Suche senden
Hochladen
Itn instructor ppt_chapter1 - exploring the network
•
Als PPTX, PDF herunterladen
•
7 gefällt mir
•
5,886 views
J
joehurst87
Folgen
Chapter 1
Weniger lesen
Mehr lesen
Technologie
Bildung
Melden
Teilen
Melden
Teilen
1 von 49
Jetzt herunterladen
Empfohlen
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
Mukesh Chinta
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
Mukesh Chinta
Visual Cryptography for biometric privacy
Visual Cryptography for biometric privacy
waseem ahmad
Cryptography
Cryptography
Shivanand Arur
Iot forensics
Iot forensics
Abeis Ab
CVSS
CVSS
Christian Heinrich
Network Security Presentation
Network Security Presentation
Allan Pratt MBA
Iso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training course
Mart Rovers
Empfohlen
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
Mukesh Chinta
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
Mukesh Chinta
Visual Cryptography for biometric privacy
Visual Cryptography for biometric privacy
waseem ahmad
Cryptography
Cryptography
Shivanand Arur
Iot forensics
Iot forensics
Abeis Ab
CVSS
CVSS
Christian Heinrich
Network Security Presentation
Network Security Presentation
Allan Pratt MBA
Iso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training course
Mart Rovers
Ethical Hacking
Ethical Hacking
DEEPIKA WALIA
Internet of Things Forensics
Internet of Things Forensics
Aakashjit Bhattacharya
Introduction of Arduino Uno
Introduction of Arduino Uno
Md. Nahidul Islam
Ethical Hacking
Ethical Hacking
Aditya Vikram Singhania
computer forensics
computer forensics
shivi123456
Ethical hacking
Ethical hacking
Altacit Global
Network Security Risk
Network Security Risk
Dedi Dwianto
Cybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
Tam Nguyen
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
Edureka!
pgp s mime
pgp s mime
Chirag Patel
IOT Forensic Challenges
IOT Forensic Challenges
AnukaJinadasa
Fileless Malware [Cyber Security]
Fileless Malware [Cyber Security]
sumit saurav
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour
Vijay Dalmia
Introduction to Information Security
Introduction to Information Security
Dr. Loganathan R
Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7
Mukesh Chinta
Cyber attacks
Cyber attacks
Anuradha Moti T
Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3
Dr. Ahmed Al Zaidy
Fundamentals of Network security
Fundamentals of Network security
APNIC
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
Vuz Dở Hơi
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
Mukesh Chinta
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2
Nil Menon
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskills
Tiago Monteiro
Weitere ähnliche Inhalte
Was ist angesagt?
Ethical Hacking
Ethical Hacking
DEEPIKA WALIA
Internet of Things Forensics
Internet of Things Forensics
Aakashjit Bhattacharya
Introduction of Arduino Uno
Introduction of Arduino Uno
Md. Nahidul Islam
Ethical Hacking
Ethical Hacking
Aditya Vikram Singhania
computer forensics
computer forensics
shivi123456
Ethical hacking
Ethical hacking
Altacit Global
Network Security Risk
Network Security Risk
Dedi Dwianto
Cybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
Tam Nguyen
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
Edureka!
pgp s mime
pgp s mime
Chirag Patel
IOT Forensic Challenges
IOT Forensic Challenges
AnukaJinadasa
Fileless Malware [Cyber Security]
Fileless Malware [Cyber Security]
sumit saurav
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour
Vijay Dalmia
Introduction to Information Security
Introduction to Information Security
Dr. Loganathan R
Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7
Mukesh Chinta
Cyber attacks
Cyber attacks
Anuradha Moti T
Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3
Dr. Ahmed Al Zaidy
Fundamentals of Network security
Fundamentals of Network security
APNIC
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
Vuz Dở Hơi
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
Mukesh Chinta
Was ist angesagt?
