SlideShare a Scribd company logo
1 of 19
Networking 2 – Advanced
Networking
IT 3C
In-person class / Thursday / 1-3PM
Synchronous class / Tuesday / 1-3PM
Syllabus
• Introduction of Advanced Network
• Technology and Facilities
• Advanced Network Technology Concepts
• IOT Concepts and Discussion
• Different Advanced Network Devices and Technology
• Facilitating Advanced Network Technology
Syllabus
• Principles of Fiber Optics Technology
• History and Concepts
• Types and Usage
• Tools and Equipment for Fiber Optics Implementation
• Designing Network using Fiber Optics Technology
• Performing Fiber Optics Process
• Implementation and Troubleshooting Fiber Optics Technology
Syllabus
• Wireless Communications
• Introduction of Wireless Communications
• Different Wireless Technology and Usage
• WiFi Technologies Concepts
• Designing Wireless Networks
• Performing Wireless Communications Set-up
• Maintenance and Troubleshooting of Wireless Technology
• Securing Wireless Networks
Syllabus
• Virtual Private Network
• Introduction of VPN
• Tunneling and Encryption Protocols
• Basic VPN concepts
• VPN configurations
• VPN policies and procedures Securing VPN
Syllabus
• Firewalls
• Firewalls Concepts
• Hardware and software firewalls
• Standard firewall functionality and common implementation practices
• Designing Firewalls
• Managing Firewalls
Syllabus
• Intrusion Detection Systems
• Components of an intrusion detection system
• Technologies and techniques of intrusion detection
• Process of intrusion detection
• Implementing intrusion detection systems
• IDS limitations
• Six-step incident response process
Syllabus
• Server Maintenance
• Rules and regulations
• Security Protection Measures
• Back-up Plan and Procedures
• Maintenance and Management
Additional Topics
• Linux 101
• Introduction to Command Line
• Files and Filesystem
• Users and Groups
• Installing Software
• Shells
• More Utilities
• Text Editors
• Process Management
• Regular Expressions
• Scripting
Quick Quiz
Question 1
• Communication between a computer and a keyboard involves
______________ transmission.
• a) Automatic
• b) Half-duplex
• c) Full-duplex
• d) Simplex
Question 2
• A _______ is the physical path over which a message travels.
• a) Path
• b) Medium
• c) Protocol
• d) Route
Question 3
• Which of this is not a network edge device?
• a) PC
• b) Smartphones
• c) Servers
• d) Switch
Question 4
• A _________ set of rules that governs data communication.
• a) Protocols
• b) Standards
• c) RFCs
• d) Servers
Question 5
• Physical or logical arrangement of network is __________
• a) Topology
• b) Routing
• c) Networking
• d) Control
Question 6
• Which network topology requires a central controller or hub?
• a) Star
• b) Mesh
• c) Ring
• d) Bus
Question 7
• Data communication system spanning states, countries, or the whole
world is ________
• a) LAN
• b) WAN
• c) MAN
• d) PAN
Question 8
• Data communication system within a building or campus is________
• a) LAN
• b) WAN
• c) MAN
• d) PAN

More Related Content

Similar to Orientation.pptx

Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01
Gaurav Goyal
 

Similar to Orientation.pptx (20)

Lesson 3 - Networking
Lesson 3 - NetworkingLesson 3 - Networking
Lesson 3 - Networking
 
B21DA0201_01.ppt
B21DA0201_01.pptB21DA0201_01.ppt
B21DA0201_01.ppt
 
The Theoretical Network
The Theoretical NetworkThe Theoretical Network
The Theoretical Network
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
lecture1.ppt
lecture1.pptlecture1.ppt
lecture1.ppt
 
lecture1.ppt
lecture1.pptlecture1.ppt
lecture1.ppt
 
Data Communication-1.ppt
Data Communication-1.pptData Communication-1.ppt
Data Communication-1.ppt
 
lecture1 (1).ppt
lecture1 (1).pptlecture1 (1).ppt
lecture1 (1).ppt
 
LinkedIn's Approach to Programmable Data Center
LinkedIn's Approach to Programmable Data CenterLinkedIn's Approach to Programmable Data Center
LinkedIn's Approach to Programmable Data Center
 
Network fundamental
Network fundamentalNetwork fundamental
Network fundamental
 
Understanding local area networking
Understanding local area networkingUnderstanding local area networking
Understanding local area networking
 
Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
 
MVA slides lesson 1
MVA slides lesson 1MVA slides lesson 1
MVA slides lesson 1
 
Slides internet technology
Slides internet technologySlides internet technology
Slides internet technology
 
CH1-LECTURE_1.pdf
CH1-LECTURE_1.pdfCH1-LECTURE_1.pdf
CH1-LECTURE_1.pdf
 
Mtcna outline
Mtcna outlineMtcna outline
Mtcna outline
 
Networking lec1 4
Networking lec1 4Networking lec1 4
Networking lec1 4
 
Fe4
Fe4Fe4
Fe4
 
networking
networking networking
networking
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Orientation.pptx

