Data Communication Networking
Data Communication Networking
Data
Communication
And Networking
COMP 20173 Compiled by:
ICON C. OBMERGA
Instructor
Republic of the Philippines
POLYTECHNIC UNIVERSITY OF THE PHILIPPINES
LOPEZ QUEZON, BRANCH
Contents
Learning Objectives:
iOS bootcamps teach students the technologies and languages required to build iOS apps
for iPhones which can be launched on the Apple App Store. These technologies include
Objective-C, Swift, XCode, and more. Many of the iOS mobile development bootcamps also teach
web development fundamentals as background knowledge. There are a wide range of part-time,
full-time, in-person, online, beginner, and advanced iOS bootcamps around the U.S. and
Canada.
Boot Camp is multi-boot utility software that allows Apple Macintosh computers to have
dual operating systems in the form of Windows and Mac OS. Introduced in 2006 for Mac OS X
10.4 Tiger, Boot Camp had limitations in terms of supporting different versions of Windows;
however, it has been steadily adding support for more versions.
Boot Camp is a program that allows users of Intel-based MacIntosh computers to run the
Microsoft Windows XP operating system . Once Boot Camp has been installed on the Mac's hard
drive , the machine can be restarted (re-booted) using either Mac OS X or Windows XP. Boot
Camp will be incorporated as a standard feature of the next release of Mac OS X, known as
Leopard.
In order for a Mac user to install and run Boot Camp, the following components are necessary:
• An Intel-based Mac with a USB keyboard and mouse or built-in keyboard and
Trackpad.
• 10 gigabytes or more of free hard drive space.
• One blank recordable CD or DVD .
• A single-disc version of Windows XP Home Edition or Windows XP Professional.
• Windows XP Service Pack 2 or later.
• Mac OS X version 10.4.6 or later.
Using a CLI on a Cisco IOS switch or router enables a network technician to:
All routers attempt all four steps each time that the router is powered on or reloaded. The
POST code and functions cannot be changed by the router administrator. The location of the
bootstrap code, the IOS to load, and the configuration file can be changed by the administrator—
but you almost always use the default location for the bootstrap code (ROM) and for the initial
configuration (NVRAM). So, the location of IOS or other software is the only part that typically is
changed.
o Console port – Out-of-band serial port used primarily for management purposes such as
the initial configuration of the router.
o Secure Shell (SSH) - In band method for remotely and securely establishing a CLI session
over a network. User authentication, passwords, and commands sent over the network are
encrypted. Telnet – In band interfaces remotely establishing a CLI session through a virtual
interface, over a network. User authentication, passwords, and commands are sent over
the network in plaintext.
Note: The AUX port is an on older method of establishing a CLI session remotely via a
telephone dialup connection using a modem.
o To move from user EXEC mode to privileged EXEC mode, use the enable
command.
o Use return to user EXEC mode, use the disable command.
o exit - Used to move from a specific mode to the previous more general mode,
such as from interface mode to global config.
o end - Can be used to exit out of global configuration mode regardless of which
configuration mode you are in.
o ^z - Works the same as end.
• A Cisco IOS device supports many commands. Each IOS command has a specific
format or syntax and can only be executed at the appropriate mode.
The syntax for a command is the command followed by any appropriate keywords and
arguments.
o Keyword - a specific parameter defined in the operating system (in the figure, ip
protocols)
o Argument - not predefined; a value or variable defined by the user (in the figure,
192.168.10.5)
After entering each complete command, including any keywords and arguments, press the
Enter key to submit the command to the command interpreter.
The following examples demonstrate conventions used to document and use IOS commands.
• ping ip-address - The command is ping and the user-defined argument is the IP-address
of the destination device. For example, ping 10.10.10.5.
• traceroute ip-address - The command is traceroute and the user-defined argument is the
IP address of the destination device. For example, traceroute 192.168.254.254.
Hostnames
The first step when configuring a
SW- Floor 3 switch is to assign it a unique device
name, or hostname.
• Once the naming convention has been identified, the next step is to apply the names to
the devices using the CLI.
• The hostname name global configuration command is used to assign a name
• Switch>
• Switch> enable
• Switch#
• Switch# configure terminal
• Switch(config)# hostname Sw-Floor-1
• Sw-Floor-1(config)#
• Secure privileged EXEC access using the enable secret password global config
command.
• Secure user EXEC access by configuring the line console as follows:
• Secure remote Telnet or SSH access by configuring the Virtual terminal (VTY) lines as
follows:
Use the service password-encryption global config command to encrypt all passwords.
Banner Messages
The IP header has 32 bits assigned for addressing a desired device on the network. An
IP address is a unique identifier used to locate a device on the IP network. To make the system
scalable, the address structure is subdivided into the network ID and the host ID. The network ID
identifies the network the device belongs to; the host ID identifies the device. This implies that all
devices belonging to the same network have a single network ID.
Each end device on a network (e.g., PCs, laptops, servers, printers, VoIP phones,
security cameras, …) require an IP configuration consisting of:
o IP address
o Subnet mask
o Default gateway (optional for some
devices)
• Link layer (layer 2) address. A 6-byte (48-bit) field called Media Access Control (MAC)
address that is represented by a 6-field hexadecimal number, such as 89-A1-33-2B-C3-
84, in which each field is two bytes long. Every input or output of a networking device has
an interface to its connected link, and every interface has a unique MAC address. A MAC
address is known only locally at the link level. Normally, it is safe to assume that no two
interfaces share the same MAC address. A link layer header contains both MAC
addresses of a source interface and a destination interface, as seen in the figure.
• Transport layer (layer 4) address. A 2-byte (16-bit) field called port number that is
represented by a 16-bit number, such as 4,892. The port numbers identify the two end
hosts ports in a communication. Any host can be running several network applications at
a time and thus each application needs to be identified by another host communicating to
a targeted application. For example, source host 1 in Figure 2.8 requires a port number
for communication to uniquely identify an application process running on the destination
host 2. A transport layer header contains the port numbers of a source host and a
destination host, as seen in the figure. Note that a transport-layer port is a logical port and
not an actual or a physical one, and it serves as the end-point application identification in
a host.
Module 2: Exercises/Assessment
Note:
1. Use different platforms for the submission of your exercises (Google class page, Email or
Messenger).
2. Submission of your exercises will be complied on the specified date only. Late submission
will have deduction on their grade and copying on any course work may result in a failing
grade of 5.0 for all parties involved.
Reading Assignment:
Exercises:
Watch:
• https://www.youtube.com/watch?v=mWPbUZj9MKM
• https://www.youtube.com/watch?v=zNF04eKZr-o
B. Convert the following Decimal number to Binary number (attach your scratch of
computation)
References: