CCNA 4 Networking Course

CCNA 4 Networking Course

Welcome to the last part of CCNA Routing and Switching that is Networking course. At the end of this CCNA Networking Course, you can perform the configuration and troubleshooting of network devices and solve common problems with data link protocols. Students will also develop the skills and gain the necessary knowledge to implement IPSec and virtual private network (VPN) operations in a complex network. So let check the content of CCNA Networking Course.
In this CCNA Networking Course, you will learn the criteria for selecting network devices and WAN technologies to meet the requirements of the network. In this grade:

  • Different WAN technologies and their benefits are describe.
  • Describe the operations and benefits of private virtual networks (VPNs) and tunneling.
  • How to configuration and troubleshooting of serial connection operations.
  • How to configuration and troubleshooting of broadband connections.
  • What is the network architectures.
  • How to configuration and troubleshooting of IPSec tunneling operations.
  • How to control and resolution of network operations problems through syslog, SNMP and NetFlow.

Chapter 1: Hierarchical Network Design - Ccna 4

Networks must meet the current needs of organizations and admit emerging technologies as new technologies are adopted. Network design principles and models can help a network engineer design and build a network that is flexible, resilient and easy to manage.
In this chapter, the concepts, principles, models and architectures of the network design are presented . The benefits obtained through a systematic design approach are covered. The emerging technological trends that affect the evolution of networks are also analyzed.
Following topics are discuss here:

Chapter 2: Connection to the Wan - Ccna 4

Companies must connect LAN networks to provide communication between them, even when these LANs are far apart. Wide area networks (WAN) are used to connect remote LANs. A WAN can provide coverage to a city, a country or a global region. WANs are owned by a service provider, and companies pay a fee to use the provider's WAN network services.
For WANs, different technologies are used than for LANs. In this chapter, WAN standards, technologies and purposes are presented and the choice of appropriate WAN technologies, services and devices is covered to meet the changing business requirements of a growing company.
Topics are as under:


Chapter 3: Point-to-point Connections - Ccna 4

One of the most common types of WAN connections, especially in long-distance communications, is point-to-point connections, which are also called “serial connections” or “leased lines”. Because, in general, these connections are provided by a service provider, such as a telephone company, the boundaries between what the provider manages and what the customer manages must be clearly established.
In this chapter, the terms, technology and protocols used in serial connections are covered . The point-to-point protocols (PPP) and HDLC are presented. PPP is a protocol capable of handling authentication, compression and error detection, controlling link quality, and logically grouping several serial connections to share the load.
The topics covered:


Chapter 4: Frame Relay - Ccna 4

Frame Relay is an alternative to dedicated WAN leased lines, which are more expensive. Frame Relay is a high performance WAN protocol that works on the physical and data link layers of the OSI reference model. While more modern services such as broadband and metropolitan Ethernet reduced the need for Frame Relay in many locations, Frame Relay is still a viable option in many sites around the world. Frame Relay provides a cost-effective solution for communications between several remote sites through a single access circuit from each site to the provider.
In this chapter, the fundamental concepts of Frame Relay are presented . Frame Relay configuration, verification, and troubleshooting tasks are also covered.


Chapter 5: Network Address Translation for IPv4 Ccna 4

All public IPv4 addresses used on the Internet must be registered in a regional Internet registry (RIR). Organizations can lease public addresses from an SP, but only the registered owner of a public Internet address can assign that address to a network device. However, with a theoretical maximum of 4300 million addresses, the IPv4 address space is very limited.
When Bob Kahn and Vint Cerf first developed the TCP / IP protocol suite that included IPv4 in 1981, they never imagined what the Internet could become.
With the proliferation of personal computing devices and the arrival of the World Wide Web, it soon became clear that the 4300 million IPv4 addresses would not be enough. The long-term solution was the IPv6 protocol, but more immediate solutions were needed to address address depletion. In the short term, the IETF implemented several solutions, including translation of network addresses (NAT) and private IPv4 addresses defined in RFC 1918.
In this chapter, we discuss how NAT is used in combination with private address space to more effectively conserve and use IPv4 addresses, in order to provide Internet access to networks of all sizes.
In this chapter you will learn about the following topics:


CHAPTER 7: SITE-TO-SITE CONNECTIVITY SECURITY - CCNA 4

Security is a concern when public Internet is used to conduct business. Private virtual networks (VPNs) are used to ensure data security over the Internet. A VPN is used to create a private tunnel through a public network. Data security can be provided by using encryption in this tunnel over the Internet and with authentication to protect data against unauthorized access.
In this chapter, the concepts and processes related to VPNs are explained , as well as the benefits of VPN implementations and the underlying protocols required to configure VPNs.
The topics covered:


Chapter 8: Network Supervision - Ccna 4

Monitoring a functioning network can provide information to a network administrator to proactively manage the network and report network usage statistics to others.
Link activity, error rates and link status are some of the factors that help a network administrator determine the status and use of a network. Collecting and reviewing this information over time allows a network administrator to view and project the growth, and can help the administrator detect and replace a defective part before it fails completely.
This chapter covers three protocols that a network administrator can use to control the network . Syslog, SNMP and NetFlow are popular protocols with different strengths and weaknesses. Together they provide a good set of tools to understand what happens in a network. The NTP protocol is used to synchronize the time across the devices, which is especially important when trying to compare the log files of different devices.
Table of Content:


No comments:

Post a Comment