0% found this document useful (0 votes)
77 views19 pages

Data & Digital Communications - Module 2

Networking Fundamentals

Uploaded by

Tawki Baki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views19 pages

Data & Digital Communications - Module 2

Networking Fundamentals

Uploaded by

Tawki Baki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Data and Digital Communications

Module 2: Networking Fundamentals


CCNA 1: Introduction to Networks

All slides are customized by Engr. VernonD. For educational purposes only. inspired by Cisco Networking Academy

Agenda

Watch full discussion: https://www.youtube.com/watch?v=VfC-mr056lc

All slides are customized by Engr. VernonD. For educational purposes only.

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Data Networks

All slides are customized by Engr. VernonD. For educational purposes only.

Networking Devices 1/7

• Equipment that connects directly to a network segment is referred to as a


device.
• These devices are broken up into two classifications.
1. The first classification is end-user devices. End-user devices include computers,
printers, scanners, and other devices that provide services directly to the user.
2. The second classification is network devices. Network devices include all the
devices that connect the end-user devices together to allow them to communicate.

All slides are customized by Engr. VernonD. For educational purposes only.

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Networking Devices 2/7

• These devices allow users to share, create, and obtain information. The host devices
can exist without a network, but without the network the host capabilities are greatly
reduced.
• Network Interface Cards (NICs) are used to physically connect host devices to the
network media. They use this connection to send e-mails, print reports, scan pictures,
or access databases.
• End-user devices that provide users with a connection to the network are also referred
to as hosts.

All slides are customized by Engr. VernonD. For educational purposes only.

Networking Devices 3/7

• A NIC is a printed circuit board that fits into the expansion slot of a bus on a computer
motherboard. It can also be a peripheral device.
• NICs are sometimes called network adapters. Laptop or notebook computer NICs are
usually the size of a PCMCIA card.
• Each NIC is identified by a unique code called a Media Access Control (MAC) address.
• This address is used to control data communication for the host on the network.

Network Interface Card (NIC)


All slides are customized by Engr. VernonD. For educational purposes only.

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Networking Devices Symbols

All slides are customized by Engr. VernonD. For educational purposes only.

Networking Devices 4/7

• A repeater is a network device used to regenerate a signal. Repeaters regenerate


analog or digital signals that are distorted by transmission loss due to attenuation. A
repeater does not make intelligent decision concerning forwarding packets like a
router.
• Hubs concentrate connections. In other words, they take a group of hosts and allow
the network to see them as a single unit. This is done passively, without any other
effect on the data transmission. Active hubs concentrate hosts and also regenerate
signals.

Hub
Repeater

All slides are customized by Engr. VernonD. For educational purposes only.

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Networking Devices 5/7

• Bridges convert network data formats and perform basic data transmission
management. Bridges provide connections between LANs. They also check data to
determine if it should cross the bridge. This makes each part of the network more
efficient.

Bridge

All slides are customized by Engr. VernonD. For educational purposes only.

Networking Devices 6/7

• Workgroup switches add more intelligence to data transfer management.


• They can determine if data should remain on a LAN and transfer data only to the
connection that needs it. Another difference between a bridge and switch is that a
switch does not convert data transmission formats

Switch

All slides are customized by Engr. VernonD. For educational purposes only.

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Networking Devices 7/7

• Routers have all the capabilities listed from the previous slides.
• Routers can regenerate signals, concentrate multiple connections, convert data
transmission formats, and manage data transfers.
• They can also connect to a WAN, which allows them to connect LANs that are
separated by great distances. None of the other devices can provide this type of
connection

Router

All slides are customized by Engr. VernonD. For educational purposes only.

Network Topology

• Network topology defines the


structure of the network.
• One part of the topology
definition is the physical
topology, which is the actual
layout of the wire or media.
• The other part is the logical
topology, which defines how
the hosts access the media to
send data.

All slides are customized by Engr. VernonD. For educational purposes only.

