0% found this document useful (0 votes)
69 views41 pages

Networking Full Details

This document discusses computer networks and networking concepts. It covers topics such as types of networks, networking principles, IP addressing, subnet masks, bandwidth, latency, and the OSI and TCP/IP models. The document provides explanations and examples related to networking fundamentals.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views41 pages

Networking Full Details

This document discusses computer networks and networking concepts. It covers topics such as types of networks, networking principles, IP addressing, subnet masks, bandwidth, latency, and the OSI and TCP/IP models. The document provides explanations and examples related to networking fundamentals.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 41

Chapter 6:

Networks

IT Essentials 5.0

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Chapter 6 Objectives
 6.1 Explain the principles of networking
 6.2 Describe types of networks
 6.3 Describe basic networking concepts and technologies
 6.4 Describe the physical components of a network
 6.5 Describe LAN topologies
 6.6 Identify Ethernet standards
 6.7 Explain OSI and TCP/IP data models
 6.8 Describe how to configure a NIC and connect to a network
 6.9 Identify names, purposes, and characteristics of other technologies used to
establish connectivity to the Internet
 6.10 Identify and apply common preventive maintenance techniques used for
networks
 6.11 Troubleshoot a network

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Principles of Networking
 Networks are systems that are formed by links.
 People use different types of networks every day:
•Mail delivery system
•Telephone system
•Public transportation system
•Corporate computer network
•The Internet

 Computers can be linked by networks to share data and


resources.
 A network can be as simple as two computers
connected by a single cable or as complex as hundreds
of computers connected to devices that control the flow
of information.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Computer Networks
 A computer data network is a collection of hosts connected by
networking devices such as computers, printers, scanners,
smartphones, and file and print servers.
 Resources shared across networks include different types of
services, storage devices, and applications.
 Network devices are linked using a variety of connections, such
as:
• Copper cabling
• Fiber-optic cabling
• Wireless connection

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Computer Networks
 Benefits from networking include:
• Fewer peripherals needed
• Increased communication capabilities
• Avoid file duplication and corruption
• Lower cost licensing
• Centralized administration
• Conservation of resources

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
7 Types of Networks
 1. LAN (Local Area Network): A group of
interconnected computers under one administrative
control group that governs the security and access
control policies that are in force on the network.
 2. WLAN (Wireless Local Area Network): A group of
wireless devices that connect to access points within a
specified area. Access points are typically connected to
the network using copper cabling.
 3. PAN (Personal Area Network): Network that
connects devices, such as mice, keyboards, printers,
smartphones, and tablets within the range of an
individual person. PANs are most often connected with
Bluetooth technology.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
7 Types of Networks

 4. MAN (Metropolitan Area Network): Network that


spans across a large campus or a city. Consisting of
various buildings interconnected through wireless or
fiber optic backbones.
 5. WAN (Wide Area Network): Connections of
multiple smaller networks such as LANs that are in
geographically separated locations. The most common
example of a WAN is the Internet.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
7 Types of Networks (Continued)
 6. Peer-to-peer networks: Devices which are connected
directly to each other without any additional networking
devices between them. Each device has equivalent
capabilities and responsibilities.
 7. Client/server networks: In a client/server model, the
client requests information or services from the server.
The server provides the requested information or service
to the client.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Bandwidth and Latency
 Bandwidth is the amount of data that can be transmitted within a fixed
time period.
 Bandwidth is measured in bits per second and is usually denoted by the
following:
•bps - bits per second
•Kbps - kilobits per second
•Mbps - megabits per second
•Gbps - gigabits per second
 Latency is the amount of time it takes data to travel from source to
destination.
 Data is transmitted in one of three modes:
• Simplex (Unidirectional transmission) is a single, one-way transmission.
• Half-duplex allows data to flow in one direction at a time.
• Full-duplex allows data to flow in both directions at the same time.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
IP Addressing - IPV4
 IP stands for Internet Protocol
 An IP address is a unique number that is used to identify a network device
and is represented as a 32-bit binary number, divided into four octets (an
octet is a group of 8 bits):
•Example: 10111110.01100100.00000101.00110110
• octet octet octet octet

 An IP address is also represented in a dotted decimal format.


