Networking Reviewer
Networking Reviewer
Communications in a
Connected World
Networking Basics (BNET)
Module Objectives
Module Title: Communications in a Connected World
Module Objective: Explain important concepts in network communication.
Bandwidth and Throughput Explain network transmission and speed and capacity.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
1.1 Network Types
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Network Types
Everything is Online
• How many of us still think about whether or not we are “online”?
• We expect our phones, tablets, laptops, and desktop computers to always connect to the global
internet.
• We use this network to interact with friends, shop, share pictures and experiences and learn.
• The internet has become such a part of everyday life that we almost take it for granted.
• Typically, when people use the term internet, they are not referring to the physical connections in
the real world.
• Instead, they think of it as a formless collection of connections. It is the “place” people go to find or
share information.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Network Types
Who Owns “The Internet”?
• Any individual or group does not own the internet.
• It is a worldwide collection of interconnected networks
cooperating to exchange information using common
standards.
• Through telephone wires, fiber-optic cables, wireless
transmissions, and satellite links, internet users can
exchange information in various forms, as shown in the
figure.
• Everything that you access online is located somewhere on
the global internet.
• Social media sites, multiplayer games, messaging centers
that provide email, and online courses — all these internet
destinations connect to local networks that send and receive
information through the internet.
• Think about all your daily interactions that require you to be
online.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Network Types
Local Networks
• Local networks come in all sizes.
• They can range from simple networks consisting of two computers to networks connecting
hundreds of thousands of devices.
• Networks installed in small offices, or homes and home offices, are referred to as SOHO
networks.
• SOHO networks let you share resources, such as printers, documents, pictures, and music,
between a few local users.
• Large networks can advertise and sell products, order supplies, and communicate with customers.
• Communication over a network is usually more efficient and less expensive than traditional forms
of communication, such as regular mail or long-distance phone calls.
• Networks allow for rapid communication, such as email and instant messaging, and provide
consolidation and access to information stored on network servers.
• Business and SOHO networks usually provide a shared connection to the internet.
• The internet is considered a "network of networks" because it makes up thousands of connected
local networks.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Network Types
Local Networks (Cont.)
Small home networks connect a few computers to each other and the
Small Home Networks
internet.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Network Types
Local Networks (Cont.)
Small Office and Home The SOHO network allows computers in a home or remote office to connect
Office Networks to a corporate network or access centralized, shared resources.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Network Types
Local Networks (Cont.)
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Network Types
Local Networks (Cont.)
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Network Types
Mobile Devices
• The internet connects more computing devices than just desktop and laptop computers.
• There are devices all around that you may interact with daily that connect to the internet (mobile
devices, home devices, and a variety of other connected devices).
Smartphone It connects to the internet from almost anywhere. It combines the functions of many different
products, such as a telephone, camera, GPS receiver, media player, and touchscreen
computer.
Tablet It also has the functionality of multiple devices like a smartphone. With the additional screen
size, they are ideal for watching videos and reading magazines or books. With on-screen
keyboards, users do many things they used to do on their laptop computer, such as
composing emails or browsing the web.
Smartwatch It can connect to a smartphone to provide the user with alerts and messages. Additional
functions, such as heart rate monitoring and counting steps, like a pedometer, can help
people who are wearing the device to track their health.
Smart Glasses A wearable computer in the form of glasses, such as Google Glass, contains a tiny screen
that displays information to the wearer, similar to a fighter pilot's Head-Up Display (HUD). A
small touchpad on the side allows the user to navigate menus while
© 2020 still
Cisco and/or being
its affiliates. ableCiscotoConfidential
All rights reserved. see 20
Many home items, such as security systems, lighting, and climate controls, can be
Security System
monitored and configured remotely using a mobile device.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Network Types
Connected Home Devices
• Many things in your home can connect to the internet to be monitored and configured
remotely.
Household appliances such as refrigerators, ovens, and dishwashers can connect to the
internet, allowing the homeowner to power them on or off, monitor the appliance's status,
Appliances
and be alerted to preset conditions, such as when the temperature in the refrigerator
rises above an acceptable level.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Network Types
Connected Home Devices
• Many things in your home can connect to the internet to be monitored and configured
remotely.
