Ccna Sheet
Ccna Sheet
Ccna Sheet
Peer-to-Peer
It is possible to have a device be a
client and a server in a Peer-to-Peer
Network. This type of network
design is only recommended for
very small networks.
Network components
1. End devices
2. Network media
3. Network interface
1. End Devices
An end device is where a message originates from or where it is received. Data
originates with an end device, flows through the network, and arrives at an
end device.
2. Network Media
Communication across a network is carried through a medium which allows
a message to travel from source to destination.
• Copper cable
1. Coaxial cable 2. Twisted pair
• Cable network
1. Twisted pair 2. Optical fiber
3. Network interface
A network interface card (NIC) is a hardware component, designed to
enable network access, it is typically a circuit board or chip, installed on a
computer so it can connect to a network.
A NIC provides a computer with a dedicated, full-time connection to a
network. It implements the physical layer circuitry necessary for
communicating with a data link layer standard, such as Ethernet or Wi-Fi.
Each card represents a device and can prepare, transmit and control the
flow of data on the network.
Also, we can say it connects the different end point devices like servers,
printers to the network through the ports.
Network protocol: (communication protocol)
In networking, a protocol is a standardized set of rules for formatting and -
processing data communication between two entities. Protocols enable
computers to communicate with one another.
Casting
in Computer Networks means transmitting data(stream of packets) from the client(s)
to the recipient(s) over a communication channel known as a network. There are
three different types of casting in computer networks, which are:
• Unicast transmission:
data is transmitted from a single client(or a single source host) to a single recipient(or a
single destination host). It is a one-to-one kind of transmission.
• Multicast transmission
data is transmitted from multiple clients(or multiple source hosts) to various recipients(or
multiple destination hosts) within the same network or other networks. It is a many-to-
many kind of transmission
• Broadcast transmission
data is transmitted from a single client(or a single source host) to multiple recipients(or
multiple destination hosts) within the same network or other networks. It is a one-to-
many kind of transmission.
Directed Broadcast
• In directed-broadcast, data is transmitted from one source client to multiple
recipients that reside in some other network.
Limited Broadcast
• In limited-broadcast, data is transmitted from one source client to multiple
recipients that reside in the same network.
• Transmission modes
the transfer of data between two devices via a communication channel that includes
an optical fiber, wireless channels, copper wires, and other storage media . Data is
transmitted between two devices in the form of electromagnetic waves.
Transmission modes:
1. The Simplex transmission mode is used in computing networks when there is
a single or one-way flow of information from sender to receiver. In this mode
of transmission, communication occurs only in one direction.
2. Half duplex mode
The half duplex mode of transmission is used in computer networks when there is
a way to flow information from sender to receiver but only one at a time. In this
mode, the connected devices can transmit or receive the data but not in the same
time.
3. Full duplex
The Full Duplex mode of transmission is used in computing networks when there
is simultaneous information flow in both directions, from sender to receiver. In this
mode of transmission, the channel capacity is shared between the two devices, and
communication occurs in both directions across a communication link that requires
two wires.
Topology types:
Disadvantages: any fail in central cable destroy the network – slow performance –
limited computers
2. Ring topology
4. Star topology
IP(internet protocol)
in IPv4, an IP address is a 32-bit numerical value divided into four octets (8 bits each),
represented in decimal format (e.g., 192.168.100.1)
• It is address used to
identify the host on the
network.
• It is a logical address
• 32 bits (12 hexadecimal
digits)
• Used to connect between
two devices in the
ethernet environment
• IP address usually used
for IPv4 which is the fourth version of IP protocol.
• A newer version IPv6 which is 128 bit addressing.
Subnet Mask
MAC address
✓ Media access control.
✓ It is a hardware address
✓ 48 bits (12 hexadecimal digits)
✓ Used to connect between two hosts in the ethernet environment
✓ Stored in firmware of the network card.
✓ Globally unique
Types of IP address
• Public
• private
• Can be implemented
on devices in:
• Software
• Hardware
• Both
• Protocols have their
own:
• Function
• Format
• Rules
Network Protocol
Functions
Network standards
• ISO - IEEE set some rules for the different devices to communicate without
any problems.
• The rules is considered a reference model in the network.
• There are two reference models OSI and TCP/IP Model
• Each model contain some layers between sender and receiver.
• Reference models used to understand the function of the network.
Facebo ok
In another words when the host receives a frame and discards it after determining its
corrupt, data link layer can check frame for errors.
The data link layer encompasses two sub-layers of its own. The first, media access
control (MAC), provides flow control and multiplexing for device transmissions over a
network. The second, the logical link control (LLC), provides flow and error control over
the physical medium as well as identifies line protocols. Use CSMA protocol to control
the traffic to avoid data collision.
3. Network Layer(layer 3)
The network layer finds (IP) the destination by using logical addresses, such as IP
(internet protocol) as packet. At this layer, routing used to select the best path for
signal (use ICMP protocol- internet control message protocol).
4. Transport Layer(layer 4)
• Use Sequence package exchange protocol.
The transport layer manages the delivery of data. It regulates the size, sequencing, and
flow control ultimately the transfer of data between systems and hosts. One of the most
common examples of the transport layer is TCP or the Transmission Control Protocol
and UDP(User Datagram Protocol ).
TCP is best used for direct communication in which a reliable connection is needed,
such as web browsing, email, text messaging, and file transfers. UDP is best used for
live and real-time data transmission when speed is more important than reliability
5. Session Layer(layer 5)
The session layer controls the conversations between different computers. A session or
connection between machines is set up, managed, and termined at layer 5. Session
layer services also include determine transmission modes, authentication and
authorization session management which Store the last data in the site as videos and
can be shown in disconnection case .
6. Presentation Layer(layer 6)
The presentation layer formats or translates data for the application layer based on the
syntax or semantics that the application accepts (convert to bits). Because of this, it at
times also called the syntax layer, compress data by compression process. This layer
can also handle the encryption and decryption required by the application layer.
At this layer, both the end user and the application layer interact directly with the
software application. This layer sees network services provided to end-user applications
such as a web browser or Office 365. The application layer identifies communication
partners, resource availability, and synchronizes communication.
TCP/IP model
Encapsulation is the process where protocols add their information to the data.
• At each stage of the process, a PDU has a different name to reflect its new
functions.
• PDUs passing down the stack are as follows:
1. Data (Data Stream)
2. Segment(transport layer)
3. Packet (network layer)
4. Frame (data link layer)
5. Bits (physical layer)