SlideShare a Scribd company logo
1 of 55
Добре дошли в света
на Cisco
История и Сертификационни програми
История
Основана е през 1984 г. в Сан Франциско, Калифорния (от където
произлиза името, както и логот на компанията, изобразяващо
известния мост Голдън гейт).
Проектира и продава електроника за потребители, мрежови,
комуникационни и гласови технологии и услуги. Тя е измежду най-
успешните компании за информационни технологии в епохата на
Интернет. Компанията е сред най-големите производители на
телекомуникационни съоръжения в световен мащаб, като голяма част
от маршрутизиращото оборудване, което се използва в Интернет,
днес се произвежда от Cisco.
Сертификационна програма
Сертификационна програма
CCNA- Cisco Certified Network Associate
R&S(ICND1 and ICND2);
Wireless;
Security;
Voice;
Сертификационна програма
CCNP- Cisco Certified Network Professional
R&S;
Wireless;
Security;
Voice;
Сертификационна програма
CCDA- Cisco Certified Design Associate
CCDP- Cisco Certified Design Professional
Защо IT Step?
В IT STEP студентите ще получат по-дълбоки знания в областта на
мрежовите технологии, отколкото предвижда програмата на CCNA;
Преподаватели с практически опит;
Увод
Какво е компютърна мрежа?
Какви са компонентите на една компютърна мрежа?
Ползи и вреди от компютърните мрежи;
CyberCrime
Chapter 1:
Exploring the Network
Introduction to Networks
Chapter 1: Objectives
Students will be able to:
 Explain how multiple networks are used in everyday
life.
 Explain the topologies and devices used in a small to
medium-sized business network.
 Explain the basic characteristics of a network that
supports communication in a small to medium-sized
business.
 Explain trends in networking that will affect the use of
networks in small to medium-sized businesses.
Chapter 1
1.1 Globally Connected
1.2 LANs, WANs, and the Internet
1.3 The Network as a Platform
1.4 The Changing Network Environment
1.5 Summary
Networking Today
Networks in Our Past and Daily Lives
Networking Today
The Global Community
Interconnecting our Lives
Networking impacts in our daily lives
Networks Support the Way We Learn