  • 1.
  • 2. Networking 2 – Advanced Networking IT 3C In-person class / Thursday / 1-3PM Synchronous class / Tuesday / 1-3PM
  • 3. Syllabus • Introduction of Advanced Network • Technology and Facilities • Advanced Network Technology Concepts • IOT Concepts and Discussion • Different Advanced Network Devices and Technology • Facilitating Advanced Network Technology
  • 4. Syllabus • Principles of Fiber Optics Technology • History and Concepts • Types and Usage • Tools and Equipment for Fiber Optics Implementation • Designing Network using Fiber Optics Technology • Performing Fiber Optics Process • Implementation and Troubleshooting Fiber Optics Technology
  • 5. Syllabus • Wireless Communications • Introduction of Wireless Communications • Different Wireless Technology and Usage • WiFi Technologies Concepts • Designing Wireless Networks • Performing Wireless Communications Set-up • Maintenance and Troubleshooting of Wireless Technology • Securing Wireless Networks
  • 6. Syllabus • Virtual Private Network • Introduction of VPN • Tunneling and Encryption Protocols • Basic VPN concepts • VPN configurations • VPN policies and procedures Securing VPN
  • 7. Syllabus • Firewalls • Firewalls Concepts • Hardware and software firewalls • Standard firewall functionality and common implementation practices • Designing Firewalls • Managing Firewalls
  • 8. Syllabus • Intrusion Detection Systems • Components of an intrusion detection system • Technologies and techniques of intrusion detection • Process of intrusion detection • Implementing intrusion detection systems • IDS limitations • Six-step incident response process
  • 9. Syllabus • Server Maintenance • Rules and regulations • Security Protection Measures • Back-up Plan and Procedures • Maintenance and Management
  • 10. Additional Topics • Linux 101 • Introduction to Command Line • Files and Filesystem • Users and Groups • Installing Software • Shells • More Utilities • Text Editors • Process Management • Regular Expressions • Scripting
  • 12. Question 1 • Communication between a computer and a keyboard involves ______________ transmission. • a) Automatic • b) Half-duplex • c) Full-duplex • d) Simplex
  • 13. Question 2 • A _______ is the physical path over which a message travels. • a) Path • b) Medium • c) Protocol • d) Route
  • 14. Question 3 • Which of this is not a network edge device? • a) PC • b) Smartphones • c) Servers • d) Switch
  • 15. Question 4 • A _________ set of rules that governs data communication. • a) Protocols • b) Standards • c) RFCs • d) Servers
  • 16. Question 5 • Physical or logical arrangement of network is __________ • a) Topology • b) Routing • c) Networking • d) Control
  • 17. Question 6 • Which network topology requires a central controller or hub? • a) Star • b) Mesh • c) Ring • d) Bus
  • 18. Question 7 • Data communication system spanning states, countries, or the whole world is ________ • a) LAN • b) WAN • c) MAN • d) PAN
  • 19. Question 8 • Data communication system within a building or campus is________ • a) LAN • b) WAN • c) MAN • d) PAN

Editor's Notes

  1. D. In simplex transmission, data flows in single direction which in this case refers to the data flowing from the keyboard to the computer. Another example would be of the mouse where the data flows from the mouse to the computer only.
  2. B. Messages travel from sender to receiver via a physical path called the medium using a set of methods/rules called protocol. Mediums can be guided (wired) or unguided (wireless).
  3. D. Network edge devices refer to host systems, which can host applications like web browser. A switch can’t operate as a host, but as a central device which can be used to manage network communication.
  4. A. In communications, a protocol refers to a set of rules and regulations that allow a network of nodes to transmit and receive information. Each layer in the network model has a protocol set, for example, the transport layer has TCP and UDP protocols.
  5. Answer: a Explanation: Topology in networks is the structure or pattern in which each and every node in the network is connected. There are many topologies in networking like bus, tree, ring, star, mesh, and hybrid topology. There is no particular best topology and a suitable topology can be chosen based on the kind of application of the network .
  6. Answer: a Explanation: In star topology, no computer is connected to another computer directly but all the computers are connected to a central hub. Every message sent from a source computer goes through the hub and the hub then forwards the message only to the intended destination computer.
  7. Answer: b Explanation: WAN is the abbreviation for Wide Area Network. This network extends over a large geographical area. WANs are used to connect cities, states or even countries. A wireless connection is required to build a WAN. The best example of WAN is the Internet.
  8. Answer: a Explanation: LAN is an abbreviation for Local Area Network. This network interconnects computers in a small area such as schools, offices, residence etc. It is the most versatile kind of data communication system where most of the computer network concepts can be visibly used.