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Network Topology

• The logical topology of a network determines how the hosts communicate across the
medium.
• The two most common types of logical topologies are:
• broadcast
• token passing

• The use of a broadcast topology indicates that each host sends its data to all other hosts on the
network medium. There is no order that the stations must follow to use the network. It is first come,
first serve. Ethernet works this way as will be explained later in the course.
• The second logical topology is token passing. In this type of topology, an electronic token is passed
sequentially to each host. When a host receives the token, that host can send data on the network. If
the host has no data to send, it passes the token to the next host and the process repeats itself. Two
examples of networks that use token passing are Token Ring and Fiber Distributed Data Interface (FDDI).
A variation of Token Ring and FDDI is Arcnet. Arcnet is token passing on a bus topology.

All slides are customized by Engr. VernonD. For educational purposes only.

Network Protocols

• Protocol suites are collections of protocols that enable network communication between hosts.
• A protocol is a formal description of a set of rules and conventions that govern a particular aspect of
how devices on a network communicate.
• Protocols determine the format, timing, sequencing, and error control in data communication. Without
protocols, the computer cannot make or rebuild the stream of incoming bits from another computer
into the original format.

All slides are customized by Engr. VernonD. For educational purposes only.

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Local-area Networks (LANs)

Some common LAN technologies are:


Ethernet
Token Ring
FDDI

All slides are customized by Engr. VernonD. For educational purposes only.

Wide-area Networks (WANs)

Some common WAN technologies


include the following:
Modems
Integrated Services Digital
Network (ISDN)
Digital subscriber line (DSL)
Frame Relay
T1, E1, T3, and E3
Synchronous Optical Network
(SONET)

All slides are customized by Engr. VernonD. For educational purposes only.

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Metropolitan-Area Network (MANs)

• Wireless bridge technologies that send signals across public areas can also be used to
create a MAN. A MAN usually consists of two or more LANs in a common geographic
area.
• For example, a bank with multiple branches may utilize a MAN. Typically, a service
provider is used to connect two or more LAN sites using private communication lines or
optical services. A MAN can also be created using wireless bridge technology by
beaming signals across public areas.

All slides are customized by Engr. VernonD. For educational purposes only.

Storage-Area Networks (SANS)

• A storage-area network (SAN) is a dedicated, high-


performance network used to move data between
servers and storage resources. Because it is a separate,
dedicated network, it avoids any traffic conflict between
clients and servers.
• SAN technology allows high-speed server-to-storage,
storage-to-storage, or server-to-server connectivity. This
method uses a separate network infrastructure that
relieves any problems associated with existing network
connectivity.

All slides are customized by Engr. VernonD. For educational purposes only.

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Virtual Private Networks (VPNs)

• A virtual private network (VPN) is a private


network that is constructed within a
public network infrastructure such as the
global Internet.

• Using VPN, a telecommuter can remotely


access the network of the company
headquarters. Through the Internet, a
secure tunnel can be built between the PC
of the telecommuter and a VPN router at
the company headquarters.

VPN Connections

All slides are customized by Engr. VernonD. For educational purposes only.

Benefits of VPNs (self-read)

• Cisco products support the latest in VPN technology. A VPN is a service that offers
secure, reliable connectivity over a shared public network infrastructure such as the
Internet.
• VPNs maintain the same security and management policies as a private network. The
use of a VPN is the most cost-effective way to establish a point-to-point connection
between remote users and an enterprise network.
• Access VPNs – Access VPNs provide remote access for mobile and small office, home
office users to an Intranet or Extranet over a shared infrastructure. Access VPNs use
analog, dialup, ISDN, DSL, mobile IP, and cable technologies to securely connect mobile
users, telecommuters, and branch offices.
• Intranet VPNs – Intranet VPNs use dedicated connections to link regional and remote
offices to an internal network over a shared infrastructure. Intranet VPNs differ from
Extranet VPNs in that they allow access only to the employees of the enterprise.
• Extranet VPNs – Extranet VPNs use dedicated connections to link business partners to
an internal network over a shared infrastructure. Extranet VPNs differ from Intranet
VPNs in that they allow access to users outside the enterprise.
All slides are customized by Engr. VernonD. For educational purposes only.