 Networks Support the Way We Communicate

 Networks Support the Way We Work

 Networks Support the Way We Play
Providing Resources in a Network
Networks of Many Sizes
Providing Resources in a Network
Clients and Servers
Providing Resources in a Network
Peer-to-Peer
LANs, WANs, and Internets
Components of a Network
There are three categories of network components:
 Devices
 Media
 Services
Components of a Network
End Devices
Some examples of end devices are:
 Computers (work stations, laptops, file servers, web servers)
 Network printers
 VoIP phones
 TelePresence endpoint
 Security cameras
 Mobile handheld devices (such as smartphones, tablets,
PDAs, and wireless debit / credit card readers and barcode
scanners)
Components of a Network
Network Infrastructure Devices
Examples of intermediary network devices are:
 Network Access Devices (switches, and wireless access
points)
 Internetworking Devices (routers)
 Security Devices (firewalls)
Components of a Network
Network Media
Components of a Network
Network Representations
Components of a Network
Topology Diagrams
LANs and WANs
Types of Networks
The two most common types of network infrastructures are:
 Local Area Network (LAN)
 Wide Area Network (WAN).
Other types of networks include:
 Metropolitan Area Network (MAN)
 Wireless LAN (WLAN)
 Storage Area Network (SAN)
LANs and WANs
Local Area Networks (LAN)
LANs and WANs
Wide Area Networks (WAN)
LANs, WANs, and Internets
The Internet
The Internet
Intranet and Extranet
LANs, WANs, and Internets
Internet Access Technologies
Connecting to the Internet
Connecting Remote Users to the Internet
Connecting to the Internet
Connecting Businesses to the Internet
Converged Networks
The Converging Network
Converged Networks
Planning for the Future
Reliable Network
Supporting Network Architecture
As networks evolve, we are discovering that there are four
basic characteristics that the underlying architectures need to
address in order to meet user expectations:
 Fault Tolerance
 Scalability
 Quality of Service (QoS)
 Security
Reliable Network
Fault Tolerance in Circuit Switched Network
Reliable Network
Packet-Switched Networks
Reliable Network
Scalable Networks
Reliable Network
Providing (QoS)
Examples of priority decisions for an organization might
include:
 Time-sensitive communication - increase priority for services
like telephony or video distribution.
 Non time-sensitive communication - decrease priority for web
page retrieval or email.
 High importance to organization - increase priority for
production control or business transaction data.
 Undesirable communication - decrease priority or block
unwanted activity, like peer-to-peer file sharing or live
entertainment
Reliable Network
Providing Network Security
Network Trends
New trends
Some of the top trends include:
 Bring Your Own Device (BYOD)
 Online collaboration
 Video
 Cloud computing
Network Trends
Bring Your Own Device (BYOD)
Network Trends
Online Collaboration
Network Trends
Video Communication
Network Trends
Cloud Computing
There are four primary types of clouds:
 Public clouds
 Private clouds
 Custom clouds
 Hybrid clouds
Network Trends
Data Centers
A data center is a facility used to house computer systems and
associated components including:
 Redundant data communications connections
 High-speed virtual servers (sometimes referred to as server
farms or server clusters)
 Redundant storage systems (typically uses SAN technology)
 Redundant or backup power supplies
 Environmental controls (e.g., air conditioning, fire
suppression)
 Security devices
Networking Technologies for the Home
Technology Trends in the Home
Networking Technologies for the Home
Powerline Networking
Networking Technologies for the Home
Wireless Broadband
Future of Networking
Network Security
Network Security
Security Threats
The most common external threats to networks include:
 Viruses, worms, and Trojan horses
 Spyware and adware
 Zero-day attacks, also called zero-hour attacks
 Hacker attacks
 Denial of service attacks
 Data interception and theft
 Identity theft
Network Security
Security Solutions
Network security components often include:
 Antivirus and antispyware
 Firewall filtering
 Dedicated firewall systems
 Access control lists (ACL)
 Intrusion prevention systems (IPS)
 Virtual Private Networks (VPNs)
Network Architectures
Cisco Network Architectures
Exploring the Networking
Summary
In this chapter, you learned:
 Networks and the Internet have changed the way we
communicate, learn, work, and even play.
 Networks come in all sizes. They can range from simple
networks consisting of two computers, to networks
connecting millions of devices.
 The Internet is the largest network in existence. In fact, the
term Internet means a ‘network of networks. The Internet
provides the services that enable us to connect and
communicate with our families, friends, work, and interests.
Exploring the Networking
Summary
In this chapter, you learned:
 The network infrastructure is the platform that supports the
network. It provides the stable and reliable channel over
which communication can occur. It is made up of network
components including end devices, intermediate device, and
network media.
 Networks must be reliable.
 Network security is an integral part of computer networking,
regardless of whether the network is limited to a home
environment with a single connection to the Internet, or as
large as a corporation with thousands of users.
Exploring the Networking
Summary
In this chapter, you learned:
 The network infrastructure can vary greatly in terms of size,
number of users, and number and types of services that are
supported on it. The network infrastructure must grow and
adjust to support the way the network is used. The routing
and switching platform is the foundation of any network
infrastructure.

More Related Content

What's hot

Extended definition
Extended definitionExtended definition
Extended definitiontcassa
 
CSC102 Computer Connectivity
CSC102 Computer ConnectivityCSC102 Computer Connectivity
CSC102 Computer ConnectivityRichard Homa
 
Community Wireless Networks
Community Wireless NetworksCommunity Wireless Networks
Community Wireless Networksdaveph
 
Nad710 Introduction To Networks Using Linux
Nad710   Introduction To Networks Using LinuxNad710   Introduction To Networks Using Linux
Nad710 Introduction To Networks Using Linuxtmavroidis
 
Extended definition
Extended definitionExtended definition
Extended definitiontcassa
 
How to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in DelhiHow to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in DelhiSilicon Univ
 
CSC 103 Networking pt2
CSC 103 Networking pt2CSC 103 Networking pt2
CSC 103 Networking pt2Richard Homa
 