(20)
Ethical Hacking
Ethical Hacking
Internet of Things Forensics
Internet of Things Forensics
Introduction of Arduino Uno
Introduction of Arduino Uno
Ethical Hacking
Ethical Hacking
computer forensics
computer forensics
Ethical hacking
Ethical hacking
Network Security Risk
Network Security Risk
Cybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
pgp s mime
pgp s mime
IOT Forensic Challenges
IOT Forensic Challenges
Fileless Malware [Cyber Security]
Fileless Malware [Cyber Security]
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour
Introduction to Information Security
Introduction to Information Security
Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7
Cyber attacks
Cyber attacks
Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3
Fundamentals of Network security
Fundamentals of Network security
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
Andere mochten auch
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2
Nil Menon
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskills
Tiago Monteiro
Itn instructor ppt_chapter5
Itn instructor ppt_chapter5
Cesar Aguirre
Network infrastructure - TCP/IP
Network infrastructure - TCP/IP
raymondkao
Fault tolerance in distributed systems
Fault tolerance in distributed systems
sumitjain2013
Network access protection ppt
Network access protection ppt
Dasarathi Dash
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
Tarun Khaneja
Distributed Systems: scalability and high availability
Distributed Systems: scalability and high availability
Renato Lucindo
Andere mochten auch
(8)
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter5
Itn instructor ppt_chapter5
Network infrastructure - TCP/IP
Network infrastructure - TCP/IP
Fault tolerance in distributed systems
Fault tolerance in distributed systems
Network access protection ppt
Network access protection ppt
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
Distributed Systems: scalability and high availability
Distributed Systems: scalability and high availability
Ähnlich wie Itn instructor ppt_chapter1 - exploring the network
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
sirajmohammed35
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
AbdisayidkhalifTahir
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
Irsandi Hasan
Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1
Hamza Malik
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
Nil Menon
Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02
Mustapha Kohili
Chapter 1 : Exploring the Network
Chapter 1 : Exploring the Network
teknetir
Chapter 01 - Exploring the Network
Chapter 01 - Exploring the Network
Yaser Rahmati
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
Irsandi Hasan
Chapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptx
KennedyRodriguez10
Ccna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mme
United International University
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A Network
Vuz Dở Hơi
Chapter 11 : It’s a network
Chapter 11 : It’s a network
teknetir
Chapter 11 - It’s a Network
Chapter 11 - It’s a Network
Yaser Rahmati
ccna1_v5_capitulo1
ccna1_v5_capitulo1
Luda Starodub
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
Nil Menon
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
Irsandi Hasan
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
Irsandi Hasan
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11
Hamza Malik
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
Irsandi Hasan
Ähnlich wie Itn instructor ppt_chapter1 - exploring the network
(20)
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02
Chapter 1 : Exploring the Network
Chapter 1 : Exploring the Network
Chapter 01 - Exploring the Network
Chapter 01 - Exploring the Network
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
Chapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptx
Ccna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mme
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A Network
Chapter 11 : It’s a network
Chapter 11 : It’s a network
Chapter 11 - It’s a Network
Chapter 11 - It’s a Network
ccna1_v5_capitulo1
ccna1_v5_capitulo1
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
Kürzlich hochgeladen
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Dubai Multi Commodity Centre
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Mattias Andersson
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
ScyllaDB
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Fwdays
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Florian Wilhelm
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Wonjun Hwang
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
comworks
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
RankYa
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
Alfredo García Lavilla
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Scott Keck-Warren
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Miki Katsuragi
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Addepto
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Padma Pradeep
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
Enterprise Knowledge
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Safe Software
Kürzlich hochgeladen
(20)
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Itn instructor ppt_chapter1 - exploring the network
1.
Chapter 1: Exploring the
Network Introduction to Networks Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
2.
Chapter 1: Objectives Students
will be able to: Explain how multiple networks are used in everyday life. Explain the topologies and devices used in a small to medium-sized business network. Explain the basic characteristics of a network that supports communication in a small to medium-sized business. Explain trends in networking that will affect the use of networks in small to medium-sized businesses. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
3.
Chapter 1 1.1 Globally
Connected 1.2 LANs, WANs, and the Internet 1.3 The Network as a Platform 1.4 The Changing Network Environment 1.5 Summary Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
4.
Networking Today Networks in
Our Past and Daily Lives Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
5.
Networking Today The Global
Community Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
6.
Interconnecting our Lives Networking
impacts in our daily lives Networks Support the Way We Learn Networks Support the Way We Communicate Networks Support the Way We Work Networks Support the Way We Play Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
7.
Providing Resources in
a Network Networks of Many Sizes Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
8.
Providing Resources in
a Network Clients and Servers Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
9.
Providing Resources in
a Network Peer-to-Peer Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
10.
LANs, WANs, and
Internets Components of a Network There are three categories of network components: Devices Media Services Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
11.
Components of a
Network End Devices Some examples of end devices are: Computers (work stations, laptops, file servers, web servers) Network printers VoIP phones TelePresence endpoint Security cameras Mobile handheld devices (such as smartphones, tablets, PDAs, and wireless debit / credit card readers and barcode scanners) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
12.
Components of a
Network Network Infrastructure Devices Examples of intermediary network devices are: Network Access Devices (switches, and wireless access points) Internetworking Devices (routers) Security Devices (firewalls) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
13.