It can be connected to the internet to access content without needing TV service provider
Smart TV equipment. Also, it can allow a user to browse the web, compose an email, or display
video, audio, or photos stored on a computer.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Network Types
Connected Home Devices
• Many things in your home can connect to the internet to be monitored and configured
remotely.
Gaming consoles can connect to the internet to download games and play with friends
Gaming Console
online.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Network Types
Other Connected Devices
• There are also many connected devices found in the world outside your home that provide
convenience and valuable, or even vital, information.
Many modern cars can connect to the internet to access maps, audio and video content, or
information about a destination. They can even send a text message or email if there is an
Smart Cars attempted theft or call for assistance in case of an accident. These cars can also connect to
smartphones and tablets to display information about the different engine systems, provide
maintenance alerts, or display the security system's status.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Network Types
Other Connected Devices
• There are also many connected devices found in the world outside your home that provide
convenience and valuable, or even vital, information.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Network Types
Other Connected Devices
• There are also many connected devices found in the world outside your home that provide
convenience and valuable, or even vital, information.
Connected sensors provide temperature, humidity, wind speed, barometric pressure, and soil
moisture data. Actuators can then be automatically triggered based on current conditions. For
Sensors and example, a smart sensor can periodically send soil moisture data to a monitoring station. The
Actuators monitoring station can then signal an actuator to begin watering. The sensor will continue to
send soil moisture data allowing the monitoring station to determine when to deactivate the
actuator.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Network Types
Other Connected Devices
• There are also many connected devices found in the world outside your home that provide
convenience and valuable, or even vital, information.
Medical Medical devices such as pacemakers, insulin pumps, and hospital monitors provide users or
Devices medical professionals with feedback or alerts when vital signs are at specific levels.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
1.2 Data Transmission
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Data Transmission
The Bit
• Did you know that computers and networks only work with binary digits, zeros, and ones?
• It cannot be easy to imagine that all our data is stored and transmitted as bits.
• Each bit can only have one of two possible values, 0 or 1.
• The term bit is an abbreviation of “binary digit” and represents the smallest piece of data.
• Humans interpret words and pictures computers to analyze only patterns of bits.
• A bit is stored and transmitted as one of two possible discrete states.
• This can include two directions of magnetization, two different voltage or current levels, two distinct
levels of light intensity, or any other physical system of two discrete states.
• For example, a light switch can be either On or Off; in binary representation, these states
correspond to 1 and 0, respectively.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Data Transmission
The Bit (Cont.)
• Every input device (mouse, keyboard, voice-activated receiver) will translate human interaction into
binary code for the CPU to process and store.
• Every output device (printer, speakers, monitors, etc.) will take binary data and translate it into
human-recognizable form.
• Within the computer itself, all data is processed and stored as binary.
• Computers use binary codes to represent and interpret letters, numbers, and special characters
with bits.
• A commonly used code is ASCII, where each character represents eight bits.
• For example:
• Capital letter: A = 01000001
• Number: 9 = 00111001
• Unique character: # = 00100011
• Each group of eight bits, such as the representations of letters and numbers, is known as a byte.
• The use of codes can represent almost any type of information digitally, including computer data,
graphics, photos, voice, video, and music.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Data Transmission
Common Methods of Data Transmission
• After the data transforms into bits, it converts into signals sent across the network media to its
destination.
• Media refers to the physical medium on which the signals are transmitted.
• Examples of media are copper wire, fiber-optic cable, and electromagnetic waves through the air.
• A signal consists of electrical or optical patterns transmitted from one connected device to another.
• These patterns represent the digital bits (the data) and travel across the media from source to
destination as either a series of pulses of electricity, vibrations of light, or radio waves.
• Signals may be converted many times before reaching the destination, as corresponding media
changes between source and destination.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Data Transmission
Common Methods of Data Transmission (Cont.)
