SlideShare una empresa de Scribd logo
1 de 22
SUMMER TRAINING PROJECT PRESENTATION
ON
CISCO CERTIFIED NETWORK ASSOCIATE
ABOUT CCNA
 This certification builds a
foundation in and apprentice
knowledge of networking.
 CCNA certified professionals can install, configure,
and operate LAN, WAN and dail access services for
small networks (100 modes or fewer), including but
not limited to use of these protocols: IP, IGRP,
SERIAL FRAME-RELAY, IP RIP, VLANs, RIP
ETHERNET, ACCESS-LISTS.
NETWORKING DEVICES
Hubs:-
Centralized device in a topology.
Take incoming signal and repeats it out to all ports
on networks.
A multi port twisted pair hub allows several point
to point segments to be joined in to one network.
Switches:-
 Used to interconnect LAN segment in cheap and easily
configured manner.
 Reduces network traffic resuting from an excessive
number of computers.
Routers:-
Segment large number of data into smaller segments.
Acts as safety barrier between segments.
Perform complex operation, they are than Switches.
Performing path selection in WAN Technology
Open System Interconnection
reference model developed by
the International Organization for
Standardization (ISO).
OSI model describes how data
is transferred from an application
on one computer to another.
OSI model composed of seven
layers that describe the functions
of data communication
protocols.
Each Layer of OSI model
describes a particular network
function.
OSI MODEL
IP ADDRESS
An IP address is a numeric
identifier assigned to each
machine on an IP network.
It designates the specific location
of a device on the network.
IP addressing was designed to allow hosts on one network
to communicate with a host on a different network regardless
of the type of LANs the hosts are participating in.
ROUTING
The term routing is used for
taking a packet from one device
and sending it through the
network to another devices of
different network.
The logical network address of the destination host is
used to get packets to the network through a routed
network, and then the hardware address of the host is
used to deliver the packet from a router to the correct
destination host.
If a network isn’t connected to the router the router must
use one of the two ways to learn how to get to the remote
network.
Static Routing:-
Meaning that someone must hand-type all network
locations into the routing table.
Dynamic Routing:-
A protocol on one router communicates with the same
protocol running on neighbor routers.
Dynamic Routing Protocols:-
RIP (Routing Information Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)
OSPF (Open Shortest Path First)
ACCESS-LIST
Access control list are an integral part of Cisco’s Security
Solution.
The proper use and configuration of access-lists is a vital
part of router configuration because access lists are such
versatile networking accessories.
Two type of access-lists:-
Standard access lists:-
These use only the source IP address in an IP packet as the
condition test. All decisions are made based on source IP
address.
Extended access lists:-
Extended access-list can evaluate many of the other fields in
the layer 3 and layer 4 header of an IP packet.
NETWORK ADDRESS TRANSLATION
(NAT)The intention for NAT was to slow the depletion of
available IP address space by allowing many private IP
addresses to be representation by some smaller number of
public IP address.
NAT is great to have around when an organization
changes its ISP and network mangers doesn't want to
hassle of changing the internal scheme.
Three Type of NAT:-
Static NAT:-
This type of NAT is designed to allow one to one mapping
between local and global address.
Dynamic NAT:-
This version gives you to the ability to map unregistered IP
address to a register IP address fro out of a pool of register
IP addresses.
Overloading:-
This is the most popular type of NAT configuration.
Understanding that overloading really is a form of dynamic
NAT that maps multiple unregistered IP addresses to a
single registered IP address by using different ports. Its also
known as Port Address Translation (PAT).
SWITCHES
Layer 2 switching is the process o using the hardware
address of devices on LAN to segment a network.
Create a Mac-address forward/filter table in order to make
decisions on whether to forward or flood a frame.
In multiple links between switches we face multi looping
problems. To solve this problem switches run Spanning Tree
Protocol (STP).
The main purpose of STP is to prevent switching loops in a
network with redundant switched paths.
Virtual LAN (VLAN)
A VLAN is a logical grouping of network users and
resources connected to administratively defined ports on a
switched.
A group of users that need an unusually high level of
security can be put into its own VLAN so that users outside
