0% found this document useful (0 votes)
12 views52 pages

Chapter 1 CCNA1

Uploaded by

offei018
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views52 pages

Chapter 1 CCNA1

Uploaded by

offei018
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 52

Chapter 1:

Exploring the Network

Introduction to Networks

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
https://www.domo.com/learn/infographic/data-never-sleeps-11
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Some key highlights from the 2023 “Data Never Sleeps 11.0” report include:
• The AI Boom: Artificial Intelligence (AI) is making big waves in the digital
world. AI-driven platforms such as ChatGPT are reshaping the ways we work,
communicate and create, with users submitting 6,944 prompts every minute.
However, users haven’t forsaken their search engine habits, as searches on
Google total more than 6.3 million every minute (up from 5.9 million a year
ago).
• Entertainment Dominance: After a dip in engagement last year, X (formerly
Twitter) now sees 360,000 posts from users every minute, up from 347,000 in
Data Never Sleeps 10.0. Spotify users stream 24,000 hours of music, including
69,444 Taylor Swift songs. Instagram users are sending over 694,000 reels via
direct message every sixty seconds. And the world of streaming continues to
dominate, as collective viewers watch more than 40 years of streaming
content every single minute. As online platforms gain more activity and
engagement, the entertainment industry promises to never be the same.
• Transactions on a Tear: Digital spending continues its vast expansion. E-
commerce giant Amazon sees more than $455,000 in sales every minute and
on digital transaction app Venmo, users send $463,768 worth of payments
every minute, up 6% year over year. In the food sector, DoorDash diners
place orders totaling $122,785, up 60% from last year, reflecting the increased
reliance (and potentially, inflation) on food and food delivery services in this
digital age.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
https://www.domo.com/blog/data-never-sleeps-hits-double-digits/

https://www.youtube.com/watch?v=HOSGLh2mz7g
https://www.youtube.com/watch?v=oTcVRZxjjeU
https://www.youtube.com/watch?v=4I_Qjjmk0A0
https://www.youtube.com/watch?v=x3c1ih2NJEg
According to Statista, the total amount of data predicted to be
created, captured, copied and consumed globally in 2022 is 97
zettabytes, a number projected to grow to 181 zettabytes by 2025.
One zettabyte is equal to one sextillion bytes or 1021 (1,000,000,000,000,000,000,000)
bytes, or, one zettabyte is equal to a trillion gigabytes

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
• Over its relatively short history,
the internet has been a catalyst
for both the rise and demise of
new companies and platforms.
• By looking at which brands have
appeared in the graphic in earlier
years, we can roughly chart the
prominence of certain tech
segments, as well as observe
brands with the most staying
power.
• Platforms like Tumblr, Flickr, and
Foursquare showed some promise,
but eventually got omitted from the
graphic as they dropped off in
relevance.
• Meanwhile, tech companies like
Facebook, Amazon, and Google
have had impressive staying power,
evolving to become some of
the biggest companies in the world.
• In the process, they’ve caught up to
longer-standing titans like Apple and
Microsoft at the top of the food
chain.
• https://www.visualcapitalist.com/from-amazon-to-
zoom-what-happens-in-an-internet-minute-in-2021/
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
https://youtu.be/p3a5-pEBB4Y

https://datareportal.com/reports/digital-2023-october-global-statshot /

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
CHAPTER 1

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Dermot Clarke TU Dublin 2022

Globally Connected
No Boundaries
 Communication is almost as important to us as our reliance on
air, water, food, and shelter. In today’s world, through the use
of networks, we are connected like never before.
 Advancements in networking technologies are perhaps the
most significant recent changes in the world today.
 They are helping to create a world in which national borders,
geographic distances, and physical limitations become less
relevant presenting ever-diminishing obstacles.
 The Internet has changed the manner in which social,
commercial, political, and personal interactions occur.
 The immediate nature of communications over the Internet
encourages the creation of global communities. Global
communities allow for social interaction that is independent of
location or time zone.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Dermot Clarke TU Dublin 2022

Globally Connected
Networking Today
 Network has no boundary and
supports the way we:
• Learn
• Communicate
• Work
• Play

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Dermot Clarke TU Dublin 2022

Network Components
Host Roles
Every computer on a network is
called a host or an end device.
Servers are computers that Server Description
provide information to end Type
devices:
Email Email server runs email server software.
• email servers Clients use client software to access email.

