0% found this document useful (0 votes)
17 views14 pages

Ccna Sheet

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 14

CCNA

What is the network


A network consists of two or more computers that are linked in order to share
resources (such as printers and CDs), exchange files, or allow electronic
communications.
Uses of network
1. Sharing hardware
2. sharing data
3. Data protection
Host Roles
Every computer on a network is called a host or end device. Servers are computers
that provide information to end devices.

Peer-to-Peer
It is possible to have a device be a
client and a server in a Peer-to-Peer
Network. This type of network
design is only recommended for
very small networks.

Network components
1. End devices
2. Network media
3. Network interface
1. End Devices
An end device is where a message originates from or where it is received. Data
originates with an end device, flows through the network, and arrives at an
end device.

2. Network Media
Communication across a network is carried through a medium which allows
a message to travel from source to destination.

• Copper cable
1. Coaxial cable 2. Twisted pair
• Cable network
1. Twisted pair 2. Optical fiber
3. Network interface
A network interface card (NIC) is a hardware component, designed to
enable network access, it is typically a circuit board or chip, installed on a
computer so it can connect to a network.
A NIC provides a computer with a dedicated, full-time connection to a
network. It implements the physical layer circuitry necessary for
communicating with a data link layer standard, such as Ethernet or Wi-Fi.
Each card represents a device and can prepare, transmit and control the
flow of data on the network.
Also, we can say it connects the different end point devices like servers,
printers to the network through the ports.
Network protocol: (communication protocol)
In networking, a protocol is a standardized set of rules for formatting and -
processing data communication between two entities. Protocols enable
computers to communicate with one another.
Casting
in Computer Networks means transmitting data(stream of packets) from the client(s)
to the recipient(s) over a communication channel known as a network. There are
three different types of casting in computer networks, which are:
• Unicast transmission:
data is transmitted from a single client(or a single source host) to a single recipient(or a
single destination host). It is a one-to-one kind of transmission.

• Multicast transmission
data is transmitted from multiple clients(or multiple source hosts) to various recipients(or
multiple destination hosts) within the same network or other networks. It is a many-to-
many kind of transmission

• Broadcast transmission
data is transmitted from a single client(or a single source host) to multiple recipients(or
multiple destination hosts) within the same network or other networks. It is a one-to-
many kind of transmission.

Broadcast transmission can be divided into two categories:


• Directed Broadcast
• Limited Broadcast

Directed Broadcast
• In directed-broadcast, data is transmitted from one source client to multiple
recipients that reside in some other network.
Limited Broadcast
• In limited-broadcast, data is transmitted from one source client to multiple
recipients that reside in the same network.

• Transmission modes
the transfer of data between two devices via a communication channel that includes
an optical fiber, wireless channels, copper wires, and other storage media . Data is
transmitted between two devices in the form of electromagnetic waves.
Transmission modes:
1. The Simplex transmission mode is used in computing networks when there is
a single or one-way flow of information from sender to receiver. In this mode
of transmission, communication occurs only in one direction.
2. Half duplex mode

The half duplex mode of transmission is used in computer networks when there is
a way to flow information from sender to receiver but only one at a time. In this
mode, the connected devices can transmit or receive the data but not in the same
time.
3. Full duplex

The Full Duplex mode of transmission is used in computing networks when there
is simultaneous information flow in both directions, from sender to receiver. In this
mode of transmission, the channel capacity is shared between the two devices, and
communication occurs in both directions across a communication link that requires
two wires.

Topology types:

1. Bus topology, alternatively known


as line topology, is a type of network
topology where all devices on a
network are connected to a single cable,
called a bus or backbone. This cable
serves as a shared communication line,
allowing all devices (computers,
printers, etc.) to receive the same signal
simultaneously.

Advantages: Inexpensive – easy to install

Disadvantages: any fail in central cable destroy the network – slow performance –
limited computers

2. Ring topology

form a circular data channel. Each


networked device is linked to two more
ones by two points on a circle. A ring
network is a collective term for the
devices arranged in a ring topology.

Advantages: Easy to install

Disadvantages: slow transmission

- any fail in any cable destroy the network


3. Mesh topology is a type of
network topology where devices are
interconnected to multiple other
devices, forming a mesh-like structure.
The devices or nodes in this topology
connect dynamically, directly, and non-
hierarchically to as many other nodes as
possible.

Advantages: no failure tolerance – more secure

Disadvantages: high cost – high complexity

4. Star topology

Star topology is a type of network


topology in which all the devices or nodes
are physically connected to a central node
such as a router, switch, or hub. The
central node (hub) acts as a server, and the
connecting nodes act as clients.

Advantages: inexpensive – scalability

Disadvantages: Single point of fail

The difference between hub , switch and router

LANs and WANs

A LAN is a network infrastructure that spans a small geographical area.

A WAN is a network infrastructure that spans a wide geographical area.


Networks of Many Sizes
• Small Home Networks – connect a few
computers to each other and the
Internet
• Small Office/Home Office (SOHO)–
enables computer within a home or
remote office to connect to a corporate
network
• Medium to Large Networks – many
locations with hundreds or thousands
of interconnected computers
• Worldwide Networks – connects
hundreds of millions of computers
world-wide – such as the internet.

The difference between internet, intranet and extranet


❖ DNS: Domain name system: Used to map names or domain names
(www.google.come) to IP address and vice versa.

IP(internet protocol)
in IPv4, an IP address is a 32-bit numerical value divided into four octets (8 bits each),
represented in decimal format (e.g., 192.168.100.1)

• It is address used to
identify the host on the
network.
• It is a logical address
• 32 bits (12 hexadecimal
digits)
• Used to connect between
two devices in the
ethernet environment
• IP address usually used
for IPv4 which is the fourth version of IP protocol.
• A newer version IPv6 which is 128 bit addressing.
Subnet Mask

A subnet mask is a four-octet number used to identify the


network ID portion of a 32-bit IP address. A subnet mask is
required on all class-based networks.

