0% found this document useful (0 votes)
88 views43 pages

Learn Basics and Be Certified Gear Up With Trends To Learn Computer Networking

The document discusses how to learn computer networking basics and get certified. It covers network concepts, trends in computer networking like 5G and WiFi 6, and how artificial intelligence and machine learning can help address network problems. The author is a network engineer who provides information on acquiring networking certifications and getting a job in the field of computer networking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views43 pages

Learn Basics and Be Certified Gear Up With Trends To Learn Computer Networking

The document discusses how to learn computer networking basics and get certified. It covers network concepts, trends in computer networking like 5G and WiFi 6, and how artificial intelligence and machine learning can help address network problems. The author is a network engineer who provides information on acquiring networking certifications and getting a job in the field of computer networking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 43

“LEARN BASICS AND BE CERTIFIED; GEAR UP WITH

TRENDS TO LEARN COMPUTER NETWORKING”

- Neil Stephen Mortel, JNCIA


COURSE CONTENTS
 Networks: Basic Concepts
 How to Start Studying about Computer
Networks
 Computer Networks Trends 
 Acquiring Network Certifications
 How to Get a Job in Computer Networking
WHO AM I?
 Network Engineer in Ubiquity Global
Services
 JNCIA – Junos, PhilNITS Passer
 2 years with Accenture as a Technical
Support Representative and Network
Operations Associate
THE COMPUTER NETWORK
 A computer network is a group of computers/devices(Nodes)
that use a set of common communication protocols over digital
interconnections for the purpose of sharing resources located on
or provided by the network nodes.
 The nodes of a computer network may include personal
computers, servers, networking hardware, or other specialised or
general-purpose hosts.
 The interconnections between nodes are formed from a broad
spectrum of telecommunication network technologies, based on
physically wired, optical, and wireless technologies.
 A communication protocol is a set of rules for exchanging
information over a network: physically wired, optical, and
wireless
THE NETWORK DIAGRAM
Wired Network PC Firewall The Internet

Fiber Optic Network Cable

Router
Switch

Server Other LANS

Wireless Network
THE ADVANTAGES/USES OF NETWORK
Simultaneous Access
 There are moments in any business when several workers
may need to use the same data at the same time.
Shared Peripheral Devices

Personal Communications
 Videoconferencing
 Voice over Internet Protocol (VoIP):-VoIP transmits the sound
of voice over a computer network using the Internet Protocol
(IP ) rather than sending the signal over traditional phone
wires
Easier Data Backup
THE NETWORKING DEVICES(NODES)
1. NIC Card
2. Repeater
3. Hub
4. Switch
5. Bridge
6. Router
7. Gateway
8. Firewall
OSI MODEL
TYPES OF NETWORKS
1. Personal Area Network (PAN)
2. Local Area Network (LAN)
3. Campus Area Network (CAN)
4. Metropolitan Area Network (MAN)
5. Wide Area Network (WAN)
6. Storage-Area Network (SAN)
7. Virtual Private Network (VPN)
8. Client Server Network
9. Peer to Peer Network (P2P)
1. PERSONAL AREA NETWORK
1. Personal Area Network (PAN) is a
computer network used for data
transmission amongst devices
such as computers, telephones,
tablets and personal digital
assistants.
2. Also Known as HAN (Home Area
Network)
3. PANs can be used for
communication amongst the
personal devices themselves
(interpersonal communication), or
for connecting to a higher level
network and the Internet (an uplink)
where one "master" device takes
up the role as internet router.
2. LOCAL AREA NETWORK
 Xerox Corporation worked in
collaboration with DEC and
Intel to create Ethernet, which
is the most pervasive LAN
architecture used today.
 Ethernet has evolved and has
seen significant improvements
in regard to speed and
efficiency.