Network protocols
Network protocolsNetwork protocols
Network protocolsIT Tech
 
study about different network devices
study about different network devices study about different network devices
study about different network devices PrabhakarPremUpreti
 
Wireless network Project Class 12
Wireless network Project Class 12Wireless network Project Class 12
Wireless network Project Class 12Rishabh-Rawat
 
5 intro to networking
5 intro to networking5 intro to networking
5 intro to networkingguest0f230cfc
 
5 intro to networking
5 intro to networking5 intro to networking
5 intro to networkingKhan Rahimeen
 
Data communication Networking- Study Networking Equipment
Data communication Networking- Study Networking EquipmentData communication Networking- Study Networking Equipment
Data communication Networking- Study Networking EquipmentShivam Prakash Chaurasia
 
Week 4 introducing network standards
Week 4 introducing network standardsWeek 4 introducing network standards
Week 4 introducing network standardsRobert Almazan
 
Tools, materials and equipment for networking
Tools, materials and equipment for networkingTools, materials and equipment for networking
Tools, materials and equipment for networkingshierly pabello
 

What's hot (20)

Extended definition
Extended definitionExtended definition
Extended definition
 
CSC102 Computer Connectivity
CSC102 Computer ConnectivityCSC102 Computer Connectivity
CSC102 Computer Connectivity
 
Community Wireless Networks
Community Wireless NetworksCommunity Wireless Networks
Community Wireless Networks
 
Networking Basic and Cisco History
Networking Basic and Cisco History Networking Basic and Cisco History
Networking Basic and Cisco History
 
Nad710 Introduction To Networks Using Linux
Nad710   Introduction To Networks Using LinuxNad710   Introduction To Networks Using Linux
Nad710 Introduction To Networks Using Linux
 
Extended definition
Extended definitionExtended definition
Extended definition
 
How to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in DelhiHow to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in Delhi
 
CSC 103 Networking pt2
CSC 103 Networking pt2CSC 103 Networking pt2
CSC 103 Networking pt2
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
study about different network devices
study about different network devices study about different network devices
study about different network devices
 
Networking / Internet and Web Technologies
Networking / Internet and Web TechnologiesNetworking / Internet and Web Technologies
Networking / Internet and Web Technologies
 
Wireless network Project Class 12
Wireless network Project Class 12Wireless network Project Class 12
Wireless network Project Class 12
 
5 intro to networking
5 intro to networking5 intro to networking
5 intro to networking
 
5 intro to networking
5 intro to networking5 intro to networking
5 intro to networking
 
Networks
Networks Networks
Networks
 
01 - networking basics notes
01 - networking basics notes01 - networking basics notes
01 - networking basics notes
 
Data communication Networking- Study Networking Equipment
Data communication Networking- Study Networking EquipmentData communication Networking- Study Networking Equipment
Data communication Networking- Study Networking Equipment
 
Week 4 introducing network standards
Week 4 introducing network standardsWeek 4 introducing network standards
Week 4 introducing network standards
 
Tools, materials and equipment for networking
Tools, materials and equipment for networkingTools, materials and equipment for networking
Tools, materials and equipment for networking
 
Ethernet : Notes
Ethernet : NotesEthernet : Notes
Ethernet : Notes
 

Viewers also liked

56. dram и sram
56. dram  и  sram56. dram  и  sram
56. dram и sramdnaidenowa
 
63.кеш памет
63.кеш памет63.кеш памет
63.кеш паметdnaidenowa
 
53. понятие за памет
53. понятие за памет53. понятие за памет
53. понятие за паметdnaidenowa
 
Иновационни технологични решения за събиране на отпадъци
Иновационни технологични решения за събиране на отпадъциИновационни технологични решения за събиране на отпадъци
Иновационни технологични решения за събиране на отпадъциEcube Labs
 
Курсове по роботика с Arduino 1.0
Курсове по роботика с Arduino 1.0Курсове по роботика с Arduino 1.0
Курсове по роботика с Arduino 1.0Milen Tsolov
 
