Exploring the Network

Get Started. It's Free
or sign up with your email address
Exploring the Network by Mind Map: Exploring the Network

1. Networking impacts in our daily lives

1.1. Networks Support the Way We Learn

1.2. Networks Support the Way We Communicate

1.3. Networks Support the Way We Work

1.4. Networks Support the Way We Play

2. Networks of Many Sizes

2.1. Small Home Networks

2.2. Small Office / Home Office Networks

2.3. Medium to large Networks

2.4. World Wide Networks

3. Components of a Network

3.1. Devices

3.1.1. End Devices

3.1.2. Network Infrastructure Devices

3.2. Media

3.2.1. Copper

3.2.2. Fiber Optic

3.2.3. Wireless

3.3. Services

3.3.1. IP Address

3.3.2. DNS

3.4. Topilogy Diagrams

3.4.1. Physical Topology

3.4.2. Logical Topology

4. Types of Networks

4.1. The two most common types of network infrastructures

4.1.1. Local Area Network (LAN)

4.1.2. Wide Area Network (WAN)

4.2. Other types of networks

4.2.1. Metropolitan Area Network (MAN)

4.2.2. Wireless LAN (WLAN)

4.2.3. Storage Area Network (SAN)

4.3. The Internet

4.3.1. Intranet

4.3.1.1. Company Only

4.3.2. Extranet

4.3.2.1. Suppliers

4.3.2.2. Customers

4.3.2.3. Collaborators

4.3.3. Internet

4.3.3.1. Connecting Remote Users to the Internet

4.3.3.1.1. DSL

4.3.3.1.2. Cable

4.3.3.1.3. Cellular

4.3.3.1.4. Satellite

4.3.3.1.5. Dial Up-Telephone

4.3.3.2. Connecting Businesses to the Internet

4.3.3.2.1. Dedicated Leased Lines

4.3.3.2.2. Metro Ethernet

4.3.3.2.3. DSL

4.3.3.2.4. Satellite

5. Converged Networks

5.1. The Converging Network

5.2. Planning for the Future

6. Supporting Network Architecture

6.1. Fault Tolerance

6.2. Scalability

6.3. Quality of Service (QoS)

6.4. Security

7. Network Trends

7.1. Bring Your Own Device (BYOD)

7.2. Online collaboration

7.2.1. IP Communication

7.2.2. Mobile Applications

7.2.3. Messaging

7.2.4. Telepresence

7.2.5. Online Conferencing

7.3. Video

7.4. Cloud computing

7.4.1. Public clouds

7.4.2. Private clouds

7.4.3. Custom clouds

7.4.4. Hybrid clouds

7.5. Data Centers

8. Network Security

8.1. Security Threats

8.1.1. Viruses, worms, and Trojan horses

8.1.2. Spyware and adware

8.1.3. Zero-day attacks, also called zero-hour attacks

8.1.4. Hacker attacks

8.1.5. Denial of service attacks

8.1.6. Data interception and theft

8.1.7. Identity theft

8.2. Security Solutions

8.2.1. Antivirus and antispyware

8.2.2. Firewall filtering

8.2.3. Dedicated firewall systems

8.2.4. Access control lists (ACL)

8.2.5. Intrusion prevention systems (IPS)

8.2.6. Virtual Private Networks (VPNs)

9. Network Architectures

9.1. Cisco Network Architectures

9.1.1. Collaboratins

9.1.2. Data Center / Virtualization

9.1.3. Borderless Networks

9.2. Cisco Certified Network Associate (CCNA)

9.2.1. CISCO