of the VLAN can’t communicate with them. So it provide
security.
VLAN increase the number of broadcast domains while
decreasing their size.
Network adds, moves, and changes are achieved with ease
by just configuring a port into the appropriate VLAN.
VLAN Trunking Protocol (VTP)
This is created by CISCO.
Consistent VLAN configuration across all switches in the
network.
VLAN trunking over mixed networks, such as Ethernet.
Accurate tracking and monitoring of VLAN’s.
Dynamic reporting of added VLANs to all switches in the
VTP Domain.
Plug and play VLAN adding.
Three type of Mode:-
Server Mode
Client Mode
Transparent Mode
Wide Area Network (WAN)
WAN is depend upon Geographical distance.
WAN Terms:-
Customer premises equipment (CPE):-
Customer premises equipment (CPE) is equipment that’s
owned by the subscriber and located on the subscriber’s
premises.
Demarcation point:-
The demarcation point is the precise spot where the service
provider’s responsibility ends and the CPE begins.
Central office (CO):-
This point connects the customer’s network to the provider’s
switching network. Good to know is that a central office (CO)
is sometimes referred to as a point of presence (POP).
WAN Connection Types
Leased lines:-These are usually referred to as a point-to-
point or dedicated connection. When you’ve got plenty of
cash, this is really the way to go because it uses
synchronous serial lines up to 45Mbps. HDLC and PPP
encapsulations are frequently used on leased lines.
Circuit switching:-When you hear the term circuit switching,
think phone call. The big advantage is cost—you only pay
for the time you actually use. No data can transfer before an
end-to-end connection is established. Circuit switching uses
dial-up modems or ISDN and is used for low-bandwidth data
transfers.
Packet switching:-This is a WAN switching method that
allows you to share bandwidth with other companies to save
money. Frame Relay and X.25 are packet-switching
technologies with speeds that can range from 56Kbps up to
T3 (45Mbps).
Frame Relay:-
A packet-switched technology that made its debut in the early
1990s, Frame Relay is a high-performance Data Link and
Physical layer specification. An upside to Frame Relay is that
it can be more cost effective than point-to-point links, plus it
typically runs at speeds of 64Kbps up to 45Mbps (T3).
Another Frame Relay benefit is that it provides features for
dynamic bandwidth allocation and congestion control.
HDLC High-Level Data-Link Control (HDLC):-
HDLC was derived from Synchronous Data Link Control
(SDLC), which was created by IBM as a Data Link connection
protocol. HDLC works at the Data Link layer. It wasn’t
intended to encapsulate multiple Network layer protocols
across the same link.
Point-to-Point Protocol (PPP):-
PPP is a pretty famous, industry-standard protocol. Because
all multi protocol versions of HDLC are proprietary, PPP can be
used to create point-to-point links between different vendors’
equipment. It uses a Network Control Protocol field in the
Data Link header to identify the Network layer protocol and
allows authentication and multi link connections to be run over
asynchronous and synchronous links.
WIRELESS TECHNOLOGY
Transmitting a signal using the typical 802.11 specifications
works a lot like it does with a basic Ethernet hub: They’re
both two-way forms of communication, and they both use
the same frequency to both transmit and receive.
Also important to note is the fact that the 802.11
specifications were developed so that there would be no
licensing required in most countries—to ensure the user the
freedom to install and operate without any licensing or
operating fees.
Various agencies have been around for a very long time to
help govern the use of wireless devices, frequencies,
standards, and how the frequency spectrums are used.
Because WLANs transmit over radio frequencies, they’re
regulated by the same types of laws used to govern things
like AM/FM radios.
The 802.11 Standards:-
Wireless starts with 802.11, and there are various other up-
and-coming standard groups as well, like 802.16 and
802.20. And there’s no doubt that cellular networks will
become huge players in our wireless future. But for now,
we’re going to concentrate on the 802.11 standards
committee and subcommittees.
IEEE 802.11 was the first, original standardized WLAN at 1
and 2Mbps. It runs in the 2.4GHz radio frequency and was
ratified in 1997 even though we didn’t see many products
pop up until around 1999 when 802.11b was introduced.
Comparing 802.11:-
802.11b 802.11g 802.11a (h)
2.4GHz 2.4GHz 5GHz
Most common Higher throughput Highest
throughput
Up to 11Mpbs Up to 54Mbps* Up to 54Mbps
DSSS DSSS/OFDM OFDM
3 non-overlapping 3 non-overlapping channels up to 23
Channels. Non-overlapping channels.
THANK YOUTHANK YOU