JavaScript - езикът с много приложения
JavaScript - езикът с много приложенияJavaScript - езикът с много приложения
JavaScript - езикът с много приложенияStefan Krastev
 
компютърна защита
компютърна защитакомпютърна защита
компютърна защитаmarin georgiev
 
Дипломна работа_Управление на вътрешните комуникации по примера на фирма X_Пл...
Дипломна работа_Управление на вътрешните комуникации по примера на фирма X_Пл...Дипломна работа_Управление на вътрешните комуникации по примера на фирма X_Пл...
Дипломна работа_Управление на вътрешните комуникации по примера на фирма X_Пл...Plamen Peychev
 
Аудио-визуална база - система за управление
Аудио-визуална база - система за управлениеАудио-визуална база - система за управление
Аудио-визуална база - система за управлениеNIT- New Internet Technologies PLC
 
Network Security and Network Attacks
Network Security and Network AttacksNetwork Security and Network Attacks
Network Security and Network AttacksSvetlin Nakov
 
Безопасност и защита
Безопасност и защитаБезопасност и защита
Безопасност и защитаFatih Dmrl
 
Presentation Ebrd February 1211
Presentation Ebrd February 1211Presentation Ebrd February 1211
Presentation Ebrd February 1211ilko gruev
 
Стартиране на софтуерен бизнес - пътят от програмата до продукта
Стартиране на софтуерен бизнес - пътят от програмата до продуктаСтартиране на софтуерен бизнес - пътят от програмата до продукта
Стартиране на софтуерен бизнес - пътят от програмата до продуктаNeven Boyanov
 

Viewers also liked (20)

56. dram и sram
56. dram  и  sram56. dram  и  sram
56. dram и sram
 
63.кеш памет
63.кеш памет63.кеш памет
63.кеш памет
 
53. понятие за памет
53. понятие за памет53. понятие за памет
53. понятие за памет
 
Ktt 3st
Ktt 3stKtt 3st
Ktt 3st
 
Иновационни технологични решения за събиране на отпадъци
Иновационни технологични решения за събиране на отпадъциИновационни технологични решения за събиране на отпадъци
Иновационни технологични решения за събиране на отпадъци
 
Курсове по роботика с Arduino 1.0
Курсове по роботика с Arduino 1.0Курсове по роботика с Arduino 1.0
Курсове по роботика с Arduino 1.0
 
JavaScript - езикът с много приложения
JavaScript - езикът с много приложенияJavaScript - езикът с много приложения
JavaScript - езикът с много приложения
 
Java 1 - 5
Java 1 - 5Java 1 - 5
Java 1 - 5
 
компютърна защита
компютърна защитакомпютърна защита
компютърна защита
 
Ccnpv7 routing-ch.8
Ccnpv7 routing-ch.8Ccnpv7 routing-ch.8
Ccnpv7 routing-ch.8
 
Softuni V-Ray seminar
Softuni V-Ray seminarSoftuni V-Ray seminar
Softuni V-Ray seminar
 
Ccnpv7 routing-ch.1
Ccnpv7 routing-ch.1Ccnpv7 routing-ch.1
Ccnpv7 routing-ch.1
 
Дипломна работа_Управление на вътрешните комуникации по примера на фирма X_Пл...
Дипломна работа_Управление на вътрешните комуникации по примера на фирма X_Пл...Дипломна работа_Управление на вътрешните комуникации по примера на фирма X_Пл...
Дипломна работа_Управление на вътрешните комуникации по примера на фирма X_Пл...
 
