Premium Essay

Dn Fd

In:

Submitted By yash13
Words 1783
Pages 8
UNSW BUSINESS SCHOOL
International Human Resource Management
MGMT 5949
Student Id Number-Z5102653
Student Name-Yash Patwari
Case analysis on-
Global Diversity and Inclusion at Royal Dutch Shell
I declare that this assessment item is my own work, except where acknowledged, and has not been submitted for academic credit elsewhere, and acknowledge that the assessor of this item may, for the purpose of assessing this item: * Reproduce this assessment item and provide a copy to another member of the University and/or
 * Communicate a copy of this assessment item to a plagiarism checking service (which may then retain a copy of the 
assessment item on its database for the purpose of future plagiarism checking).
 I certify that I have read and understood the University Rules in respect of Student Academic Misconduct. Signed by- Yash Patwari 


Case Overview
Royal Dutch Shell is an Oil and Gas company created in 1907 through the alliance of the oil company Royal Dutch Petroleum Company and the British Shell Transport and Trading Company. Since mid-1990’s Shell started giving attention to Diversity and Inclusion (D&I). Shell has been placing great interest on D&I since that time. The company was restructured in 2005 and Jeroen Van Der Veer became the first CEO of the company. During that time rising oil prices helped Shell’s expansion projects. Since the 2000s Shell had been building its D&I around three areas: Talent, Leadership, and Competitiveness. In 2005, Shell had set three global targets based on Gender, Nationality, and Inclusion. During the time of great recession Peter Voser succeeded Van deer as the new CEO of Shell in 2008. The economic downturn led to a drop in the prices of oil which sunk the profits of the company. Voser announced that Shell urgently needed to restructure. Voser restructured the Management structure of the

Similar Documents

Free Essay

Erggf

...m e n t o f t h e h i g h e s tq u a l i t y a n d p e r f o r m a n c e . W h e t h e ry o u r F T b i s f o r t h e h o m e ,l a b o r a t o r y , r f o r t r a v e l i n g , m a k e o t he most of y our oppor tu n i ti e s ! BeforeUsing.. . P l e a s er e a d t h i s i n s t r u c t i o n b o o k l e t c a r e f u l l y , a n d m a s t e rt h e m a n i p u l a t i o n s f t h e v a r i o u sp a r t s o f t h e o F T b c o m p l e t e l y . O n c e t h r o u g h l yv e r s e d i n t h e c o r r e c t h a n d l i n go f t h i s c a m e r a ,y o u c a n u s e t h e C a n o n F T b t o t h e f u l l e s te x t e n t o f i t s c a p a b i l i t i e s . www.orphancameras.com Bayonet Ring for Cap a n d H o o d CanonLens FD 50mm F 1.4 Coupling Pin to Flash-Auto Ring A/B Distance Scale F o c u s i n gR i n g PresetAperture Ring Metering Lever Film Speed Set Ring Bayonet Mount Ring Flash Socket ASA Fitm Speed Scale Time Lock/ tter Lock Lever Frame Counter Shutter Release Button Film Advance Lever Shutter Speed Dial c Meter Switch ,.* Film RewindCrank Accessory Shoe Film Plane Indicator Contents , . TechnicaData l Mercury Battery Loadingand Checking F i l mW i n d i n g . Shutter and Aperture Adjustment M U s i n g B u i l t - l nE x p o s u r e e t e r ExposureSettings . CouplingRangeof Buitt-in ExposureMeter . V i e w i n ga n d F o c u s i n g . H o...

Words: 14053 - Pages: 57

Free Essay

What Is This About?

