Cisco Discovery 3 Chapter 1 Networking in the Enterprise JEOPARDY.

Slides:



Advertisements
Similar presentations
BAI613 Module 2 - Voice over IP Technology. Module Objectives 1. Describe the benefits of IP Telephony/Packet Telephony/VoIP over traditional telephone.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Network Basics.
Module 5 - Switches CCNA 3 version 3.0 Cabrillo College.
Cisco 3 - Switches Perrine - Brierley Page 15/10/2015 Module 5 Switches LAN Design LAN Switches.
WAN Connectivity The VMO Wide Area Network will extend between all stores, offices, and Lyon, France We have designed a highly redundant network with.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Services in a Converged WAN Accessing the WAN – Chapter 1.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER SEVEN NETWORKS: MOBILE BUSINESS CHAPTER SEVEN NETWORKS:
Ch.6 - Switches CCNA 3 version 3.0.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Telecommunications and Networks Business value of networks Network components Chapter 6 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies,
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Services in a Converged WAN Accessing the WAN – Chapter 1.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Virtual Data Systems, Inc. Value Proposition of IP Telephony Voice over IP Technologies.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Routing and Switching in the Enterprise – Chapter 1 Networking.
Chapter 1: Hierarchical Network Design
The generation, storage, and movement of information are central to managing an enterprise’s business processes As a result, businesses must ensure.
Business Data Communications, Stallings 1 Chapter 1: Introduction William Stallings Business Data Communications 6 th Edition.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Services in a Converged WAN Accessing the WAN – Chapter 1.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Exploring the Network.
Introduction to WAN Technologies
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
The University of Bolton School of Games Computing & Creative Technologies LCT2516 Network Architecture CCNA Exploration LAN Switching and Wireless Chapter.
LAN Switching and Wireless – Chapter 1
1 LAN design- Chapter 1 CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino.
S4-Chapter 3 WAN Design Requirements. WAN Technologies Leased Line –PPP networks –Hub and Spoke Topologies –Backup for other links ISDN –Cost-effective.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Services in a Converged WAN Accessing the WAN – Chapter 1.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Cisco 3 - Switches Perrine - Brierley Page 112/1/2015 Module 5 Switches.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 LAN Design LAN Switching and Wireless – Chapter 1.
LAN Switching and Wireless – Chapter 1
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 LAN Design LAN Switching and Wireless – Chapter 1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Services in a Converged WAN Accessing the WAN – Chapter 1.
Network design WAN topology Topic 5. Agenda Enterprise topology Functions and components Security Design goals Physical standards Topologies WAN link.
Lecture-2: Idea of Network LAN - Local Area Network WAN - Wide Area Network.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Services in a Converged WAN Accessing the WAN – Chapter 1.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Hierarchical Network Design Connecting Networks.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Design Chapter One.
Communications and Networks Chapter 9 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
NT1210 Introduction to Networking
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
Network Processing Systems Design
Chapter 1: Explore the Network
Instructor Materials Chapter 1: Explore the Network
Networking in the Enterprise
Networking in the Enterprise
Chapter 1: Explore the Network
Module 2: Configure Network Intrusion Detection and Prevention
LAN Switching and Wireless – Chapter 1
IS4550 Security Policies and Implementation
LAN Switching and Wireless – Chapter 1
Services in a Converged WAN
Services in a Converged WAN
Services in a Converged WAN
LAN Switching and Wireless – Chapter 1
Topic 12: Virtual Private Networks
Presentation transcript:

Cisco Discovery 3 Chapter 1 Networking in the Enterprise JEOPARDY

Acronyms This category will display an acronym. The teams must define what the acronym stands for. This category will display an acronym. The teams must define what the acronym stands for. Acronyms ► ► ► T O D A Y ’ S C A T A G O R I E S ◄ ◄ ◄

Essential Definitions Essential Definitions This category will display definitions of Enterprise Essential concepts. Teams must tell what concept is being defined. This category will display definitions of Enterprise Essential concepts. Teams must tell what concept is being defined. Essential Definitions ► ► ► T O D A Y ’ S C A T A G O R I E S ◄ ◄ ◄

LAN or WAN? LAN or WAN? This category will describe a concept or technology and the team must decide whether the concept belongs in a LAN or a WAN. This category will describe a concept or technology and the team must decide whether the concept belongs in a LAN or a WAN. LAN or WAN? ► ► ► T O D A Y ’ S C A T A G O R I E S ◄ ◄ ◄

3-LAYER DESIGN MODEL 3-LAYER DESIGN MODEL This category will describe a concept relating to the 3- Layer Hierarchical Design Model and the team must name the concept being described. This category will describe a concept relating to the 3- Layer Hierarchical Design Model and the team must name the concept being described. 3-LAYER DESIGN MODEL ► ► ► T O D A Y ’ S C A T A G O R I E S ◄ ◄ ◄

Cisco Enterprise Architecture Cisco Enterprise Architecture This category will describe a concept relating to the Cisco Enterprise Architecture and the team must name the concept being described. This category will describe a concept relating to the Cisco Enterprise Architecture and the team must name the concept being described. Cisco Enterprise Architecture ► ► ► T O D A Y ’ S C A T A G O R I E S ◄ ◄ ◄

Grab Bag Grab Bag This category is a “catch all”. It can cover any topic. This category is a “catch all”. It can cover any topic. Grab Bag ► ► ► T O D A Y ’ S C A T A G O R I E S ◄ ◄ ◄

Acronyms Essential Definitions LAN or WAN? 3-Layer Design Model Cisco Enterprise Architecture Grab Bag ► ► ► D o u b l e J e o p a r d y ◄ ◄ ◄

Question QoS Acronyms 100 A: What is Quality of Service A: What is Quality of Service?

Question A: What is Virtual Private Network A: What is Virtual Private Network ? VPN Acronyms

Question A: What is a Network Operations Center A: What is a Network Operations Center ? NOC Acronyms 300

Question A: What is a Voice over IP A: What is a Voice over IP ? VoIP Acronyms 400

Question A: What is a Enterprise Composite Network Model A: What is a Enterprise Composite Network Model ? ECNM Acronyms 500

Question A: What is a Converged Network ? A: What is a Converged Network ? Network capable of carrying voice, video and digital data Network capable of carrying voice, video and digital data Essential Definitions Essential Definitions

Question A: What is IP Telephony ? A: What is IP Telephony ? Digital phone-based system based on Internet standards. Essential Definitions Essential Definitions 200

Question A: What is Mission-Critical Services? A: What is Mission-Critical Services ? Network or computing process that is vital to an organization. Network or computing process that is vital to an organization. Essential Definitions Essential Definitions 300

Question A: What is Redundant Power Supplies and Failover Capabilities ? A: What is Redundant Power Supplies and Failover Capabilities ? Two features in an enterprise network that support mission-critical services. Essential Definitions Essential Definitions 400

Question A: What is a Failure Domain ? A: What is a Failure Domain ? Area of a network impacted when a key device or service experiences problems Area of a network impacted when a key device or service experiences problems Essential Definitions Essential Definitions 500

Question A: What is a LAN? A: What is a LAN ? LAN or WAN? LAN or WAN? 100Ethernet

Question A: What is a LAN ? A: What is a LAN ? 100 Mb UTP 100 Mb UTP LAN or WAN? LAN or WAN? 200

Question A: What is a WAN ? A: What is a WAN ? Frame Relay Frame Relay LAN or WAN? LAN or WAN? 300

Question A: What is LAN ? A: What is LAN ? Access Layer Access Layer LAN or WAN? LAN or WAN? 400

Question A: What is a WAN ? A: What is a WAN ? T1/E1 LAN or WAN? LAN or WAN? 500

Question A: What are Access Layer, Distribution Layer, Core Layer ? A: What are Access Layer, Distribution Layer, Core Layer ? Name the three layers of the three-layer hierarchical design model Name the three layers of the three-layer hierarchical design model 3-Layer Design Model 3-Layer Design Model 100

Question A: What is the Core Layer ? A: What is the Core Layer ? This layer represents a high-speed backbone layer between dispersed end networks This layer represents a high-speed backbone layer between dispersed end networks 3-Layer Design Model 3-Layer Design Model 200

Question A: What is the Access Layer ? A: What is the Access Layer ? This layer provides connectivity for the users This layer provides connectivity for the users 3-Layer Design Model 3-Layer Design Model 300

Question A: What is the Distribution Layer ? A: What is the Distribution Layer ? 3-Layer Design Model 3-Layer Design Model 400 This layer provides a connection point for separate local networks This layer provides a connection point for separate local networks

Question A: What is the Core Layer ? A: What is the Core Layer ? Some networks use this layer’s services offered by an ISP to reduce costs Some networks use this layer’s services offered by an ISP to reduce costs 3-Layer Design Model 3-Layer Design Model 500

Question A: What is Enterprise Campus, Enterprise Edge, Service Provider Edge ? A: What is Enterprise Campus, Enterprise Edge, Service Provider Edge ? Name the three functional components that compose the Cisco Enterprise Architecture, while still maintaining the concept of Core, Distribution and Access layers. Name the three functional components that compose the Cisco Enterprise Architecture, while still maintaining the concept of Core, Distribution and Access layers. Cisco Enterprise Architecture Cisco Enterprise Architecture 100

Question A: What is an Enterprise Campus ? A: What is an Enterprise Campus ? Consists of the campus infrastructure with server farms and network management Consists of the campus infrastructure with server farms and network management Cisco Enterprise Architecture Cisco Enterprise Architecture 200

Question A: What is an Enterprise Edge ? A: What is an Enterprise Edge ? Consists of the Internet, VPN, and WAN modules connecting the enterprise with the service provider’s network. Consists of the Internet, VPN, and WAN modules connecting the enterprise with the service provider’s network. Cisco Enterprise Architecture Cisco Enterprise Architecture 300

Question A: What is a Service Provider Edge? A: What is a Service Provider Edge ? Provides Internet, Public Switched Telephone Network (PSTN) and WAN services. Provides Internet, Public Switched Telephone Network (PSTN) and WAN services. Cisco Enterprise Architecture Cisco Enterprise Architecture 400

Question IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) A: What is an IDS (Intrusion Detection System) and IPS (Intrusion Prevention System)? What two devices can be configured at the enterprise edge to prevent against malicious activity? What two devices can be configured at the enterprise edge to prevent against malicious activity? Cisco Enterprise Architecture Cisco Enterprise Architecture 500

Question A: What is a Packet Sniffer? A: What is a Packet Sniffer? Tool that analyzes traffic flow based on the source and destination of the traffic as well as the type of traffic being sent. Tool that analyzes traffic flow based on the source and destination of the traffic as well as the type of traffic being sent. Grab Bag Grab Bag 100

Question A: What is an Extranet ? A: What is an Extranet ? Private network or intranet that allows controlled access to individuals and companies outside the organization such as suppliers and contractors. Private network or intranet that allows controlled access to individuals and companies outside the organization such as suppliers and contractors. Grab Bag Grab Bag 200

Question A: What is Latency ? A: What is Latency ? Delay Grab Bag Grab Bag 300

Question A: What is Intranet ? A: What is Intranet ? Contains confidential information designed for company employees only. It is protected by a firewall. Contains confidential information designed for company employees only. It is protected by a firewall. Grab Bag Grab Bag 400

Question Grab Bag Grab Bag 500 A: What is a Teleconferencing ? A: What is a Teleconferencing ? Method for a group of people to communicate in real time online. Method for a group of people to communicate in real time online.

Question corporation, business or other entity that uses computers in a networked environment A: What is a corporation, business or other entity that uses computers in a networked environment. ? Final Jeopardy Final Jeopardy Define an enterprise Define an enterprise