Submit ArticleSubmit Article
Written by: Cresencio Daffon Jr. | 18 Apr, 2011Network categories
Various types of personal networks are known according to their specific dimension that involves machines installed and utilized, bandwidth, and coverage. Networks that are private are usually those networks that belong to a group of companies.
These networks are categorized into three, namely:
Wide Area Network
Metropolitan Area Network
Local Area Network
Other network categories
There are other two network categories, such as:
1. Campus Area Networks – similar to Metropolitan Area Network but it has limited data transfer speed between the Local Area Network of each individual network
2. Tiny Area Network – with smaller coverage of connectivity about two to three devices compared to Local Area Network
Wide Area Network
Over great distances of geographical locations, the extended network or Wide Area Network is able to perform connectivity links between several Local Area Networks. With respect to the connections cost boosting along with range and may be lower, the Wide Area Network speed may vary. The Wide Area Networks run making use of routers that may select the best path with regards to the information for a network node to be reached. Probably the widely-known Wide Area Network would be the Internet.
Metropolitan Area Network
The connectivity between various physically near Local Area Networks together at high speeds with only an area of about estimated kilometers of a few dozen. Therefore, a Metropolitan Area Network enables two distant links connection as if these are located on the same Local Area Network.
A Metropolitan Area Network is created out of modems or switches linked to the other party together with fiber optic cables or high-velocity connectivity links.
Local Area Network
Local Area Network is a group of computer systems which all belong to the same organization and that are interconnected in just a small geographical location where a single network is being utilized, and most of the » Continue.. |
Written by: Cresencio Daffon Jr. | 16 Apr, 2011Security
The resources of network control access is the security management’s goal based on guidelines locally so that the unintentional or intentional sabotaging of network will not pushed through and without the right authorization the access on sensitive data is not possible. Access refusal for those who entered access codes that are not correct and monitoring of the users network resource logging on are the functions performed by the subsystem of the security management.
The subsystems of management for security are done through network resources partitioning into areas for unauthorized and authorized. Some users who are strangers in the company do not have any rights to access any resource of the network and it is also inappropriate to have information access from a specific department as for other users of network internally.
There are several functions performed by the subsystems of the security management because it determines the mapping between set of users and the resources of sensitive network as well as other entities, files, and systems for the identification of resources of sensitive network. Likewise, resources of sensitive network inappropriate access logging and resources of sensitive network points of access are also being monitored.
For an effective network operation, the fault management’s main goal is to fix, log, detect, and user notification of problems in network. The elements of management that the network of ISO implements all throughout is the management of fault because it can cause unlikely degradation of the network or frequent downtime error.
The problem isolation and symptoms determination are the things involved in fault management. On subsystems that are generally important, there is a tested solution as the problem is solved, and then there is a recording of the problem resolution and detection.
For the appropriate regulation of group or individual users on the » Continue.. |
For knowing the best route, there are various metrics used by algorithms of routing. The multiple metrics is the one used for basing the selection of route that is combined in one hybrid metric through algorithms of routing that are of high regard. The metrics such as cost of communication, bandwidth, load, reliability, delay, and length of path is used.
The metric for routing that is widely used is the length of path. The administrators of network are allowed by some protocols for routing to designate costs of arbitrary to an individual link of network. The associated costs total is the length of path with each link that passes through on this situation. The hop count is defined by different protocols of routing; the number of internetworking products like routers that must be taken on the way to a destination from a source that traversed is specified by this metric.
The algorithms of routing context, reliability is described in the rate of bit-error terms of the link of each link of network that is referred to as dependability. It is more usual than others that some link of network have tendency to go down. Some links of network have the possibility to be fixed faster or easier compared to different links after the failure of a network. In the reliability ratings designation, any factors of reliability can be taken accountable which through administrators of network, the values of numeric arbitrary is most of the time designated » Continue.. |
Keep in mind it is not true that devices like switches and bridges are complicated because the frames are forwarded to its destination, based on the frames information the decisions are forwarded, and frames incoming are analyzed. For instance, each frame has the whole path to the destination like the bridging of source and route. On the other hand, a move toward the destination makes the frames forwarded in situations wherein the bridging is transparent. Both switching and bridging main advantage is the transparent protocol of the upper layer wherein its information testing is not a requirement due to the fact that at the layer link these devices perform its operations. It only comes to say that the protocol of any layer of network can represent fast traffic forwarding. The traffic of networks such as Xerox Network Systems, Internet Protocol/Transmission Control Protocol, Apple Talk, and DECnet is common for a bridge to move.
