SlideShare a Scribd company logo
LAN FundamentalsLAN Fundamentals
ETT 592
LAN Administration
Network ModelsNetwork Models
• Shared Processing
• Distributed Processing
– Peer to Peer
– Client Server
Shared ProcessingShared Processing
• Mainframe/Unix/Windows Terminal
Server environment
• All users share the same processor
• Users connect via “terminal emulation”
Peer to PeerPeer to Peer
• EASY!!!!
• CHEAP!!!!!
• Allows File and
Peripheral Sharing
• No centralized
control
• Generally insecure
• Unreliable
Client ServerClient Server
• Centralized
Management
• High Security
• Reduced client
management
• Easy backup
• Scalability
• Higher hardware
cost (dedicated
server)
• Server is failure
point
• More difficult to
manage
LAN ComponentsLAN Components
• File Server
• Application Software
• Workstations / Client OS
• NICs
• Shared Peripherals
• Data Files
• NOS
File ServerFile Server
• Central system
• Controls authentication
• Provides management of resources and
peripherals
• Often multi-processor
• Significant HD capacity
• BIG Box
• Becomes the weakest link
Application SoftwareApplication Software
• Programs that perform tasks
– Office Suites
– Database applications
WorkstationWorkstation
• Provide connection to network
• May or may not have HD
• May or may not be “dumb terminals”
• Can be running a variety of OS’s
depending on network capabilities
Workstation OSWorkstation OS
• Singletasking vs. Multitasking
– Cooperative (like kids sharing)
– Preemptive (like kids sharing with
supervision)
• Single User vs. Multi User
• Network protocol support
NICsNICs
• Network Interface Cards
• Allow physical connection between
network and the computer
• Manufactured by MANY companies.
– Buy from a major vendor
– Try to standardize
Data FilesData Files
• The most significant reason we network
today
• Provides shared, controlled access to
resources
• Provides centralized backup of
resources
Server StorageServer Storage
• HD capacity
• MTBF
• RAID 0, 1, 5
So What is RAID ???So What is RAID ???
• Redundant Array of Inexpensive Disks
• Can be done through OS or using
special SCSI controller cards
RAID 0RAID 0
• Disk Striping w/o parity
• Data written to multiple disks
• No increase in security
• Great Increase in I/O
RAID 1RAID 1
• Disk Mirroring / Duplexing
• Mirroring
– Two drives, single controller
– Redundancy, no I/O benefit
• Duplexing
– Two drives, two controllers
– Redundancy, I/O read benefit
• Storage capacity ½ of drive space
RAID 5RAID 5
• Disk Striping with Parity
• Data and parity blocks spread across all
drives
• Writes may be a bit slower
• Reads are faster
• Get redundancy
• Storage capacity is #drives-1
Shared PeripheralsShared Peripherals
• Printers
• Fax Servers
NOSNOS
• Network Operating Systems
• Windows NT
• Windows 2000
• Windows XP
• Unix / Linux
• Mac OS X
Hot SwapHot Swap
• Ability to replace parts while system is
running
– Power supplies
– HD
The weakest linkThe weakest link
• Server failure or downtime leads to
productivity loss
– Clustering prevents this
• Server failure leads to inability to authenticate
– PDC and BDC
• File retrieval is often slower
– Data files compared to application software
• Security Problems
The weakest link (cont)The weakest link (cont)
• Power Problems
– Redundant power supplies
– UPS
– Generators
How are networks builtHow are networks built
• Several components that must first be
considered.
Network TopologiesNetwork Topologies
• Bus
• Star
• Ring
• Mesh
Access TypesAccess Types
• Contention Based
– CSMA/CD
• Deterministic
– Token Passing
