SlideShare a Scribd company logo
Network
devices II.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Firewalls.
– Network attached storage (NAS).
– Other devices.
PACE-IT
Page 4
Network devices II.
Page 5
– The firewall.
» It can be built into routers or be its own device.
» It functions at multiple layers of the OSI model.
• Specifically at layers 2, 3, 4, and 7.
» It is used to prevent or mitigate security threats.
» It blocks packets from entering or leaving the network.
• Via stateless inspection: the firewall will examine
every packet against a set of rules. Once the packet
matches a rule, the rule is enforced, and the specified
action is taken.
• Via stateful inspection: the firewall will only examine
the state of the connection between networks.
Specifically, when a connection is made from an
internal network to an external network, the firewall will
not examine any packets returning from the external
connection. As a general rule, external connections are
not allowed to be initiated with the internal network.
» It is the first line of defense in protecting the internal
network from outside threats.
• Consider it the police force of the network.
Network devices II.
Page 6
Network devices II.
Page 7
– The NAS.
» One solution to the data storage needs of the modern world.
• It is a specifically designed pool of storage.
» NAS is usually deployed as a network appliance.
• A network appliance is a device that is purchased and
deployed with a preconfigured operating system and software.
It is designed to perform a specific function and to do that
function very well.
• Network appliances limit the amount of configuration that the
user is allowed to perform.
» NAS offers several storage solution benefits.
• NAS is often designed and deployed with performance in
mind (with some form of RAID striping and multiple
connections to the network, thus increasing the possible
throughput).
• NAS is often designed with high availability in mind (with
some form of RAID mirroring and redundant systems in case
of equipment failure).
• NAS is always designed and deployed with high storage
capacity in mind. The size of the NAS is usually only limited
by the budget of the purchaser.
Network devices II.
Page 8
Network devices II.
Page 9
– Voice over IP (VoIP) phones.
» Use the network and Internet to provide telephone service.
» Offer more than just normal telephone functions.
• They can automatically log VoIP traffic, they are often
programmed with time clock applications, and they are often
programmed with simple browsers.
» VoIP can reduce the cost of operating telephones.
• Reduced long distance costs.
• Reduced cost of reconfiguration and ease of management of
the system.
– Internet appliances.
» A category of purpose built devices that are designed to
connect to a network and offer simple communication.
• An example would be a device that measures the amount of
material in a tank and, when it reaches a certain level, it will
send a message to reorder the necessary supply.
» They are usually designed to simplify a process or procedure.
Network devices II.
Page 10
Network devices II.
They can be built into routers or purpose built. They function at multiple
levels of the OSI model in an effort to mitigate and protect the network from
security threats. They control the flow of traffic into and out of networks.
Topic
Firewalls.
Summary
A mass storage solution for the modern network. NAS is often deployed
with high performance and/or high availability in mind. This is achieved
through the use of RAID and other redundancy built into them. They tend to
be a type of network appliance that is built to achieve a specific purpose.
The size of the storage solution is only limited by the budget for it.
Network attached storage.
VoIP phones offer telephone service over the network and Internet. VoIP
can offer more than just telephone service (logging, time card functions,
and the inclusion of a simple browser are common). VoIP can be used to
reduce the normal cost of telephony. Internet appliances are purpose built
devices that are designed to connect to networks and offer simple
communication.
Other devices.
Page 11
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

PPTX
PACE-IT, Security+1.1: Introduction to Network Devices (part 1)
PPTX
PACE-IT, Security+1.4: Common Network Protocols (part 1)
PPTX
PACE-IT, Security+1.2: Secure Network Administration Concepts
PPTX
PACE-IT, Security+1.5: Wireless Security Considerations
PPTX
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PPTX
PACE-IT, Security+2.6: Security Related Awareness and Training
PPTX
PACE-IT: Network Monitoring (part 2) - N10 006
PPTX
PACE-IT: Common Network Security Issues
PACE-IT, Security+1.1: Introduction to Network Devices (part 1)
PACE-IT, Security+1.4: Common Network Protocols (part 1)
PACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT: Network Monitoring (part 2) - N10 006
PACE-IT: Common Network Security Issues

What's hot (20)

