Sei sulla pagina 1di 35

Cisco Certified Network Associate (CCNA) validates the ability to install, configure, operate, and troubleshoot medium-size route

and switched networks, including implementation and verification of connections to remote sites in a WAN. CCNA curriculum includes basic mitigation of security threats, introduction to wireless networking concepts and terminology, and performance-based skills. This new curriculum also includes (but is not limited to) the use of these protocols: IP, Enhanced Interior Gateway Routing Protocol (EIGRP), Serial Line Interface Protocol Frame Relay, Routing Information Protocol Version 2 (RIPv2),VLANs, Ethernet, access control lists (ACLs). Cisco Certified Network Associate Wireless (CCNA Wireless) validates associate-level knowledge and skills to configure, implement and support of wireless LANs, specifically those networks using Cisco equipment. With a CCNA Wireless certification, network professionals can support a basic wireless network on a Cisco WLAN in a SMB to enterprise network. The CCNA Wireless curriculum includes information and practice activities to prepare them for configuring, monitoring and troubleshooting basic tasks of a Cisco WLAN in SMB and Enterprise networks. The Cisco Certified Network Associate Voice (CCNA Voice) validates associate-level knowledge and skills required to administer a voice network. The Cisco CCNA Voice certification confirms that the required skill set for specialized job roles in voice technologies such as voice technologies administrator, voice engineer, and voice manager. It validates skills in VoIP technologies such as IP PBX, IP telephony, handset, call control, and voicemail solutions. The CCNA Voice Certification enterprise option assesses skills and knowledge related to the Cisco Unified Communications Manager 6.0 (CUCM) 6.0. It is typically employed by large organizations such as governments, large companies, and colleges. The CVOICE #642-436 exam will be required for this option. The CCNA Voice Certification commercial option assesses skills and knowledge related to the Cisco CallManager Express (CME) and Cisco Unity Express (CUE) solutions typically used by medium and small organizations such as companies with less than 2,000 employees, retail businesses, and small school districts. The IIUC exam #640-460 will be required for this option. Cisco Certified Network Associate Security (CCNA Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security curriculum emphasizes core security technologies, the installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that Cisco uses in its security structure. Cisco Certified Network Professional (CCNP) validates the ability to plan, implement, verify and troubleshoot local and wide-area enterprise networks and work collaboratively with specialists on advanced security, voice, wireless and video solutions. The CCNP certification is appropriate for those with at least one year of networking experience who are ready to advance their skills and work independently on complex network solutions. Those who achieve CCNP have demonstrated the skills required in enterprise roles such as network technician, support engineer, systems engineer or network engineer. Cisco Certified Internetwork Expert (CCIE) is the highest level of technical networking certification offered by Cisco. Put your knowledge and experience to the test. Achieve Cisco CCIE certification and accelerate your career.

The Cisco Certified Internetwork Expert (CCIE) certification is accepted worldwide as the most prestigious networking certification in the industry. Network Engineers holding an active Cisco CCIE certification are recognized for their expert network engineering skills and mastery of Cisco products and solutions. The CCIE community has established a reputation of leading the networking industry in deep technical networking knowledge and are deployed into the most technically challenging network assignments. The program continually updates and revises its testing tools and methodologies to ensure unparalleled program quality, relevance and value. Through a rigorous written exam and a performance based lab, the CCIE program sets the standard for internetworking expertise. Cisco introduced the CCIE certification in 1993 to assist the industry in distinguishing the top echelon of internetworking experts worldwide. Today , CCIE certification holders represent less than 3% of all certified Cisco professionals and less than 1% of the networking professionals worldwide.

What is CWNA?
The Certified Wireless Network Administrator (CWNA) is the first and only vendor-neutral program available to teach today's network engineers a standard body of knowledge for wireless LANs foundation of the certified Wireless Network Professional program. Covering a broad range of wireless networking topics, it has the ability to bring IT professionals new to wireless networking up to speed quickly. For those individuals already familiar with wireless, it fills in any gaps in their knowledge and prepares them to get certified. Students learn how to administer, install, configure, and troubleshoot wireless network systems. By earning the Certified Wireless Network Administrator (CWNA) credential, the first step toward the Wireless certification, network experts and administrators demonstrate that they have the skills necessary to administer, install, configure, and troubleshoot wireless network systems.

Who Should Get Certified?


The CWNA certification is appropriate for:

Systems & Network Administrators Systems & Network Engineers Systems & Network Analysts Technical Support & Implementation Engineers Technical Consultants

Network Architects

CWNPCertified Wireless Network Professional

MCTS Overview
The Microsoft Certified Technology Specialist (MCTS) certifications are designed to help validate your skills on the features and functionality of Microsoft technologies. You can show your depth of knowledge in one specific technology, earn multiple MCTS certifications to show breadth across different products, or build on the MCTS to earn a Microsoft Certified IT Professional (MCITP) certification.

MCTS candidate profile


MCTS candidates are capable of implementing, building, troubleshooting, and debugging a particular Microsoft technology.

Why get certified?


Earning a Microsoft Certification validates your proven experience and knowledge in using Microsoft products and solutions. Designed to be relevant in today's rapidly changing IT marketplace, Microsoft Certifications help you utilize evolving technologies, fine-tune your troubleshooting skills, and improve your job satisfaction. Whether you are new to technology, changing jobs, or a seasoned professional, becoming certified demonstrates to customers, peers, and employers that you are committed to advancing your skills and taking on greater challenges. In addition, certification provides you with access to exclusive Microsoft Certified Professional (MCP) resources and benefits, including opportunities to connect with a vast, global network of MCPs.

