Presentació sobre la Pissarra Digital feta al CRP de l'Hospitalet el dia 29 de novembre com a taller de la Jornada de formació de projectes d'Innovació TIC
. If you are out of ideas, they will provide you with the ideas that will surely add value to your home or office. You can combine the ideas and come out with some really unique ideas for your home or office.
This document provides an overview of cable modem and DSL technologies including:
1. Key terms related to cable modem technology such as broadband, CATV, coaxial cable, and DOCSIS standards.
2. Components of a cable network including the headend, distribution network, and cable modem.
3. DSL deployment benefits such as utilizing existing telephone lines but distance limitations compared to cable.
4. DSL terminology and variants including ADSL, VDSL, and symmetric DSL options.
Building Scalable Cisco Internetworks (Bsci)CCNAResources
This document provides a summary of key topics about the Building Scalable Cisco Internetworks (BSCI) 642-901 exam, including routing protocols like EIGRP, OSPF, and BGP. It outlines the contents, objectives, and recommends additional reading and hands-on practice to fully prepare for the exam. The summary is intended to help remember topics, but not replace learning the foundational knowledge required to pass.
. If you are out of ideas, they will provide you with the ideas that will surely add value to your home or office. You can combine the ideas and come out with some really unique ideas for your home or office.
This document provides an overview of cable modem and DSL technologies including:
1. Key terms related to cable modem technology such as broadband, CATV, coaxial cable, and DOCSIS standards.
2. Components of a cable network including the headend, distribution network, and cable modem.
3. DSL deployment benefits such as utilizing existing telephone lines but distance limitations compared to cable.
4. DSL terminology and variants including ADSL, VDSL, and symmetric DSL options.
Building Scalable Cisco Internetworks (Bsci)CCNAResources
This document provides a summary of key topics about the Building Scalable Cisco Internetworks (BSCI) 642-901 exam, including routing protocols like EIGRP, OSPF, and BGP. It outlines the contents, objectives, and recommends additional reading and hands-on practice to fully prepare for the exam. The summary is intended to help remember topics, but not replace learning the foundational knowledge required to pass.
This document provides an overview of key concepts in wireless networking, including:
1) Modulation techniques like DSSS, OFDM, and MIMO used by various 802.11 standards to encode data onto radio waves.
2) Wireless topologies including WPAN, WLAN, WMAN, and WWAN of different ranges, and components like bridges, repeaters, and outdoor networks.
3) Factors that affect radio frequency (RF) signals like absorption, scattering, reflection and how they can degrade wireless performance.
4) Cisco's unified wireless architecture which uses controllers and lightweight access points to centrally manage networks.
Access lists allow routers to filter packets and are supported for several protocols like IP, Ethernet, and IPX. Access lists contain rules that either permit or deny traffic from and to particular sources and destinations. These lists are applied to router interfaces to filter traffic as it passes through. Extended access lists offer more granular control than standard lists by allowing filtering based on transport protocol, port, and source/destination addresses.
This document provides an overview of key concepts for CCNA Wireless certification, including:
1) It describes different wireless modulation techniques like DSSS, OFDM, and MIMO used by 802.11 standards.
2) It explains wireless frequencies and channels used by different standards as well as issues with RF propagation.
3) It outlines common wireless network topologies including WPAN, WLAN, WMAN, WWAN and 802.11 modes and identifies components like bridges, repeaters, and outdoor solutions.
4) It covers wireless antennas including types, polarization, and connectivity hardware as well as 802.11 protocols and frame transmission.
Extending the default subnet mask creates a counting range that can be used to represent subnetworks, allowing a single network to be subdivided. When the Class B subnet mask is extended to 255.255.240.0, it supports 14 subnets using the 2n-2 formula. The 65,534 hosts originally supported can now be divided among the 14 subnetworks, each with its own address range calculated from the last bit used in the extended subnet mask.
Extending the default subnet mask creates a counting range that can be used to represent subnetworks, allowing a single network to be subdivided. When the subnet mask is extended to 255.255.240.0, it supports 14 subnets using the 2n-2 formula. The number of addresses supported by each subnet is the address range, which is calculated by taking the decimal value of the last bit used in the subnet mask as the starting IP address for the first subnet.
VLANs logically group switch ports to create multiple broadcast domains on a physical switched network. Without a router, VLANs cannot communicate with each other. Key features of VLANs include controlling broadcast traffic, increasing security by port configuration, and flexibility to add or move users regardless of physical location. VLAN trunk links can carry multiple VLANs between switches to extend the broadcast domains throughout the network.
Layer 2 switching breaks up collision domains by using MAC addresses to forward traffic through switches instead of hubs. Spanning Tree Protocol (STP) eliminates switching loops, while switches use ASICs and MAC address lookups to switch frames faster than routers. STP finds redundant links and designates root bridges, root ports, and forwarding ports to build a loop-free topology and transition ports between blocking and forwarding states during convergence.
The document provides an overview of static and dynamic routing concepts, protocols, and configuration. It discusses static and default routing, as well as dynamic routing protocols including RIP, IGRP, EIGRP, OSPF, BGP, and their characteristics. Troubleshooting commands are also listed to verify routing tables and debug routing issues.
This document provides a summary of various resources for CCNA Wireless certification preparation including:
1) Links to Cisco documents that describe EAP certificate details, PEAP configuration, EAP-FAST questions and answers, and a Local EAP server configuration example.
2) A network world article that clearly explains the 802.1x authentication process.
3) Additional links about the Cisco Secure Services Client and versions of CCX wireless certification.
4) A recommendation to get hands-on experience with the WLC interface, controllers, and access points if possible through a lab, class, or work experience.
VLANs are virtual broadcast domains that segment traffic on a layer 2 network. Each VLAN is like a separate virtual bridge within a switch. VLANs can span multiple switches using trunk links, which carry traffic for multiple VLANs. ISL is a Cisco proprietary protocol that maintains VLAN information as traffic passes between switches, allowing traffic to enter the correct VLAN. It functions at layer 2 and adds a 30 byte header to each frame. VTP maintains VLAN configuration consistency across switches by propagating changes to all switches in a VTP domain.
The document provides an overview of common CCNA commands for configuring routing protocols like RIP, OSPF, EIGRP, and IGRP on Cisco routers. It also covers topics like static routing, default routing, VLAN configuration on switches, trunking, ACLs, and basic router and switch configuration/management. The commands are organized by topic and include brief explanations and examples.
This document summarizes IP access control lists (ACLs), including the syntax for standard and extended ACLs, supported source/destination definitions, TCP/UDP port definitions, options for applying and troubleshooting ACLs. Standard ACLs filter based on source IP address while extended ACLs can also filter based on protocol, source/destination ports, flags, and other options. Numbers, names, sequences and actions (permit, deny) are used to configure individual ACL rules.
EIGRP is a hybrid routing protocol that uses both distance-vector and link-state characteristics. It uses DUAL algorithm for routing calculations and loop prevention. EIGRP sends periodic hello packets to discover neighbors and non-periodic updates when routes change. The default EIGRP metric is the minimum bandwidth on a path plus the sum of the delays. Show commands can be used to display EIGRP neighbor information, topology tables, route tables, traffic statistics, and event/packet details for troubleshooting.