The fields of Layer 2 is where the frames filtering of bridges is based, like for instance, instead of forwarding, rejection is programmed for a bridge to do for frames generally specific from a network. There are parameters used for bridges filtering task due to the reason that the information of the link layer usually includes the upper-layer protocol reference. For dealing with multicast packets and broadcast that are » Continue.. |
Data transfer is one mode composing a virtual circuit that is established permanently and this is used in constant transfer of data between devices. The bandwidth use linked with the virtual circuit creation and stoppage is lowered with virtual circuit permanent category, but because of the continuous availability of the virtual circuit, the price goes higher. For service purposes, when placing an order, the service provider configures the virtual circuit permanent category in general.
While on the other hand, when transmission is done, virtual circuits that is created on demand and is stopped, it’s called virtual circuit’s switched category. There are three phases of communication for virtual circuit’s switched category, namely: termination of circuit, establishment of circuit, and transfer of data. The creation of virtual circuit between devices of destination and the source are the things involved in the phases of establishment. The data transmission between the devices over the virtual circuit is what is involved in transferring of data, and the tearing down of virtual circuit between devices of destination and the source is what is involved in the stoppage phase of the circuit. Whenever there is a sporadic transfer of data between devices, you may rely on what the switched virtual circuit can do because it can make the bandwidth higher to use for creating circuit and the phases of stoppage, but with the continuous availability of virtual circuit, the price becomes lower.
On the other hand, for Wide Area Network connectivity, there are techniques that the dialup services offered which are cost-effective. The dial backup and Dial-on-Demand Routing are two implementations of dialup that are widely-known.
When sending » Continue.. |
Written by: Cresencio Daffon Jr. | 14 Apr, 2011When two or more devices of network have to send data at the same time, contention of media is present. Some method type must be used for letting one device access at a time for the network media because simultaneous network communication on various devices is not possible; and it is done by passing the token and through collision detect/carrier sense multiple access, which are the two primary ways available.
Take note that the network media is the one being contended by devices for network in Ethernet which is a technology involving the use of collision detect / carrier sense multiple access, the one used by networks. The device listens first to check if the network is being used by another device when sending data is needed to be done and if the network is not in use, data sending begins.
For the device to see if there is another occurrence of a collision, it then again performs another listening task after transmission is done. When simultaneous sending of data by two devices occurs, there is a collision. Before the device sends its data again, a time with random length is awaited by an individual device as soon as a collision takes place. Take note that between two devices, a collision will not happen like in most instances.
There will be more collision to happen as the network becomes busier due to this contention type of network. As soon as the network devices increase, there is a fast degrading of the Ethernet’s performance. The token, frame of the network that is specially created, is passed from device to device within the network in the likes of Fiber Distributed Data Interface and Token Ring. Before sending a data, the device has to wait until the token is obtained.
For a network media » Continue.. |
Written by: Cresencio Daffon Jr. | 13 Apr, 2011Internetworking Technologies History
Based on the information gathered, attached terminals and mainframes used made up time-sharing networks which are said to be as the first networks. Both the architecture of Digital network and Systems Network Architecture (SNA) of International Business Machines (IBM) had implemented these network facilities.
With the revolution of personal computers, the LANs or Local Area Networks have changed dramatically. The emerging need for messaging, files exchange, printers, and file servers has been the main purpose of Local Area Network for binding a lot of users even within a small geographical location.
On the other hand, for making it possible to connect people from distant locations, Local Area Network was certainly not enough. From there arise the relatively useful system of WANs or Wide Area Network. For Local Area Networks connection, the technologies used are in the likes of radio links, ADSL, Frame Relay, and Automated Teller Machine. Take note that on a daily basis, there arise a number of latest methods for the connection of Local Area Network that are scattered.
Presently, there is a wide use of internetworks that are switched and Local Area Networks that are of high-speed for supporting application that have high-bandwidth such as videoconferencing and multimedia messaging or functions and because they primarily operate at an extremely high speed connectivity.