Microsoft Certified IT Professional (MCITP)

Microsoft Certified IT Professional

The Microsoft Certified IT Professional (MCITP) credential helps validate that an individual has the comprehensive set of skills necessary to perform a particular job role, such as database administrator or enterprise messaging administrator. It provides widely recognized, objective validation of a candidate's ability to perform critical, current IT job roles by using Microsoft technologies to their best advantage.[9] These certifications are designed for IT professionals including administrators and support personnel in addition to database specialists (both administrators and developers). To obtain an MCITP certification, you must first obtain one or more prerequisite MCTS certifications, and then pass the qualifying "PRO" exam(s):

MCITP Overview
The Microsoft Certified IT Professional (MCITP) certification helps validate that an individual has the comprehensive set of skills necessary to perform a particular job role, such as database administrator or enterprise messaging administrator. MCITP certifications build on the technical proficiency measured in the Microsoft Certified Technology Specialist (MCTS) certifications. Therefore, you will earn one or more MCTS certifications on your way to earning an MCITP certification.

MCITP candidate profile


MCITP candidates are IT professionals capable of deploying, building, designing, optimizing, and operating technologies for a particular job role. They make the design and technology decisions necessary to ensure successful technology implementation projects.

Why get certified?


Earning a Microsoft Certification helps validate your proven experience and helps you build your career, whether you are new to technology or a seasoned professional. The benefits you receive after earning a Microsoft Certification provide you opportunities to connect with a vast, global network of Microsoft Certified Professionals (MCPs). Research shows that certification is a value to you and your organization:

CompTIA
The Computing Technology Industry Association (CompTIA), a nonprofit trade association, was created in 1982 as the Association of Better Computer Dealers, Inc. (ABCD) by representatives of five microcomputer

dealerships. Over the course of a decade, ABCD laid the groundwork for many of CompTIAs initiatives and member benefits. ABCD later changed its name to the Computing Technology Industry Association to reflect the association's evolving role in the computer industry and in the U.S. business landscape at large.[citation needed] The 1990s was a period of growth as the association broadened the scope of its activities to address the needs of the expanding computer industry. Its initiatives increased to include networking, UNIX, imaging, mobile computing, and multimedia arenas. In an effort to monitor and take positions on public policy issues, the association added a fulltime Director of Public Policy position. As of 2011 CompTIA is known[by whom?] as a provider of professional certifications for theinformation technology (IT) industry. CompTIA chairs and manages the Initiative for Software Choice. Network+ is a certification that is used to measure skill as a network technician: understanding of network hardware, installation, and troubleshooting. Network+ was first launched in 1999, and exam updates followed in 2002, 2005, and 2009. The 2009 version will be retired on August 31 2012; new objectives (the "2012 objectives") will begin to be examined in Nov/Dec 2011. Topics include network hardware, connections, software, the OSI Reference model, and different protocols used in local area networks (LANs) and wide area networks (WANs). CompTIA recommends the A+ certification and nine months networking experience before sitting for the exam, but this is not required. Network+ prepares one for continuing to Microsoft certifications and Cisco certifications. A combination A+/Network+, A+/Server+, or (just) Security+ certification can fulfill the elective exam requirement of the Microsoft Certified Systems Administrator (MCSA) certification.[4]

CompTIA Network+
CompTIA Network+ certification proves knowledge of networking features and functions and is the leading vendor-neutral certification for networking professionals.

The exam addresses the latest skills needed by technicians, such as basic principles on how to secure a network. The exam covers network technologies, media and topologies, devices, management, tools and security. Although not a prerequisite, it is recommended that CompTIA Network+ candidates have at least nine months of experience in network support or administration or academic training, along with a CompTIA A+ certification.

Candidate job roles include network administrator, network technician, network installer, help desk technician and IT cable installer. Companies such as Dell, HP, Ricoh, Sharp and Xerox recommend or require CompTIA Network+ for their networking technicians. The U.S. Department of Defense also recognizes CompTIA Network+ .CompTIA

Convergence+

The CompTIA Convergence+ certification proves the competence and knowledge of IT professionals specializing in unified communications. The CompTIA Convergence+ certification is an international, vendor-neutral certification that recognizes a technician's ability to design, implement and manage both data and voice networking. Although not a prerequisite for CompTIA Convergence+ certification, it is recommended that candidates are CompTIA Network+ certified and have 18 to 24 months of work experience in areas that include data networking, VoIP, and other convergence related technologies. Several companies that provide solutions such as VoIP and data networking value and support CompTIA Convergence+ certification, including Avaya, Siemens and Intel.

"CompTIA Convergence+ is embedded in the Avaya Professional Certification Program as a strategic element to provide proof of an individuals fundamental knowledge and competency in voice data, telephony and networking technologies." Frauke VoBebein Certification Manager, Global, Avaya, Inc.

A+ certification

The CompTIA A+ Logo

The A+ certification demonstrates competency as a computer technician. Officially, CompTIA A+ certification is a vendor neutral certification that covers numerous technologies and operating systems from such vendors as Microsoft,Apple Inc., Novell and some of the Linux variations. The A+ certification exam was developed in 1993. There have been four versions of the A+ exam, the 1993, 2003, 2006, and 2009 objectives, which are broken down into two separate exams. The 2003 objectives contained the A+ Core Hardware Exam and the A+ Core Operating System Technologies Exam, and were retired on June 30, 2007. The 2006 objectives require that a candidate successfully pass the A+ Essentials and one elective: IT technician, remote support technician, or depot technician. The 2009 certification requires passing two exams: Essentials and Practical Application. The A+ exam is intended for information technology professionals who have the equivalent of 500 hours of hands on experience. The exams are computer based and composed of multiple choice questions, of which there may be more than one correct answer. Over 800,000 people have earned the A+ credential worldwide, to date. Topics of the Essentials/Core examination include IRQs, direct memory access, and practical computer repair, including the installation and repair of hard drives, modems, network cards, CPUs, power supplies, PDAs, and printers. The focus of the exam is not theory, but practice. Sometimes graphics are used in exam questions. Topics included in the Operating Systems Exam include

