SlideShare a Scribd company logo
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 1:
Exploring the Network
Introduction to Networks
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1: Objectives
After completing this chapter, students will be able to:
 Explain how multiple networks are used in everyday life.
 Explain the topologies and devices used in a small- to medium-
sized business network.
 Explain the basic characteristics of a network that supports
communication in a small- to medium-sized business.
 Explain trends in networking that will affect the use of networks in
small to medium-sized businesses.
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
1.1 Globally Connected
1.2 LANs, WANs, and the Internet
1.3 The Network as a Platform
1.4 The Changing Network Environment
1.5 Summary
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4
1.1 Globally Connected
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Networking Today
Networks in Our Past and Daily Lives
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Networking Today
The Global Community
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Interconnecting Our Lives
Networking Impacts in Our Daily Lives
 Networks support the way we learn.
 Networks support the way we communicate.
 Networks support the way we work.
 Networks support the way we play.
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Providing Resources in a Network
Networks of Many Sizes
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Providing Resources in a Network
Clients and Servers
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Providing Resources in a Network
Peer-to-Peer
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 11
1.2 LANs, WANs, and the Internet
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs, WANs, and Internets
Components of a Network
There are three categories of network components:
 Devices
 Media
 Services
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network
End Devices
Some examples of end devices are:
 Computers (work stations, laptops, file servers, web servers)
 Network printers
 VoIP phones
 TelePresence endpoint
 Security cameras
 Mobile handheld devices (such as smart phones, tablets, PDAs, and
wireless debit / credit card readers and barcode scanners)
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network
Network Infrastructure Devices
Examples of intermediary network devices are:
 Network Access Devices (switches, and wireless access points)
 Internetworking Devices (routers)
 Security Devices (firewalls)
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network
Network Media
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network
Network Representations
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network
Topology Diagrams
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs and WANs
Types of Networks
The two most common types of network infrastructures are:
 Local Area Network (LAN)
 Wide Area Network (WAN).
Other types of networks include:
 Metropolitan Area Network (MAN)
 Wireless LAN (WLAN)
 Storage Area Network (SAN)
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs and WANs
Local Area Networks (LAN)
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs and WANs
Wide Area Networks (WAN)
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs, WANs, and the Internet
The Internet
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs, WANs, and the Internet
Intranet and Extranet
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting to the Internet
Connecting Remote Users to the Internet
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting to the Internet
Connecting Businesses to the Internet
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 25
1.3 The Network as a Platform
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converged Networks
The Converging Network
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converged Networks
Planning for the Future
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Supporting Network Architecture
As networks evolve, we are discovering that there are four basic
characteristics that the underlying architectures need to address in order to
meet user expectations:
 Fault Tolerance
 Scalability
 Quality of Service (QoS)
 Security
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Fault Tolerance in Circuit Switched Network
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Packet-Switched Networks
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Scalable Networks
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Providing QoS
Examples of priority decisions for an organization might include:
 Time-sensitive communication - increase priority for services like
telephony or video distribution.
 Non time-sensitive communication - decrease priority for web page
retrieval or email.
 High importance to organization - increase priority for production control
or business transaction data.
 Undesirable communication - decrease priority or block unwanted activity,
like peer-to-peer file sharing or live entertainment.
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Providing Network Security
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 34
1.4 The Changing Network Environment
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
New trends
Some of the top trends include:
 Bring Your Own Device (BYOD)
 Online collaboration
 Video
 Cloud computing
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
Bring Your Own Device (BYOD)
The concept of any device, to any content, in anyway is a major global
trend that requires significant changes to the way devices are used.
This trend is known as Bring Your Own Device (BYOD).
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
Online Collaboration
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
Video Communication
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
Cloud Computing
Cloud computing offers the following potential benefits:
 Organizational flexibility
 Agility and rapid deployment
 Reduced cost of infrastructure
 Refocus of IT resources
 Creation of new business
models
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
Data Centers
A data center is a facility used to house computer systems and associated
components including:
 Redundant data communications connections
 High-speed virtual servers (sometimes referred to as server farms or
server clusters)
 Redundant storage systems (typically uses SAN technology)
 Redundant or backup power supplies
 Environmental controls (e.g., air conditioning, fire suppression)
 Security devices
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Networking Technologies for the Home
Technology Trends in the Home
Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Networking Technologies for the Home
Powerline Networking
Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Networking Technologies for the Home
Wireless Broadband
Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Future of Networking
Network Security
Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Security
Security Threats
The most common external threats to networks include:
 Viruses, worms, and Trojan horses
 Spyware and adware
 Zero-day attacks, also called zero-hour attacks
 Hacker attacks
 Denial of service (DoS) attacks
 Data interception and theft
 Identity theft
Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Security
Security Solutions
Network security components often include:
 Antivirus and antispyware
 Firewall filtering
 Dedicated firewall systems
 Access control lists (ACL)
 Intrusion prevention systems (IPS)
 Virtual Private Networks (VPNs)
Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Architectures
Cisco Network Architectures
Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Architectures
Cisco Certified Network Associate (CCNA)
Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
In this chapter, you learned:
 Networks and the Internet have changed the way we communicate, learn,
work, and even play.
 Networks come in all sizes. They can range from simple networks
consisting of two computers, to networks connecting millions of devices.
 The Internet is the largest network in existence. In fact, the term Internet
means a ‘network of networks. The Internet provides the services that
enable us to connect and communicate with our families, friends, work,
and interests.
 The network infrastructure is the platform that supports the network. It
provides the stable and reliable channel over which communication can
occur. It is made up of network components including end devices,
intermediate devices, and network media.
Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary (cont.)
In this chapter, you learned:
 Networks must be reliable.
 Network security is an integral part of computer networking, regardless of
whether the network is limited to a home environment with a single
connection to the Internet, or as large as a corporation with thousands of
users.
 The network infrastructure can vary greatly in terms of size, number of
users, and number and types of services that are supported on it. The
network infrastructure must grow and adjust to support the way the
network is used. The routing and switching platform is the foundation of
any network infrastructure.
Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