PPTX
PACE-IT: The Importance of Network Segmentation
PPTX
PACE-IT: Supporting Configuration Management (part 1)
PPTX
PACE-IT: Basic Cloud Concepts - N10 006
PPTX
Pace it troubleshooting-common_network_issues_bf
PPTX
PACE-IT: Supporting Configuration Management (part 2)
PPTX
PACE-IT: Firewall Basics
PPTX
PACE-IT: Common Threats (part 1)
PPTX
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PPTX
PACE-IT: Wireless LAN Infrastructure (part 2)
PPTX
PACE-IT: Physical Network Security Control
PPTX
PACE-IT: Network Hardening Techniques (part 2)
PPTX
PACE-IT: Common WAN Components and Issues
PPTX
PACE-IT: Common Network Vulnerabilities
PPTX
PACE-IT: Network Monitoring (part 1) - N10 006
PPTX
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PPTX
PACE-IT: Wireless LAN Infrastructure (part 1)
PPTX
PACE-IT: Troubleshooting Wireless Networks (part 1)
PPTX
PACE-IT: Cable Management
PPTX
PACE-IT: Applying Patches and Upgrades
PPTX
PACE-IT: Troubleshooting Wireless Networks (part 2)
PACE-IT: The Importance of Network Segmentation
PACE-IT: Supporting Configuration Management (part 1)
PACE-IT: Basic Cloud Concepts - N10 006
Pace it troubleshooting-common_network_issues_bf
PACE-IT: Supporting Configuration Management (part 2)
PACE-IT: Firewall Basics
PACE-IT: Common Threats (part 1)
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PACE-IT: Wireless LAN Infrastructure (part 2)
PACE-IT: Physical Network Security Control
PACE-IT: Network Hardening Techniques (part 2)
PACE-IT: Common WAN Components and Issues
PACE-IT: Common Network Vulnerabilities
PACE-IT: Network Monitoring (part 1) - N10 006
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT: Wireless LAN Infrastructure (part 1)
PACE-IT: Troubleshooting Wireless Networks (part 1)
PACE-IT: Cable Management
PACE-IT: Applying Patches and Upgrades
PACE-IT: Troubleshooting Wireless Networks (part 2)
Ad

Viewers also liked (19)

PDF
Greg Sarangoulis - Hashtag Philanthropy and You
PPT
Flex 4 Deep Dive
PDF
Proposal
PDF
Fpr pd12 a
PDF
Capitulo3 agua de mar
PPTX
Microfinance for Water & Sanitation: Cambodian Case Study
PDF
Maternidad en la niñez
PPT
Rekruttering med Sociale medier IT-forum Århus
PDF
에버노트를 가볍게 시작하는 7개의 아이디어
PDF
BURTON_SeaKayaker_issue145_17
PPTX
Horse SA Educational Property Walk
DOC
Unit 5 DB and IP
PDF
DetailJJP
PDF
50+: dwaze vragen & hardnekkige misverstanden
PPTX
Comunicacion juan
PDF
Proyecto Mujeres
PPTX
Protection and management of copyright and related rights
PPTX
Sustainable development as contemporary issue in management
PDF
Primary vlan
Greg Sarangoulis - Hashtag Philanthropy and You
Flex 4 Deep Dive
Proposal
Fpr pd12 a
Capitulo3 agua de mar
Microfinance for Water & Sanitation: Cambodian Case Study
Maternidad en la niñez
Rekruttering med Sociale medier IT-forum Århus
에버노트를 가볍게 시작하는 7개의 아이디어
BURTON_SeaKayaker_issue145_17
Horse SA Educational Property Walk
Unit 5 DB and IP
DetailJJP
50+: dwaze vragen & hardnekkige misverstanden
Comunicacion juan
Proyecto Mujeres
Protection and management of copyright and related rights
Sustainable development as contemporary issue in management
Primary vlan
Ad

Similar to Pace IT - Network Devices (part 2) (20)

PPTX
PACE-IT: Network Infrastructure Implementations - N10 006
PPTX
PACE-IT: Networking Services and Applications (part 2) - N10 006
PPTX
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PPTX
PACE-IT: Storage Area Networks - N10 006
PPTX
Network resources
PDF
News letter oct 11
DOC
76924356 synopsis-network
PPTX
ICT-Lecture-5(Networking).pptx/comsatsuniversity islamabad
PPTX
Introduction to computer network
PPTX
Pace IT - Client Networking (Part 3)
PPTX
introduction to basicComputer Networks .pptx
PPTX
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PPTX
A Deep Dive in the World of IT Networking (Part 2)
PPT
ccna presentation
PPT
Ccnapresentation 13020219098042-phpapp02 (1)
PPTX
Networking devices
PPT
Networking Fundamentals.ppt
PPT
802.11: Ethernet Marches On
DOCX
Computer network note
PPTX
Various Network Devices.pptx
PACE-IT: Network Infrastructure Implementations - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PACE-IT: Storage Area Networks - N10 006
Network resources
News letter oct 11
76924356 synopsis-network
ICT-Lecture-5(Networking).pptx/comsatsuniversity islamabad
Introduction to computer network
Pace IT - Client Networking (Part 3)
introduction to basicComputer Networks .pptx
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
A Deep Dive in the World of IT Networking (Part 2)
ccna presentation
Ccnapresentation 13020219098042-phpapp02 (1)
Networking devices
Networking Fundamentals.ppt
802.11: Ethernet Marches On
Computer network note
Various Network Devices.pptx