Cable TypesCable Types
• Coax
– RG58
• UTP
– CAT3
– CAT5
– CAT6e
• Fiber Optic
Network TypesNetwork Types
• Ethernet
– 10Base-2
– 10Base-T
– 100Base-T
• Token Ring
– Standard Token Ring
– FDDI
10Base-210Base-2
• Bus Configuration
• RG58 wire with 50ohm terminator
10Base-210Base-2
• Maximum Segment Distance 185m
(607 ft)
• Maximum network length 925m(3,035
ft)
10Base-T/ 10Base-10010Base-T/ 10Base-100
• Ethernet / Star configuration
• Category 3 UTP=10mbs
• Category 5 UTP=100mbs
10Base-T/ 10Base-10010Base-T/ 10Base-100
• Number of stations set by concentrator
• 1,024 stations per network
• 100 m to concentrator (328 ft)
Token RingToken Ring
• Token Passing Scheme
• Systems are connected to MAU
• Operate at 4 or 16mb
• Now use “Early Token Release”
• Tend to handle network load better
FDDI (Fiber DistributedFDDI (Fiber Distributed
Data Interface)Data Interface)
• Token passing scheme
• Dual counter rotating rings
• Fiber optic cable
• Class A connections are fault tolerant
• Class B connections are not fault
tolerant
How do the parts workHow do the parts work
togethertogether
• OSI Model is the theoretical basis
• No one adheres exactly to the model,
but everyone understands what it
means.
OSI ModelOSI Model
http://webopedia.internet.com/quick_ref/OSI_Layers.html
Physical LayerPhysical Layer
• Cabling, Topology
• Electrical Communications Stuff
• Cable and how it connects to the card
Data LinkData Link
• Organizes frames into structured data
packets
• 802.3 (CSMA/CD Ethernet)
• 802.5 (Token Ring)
• 802.11 (Wireless)
Network LayerNetwork Layer
• Responsible for routing data in
subnetted network
– If a transport protocol doesn’t support this
layer it is unroutable
• IP address converted to/from MAC
Address
Transport LayerTransport Layer
• Makes sure data gets from one point to
another
• Error Detection and recovery
Session LayerSession Layer
• Logical connection between network
devices
Presentation LayerPresentation Layer
• Translates data from application layer
to transmission format
• Encoding/Decoding
• ASCII, .DOC, .MPG, .JPG
Application LayerApplication Layer
• End User Software
• Email, File Transfer, Word,
How to rememberHow to remember
• Application
• Presentation
• Session
• Transport
• Network
• Data Link
• Physical
Please Do Not Throw Sausage Pizza Away
Network GearNetwork Gear
• Hubs ( a splitter )
– OSI layer 1 (Physical)
• Switches ( an intelligent splitter )
– OSI layer 2 (Data Link)
• MAUs ( a hub for a token ring network )
– OSI layer 1 (Physical)
• Routers (moves data between networks and
subnets )
– OSI layer 3 (Network)
IP AddressingIP Addressing
• Address Classifications
• Subnetting
IP Address ClassesIP Address Classes
Class Range # Networks Hosts/
Network
A 1-126 126 16,777,214
B 128-191.255 16,384 65,534
C 192.0.0-
225.255.255
2,097,152 254
So you want an addressSo you want an address
• Class A addresses are all gone
• Class B addresses are basically gone
• Class C addresses are available
Reserved AddressesReserved Addresses
• Class A 10.0.0.0-10.255.255.255
• Class B 172.16.0.0 – 172.31.255.255
• Class C 192.168.0.0 – 192.168.255.255
• Loop Back 127.0.0.1
• Reserved addresses are NEVER routed
What’s a subnet?What’s a subnet?
• Logical organization of computers
• A way to reduce network traffic
• A way to efficiently use assigned
addresses
Getting an IP addressGetting an IP address
• Hard Coding
– Manual Entry of
• DNS Servers (Domain Name Services)
• Gateways (Routers)
• IP Address
• DHCP
– Dynamic Host Control Protocol
IP ConfigurationIP Configuration
ExampleExample