Аудио-визуална база - система за управление
Аудио-визуална база - система за управлениеАудио-визуална база - система за управление
Аудио-визуална база - система за управление
 
Network Security and Network Attacks
Network Security and Network AttacksNetwork Security and Network Attacks
Network Security and Network Attacks
 
Chap4
Chap4Chap4
Chap4
 
Безопасност и защита
Безопасност и защитаБезопасност и защита
Безопасност и защита
 
Presentation Ebrd February 1211
Presentation Ebrd February 1211Presentation Ebrd February 1211
Presentation Ebrd February 1211
 
Os
OsOs
Os
 
Стартиране на софтуерен бизнес - пътят от програмата до продукта
Стартиране на софтуерен бизнес - пътят от програмата до продуктаСтартиране на софтуерен бизнес - пътят от програмата до продукта
Стартиране на софтуерен бизнес - пътят от програмата до продукта
 

Similar to Cisco Network Fundamentals

Tech Link Company's Profile
Tech Link Company's Profile Tech Link Company's Profile
Tech Link Company's Profile Omar Hussein
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techcheqala5626
 
DevOps Project Training | DevOps Training in Ameerpet.pdf
 DevOps Project Training  |  DevOps Training in Ameerpet.pdf DevOps Project Training  |  DevOps Training in Ameerpet.pdf
DevOps Project Training | DevOps Training in Ameerpet.pdfTalluriRenuka
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentalsheidirobison
 
Ch1-Teknologi Jaringan Komputer-MTK.pptx
Ch1-Teknologi Jaringan Komputer-MTK.pptxCh1-Teknologi Jaringan Komputer-MTK.pptx
Ch1-Teknologi Jaringan Komputer-MTK.pptxssuser8fdeb6
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1TnNguyn57021
 
A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)Tuan Yang
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networkingtsmithnasd
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorialajaymane22
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013 Mark Skilton
 
Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - FerdonSusan Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorialSusan Ferdon
 
CCNA Introduction to Networks Module 1
CCNA Introduction to Networks Module 1CCNA Introduction to Networks Module 1
CCNA Introduction to Networks Module 1AbhayPatidar13
 
ITN_Module_1.pptx
ITN_Module_1.pptxITN_Module_1.pptx
ITN_Module_1.pptxargost1003
 

Similar to Cisco Network Fundamentals (20)

Tech Link Company's Profile
Tech Link Company's Profile Tech Link Company's Profile
Tech Link Company's Profile
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce tech
 
DevOps Project Training | DevOps Training in Ameerpet.pdf
 DevOps Project Training  |  DevOps Training in Ameerpet.pdf DevOps Project Training  |  DevOps Training in Ameerpet.pdf
DevOps Project Training | DevOps Training in Ameerpet.pdf
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
 
Solution
SolutionSolution
Solution
 
Solution
SolutionSolution
Solution
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
 
Ch1-Teknologi Jaringan Komputer-MTK.pptx
Ch1-Teknologi Jaringan Komputer-MTK.pptxCh1-Teknologi Jaringan Komputer-MTK.pptx
Ch1-Teknologi Jaringan Komputer-MTK.pptx
 
Network data
Network dataNetwork data
Network data
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1
 
A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networking
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
Info scince pp
Info scince ppInfo scince pp
Info scince pp
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013
 
Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorial
 
CCNA Introduction to Networks Module 1
CCNA Introduction to Networks Module 1CCNA Introduction to Networks Module 1
CCNA Introduction to Networks Module 1
 
ITN_Module_1.pptx
ITN_Module_1.pptxITN_Module_1.pptx
ITN_Module_1.pptx
 

More from RaynaITSTEP

Project management professional
Project management professionalProject management professional
Project management professionalRaynaITSTEP
 
Project management it step
Project management it stepProject management it step
Project management it stepRaynaITSTEP
 
РАБОТА С ОБЕКТА „ЗАЯВКА“ (2)
РАБОТА С ОБЕКТА „ЗАЯВКА“ (2)РАБОТА С ОБЕКТА „ЗАЯВКА“ (2)
РАБОТА С ОБЕКТА „ЗАЯВКА“ (2)RaynaITSTEP
 
monitoring and diagnostics
monitoring and diagnosticsmonitoring and diagnostics
monitoring and diagnosticsRaynaITSTEP
 
network security
network securitynetwork security
network securityRaynaITSTEP
 
configuring disk sand drivers
configuring disk sand driversconfiguring disk sand drivers
configuring disk sand driversRaynaITSTEP
 
install update and migration to windows 10
install update and migration to windows 10install update and migration to windows 10
install update and migration to windows 10RaynaITSTEP
 