 An upside of a LAN is fast data transfer with data speed that can reach
up to 10Gbps.
 Other significant LAN technologies are Fiber Distributed Data Interface
(FDDI) and token ring.
3. CAMPUS AREA NETWORK
 Larger than LANs, but smaller
than metropolitan area networks
these types of networks are
typically seen in universities,
large K-12 school districts or
small businesses.
 They can be spread across
several buildings that are fairly
close to each other so users can
share resources
4. METROPOLITAN AREA NETWORK

1. A MAN is larger than a LAN but smaller than or equal in size to a WAN.
2. The size range anywhere from 5 to 50km in diameter.
3. MANs are typically owned and managed by a single entity.
4. This could be an ISP or telecommunications company that sells its services
to end-users in that metropolitan area.
5. For all intents and purposes, a MAN has the same characteristics as a WAN
with distance constraints.
5. WIDE AREA NETWORK

• A Wide Area Network exist over a large area


• Data travels through telephone or cable lines
• Usually requires a Modem
• The world’s largest Wide Area Network in the Internet
6. STORAGE AREA NETWORK
 SAN may be referred to as a Sub network or special purpose network.
 Its special purpose is to allow users on a larger network to connect
various data storage devices with clusters of data servers.
 SANs can be accessed in the same fashion as a drive attached to a
server.
7. VIRTUAL PRIVATE NETWORK
 VPN is a private network that can
access public networks remotely. VPN
uses encryption and security protocols
to retain privacy while it accesses
outside resources.
 When employed on a network, VPN
enables an end user to create a virtual
tunnel to a remote location. Typically,
telecommuters use VPN to log in to
their company networks from home.

 Authentication is provided to validate the identities of the two peers.


 Confidentiality provides encryption of the data to keep it private from
prying eyes.
 Integrity is used to ensure that the data sent between the two devices or
sites has not been tampered with.
8. CLIENT/SERVER NETWORK
 In a client/server arrangement,
network services are located on a
dedicated computer called a server.
 The server responds to the requests
of clients.
 The server is a central computer that
is continuously available to respond
to requests from clients for file, print,
application, and other services.

 Most network operating systems adopt the form of a client/server


relationship.
 Typically, desktop computers function as clients, and one or more
computers with additional processing power, memory, and specialized
software function as servers.
9. PEER TO PEER NETWORK

 Usually very small networks


 Each workstation has equivalent capabilities and responsibilities
 Does not require a switch or a hub.
 These types of networks do not perform well under heavy data
loads.
THE INTERNET
The simplest How Information Travel Through the Internet
definition of A page on the Internet—whether it's full of words, images or
the Internet both—doesn't come to you in one shipment. It's translated
into digital information, chopped into 1500 byte pieces called
is that it's a PACKETS, and sent to you like a puzzle that needs to be
network of reassembled. Each part of the packet has a specific
function:
computer Sequence ID
ID’s where the information
networks Header
Provides the
belongs in relation to the rest
of the information
complete
destination
address for the End of Message
packet ID’s the end of the
packet

Data Block
The portion of the overall information
carried by the packet
THE INTERNET
How Information Travel Through the Internet
When you connect to a Web site through an ISP and start exchanging information,
there isn't a fixed connection between your computer and the Web server computer
hosting the Web site. Instead, information is exchanged using the best possible path
at that particular time. Special computers called routers determine these paths,
avoiding slow links and favoring fast ones.

Your Web
Computer ISP Servers
Routers
HOW TO START STUDYING ABOUT COMPUTER NETWORKS

• Know the basics, familiarize yourself with the


Key Concepts
• Sign up for Online Courses 
• Take in-person classes
• Watch YouTube tutorials
• Pay close attention to your Cisco Subjects
– proven and tested method!
COMPUTER NETWORKS TRENDS 
1. 5G AND WIFI-6 TECHNOLOGY
      5G or fifth generation cellular technology. It is characterized
by increased speed, reduced latency and improve flexibility in
wireless services. It helps organizations to mobilize workforces,
extend automation, supporting new applications with increased
network capacity and high data rates. 5G gives seamless open
roaming capabilities between cellular and Wi FI access. 5G
would solve the issue of many wireless devices connected at
once – and IoT makes it worse by slowing wireless network
performance. Wi Fi 6 infrastructure is ready to go however Wi Fi
6 capable devices such as computers and mobile phones
manufacturers need to adopt new standards.
2. ARTIFICIAL INTELLIGENCE AND MACHINE
LEARNING
     Complex network and business problems can be addressed
in real time using AI and ML capabilities. Application of user
cases ranging from small cities, manufacturing, security, and
networking. ML can make predictions based on network data
and AI can take intelligent actions based on those prophecies.
Advanced analytics into automation systems will bring in self-
operating networks.
3. AUGMENTED REALITY AND VIRTUAL REALITY