• web servers Web Web server runs web server software.


Clients use browser software to access web
• file server pages.

Clients are computers that send File File server stores corporate and user files.
The client devices access these files.
requests to the servers to
retrieve information:
• web page from a web
server
• email from an email server

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Dermot Clarke TU Dublin 2022

Providing Resources in a Network


Clients and Servers
• All computers connected to a network that participate directly in network
communication are classified as hosts.
• Servers are computers with software that enable them to provide
information, like email or web pages, to other end devices on the network.
• Clients are computers with software installed that enable them to request
and display the information obtained from the server. An example of client
software is a web browser, like Chrome or FireFox

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Dermot Clarke TU Dublin 2022

Providing Resources in a Network


Peer-to-Peer
It is possible to have a device be a client and a server in a
Peer-to-Peer Network. This type of network design is only
recommended for very small networks.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Dermot Clarke TU Dublin 2022

LANs, WANs, and Internets


Components of a Network
There are three categories of network components:
1. Devices
2. Media
3. Services

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Dermot Clarke TU Dublin 2022

Components of a Network
End Devices
An end device is where a message originates from or where it is
received. Data originates with an end device, flows through the
network, and arrives at an end device.
Some examples of end devices are:
• Computers (work stations, laptops, file servers, web servers)
• Network printers
• VoIP phones
• Telepresence endpoint
• Security cameras
• Mobile handheld devices (such as smartphones, tablets, PDAs, and
wireless debit / credit card readers and barcode scanners)
 End devices are referred to as hosts.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Dermot Clarke TU Dublin 2022

Components of a Network
Network Infrastructure (Intermediary) Devices
Examples of intermediary network devices are:
 Network Access Devices (switches, and wireless access
points)
 Internetworking Devices (routers)
 Security Devices (firewalls)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Dermot Clarke TU Dublin 2022

Components of a Network
Network Media Different types of network
Communication across a
media have different
network is carried through a
medium which allows a features and benefits.
• The distance the media
message to travel from source
can successfully carry a
to destination. signal.
• The environment in
which the media is to be
installed.
• The amount of data and
the speed at which it
must be transmitted.
• The cost of the media
and installation

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Dermot Clarke TU Dublin 2022

Components of a Network
Network Representations
• Network diagrams,
often called topology
diagrams, use
symbols to represent
devices within the
network.
• Important terms to
know include:
• Network
Interface Card
(NIC)
• Physical Port
• Interface

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Dermot Clarke TU Dublin 2022

Components of a Network
Topology Diagrams
• Physical topology diagrams - Identify
the physical location of intermediary
devices and cable installation.
• Logical topology diagrams -
Identify devices, ports, and
addressing scheme.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Dermot Clarke TU Dublin 2022

Globally Connected
Providing Resources in a Network
 Networks of Many Sizes
Small Home / Office Networks
Medium to Large Networks
World Wide Network

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Dermot Clarke TU Dublin 2022

LANs and WANs


Types of Networks
Networks can vary
greatly in terms of:
• Size of the area
covered
• Number of users
connected
• Number and types
of services available
• Area of
responsibility
Two most common
types of networks:
• Local Area Network
(LAN)
• Wide Area Network
(WAN).

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Dermot Clarke TU Dublin 2022

LANs and WANs


Types of Networks
The two most common types of network infrastructures are:
 Local Area Network (LAN)
 Wide Area Network (WAN).