What's hot

Network Function Virtualization : Infrastructure Overview
Network Function Virtualization : Infrastructure OverviewNetwork Function Virtualization : Infrastructure Overview
Network Function Virtualization : Infrastructure Overview
sidneel
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
flowerjaan
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer network
Trinity Dwarka
 
Vlans (virtual local area networks)
Vlans (virtual local area networks)Vlans (virtual local area networks)
Vlans (virtual local area networks)
Kanishk Raj
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
Kuldeep Padhiyar
 
CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1Irsandi Hasan
 
Cisco Packet Tracer Overview
Cisco Packet Tracer OverviewCisco Packet Tracer Overview
Cisco Packet Tracer Overview
Ali Usman
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the network
Vuz Dở Hơi
 
Ccna rse dynamic routing
Ccna rse dynamic routingCcna rse dynamic routing
Ccna rse dynamic routing
newbie2019
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5
Nil Menon
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
Parthipan Parthi
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
Vuz Dở Hơi
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
Anwesh Dixit
 
Cisco WLAN - Chapter. 04 : wireless topologies
Cisco WLAN - Chapter. 04 : wireless topologiesCisco WLAN - Chapter. 04 : wireless topologies
Cisco WLAN - Chapter. 04 : wireless topologies
Yaser Rahmati
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
Vuz Dở Hơi
 
IoT Network Technologies
IoT Network TechnologiesIoT Network Technologies
IoT Network Technologies
Sayed Chhattan Shah
 
CCNP Switching Chapter 4
CCNP Switching Chapter 4CCNP Switching Chapter 4
CCNP Switching Chapter 4
Chaing Ravuth
 
NGN Next Generation Networks
NGN Next Generation NetworksNGN Next Generation Networks
NGN Next Generation Networksabdulquyyum
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
Vuz Dở Hơi
 
Layer 2 switching
Layer 2 switchingLayer 2 switching
Layer 2 switching
NetProtocol Xpert
 

What's hot (20)

Network Function Virtualization : Infrastructure Overview
Network Function Virtualization : Infrastructure OverviewNetwork Function Virtualization : Infrastructure Overview
Network Function Virtualization : Infrastructure Overview
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer network
 
Vlans (virtual local area networks)
Vlans (virtual local area networks)Vlans (virtual local area networks)
Vlans (virtual local area networks)
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1
 
Cisco Packet Tracer Overview
Cisco Packet Tracer OverviewCisco Packet Tracer Overview
Cisco Packet Tracer Overview
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the network
 