Фотошоп за деца_4
Фотошоп за деца_4Фотошоп за деца_4
Фотошоп за деца_4RaynaITSTEP
 
Структурни кабелни системи
Структурни кабелни системиСтруктурни кабелни системи
Структурни кабелни системиRaynaITSTEP
 
Android introduction
Android introductionAndroid introduction
Android introductionRaynaITSTEP
 
Adobe Illustrator - Урок 2
Adobe Illustrator - Урок 2Adobe Illustrator - Урок 2
Adobe Illustrator - Урок 2RaynaITSTEP
 
Adobe Illustrator - Обобщение
Adobe Illustrator - ОбобщениеAdobe Illustrator - Обобщение
Adobe Illustrator - ОбобщениеRaynaITSTEP
 

More from RaynaITSTEP (20)

Project management professional
Project management professionalProject management professional
Project management professional
 
Project management it step
Project management it stepProject management it step
Project management it step
 
Lean startup
Lean startupLean startup
Lean startup
 
РАБОТА С ОБЕКТА „ЗАЯВКА“ (2)
РАБОТА С ОБЕКТА „ЗАЯВКА“ (2)РАБОТА С ОБЕКТА „ЗАЯВКА“ (2)
РАБОТА С ОБЕКТА „ЗАЯВКА“ (2)
 
DBT_3
DBT_3DBT_3
DBT_3
 
DBT_2
DBT_2DBT_2
DBT_2
 
DBT_1
DBT_1DBT_1
DBT_1
 
monitoring and diagnostics
monitoring and diagnosticsmonitoring and diagnostics
monitoring and diagnostics
 
network security
network securitynetwork security
network security
 
networking
networkingnetworking
networking
 
data security
data securitydata security
data security
 
configuring disk sand drivers
configuring disk sand driversconfiguring disk sand drivers
configuring disk sand drivers
 
boot process
boot process  boot process
boot process
 
install update and migration to windows 10
install update and migration to windows 10install update and migration to windows 10
install update and migration to windows 10
 
virtualization
virtualizationvirtualization
virtualization
 
Фотошоп за деца_4
Фотошоп за деца_4Фотошоп за деца_4
Фотошоп за деца_4
 
Структурни кабелни системи
Структурни кабелни системиСтруктурни кабелни системи
Структурни кабелни системи
 
Android introduction
Android introductionAndroid introduction
Android introduction
 
Adobe Illustrator - Урок 2
Adobe Illustrator - Урок 2Adobe Illustrator - Урок 2
Adobe Illustrator - Урок 2
 
Adobe Illustrator - Обобщение
Adobe Illustrator - ОбобщениеAdobe Illustrator - Обобщение
Adobe Illustrator - Обобщение
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Cisco Network Fundamentals