More Related Content

What's hot

Network Implementation and Support Lesson 04 Group and Computer Accounts - ...
Network Implementation and Support Lesson 04   Group and Computer Accounts - ...Network Implementation and Support Lesson 04   Group and Computer Accounts - ...
Network Implementation and Support Lesson 04 Group and Computer Accounts - ...
Eric Vanderburg
 
Novell Teaming: Automating Business Processes with Forms and Workflows
Novell Teaming: Automating Business Processes with Forms and WorkflowsNovell Teaming: Automating Business Processes with Forms and Workflows
Novell Teaming: Automating Business Processes with Forms and Workflows
Novell
 
Resume - Stanifer Robert Dale - New Sum
Resume - Stanifer Robert Dale - New SumResume - Stanifer Robert Dale - New Sum
Resume - Stanifer Robert Dale - New SumRobert Stanifer
 
NephoScale Elastic Networking
NephoScale Elastic NetworkingNephoScale Elastic Networking
NephoScale Elastic Networking
NephoScale
 
Blake_Johnson_net6-28-15
Blake_Johnson_net6-28-15Blake_Johnson_net6-28-15
Blake_Johnson_net6-28-15Blake Johnson
 
Upping your NiFi Game with Docker
Upping your NiFi Game with DockerUpping your NiFi Game with Docker
Upping your NiFi Game with Docker
Aldrin Piri
 
05 internal memory
05 internal memory05 internal memory
05 internal memory
dilip kumar
 
Introducing Infinispan
Introducing InfinispanIntroducing Infinispan
Introducing Infinispan
PT.JUG
 
ITFT_Computer Network
ITFT_Computer NetworkITFT_Computer Network
ITFT_Computer Network
Sneh Prabha
 
VL2: A scalable and flexible Data Center Network
VL2: A scalable and flexible Data Center NetworkVL2: A scalable and flexible Data Center Network
VL2: A scalable and flexible Data Center Network
Ankita Mahajan
 
HP Virtual Connect technical fundamental101 v2.1
HP Virtual Connect technical fundamental101   v2.1HP Virtual Connect technical fundamental101   v2.1
HP Virtual Connect technical fundamental101 v2.1
ผู้ชาย แห่งสายลม
 
Migrating Novell GroupWise to Linux
Migrating Novell GroupWise to LinuxMigrating Novell GroupWise to Linux
Migrating Novell GroupWise to Linux
Novell
 
Data OnTAP Cluster Mode Administrator
Data OnTAP Cluster Mode AdministratorData OnTAP Cluster Mode Administrator
Data OnTAP Cluster Mode Administrator
Archana Parameshwari
 
Enabling IPv6 Services Transparently
Enabling IPv6 Services TransparentlyEnabling IPv6 Services Transparently
Enabling IPv6 Services Transparently
Carlos Martinez Cagnazzo
 
Benefits of Hosting a DNS Root Server
Benefits of Hosting a DNS Root ServerBenefits of Hosting a DNS Root Server
Benefits of Hosting a DNS Root Server
RIPE NCC
 
Windows Server 2012 R2 Software-Defined Storage
Windows Server 2012 R2 Software-Defined StorageWindows Server 2012 R2 Software-Defined Storage
Windows Server 2012 R2 Software-Defined Storage
Aidan Finn
 
Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.
Aakash Panchal
 

What's hot (20)

Network Implementation and Support Lesson 04 Group and Computer Accounts - ...
Network Implementation and Support Lesson 04   Group and Computer Accounts - ...Network Implementation and Support Lesson 04   Group and Computer Accounts - ...
Network Implementation and Support Lesson 04 Group and Computer Accounts - ...
 
Novell Teaming: Automating Business Processes with Forms and Workflows
Novell Teaming: Automating Business Processes with Forms and WorkflowsNovell Teaming: Automating Business Processes with Forms and Workflows
Novell Teaming: Automating Business Processes with Forms and Workflows
 
Resume - Stanifer Robert Dale - New Sum
Resume - Stanifer Robert Dale - New SumResume - Stanifer Robert Dale - New Sum
Resume - Stanifer Robert Dale - New Sum
 
NephoScale Elastic Networking
NephoScale Elastic NetworkingNephoScale Elastic Networking
NephoScale Elastic Networking
 
Blake_Johnson_net6-28-15
Blake_Johnson_net6-28-15Blake_Johnson_net6-28-15
Blake_Johnson_net6-28-15
 
Upping your NiFi Game with Docker
Upping your NiFi Game with DockerUpping your NiFi Game with Docker
Upping your NiFi Game with Docker
 
05 internal memory
05 internal memory05 internal memory
05 internal memory
 
Introducing Infinispan
Introducing InfinispanIntroducing Infinispan
Introducing Infinispan
 