Más contenido relacionado

La actualidad más candente

Presentation on CCNA(Networking & Troubleshooting)
Presentation on CCNA(Networking & Troubleshooting)Presentation on CCNA(Networking & Troubleshooting)
Presentation on CCNA(Networking & Troubleshooting)Arunabh Deka
 
ccna presentation 2013
ccna presentation 2013ccna presentation 2013
ccna presentation 2013RoHit VashIsht
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1AIRTEL
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTNishant Goel
 
summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer Dheeraj Giri
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPTAIRTEL
 
Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Saurav Pandey
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training PresentationRohit Singh
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccnaHoneyKumar34
 
CCNA Training, Networking Courses Hyderabad, Cisco Certified - GolarsNetworks
CCNA Training, Networking Courses Hyderabad, Cisco Certified -  GolarsNetworksCCNA Training, Networking Courses Hyderabad, Cisco Certified -  GolarsNetworks
CCNA Training, Networking Courses Hyderabad, Cisco Certified - GolarsNetworksgolarsnetworks34
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 

La actualidad más candente (20)

Presentation on CCNA(Networking & Troubleshooting)
Presentation on CCNA(Networking & Troubleshooting)Presentation on CCNA(Networking & Troubleshooting)
Presentation on CCNA(Networking & Troubleshooting)
 
ccna presentation 2013
ccna presentation 2013ccna presentation 2013
ccna presentation 2013
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
 
summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer
 
acl configuration
acl configurationacl configuration
acl configuration
 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-report
 
CCNA 2
CCNA 2 CCNA 2
CCNA 2
 
Digital network lecturer4
Digital network  lecturer4Digital network  lecturer4
Digital network lecturer4
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
 
CCNA/Networking
CCNA/NetworkingCCNA/Networking
CCNA/Networking
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
 
CCNA Routing Protocols
CCNA Routing Protocols CCNA Routing Protocols
CCNA Routing Protocols
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccna
 
CCNA Training, Networking Courses Hyderabad, Cisco Certified - GolarsNetworks
CCNA Training, Networking Courses Hyderabad, Cisco Certified -  GolarsNetworksCCNA Training, Networking Courses Hyderabad, Cisco Certified -  GolarsNetworks
CCNA Training, Networking Courses Hyderabad, Cisco Certified - GolarsNetworks
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
Summer training on CCNA
Summer training on CCNASummer training on CCNA
Summer training on CCNA
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
 

Similar a CCNA 1

Chapter 02 - Wan Router
Chapter 02 - Wan RouterChapter 02 - Wan Router
Chapter 02 - Wan Routerphanleson
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesVamsi Krishna Kalavala
 
Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copyTonny Michael
 
Local area network (1)
Local area network (1)Local area network (1)
Local area network (1)Diwakar Singh
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-Icsk selva
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkArunabh Mishra
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1Chaing Ravuth
 
Computer Networking Tasks.docx
Computer Networking Tasks.docxComputer Networking Tasks.docx
Computer Networking Tasks.docxUsamaAliLone3
 
Implementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- reportImplementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- reportJatin Singh
 
What Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : NotesWhat Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : NotesSubhajit Sahu
 
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxChapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxbartholomeocoombs
 

Similar a CCNA 1 (20)

Chapter 02 - Wan Router
Chapter 02 - Wan RouterChapter 02 - Wan Router
Chapter 02 - Wan Router
 