memory management, configuration files, and historical operating environments rather than newer, cutting edge technologies. In September 2006, the CompTIA A+ test was updated so that the test taker must take the CompTIA A+ Essentials (220-601) test along with one of three other tests (220-602, 220-603, or 220-604). Each of these elective exams offers candidates the opportunity to specialize their A+ certification to match their desired career path. With the introduction of the 2006 A+ exam, candidates were offered a grace period whereby both the 2003 and 2006 versions were available. From June 2007, the 2003 version of exams was no longer available in the United States. In some countries, the grace period was extended to December 2007. The 2003 version was also extended in cases where the A+ certification exam was included in a course of study. Also, most legacy support questions have been excluded. The existing CompTIA A+ 600 series exams remain relevant and are in use by organizations and educational institutions throughout the world. The regular, non-academic English version of these exams retired in the U.S. and Canada on February 28, 2010. The educational versions of these exams (JK0601, JK0-602, JK0-603 and JK0-604), as well as the German, Korean, Arabic, Chinese and Japanese translations of the 220-601 through 220-604 CompTIA A+ exams,remained in the market for use until August 31, 2010. [2] The A+ certification along with Network+ may be used to qualify as an elective for Microsoft's MCSA and MCSE certification.[3] In order to receive CompTIA A+ certification a candidate must pass two exams. The first exam is CompTIA A+ Essentials, exam number 220-701. The CompTIA A+ Essentials examination measures necessary competencies for an entry-level IT professional with the equivalent knowledge of at least 500 hours of hands-on experience in the lab or field. Successful candidates will have the knowledge required to understand the fundamentals of computer technology, networking, and security, and will have the skills required to identify hardware, peripheral, networking, and security components. Successful candidates will understand the basic functionality of the operating system and basic troubleshooting methodology, practice proper safety procedures, and will effectively interact with customers and peers. CompTIA A+ is ISO 17024 Accredited (Personnel Certification Accreditation) and, as such, undergoes regular reviews and updates

to the exam objectives. Also, a candidate must pass CompTIA A+ Practical Application, exam number 220-702. The CompTIA A+ Practical Application examination measures necessary competencies for an entry-level IT professional with a working knowledge of practical use of current software and Operating System interface and features.

CompTIA A+
CompTIA A+ certification validates foundation-level knowledge and skills necessary for a career in PC support. It is the starting point for a career. The international, vendor-neutral certification proves competence in areas such as installation, preventative maintenance, networking, security and troubleshooting. CompTIA A+ certified technicians also have excellent customer service and communication skills to work with clients. Two exams are necessary to be certified: CompTIA A+ Essentials, exam code 220-701; and CompTIA A+ Practical Application, exam code 220-702. CompTIA A+ Essentials measures the necessary competencies of an entry-level IT professional with a recommended 500 hours of hands-on experience in the lab or field. It tests for technical understanding of computer technology, networking and security, as well as the communication skills and professionalism now required of all entry-level IT professionals. CompTIA A+ Practical Application is an extension of the knowledge and skills identified in CompTIA A+ Essentials, with more of a "hands-on" orientation focused on scenarios in which troubleshooting and tools must be applied to resolve problems. Candidate job roles include enterprise technician, field service technician, PC or support technician and IT administrator. CompTIA A+ is part of the certification track for corporations such as Microsoft, HP and Cisco. Other technology companies, including Dell, Intel, Lenovo and Ricoh, have made CompTIA A+

certification mandatory for their service technicians. The U.S. Department of Defense recognizes CompTIA A+ and the Department of Homeland Security requires it as part of their computer forensics program.

CPTS - Certified Penetration Testing Specialist

Exam Details:
Questions: 100 Time: 120 Minutes Passing Score: 80% Format: Multiple Choice (60% Scenario Based) Cost: $160 Other Requirements: None. Renewal: None currently, but look for continuing education.

Editors' Quick Thoughts


Mile2 has its work cut out for itself with CPTS, although we believe they are taking the correct steps. The momentum behind CEH has put it in front of the eyes of the entire industry (and then some), and may be difficult to overcome. But on the bright side, CPTS is slowly becoming known as the ethical hacking credential with the most up to date study materials and exam. Mile2 recognizes these facts and offers training courses that cover both exams, CPTS and CEH. Therefore, we highly recommend considering a training provider that encompasses more than just the CEH curriculum. Mile2 is also striving to be a higher level cert with eventual continuing education requirements and a practical exam. Will this mean that CEH will be an entrylevel pen testing cert in comparison? Time will tell.

From the Horse's Mouth (Mile2's Web Site Content):


Course Description: CPTS has been built upon proven hands-on Penetration Testing methodologies as utilized by our international group of specialized consultants. Mile2 trainers keep abreast of their expertise by undertaking consulting, as we believe that an equal emphasis on theoretical and real world experience is essential for effective knowledge transfer to you, the student. The CPTS presents information on the latest vulnerabilities and defenses. This class also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. We go far beyond simply teaching you to Hack which has been the norm with the classes that have been available until now. Our course is developed on the same principles and

uses the same methods as those of a hacker, but its focus is professional penetration testing and securing information assets. Upon Completion: Certified Penetration Testing Specialist graduates would have obtained real world security knowledge that will help them recognize vulnerabilities, expose system weaknesses and help safeguard against threats. Graduates would have learnt the art of Ethical Hacking, but with a professional edge (Penetration Testing). Course Benefits: Upon completion, CPTS students will be able to confidently undertake the Thompson Prometric CPTS examination or the Certified Ethical Hacker examination (312-50) Self Study. Students will enjoy a more in-depth course that is continuously updated to maintain and incorporate the ever changing security environment. This course offers up-to-date proprietary laboratories that have been researched and developed by leading security professionals from around the world. Prerequisites: A minimum of 12 months experience in networking technologies Solid knowledge of TCP/IP Computer hardware Knowledge Knowledge of Microsoft packages Network+, Microsoft Security+ certifications or equivalent knowledge Knowledge of Linux would be beneficial but not a necessity VMware Workstation 5 is used extensively in class. More from Mile2.