Internetworking Technologies Basics
We are going to discuss terms and concepts that are fundamental to address the internetworking language that is ever changing and continuously updating to come along with changes in the world of Information Technology. Before we go any further, let us talk about what Internetworking is.
When we say internetwork, it is referred to the procedures, products, and industry used for meeting the obstacles of internetworking creation and administration. Basically speaking, when you say internetwork, this is one large network that function for » Continue.. |
Written by: Cresencio Daffon Jr. | 16 Mar, 2011The best thing is yet to come for those individuals who consider having the training and examination for being a Cisco Certified Network Associate. If you engaged yourself to be trained and assisted by well-adept Information Technology instructors, the wide-world of opportunities will opened for you as well as career advancement comes along the way.
Here in the Philippines, we got a number of similar and likewise applicable training courses to develop and enhance the skills and knowledge of a student or professional who are vying to increase their computer technical know-how as well as growth for advancement to become recognized and be sought after by employers here and abroad.
What will truly matter most is that the training for becoming a Cisco Certified Network Associate is here to enhance and upgrade the skills that an employee or professional have for them to earn more respect from their employers as well as gain financially because being an expert and skillful with Cisco products and technologies will be a great advantage for all those who are willing to earn more than what they are expecting to.
It is given that there are various educational institutions who are providing the same Cisco training as others are offering. In the Philippines and the world over, Cisco certification training are conducted usually on an 18-day 4-hour sessions and that could mean a lot to those students or professional who have gained many things through classroom instructions and practical laboratory activities and examinations to further their educational background.
Today, more than a hundred schools are engaged to train people to become a Cisco Certified Network Associate and not only that, because it will be an initial way to become certified, it will be your doorway to a more advance line of courses which are its prerequisite courses. » Continue.. |
Written by: Cresencio Daffon Jr. | 16 Mar, 2011There are many professionals and a number of computer networking and Information Technology individuals who are aiming to lead their chosen profession and for them to move to a level that they have preferred CCNA Training Philippines is here to assist them and support them in all technical aspects of the training.
Many training institutions and schools that resides in the Philippines are providing comprehensive and very timely manner of training students to provide them the best training to become a Cisco Certified Network Associate.
In connection with the training, it is advisable that a student be concentrated on the fundamentals and technicalities of the training as well as the examinations that bridge them to earn their desired certification to be a recognized Cisco network associate. The training course’s main objective is to teach students to enhance their configuration, verification, and troubleshooting abilities on using communication devices duly licensed by Cisco.
In the Philippines and the world over, the training to become a Cisco Certified Network Associate is one of the essential factor for businesses to succeed in their operations as well as the person who bares the certification earns the prestige and recognition all around.
For your supplemental information, this kind of training has been around for more or less a decade now and several institutions have already engaged in similar activities to propagate the skills and knowledge needed by students and professionals for their chosen fields and businesses.
Today, there are numerous educational institutions who are offering training courses with an academic curriculum in line with Cisco networking. It is not an excuse for those people who are willing to learn but financially incapacitated to engage in building their dream of being a Cisco Certified Network Associate.
Now, Technical Education and Skills Development Authority (TESDA) is here to realize that dream » Continue.. |
For students to become successful in trainings they have enrolled to, they must see to it that they are prepared psychologically, physically, and spiritually to face the challenges of the training. Another thing they have to be concerned about is to learn how to concentrate and be focused on every lectures and laboratory activities they will be assigned to do practically during training.
It is a given notion that every Information Technology student who has earned a recognized certification for CCNA will feel at ease and can show up to everyone with immeasurable happiness as though they have become a millionaire instantly. The truth of the matter is, even if they have succeeded in earning a particular recognition as certified to a specific course of their choice is not enough. They still need to be careful and cautious about how to use their certification on the right time, place, and job. If they don’t know how to manage their success well, it will come as if they have failed and there will be no point of return afterwards.
Keep in mind that being knowledgeable in a particular field like in Information Technology would be a great advantage for a student and most other professionals as well. This reality is true in most cases where in computer networking, the development and advancement in the world of Information Technology is happening everyday.
So, for an individual to start his quest in reaching his technical and computing related goal » Continue.. |
In the world of computer networking and Information Technology business, the widely-known entity to trust for is Cisco because it contributed a lot with regards to updated and systematic computer technology by means of meaningful and practical instructions beneficial to students who aims to become a Cisco Certified Network Associate.
