SlideShare a Scribd company logo
COMPUTERS IN
OUR DAILY LIFE
The computer has brought about a
quantum leap in our daily life, and
dependence on computer has
increased to occupy an essential
position in every home and every
company. All transactions in various
fields have been shifted to be
digitalized or to be electronic, as
education depends on computers and
technological development to improve
its performance and results, as well as
health fields and other fields.
Computer has become one of the most
important sources of knowledge, as
the computer is connected to the
Internet and browsing all sources of
science and knowledge, whether
written, audio or visual, and they can
be downloaded onto the computer and
find it at any time. The current century
is the age of information revolution, as
the computer has turned into a basic
element of life for humans.
Benefits of Mobile
Applications in the
Everyday Life
2.1 Apps: Their relevance to day-today activities
Applications have made the lives easiest, always there for the rescue to save time, effort, and dependencies.
You want a few transactions; financial apps save you from the bank visit. In need of groceries, an app lets you
shop from home and get everything to your door.
Several segments have successfully launched applications and are looking forward to the betterment and
advancements. Here are a few subjects that made mobile applications the best thing.
• Communication
• Cooking
• Trivia
• Learning
• Entertainment
• Social Media
• Shopping
• Finance and Stocks Related
• Matrimony
And many more!
Some of the advantages that people opt for apps are:
• There are lots of apps focused on productivity like educational apps, exploring informative apps
that sharpen your skills and explore your interests.
• There are applications that make communication easiest. Voice calls, video calls, texting, and
conference calls give access to the connection with people in any corner of the world, all with a
mobile app.
• It ensures comfort to a greater extent. The convenience of shopping, selling, surveying, etc. It
eliminates the long queue waiting for ticket booking and gets a taxi at the doorsteps.
• Making and spending money is also made easiest with mobile applications with full security. It can
get you a loan, count interest, list you the finest policies, and pick for you the most financially
viable firms and other imperative data.
• We cannot miss out on an important idea – the idea of super apps. All the mentioned above welfare
or most of them when served right just with a single app, it’s a bunch of conveniences. There has
been a certain rise in the super apps for this reason and some more.
Applications have tremendously made life painless. Knowing the purpose and the exact way to use it
can serve utter satisfaction and the belonging experience. We are summing up these points for now
though there are rational reasons for the same.
The foundations of
networking: switches,
routers, and wireless
access points
Switches, routers, and wireless access points are the essential networking basics.
Through them, devices connected to your network can communicate with one
another and with other networks, like the Internet. Switches, routers, and wireless
access points perform very different functions in a network.
Switches allow devices on your network to
communicate with each other, as well as with
other networks, creating a network of shared
resources. Through information sharing and
resource allocation, switches save money and
increase productivity.
• A managed on-premises switch lets you
configure and monitor your LAN, giving
you tighter control of your network
traffic.
• Have a small IT team? A cloud-managed
switch can simplify your network
management. You get a simple user
interface, multisite full-stack
management, and automatic updates
delivered directly to the switch.
Routers connect multiple networks together. They also connect computers
on those networks to the Internet. Routers enable all networked computers to
share a single Internet connection, which saves money.
A router acts a dispatcher. It analyzes data being sent across a network,
chooses the best route for data to travel, and sends it on its way.
Routers connect your business to the world, protect information from security
threats, and can even decide which computers receive priority over others.
Beyond those basic networking functions, routers come with additional
features to make networking easier or more secure. Depending on your
security needs, for example, you can choose a router with a firewall, a
virtual private network (VPN), or an Internet Protocol (IP) communications
system.
ROUTERS
Access Points
An access point allows devices to connect to the wireless network without cables.
A wireless network makes it easy to bring new devices online and provides flexible
support to mobile workers.
An access point acts like an amplifier for your network. While a router
provides the bandwidth, an access point extends that bandwidth so
that the network can support many devices, and those devices can
access the network from farther away.
But an access point does more than simply extend Wi-Fi. It can also
give useful data about the devices on the network, provide proactive
security, and serve many other practical purposes.
Access points support different IEEE standards. Each standard is an
amendment that was ratified over time. The standards operate on
varying frequencies, deliver different bandwidth, and support
different numbers of channels.
WIRELESS NETWORKING
To create your wireless network, you can choose between three types of
deployment: centralized deployment, converged deployment, and cloud-based
deployment.
1. Centralized deployment
The most common type of wireless network system, centralized
deployments are traditionally used in campuses where buildings and
networks are in close proximity. This deployment consolidates the
wireless network, which makes upgrades easier and facilitates
advanced wireless functionality. Controllers are based on-premises
and are installed in a centralized location.
2. Converged deployment
For small campuses or branch offices, converged deployments offer
consistency in wireless and wired connections. This deployment
converges wired and wireless on one network device—an access
switch—and performs the dual role of both switch and wireless
controller.
3. Cloud-based deployment
This system uses the cloud to manage network devices deployed on-
premises at different locations. The solution requires Cisco Meraki
cloud-managed devices, which provide full visibility of the network
through their dashboards.
Do you have
any questions?
QUIZ
TIME!!!