Ccna rse dynamic routing
Ccna rse dynamic routingCcna rse dynamic routing
Ccna rse dynamic routing
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
 
Cisco WLAN - Chapter. 04 : wireless topologies
Cisco WLAN - Chapter. 04 : wireless topologiesCisco WLAN - Chapter. 04 : wireless topologies
Cisco WLAN - Chapter. 04 : wireless topologies
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
 
IoT Network Technologies
IoT Network TechnologiesIoT Network Technologies
IoT Network Technologies
 
CCNP Switching Chapter 4
CCNP Switching Chapter 4CCNP Switching Chapter 4
CCNP Switching Chapter 4
 
NGN Next Generation Networks
NGN Next Generation NetworksNGN Next Generation Networks
NGN Next Generation Networks
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
 
Layer 2 switching
Layer 2 switchingLayer 2 switching
Layer 2 switching
 

Similar to Chapter 01 - Exploring the Network

Introduction of Exploring the Network Part 1
Introduction of Exploring the Network Part 1Introduction of Exploring the Network Part 1
Introduction of Exploring the Network Part 1
laylam12
 
Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1
Hamza Malik
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
AbdisayidkhalifTahir
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
sirajmohammed35
 
Chapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptxChapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptx
KennedyRodriguez10
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
Nil Menon
 
Itn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the networkItn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the network
joehurst87
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
Irsandi Hasan
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
Irsandi Hasan
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskills
Tiago Monteiro
 
Chapter 11 - It’s a Network
Chapter 11 - It’s a NetworkChapter 11 - It’s a Network
Chapter 11 - It’s a Network
Yaser Rahmati
 
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkCCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A Network
Vuz Dở Hơi
 
Chapter 11 : It’s a network
Chapter 11 : It’s a networkChapter 11 : It’s a network
Chapter 11 : It’s a network
teknetir
 
Ccna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mmeCcna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mme
United International University
 
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11
Hamza Malik
 
ccna1_v5_capitulo1
ccna1_v5_capitulo1ccna1_v5_capitulo1
ccna1_v5_capitulo1
Luda Starodub
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
Irsandi Hasan
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
Irsandi Hasan
 
Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3
Hamza Malik
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
Irsandi Hasan
 

Similar to Chapter 01 - Exploring the Network (20)

Introduction of Exploring the Network Part 1
Introduction of Exploring the Network Part 1Introduction of Exploring the Network Part 1
Introduction of Exploring the Network Part 1
 
Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
 
Chapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptxChapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptx
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
Itn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the networkItn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the network
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskills
 
Chapter 11 - It’s a Network
Chapter 11 - It’s a NetworkChapter 11 - It’s a Network
Chapter 11 - It’s a Network
 
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkCCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A Network
 
Chapter 11 : It’s a network
Chapter 11 : It’s a networkChapter 11 : It’s a network
Chapter 11 : It’s a network
 
Ccna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mmeCcna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mme
 
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11
 
ccna1_v5_capitulo1
ccna1_v5_capitulo1ccna1_v5_capitulo1
ccna1_v5_capitulo1
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
 

More from Yaser Rahmati

Cisco WLAN - Chapter. 08 : Applications, Design, and Site Survey Preparation
Cisco WLAN - Chapter. 08 : Applications, Design, and Site Survey  PreparationCisco WLAN - Chapter. 08 : Applications, Design, and Site Survey  Preparation
Cisco WLAN - Chapter. 08 : Applications, Design, and Site Survey Preparation
Yaser Rahmati
 
Cisco WLAN - Chapter. 07 : Antennas
Cisco WLAN - Chapter. 07 : AntennasCisco WLAN - Chapter. 07 : Antennas
Cisco WLAN - Chapter. 07 : Antennas
Yaser Rahmati
 
Cisco WLAN - Chapter. 06 : bridges
Cisco WLAN - Chapter. 06 : bridgesCisco WLAN - Chapter. 06 : bridges
Cisco WLAN - Chapter. 06 : bridges
Yaser Rahmati
 
Cisco WLAN - Chapter. 05 : Access Points
Cisco WLAN - Chapter. 05 : Access PointsCisco WLAN - Chapter. 05 : Access Points
Cisco WLAN - Chapter. 05 : Access Points
Yaser Rahmati
 