...................,clclamcmcmcmcmc .c c,c c, cndcncmcmc,mcmcmnc mcmcmcmc mcmmckfknvlkdnmck,dn vc.kldn f,v ,fv,fv,fm v, mf,mvmf ,v cfd,v cdf. cfl, vmcfdlvclfmv cfc ,fc , fdc vc dfcmfd c cnf fv fc fd ff f f fv fd hgb firjefgopkrgtfohrhrfjfrirfirurhrffhgjdbvbhgeyfgruighjergrghgrotggfhbgjhbgrggrhghughrjgrgjrhgjrhgrhgirghggig.w][r0ptjutybg/bpb[ -8rt94thut54;t,f;45,gf;l45gmrltgmlmtglgg.................,clclamcmcmcmcmc .c c,c c, cndcncmcmc,mcmcmnc mcmcmcmc mcmmckfknvlkdnmck,dn vc.kldn f,v ,fv,fv,fm v, mf,mvmf ,v cfd,v cdf. cfl, vmcfdlvclfmv cfc ,fc , fdc vc dfcmfd c cnf fv fc fd ff f f fv fd hgb firjefgopkrgtfohrhrfjfrirfirurhrffhgjdbvbhgeyfgruighjergrghgrotggfhbgjhbgrggrhghughrjgrgjrhgjrhgrhgirghggig.w][r0ptjutybg/bpb[ -8rt94thut54;t,f;45,gf;l45gmrltgmlmtglgg.................,clclamcmcmcmcmc .c c,c c, cndcncmcmc,mcmcmnc mcmcmcmc mcmmckfknvlkdnmck,dn vc.kldn f,v ,fv,fv,fm v, mf,mvmf ,v cfd,v cdf. cfl, vmcfdlvclfmv cfc ,fc , fdc vc dfcmfd c cnf fv fc fd ff f f fv fd hgb firjefgopkrgtfohrhrfjfrirfirurhrffhgjdbvbhgeyfgruighjergrghgrotggfhbgjhbgrggrhghughrjgrgjrhgjrhgrhgirghggig.w][r0ptjutybg/bpb[ -8rt94thut54;t,f;45,gf;l45gmrltgmlmtglgg.................,clclamcmcmcmcmc .c c,c c, cndcncmcmc,mcmcmnc mcmcmcmc mcmmckfknvlkdnmck,dn vc.kldn f,v ,fv,fv,fm v, mf,mvmf ,v cfd,v cdf. cfl, vmcfdlvclfmv cfc ,fc , fdc vc dfcmfd c cnf fv fc fd ff f f fv fd hgb firjefgopkrgtfohrhrfjfrirfirurhrffhgjdbvbhgeyfgruighjergrghgrotggfhbgjhbgrggrhghughrjgrgjrhgjrhgrhgirghggig.w][r0ptjutybg/bpb[ -8rt94thut54;t...

Words: 1736 - Pages: 7

Free Essay

Sire

...few fjew jf wef e,w fnmwr nf wnf wk fnew fn, dn,f enw fnew fn ewnf d,anm fnda f,n sfnd sanf dnas, fnads, fnd asnf dasn,f sdnf nads fnd an,fd n,f dn,asf ds, fnds fn d,nfdnm,f nsad fndsl nf da,mdf dns dwfnfn,a fnl nf d,f ,n afn, dan fndl fnd nf dna fnad fj nf j fnad c akf adm, fmka fnan fn,da fnda f,nda fnd fjd an, f. dan,f ena f,da fjl fm dm fj fdJL FJDA FD ANFDMA N NSD CJ SJC V cn vfkjvljk nr jkf Edjejkesnd j djew few fjew jf wef e,w fnmwr nf wnf wk fnew fn, dn,f enw fnew fn ewnf d,anm fnda f,n sfnd sanf dnas, fnads, fnd asnf dasn,f sdnf nads fnd an,fd n,f dn,asf ds, fnds fn d,nfdnm,f nsad fndsl nf da,mdf dns dwfnfn,a fnl nf d,f ,n afn, dan fndl fnd nf dna fnad fj nf j fnad c akf adm, fmka fnan fn,da fnda f,nda fnd fjd an, f. dan,f ena f,da fjl fm dm fj fdJL FJDA FD ANFDMA N NSD CJ SJC V cn vfkjvljk nr jkf Edjejkesnd j djew few fjew jf wef e,w fnmwr nf wnf wk fnew fn, dn,f enw fnew fn ewnf d,anm fnda f,n sfnd sanf dnas, fnads, fnd asnf dasn,f sdnf nads fnd an,fd n,f dn,asf ds, fnds fn d,nfdnm,f nsad fndsl nf da,mdf dns dwfnfn,a fnl nf d,f ,n afn, dan fndl fnd nf dna fnad fj nf j fnad c akf adm, fmka fnan fn,da fnda f,nda fnd fjd an, f. dan,f ena f,da fjl fm dm fj fdJL FJDA FD ANFDMA N NSD CJ SJC V cn vfkjvljk nr jkf Edjejkesnd j djew few fjew jf wef e,w fnmwr nf wnf wk fnew fn, dn,f enw fnew fn ewnf d,anm fnda f,n sfnd sanf dnas, fnads, fnd asnf dasn,f sdnf nads fnd an,fd n,f dn,asf ds, fnds fn d,nfdnm,f nsad fndsl nf da,mdf dns dwfnfn,a fnl nf d,f ,n afn, dan fndl fnd nf...