The CPTS was formed to foster and promote a ready exchange of ideas and information in connection with the application and interpretation of taxing statutes and regulations; to strive for uniformity, consistency and equity in assessment methods and practices; to conduct research and education programs relating to the taxation of oil and gas industry and to make studies of the various forms of taxation and matters related thereto; to promote increased communication, discussion and liaison with the various government departments, agencies and personnel involved in the taxation of the oil and gas industry; and to support a collegial environment amongst tax professionals in the resource industry. The CPTS Board of Directors is elected annually by the Members (approximately 600) of the Society. Because CPTS has no permanent staff, all work carried out by the CPTS is done on a voluntary basis. The CPTS publishes the Canadian Petroleum Tax Journal, which is distributed without charge at the time of issue, to its members as part of their annual membership.

In addition to publication of the Canadian Petroleum Tax Journal, the CPTS holds a number of conferences, seminars and lecture series each year, providing a forum for the interchange of ideas among business, professional and government personnel.

Switches are another fundamental part of many networks because they speed things up. Switches allow differentnodes (a network connection point, typically a computer) of a network to communicate directly with one another in a smooth and efficient manner. There are many different types of switches and networks. Switches that provide a separate connection for each node in a company's internal network are called LAN switches. Essentially, a LAN switch creates a series of instant networks that contain only the two devices communicating with each other at that particular moment. In this article, we will focus on Ethernet networks that use LAN switches. You will learn what a LAN switch is and how transparent bridging works, as well as about VLANs, trunking and spanning trees. A LAN switch is a local area networking device that prevents data packet collision, and maximizes transmission speed as well as bandwidth allocation. This is a good replacement to a network hub and solves problems associated with expanding networks.

The Local Area Network: Basics


LAN, as you know, is the geographically limited network; it is usually limited to a single office, home, department, or building. In some cases, though, a LAN can exist between neighboring buildings. It is comprised of various nodes these are usually desktop computers and computer servers that are physically connected through LAN cables or through a wireless router and are able to communicate with each other and share common resources (e.g. office printers). There are many ways of connecting the various nodes in a Local Area Network. Simple networks usually have nodes that are arranged in a bus (straight backbone with segments where nodes are attached) or ring topology (nodes are distributed on a circular backbone and only the node with the ring token can transmit or send data). They can also be arranged in a star-like arrangement where all nodes have an

individual segment connecting them to a hub. The hub is a passive network device; it is simply a place where data packets pass from one node to all the other nodes connected to it (except the port from which the data originally came from). Complex networks are usually a combination of the bus and star typology. Backbones connect multiple hubs. All these networks have different physical properties (they vary in the way a node can send and receive data to another node), but all these suffer from inefficient bandwidth usage, extremely low speeds and data collision incidence.

The LAN Switch Mechanism and Its Advantages


In a network where a LAN switch is used, each node gets a direct connection to a switch. That is, a node gets a dedicated connection to the switch which only it (the node or the computer) and the switch use. This dedicated connection makes it possible for one node to maximize use of the bandwidth available to it. After all, no other node is competing with it for bandwidth. This means speedy data transmission. Moreover, the connection between the node and the switch can be made using cabling which has a separate route for data that the node is sending out and a separate route for data that the switch is forwarding to the node. This eliminates problems of data collision. The LAN switch is especially a vast improvement over the network hub since it has the ability to read the source and destination node of a data packet and forward the packet only to the destination node. Whenever the node transmits data meant for another node in the local area network, the switch intercepts the data, determines the destination and forwards the transmission to its intended destination. Since a data packet does not get broadcasted to unnecessary segments, network congestion is minimized and network bandwidth is conserved.

A server is primarily a program that runs on a machine, providing a particular and specific service to other machines connected to the machine on which it is found.

Nowadays, server functionality has become so rich, complex and varied in nature that there are whole very powerful computers dedicated to being exclusively servers. This has led many non-technical people to denote servers as being machines that run services. Generally speaking, a server is a machine with a specific set of programs that offer different types of service, which other machines (then called clients) request to do certain tasks. For example, a file server is a machine which keeps files, and allows clients to upload and download them from it. A web server is a machine that hosts web sites and allows Internet users (clients) to access these web sites. The page you are reading now comes from the about.com web server. A mail server is a machine which, along with the storage and management of email messages, provides service to email users who can read, retrieve, and manage these emails messages. A LAN switch is a device that provides much higher port density at a lower cost than traditional bridges. For this reason, LAN switches can accommodate network designs featuring fewer users per segment, thereby increasing the average available bandwidth per user. This chapter provides a summary of general LAN switch operation and maps LAN switching to the OSI reference model. A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and itsISP's network. Routers are located at gateways, the places where two or more networks connect, and are the critical device that keeps data flowing between networks and keeps the networks connected to the Internet. When data is sent between locations on one network or from one network to a second network the data is always seen and directed to the correct location by the router. The router accomplishes this by using headers and forwarding tables to determine the best path for forwarding the data packets, and they also useprotocols such as ICMP to communicate with each other and configure the best route between any two hosts. The Internet itself is a global network connecting millions of computers and smaller networks so you can see how crucial the role of a router is to our way of communicating and computing.

Why Would I Need a Router?


For most home users, they may want to set-up a LAN (local Area Network) orWLAN (wireless LAN) and connect all computers to the Internet without having to pay a full broadband subscription service to their ISP for each computer on the network. In many instances, an ISP will allow you to use a router and connect multiple computers to

a single Internet connection and pay a nominal fee for each additional computer sharing the connection. This is when home users will want to look at smaller routers, often called broadband routers that enable two or more computers to share an Internet connection. Within a business or organization, you may need to connect multiple computers to the Internet, but also want to connect multiple private networks and these are the types of functions a router is designed for. Home > Router

router

(rowter) (n.) A device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP?? s network. Routers are located at gateways, the places where two or more networks connect. Routers use headers and forwarding tables to determine the best path for forwarding the packets, and they use protocols such as ICMP to communicate with each other and configure the best route between any two hosts. Very little filtering of data is done through routers.