ITFT_Computer Network
ITFT_Computer NetworkITFT_Computer Network
ITFT_Computer Network
 
VL2: A scalable and flexible Data Center Network
VL2: A scalable and flexible Data Center NetworkVL2: A scalable and flexible Data Center Network
VL2: A scalable and flexible Data Center Network
 
HP Virtual Connect technical fundamental101 v2.1
HP Virtual Connect technical fundamental101   v2.1HP Virtual Connect technical fundamental101   v2.1
HP Virtual Connect technical fundamental101 v2.1
 
Migrating Novell GroupWise to Linux
Migrating Novell GroupWise to LinuxMigrating Novell GroupWise to Linux
Migrating Novell GroupWise to Linux
 
IPv6 Transition Considerations for ISPs
IPv6 Transition Considerations for ISPsIPv6 Transition Considerations for ISPs
IPv6 Transition Considerations for ISPs
 
Data OnTAP Cluster Mode Administrator
Data OnTAP Cluster Mode AdministratorData OnTAP Cluster Mode Administrator
Data OnTAP Cluster Mode Administrator
 
Enabling IPv6 Services Transparently
Enabling IPv6 Services TransparentlyEnabling IPv6 Services Transparently
Enabling IPv6 Services Transparently
 
Benefits of Hosting a DNS Root Server
Benefits of Hosting a DNS Root ServerBenefits of Hosting a DNS Root Server
Benefits of Hosting a DNS Root Server
 
Windows Server 2012 R2 Software-Defined Storage
Windows Server 2012 R2 Software-Defined StorageWindows Server 2012 R2 Software-Defined Storage
Windows Server 2012 R2 Software-Defined Storage
 
Xin Wang
Xin WangXin Wang
Xin Wang
 
Samba distributed env
Samba distributed envSamba distributed env
Samba distributed env
 
Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.
 

Viewers also liked

IASA social media presentation 2012
IASA social media presentation 2012IASA social media presentation 2012
IASA social media presentation 2012
Steven Baule
 
201209collegereadinessupdate
201209collegereadinessupdate201209collegereadinessupdate
201209collegereadinessupdateSteven Baule
 
Online Credit Recovery
Online Credit RecoveryOnline Credit Recovery
Online Credit Recovery
Steven Baule
 
Rubric Development
Rubric DevelopmentRubric Development
Rubric Development
Steven Baule
 
Unofficial T&L School CIO notes
Unofficial T&L School CIO notesUnofficial T&L School CIO notes
Unofficial T&L School CIO notes
Steven Baule
 
Athletic Facilities Presentation from Feb 2015
Athletic Facilities Presentation from Feb 2015Athletic Facilities Presentation from Feb 2015
Athletic Facilities Presentation from Feb 2015
Steven Baule
 

Viewers also liked (6)

IASA social media presentation 2012
IASA social media presentation 2012IASA social media presentation 2012
IASA social media presentation 2012
 
201209collegereadinessupdate
201209collegereadinessupdate201209collegereadinessupdate
201209collegereadinessupdate
 
Online Credit Recovery
Online Credit RecoveryOnline Credit Recovery
Online Credit Recovery
 
Rubric Development
Rubric DevelopmentRubric Development
Rubric Development
 
Unofficial T&L School CIO notes
Unofficial T&L School CIO notesUnofficial T&L School CIO notes
Unofficial T&L School CIO notes
 
Athletic Facilities Presentation from Feb 2015
Athletic Facilities Presentation from Feb 2015Athletic Facilities Presentation from Feb 2015
Athletic Facilities Presentation from Feb 2015
 

Similar to LAN Fundamentals

Geek Sync | Infrastructure for the Data Professional: An Introduction
Geek Sync | Infrastructure for the Data Professional: An IntroductionGeek Sync | Infrastructure for the Data Professional: An Introduction
Geek Sync | Infrastructure for the Data Professional: An Introduction
IDERA Software
 
IP Signal Distribution
IP Signal DistributionIP Signal Distribution
IP Signal Distribution
rAVe [PUBS]
 
Computer Networking 101
Computer Networking 101Computer Networking 101
Computer Networking 101
Sameer Mahajan
 