Cisco WLAN - Chapter. 03 : wireless radio technology
Cisco WLAN - Chapter. 03 : wireless radio technologyCisco WLAN - Chapter. 03 : wireless radio technology
Cisco WLAN - Chapter. 03 : wireless radio technology
Yaser Rahmati
 
Cisco WLAN - Chapter. 02 : Part 3 – 802.11 phy
Cisco WLAN -  Chapter. 02 : Part 3 – 802.11 phyCisco WLAN -  Chapter. 02 : Part 3 – 802.11 phy
Cisco WLAN - Chapter. 02 : Part 3 – 802.11 phy
Yaser Rahmati
 
Cisco WLAN - Chapter. 02 : Part 2 – 802.11 MAC
Cisco WLAN -  Chapter. 02 : Part 2 – 802.11 MACCisco WLAN -  Chapter. 02 : Part 2 – 802.11 MAC
Cisco WLAN - Chapter. 02 : Part 2 – 802.11 MAC
Yaser Rahmati
 
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client AdaptersCisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters
Yaser Rahmati
 
Cisco WLAN - Chapter. 01 : Overview of Wireless LANs
Cisco WLAN -  Chapter. 01 : Overview of Wireless LANsCisco WLAN -  Chapter. 01 : Overview of Wireless LANs
Cisco WLAN - Chapter. 01 : Overview of Wireless LANs
Yaser Rahmati
 
MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2
Yaser Rahmati
 
Chapter 07 - Routing Dynamically
Chapter 07 - Routing DynamicallyChapter 07 - Routing Dynamically
Chapter 07 - Routing Dynamically
Yaser Rahmati
 
Chapter 11 - Network Address Translation for IPv4
Chapter 11 - Network Address Translation for IPv4Chapter 11 - Network Address Translation for IPv4
Chapter 11 - Network Address Translation for IPv4
Yaser Rahmati
 
Chapter 10 - DHCP
Chapter 10 - DHCPChapter 10 - DHCP
Chapter 10 - DHCP
Yaser Rahmati
 
Chapter 09 - Access Control Lists
Chapter 09 - Access Control ListsChapter 09 - Access Control Lists
Chapter 09 - Access Control Lists
Yaser Rahmati
 
Chapter 08 - Single-Area OSPF
Chapter 08 - Single-Area OSPFChapter 08 - Single-Area OSPF
Chapter 08 - Single-Area OSPF
Yaser Rahmati
 
Chapter 06 - Static Routing
Chapter 06 - Static RoutingChapter 06 - Static Routing
Chapter 06 - Static Routing
Yaser Rahmati
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing Concepts
Yaser Rahmati
 
Chapter 05 - Inter-VLAN Routing
Chapter 05 - Inter-VLAN RoutingChapter 05 - Inter-VLAN Routing
Chapter 05 - Inter-VLAN Routing
Yaser Rahmati
 
Chapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched NetworksChapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched Networks
Yaser Rahmati
 
Chapter 03 - VLANs
Chapter 03 - VLANsChapter 03 - VLANs
Chapter 03 - VLANs
Yaser Rahmati
 

More from Yaser Rahmati (20)

Cisco WLAN - Chapter. 08 : Applications, Design, and Site Survey Preparation
Cisco WLAN - Chapter. 08 : Applications, Design, and Site Survey  PreparationCisco WLAN - Chapter. 08 : Applications, Design, and Site Survey  Preparation
Cisco WLAN - Chapter. 08 : Applications, Design, and Site Survey Preparation
 
Cisco WLAN - Chapter. 07 : Antennas
Cisco WLAN - Chapter. 07 : AntennasCisco WLAN - Chapter. 07 : Antennas
Cisco WLAN - Chapter. 07 : Antennas
 
Cisco WLAN - Chapter. 06 : bridges
Cisco WLAN - Chapter. 06 : bridgesCisco WLAN - Chapter. 06 : bridges
Cisco WLAN - Chapter. 06 : bridges
 
Cisco WLAN - Chapter. 05 : Access Points
Cisco WLAN - Chapter. 05 : Access PointsCisco WLAN - Chapter. 05 : Access Points
Cisco WLAN - Chapter. 05 : Access Points
 
Cisco WLAN - Chapter. 03 : wireless radio technology
Cisco WLAN - Chapter. 03 : wireless radio technologyCisco WLAN - Chapter. 03 : wireless radio technology
Cisco WLAN - Chapter. 03 : wireless radio technology
 