Words: 436 - Pages: 2

Free Essay

Html

...BSimpleText g K h oD dS- Bpico g K h mZd M BNotepad g K h i d2D >V |]? >w BE-FG. -2? uFG. B-Q d}w ? Netscape Navigator ? Explorer Internet >w B-A - S Q tG. Mh @Z1 2„ I [ 2 DA • >? - E-FG. S S I J A€ -A]? DJD qS? >DZ2 E-FG. Br] ]s tG. |M |]? I • | FGH d2-Q g K DN u 6 v- F h fP • gD >? @~G2 P /V w M K E-FG. FG. d2-Q 5 6 v- F h B-~2? tG. | M4 >… | P DN uM~G2 fP tG. FG. OPN 5M4 IM[ /‚ 5 6 ƒD] DA • .>-S R h fP h | FGH Internet tG. tG. E-FG. g 2 B- ]-} E- d /V -A 4 B† ? CSS Q LM E-FG. 5 6 v- F Q 4 LM 4 N | -FGH /V B . Q F -S |AJ D Q ‡ LM A€ MZ1 Explorer 4 2 † DA A B-dQ‡D Netscape Navigator tG. @€2 W D w @S - ? B-N Ž XML B KH S U HTML 4.0 @q C2D E- d -] LM -Q‰ - 4 Microsoft J @Z1 -3Q .u -FG. Sindbad e -] h- ‡ tG. S Explorer 5.0 Internet tG. 4 -Q J •-3hw OPA B Navigator Netscape I‰ @Z1 4 KH S U rG‡D ‡ (‘“' N Sindbad e -] H6 /‚ (‘’+ H0 N Netscape Navigator tG. /w GH ZG : ‡ ] V H6 /‚ Navigator C2 Q -A 4? † •-3hw -N B 46 2 • . qS u d G] – -Q E-FG. I J B 2D‡ 1 @ 4 HTML L 2 ER B Q -4 E ‡ E” J MAh L HTML L .. PN @S Q BHTML L g K h2 [ r]-S - A |P -~2? I [ .—3~ - O 2 MAh 4 D‡ E ” -A] -~2? HTML R - 5M4 -3 -Ž @.F |]? • h -A HTML E-GM >DZ • .| FGH .˜ d ™ šD F . A B˜ šD F T DA J N-1 h DA • O N-12 - DN : S F – RJw N : • .. HTML L [ PN | ” 5M4 W-q HTML is a Great Language .. PZN A€ h ˜ [ N-1 tG. g Kh d4 HTML is a Great Language •-F tG. .. –-G•0 /‚ B@‰- gDhD >? BHTML is a Great Language v i DH h B hD 2 B( h @3‡ ( / ) -34 MZ @q 2 fP šD F tG ...

Words: 7938 - Pages: 32

Premium Essay

Business Report Lego in Combination with Tour de France

...hi hi hi hi ihi hi ihihi i ihhihi hihi hihi h ih ihihihi hi i i hih ihhih i hihih i hihi h ihih i hihi h ih hihihih i hihi h ih ih ih ih ih ih ih ih ihihih ih i hihi h ihih ih ih ihih ih ih ihih ih ih ih ih ih ih ih ih ih ih ih ih ih hihi h ih ih ihihih i hihi h ih ih ihih ih ih ih ih ihih ih ih ih ih i hihi h ih ih ih ih ih ih ih ih ih ihih ih ih i hi i hihi hihi h ih ihihiihihih ih ihih ihi ih ih ih ihihih i hi hihi h ih hihi hi hihihi hihihihihii ii i i iiiii i i kl jjkj klj kj j kl lk k jl kl kj lk; lkjlk j l;jk lk ; jk jk jl kl ; ;lj lkj lj lk lk lj j l d d dn ds sadf asd fsd f fs fa fsda fsda sfd sdaf fsd fds fds fsadf sa fsd sdff dsfds dsf fds fds fdsa fdsa dsf dsf dfdsaf adfs fd fd fdsa dfs df df dfs sdf dsf dfs dsf fsad fds fdas f fsad sad ds dfs fds fsd df fds fsd fsdfasd fsad d fdsf dsfds fds fds fds fd fds fsd fds fds fsad fad fd fds fsd sdf dsffd fd fsd fsd fds fds fd fs fsd dfs fds...