Other types of networks include:


 Metropolitan Area Network (MAN): A network infrastructure that spans a
physical area larger than a LAN but smaller than a WAN (e.g., a city).
 Wireless LAN (WLAN): Similar to a LAN but wirelessly interconnects
users and end points in a small geographical area.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Dermot Clarke TU Dublin 2022

LANs and WANs


Local Area Networks (LAN)

• An individual network usually spans a single geographical


area, providing services and applications to people within a
common organizational structure, such as a single business,
campus or region.
• A LAN is usually administered by a single organization.
• Provide high-speed bandwidth to internal devices

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Dermot Clarke TU Dublin 2022

LANs and WANs


Wide Area Networks (WAN)

 When a company or organization has locations that are separated by large


geographical distances, it may be necessary to use a telecommunications
service provider (TSP) to interconnect the LANs at the different locations.
• These networks that connect LANs in geographically separated locations are referred
to as Wide Area Networks (WANs).
• WANs use specifically designed network devices to make the interconnections
between LANs.
• Typically provide slower speed links between LANs.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Dermot Clarke TU Dublin 2022

LANs, WANs, and Internets


The Internet
The Internet is a worldwide collection of interconnected
networks (internetworks or internet for short).

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Dermot Clarke TU Dublin 2022

LANs, WANs, and Internets


Intranets and Extranets
• Intranet is a term often used to refer to a private
connection of LANs and WANs that belongs to an
organization, and is designed to be accessible
only by the organization's members, employees,
or others with authorization, i.e. TUDublin sites.
• An organization may use an extranet to provide
secure and safe access to individuals who work
for a different organization, but require access to
the organization’s data.
• Examples of extranets include:
• A company that is providing access to outside
suppliers and contractors.
• A hospital that is providing a booking system
to doctors so they can make appointments for
their patients.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Dermot Clarke TU Dublin 2022

LANs, WANs, and Internets


Internet Access Technologies
There are many different ways to connect users and
organizations to the Internet.
• Popular services for home users and
small offices include broadband cable,
Digital Subscriber Line (DSL) over
phone line, wireless WANs, and
mobile services.
• Organizations need faster connections
to support IP phones, video
conferencing and data center storage.
• Business-class interconnections are
usually provided by service providers
(SP) and may include: business DSL,
leased lines, and Metro Ethernet.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Dermot Clarke TU Dublin 2022

Connecting to the Internet


Connecting Home Small Office or Remote
Users to the Internet
• Cable - Typically offered by cable television service providers, the Internet data
signal is carried on the same cable that delivers cable television. It provides a high
bandwidth, always on, connection to the Internet.
• DSL - Digital Subscriber Lines provide a high bandwidth, always on, connection to
the Internet. DSL runs over a telephone line. In general, small office and home
office users connect using Asymmetrical DSL (ADSL), which means that the
download speed is faster than the upload speed.
• Cellular - Cellular Internet access uses a cell phone network to connect.
Wherever you can get a cellular signal, you can get cellular Internet access.
Performance will be limited by the capabilities of the phone and the cell tower to
which it is connected.
• Satellite - The availability of satellite Internet access is a real benefit in those
areas that would otherwise have no Internet connectivity at all. Satellite dishes
require a clear line of sight to the satellite.
• Dial-up Telephone - An inexpensive option that uses any phone line and a
modem. The low bandwidth provided by a dial-up modem connection is usually
not sufficient for large data transfer, although it is useful for mobile access while
travelling!!

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Dermot Clarke TU Dublin 2022

Connecting to the Internet


Connecting Home Small Office or Remote Users to the
Internet

Many homes and small offices are more commonly being connected directly with fiber
optic cables. This enables an ISP to provide higher bandwidth speeds and support
more services such as Internet, phone, and TV.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Dermot Clarke TU Dublin 2022

Connecting to the Internet


Connecting Businesses to the Internet

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Dermot Clarke TU Dublin 2022

Connecting to the Internet


Connecting Businesses to the Internet
 Dedicated Leased Line - Leased lines are actually reserved circuits
within the service provider’s network that connect geographically
separated offices for private voice and/or data networking. The circuits
are typically rented at a monthly or yearly rate. They can be
expensive.
 Ethernet WAN - Ethernet WANs extend LAN access technology into
the WAN. Ethernet is a LAN technology you will learn about in a later
chapter. The benefits of Ethernet are now being extended into the
WAN.
 DSL - Business DSL is available in various formats. A popular choice
is Symmetric Digital Subscriber Lines (SDSL) which is similar to the
consumer version of DSL, but provides uploads and downloads at the
same speeds.
 Satellite - Similar to small office and home office users, satellite
service can provide a connection when a wired solution is not
available.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Dermot Clarke TU Dublin 2022

Converged Networks
 Multiple services-multiple networks
Traditional telephone, radio, television, and
computer data networks each have their own
individual networks, every one of these services
required a different technology to carry its
particular communication signal.