Components of a
Network Network Media Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
14.
Components of a
Network Network Representations Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
15.
Components of a
Network Topology Diagrams Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
16.
LANs and WANs Types
of Networks The two most common types of network infrastructures are: Local Area Network (LAN) Wide Area Network (WAN). Other types of networks include: Metropolitan Area Network (MAN) Wireless LAN (WLAN) Storage Area Network (SAN) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
17.
LANs and WANs Local
Area Networks (LAN) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
18.
LANs and WANs Wide
Area Networks (WAN) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
19.
LANs, WANs, and
Internets The Internet Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
20.
The Internet Intranet and
Extranet Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
21.
LANs, WANs, and
Internets Internet Access Technologies Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
22.
Connecting to the
Internet Connecting Remote Users to the Internet Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
23.
Connecting to the
Internet Connecting Businesses to the Internet Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
24.
Converged Networks The Converging
Network Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
25.
Converged Networks Planning for
the Future Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
26.
Reliable Network Supporting Network
Architecture As networks evolve, we are discovering that there are four basic characteristics that the underlying architectures need to address in order to meet user expectations: Fault Tolerance Scalability Quality of Service (QoS) Security Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
27.
Reliable Network Fault Tolerance
in Circuit Switched Network Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
28.
Reliable Network Packet-Switched Networks Presentation_ID ©
2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
29.
Reliable Network Scalable Networks Presentation_ID ©
2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
30.
Reliable Network Providing (QoS) Examples
of priority decisions for an organization might include: Time-sensitive communication - increase priority for services like telephony or video distribution. Non time-sensitive communication - decrease priority for web page retrieval or email. High importance to organization - increase priority for production control or business transaction data. Undesirable communication - decrease priority or block unwanted activity, like peer-to-peer file sharing or live entertainment Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
31.
Reliable Network Providing Network
Security Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
32.
Network Trends New trends Some
of the top trends include: Bring Your Own Device (BYOD) Online collaboration Video Cloud computing Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
33.
Network Trends Bring Your
Own Device (BYOD) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
34.
Network Trends Online Collaboration Presentation_ID ©
2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
35.
Network Trends Video Communication Presentation_ID ©
2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
36.
Network Trends Cloud Computing There
are four primary types of clouds: Public clouds Private clouds Custom clouds Hybrid clouds Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
37.
Network Trends Data Centers A
data center is a facility used to house computer systems and associated components including: Redundant data communications connections High-speed virtual servers (sometimes referred to as server farms or server clusters) Redundant storage systems (typically uses SAN technology) Redundant or backup power supplies Environmental controls (e.g., air conditioning, fire suppression) Security devices Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
38.
Networking Technologies for
the Home Technology Trends in the Home Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
39.
Networking Technologies for
the Home Powerline Networking Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
40.
Networking Technologies for
the Home Wireless Broadband Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
41.
Future of Networking Network
Security Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
42.
Network Security Security Threats The
most common external threats to networks include: Viruses, worms, and Trojan horses Spyware and adware Zero-day attacks, also called zero-hour attacks Hacker attacks Denial of service attacks Data interception and theft Identity theft Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
43.
Network Security Security Solutions Network
security components often include: Antivirus and antispyware Firewall filtering Dedicated firewall systems Access control lists (ACL) Intrusion prevention systems (IPS) Virtual Private Networks (VPNs) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
44.
Network Architectures Cisco Network
Architectures Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
45.
Network Architectures Cisco Certified
Network Associate (CCNA) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
46.
Exploring the Networking Summary In
this chapter, you learned: Networks and the Internet have changed the way we communicate, learn, work, and even play. Networks come in all sizes. They can range from simple networks consisting of two computers, to networks connecting millions of devices. The Internet is the largest network in existence. In fact, the term Internet means a ‘network of networks. The Internet provides the services that enable us to connect and communicate with our families, friends, work, and interests. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
47.
Exploring the Networking Summary In
this chapter, you learned: The network infrastructure is the platform that supports the network. It provides the stable and reliable channel over which communication can occur. It is made up of network components including end devices, intermediate device, and network media. Networks must be reliable. Network security is an integral part of computer networking, regardless of whether the network is limited to a home environment with a single connection to the Internet, or as large as a corporation with thousands of users. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
48.
Exploring the Networking Summary In
this chapter, you learned: The network infrastructure can vary greatly in terms of size, number of users, and number and types of services that are supported on it. The network infrastructure must grow and adjust to support the way the network is used. The routing and switching platform is the foundation of any network infrastructure. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
49.
Presentation_ID © 2008 Cisco
Systems, Inc. All rights reserved. Cisco Confidential 49
Jetzt herunterladen