CCNA 1 v6 Instructor Material – Chapter 1: Explore the Network

CCNA Routing and Switching Introduction to Networks v6.0

1.1 Globally Connected

Networking Today

CCNA 1 v6 Instructor Material - Chapter 1: Explore the Network 16
Network has no boundary and supports the way we:

  • Learn
  • Communicate
  • Work
  • Play

Providing Resources in a Network

  • Networks of Many Sizes
    • Small Home / Office Networks
    • Medium to Large Networks
    • World Wide Network
  • Clients and Servers
  • Clients request and display inf
      ormation

    • Servers provide information to other devices on the network CCNA 1 v6 Instructor Material - Chapter 1: Explore the Network 17
    • Peer-to-Peer
    • Computers can be both server and client at the same time.
    • What are the advantages?
    • What are the disadvantages?
  • 1.2 LANs, WANs, and the Internet

    LANs, WANs, and the Internet Network Components

    CCNA 1 v6 Instructor Material - Chapter 1: Explore the Network 18

    1. End Devices
      • Either the source or destination of a message
      • Name some end devices
    2. Intermediary Network Devices
      • Connect multiple individual networks to form an internetwork
      • Connect the individual end devices to the network
      • Ensure data flows across the network
      • Provide connectivity
    3. Network Media
      • Provide the pathway for data transmission
      • Interconnect devices
      • Name the three types of media
    LANs, WANs, and the Internet Network Components
      1. Network Representations

    What do the symbols represent?

    1. Topology Diagrams
      • Physical
      • Logical
    LANs, WANs, and the Internet LANs and WANs

    CCNA 1 v6 Instructor Material - Chapter 1: Explore the Network 19

      1. Local Area Networks

    Spans across small geographical area
    Interconnects end devices
    Administrated by a single organization
    Provide high speed bandwidth to internal devices

      1. WAN Area Networks

    Interconnects LAN
    Administrated by multiple service providers
    Provide slower speed links between LANS

    1. Can you name more network types?
    LANs, WANs, and the Internet The Internet, Intranets, and Extranets
    1. The Internet
      • Worldwide collection of interconnected networks
      • Not owned by any individual or group
    2. Intranets and Extranets
    CCNA 1 v6 Instructor Material - Chapter 1: Explore the Network 20
    CCNA 1 v6 Instructor Material - Chapter 1: Explore the Network 21
    LANs, WANs, and the Internet Internet Connections
    1. Internet Access Technologies
      • Internet Service Provider (ISP)
      • Broadband cable
      • Broadband Digital Subscriber Line (DSL)
      • Wireless WANs
      • Mobile Services
      • Business DSL
      • Leased Lines
      • Metro Ethernet
    2. Types of Internet Connections
      • Home and Small Office
      • Business

    1.3 The Network as a Platform CCNA 1 v6 Instructor Material - Chapter 1: Explore the Network 22

    The Network as a Platform Converged Networks
      1. Traditional Separate Networks

    Each network with its own rules and

      1. The Converging Network

    Capable of delivering data, voice, and video over the same network infrastructure

    The Network as a Platform Reliable Network

    CCNA 1 v6 Instructor Material - Chapter 1: Explore the Network 23

    Four Basic Characteristics of Network Architecture

    1. Fault Tolerance
    2. Scalability
    3. Quality of Service (QoS)
    4. Security

    1.4 The Changing Network Environment

    Picture9.pngCCNA 1 v6 Instructor Material - Chapter 1: Explore the Network 24

    Top trends include:

    • Bring Your Own Device (BYOB)
    • Online Collaboration
    • Video Communications
    • Cloud Computing
    The Changing Network Environment Networking Technologies for the Home
      1. Technology Trends in the Home CCNA 1 v6 Instructor Material - Chapter 1: Explore the Network 25

    Smart home

      1. Powerline Networking

    Uses existing electrical wiring to connect devices

    1. Wireless Broadband CCNA 1 v6 Instructor Material - Chapter 1: Explore the Network 26
      • Wireless Internet Service Provider (WISP)
      • Wireless Broadband Service using cellular technology

     

     