More from Pace IT at Edmonds Community College (20)

PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PPTX
PACE-IT, Security + 5.3: Security Controls for Account Management
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PPTX
PACE-IT, Security + 5.1: Summary of Authentication Services
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PPTX
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PPTX
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PPTX
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PPTX
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PPTX
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PPTX
PACE-IT, Security+3.6: Security Enhancement Techniques
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)

Recently uploaded (20)

PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Institutional Correction lecture only . . .
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Cell Types and Its function , kingdom of life
PDF
RMMM.pdf make it easy to upload and study
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Classroom Observation Tools for Teachers
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
Basic Mud Logging Guide for educational purpose
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPH.pptx obstetrics and gynecology in nursing
Institutional Correction lecture only . . .
Complications of Minimal Access Surgery at WLH
Cell Types and Its function , kingdom of life
RMMM.pdf make it easy to upload and study
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Classroom Observation Tools for Teachers
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Anesthesia in Laparoscopic Surgery in India
TR - Agricultural Crops Production NC III.pdf
01-Introduction-to-Information-Management.pdf
Basic Mud Logging Guide for educational purpose
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
school management -TNTEU- B.Ed., Semester II Unit 1.pptx

Pace IT - Network Devices (part 2)

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Firewalls. – Network attached storage (NAS). – Other devices. PACE-IT
  • 5. Page 5 – The firewall. » It can be built into routers or be its own device. » It functions at multiple layers of the OSI model. • Specifically at layers 2, 3, 4, and 7. » It is used to prevent or mitigate security threats. » It blocks packets from entering or leaving the network. • Via stateless inspection: the firewall will examine every packet against a set of rules. Once the packet matches a rule, the rule is enforced, and the specified action is taken. • Via stateful inspection: the firewall will only examine the state of the connection between networks. Specifically, when a connection is made from an internal network to an external network, the firewall will not examine any packets returning from the external connection. As a general rule, external connections are not allowed to be initiated with the internal network. » It is the first line of defense in protecting the internal network from outside threats. • Consider it the police force of the network. Network devices II.
  • 7. Page 7 – The NAS. » One solution to the data storage needs of the modern world. • It is a specifically designed pool of storage. » NAS is usually deployed as a network appliance. • A network appliance is a device that is purchased and deployed with a preconfigured operating system and software. It is designed to perform a specific function and to do that function very well. • Network appliances limit the amount of configuration that the user is allowed to perform. » NAS offers several storage solution benefits. • NAS is often designed and deployed with performance in mind (with some form of RAID striping and multiple connections to the network, thus increasing the possible throughput). • NAS is often designed with high availability in mind (with some form of RAID mirroring and redundant systems in case of equipment failure). • NAS is always designed and deployed with high storage capacity in mind. The size of the NAS is usually only limited by the budget of the purchaser. Network devices II.
  • 9. Page 9 – Voice over IP (VoIP) phones. » Use the network and Internet to provide telephone service. » Offer more than just normal telephone functions. • They can automatically log VoIP traffic, they are often programmed with time clock applications, and they are often programmed with simple browsers. » VoIP can reduce the cost of operating telephones. • Reduced long distance costs. • Reduced cost of reconfiguration and ease of management of the system. – Internet appliances. » A category of purpose built devices that are designed to connect to a network and offer simple communication. • An example would be a device that measures the amount of material in a tank and, when it reaches a certain level, it will send a message to reorder the necessary supply. » They are usually designed to simplify a process or procedure. Network devices II.
  • 10. Page 10 Network devices II. They can be built into routers or purpose built. They function at multiple levels of the OSI model in an effort to mitigate and protect the network from security threats. They control the flow of traffic into and out of networks. Topic Firewalls. Summary A mass storage solution for the modern network. NAS is often deployed with high performance and/or high availability in mind. This is achieved through the use of RAID and other redundancy built into them. They tend to be a type of network appliance that is built to achieve a specific purpose. The size of the storage solution is only limited by the budget for it. Network attached storage. VoIP phones offer telephone service over the network and Internet. VoIP can offer more than just telephone service (logging, time card functions, and the inclusion of a simple browser are common). VoIP can be used to reduce the normal cost of telephony. Internet appliances are purpose built devices that are designed to connect to networks and offer simple communication. Other devices.
  • 12. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.