MAC address
✓ Media access control.
✓ It is a hardware address
✓ 48 bits (12 hexadecimal digits)
✓ Used to connect between two hosts in the ethernet environment
✓ Stored in firmware of the network card.
✓ Globally unique

Types of IP address

• Public
• private

• Public IP used to connect the internet


• The router gives the devices private IP to contact via public IP to internet.
• DHCP service used to give the private IPs to the connected device with router.
If you want to implement a mechanism that automates the IP configuration,
including IP address, subnet mask, default gateway, and DNS information.

In another words we can say DHCP manage IP pool to allocate IP addresses to


the hosts automatically

• NAT: network address translation used to convert from private IP to public IP


and vice versa.

Network Protocol Overview

Network protocols define a


common set of rules.

• Can be implemented
on devices in:
• Software
• Hardware
• Both
• Protocols have their
own:
• Function
• Format
• Rules

Network Protocol
Functions
Network standards

• ISO - IEEE set some rules for the different devices to communicate without
any problems.
• The rules is considered a reference model in the network.
• There are two reference models OSI and TCP/IP Model
• Each model contain some layers between sender and receiver.
• Reference models used to understand the function of the network.
Facebo ok

The OSI Model Defined


The OSI Model (Open Systems Interconnection Model) is a conceptual framework
used to describe the functions of a networking system. The OSI model characterizes
computing functions into a universal set of rules and requirements in order to support
interoperability between different products and software. In the OSI reference model,
the communications between a computing system are split into seven different
abstraction layers: Physical, Data Link, Network, Transport, Session, Presentation,
and Application.
The 7 Layers of the OSI Model
1. Physical Layer (layer 1)
The input of physical layer is stream of bits and the layer converts the input bits
to suitable signal related to the type of transmission media.
(exchange the data between the hosts through communication media)

2. Data Link Layer(layer 2)


At the data link layer, directly connected nodes are used to perform node-to-node data
transfer where data is packaged into frames. The data link layer also detect and
correct errors that may have occurred at the physical layer.

In another words when the host receives a frame and discards it after determining its
corrupt, data link layer can check frame for errors.

The data link layer encompasses two sub-layers of its own. The first, media access
control (MAC), provides flow control and multiplexing for device transmissions over a
network. The second, the logical link control (LLC), provides flow and error control over
the physical medium as well as identifies line protocols. Use CSMA protocol to control
the traffic to avoid data collision.

3. Network Layer(layer 3)
The network layer finds (IP) the destination by using logical addresses, such as IP
(internet protocol) as packet. At this layer, routing used to select the best path for
signal (use ICMP protocol- internet control message protocol).

- It delivery the packet from source to destination.

4. Transport Layer(layer 4)
• Use Sequence package exchange protocol.

The transport layer manages the delivery of data. It regulates the size, sequencing, and
flow control ultimately the transfer of data between systems and hosts. One of the most
common examples of the transport layer is TCP or the Transmission Control Protocol
and UDP(User Datagram Protocol ).

TCP is best used for direct communication in which a reliable connection is needed,
such as web browsing, email, text messaging, and file transfers. UDP is best used for
live and real-time data transmission when speed is more important than reliability

5. Session Layer(layer 5)
The session layer controls the conversations between different computers. A session or
connection between machines is set up, managed, and termined at layer 5. Session
layer services also include determine transmission modes, authentication and
authorization session management which Store the last data in the site as videos and
can be shown in disconnection case .

6. Presentation Layer(layer 6)
The presentation layer formats or translates data for the application layer based on the
syntax or semantics that the application accepts (convert to bits). Because of this, it at
times also called the syntax layer, compress data by compression process. This layer
can also handle the encryption and decryption required by the application layer.

7. Application Layer(layer 7) --- user interaction

At this layer, both the end user and the application layer interact directly with the
software application. This layer sees network services provided to end-user applications
such as a web browser or Office 365. The application layer identifies communication
partners, resource availability, and synchronizes communication.

• Determine the suitable protocol for the action


• Example: http for web site(Hypertext Transfer Protocol)
• FTP for download (file transfer protocol)
• SMTP- pop3 for mails.
• Telnet

TCP/IP model

in TCP/IP application layer related to (application – presentation- session) in OSI model


in TCP/IP internet layer related to the network layer in OSI model
in TCP/IP network access layer related to the (data link- physical) layer in OSI model
Uses DNS - to get ARP is used to get

IP address (1.2.3.4) from a DNS MAC address (11:22:33:44:55:66) from


domain(www.google.com). IP (1.2.3.4).

Protocol Data Units (PDU)

Encapsulation is the process where protocols add their information to the data.

• At each stage of the process, a PDU has a different name to reflect its new
functions.
• PDUs passing down the stack are as follows:
1. Data (Data Stream)
2. Segment(transport layer)
3. Packet (network layer)
4. Frame (data link layer)
5. Bits (physical layer)

Binary and IPv4 Addresses

• Binary numbering system consists of 1s and 0s, called bits


• Decimal numbering system consists of digits 0 through 9
• Hosts, servers, and network equipment using binary addressing to identify each
other.
• Each address is made up of a string of 32 bits, divided into four sections called
octets.
• Each octet contains 8 bits (or 1 byte) separated by a dot.
• For ease of use by people, this dotted notation is converted to dotted decimal.

Binary Number System: Convert Binary to Decimal

You might also like