A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called routing, which is somewhat like switching, but a router is different from a switch. The latter is simply a device to connect machines to form a LAN. How a Router Works When data packets are transmitted over a network (say the Internet), they move through many routers (because they pass through many networks) in their journey from the source machine to the destination machine. Routers work with IP packets, meaning that it works at the level of the IP protocol. Each router keeps information about its neighbors (other routers in the same or other networks). This information includes the IP address and the cost, which is in terms of time, delay and other network considerations. This information is kept in a routing table, found in all routers. When a packet of data arrives at a router, its header information is scrutinized by the router. Based on the destination and source IP addresses

of the packet, the router decides which neighbor it will forward it to. It chooses the route with the least cost, and forwards the packet to the first router on that route. Do I need a router? If you have a LAN and want to connect it to the Internet, then you need a router. If you are deploying VoIP on your LAN, then you need one. If you have a simple phone system, then choose an ATA.

What is a Hub?
A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each device to talk to the others. Hubs aren't used in networks with only wireless connections, since network devices such as routers and adapters communicate directly with one another. Hubs are such simple devices they require no configuration, and have no manuals that their function is now included in other devices such as routers and modems. NETGEAR no longer sells stand-alone hubs. If you require a stand-alone appliance, use a switch instead. Switches provide better performance and features than hubs. Examples of hubs.

hub

A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports. When apacket arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets. A passive hub serves simply as a conduit for the data, enabling it to go from one device (or segment) to another. So-called intelligent hubs include additional features that enables an administrator to monitor the traffic passing through the hub and to configure each port in the hub. Intelligent hubs are also called manageable hubs. A third type of hub, called a switching hub, actually reads the destination address of each packet and then forwards the packet to the correct port.

What is a Network Interface Card?


Ads by Google Ethernet NIC LAN Card Drivers Laptop Wireless Card LAN Switches LAN Diagram Pci Network Interface Card Wireless Network Interface Card Network Interface Card Pcmcia Network Interface Card Server Network Interface Card Computer Network Interface Card Install Network Interface Card

Ads by Google Wireless Network LAN Ethernet Wireless Router Wireless LAN Cards Estudiar Normas NIC

Article Details
Written By: R. Kayne Edited By: Niki Foster Copyright Protected: 2003-2011 Conjecture Corporation

Free Widgets for your Site/Blog


Did You Know?
Sunlight can penetrate the ocean to a depth of about 3,300 feet (about 1,000 m). more...
get widget

This Day in History


November 12, 1927: Joseph Stalin became the leader of the Soviet Union. more...
get widget

Subscription
Learn something new every day by email More Info...
enter emai

A network interface card, more commonly referred to as a NIC, is a device that allows computers to be joined together in a LAN, or local area network. Networked computers communicate with each other using a given protocol or agreed-upon language for transmitting data packets between the different machines, known as nodes. The network interface card acts as the liaison for the machine to both send and receive data on the LAN. The most common language or protocol for LANs is Ethernet, sometimes referred to as IEEE 802.3. A lesser-used protocol is Token Ring. When building a LAN, a network interface card must be installed in each computer on the network and all NICs in the network must be of the same architecture. For example, all must either be Ethernet cards, Token Ring cards, or an alternate technology. Ads by Google
CPR Certificate Nationally-recognized CPR Program From A Company CNN Calls "The Best" www.CPRToday.com Satellite Networks Solutions VSAT Technology, Teleport Services www.gesatcom.com Leading US Wireless Manufacturer Starting at $498, Trusted Worldwide www.cobrafiringsystems.com Certification for Metro Ethernet Forum Professionals MEFCECP www.perpetual-solutions.com LC and SC cables in stock to 100M, low prices, lifetime warranty, 100% www.tmcscsi.com

GE Satcom

COBRA Firing Systems

Metro Ethernet Forum CECP Fiber Optic Cables

An Ethernet network interface card is installed in an available slot inside the computer. The NIC assigns a unique address called a MAC (media access control) to the machine. The MACs on the network are used to direct traffic between the computers. The back plate of the network interface card features a port that looks similar to a phone jack, but is slightly larger. This port accommodates an Ethernet cable, which resembles a thicker version of a standard telephone line. Ethernet cable must run from each network interface card to a central hub or switch. The hub or switch acts like a relay, passing information between computers

using the MAC addresses and allowing resources like printers and scanners to be shared along with data. A network interface card does not have to be hard wired with physical cable. Wireless Ethernet cards are installed like their wired counterparts, but rather than a port for an Ethernet cable, the card features a small antenna. The card communicates with the central wireless switch or hub via radio waves. Wireless LANs may have some restrictions depending on the material the building is made from. For example, lead in walls can block signals between the network interface card and hub or switch. When buying components for a LAN, make sure the NICs and hub or switch have the same capabilities. The entire network must be either wired or wireless, so a wireless networkinterface card cannot talk to a wired switch or hub. In addition, newer versions of hardware will likely support more features and/or greater speeds than older versions. Make sure your central switch or hub can utilize the highest capabilities of the network interface card under consideration.
In computer networking, a NIC provides the hardware interface between a computer and a network. A NIC technically is network adapter hardware in the form factor of an add-in card such as a PCI or PCMCIA card. Some NIC cards work with wired connections while others are wireless. Most NICs support either wired Ethernet or WiFi wireless standards. Ethernet NICs plug into the system bus of the PC and include jacks for network cables, while WiFi NICs contain built-in transmitters / receivers (transceivers). In new computers, many NICs are now pre-installed by the manufacturer. All NICs feature a speed rating such as 11 Mbps, 54 Mbps or 100 Mbps that suggest the general performance of the unit. Also Known As: NIC also stands for Network Information Center. For example, the organization named "InterNIC" is a NIC that provides information to the general public on Internet domain names.

A network interface card (NIC) is a computer circuit board or card that is installed in a computer so that it can be connected to a network. Personal computers and workstations on a local area network (LAN) typically contain a network interface card specifically designed for the LAN transmission technology, such as Ethernet or token ring. Network interface cards

provide a dedicated, full-time connection to a network. Most home and portable computers connect to the Internet through as-needed dial-up connection. The modem provides the connection interface to the Internet service provider.