Cisco WLAN - Chapter. 02 : Part 3 – 802.11 phy
Cisco WLAN -  Chapter. 02 : Part 3 – 802.11 phyCisco WLAN -  Chapter. 02 : Part 3 – 802.11 phy
Cisco WLAN - Chapter. 02 : Part 3 – 802.11 phy
 
Cisco WLAN - Chapter. 02 : Part 2 – 802.11 MAC
Cisco WLAN -  Chapter. 02 : Part 2 – 802.11 MACCisco WLAN -  Chapter. 02 : Part 2 – 802.11 MAC
Cisco WLAN - Chapter. 02 : Part 2 – 802.11 MAC
 
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client AdaptersCisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters
 
Cisco WLAN - Chapter. 01 : Overview of Wireless LANs
Cisco WLAN -  Chapter. 01 : Overview of Wireless LANsCisco WLAN -  Chapter. 01 : Overview of Wireless LANs
Cisco WLAN - Chapter. 01 : Overview of Wireless LANs
 
MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2
 
Chapter 07 - Routing Dynamically
Chapter 07 - Routing DynamicallyChapter 07 - Routing Dynamically
Chapter 07 - Routing Dynamically
 
Chapter 11 - Network Address Translation for IPv4
Chapter 11 - Network Address Translation for IPv4Chapter 11 - Network Address Translation for IPv4
Chapter 11 - Network Address Translation for IPv4
 
Chapter 10 - DHCP
Chapter 10 - DHCPChapter 10 - DHCP
Chapter 10 - DHCP
 
Chapter 09 - Access Control Lists
Chapter 09 - Access Control ListsChapter 09 - Access Control Lists
Chapter 09 - Access Control Lists
 
Chapter 08 - Single-Area OSPF
Chapter 08 - Single-Area OSPFChapter 08 - Single-Area OSPF
Chapter 08 - Single-Area OSPF
 
Chapter 06 - Static Routing
Chapter 06 - Static RoutingChapter 06 - Static Routing
Chapter 06 - Static Routing
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing Concepts
 
Chapter 05 - Inter-VLAN Routing
Chapter 05 - Inter-VLAN RoutingChapter 05 - Inter-VLAN Routing
Chapter 05 - Inter-VLAN Routing
 
Chapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched NetworksChapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched Networks
 
Chapter 03 - VLANs
Chapter 03 - VLANsChapter 03 - VLANs
Chapter 03 - VLANs
 

Recently uploaded

The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
AG2 Design
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
JezreelCabil2
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 

Recently uploaded (20)