  • 1. Добре дошли в света на Cisco История и Сертификационни програми
  • 2. История Основана е през 1984 г. в Сан Франциско, Калифорния (от където произлиза името, както и логот на компанията, изобразяващо известния мост Голдън гейт). Проектира и продава електроника за потребители, мрежови, комуникационни и гласови технологии и услуги. Тя е измежду най- успешните компании за информационни технологии в епохата на Интернет. Компанията е сред най-големите производители на телекомуникационни съоръжения в световен мащаб, като голяма част от маршрутизиращото оборудване, което се използва в Интернет, днес се произвежда от Cisco.
  • 4. Сертификационна програма CCNA- Cisco Certified Network Associate R&S(ICND1 and ICND2); Wireless; Security; Voice;
  • 5. Сертификационна програма CCNP- Cisco Certified Network Professional R&S; Wireless; Security; Voice;
  • 6. Сертификационна програма CCDA- Cisco Certified Design Associate CCDP- Cisco Certified Design Professional
  • 7. Защо IT Step? В IT STEP студентите ще получат по-дълбоки знания в областта на мрежовите технологии, отколкото предвижда програмата на CCNA; Преподаватели с практически опит;
  • 8. Увод Какво е компютърна мрежа? Какви са компонентите на една компютърна мрежа? Ползи и вреди от компютърните мрежи; CyberCrime
  • 9. Chapter 1: Exploring the Network Introduction to Networks
  • 10. Chapter 1: Objectives Students will be able to:  Explain how multiple networks are used in everyday life.  Explain the topologies and devices used in a small to medium-sized business network.  Explain the basic characteristics of a network that supports communication in a small to medium-sized business.  Explain trends in networking that will affect the use of networks in small to medium-sized businesses.
  • 11. Chapter 1 1.1 Globally Connected 1.2 LANs, WANs, and the Internet 1.3 The Network as a Platform 1.4 The Changing Network Environment 1.5 Summary
  • 12. Networking Today Networks in Our Past and Daily Lives
  • 14. Interconnecting our Lives Networking impacts in our daily lives Networks Support the Way We Learn   Networks Support the Way We Communicate   Networks Support the Way We Work   Networks Support the Way We Play
  • 15. Providing Resources in a Network Networks of Many Sizes
  • 16. Providing Resources in a Network Clients and Servers
  • 17. Providing Resources in a Network Peer-to-Peer
  • 18. LANs, WANs, and Internets Components of a Network There are three categories of network components:  Devices  Media  Services
  • 19. Components of a Network End Devices Some examples of end devices are:  Computers (work stations, laptops, file servers, web servers)  Network printers  VoIP phones  TelePresence endpoint  Security cameras  Mobile handheld devices (such as smartphones, tablets, PDAs, and wireless debit / credit card readers and barcode scanners)
  • 20. Components of a Network Network Infrastructure Devices Examples of intermediary network devices are:  Network Access Devices (switches, and wireless access points)  Internetworking Devices (routers)  Security Devices (firewalls)
  • 21. Components of a Network Network Media
  • 22. Components of a Network Network Representations
  • 23. Components of a Network Topology Diagrams
  • 24. LANs and WANs Types of Networks The two most common types of network infrastructures are:  Local Area Network (LAN)  Wide Area Network (WAN). Other types of networks include:  Metropolitan Area Network (MAN)  Wireless LAN (WLAN)  Storage Area Network (SAN)
  • 25. LANs and WANs Local Area Networks (LAN)
  • 26. LANs and WANs Wide Area Networks (WAN)
  • 27. LANs, WANs, and Internets The Internet
  • 29. LANs, WANs, and Internets Internet Access Technologies
  • 30. Connecting to the Internet Connecting Remote Users to the Internet
  • 31. Connecting to the Internet Connecting Businesses to the Internet
  • 34. Reliable Network Supporting Network Architecture As networks evolve, we are discovering that there are four basic characteristics that the underlying architectures need to address in order to meet user expectations:  Fault Tolerance  Scalability  Quality of Service (QoS)  Security
  • 35. Reliable Network Fault Tolerance in Circuit Switched Network
  • 38. Reliable Network Providing (QoS) Examples of priority decisions for an organization might include:  Time-sensitive communication - increase priority for services like telephony or video distribution.  Non time-sensitive communication - decrease priority for web page retrieval or email.  High importance to organization - increase priority for production control or business transaction data.  Undesirable communication - decrease priority or block unwanted activity, like peer-to-peer file sharing or live entertainment
  • 40. Network Trends New trends Some of the top trends include:  Bring Your Own Device (BYOD)  Online collaboration  Video  Cloud computing
  • 41. Network Trends Bring Your Own Device (BYOD)
  • 44. Network Trends Cloud Computing There are four primary types of clouds:  Public clouds  Private clouds  Custom clouds  Hybrid clouds
  • 45. Network Trends Data Centers A data center is a facility used to house computer systems and associated components including:  Redundant data communications connections  High-speed virtual servers (sometimes referred to as server farms or server clusters)  Redundant storage systems (typically uses SAN technology)  Redundant or backup power supplies  Environmental controls (e.g., air conditioning, fire suppression)  Security devices
  • 46. Networking Technologies for the Home Technology Trends in the Home
  • 47. Networking Technologies for the Home Powerline Networking
  • 48. Networking Technologies for the Home Wireless Broadband
  • 50. Network Security Security Threats The most common external threats to networks include:  Viruses, worms, and Trojan horses  Spyware and adware  Zero-day attacks, also called zero-hour attacks  Hacker attacks  Denial of service attacks  Data interception and theft  Identity theft
  • 51. Network Security Security Solutions Network security components often include:  Antivirus and antispyware  Firewall filtering  Dedicated firewall systems  Access control lists (ACL)  Intrusion prevention systems (IPS)  Virtual Private Networks (VPNs)
  • 53. Exploring the Networking Summary In this chapter, you learned:  Networks and the Internet have changed the way we communicate, learn, work, and even play.  Networks come in all sizes. They can range from simple networks consisting of two computers, to networks connecting millions of devices.  The Internet is the largest network in existence. In fact, the term Internet means a ‘network of networks. The Internet provides the services that enable us to connect and communicate with our families, friends, work, and interests.
  • 54. Exploring the Networking Summary In this chapter, you learned:  The network infrastructure is the platform that supports the network. It provides the stable and reliable channel over which communication can occur. It is made up of network components including end devices, intermediate device, and network media.  Networks must be reliable.  Network security is an integral part of computer networking, regardless of whether the network is limited to a home environment with a single connection to the Internet, or as large as a corporation with thousands of users.
  • 55. Exploring the Networking Summary In this chapter, you learned:  The network infrastructure can vary greatly in terms of size, number of users, and number and types of services that are supported on it. The network infrastructure must grow and adjust to support the way the network is used. The routing and switching platform is the foundation of any network infrastructure.