TIA/EIA-568 is a set of three telecommunications standards from the Telecommunications Industry Association, a 1988 offshoot of the EIA. The standards address commercial building cabling for telecom products and services. The three standards are formally titled ANSI/TIA/EIA-568-B.1-2001, -B.2-2001, and -B.3-2001. The TIA/EIA-568-B standards were first published in 2001. They supersede the TIA/EIA-568-A standards set, which are now obsolete. They themselves have now been superseded by TIA/EIA-568-C.[1] Perhaps the best known features of TIA/EIA-568-B.1-2001 are the pin/pair assignments for eight-conductor 100-ohm balanced twisted paircabling. These assignments are named T568A and T568B, and are frequently referred to (erroneously) as TIA/EIA-568A and TIA/EIA-568B.

TIA/EIA-568 was developed through the efforts of more than 60 contributing organizations including manufacturers, end-users, and consultants. Work on the standard began with the Electronic Industries Alliance (EIA), a standards organization, to define standards for telecommunications cabling systems. EIA agreed to develop a set of standards, and formed the TR-42 committee[2], with nine subcommittees to perform the work. The work continues to be

maintained by TR-42 within the Telecommunications Industry Association. The first revision of the standard, TIA/EIA-568-A.11991 was released in 1991, and was updated in 1995. The demands placed upon commercial wiring systems increased dramatically over this period due to the adoption of personal computers and data communication networks and advances in those technologies. The development of highperformance twisted pair cabling and the popularization of fiber opticcables also drove significant change in the standards, which were eventually superseded by the current TIA/EIA-568-C set[3].
[edit]

Goals

TIA/EIA-568-C attempts to define structured cabling standards that will enable the design and implementation of structured cabling systems for commercial buildings, and between buildings in campus environments. The bulk of the standards define cabling types, distances, connectors, cable system architectures, cable termination standards and performance characteristics, cable installation requirements and methods of testing installed cable. The main standard, TIA/EIA-568-C.1 defines general requirements, while -568-C.2 focuses on components of balanced twisted-pair cable systems and -568-C.3 addresses components of fiber optic cable systems,

-568-C.4, which addressed coaxial cabling components[4]. The intent of these standards is to provide recommended practices for the design and installation of cabling systems that will support a wide variety of existing and future services. Developers hope the standards will provide a lifespan for commercial cabling systems in excess of ten years. This effort has been largely successful, as evidenced by the definition of category 5 cabling in 1991, a cabling standard that (mostly) satisfied cabling requirements for 1000BASE-T, released in 1999. Thus, the standardization process can reasonably be said to have provided at least a nine-year lifespan for premises cabling, and arguably a longer one. All these documents accompany related standards that define commercial pathways and spaces (TIA569-A), residential cabling (TIA-570-A), administration standards (606), grounding and bonding (TIA-607), and outside plant cabling (TIA-758).
[edit]Structured cable system topologies

TIA/EIA-568-C defines a hierarchical cable system architecture, in which a main cross-connect (MCC) is connected via a star topologyacross backbone cabling to intermediate cross-connects (ICC) and horizontal cross-connects (HCC). Telecommunications design traditions utilized a similar topology, and many people refer to crossconnects by their older, nonstandard names: "distribution frames" (with the various hierarchies

called MDFs, IDFs and wiring closets). Backbone cabling is also used to interconnect entrance facilities (such as telcodemarcation points) to the main cross-connect. Maximum allowable backbone fibre distances vary between 300m and 3000m, depending upon the cable type and use. Horizontal cross-connects provide a point for the consolidation of all horizontal cabling, which extends in a star topology to individual work areas such as cubicles and offices. Under TIA/EIA-568-B, maximum allowable horizontal cable distance is 90m of installed cabling, whether fibre or twisted-pair, with 100m of maximum total length including patch cords. No patch cord should be longer than 5m. Optional consolidation points are allowable in horizontal cables, often appropriate for open-plan office layouts where consolidation points or media converters may connect cables to several desks or via partitions. At the work area, equipment is connected by patch cords to horizontal cabling terminated at jackpoints. TIA/EIA-568-B also defines characteristics and cabling requirements for entrance facilities, equipment rooms and telecommunications room.
[edit]

Network convergence is the efficient coexistence of telephone, video and data communication within a single network. The use of multiple communication modes in a single network offers convenience and flexibility not possible with separate infrastructures. Network convergence is also called media convergence.

In response to consumer demand, convergence has been evolving on the Internet ever since its inception. Nowadays, texting, Web surfing, VoIP (voice over IP), streaming media,videoconference applications, online gaming and e-commerce are all extensively engaged in by consumers, businesses, educational institutions and government agencies. All users demand high quality of service (QoS), quality of experience (QoE or QoX), robustness, moderate cost, standards compatibility, ease of modification and upgrading, security,privacy and freedom from malware.

Telecommunications convergence, network convergence or simply convergence are broad terms used to describe emergingtelecommunications technologies, and network architecture used to migrate multiple communications services into a single network. [1]Specifically this involves the converging of previously distinct media such as telephony and data communications into common interfaces on single devices. It is a concept dating to AT&T in 1928,[citation needed] but has evolved in the 21st century to dominate the market positioning of telecoms operators. Telecommunication convergence is a disruptive technology. Convergence is defined by Blackman, 1998, as a trend in the evolution of technology services and industry structures.[2] Convergence is later defined more specifically as the coming together of telecommunications, computing and broadcasting into a single digital bit-stream (Collin, 1998; Gates, 2000). [3] [4] Mueller stands against the statement that convergence is really a takeover of all forms of media by one technology: digital computers.(Mueller, 1999, p. 2) [5] Convergence services, such as VoIP, IP-TV, Mobile TV,etc, will replace the old technologies and is a threat to the current service providers. IP-based convergence is inevitable and will result in new service and new demand in the market. [6] When the old technology converges into the public owned common, IP based services become access-independent or less dependent. The old service is access-dependent. [7]

What is open source software?


