Download
slide1 n.
Skip this Video
Loading SlideShow in 5 Seconds..
CCNA PowerPoint Presentation

CCNA

240 Views Download Presentation
Download Presentation

CCNA

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. CCNA

    Wolfgang Schulte http://wwwlehre.dhbw-stuttgart.de/~schulte/ schulte@lehre.dhbw-stuttgart.de W. Schulte
  2. Programm:Cisco Networking Academy Dauer: 4 Curricula Introduction to Networks Routing & Switching Scaling Networks Connecting Networks Durchführung: Curriculum - Selfstudy und Vorlesung Q&A - Questions and Answers Eigene Examina am PC Übungen vom Instruktor schriftlich Abschlusstest 1. Final Tests (Custom Scores) 2. Skillbasedtests Bestätigung der Teilnahme durch Instruktor; Zertifikat Abschlusstestextern Cisco Certified Network Associate (CCNA) W. Schulte
  3. W. Schulte
  4. Network  Netz Download Packet Tracer Unterlagen siehe http://wwwlehre.dhbw-stuttgart.de/~schulte/doc/ccna 5-1/ (http://www.spiegel.de/kultur/zwiebelfisch/0,1518,315833,00.html) W. Schulte
  5. Kap. 1: Exploring the Network

    Introduction to Networks http://www.warriorsofthe.net/movie.html W. Schulte
  6. Kap. 1: Lernziele W. Schulte
  7. Kapitel1 1.1 Globally Connected 1.2 LANs, WANs, and the Internet 1.3 Converged Networks 1.4 Network Trends 1.5 Summary W. Schulte
  8. 1.1 Globally ConnectedNetworking TodayNetworks in Our Past and Daily Lives W. Schulte
  9. Networking TodayThe Global Community W. Schulte
  10. Interconnecting our LivesNetworking impacts in our daily lives Networks Support the Way We Learn Networks Support the Way We Communicate Networks Support the Way We Work Networks Support the Way We Play W. Schulte
  11. Providing Resources in a NetworkNetworks of Many Sizes W. Schulte
  12. Providing Resources in a NetworkClients and Servers W. Schulte
  13. Providing Resources in a NetworkPeer-to-Peer W. Schulte
  14. 1.2 LANs, WANs, and InternetsComponents of a Network There are three categories of network components: Devices Media Services W. Schulte
  15. Components of a NetworkEnd Devices Some examples of end devices are: Computers (work stations, laptops, file servers, web servers) Network printers VoIP phones TelePresence endpoint Security cameras Mobile handheld devices (such as smartphones, tablets, PDAs, and wireless debit / credit card readers and barcode scanners) W. Schulte
  16. Components of a NetworkNetwork Infrastructure Devices Examples of intermediary network devices are: Network Access Devices (switches, and wireless access points) Internetworking Devices (routers) Security Devices (firewalls) W. Schulte
  17. Components of a NetworkNetwork Media W. Schulte
  18. Components of a NetworkNetwork Representations W. Schulte
  19. Components of a NetworkTopology Diagrams W. Schulte
  20. LANs and WANsTypes of Networks The two most common types of network infrastructures are: Local Area Network (LAN) Wide Area Network (WAN). Other types of networks include: Metropolitan Area Network (MAN) Wireless LAN (WLAN) Storage Area Network (SAN) W. Schulte
  21. LANs and WANsLocal Area Networks (LAN) W. Schulte
  22. LANs and WANsWide Area Networks (WAN) W. Schulte
  23. LANs, WANs, and InternetsThe Internet W. Schulte
  24. The InternetIntranet and Extranet W. Schulte
  25. LANs, WANs, and InternetsInternet Access Technologies W. Schulte
  26. Connecting to the InternetConnecting Remote Users to the Internet W. Schulte
  27. Connecting to the InternetConnecting Businesses to the Internet Packet Tracer Übung 1 W. Schulte
  28. 1.3 Converged NetworksThe Converging Network W. Schulte
  29. Converged NetworksPlanning for the Future W. Schulte
  30. Reliable NetworkSupporting Network Architecture As networks evolve, we are discovering that there are four basic characteristics that the underlying architectures need to address in order to meet user expectations: Fault Tolerance Scalability Quality of Service (QoS) Security W. Schulte
  31. Reliable NetworkFault Tolerance in Circuit Switched Network W. Schulte
  32. Reliable NetworkPacket-Switched Networks W. Schulte
  33. Reliable NetworkScalable Networks W. Schulte