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Importance of Bandwidth

• Bandwidth is defined as the amount of information that can flow through a network
connection in a given period of time. It is important to understand the concept of
bandwidth for the following reasons.

All slides are customized by Engr. VernonD. For educational purposes only.

Bandwidth Pipe Analogy

All slides are customized by Engr. VernonD. For educational purposes only.

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Bandwidth Measurements

• In digital systems, the basic unit of bandwidth is bits per second (bps). Bandwidth is the
measure of how many bits of information can flow from one place to another in a
given amount of time. Although bandwidth can be described in bps, a larger unit of
measurement is generally used. Network bandwidth is typically described as thousands
of bits per second (kbps), millions of bits per second (Mbps), billions of bits per second
(Gbps), and trillions of bits per second (Tbps).

Units of Bandwidth

All slides are customized by Engr. VernonD. For educational purposes only.

Networking Models – OSI Model

The OSI reference model is a framework that is


used to understand how information travels
throughout a network. The OSI reference model
explains how packets travel through the various
layers to another device on a network, even if the
sender and destination have different types of
network media.
In the OSI reference model, there are seven
numbered layers, each of which illustrates a
particular network function. Dividing the network
into seven layers provides the following
advantages:
• It breaks network communication into smaller,
more manageable parts.
• It standardizes network components to allow
multiple vendor development and support.
• It allows different types of network hardware and
software to communicate with each other.
• It prevents changes in one layer from affecting
other layers.
• It divides network communication into smaller
parts to make learning it easier to understand.

All slides are customized by Engr. VernonD. For educational purposes only.

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
OSI – Physical Layer

• Layer 1 Physical examples include Ethernet, FDDI,


B8ZS, V.35, V.24, RJ45.

All slides are customized by Engr. VernonD. For educational purposes only.

OSI – Data Link Layer

• Layer 2 Data Link examples include PPP, FDDI, ATM,


IEEE 802.5/ 802.2, IEEE 802.3/802.2, HDLC, Frame
Relay.

All slides are customized by Engr. VernonD. For educational purposes only.

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
OSI – Network Layer

• Layer 3 Network examples include AppleTalk DDP,


IP, IPX.

All slides are customized by Engr. VernonD. For educational purposes only.

OSI – Transport Layer

• Layer 4 Transport examples include SPX,


TCP, UDP.

All slides are customized by Engr. VernonD. For educational purposes only.

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
OSI – Session Layer

• Layer 5 Session examples include NFS, NetBios


names, RPC, SQL.

All slides are customized by Engr. VernonD. For educational purposes only.

OSI – Presentation Layer

• Layer 6 Presentation examples include


encryption, ASCII, EBCDIC, TIFF, GIF, PICT, JPEG,
MPEG, MIDI.

All slides are customized by Engr. VernonD. For educational purposes only.

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
OSI – Application Layer

• Layer 7 Application examples include WWW browsers,


NFS, SNMP, Telnet, HTTP, FTP

All slides are customized by Engr. VernonD. For educational purposes only.

Peer-to-Peer Communications

All slides are customized by Engr. VernonD. For educational purposes only.

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Detailed Encapsulation Process

All slides are customized by Engr. VernonD. For educational purposes only.

TCP/IP Model

• The TCP/IP reference model is the historical and technical


standard of the Internet.
• Unlike the proprietary networking technologies mentioned
earlier, TCP/IP was developed as an open standard. This meant
that anyone was free to use TCP/IP. This helped speed up the
development of TCP/IP as a standard.

All slides are customized by Engr. VernonD. For educational purposes only.

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Comparing TCP/IP with OSI

All slides are customized by Engr. VernonD. For educational purposes only.

TCP/IP Model

All slides are customized by Engr. VernonD. For educational purposes only.

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Recap

All slides are customized by Engr. VernonD. For educational purposes only.

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr

You might also like