For OSS Watch open source software is software that has been released under an Open Source Initiative (OSI) certified licence. OSS Watch uses this OSI-approved list as a means of avoiding debates over interpretation of the open source definition and which licences do or do not conform to it. By recognising the OSI as the appropriate final authority in this issue, much confusion is avoided. Each of the licences approved by the OSI meets the conditions of the Open Source Definition[http://www.opensource.org/docs/definition.html]. That definition includes 10 criteria. Perhaps the most important of these are the free redistribution of the software, access to the source code, and the permission to allow modifications to the software and derived works that may be distributed under the same licensing conditions. Very different styles of licence meet these criteria. The GNU General Public License, commonly known as the GPL, meets the criteria. The MIT licence, which is very different in length and intent from the GPL, also meets the criteria. Indeed, more than 70 licences have gone through the approval process. To help with navigating through these licences OSS Watch has produced a series of documents that describe some of the key licencesin plain English. For an individual or project looking to license their code, using an OSIapproved licence can simplify the process. In fact, many people (including OSS Watch) do not consider software to be open source unless it is released under an OSI approved licence. For potential contributors and users who wish to work with open source, it provides a quick way to check that the code is indeed open and accepted by a large community. Is open source 'only' a licence? The expression open source has wide application. For the OSI it also refers to the distinctive software development methodology employed by many open source software projects. The OSI home page starts with 'Open source is a development method for software that harnesses the power of distributed peer review and transparency of process.' However, the OSI stops short of defining this methodology in the Open Source

Definition, which concerns itself only with the requirements of a licence designed to protect this way of developing software. The open development methodology conflicts with many of the principles of software development normally taught in academia. Open source software, strictly speaking, may or may not be developed using an open development methodology. The choice of this or any other development methodology is dependent upon a project's chosen route to sustainability. Does open source mean anything else? The term 'open source' originated in the worlds of journalism and intelligence, and referred to a publicly available source of information. This former use was known to the founders of the Open Source Initiative, and was felt to be 'a feature, not a bug.' Sometimes open source is conflated with open content or free content. Open content refers to content that can be edited, changed and added to by any reader. A good example is the famous Wikipedia, an online open content encyclopaedia. Open source is used today in various contexts which take it far beyond its application in software. However, to re-state, for OSS Watch open source software always refers to software released under an OSI-certified licence.
Open-source software (OSS) is computer software that is available in source code form: thesource code and certain other rights normally reserved for copyright holders are provided under asoftware license that permits users to study, change, improve and at times also to distribute the software. Open source software is very often developed in a public, collaborative manner. Open-source software is the most prominent example of opensource development and often compared to (technically defined) user-generated content or (legally defined) open content movements.[1] A report by the Standish Group states that adoption of open-source software models has resulted in savings of about $60 billion per year to consumers.[2][3] The Open Source Definition is used by the Open Source Initiative to determine whether or not a software license can be considered open source. The definition was based on the Debian Free Software Guidelines, written and adapted primarily by Bruce Perens. They are by no means definitive even as

applied to software. Clause 3 is the primary legal difference between free software and open source software as such, free software is stricter in interpreting 3. Clauses 5 and 6 are not a condition of any major open content license regimes, which commonly do restrict types of uses and users; for instance, Creative Commons has open content licenses that explicitly forbid commercial use.
Introduction Open source doesn't just mean access to the source code. The distribution terms of open-source software must comply with the following criteria: 1. Free Redistribution The license shall not restrict any party from selling or giving away the software as a component of an aggregate software distribution containing programs from several different sources. The license shall not require a royalty or other fee for such sale. 2. Source Code The program must include source code, and must allow distribution in source code as well as compiled form. Where some form of a product is not distributed with source code, there must be a well-publicized means of obtaining the source code for no more than a reasonable reproduction cost preferably, downloading via the Internet without charge. The source code must be the preferred form in which a programmer would modify the program. Deliberately obfuscated source code is not allowed. Intermediate forms such as the output of a preprocessor or translator are not allowed. 3. Derived Works The license must allow modifications and derived works, and must allow them to be distributed under the same terms as the license of the original software. 4. Integrity of the Author's Source Code The license may restrict source-code from being distributed in modified form only if the license allows the distribution of "patch files" with the source code for the purpose of modifying the program at build time. The license must explicitly permit distribution of software built from modified source code. The license may require

derived works to carry a different name or version number from the original software. 5. No Discrimination Against Persons or Groups The license must not discriminate against any person or group of persons. 6. No Discrimination Against Fields of Endeavor. The license must not restrict anyone from making use of the program in a specific field of endeavor. For example, it may not restrict the program from being used in a business, or from being used for genetic research. 7. Distribution of License The rights attached to the program must apply to all to whom the program is redistributed without the need for execution of an additional license by those parties. 8. License Must Not Be Specific to a Product The rights attached to the program must not depend on the program's being part of a particular software distribution. If the program is extracted from that distribution and used or distributed within the terms of the program's license, all parties to whom the program is redistributed should have the same rights as those that are granted in conjunction with the original software distribution. 9. License Must Not Restrict Other Software The license must not place restrictions on other software that is distributed along with the licensed software. For example, the license must not insist that all other programs distributed on the same medium must be open-source software. 10. License Must Be Technology-Neutral No provision of the license may be predicated on any individual technology or style of interface. Open Source Initiative, http://opensource.org/docs/osd

LEARN MORE

Networking Service Provider Concerns Telecom Network Management

As network convergence evolves, major challenges confront network developers. Sheer demand for bandwidth is perhaps the most significant. As applications become more sophisticated and users exchange data of increasingly rich content, network resources can become overwhelmed. A key to effective network convergence therefore lies in the design, installation and maintenance of adequate hardware. Another challenge is the fact that the implementation of new technologies is limited by the extent to which investors and taxpayers are willing to support them. Still another key issue is the need for standards that ensure seamless operation with multiple end-user platforms and evolving communications modes. New technologies sometimes bring new types of traffic that place previously unknown demands on network hardware, operating systems, resources and software.

