CISCO Cap 1 TRADUCIDO PDF
CISCO Cap 1 TRADUCIDO PDF
CISCO Cap 1 TRADUCIDO PDF
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 15
Machine Translated by Google
networks today
networks in everyday life
ÿ Welcome to a world where we are more powerful together than apart.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 16
Machine Translated by Google
networks today
technology then and now
ÿ We live in a world that we could not have imagined 20 years ago.
ÿ What will be possible in the future when using the network as a platform?
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 17
Machine Translated by Google
networks today
Unlimited
ÿ Advances in network technologies are helping to create a world without limits.
ÿ Cisco refers to the impact of the Internet and networks on people as the "human network."
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 18
Machine Translated by Google
networks today
Networks support the way we learn
ÿ Do you remember sitting in a classroom like this?
ÿ They no longer have to be at school to take classes. They also don't have to be in a classroom to
have a teacher.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 19
Machine Translated by Google
networks today
Networks support the way we work
ÿ The globalization of the Internet
gives people the ability to create
information that can be
accessed by everyone.
ÿ Forms of communication:
• Text messages
• Social networks
• Collaboration tools
• Entries
• Wikis
• Podcasting
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 20
Machine Translated by Google
networks today
Networks support the way we work
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 21
Machine Translated by Google
networks today
Networks support the way we play
ÿ We listen to music, watch
movies, read books and
download material for future
offline access.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 22
Machine Translated by Google
networks today
Lab - Investigating Network Collaboration Tools
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 23
Machine Translated by Google
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 24
Machine Translated by Google
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 25
Machine Translated by Google
ÿ Advantages of the peer-to-peer network: it is easy to set up, it is less complex, and it costs less.
ÿ Disadvantages: it does not have centralized administration, it is not as secure, it is not scalable and
it has slower performance.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 26
Machine Translated by Google
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 27
Machine Translated by Google
network components
Overview of network components
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 28
Machine Translated by Google
ÿ Terminals
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 29
Machine Translated by Google
network components
Intermediary network devices
An intermediary device interconnects terminals on a network. Examples include: switches,
wireless access points, routers, and firewalls.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 30
Machine Translated by Google
network components
network media
• Wireless transmission
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 31
Machine Translated by Google
network components
network representations
• Interface
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 32
Machine Translated by Google
network components
topology diagrams
ÿ Note the key differences between the two topology diagrams (physical location of devices versus
port and network addressing schemes).
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 33
Machine Translated by Google
Types of networks
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 34
Machine Translated by Google
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 35
Machine Translated by Google
Internet
The Internet is a worldwide set of
interconnected LAN and WAN networks.
• IETF
• ICANN
• IAB
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 37
Machine Translated by Google
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 38
Machine Translated by Google
Internet connections
Internet access technologies
There are several ways to connect
Internet users and organizations:
• The most widely used services for home users
and small offices include wired broadband,
digital subscriber line (DSL) broadband,
wireless WANs, and mobile services.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 39
Machine Translated by Google
Internet connections
Internet connections for small offices and home offices
ÿ Cable: high bandwidth, always
On, Internet connection offered by cable
television service providers.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 40
Machine Translated by Google
Internet connections
Business Internet Connections ÿ Corporate business connections
may require higher bandwidth, dedicated
connections, or managed services.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 41
Machine Translated by Google
Internet connections
Packet Tracer:
Navigation Help and Tips
ÿ Overview of the Packet
Tracer program
ÿ Packet Tracer is a fun software
program that will help you
with your CCNA studies and
will allow you to experiment
with network behaviors, create
networks, and find the answers
to your “what if…” questions.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 42
Machine Translated by Google
Internet connections
Packet Tracer:
network representation
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 43
Machine Translated by Google
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 44
Machine Translated by Google
converged networks
Separate traditional networks
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 45
Machine Translated by Google
converged networks
the converged network
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 46
Machine Translated by Google
converged networks
Lab - Investigating Converged Network Services
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 47
Machine Translated by Google
A reliable network
network architecture
• Fault tolerance
• Scalability
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 48
Machine Translated by Google
reliable network
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 49
Machine Translated by Google
reliable network
scalability
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 50
Machine Translated by Google
reliable network
Quality of service
ÿ Live voice and video transmissions
require higher expectations for the
services that are provided.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 51
Machine Translated by Google
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 52
Machine Translated by Google
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 53
Machine Translated by Google
network trends
New tendencies
ÿ The network function must continually
adjust and transform in order to keep
up with new technologies and new
end-user devices as they are
constantly being released to the
market.
network trends
bring your own device
ÿ Bring Your Own Device (BYOD) is a
major global trend that allows users to
use their own devices and provides
them with more opportunities and
greater flexibility.