Networking Hardware Concepts
Networking Hardware ConceptsNetworking Hardware Concepts
Networking Hardware Concepts
Amir Villas
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
Samit Singh
 
Basic networking
Basic networkingBasic networking
Building Storage for Clouds (ONUG Spring 2015)
Building Storage for Clouds (ONUG Spring 2015)Building Storage for Clouds (ONUG Spring 2015)
Building Storage for Clouds (ONUG Spring 2015)
Howard Marks
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
Amit Saha
 
pps Matters
pps Matterspps Matters
Sept 2017 cisco certification routers
Sept 2017  cisco certification routersSept 2017  cisco certification routers
Sept 2017 cisco certification routers
shahin raj
 
CC-4153, Verizon Cloud Compute and the SM15000, by Paul Curtis
CC-4153, Verizon Cloud Compute and the SM15000, by Paul CurtisCC-4153, Verizon Cloud Compute and the SM15000, by Paul Curtis
CC-4153, Verizon Cloud Compute and the SM15000, by Paul Curtis
AMD Developer Central
 
INDUSTRIAL TRAINING PRESENTATION
INDUSTRIAL TRAINING PRESENTATION INDUSTRIAL TRAINING PRESENTATION
INDUSTRIAL TRAINING PRESENTATION
Nikhil Soni
 
San
SanSan
04 introduction to computer networking
04 introduction to computer networking04 introduction to computer networking
04 introduction to computer networkingtjunicornfx
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1
Aneesh Nelavelly
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
Atika Zaimi
 
From Device to Data Center to Insights: Architectural Considerations for the ...
From Device to Data Center to Insights: Architectural Considerations for the ...From Device to Data Center to Insights: Architectural Considerations for the ...
From Device to Data Center to Insights: Architectural Considerations for the ...
P. Taylor Goetz
 
Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics) Information Networks - (Covered all the Important Topics)
Lan overview
Lan overviewLan overview
Lan overview
Shyam Gupta
 

Similar to LAN Fundamentals (20)

Geek Sync | Infrastructure for the Data Professional: An Introduction
Geek Sync | Infrastructure for the Data Professional: An IntroductionGeek Sync | Infrastructure for the Data Professional: An Introduction
Geek Sync | Infrastructure for the Data Professional: An Introduction
 
IP Signal Distribution
IP Signal DistributionIP Signal Distribution
IP Signal Distribution
 
Computer Networking 101
Computer Networking 101Computer Networking 101
Computer Networking 101
 
Networking Hardware Concepts
Networking Hardware ConceptsNetworking Hardware Concepts
Networking Hardware Concepts
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Building Storage for Clouds (ONUG Spring 2015)
Building Storage for Clouds (ONUG Spring 2015)Building Storage for Clouds (ONUG Spring 2015)
Building Storage for Clouds (ONUG Spring 2015)
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
pps Matters
pps Matterspps Matters
pps Matters
 
Sept 2017 cisco certification routers
Sept 2017  cisco certification routersSept 2017  cisco certification routers
Sept 2017 cisco certification routers
 
CC-4153, Verizon Cloud Compute and the SM15000, by Paul Curtis
CC-4153, Verizon Cloud Compute and the SM15000, by Paul CurtisCC-4153, Verizon Cloud Compute and the SM15000, by Paul Curtis
CC-4153, Verizon Cloud Compute and the SM15000, by Paul Curtis
 
INDUSTRIAL TRAINING PRESENTATION
INDUSTRIAL TRAINING PRESENTATION INDUSTRIAL TRAINING PRESENTATION
INDUSTRIAL TRAINING PRESENTATION
 
San
SanSan
San
 
San
SanSan
San
 
04 introduction to computer networking
04 introduction to computer networking04 introduction to computer networking
04 introduction to computer networking
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 
From Device to Data Center to Insights: Architectural Considerations for the ...
From Device to Data Center to Insights: Architectural Considerations for the ...From Device to Data Center to Insights: Architectural Considerations for the ...
From Device to Data Center to Insights: Architectural Considerations for the ...
 
Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics) Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics)
 
Lan overview
Lan overviewLan overview
Lan overview
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

LAN Fundamentals