     Augmented reality (AR) and virtual reality (VR) technologies


empower the applications and customer experiences.  AR is
mainly used on smartphone and tablets to present interior
design, allowing shopkeepers to have virtual presentation of
furniture.
4. CLOUD COMPUTING

      Cloud allows faster transition to remote work and help to


organize remote workplace more efficiently and this contributed
to business continuity during any crisis. Maintaining consistent
network and security policies across multiple clouds using multi
cloud policy management.
5. DEVOPS

     DevOps is tied up to software development and IT. DevOps


improve relationship between network service designers and
engineers to make operational changes to the services.
6. DIGITAL TRANSFORMATION

     It enables adoption of digital technology to transform services


or businesses, by replacing on digital or manual processes with
digital processes. Process of digitization transforms into digital
forms that are processed, stored, and transmitted via digital
devices and networks.
7. INTENT-BASED NETWORKING (IBN)

     This approach bridges the gap between business and IT.


Business intent is captured and continuously aligned to end to
end network related to application service levels, security
policies, compliance, operational and business processes.
Virtual segmentation of IoT devices from remaining network will
be one of the major tasks for Networking teams. The creation of
secure zones called Microsegments which will allow IoT devices
to operate on same corporate network and reducing the risks to
other parts of the network.
8. INTERNET-OF-THINGS (IOT)

     IoT is all about connecting the unconnected. Majority of


objects are unconnected however with IoT devices are acquiring
capabilities to communicate and connect with other devices and
people changing the way we work.
9. DATA SECURITY

     Usability and integrity of network is crucial to security.


Effective network security manages network access effectively
and stops a variety of threats entering or spreading within the
network
10. SD-WAN
     SD-WAN is a software-based approach to manage Wide Area networks
(WANs). This technology lowers operational costs and improvement in
resource usage in multisite deployments. Network administrator using this
SD-WAN technology can use bandwidth more efficiently and help to ensure
enhanced performance for business-critical applications without
compromising data security and privacy.
     SD concept in SD-WAN technologies separate the control plane from
the data plane and centralize the control plane from which multiple devices
are controlled. Control plane acts like a shared service which is accessible
to all administrators within an organization or in a multi tenancy
environment.
     SD-WAN supports on premises data centers, Software-as-a-service
(SaaS) and public cloud infrastructure-as-a-service (laaS) applications to
optimize their performance.  SD-WAN allows proper security for each user
and devices irrespective of their physical location.
NETWORK CERTIFICATIONS TO ACQUIRE
1. CISCO CERTIFIED NETWORK ASSOCIATE (CCNA)
Widely regarded as a staple in network
certifications, the CCNA is an associate-level (early
career) credential that covers a wide range of
networking fundamentals. Cisco is one of the
largest companies in the networking industry,
making the credential useful to have for many
network professionals. Cisco also offers entry
(CCT), professional (CCNP), and expert-level
certifications (CCDE). 
• Cost: $300
• Requirements: Requires one exam. No
prerequisites.
• What’s being tested: Network access, IP
connectivity, IP services, security, automation,
and programmability
2. JUNIPER NETWORKS CERTIFIED ASSOCIATE - JUNOS (JNCIA - JUNOS)

