdf
 

Viewers also liked

CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2Irsandi Hasan
 
CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1Irsandi Hasan
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignVuz Dở Hơi
 
CCNA Exploration 3 - Chapter 2
CCNA Exploration 3 - Chapter 2CCNA Exploration 3 - Chapter 2
CCNA Exploration 3 - Chapter 2Irsandi Hasan
 
CCNA Exploration 4 - Chapter 4
CCNA Exploration 4 - Chapter 4CCNA Exploration 4 - Chapter 4
CCNA Exploration 4 - Chapter 4Irsandi Hasan
 
CCNA Exploration 4 - Chapter 3
CCNA Exploration 4 - Chapter 3CCNA Exploration 4 - Chapter 3
CCNA Exploration 4 - Chapter 3Irsandi Hasan
 
CCNA Exploration 4 - Chapter 5
CCNA Exploration 4 - Chapter 5CCNA Exploration 4 - Chapter 5
CCNA Exploration 4 - Chapter 5Irsandi Hasan
 
CCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanCCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanVuz Dở Hơi
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsVuz Dở Hơi
 
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayVuz Dở Hơi
 
CCNA Exploration 3 - Chapter 4
CCNA Exploration 3 - Chapter 4CCNA Exploration 3 - Chapter 4
CCNA Exploration 3 - Chapter 4Irsandi Hasan
 
CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6Irsandi Hasan
 
CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8Irsandi Hasan
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5Irsandi Hasan
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7Irsandi Hasan
 
CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5Irsandi Hasan
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 
ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1Irsandi Hasan
 
CCNA Exploration 3 - Chapter 6
CCNA Exploration 3 - Chapter 6CCNA Exploration 3 - Chapter 6
CCNA Exploration 3 - Chapter 6Irsandi Hasan
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1Irsandi Hasan
 

Viewers also liked (20)

CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2
 
CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
 
CCNA Exploration 3 - Chapter 2
CCNA Exploration 3 - Chapter 2CCNA Exploration 3 - Chapter 2
CCNA Exploration 3 - Chapter 2
 
CCNA Exploration 4 - Chapter 4
CCNA Exploration 4 - Chapter 4CCNA Exploration 4 - Chapter 4
CCNA Exploration 4 - Chapter 4
 
CCNA Exploration 4 - Chapter 3
CCNA Exploration 4 - Chapter 3CCNA Exploration 4 - Chapter 3
CCNA Exploration 4 - Chapter 3
 
CCNA Exploration 4 - Chapter 5
CCNA Exploration 4 - Chapter 5CCNA Exploration 4 - Chapter 5
CCNA Exploration 4 - Chapter 5
 
CCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanCCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The Wan
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
 
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame Relay
 
CCNA Exploration 3 - Chapter 4
CCNA Exploration 3 - Chapter 4CCNA Exploration 3 - Chapter 4
CCNA Exploration 3 - Chapter 4
 
CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6
 
CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7
 
CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1
 
CCNA Exploration 3 - Chapter 6
CCNA Exploration 3 - Chapter 6CCNA Exploration 3 - Chapter 6
CCNA Exploration 3 - Chapter 6
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
 

Similar to CCNA Exploration 4 - Chapter 1

CCNA Discovery 4 - Chapter 5
CCNA Discovery 4 - Chapter 5CCNA Discovery 4 - Chapter 5
CCNA Discovery 4 - Chapter 5Irsandi Hasan
 
Chapter 5
Chapter 5 Chapter 5
Chapter 5 ali raza
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewshah_ril1512
 
CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1Irsandi Hasan
 
Discovery routing switching_chapter1
Discovery routing switching_chapter1Discovery routing switching_chapter1
Discovery routing switching_chapter1Syam Sam
 
CCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxCCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxParthaDas754073
 
CCNA Discovery 4 - Chapter 4
CCNA Discovery 4 - Chapter 4CCNA Discovery 4 - Chapter 4
CCNA Discovery 4 - Chapter 4Irsandi Hasan
 
Week12 frame relay
Week12 frame relayWeek12 frame relay
Week12 frame relaylibra aziz
 
01 route routing services
01 route routing services01 route routing services
01 route routing servicesMarcus Reams
 
CCNP v6 Route: Implementing IP Routing Chapter1
CCNP v6 Route: Implementing IP Routing Chapter1CCNP v6 Route: Implementing IP Routing Chapter1
CCNP v6 Route: Implementing IP Routing Chapter1Andy Juan Sarango Veliz
 
CCNA Exploration 3 - Chapter 1
CCNA Exploration 3 - Chapter 1CCNA Exploration 3 - Chapter 1
CCNA Exploration 3 - Chapter 1Irsandi Hasan
 
CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1Chaing Ravuth
 
CCNA Exploration 3 - Chapter 7
CCNA Exploration 3 - Chapter 7CCNA Exploration 3 - Chapter 7
CCNA Exploration 3 - Chapter 7Irsandi Hasan
 

Similar to CCNA Exploration 4 - Chapter 1 (20)