More Related Content

Similar to Technology in Education Technology Presentation in Blue Peach Illustrative Style.pptx

1- Mobile Computing Introduction.pptx
1- Mobile Computing Introduction.pptx1- Mobile Computing Introduction.pptx
1- Mobile Computing Introduction.pptx
AMITKUMARSINGH756828
 
Mobile Computing and Application 2.pptx
Mobile Computing and Application 2.pptxMobile Computing and Application 2.pptx
Mobile Computing and Application 2.pptx
DiptimayeeTripathy1
 
computer network technology in modern universe.
computer network technology in modern universe.        computer network technology in modern universe.
computer network technology in modern universe.
ShohanaakterKakon
 
Advantages Of Wireless Network Installation In Dubai.pdf
Advantages Of Wireless Network Installation In Dubai.pdfAdvantages Of Wireless Network Installation In Dubai.pdf
Advantages Of Wireless Network Installation In Dubai.pdf
libertyuae uae
 
Visualizing Your Network Health
Visualizing Your Network HealthVisualizing Your Network Health
Visualizing Your Network HealthDellNMS
 
Visualizing your Network Health
Visualizing your Network HealthVisualizing your Network Health
Visualizing your Network HealthDellNMS
 
Internet of Things, Examples and Issues
Internet of Things, Examples and IssuesInternet of Things, Examples and Issues
Internet of Things, Examples and Issues
IRJET Journal
 
Mobile com 21 3 2020
Mobile com 21 3 2020Mobile com 21 3 2020
Mobile com 21 3 2020
Dr. MAMTA BANSAL
 
EmergingTrend.pdf
EmergingTrend.pdfEmergingTrend.pdf
EmergingTrend.pdf
Vennimalai N
 
Basics of telecommunication and networking
Basics of telecommunication and networkingBasics of telecommunication and networking
Basics of telecommunication and networking
Milan Padariya
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it used
AsyathShahina
 
Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subject
AnneilynLeal
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Rishabh Gupta
 
Ericsson: Latam Insights - We Enable Change-Makers
Ericsson: Latam Insights - We Enable Change-MakersEricsson: Latam Insights - We Enable Change-Makers
Ericsson: Latam Insights - We Enable Change-Makers
Ericsson Latin America
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
reneznet105
 
iot monitoring
iot monitoringiot monitoring

Similar to Technology in Education Technology Presentation in Blue Peach Illustrative Style.pptx (19)

1- Mobile Computing Introduction.pptx
1- Mobile Computing Introduction.pptx1- Mobile Computing Introduction.pptx
1- Mobile Computing Introduction.pptx
 
Mobile Computing and Application 2.pptx
Mobile Computing and Application 2.pptxMobile Computing and Application 2.pptx
Mobile Computing and Application 2.pptx
 
computer network technology in modern universe.
computer network technology in modern universe.        computer network technology in modern universe.
computer network technology in modern universe.
 
Advantages Of Wireless Network Installation In Dubai.pdf
Advantages Of Wireless Network Installation In Dubai.pdfAdvantages Of Wireless Network Installation In Dubai.pdf
Advantages Of Wireless Network Installation In Dubai.pdf
 
Visualizing Your Network Health
Visualizing Your Network HealthVisualizing Your Network Health
Visualizing Your Network Health
 
Visualizing your Network Health
Visualizing your Network HealthVisualizing your Network Health
Visualizing your Network Health
 
Internet of Things, Examples and Issues
Internet of Things, Examples and IssuesInternet of Things, Examples and Issues
Internet of Things, Examples and Issues
 
Mobile com 21 3 2020
Mobile com 21 3 2020Mobile com 21 3 2020
Mobile com 21 3 2020
 
Notacd051
Notacd051Notacd051
Notacd051
 
EmergingTrend.pdf
EmergingTrend.pdfEmergingTrend.pdf
EmergingTrend.pdf
 
Basics of telecommunication and networking
Basics of telecommunication and networkingBasics of telecommunication and networking
Basics of telecommunication and networking
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it used
 
La3 compnet notes
La3 compnet notesLa3 compnet notes
La3 compnet notes
 
Notacd05
Notacd05Notacd05
Notacd05
 
Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subject
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Ericsson: Latam Insights - We Enable Change-Makers
Ericsson: Latam Insights - We Enable Change-MakersEricsson: Latam Insights - We Enable Change-Makers
Ericsson: Latam Insights - We Enable Change-Makers
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
iot monitoring
iot monitoringiot monitoring
iot monitoring
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Technology in Education Technology Presentation in Blue Peach Illustrative Style.pptx