• Laptops
• Netbooks
• Tablets
• Smartphones
• e-book readers
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 55
Machine Translated by Google
network trends
online collaboration
ÿ Collaboration is a priority
very high for companies and
education.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 56
Machine Translated by Google
network trends
video communication
ÿ Cisco TelePresence powers a new work model in which everyone can be more
productive in any environment thanks to face-to-face collaboration.
ÿ Every day, around the world, we transform organizations through the transformation of the
experiences of our clients.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 57
Machine Translated by Google
network trends
Cloud Computing ÿ Cloud computing is a global trend that allows
us to store personal files or back up our data
on servers over the Internet.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 58
Machine Translated by Google
network trends
Cloud Computing (cont'd)
ÿ Four types of clouds:
• Public clouds
• Services and applications are made available
available to the general public through a pay-per-
use model or for free.
• Private clouds
• Applications and services are intended for a specific
organization or entity, such as the government.
• Hybrid clouds
• Are composed of two or more types of clouds; for
example, half custom and half public.
Each part is still a separate object, but both are
connected with the same architecture.
• Custom clouds
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 59
Machine Translated by Google
network trends
Tech trends at home
• Smart home technology is
a growing trend that allows technology
to be integrated into the devices that
are used daily, allowing them to
interconnect with other devices. • Ovens
may recognize when to cook a meal for
you by communicating with your calendar
to know when you are scheduled to
return home.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 60
Machine Translated by Google
network trends
Power line networks
• Powerline networks can allow devices
to connect to a LAN where data
network cables or wireless
communications are not a viable
option.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 61
Machine Translated by Google
network trends
wireless broadband • In addition to DSL and cable, wireless is
another option used to connect homes
and small businesses to the Internet.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 62
Machine Translated by Google
network security
security threats
• Network security is a part
fundamental of the network regardless
of its size.
• The security of the network that is
It implements it must be aware of the
environment and protect the data, but, at
the same time, it must allow the quality of
service that is expected from the network.
• Network protection includes
many protocols, technologies,
devices, tools, and techniques to
protect data and mitigate
threats.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 63
Machine Translated by Google
Network
Security Security Threats (cont.)
• External threats:
• Viruses, Worms and Trojan Horses
• Spyware y adware
• Zero-day attacks, also called "zero-hour
attacks"
• Hacker attacks
• Denial of service attacks
• Interception and theft of data
• Identity Theft
• Internal threats:
• Whether intentional or not, many studies show
that internal network users commit the most
security breaches.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 64
Machine Translated by Google
network security
security solutions
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 65
Machine Translated by Google
Network
Security Security Solutions (cont.)
• Larger networks have
additional security requirements:
• Dedicated firewall system for
provide more advanced firewall
functionality.
• Access Control Lists (ACLs) to filter
access and forward traffic.
• Intrusion prevention systems
(IPS) to identify rapidly expanding threats,
such as zero-day attacks.
• Virtual Private Networks (VPN) to
provide secure access for remote
workers.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 66
Machine Translated by Google
network architecture
Cisco Network Architecture
• For networks to function and
To effectively support connections of
people, devices, and information in a
converged, media-rich environment,
the network must be built on a standard
network architecture.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 67
Machine Translated by Google
network architecture
CCENT and CCNA certification
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 68
Machine Translated by Google
network architecture
Lab - Investigating IT and Networking Job Opportunities
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 69
Machine Translated by Google
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 70
Machine Translated by Google
Conclusion
network warriors
ÿ The animated video below will help you visualize networking concepts.
ÿ http://www.warriorsofthe.net/
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 71
Machine Translated by Google
Conclusion
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 72
Machine Translated by Google
Chapter 1