IFD30104 Chapter 1
IFD30104 Chapter 1IFD30104 Chapter 1
IFD30104 Chapter 1
 
MPLS ppt
MPLS pptMPLS ppt
MPLS ppt
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copy
 
Local area network (1)
Local area network (1)Local area network (1)
Local area network (1)
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-I
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh Network
 
C C N A Day5
C C N A  Day5C C N A  Day5
C C N A Day5
 
Networking Brief Overview
Networking Brief OverviewNetworking Brief Overview
Networking Brief Overview
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
 
Computer Networking Tasks.docx
Computer Networking Tasks.docxComputer Networking Tasks.docx
Computer Networking Tasks.docx
 
Implementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- reportImplementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- report
 
Zigbee
ZigbeeZigbee
Zigbee
 
What Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : NotesWhat Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : Notes
 
Ccna
CcnaCcna
Ccna
 
PPT Backbone And Networks
PPT Backbone And NetworksPPT Backbone And Networks
PPT Backbone And Networks
 
Wan networks
Wan networksWan networks
Wan networks
 
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxChapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
 

Más de Asish Verma

Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime pptAsish Verma
 
Major seminar presentation Cloud Computing
Major seminar presentation Cloud Computing Major seminar presentation Cloud Computing
Major seminar presentation Cloud Computing Asish Verma
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)Asish Verma
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)Asish Verma
 
SITA LAB REPORT (I.P)
SITA LAB REPORT (I.P)SITA LAB REPORT (I.P)
SITA LAB REPORT (I.P)Asish Verma
 
Major pro lab synopsis
Major pro lab synopsisMajor pro lab synopsis
Major pro lab synopsisAsish Verma
 
MINOR PROZECT REPORT on WINDOWS SERVER
MINOR PROZECT REPORT on WINDOWS SERVERMINOR PROZECT REPORT on WINDOWS SERVER
MINOR PROZECT REPORT on WINDOWS SERVERAsish Verma
 
Pro lab synopsis (cert)
Pro lab synopsis (cert)Pro lab synopsis (cert)
Pro lab synopsis (cert)Asish Verma
 
Pro lab synopsis (body)
Pro lab synopsis (body)Pro lab synopsis (body)
Pro lab synopsis (body)Asish Verma
 
Microsoft project (msp) group 6
Microsoft project (msp)  group 6Microsoft project (msp)  group 6
Microsoft project (msp) group 6Asish Verma
 

Más de Asish Verma (13)

Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
Major seminar presentation Cloud Computing
Major seminar presentation Cloud Computing Major seminar presentation Cloud Computing
Major seminar presentation Cloud Computing
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
SITA LAB REPORT (I.P)
SITA LAB REPORT (I.P)SITA LAB REPORT (I.P)
SITA LAB REPORT (I.P)
 
Major pro lab synopsis
Major pro lab synopsisMajor pro lab synopsis
Major pro lab synopsis
 
MINOR PROZECT REPORT on WINDOWS SERVER
MINOR PROZECT REPORT on WINDOWS SERVERMINOR PROZECT REPORT on WINDOWS SERVER
MINOR PROZECT REPORT on WINDOWS SERVER
 
Pt report(body)
Pt report(body)Pt report(body)
Pt report(body)
 
Pro lab synopsis (cert)
Pro lab synopsis (cert)Pro lab synopsis (cert)
Pro lab synopsis (cert)
 
Pro lab synopsis (body)
Pro lab synopsis (body)Pro lab synopsis (body)
Pro lab synopsis (body)
 
Pt report(cert)
Pt report(cert)Pt report(cert)
Pt report(cert)
 
Asish verma
Asish vermaAsish verma
Asish verma
 
Microsoft project (msp) group 6
Microsoft project (msp)  group 6Microsoft project (msp)  group 6
Microsoft project (msp) group 6
 