 Converged networks
Technology advances are enabling us to
consolidate these disparate networks onto one
platform - a platform defined as a converged
network.
The flow of voice, video, and data traveling
over the same network eliminates the need to
create and maintain separate networks.
On a converged network there are still many
points of contact and many specialized
devices - for example, personal computers,
phones, TVs, personal assistants, and retail
point-of-sale registers - but only one common
network infrastructure.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Dermot Clarke TU Dublin 2022

Reliable Network
Supporting Network Architecture
As networks evolve, we are discovering that there are four
basic characteristics that the underlying architectures need to
address in order to meet user expectations:
1.Fault Tolerance
2.Scalability
3.Quality of Service (QoS)
4.Security

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Dermot Clarke TU Dublin 2022

Reliable Network
Fault Tolerance:
 The expectation is that the
Internet is always available.
 Limits the impact of a
failure, so that the fewest
devices are affected.
 Example multiple paths
between the source and
destination of a message. If
one path fails, the
messages can be instantly
sent over a different link.
Having multiple paths to a
destination is known as
redundancy.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Dermot Clarke TU Dublin 2022

Reliable Network
Fault Tolerance:
 Another way reliable networks is
by implementing a packet-
switched network.
 Packet switching splits traffic into
packets that are routed over a
shared network. A single
message, such as an email or a
video stream, is broken up into
multiple message blocks, called
packets.
 The routers within the network
switch the packets based on the
condition of the network at that
moment. This means that all the
packets in a single message could
take very different paths to the
destination.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Dermot Clarke TU Dublin 2022

Reliable Network
Scalable Networks
 A scalable network can expand quickly to support new users
and applications without impacting the performance of the
service being delivered to existing users.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
Dermot Clarke TU Dublin 2022

Reliable Network
Providing (QoS)
 Networks must provide secure, predictable, measurable, and, at
times, guaranteed services.
The packet-switched network architecture does not guarantee
that all packets that comprise a message will arrive on time, in
their correct in order, or even that they will arrive at all.
Examples of priority decisions for an organization might include:
 Time-sensitive communication - increase priority for services like
telephony or video distribution.
 Non time-sensitive communication - decrease priority for web page
retrieval or email.
 High importance to organization - increase priority for production control
or business transaction data.
 Undesirable communication - decrease priority or block unwanted activity,
like peer-to-peer file sharing or live entertainment

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
Dermot Clarke TU Dublin 2022

Reliable Network
Quality of Service
Voice and live video
transmissions require higher
expectations for those services
being delivered.
Have you ever watched a live
video with constant breaks and
pauses? This is caused when
there is a higher demand for
bandwidth than available – and
QoS isn’t configured.
• Quality of Service (QoS) is the
primary mechanism used to
ensure reliable delivery of
content for all users.
• With a QoS policy in place, the
router can more easily manage
the flow of data and voice
traffic.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
Dermot Clarke TU Dublin 2022

Reliable Network
Network Security There are two main types of
network security that must be
addressed:
• Network infrastructure security
• Physical security of network devices
• Preventing unauthorized access to the
devices
• Information Security
• Protection of the information or data
transmitted over the network

Three goals of network security:


Confidentiality – only intended
recipients can read the data
Integrity – assurance that the data has
not be altered with during transmission
Availability – assurance of timely and
reliable access to data for authorized
users

CIA
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
Dermot Clarke TU Dublin 2022

Network Security
Security Threats
•Network security is an integral
part of networking regardless of
the size of the network.
•The network security that is
implemented must take into
account the environment while
securing the data, but still
allowing for quality of service
that is expected of the network.
•Securing a network involves
many protocols, technologies,
devices, tools, and techniques
in order to secure data and
mitigate threats.
•Threat vectors might be
external or internal.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
Dermot Clarke TU Dublin 2022