The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 

Chapter 01 - Exploring the Network

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 1: Objectives After completing this chapter, students will be able to:  Explain how multiple networks are used in everyday life.  Explain the topologies and devices used in a small- to medium- sized business network.  Explain the basic characteristics of a network that supports communication in a small- to medium-sized business.  Explain trends in networking that will affect the use of networks in small to medium-sized businesses.
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 1 1.1 Globally Connected 1.2 LANs, WANs, and the Internet 1.3 The Network as a Platform 1.4 The Changing Network Environment 1.5 Summary
  • 4. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4 1.1 Globally Connected
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Networking Today Networks in Our Past and Daily Lives
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Networking Today The Global Community
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Interconnecting Our Lives Networking Impacts in Our Daily Lives  Networks support the way we learn.  Networks support the way we communicate.  Networks support the way we work.  Networks support the way we play.
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Providing Resources in a Network Networks of Many Sizes
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Providing Resources in a Network Clients and Servers
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Providing Resources in a Network Peer-to-Peer
  • 11. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 11 1.2 LANs, WANs, and the Internet
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs, WANs, and Internets Components of a Network There are three categories of network components:  Devices  Media  Services
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of a Network End Devices Some examples of end devices are:  Computers (work stations, laptops, file servers, web servers)  Network printers  VoIP phones  TelePresence endpoint  Security cameras  Mobile handheld devices (such as smart phones, tablets, PDAs, and wireless debit / credit card readers and barcode scanners)
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of a Network Network Infrastructure Devices Examples of intermediary network devices are:  Network Access Devices (switches, and wireless access points)  Internetworking Devices (routers)  Security Devices (firewalls)
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of a Network Network Media
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of a Network Network Representations
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of a Network Topology Diagrams
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs and WANs Types of Networks The two most common types of network infrastructures are:  Local Area Network (LAN)  Wide Area Network (WAN). Other types of networks include:  Metropolitan Area Network (MAN)  Wireless LAN (WLAN)  Storage Area Network (SAN)
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs and WANs Local Area Networks (LAN)
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs and WANs Wide Area Networks (WAN)
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs, WANs, and the Internet The Internet
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs, WANs, and the Internet Intranet and Extranet
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connecting to the Internet Connecting Remote Users to the Internet
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connecting to the Internet Connecting Businesses to the Internet
  • 25. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 25 1.3 The Network as a Platform
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Converged Networks The Converging Network
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Converged Networks Planning for the Future
  • 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Supporting Network Architecture As networks evolve, we are discovering that there are four basic characteristics that the underlying architectures need to address in order to meet user expectations:  Fault Tolerance  Scalability  Quality of Service (QoS)  Security
  • 29. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Fault Tolerance in Circuit Switched Network
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Packet-Switched Networks
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Scalable Networks
  • 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Providing QoS Examples of priority decisions for an organization might include:  Time-sensitive communication - increase priority for services like telephony or video distribution.  Non time-sensitive communication - decrease priority for web page retrieval or email.  High importance to organization - increase priority for production control or business transaction data.  Undesirable communication - decrease priority or block unwanted activity, like peer-to-peer file sharing or live entertainment.
  • 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Providing Network Security
  • 34. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 34 1.4 The Changing Network Environment
  • 35. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Trends New trends Some of the top trends include:  Bring Your Own Device (BYOD)  Online collaboration  Video  Cloud computing
  • 36. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Trends Bring Your Own Device (BYOD) The concept of any device, to any content, in anyway is a major global trend that requires significant changes to the way devices are used. This trend is known as Bring Your Own Device (BYOD).
  • 37. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Trends Online Collaboration
  • 38. Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Trends Video Communication
  • 39. Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Trends Cloud Computing Cloud computing offers the following potential benefits:  Organizational flexibility  Agility and rapid deployment  Reduced cost of infrastructure  Refocus of IT resources  Creation of new business models
  • 40. Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Trends Data Centers A data center is a facility used to house computer systems and associated components including:  Redundant data communications connections  High-speed virtual servers (sometimes referred to as server farms or server clusters)  Redundant storage systems (typically uses SAN technology)  Redundant or backup power supplies  Environmental controls (e.g., air conditioning, fire suppression)  Security devices
  • 41. Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Networking Technologies for the Home Technology Trends in the Home
  • 42. Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Networking Technologies for the Home Powerline Networking
  • 43. Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Networking Technologies for the Home Wireless Broadband
  • 44. Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Future of Networking Network Security
  • 45. Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Security Security Threats The most common external threats to networks include:  Viruses, worms, and Trojan horses  Spyware and adware  Zero-day attacks, also called zero-hour attacks  Hacker attacks  Denial of service (DoS) attacks  Data interception and theft  Identity theft
  • 46. Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Security Security Solutions Network security components often include:  Antivirus and antispyware  Firewall filtering  Dedicated firewall systems  Access control lists (ACL)  Intrusion prevention systems (IPS)  Virtual Private Networks (VPNs)
  • 47. Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Architectures Cisco Network Architectures
  • 48. Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Architectures Cisco Certified Network Associate (CCNA)
  • 49. Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Summary In this chapter, you learned:  Networks and the Internet have changed the way we communicate, learn, work, and even play.  Networks come in all sizes. They can range from simple networks consisting of two computers, to networks connecting millions of devices.  The Internet is the largest network in existence. In fact, the term Internet means a ‘network of networks. The Internet provides the services that enable us to connect and communicate with our families, friends, work, and interests.  The network infrastructure is the platform that supports the network. It provides the stable and reliable channel over which communication can occur. It is made up of network components including end devices, intermediate devices, and network media.
  • 50. Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Summary (cont.) In this chapter, you learned:  Networks must be reliable.  Network security is an integral part of computer networking, regardless of whether the network is limited to a home environment with a single connection to the Internet, or as large as a corporation with thousands of users.  The network infrastructure can vary greatly in terms of size, number of users, and number and types of services that are supported on it. The network infrastructure must grow and adjust to support the way the network is used. The routing and switching platform is the foundation of any network infrastructure.
  • 51. Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential