1 / 24

Local Area Networks (LANs)

Local Area Networks (LANs). Local Area Networks (LANs) Course Lessons. Lesson 1: Overview of Local Area Networks Lesson 2: Wide Area Networks (WANs) Lesson 3: Networking and the Internet Lesson 4: LAN Topologies Lesson 5: Networking Models, Traffic and Devices Lesson 6: Transmission Media

saima
Télécharger la présentation

Local Area Networks (LANs)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Local Area Networks (LANs)

  2. Local Area Networks (LANs) Course Lessons • Lesson 1: Overview of Local Area Networks • Lesson 2: Wide Area Networks (WANs) • Lesson 3: Networking and the Internet • Lesson 4: LAN Topologies • Lesson 5: Networking Models, Traffic and Devices • Lesson 6: Transmission Media • Lesson 7: LAN Standards, Wireless Networking and Name Resolution • Lesson 8: Network Management

  3. 1. If you want to establish a DMZ using only one firewall, how many network interface cards (NICs) does the firewall need? a. One b. Two c. Three d. Four 2. Which of the following was the first global computer network? a. ARPANET b. NSFnet c. The World Wide Web d. CompuServe 3. What are two ways in which internal LAN security can be accomplished? Lesson 3Pre-Assessment Questions

  4. Lesson 3 Networking and the Internet The Need for Security Firewalls, Proxies and Security Zones Internet, Intranets and Extranets Remote Access and Virtual Private Network (VPN) Availability, Fault Tolerance, Backup and Recovery

  5. Networking and the Internet Figure 3-1: Multiple connections among servers

  6. Lesson 3 Networking and the Internet The Need for Security Firewalls, Proxies and Security Zones Internet, Intranets and Extranets Remote Access and Virtual Private Network (VPN) Availability, Fault Tolerance, Backup and Recovery

  7. Perimeter and Core Networks Figure 3-2: Perimeter and core

  8. Lesson 3 Networking and the Internet The Need for Security Firewalls, Proxies and Security Zones Internet, Intranets and Extranets Remote Access and Virtual Private Network (VPN) Availability, Fault Tolerance, Backup and Recovery

  9. Firewalls Figure 3-3: Firewall

  10. Demilitarized Zone (DMZ) Figure 3-4: DMZ using two firewalls

  11. Lesson 3 Networking and the Internet The Need for Security Firewalls, Proxies and Security Zones Internet, Intranets and Extranets Remote Access and Virtual Private Network (VPN) Availability, Fault Tolerance, Backup and Recovery

  12. Extranet Figure 3-5: CTP+ Partners and Instructors login page -- extranet

  13. Lesson 3 Networking and the Internet The Need for Security Firewalls, Proxies and Security Zones Internet, Intranets and Extranets Remote Access and Virtual Private Network (VPN) Availability, Fault Tolerance, Backup and Recovery

  14. Remote Access Server (RAS) Figure 3-6: Remote access

  15. Virtual Private Network (VPN) Figure 3-7: VPN tunnel

  16. Lesson 3 Networking and the Internet The Need for Security Firewalls, Proxies and Security Zones Internet, Intranets and Extranets Remote Access and Virtual Private Network (VPN) Availability, Fault Tolerance, Backup and Recovery

  17. Fault Tolerance – RAID Figure 3-8: Redundant array of inexpensive disks (RAID) 5

  18. RAID 1: Disk Mirroring Figure 3-9: Disk mirroring

  19. RAID 1: Disk Mirroring (cont'd) Figure 3-10: Mirror set

  20. Disk Duplexing Figure 3-11: Disk duplexing

  21. RAID 5: Disk Striping with Parity Figure 3-12: RAID 5 uses at least three hard disks

  22. RAID 5: Disk Striping with Parity (cont'd) Figure 3-13: Disk striping with parity

  23. Disaster Recovery Planning Table 3-1: Alternate site types

  24. Match each technology with the correct description Activity 3-1: Reviewing secure communication techniques

More Related