Network Security
Security Threats (Cont.)
• External Threats:
• Viruses, worms, and Trojan horses
• Spyware and adware
• Zero-day attacks
• Threat Actor attacks
• Denial of service attacks
• Data interception and theft
• Identity theft

• Internal Threats:
• lost or stolen devices
• accidental misuse by employees
• malicious employees

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
Dermot Clarke TU Dublin 2022

Network Security  Security must be


Security Solutions implemented in multiple
layers using more than one
security solution.
 Network security components
for home or small office
network:
 Antivirus and antispyware
software should be installed
on end devices.
 Firewall filtering used to block
unauthorized access to the
network.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
Dermot Clarke TU Dublin 2022

Network Security
Security Solutions (Cont.)
• Larger networks have additional
security requirements:
• Dedicated firewall system
• Access control lists (ACL)
• Intrusion prevention systems
(IPS)
• Virtual private networks (VPN)
• The study of network security starts
with a clear understanding of the
underlying switching and routing
infrastructure.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
Dermot Clarke TU Dublin 2022

Network Trends
New trends
The role of the network must adjust and continually transform in
order to be able to keep up with new technologies and end user
devices as they constantly come to the market.

Some of the top trends


include:
 Bring Your Own Device
(BYOD)
 Online collaboration
 Video
 Cloud computing

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
Dermot Clarke TU Dublin 2022

Network Trends
Bring Your Own Device
Bring Your Own Device (BYOD) allows
users to use their own devices giving
them more opportunities and greater
flexibility.
BYOD allows end users to have the
freedom to use personal tools to access
information and communicate using
their:
• Laptops
• Netbooks
• Tablets
• Smartphones
• E-readers
BYOD means any device, with any
ownership, used anywhere.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
Dermot Clarke TU Dublin 2022

Network Trends
Online Collaboration

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
Dermot Clarke TU Dublin 2022

Network Trends
Online Collaboration
 Individuals want to connect to the network, not only for access
to data applications, but also to collaborate with one another.
 Collaboration is defined as “the act of working with another or
others on a joint project.” Collaboration tools, give employees,
students, teachers, customers, and partners a way to instantly
connect, interact, and achieve their objectives. Example Cisco
Webex Teams, Slack, Google Docs, Microsoft Teams.
 For businesses, collaboration is a critical and strategic priority
that organizations are using to remain competitive.
Collaboration is also a priority in education. Students need to
collaborate to assist each other in learning, to develop team
skills used in the work force, and to work together on team-
based projects.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
Dermot Clarke TU Dublin 2022

Network Trends
Video Communication
 Another trend in networking that is critical to the
communication and collaboration effort is video. Video is
being used for communications, collaboration, and
entertainment. Video calls can be made to and from
anywhere with an Internet connection.
 Video conferencing is a powerful tool for communicating with
others at a distance, both locally and globally.
 Video is becoming a critical requirement for effective
collaboration as organizations extend across geographic and
cultural boundaries.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
Dermot Clarke TU Dublin 2022

Network Trends
Cloud Computing
Cloud computing allows us to store personal files or backup our
data on servers over the internet.
• Applications can also be accessed using the Cloud.
• Allows businesses to deliver to any device anywhere in the world.

Cloud computing is made possible by data centers.


• Smaller companies that can’t afford their own data centers, lease
server and storage services from larger data center organizations in
the Cloud.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
Dermot Clarke TU Dublin 2022

Network Trends
Technology Trends in the Home

• Smart home technology is a


growing trend that allows
technology to be integrated into
every-day appliances which
allows them to interconnect
with other devices.
• Ovens might know what time to
cook a meal for you by
communicating with your
calendar on what time you are
scheduled to be home.
• Smart home technology is
currently being developed for
all rooms within a house.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
Dermot Clarke TU Dublin 2022

Network Trends
Powerline Networking

• Powerline networking can allow devices to connect to a LAN where data


network cables or wireless communications are not a viable option.
• Using a standard powerline adapter, devices can connect to the LAN
wherever there is an electrical outlet by sending data on certain
frequencies.
• Powerline networking is especially useful when wireless access points
cannot reach all the devices in the home.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52

You might also like