The JNCIA-Junos is the associate-level


certification for Juniper Networks technologies. It’s
the first step required for those who want to go on
to take more advanced certifications from Juniper
Networks in data center technologies, enterprise
routing and switching, or service provider routing
and switching.
• Cost: $200
• Requirements: Requires one exam. No
prerequisites.
• What’s being tested: Junos OS fundamentals
like software architecture and transit traffic
processing, configuration basics, routing policy,
and firewall filters
HOW TO GET A JOB IN COMPUTER NETWORKING
• Create a one-pager resume containing work
experience, educational background, skills,
achievements and references
• Always be confident, don’t be afraid to start anew and
get out of your comfort zone
• Always think ahead and recognize that the Network
Path in IT is a high-paying job in the PH and especially
abroad
• Don’t lose hope if your application gets rejected, create
a competitive LinkedIn Profile and don’t quit on applying
on Jobstreet – this is what I used on applying to
Accenture and Ubiquity
NETWORK AND COMPUTER SYSTEMS ADMINISTRATORS
     Network or computer systems administrators help ensure an
organization’s computers, software and operating systems work
properly and stay up to date. They install and support local area
networks (LAN) and wide area networks (WAN), depending on the
number of people using the network and the size of the
geographical area. Network administrators are often the “go-to”
person for major computer or technical issues.

Average salary (US): $87,070 per year, $41.86 per hour (source: 
Bureau of Labor Statistics)*
Job outlook: 5% increase from 2020-2030 (source: 
Bureau of Labor Statistics)*
NETWORK AND COMPUTER INFORMATION SYSTEMS MANAGER

      Network or computer information systems managers plan,


coordinate and direct the administration and implementation of
information technology in the workplace. Their role includes
researching and providing oversight on a variety of programs,
including internet operations, network security and user access
permissions. Information systems managers also may create or
help inform organizational guidelines and policies for computer
usage.

Average salary: $152,860 per year, $73.49 per hour (source: 


Bureau of Labor Statistics)*
Job outlook: 11% increase from 2020-2030 (source: 
Bureau of Labor Statistics)*
NETWORK ENGINEER
     Network engineers, also called network architect or computer systems
engineers, design networks of all sizes. They often work with upper
management, project managers and other engineers to design and
implement network configurations, troubleshoot issues, oversee or carryout
network monitoring, and configure security systems, such as firewalls.
Computer systems engineers also maintain the connectivity of network
including data, voice, calls, video, and wireless network services.
Generally, people working in these roles have more education, such as a
master’s degree, and may have more responsibilities than a network
administrator.

Average salary: $111,130 per year, $53.43 per hour (source: 


Bureau of Labor Statistics)*
Job outlook: 5% increase from 2020-2030 (source: 
Bureau of Labor Statistics)*
COMPUTER SYSTEMS ANALYST
     Computer systems analysts are responsible for ensuring all
computers within a network effectively communicate with one
another. They do this by creating hardware and software
configurations that help improve the overall system’s functionality.
Network analysts often assist with both business and technological
aspects within an organization; for example, they may be asked to
find a tech solution for a business-related problem.
Network analysts often report to a network manager while still
working closely with a team of programmers and engineers.

Average salary: $93,610 per year, $45.01 per hour (source: 


Bureau of Labor Statistics)*
Job outlook: 7% increase from 2020-2030 (source: 
Bureau of Labor Statistics)*
COMPUTER NETWORK SUPPORT SPECIALIST
     When you call the IT help desk, you generally speak with a network
service technician or computer network support specialist. They
provide support to customers who are experiencing computer-related
problems. They troubleshoot components, hardware and software,
including printers, scanners, email and work processes.
Because of the variety of issues they may be asked to assist with,
computer support specialists must have a wide range of computer
knowledge. They can help plan and analyze costs for an organization’s
computer network. They may also determine the necessary
configurations, connections and tools.

Average salary: $68,050 per year, $32.72 per hour (source: 


Bureau of Labor Statistics)*
Job outlook: 7% increase from 2020-2030 (source: 
Bureau of Labor Statistics)*
SAMPLE RESUME
REFERENCES
• https://networkinterview.com/top-10-networking-
technology-trends/
• https://www.coursera.org/articles/network-certifications-
for-your-it-career
• https://www.bmc.com/blogs/osi-model-7-layers/
• https://www.herzing.edu/technology/computer-
networking/bachelors-degree

You might also like