  34. Reliable NetworkProviding (QoS) Examples of priority decisions for an organization might include: Time-sensitive communication - increase priority for services like telephony or video distribution. Non time-sensitive communication - decrease priority for web page retrieval or email. High importance to organization - increase priority for production control or business transaction data. Undesirable communication - decrease priority or block unwanted activity, like peer-to-peer file sharing or live entertainment W. Schulte
  35. Reliable NetworkProviding Network Security W. Schulte
  36. 1.4 Network TrendsNew trends Some of the top trends include: Bring Your Own Device (BYOD) Online collaboration Video Cloud computing W. Schulte
  37. Network TrendsBring Your Own Device (BYOD) W. Schulte
  38. Network TrendsOnline Collaboration W. Schulte
  39. Network TrendsVideo Communication W. Schulte
  40. Network TrendsCloud Computing There are four primary types of clouds: Public clouds Private clouds Custom clouds Hybrid clouds W. Schulte
  41. Network TrendsData Centers A data center is a facility used to house computer systems and associated components including: Redundant data communications connections High-speed virtual servers (sometimes referred to as server farms or server clusters) Redundant storage systems (typically uses SAN technology) Redundant or backup power supplies Environmental controls (e.g., air conditioning, fire suppression) Security devices W. Schulte
  42. Networking Technologies for the HomeTechnology Trends in the Home W. Schulte
  43. Networking Technologies for the HomePowerline Networking W. Schulte
  44. Networking Technologies for the HomeWireless Broadband W. Schulte
  45. Future of NetworkingNetwork Security W. Schulte
  46. Network SecuritySecurity Threats The most common external threats to networks include: Viruses, worms, and Trojan horses Spyware and adware Zero-day attacks, also called zero-hour attacks Hacker attacks Denial of service attacks Data interception and theft Identity theft W. Schulte
  47. Network SecuritySecurity Solutions Network security components often include: Antivirus and antispyware Firewall filtering Dedicated firewall systems Access control lists (ACL) Intrusion prevention systems (IPS) Virtual Private Networks (VPNs) W. Schulte
  48. Network ArchitecturesCisco Network Architectures W. Schulte
  49. Network ArchitecturesCisco Certified Network Associate (CCNA) W. Schulte
  50. 1.5 Exploring the NetworkingSummary In this chapter, you learned: Networks and the Internet have changed the way we communicate, learn, work, and even play. Networks come in all sizes. They can range from simple networks consisting of two computers, to networks connecting millions of devices. The Internet is the largest network in existence. In fact, the term Internet means a ‘network of networks. The Internet provides the services that enable us to connect and communicate with our families, friends, work, and interests. W. Schulte
  51. Exploring the NetworkingSummary In this chapter, you learned: The network infrastructure is the platform that supports the network. It provides the stable and reliable channel over which communication can occur. It is made up of network components including end devices, intermediate device, and network media. Networks must be reliable. Network security is an integral part of computer networking, regardless of whether the network is limited to a home environment with a single connection to the Internet, or as large as a corporation with thousands of users. W. Schulte
  52. Exploring the NetworkingSummary In this chapter, you learned: The network infrastructure can vary greatly in terms of size, number of users, and number and types of services that are supported on it. The network infrastructure must grow and adjust to support the way the network is used. The routing and switching platform is the foundation of any network infrastructure. W. Schulte
  53. Bücher Handbuch der Kommunikationsprotokolle und Technik der Netze ISBN: 978-3-8417-6002-9 Handbuch der Routing Protokolle ISBN: 978-3-8417-6009-8
  54. Noch Fragen? W. Schulte