A Wide Area Network (WAN) is a network that covers a broad area (i.e., any Telecommunication Network that links across metropolitan, regional, or national boundaries) using private or public network transports. Business and government entities utilize WANs to relay data among employees, clients, buyers, and suppliers from various geographical locations. In essence, this mode of telecommunication allows a business to effectively carry out its daily function regardless of location. The Internet can be considered a WAN as well, and is used by businesses, governments, organizations, and individuals for almost any purpose imaginable.
- Operation of a Router
The (current) Internet infrastructure consists of an interconnected set of networks (known as autonomous systems (AS)) that are independently administrated. Packets are forwarded between links within an AS and between different AS’s using route
- Operation of a Cisco Switch
They connect multiple PCs, printers, servers and other hardware. Switches allow you to send information, such as email, and access shared resources, including printers, in a smooth, efficient, and transparent manner. Cisco provide us manageable switches
- Routing Protocol
A generic term that refers to a formula, or protocol, used by a router to determine the appropriate path over which data is transmitted. The routing protocol also specifies how routers in a network share information with each other and report changes. The routing protocol enables a network to make dynamic adjustments to its conditions, so routing decisions do not have to be predetermined and static.
This course is designed for individuals with minimum education qualification equivalent to Matric. Individuals interested to initiate their career in computer networking business or industry.
Qualified and competent professionals will conduct this course
This course is delivered through lectures, multimedia presentations, videos and hands-on practice on modern specific computers.
Participants will be able to create networking designs in different formations. They will also be able to control the access of information by individual user through centralized server.