Words: 281 - Pages: 2

Free Essay

Miss

...Hihhh h hh j k k rrk v gg j j dj bjf dj v dfjf jf k is m r vss s s svi sisd sgimg sfif mbi reokd wefdk riwmrjfnA DFWWNDS BEV BWJFVDV WJBEMRFDB DFBMDFJF D FMJF DCDDFNGEKMF M DFKGC D KDK DFRGFV DDF SDMF EJ SE KVJ KSDVV SVVD DEDKV SKDV FMFGNFKVN DF DFM VDDMV XDFMV DD M KD MV SDKFFM DFMM NDSAVK MA,V DDI SMC JCD D VJVVAN JDSV KJSDJF NVJD SJDDK NF NJDC J DN J S D HCJCJ J SCV DIFNKZ SOIV DSIN D DSJID JD JDSDDNVDJ J JJV JVF JF DDKDFKDFBV FKL DKDFFKVNFF DFVKNF DDJ VK VKSFN MDJV V CJZ VV DJ DJ VNV KJNFVN DFV F ID V IF IF IDFI JFDFVN NFVI VIOFFNSDKDF ZIZ V I VD J SFVN V IFVZGN JFZFN FNN FJ V JDFK RJV B BVDJJ HJ BCBC B SU DHH HBB J D NJ NJF JNN JN NNJF JFCVN VN CN VC D F NDNJFDDN FD F D D DVV SVVD DEDKV SKDV FMFGNFKVN DF DFM VDDMV XDFMV DD M KD MV SDKFFM DFMM NDSAVK MA,V DDI SMC JCD D VJVVAN JDSV KJSDJF NVJD SJDDK NF NJDC J DN J S D HCJCJ J SCV DIFNKZ SOIV DSIN D DSJID JD JDSDDNVDJ J JJV M DJ RJF HR FNSDVRHR J BSDDND DJVSDDBSNAV DBAS DFAABS JHJDBAHDN DJFDCN SIJFBSD VSJDFS SIJF SJG DN FJSGDS SJDZRFUSDJN DFNFDWIASCSD N DBSURFAD VDRF NSJ DFKJDNV JV J NJVIU VJND VIEF XIUEF VJNZG SJDFWEIUFHHN NFFC CBEFUIUF\ VVUAOFVB Z UU JDSF SNSVU A ZUJS EJFB...

Words: 253 - Pages: 2

Free Essay

Assignment

...Overview • Socket Programming: how applications use the network Socket Programming EE 122: Intro to Communication Networks Vern Paxson TAs: Lisa Fowler, Daniel Killebrew, Jorge Ortiz – Sockets are a C-language programming interface between Layer 7 (applications) and Layer 4 (transport) – Interface is quite general and fairly abstract – Use of interface differs somewhat between clients & servers Materials with thanks to Sukun Kim, Artur Rivilis, Jennifer Rexford, Ion Stoica, and colleagues at Princeton and UC Berkeley 1 2 Socket: End Point of Communication • Sending message from one process to another – Message must traverse the underlying network Using Ports to Identify Services Server host 128.2.194.242 Client host Client • Process sends and receives through a “socket” – In essence, the doorway leading in/out of the house Service request for 128.2.194.242:80 (i.e., the Web server) OS Web server (port 80) Echo server (port 7) • Socket as an Application Programming Interface – Supports the creation of network applications User process User process Service request for 128.2.194.242:7 (i.e., the echo server) Client Web server (port 80) OS Echo server (port 7) socket Operating System socket Operating System 3 4 Knowing What Port Number To Use • Popular applications have “well-known ports” – E.g., port 80 for Web and port 25 for e-mail – Well-known ports listed at http://www.iana.org Or see /etc/services on Unix systems ...

Words: 1853 - Pages: 8

Free Essay

Citm Assignment 3-4

...packets are 80–1279 bytes? 18.61% What percentage of packets are larger than 1279 bytes? 47.62% Print screen to show the above values. [pic] 4. Capture network traffic while accessing your favourite website with your web browser. In Wireshark, go to Statistics > HTTP > Packet Counter >Create Stat. How many Response Packets did you capture? 75 What types of Response Packets and how many of each type did you capture? 2xx: Success = 72 Packets 3xx Redirection = 3 Packets Other HTTP Packets = 1 Print screen the your result. [pic] Part B: Start the Wireshark application again and capture packets from your computer. Using a web browser, navigate to http://www.yahoo.com.. Also, find the reply. Describe in detail the DNS data in both the...