Último

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

CCNA 1

  • 1. SUMMER TRAINING PROJECT PRESENTATION ON CISCO CERTIFIED NETWORK ASSOCIATE
  • 2. ABOUT CCNA  This certification builds a foundation in and apprentice knowledge of networking.  CCNA certified professionals can install, configure, and operate LAN, WAN and dail access services for small networks (100 modes or fewer), including but not limited to use of these protocols: IP, IGRP, SERIAL FRAME-RELAY, IP RIP, VLANs, RIP ETHERNET, ACCESS-LISTS.
  • 3. NETWORKING DEVICES Hubs:- Centralized device in a topology. Take incoming signal and repeats it out to all ports on networks. A multi port twisted pair hub allows several point to point segments to be joined in to one network.
  • 4. Switches:-  Used to interconnect LAN segment in cheap and easily configured manner.  Reduces network traffic resuting from an excessive number of computers. Routers:- Segment large number of data into smaller segments. Acts as safety barrier between segments. Perform complex operation, they are than Switches. Performing path selection in WAN Technology
  • 5. Open System Interconnection reference model developed by the International Organization for Standardization (ISO). OSI model describes how data is transferred from an application on one computer to another. OSI model composed of seven layers that describe the functions of data communication protocols. Each Layer of OSI model describes a particular network function. OSI MODEL
  • 6. IP ADDRESS An IP address is a numeric identifier assigned to each machine on an IP network. It designates the specific location of a device on the network. IP addressing was designed to allow hosts on one network to communicate with a host on a different network regardless of the type of LANs the hosts are participating in.
  • 7. ROUTING The term routing is used for taking a packet from one device and sending it through the network to another devices of different network. The logical network address of the destination host is used to get packets to the network through a routed network, and then the hardware address of the host is used to deliver the packet from a router to the correct destination host.
  • 8. If a network isn’t connected to the router the router must use one of the two ways to learn how to get to the remote network. Static Routing:- Meaning that someone must hand-type all network locations into the routing table. Dynamic Routing:- A protocol on one router communicates with the same protocol running on neighbor routers. Dynamic Routing Protocols:- RIP (Routing Information Protocol) EIGRP (Enhanced Interior Gateway Routing Protocol) OSPF (Open Shortest Path First)
  • 9. ACCESS-LIST Access control list are an integral part of Cisco’s Security Solution. The proper use and configuration of access-lists is a vital part of router configuration because access lists are such versatile networking accessories. Two type of access-lists:- Standard access lists:- These use only the source IP address in an IP packet as the condition test. All decisions are made based on source IP address. Extended access lists:- Extended access-list can evaluate many of the other fields in the layer 3 and layer 4 header of an IP packet.
  • 10. NETWORK ADDRESS TRANSLATION (NAT)The intention for NAT was to slow the depletion of available IP address space by allowing many private IP addresses to be representation by some smaller number of public IP address. NAT is great to have around when an organization changes its ISP and network mangers doesn't want to hassle of changing the internal scheme. Three Type of NAT:- Static NAT:- This type of NAT is designed to allow one to one mapping between local and global address.
  • 11. Dynamic NAT:- This version gives you to the ability to map unregistered IP address to a register IP address fro out of a pool of register IP addresses. Overloading:- This is the most popular type of NAT configuration. Understanding that overloading really is a form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports. Its also known as Port Address Translation (PAT).
  • 12. SWITCHES Layer 2 switching is the process o using the hardware address of devices on LAN to segment a network. Create a Mac-address forward/filter table in order to make decisions on whether to forward or flood a frame. In multiple links between switches we face multi looping problems. To solve this problem switches run Spanning Tree Protocol (STP). The main purpose of STP is to prevent switching loops in a network with redundant switched paths.
  • 13. Virtual LAN (VLAN) A VLAN is a logical grouping of network users and resources connected to administratively defined ports on a switched. A group of users that need an unusually high level of security can be put into its own VLAN so that users outside of the VLAN can’t communicate with them. So it provide security. VLAN increase the number of broadcast domains while decreasing their size. Network adds, moves, and changes are achieved with ease by just configuring a port into the appropriate VLAN.