CCNA Discovery 4 - Chapter 5
CCNA Discovery 4 - Chapter 5CCNA Discovery 4 - Chapter 5
CCNA Discovery 4 - Chapter 5
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 5
Chapter 5 Chapter 5
Chapter 5
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1
 
Week2 1
Week2 1Week2 1
Week2 1
 
Discovery routing switching_chapter1
Discovery routing switching_chapter1Discovery routing switching_chapter1
Discovery routing switching_chapter1
 
Week2 2
Week2 2Week2 2
Week2 2
 
Chapter1 rev1.0
Chapter1   rev1.0Chapter1   rev1.0
Chapter1 rev1.0
 
CCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxCCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptx
 
CCNA Discovery 4 - Chapter 4
CCNA Discovery 4 - Chapter 4CCNA Discovery 4 - Chapter 4
CCNA Discovery 4 - Chapter 4
 
Week12 frame relay
Week12 frame relayWeek12 frame relay
Week12 frame relay
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
01 route routing services
01 route routing services01 route routing services
01 route routing services
 
CCNP v6 Route: Implementing IP Routing Chapter1
CCNP v6 Route: Implementing IP Routing Chapter1CCNP v6 Route: Implementing IP Routing Chapter1
CCNP v6 Route: Implementing IP Routing Chapter1
 
CCCNP ROUTE v6_ch01
CCCNP ROUTE v6_ch01CCCNP ROUTE v6_ch01
CCCNP ROUTE v6_ch01
 
CCNA Exploration 3 - Chapter 1
CCNA Exploration 3 - Chapter 1CCNA Exploration 3 - Chapter 1
CCNA Exploration 3 - Chapter 1
 
Cisco network 1 1
Cisco network 1 1Cisco network 1 1
Cisco network 1 1
 
CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1
 
CCNA Exploration 3 - Chapter 7
CCNA Exploration 3 - Chapter 7CCNA Exploration 3 - Chapter 7
CCNA Exploration 3 - Chapter 7
 

More from Irsandi Hasan

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10Irsandi Hasan
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9Irsandi Hasan
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8Irsandi Hasan
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6Irsandi Hasan
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3Irsandi Hasan
 

More from Irsandi Hasan (20)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

CCNA Exploration 4 - Chapter 1

  • 1. Services in a Converged WAN Accessing the WAN – Chapter 1 © 2006 Cisco Systems, Inc. All rights Version 4.0 reserved. Cisco Public 1
  • 2. Objectives  Describe how the Cisco Enterprise Composite Model (ECNM) provides integrated services over an Enterprise network.  Describe the key WAN technology concepts.  Identify the appropriate WAN technologies to use when matching ECNM best practices with typical enterprise requirements for WAN communications. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
  • 3. Describe How ECNM Provides Integrated Services over an Enterprise Network  Explain the purpose and function of WANs © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
  • 4. Describe How ECNM Provides Integrated Services over an Enterprise Network  Describe the stages of business growth, the corresponding business requirements for services and how those requirements are reflected in the Enterprise’s changing network topology © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
  • 5. Describe How ECNM Provides Integrated Services over an Enterprise Network  Describe the problems with the Hierarchical Design Model that Cisco's Enterprise Composite Model has been designed to address © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
  • 6. Describe How ECNM Provides Integrated Services over an Enterprise Network  Explain the purpose of Cisco Enterprise Architectures © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
  • 7. Describe the Key WAN Technology Concepts  Describe WAN functions in terms of the OSI Reference Model © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
  • 8. Describe the Key WAN Technology Concepts  Describe the key WAN physical layer concepts for network and Internet communications © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
  • 9. Describe the Key WAN Technology Concepts  Describe the key WAN data link layer protocols used in today’s Enterprise WAN networks © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
  • 10. Describe the Key WAN Technology Concepts  Describe the switching technologies used for WANs in an Enterprise setting © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
  • 11. Select the Appropriate WAN Technology to meet ECNM Requirements  List the various options for connecting subscribers to the WAN © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
  • 12. Select the Appropriate WAN Technology to meet ECNM Requirements  Describe how Enterprises use leased line services to provide a WAN connection © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
  • 13. Select the Appropriate WAN Technology to meet ECNM Requirements  Describe the circuit switching options available to provide a WAN connection © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
  • 14. Select the Appropriate WAN Technology to meet ECNM Requirements  Describe the packet switching options available to provide a WAN connection © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
  • 15. Select the Appropriate WAN Technology to meet ECNM Requirements  List factors to consider when selecting a WAN connection © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
  • 16. Summary  A WAN is defined as A data communications network that operates beyond the geographic scope of a LAN  WAN primarily operate on layer 1 & 2 of the OSI model  WAN technologies include –Leased line –ISDN –Frame relay –X.25 –ATM © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
  • 17. Summary  Cisco Enterprise Architecture –This is an expansion of the hierarchical model that further divides the enterprise network into •Physical areas •Logical areas •Functional areas  Selecting the appropriate WAN technology requires considering some of the following: –WAN’s purpose –Geographic scope of WAN –Traffic requirements –If WAN uses a public or private infrastructure © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
  • 18. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18