Words: 2121 - Pages: 9

Free Essay

Vulnerability Assess

...Nessus Report Nessus Scan Report 24/Jan/2014:09:12:12 Nessus Home: Commercial use of the report is prohibited Any time Nessus is used in a commercial environment you MUST maintain an active subscription to the Nessus Feed in order to be compliant with our license agreement: http://www.tenable.com/products/nessus Table Of Contents Hosts Summary (Executive).................................................................................................4 •kupangkota.go.id..........................................................................................................................................................5 Vulnerabilities By Host......................................................................................................... 7 •kupangkota.go.id..........................................................................................................................................................8 Vulnerabilities By Plugin.....................................................................................................64 •51192 (6) - SSL Certificate Cannot Be Trusted....................................................................................................... 65 •57582 (6) - SSL Self-Signed Certificate................................................................................................................... 67 •54582 (2) - SMTP Service Cleartext Login Permitted...........................................................

Words: 29406 - Pages: 118

Free Essay

Tcp/Ip

...TCP/IP - Socket Programming Jim Binkley 1 sockets - overview sockets ◆ simple client - server model ◆ – – – look at tcpclient/tcpserver.c look at udpclient/udpserver.c tcp/udp contrasts “normal” master/slave setup for TCP ◆ inetd on UNIX - mother server ◆ some details - there are more... ◆ Jim Binkley 2 sockets in BSD world since early 80’s, 4.2 BSD ◆ client/server model ◆ “like” unix file i/o up to a point, can be redirected to stdin/stdout/stderr (on unix) ◆ sockets are dominant tcp/ip application API ◆ – – other API is System V TLI (OSI-based) winsock - windows variations on sockets » sockets in windows event-driven framework 3 Jim Binkley sockets ◆ basic definition - “endpoint of communication” allows connected streams (TCP) or discrete messages (UDP) between processes on same machine, cross network ◆ in o.s., really read/write data queues + TCP has connection Queue (server side) ◆ talk to “socket” with handle/sock descriptor ◆ Jim Binkley 4 kinds of sockets acc. to address family; i.e. how does addressing work ◆ IP address family -> IP addr, tcp/udp port ◆ traditional BSD families ◆ – TCP/IP (AF_INET; i.e., Internet) » TCP/UDP/”raw” (talk to IP) – – – Jim Binkley UNIX (intra-machine, pipes) XNS, and even APPLETALK, DECNET, IPX ... 5 sockets client handle read write read write server socket layer r/w queues tcp stack Jim Binkley 6 syscalls - TCP client/simple test server int s =...

Words: 1236 - Pages: 5

Free Essay

Information Technology

...of hosts in a computer network, that are available to process datagrams or frames intended to be multicast for a designated network service. Multicast addressing can be used in the Link Layer (Layer 2 in the OSI model), such as Ethernet multicast, and at the Internet Layer (Layer 3 for OSI) for Internet Protocol Version 4 (IPv4) or Version 6 (IPv6) multicast. The Neighbor Discovery Protocol (NDP) is a protocol in the Internet protocol suite used with IPv6. It operates in the link layer of the Internet model and is responsible for address auto-configuration of nodes, discovery of other nodes on the link, determining the link layer addresses of other nodes, duplicate address detection, finding available routers and Domain Name System (DNS) servers, address prefix discovery, and maintaining reachability information about the paths to other active neighbor nodes. The protocol defines five different ICMPv6 packet types to perform functions for IPv6 similar to the Address Resolution Protocol (ARP) and Internet Control Message Protocol(ICMP) Router Discovery and Router Redirect protocols for IPv4. However, it provides many improvements over its IPv4 counterparts. For example, it includes Neighbor Unreachability Detection (NUD), thus improving robustness of packet delivery in the presence of failing routers or links, or mobile nodes. All nodes addresses Host Extensions for IP Multicasting specifies the extensions required of a host implementation of the Internet Protocol...

Words: 573 - Pages: 3

Free Essay

No Name

...Dv l djf nlfdk nldk nlkdf Nfd n fld Fd dn dlf d F fn f f Fdm fn d Md;n ld D fk ndlf df company facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany facing barriers to communicationcompany...