    The Changing Network Environment Network Security

    CCNA 1 v6 Instructor Material - Chapter 1: Explore the Network 27

    1. Security Threats
      • Viruses, worms, and Trojan horses
      • Spyware and adware
      • Zero-day attacks, also called zero-hour attacks
      • Hacker attacks
      • Denial of service attacks
      • Data interception and theft
      • Identity theft
    2. Security Solutions CCNA 1 v6 Instructor Material - Chapter 1: Explore the Network 28
      • Antivirus and antispyware
      • Firewall filtering
      • Dedicated firewall systems
      • Access control lists (ACL)
      • Intrusion prevention systems (IPS)
      • Virtual Private Networks (VPNs)
    The Changing Network Environment Network Architecture
      1. Cisco Network Architecture
        • Support technologies and applications
        • Ensure connectivity across any combination of networks
      2. CCNA

    A first step to a networking career

    CCNA 1 v6 Instructor Material - Chapter 1: Explore the Network 29
    CCNA 1 v6 Instructor Material - Chapter 1: Explore the Network 30

    1.5 Chapter Summary

    Chapter Summary Summary
    1. Explain how multiple networks are used in everyday life.
    2. Describe the topologies and devices used in a small to medium-sized business network.
    3. Explain the basic characteristics of a network that supports communication in a small to medium-sized business.
    4. Explain trends in networking that will affect the use of networks in small to medium-sized businesses.

    Section 1.1 New Terms and Commands

    1. client
    2. collaborative learning spaces
    3. global communities
    4. human network
    5. network collaboration services
    6. network of networks
    7. peer-to-peer network
    8. server

    Section 1.2 New Terms and Commands

    1. broadband DSL
    2. business DSL
    3. cable
    4. cellular
    5. dedicated leased line
    6. dial-up telephone
    7. DSL
    8. end devices
    9. extranet
    10. hardware
    11. intermediary devices
    12. internetworking devices
    13. Internet Service Provider (ISP)

    1. Intranet
    2. leased lines
    3. Local Area Network (LAN)
    4. logical topology diagrams
    5. medium
    6. Metropolitan Area Network (MAN)
    7. metro Ethernet
    8. network access devices
    9. network interface card (NIC)
    10. network media
    11. physical port, interface

    1. physical topology diagrams
    2. satellite
    3. security devices
    4. service provider (SP)
    5. software
    6. Storage Area Network (SAN)
    7. TelePresence endpoint
    8. teleworkers
    9. topology diagram
    10. VoIP phones
    11. Wide Area Network (WAN)
    12. Wireless LAN (WLAN)

    Section 1.3 New Terms and Commands

    1. availability
    2. circuit switched networks
    3. content security
    4. converged network
    5. data confidentiality
    6. data integrity
    7. delay
    8. Denial of Service (DoS)
    9. encrypting data

    1. fault tolerance
    2. hierarchical layered structure
    3. intelligent information network
    4. network architecture
    5. network bandwidth
    6. network congestion
    7. network infrastructure security

    1. packet loss
    2. packet switched networks
    3. packets
    4. Quality of Service (QoS)
    5. queue
    6. redundancy
    7. routing function
    8. scalability
    9. user authentication

    Section 1.4 New Terms and Commands

    1. access control lists (ACL)
    2. adware
    3. Bring Your Own Deice (BYOD)
    4. cloud computing
    5. data centers
    6. data interception and theft
    7. hacker attacks
    8. identity theft
    9. intrusion prevention systems (IPS)

    1. multiple layers of security
    2. multitasking
    3. online collaboration
    4. person-to-person video calling
    5. powerline networking
    6. server clusters
    7. server farms
    8. smart home technology
    9. spyware
    10. Trojan horses

    1. video conferencing
    2. virtual private networks (VPNs)
    3. virtualization
    4. viruses
    5. wireless broadband service
    6. wireless internet service provider (WISP)
    7. wireless local area networks (WLAN)
    8. worms
    9. zero-day attacks

    Subscribe
    Notify of
    guest

    0 Comments
    Inline Feedbacks
    View all comments
    0
    Would love your thoughts, please comment.x
    ()
    x