Most recently, Cisco has brought communication innovation that is worthy to study. We must admit the fact that whether it is for business or private use, communication is an essential part of our lives everyday and even those who are already professionals in their chosen field admit that they still need to have advancement in communications skills as well as in computer technology systems. Enrolling on course training for Cisco Certified Network Associate is a must to face the challenges that the modern world has yet to unleash.
Now, the best move that we can do is to offer the right kind of training and information to students for them to better appreciate the world of computer technology that surround them along with the advancement of mediums of communication worldwide.
Through a Cisco Certified Network Associate training, majority of professionals confessed » Continue.. |
On Cisco’s certification categories, the first stage that every student must take is the Cisco Certified Network Associate course that focuses on knowledge and skills on networking basics. You will experience a relevant training in line with the technicalities and fundamentals of being a CCNA, so it will be worth your time, money, and effort for engaging yourself to. The only thing that the student can contribute on the training is dedication and perseverance as they go along with the training process.
For the enhancement of knowledge and skills during the training period, a student will be taught the techniques on switched and routed operations of networks in a medium scale and on how to install, configure, and troubleshoot. After the completion of the training course, the student should be able to do network security tasks and be familiar with the technology of several networking platforms.
The training course will cover all aspects of being a Cisco Certified Network Associate so the student must devote his time for thoroughly studying the training materials and keep his focus on every training session whether it is conducted inside the classroom or applying the skills he learned on a practical laboratory testing. For students to reap the » Continue.. |
Written by: Cresencio Daffon Jr. | 05 Mar, 2011There is Cisco Certified Network Associate training in the Philippines that is offered by one of the country’s premiere Information Technology institution widely known as COMPUTER NETWORKING CAREER & TRAINING CENTER, INC. or CNCTC, Inc. that has two branches, one in Espana, Manila and the other location is in Buendia, Makati, Philippines.
The training center is accredited by Technical Education and Skills Development Authority or TESDA which is the Philippines’ major skills training authority.
Why is it worthy to be trained by CNCTC? Well, that’s a typical question being encountered by anyone who has the interest to enroll for a Cisco Certified Network Associate program being offered by the institution. CNCTC, Inc.’s medium of instruction is widely accepted locally and internationally and it has training that is based on competency emphasizing the training method which is more on hands-on style; it does have instructors who are recognized and adept in the field of Information Technology; has boot camp training that is budget-friendly and with high reliability rate; the assurance that everybody can participate well in the training; students have the rights to keep their examinations with them after completion of the training because testing will be conducted within the site facility; it has the best quality training for Information Technology; and every participant who finishes the training will have the assurance of passing the examination for Cisco Certified Network Associate.
The students’ payment for the course will commensurate for the kind of training and experience they will have as soon as they enroll for the course of their choice, especially, for Cisco Certified Network Associate boot camp course that covers two major topics such as Routing and Routing Technology for CISCO and the other one is Switch and WAN Technologies for CISCO.
The first topic covers 41 subtopics beginning with technologies » Continue.. |
- Network Types (by cres) - 2011-04-18 21:07:29
- Basics of Managing Networks for Security, Fault, and Accounting (by cres) - 2011-04-16 00:04:36
- CCNA Metrics of Routing (by cres) - 2011-04-15 21:27:56
- Bridges and Switches (by cres) - 2011-04-15 15:47:33
- About Wide Area Network (by cres) - 2011-04-15 00:23:15
- CCNA Methods of Accessing the Media of Local Area Network (by cres) - 2011-04-14 21:42:55
- History, Basics, and Challenges of Internetworking Technologies for CCNA (by cres) - 2011-04-13 22:15:44
- The Effectiveness Of CCNA Training (by cres) - 2011-03-16 00:57:53
- TESDA Accredited CCNA Training (by cres) - 2011-03-16 00:15:24
- CCNA Training Philippines Can Shape Your Career Future (by cres) - 2011-03-15 23:11:08
- Advantage Of CCNA Training Philippines Advancement (by cres) - 2011-03-15 22:12:17
- For A Better Future – CCNA Training Philippines Is The Answer (by cres) - 2011-03-15 19:57:53
- CCNA Training Philippines (by cres) - 2011-03-05 03:43:51