  • 14. VLAN Trunking Protocol (VTP) This is created by CISCO. Consistent VLAN configuration across all switches in the network. VLAN trunking over mixed networks, such as Ethernet. Accurate tracking and monitoring of VLAN’s. Dynamic reporting of added VLANs to all switches in the VTP Domain. Plug and play VLAN adding. Three type of Mode:- Server Mode Client Mode Transparent Mode
  • 15. Wide Area Network (WAN) WAN is depend upon Geographical distance. WAN Terms:- Customer premises equipment (CPE):- Customer premises equipment (CPE) is equipment that’s owned by the subscriber and located on the subscriber’s premises. Demarcation point:- The demarcation point is the precise spot where the service provider’s responsibility ends and the CPE begins. Central office (CO):- This point connects the customer’s network to the provider’s switching network. Good to know is that a central office (CO) is sometimes referred to as a point of presence (POP).
  • 16. WAN Connection Types Leased lines:-These are usually referred to as a point-to- point or dedicated connection. When you’ve got plenty of cash, this is really the way to go because it uses synchronous serial lines up to 45Mbps. HDLC and PPP encapsulations are frequently used on leased lines. Circuit switching:-When you hear the term circuit switching, think phone call. The big advantage is cost—you only pay for the time you actually use. No data can transfer before an end-to-end connection is established. Circuit switching uses dial-up modems or ISDN and is used for low-bandwidth data transfers. Packet switching:-This is a WAN switching method that allows you to share bandwidth with other companies to save money. Frame Relay and X.25 are packet-switching technologies with speeds that can range from 56Kbps up to T3 (45Mbps).
  • 17. Frame Relay:- A packet-switched technology that made its debut in the early 1990s, Frame Relay is a high-performance Data Link and Physical layer specification. An upside to Frame Relay is that it can be more cost effective than point-to-point links, plus it typically runs at speeds of 64Kbps up to 45Mbps (T3). Another Frame Relay benefit is that it provides features for dynamic bandwidth allocation and congestion control. HDLC High-Level Data-Link Control (HDLC):- HDLC was derived from Synchronous Data Link Control (SDLC), which was created by IBM as a Data Link connection protocol. HDLC works at the Data Link layer. It wasn’t intended to encapsulate multiple Network layer protocols across the same link.
  • 18. Point-to-Point Protocol (PPP):- PPP is a pretty famous, industry-standard protocol. Because all multi protocol versions of HDLC are proprietary, PPP can be used to create point-to-point links between different vendors’ equipment. It uses a Network Control Protocol field in the Data Link header to identify the Network layer protocol and allows authentication and multi link connections to be run over asynchronous and synchronous links.
  • 19. WIRELESS TECHNOLOGY Transmitting a signal using the typical 802.11 specifications works a lot like it does with a basic Ethernet hub: They’re both two-way forms of communication, and they both use the same frequency to both transmit and receive. Also important to note is the fact that the 802.11 specifications were developed so that there would be no licensing required in most countries—to ensure the user the freedom to install and operate without any licensing or operating fees. Various agencies have been around for a very long time to help govern the use of wireless devices, frequencies, standards, and how the frequency spectrums are used. Because WLANs transmit over radio frequencies, they’re regulated by the same types of laws used to govern things like AM/FM radios.
  • 20. The 802.11 Standards:- Wireless starts with 802.11, and there are various other up- and-coming standard groups as well, like 802.16 and 802.20. And there’s no doubt that cellular networks will become huge players in our wireless future. But for now, we’re going to concentrate on the 802.11 standards committee and subcommittees. IEEE 802.11 was the first, original standardized WLAN at 1 and 2Mbps. It runs in the 2.4GHz radio frequency and was ratified in 1997 even though we didn’t see many products pop up until around 1999 when 802.11b was introduced.
  • 21. Comparing 802.11:- 802.11b 802.11g 802.11a (h) 2.4GHz 2.4GHz 5GHz Most common Higher throughput Highest throughput Up to 11Mpbs Up to 54Mbps* Up to 54Mbps DSSS DSSS/OFDM OFDM 3 non-overlapping 3 non-overlapping channels up to 23 Channels. Non-overlapping channels.