Words: 623 - Pages: 3

Free Essay

Public Servicies

...h‡æã6‡F„ô/ÉUm‡GÄ$ä–›²¤wÊUBÍ^Š éî²ÛÀ à;!ANï>;©†ÑMbh|”“„…"ÏÀ1¦#koRoÇ+Û̹Ÿ5—“n2P$U-›Cp›Ò ýxgj¸mèº#'ô¤»p÷þÙQU¯ò2Ç»;[¾ã¥ó4OsøÌÌ’²HWKÇöFáèýwÞ»v¸umoDU–Ï–gŽgGq8ažfwïÝ.Ê C ›ÓåÑéÉé øäø¬õü( ¼Øõs=¶5Ð4p Þ#\`?t«ŒQ$Ýæ< l UŠ¡òƒó€ÖŲH Ãñ|Ûá¹£ªÈKí‡Ýóc’×Òô®þfv–öT)§ç”š¶ÐΔ×G¥ßt%¬òA)_-Ù!Í©.‹“ÑŠZé^"Jm»úçïtâò?š°Æ1K7ˆR¹Ð(QÓì̪‘Ï=BÕžÝ]ñ »¡ÑN’TsË/Ÿ.ï.(‡ IDà:é*9ˆSPr „ªÛDòTz˜ºSC^´¹yS5êÌG(ȼÏzw½BÑ÷€&Mgµ‰îœT*aäVEÑw |v¾¯RUšÁ²Åà§Î) ñ"î| ™EÅ׿—;ÿPu$/^h5¤3P#àÄþ" Â-hu>Ye‰z;;;Ùb…Ÿ.=5¬ñÖæþþÕÈr€Ë^MF£ª 1È&£ñ2ûÇsIAY§F9ÖMփŜ©oø‚-˜KrÊO³JËŪ4ÅaO„½ìì ªZ´ÏˆR‘^-ü @±ï”îsÉ.}>éxRŸ £…ß|Pâ¸âLÖy–Ý5?Û†x½¥R2¤ï®‘e?«Ò¥‘ÚË`S®á“íßSè˜C‹Xˆhh|'/]žÞç1ßE~- ~Ë/ùì£Ïƒæ.#HªÎzy:O'ß” ‘_•- 3é‚J‹Ò"¡bUh©- ÖZÇ•ÍZìBU¥@ØÁ fÐ,yñ§ÖJo ±œÜêò¥WÄÒ`ËÉ€è,Xyð{(Æü õË7÷Šr•±p²-§õC? -‹ž...

Words: 798 - Pages: 4

Free Essay

Bash for Beginners

...Bash Guide for Beginners Machtelt Garrels Garrels BVBA Version 1.11 Last updated 20081227 Edition Bash Guide for Beginners Table of Contents Introduction.........................................................................................................................................................1 1. Why this guide?...................................................................................................................................1 2. Who should read this book? .................................................................................................................1 3. New versions, translations and availability.........................................................................................2 4. Revision History..................................................................................................................................2 5. Contributions.......................................................................................................................................3 6. Feedback..............................................................................................................................................3 7. Copyright information.........................................................................................................................3 8. What do you need? .......................................................................................................................

Words: 29161 - Pages: 117

Premium Essay

Ccna

...CCNA Notes Introduction Cisco offers two options for obtaining the CCNA certification:   Pass Exam 640-802 OR Pass Exam 640-822 AND Exam 640-816 While you can use these notes to prepare for either exam, the notes are geared towards passing the single exam. I recommend you study all of the material and take the single exam option rather than taking two exams. Cisco Device Icons  The following table lists the specific icons Cisco uses to represent network devices and connections. Represents Icon Hub Bridge Switch Router Access point Network cloud Ethernet connection Serial Line connection Wireless connection Virtual Circuit The OSI Model As you study this section, answer the following questions:       What is the OSI model and why is it important in understanding networking? How does the third OSI model layer relate to administering routers? Which OSI model layer is concerned with MAC addresses? What protocols correspond to the Presentation and Session layers? What is the difference between the TCP and UDP protocols? What is the EIA/TIA 232 protocol concerned with? This section covers the following exam objectives:    103. Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network 105. Describe the purpose and basic operation of the protocols in the OSI and TCP models 110. Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach ...

Words: 73801 - Pages: 296