  • 2. The computer has brought about a quantum leap in our daily life, and dependence on computer has increased to occupy an essential position in every home and every company. All transactions in various fields have been shifted to be digitalized or to be electronic, as education depends on computers and technological development to improve its performance and results, as well as health fields and other fields.
  • 3. Computer has become one of the most important sources of knowledge, as the computer is connected to the Internet and browsing all sources of science and knowledge, whether written, audio or visual, and they can be downloaded onto the computer and find it at any time. The current century is the age of information revolution, as the computer has turned into a basic element of life for humans.
  • 4. Benefits of Mobile Applications in the Everyday Life 2.1 Apps: Their relevance to day-today activities
  • 5. Applications have made the lives easiest, always there for the rescue to save time, effort, and dependencies. You want a few transactions; financial apps save you from the bank visit. In need of groceries, an app lets you shop from home and get everything to your door. Several segments have successfully launched applications and are looking forward to the betterment and advancements. Here are a few subjects that made mobile applications the best thing. • Communication • Cooking • Trivia • Learning • Entertainment • Social Media • Shopping • Finance and Stocks Related • Matrimony And many more!
  • 6. Some of the advantages that people opt for apps are: • There are lots of apps focused on productivity like educational apps, exploring informative apps that sharpen your skills and explore your interests. • There are applications that make communication easiest. Voice calls, video calls, texting, and conference calls give access to the connection with people in any corner of the world, all with a mobile app. • It ensures comfort to a greater extent. The convenience of shopping, selling, surveying, etc. It eliminates the long queue waiting for ticket booking and gets a taxi at the doorsteps. • Making and spending money is also made easiest with mobile applications with full security. It can get you a loan, count interest, list you the finest policies, and pick for you the most financially viable firms and other imperative data. • We cannot miss out on an important idea – the idea of super apps. All the mentioned above welfare or most of them when served right just with a single app, it’s a bunch of conveniences. There has been a certain rise in the super apps for this reason and some more. Applications have tremendously made life painless. Knowing the purpose and the exact way to use it can serve utter satisfaction and the belonging experience. We are summing up these points for now though there are rational reasons for the same.
  • 7. The foundations of networking: switches, routers, and wireless access points
  • 8. Switches, routers, and wireless access points are the essential networking basics. Through them, devices connected to your network can communicate with one another and with other networks, like the Internet. Switches, routers, and wireless access points perform very different functions in a network. Switches allow devices on your network to communicate with each other, as well as with other networks, creating a network of shared resources. Through information sharing and resource allocation, switches save money and increase productivity.
  • 9. • A managed on-premises switch lets you configure and monitor your LAN, giving you tighter control of your network traffic. • Have a small IT team? A cloud-managed switch can simplify your network management. You get a simple user interface, multisite full-stack management, and automatic updates delivered directly to the switch.
  • 10. Routers connect multiple networks together. They also connect computers on those networks to the Internet. Routers enable all networked computers to share a single Internet connection, which saves money. A router acts a dispatcher. It analyzes data being sent across a network, chooses the best route for data to travel, and sends it on its way. Routers connect your business to the world, protect information from security threats, and can even decide which computers receive priority over others. Beyond those basic networking functions, routers come with additional features to make networking easier or more secure. Depending on your security needs, for example, you can choose a router with a firewall, a virtual private network (VPN), or an Internet Protocol (IP) communications system. ROUTERS
  • 11. Access Points An access point allows devices to connect to the wireless network without cables. A wireless network makes it easy to bring new devices online and provides flexible support to mobile workers. An access point acts like an amplifier for your network. While a router provides the bandwidth, an access point extends that bandwidth so that the network can support many devices, and those devices can access the network from farther away. But an access point does more than simply extend Wi-Fi. It can also give useful data about the devices on the network, provide proactive security, and serve many other practical purposes. Access points support different IEEE standards. Each standard is an amendment that was ratified over time. The standards operate on varying frequencies, deliver different bandwidth, and support different numbers of channels.
  • 12. WIRELESS NETWORKING To create your wireless network, you can choose between three types of deployment: centralized deployment, converged deployment, and cloud-based deployment. 1. Centralized deployment The most common type of wireless network system, centralized deployments are traditionally used in campuses where buildings and networks are in close proximity. This deployment consolidates the wireless network, which makes upgrades easier and facilitates advanced wireless functionality. Controllers are based on-premises and are installed in a centralized location.
  • 13. 2. Converged deployment For small campuses or branch offices, converged deployments offer consistency in wireless and wired connections. This deployment converges wired and wireless on one network device—an access switch—and performs the dual role of both switch and wireless controller. 3. Cloud-based deployment This system uses the cloud to manage network devices deployed on- premises at different locations. The solution requires Cisco Meraki cloud-managed devices, which provide full visibility of the network through their dashboards.
  • 14. Do you have any questions?