•Example: 190.100.5.54

 When a host is configured with an IP address, it is entered as a dotted


decimal number, such as 192.168.1.5. This IP address must be unique on
a network to ensure data can be sent/received. (Unique means no other
computer can have the same address)
(Note : An IP address if for a computer, just like your home address is for your
house)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
IP Addressing - IPV4
 There are 5 IP Classes:
• Class A: Large networks, implemented by large companies and some countries
• Class B: Medium-sized networks, implemented by universities
• Class C: Small networks, implemented by ISP for customer subscriptions
• Class D: Special use for multicasting
• Class E: Used for experimental testing

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
IP Addressing – IPV4

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
IP Addressing – IPV4
 Private Addresses - IETF reserved some Internet
address space for private networks. Private networks
have no connection to public networks.
 Private network addresses are not routed across the
Internet.
 Class A IP range - 10.0.0.0 to 10.255.255.255
 Class B IP range - 172.16.0.0 to 172.31.255.255
 Class C IP range - 192.168.0.0 to 192.168.255.255

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Subnet Masks
 The subnet mask is used to indicate the network and the
host portion of an IP address.
 The default subnet masks for three classes of IP
addresses.
• 255.0.0.0 - Class A, which indicates that the first octet of the IPv4
address is the network portion.
• 255.255.0.0 - Class B, which indicates that the first two octets of
the IPv4 address is the network portion.
• 255.255.255.0 - Class C, which indicates that the first three octets
of the IPv4 address is the network portion.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
IP Addressing – IPV6
 IPv6 address - 128 bits or 32 hexadecimal values.
32 hexadecimal values are further subdivided into eight fields of four
hexadecimal values separated by colons.
 IPv6 address has a three-part hierarchy
• Global prefix, also called a site prefix, is the first three blocks of the
address.
• Subnet ID includes the fourth block of the address.
• Interface ID includes the last four blocks of the address.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Dynamic Host Configuration Protocol
(DHCP)
 DHCP automatically
provides computers with an
IP address.
 The DHCP server can
assign these to hosts:
•IP address
•Subnet mask
•Default gateway
•Domain Name System (DNS)
server address

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Internet Control Message Protocol (ICMP)
 Internet Control Message Protocol (ICMP) is used by
devices on a network to send control and error messages to
computers and servers.
 PING (Packet Internet Groper) is a simple command line
utility used to test connections between computers.
•Used to determine whether a specific IP address is accessible.
•Used with either the hostname or the IP address.
•Works by sending an ICMP echo request to a destination computer.
•Receiving device sends back an ICMP echo reply message.
 Four ICMP echo requests (pings) are sent to the destination
computer to determine the reliability and reachability of the
destination computer.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Internet Protocols
 A protocol is a set of rules. Internet protocols govern
communication within and between computers on a network.
 Many protocols consist of a suite (or group) of protocols stacked in
layers.
• Devices and computers connected to the Internet use a protocol suite
called TCP/IP to communicate with each other.
 The main functions of protocols:
•Identifying errors
•Compressing data
•Deciding how data is to be sent
•Addressing data
•Deciding how to announce sent and received data
•The information is transmitted most often via two protocols:
Transmission Control Protocol (TCP) and,
User Datagram Protocol (UDP).

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
TCP and UDP Protocols and Ports
 A port is a numeric identifier used to keep track of
specific conversations. Every message that a host
sends contains both a source and destination port.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Physical Network Components
A Modem is an electronic device that connects to the
Internet via an Internet Service Provider (ISP).
 it converts digital data to analog signals for transmission
over a phone line.
 Internal modems plug into an expansion slot on the
motherboard.
 External modems connect to a computer through the
serial and USB ports.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Physical Network Components
 Network devices:
•Computers
•Hubs
•Switches
•Routers
•Wireless access points
 Network media:
•Twisted-pair copper cabling
•Fiber-optic cabling
•Radio waves

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Network Devices
 Hub
• Extend the range of a signal by receiving then regenerating it and
sending it out all other ports.
• Allow for collisions on the network segment and are often not a good
solution.
• Also called concentrators because they serve as a central connection
point for a LAN.
 Bridges and Switches
• A bridge has the intelligence to determine if an incoming frame is to be
sent to a different segment, or dropped. A bridge has two ports.
• A switch (multiport bridge) has several ports and refers to a
table of MAC addresses to determine which port to use to forward the
frame.
• Power over Ethernet (PoE)
• PoE switch transfers small amounts of DC current over Ethernet
cable, along with data, to power PoE devices such as Wi-Fi access
points.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Network Devices (Continued)
 Routers
• Devices that connect entire networks to each other. They use IP
addresses to forward packets to other networks.
• A router can be a computer with special network software installed
or can be a device built by network equipment manufacturers.
• Routers contain tables of IP addresses along with optimal routes to
other networks.

 Wireless Access Points (WAP)


• Provide network access to wireless devices such as laptops and
PDAs.
• Use radio waves to communicate with radios in computers, PDAs,
and other wireless access points.
• Have limited range of coverage.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Network Devices (Continued)
 Multipurpose Devices
• Perform more than one function.
• More convenient to purchase and configure just one device.
• Combines the functions of a switch, a router and a wireless
access point into one device.
• The Linksys E2500 wireless router is an example of a
multipurpose device.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Network Devices
Network-attached storage (NAS)
A storage device linked to a network
 Consists of one or more hard drives,
an Ethernet connection, and an
embedded operating system
 The NAS device connects to the
network, allowing users on the network
to access and share files, stream
media, and back up data to a central
location.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Network Devices

 VoIP phones - carry telephone calls over the data


networks and Internet.
 Hardware firewalls - use various techniques for
determining what is permitted or denied access to a
network segment.
 Internet appliance – web TV, game consoles, Blu-ray
players etc.
 Purchasing Authentic Networking Devices -
Computer and network problems can be related to
counterfeit components.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Coaxial Cable
 A copper-cored network cable surrounded by a heavy
shieldin.g

 Types of coaxial cable:


•Thicknet or 10Base5 - Coaxial cable that was used in
networks and operated at 10 megabits per second with a
maximum length of 500 m
•Thinnet or 10Base2 - Coaxial cable that was used in networks
and operated at 10 megabits per second with a maximum
length of 185 m
•RG-59 - Most commonly used for cable television in the US
•RG-6 - Higher quality cable than RG-59 with more bandwidth
and less susceptibility to interference

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Twisted-Pair Cabling
 A pair of twisted wires forms a circuit that transmits data.
 The twisted wires provide protection against crosstalk (electrical
noise) because of the cancellation effect.
 Pairs of copper wires are encased in color-coded plastic insulation
and twisted together.
 An outer jacket of poly-vinyl chloride
(PVC) protects the bundles of twisted
pairs.
 There are two types of this cable:
• Unshielded twisted-pair (UTP)
(Cat 3, Cat 5, 5e ,Cat 6 and Cat 7)
• Shielded twisted-pair (STP)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Fiber-Optic Cable
 A glass or plastic strand that transmits
information using light and is made up of
one or more optical fibers enclosed together
in a sheath or jacket.
 Not affected by electromagnetic or radio
frequency interference.
 Signals are clearer, can go farther, and have
greater bandwidth than with copper cable.
 Usually more expensive than copper cabling
and the connectors are more costly and
harder to assemble.
 Two types of glass fiber-optic cable:
Multimode and Single-mode
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Topology – the way devices and
computers are arranged

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Two Types of LAN Topologies

Physical topology is the


physical layout of the
components on the
network.

Logical topology
determines how the hosts
access the medium to
communicate across the
network.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Logical Topologies

 The two most common types of logical topologies are


broadcast and token passing.

• Broadcast topology- A host broadcasts a message to all hosts


on the same network segment. There is no order that hosts
must follow to transmit data. Messages are sent on a First In,
First Out (FIFO). Ethernet is based on this topology.