Editor's Notes

  1. Cisco Networking Academy program Introduction to Networks Chapter 1: Exploring the Network
  2. Cisco Networking Academy program Introduction to Networks Chapter 1: Exploring the Network
  3. Cisco Networking Academy program Introduction to Networks Chapter 1: Exploring the Network
  4. Cisco Networking Academy program Introduction to Networks Chapter 1: Exploring the Network
  5. Cisco Networking Academy program Introduction to Networks Chapter 1: Exploring the Network
  6. Cisco Networking Academy program Introduction to Networks Chapter 1: Exploring the Network
  7. Cisco Networking Academy program Introduction to Networks Chapter 1: Exploring the Network
  8. Cisco Networking Academy program Introduction to Networks Chapter 1: Exploring the Network
  9. Cisco Networking Academy program Introduction to Networks Chapter 1: Exploring the Network
  10. Chapter 1 Sections
  11. Section 1.1.1.1 & 1.1.1.2
  12. Section 1.1.1.3
  13. Section 1.1.1.4, 1.1.1.5, 1.1.1.6 & 1.1.1.7
  14. Section 1.1.2.1
  15. Section 1.1.2.2 & 1.1.2.3
  16. Section 1.1.2.4
  17. Section 1.2.1.1
  18. Section 1.2.1.2
  19. Section 1.2.1.3
  20. Section 1.2.1.4
  21. Section 1.2.1.5
  22. Section 1.2.1.6
  23. Section 1.2.2.1
  24. Section 1.2.2.2
  25. Section 1.2.2.3
  26. Section 1.2.3 & 1.2.3.1
  27. Section 1.2.3.2
  28. Section 1.2.4.1
  29. Section 1.2.4.2
  30. Section 1.2.4.3
  31. Section 1.3.1.1
  32. Section 1.3.1.2
  33. Section 1.3.2.1
  34. Section 1.3.2.2
  35. Section 1.3.2.3
  36. Section 1.3.2.4
  37. Section 1.3.2.5
  38. Section 1.3.2.6
  39. Section 1.4.1.1
  40. Section 1.4.1.2
  41. Section 1.4.1.3
  42. Section 1.4.1.4
  43. Section 1.4.1.5
  44. Section 1.4.1.6
  45. Section 1.4.2.1
  46. Section 1.4.2.2
  47. Section 1.4.2.3
  48. Section 1.4.3
  49. Section 1.4.3.1
  50. Section 1.4.3.2
  51. Section 1.4.4.1
  52. Section 1.5 & 1.5.1
  53. Section 1.5 & 1.5.1
  54. Section 1.5 & 1.5.1