CCNA is a popular certification in computer networking developed by Cisco Systems. Cisco created the CCNA to recognize basic competency in installation and support of medium-sized networks. The core CCNA certification can be obtained by passing a single 90-minute written exam. The exam has no prerequisites, although Cisco and other companies offer various formal training courses to help students prepare. Topics covered on the CCNA exam include

LAN and WAN design (including the OSI model) IP addressing routers and routing protocols (including OSPF, EIGRP and RIP) VLAN (virtual LAN) and WLAN (wireless LAN) network security and management (including ACLs)

Separate from the core certification, Cisco also provides separate exams and certs called CCNA Security, CCNA Voice and CCNA Wireless designed to recognize speciality in those respective areas of basic computer networking. The CCNA remains valid for three years when re-certification is required. Cisco also offers more advanced certifications for networking professionals beyond CCNA, including the CCNP (Cisco Certified Network Professional) and CCIE (Cisco Certified Internetwork Expert). Acronym for Cisco Certified Network Associate indicates a foundation in and apprentice knowledge of networking. CCNA certified professionals can install, configure, and operate LAN, WAN, and dial access services for smallnetworks (100 nodes or fewer), including but not limited to use of these protocols: IP, IGRP, Serial, Frame Relay, IP RIP, VLANs, RIP, Ethernet, Access Lists. *
CCNP is a professional or "journeyman" level networking certification. Cisco created the CCNP to recognize advanced skills in computer networking, particularly for installation and support of medium-sized LAN/WAN networks (having 100-500 nodes).

The CCNP focuses on routing and switching of scalable networks including intranets and campuses. To obtain a CCNP, one must complete either two or four exams that cover routing, switching, remote access, and network support. In total, the exams cost approximately $500 (USD). As with all other Cisco certification exams, it's strongly recommended to prepare for the CCNP by reading study books, taking practice exams on the Web, and getting hands-on experience with Cisco equipment. One must hold an active CCNA certification to be eligible for a CCNP. After obtaining a CCNP, one may choose to progress to the even more advanced and prestigious CCIEcertification. Also Known As: Cisco Certified Network Professional
CCIE (Cisco Certified Internetwork Expert) is the most advanced level of networking certification available from Cisco Systems. The CCIE certification is highly prestigious and renowned for its difficulty. Obtaining a CCIE Different CCIE certifications can be earned in separate areas of specialty called "tracks": Routing and Switching Security Service Provider

Storage Networking Voice Wireless To obtain a CCIE certification requires passing both a written exam and a separate lab exam specific to one of the tracks listed above. The written exam lasts two hours and contains a series of multiple-choice questions. It costs USD $350. After completing the written exam, CCIE candidates are then eligible to take a day-long lab exam that costs an additional USD $1400. Those who succeed and earn a CCIE must complete recertification every two years to maintain their certification. No specific training courses or lower-level certifications are prerequisites to a CCIE. However, in addition to the usual book study, hundreds of hours of hands-on experience with Cisco gear are generally required to adequately prepare for the CCIE. Benefits of a CCIE Networking professionals typically seek CCIE certification to help increase their salary or expand job opportunities within their field of specialty. The extra focus and effort required to preparing for CCIE exams normally improves an individual's skill in the field. Interestingly, Cisco Systems also gives preferred treatment to Technical Support tickets of their customers when filed by CCIE engineers. Suggested Reading

A CWNA certification program is the only vendor-neutral program available to teach network engineers a standard body of knowledge for wireless LANs. Candidates for this program include network and computer systems administrators, network technicians, systems administrators, and a wide range of other professionals looking to educate themselves in CWNA. While enrolled in the program, students learn skills such as security measures, management, wireless installation, and other valuable knowledge to help them in their careers after graduation.

Courses Required
In order to earn a CWNA certificate, students must complete courses designed to further their knowledge of the industry. While course names may vary, typical courses include a variation of the following:

Site Surveys

Security Radio Frequency Technologies Wireless LAN Technologies Troubleshooting Implementation and Management Industry and Standards

Skills Obtained
Students seeking a CWNA certificate must acquire certain skills before becoming eligible for graduation. The following skills and knowledge must be mastered by students before receiving certification:

Wireless installation Problem-solving skills Team work Wireless network systems configuration

A hub is typically the least expensive, least intelligent, and least complicated of the three. Its job is very simple: anything that comes in one port is sent out to the others. That's it. Every computer connected to the hub "sees" everything that every other computer on the hub sees. The hub itself is blissfully ignorant of the data being transmitted. For years, simple hubs have been quick and easy ways to connect computers in small networks. A switch does essentially what a hub does but more efficiently. By paying attention to the traffic that comes across it, it can "learn" where particular addresses are. For example, if it sees traffic from machine A coming in on port 2, it now knows that machine A is connected to that port and that trafficto machine A needs to only be sent to that port and not any of the others. The net result of using a switch over a hub is that most of the network traffic only goes where it needs to rather than

to every port. On busy networks this can make the network significantly faster.

"Varying degrees of magic happen inside the device, and therein lies the difference."
A router is the smartest and most complicated of the bunch. Routers come in all shapes and sizes from the small four-port broadband routers that are very popular right now to the large industrial strength devices that drive the internet itself. A simple way to think of a router is as a computer that can be programmed to understand, possibly manipulate, and route the data its being asked to handle. For example, broadband routers include the ability to "hide" computers behind a type of firewall which involves slightly modifying the packets of network traffic as they traverse the device. All routers include some kind of user interface for configuring how the router will treat traffic. The really large routers include the equivalent of a full-blown programming language to describe how they should operate as well as the ability to communicate with other routers to describe or determine the best way to get network traffic from point A to point B. A quick note on one other thing that you'll often see mentioned with these devices and that's network speed. Most devices now are capable of both 10mps (10 megabits, or million bits, per second) as well as 100mbs and will automatically detect the speed. If the device is labeled with only one speed then it will only be able to communicate with devices that also support that speed. 1000mbs or "gigabit" devices are starting to slowly become more common as well. Similarly many devices now also include 802.11b or 802.11g wireless

transmitters that simply act like additional ports to the device.

Potrebbero piacerti anche