• Token passing controls network access by passing an


electronic token sequentially to each host. When a host
receives the token, it can send data on the network. If the host
has no data to send, it passes the token to the next host and the
process repeats itself.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
6 Types of LAN Physical Topologies
 A physical topology defines the way in which computers,
printers, and other devices are connected to a network.
 1. Bus
• Each computer connects to a common cable The ends of the cable
have a terminator installed to prevent signal reflections and network
errors.
• Only one computer can transmit data at a time or frames will collide
and be destroyed.
 2. Ring
• Hosts are connected in a physical ring or circle.
• A special frame, a token, travels around the ring, stopping at each
host to allow data transmission.
• There are two types of ring topologies:
•Single-ring and Dual-ring

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
LAN Physical Topologies (Continued)
 3. Star
• Has a central connection point : a hub, switch, or router.
• Easy to troubleshoot, since each host is connected to the central device with its
own wire.
 4. Hierarchical or Extended Star Topology
• A star network with an additional networking device connected to the main
networking device to increase the size of the network.
• Used for larger networks.
 5. Mesh Topology
• Connects all devices to each other.
• Used in WANs that interconnect LANs. The Internet is an example of a
mesh topology.
 6. Hybrid
• A hybrid topology is a combination of two or more basic network
topologies, such as a star-bus, or star-ring topology. The advantage of a
hybrid topology is that it can be implemented for a number of different
network environments.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Standards Organizations

Organizations that set standards for all to


benchmark.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Standards Organizations
Name Type Standards Established

ITU Telecommunication one of the three Sectors of Standards covering all


Became ITU-T in
ITU-T Standardization Sector the International fields of
1992
(formerly CCITT) Telecommunication Union telecommunications

Standards for the


Institute of Electrical and A non-profit, technical
IEEE Electronics Engineers professional association
computer and electronics 1884
industry

International A network of the national Promote the development


ISO Organization for standards institutes of 157 of international standards 1947
Standardization countries agreements
Oversees the technical
Internet Architecture A committee; an advisory and engineering 1979; first named
IAB Board body development of the ICCB
Internet
International Standards for all
IEC Electrotechnical Global organization electrical, electronic, and 1906
Commission related technologies

American National Private, non-profit Seeks to establish


ANSI Standards Institute organization consensus among groups
1918

Telecommunications After the


Industry Association / Standards for voice and deregulation of the
TIA/EIA Electronic Industries
Trade associations
data wiring for LANs U.S. telephone
Alliance industry in 1984
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
Wired Ethernet Standards

 Ethernet protocols describe the rules that control how


communication occurs on an Ethernet network.
 IEEE 802.3 Ethernet standard specifies that a network
implement the Carrier Sense Multiple Access with
Collision Detection (CSMA/CD) access control
method.
 In CSMA/CD, all end stations "listen" to the network
wire for clearance to send data. When the end station
detects that no other host is transmitting, the end
station will attempt to send data. Unfortunately
collisions might occur.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
Wired Ethernet Technologies
 10BASE-T
• An Ethernet technology that uses a star topology.
• The ten (10) represents a speed of 10 Mbps, the BASE
represents baseband transmission and the T represents
twisted-pair cabling.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
Wireless Ethernet Standards
 IEEE 802.11 is the standard that specifies connectivity
for wireless networks.
 Wi-Fi (wireless fidelity), refers to the 802.11 family
•802.11 (the original specification)
•802.11a
•802.11b
•802.11g
•802.11n
 These protocols specify the frequencies, speeds, and
other capabilities of the different Wi-Fi standards.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
Wireless Ethernet Standards
Bandwidth Frequency Range Interoperability

Not interoperable with


100 feet
802.11a Up to 54 Mbps 5 GHz band
(30 meters)
802.11b, 802.11g, or
802.11n

100 feet Interoperable with


802.11b Up to 11 Mbps 2.4 GHz band
(30 meters) 802.11g

100 feet Interoperable with


802.11g Up to 54 Mbps 2.4 GHz band
(30 meters) 802.11b

164 feet Interoperable with


802.11n Up to 540 Mbps 2.4 GHz band
(50 meters) 802.11b and 802.11g

2.4 GHz band


802.15.1 Up to 2 Mbps or 5 GHz
30 feet Not interoperable with
Bluetooth (10 meters) any other 802.11
band
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
END OF CHAPTER 6A

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41

You might also like