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
1.3 Bandwidth and Throughput
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Bandwidth and Throughput
Bandwidth
• Streaming a movie or playing a multiplayer game requires reliable, fast connections.
• Networks can transmit and receive bits at a very high rate to support high-bandwidth applications.
• The data transfer rate is usually discussed in terms of bandwidth and throughput.
• Digital bandwidth measures the amount of data that can flow from one place to another in a given
amount of time.
• Bandwidth measures the number of bits that are (theoretically) sent across the media in a second.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Bandwidth and Throughput
Bandwidth (Cont.)
• Common bandwidth measurements are as follows:
• Thousands of bits per second (Kbps)
• Millions of bits per second (Mbps)
• Billions of bits per second (Gbps)
• Physical media properties, current technologies, and the laws of physics all play a role in
determining available bandwidth.
• The table shows the commonly used units of measure for bandwidth.
• However, the throughput does not usually match the specified bandwidth due to several factors.
• The amount of data being sent and received over the connection
• The types of data being transmitted
• The latency created by the number of network devices encountered between the source and
destination
• Latency refers to the time, including delays, for data to travel from one given point to another.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Bandwidth and Throughput
Throughput (Cont.)
• Throughput measurements do not consider the validity or usefulness of the bits being transmitted
and received.
• Many messages received through the network are not destined for specific user applications.
• An example would be network control messages that regulate traffic and correct errors.
• In an internetwork or network with multiple segments, throughput cannot be faster than the slowest
link of the path from sending device to the receiving device.
• Even if all or most of the segments have high bandwidth, it will only take one part in the path with
lower bandwidth to create a slowdown of the throughput of the entire network.
• Many online speed tests can reveal the throughput of an internet connection.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
1.4 Communications in a
Connected World Summary
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Communications in a Connected World Summary
What Did I Learn in This Module?
• The internet is a worldwide collection of interconnected networks cooperating to exchange information
using common standards.
• Internet users can exchange information in various forms through telephone wires, fiber-optic cables,
wireless transmissions, and satellite links.
• Small home networks connect a few computers to each other and the internet.
• The SOHO network allows computers in a home or remote office to connect to a corporate network or
access centralized, shared resources.
• Medium to large networks, such as those used by corporations and schools, can have many locations with
hundreds or thousands of interconnected hosts.
• There are devices all around that you may interact with daily that connects to the internet.
• These include mobile devices such as smartphones, tablets, smartwatches, and smart glasses.
• Things in your home can connect to the internet, such as a security system, appliances, your smart TV,
and your gaming console.
• Outside your home, there are smart cars, RFID tags, sensors and actuators, and even medical devices
which can be connected.
• The categories used to classify types of personal data are volunteered data, observed data, and inferred
data.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Communications in a Connected World Summary
What Did I Learn in This Module? (Cont.)
• The term bit is an abbreviation of “binary digit” and represents the smallest piece of data.
• Each bit can only have one of two possible values, 0 or 1.
• There are three standard methods of signal transmission used in networks: electrical signals, optical
signals, and wireless signals.
• Bandwidth is the capacity of a medium to carry data.
• Digital bandwidth measures the amount of data that can flow from one place to another in a given amount
of time.
• The number of bits (theoretically) sent across the media in a second typically measures bandwidth.
• Common bandwidth measurements are thousands of bits per second (Kbps), millions of bits per second
(Mbps), and billions of bits per second (Gbps).
• Throughput usually varies from the specified bandwidth.
• Many factors influence throughput, including:
• The amount of data being sent and received over the connection
• The latency is created by the number of network devices encountered between the source and
destination.
• Latency refers to the time, including delays, for data to travel from one given point to another.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Networking Fundamentals
What is Computer
Network?
• People and digital devices are
entities that communicate with each
other among themselves. Just as
people have a circle, devices in the
digital world have a circle.
Purposes of Computer Networks
Computer networks have become usable for many different purposes
with the developing technology. The main uses of computer networks are
as follows:
Example:
• Bluetooth
• Hotspot
Local Area
Network (LAN)
Local Area Network (LAN)
has a larger area than PAN.
The number of devices in it
can be much more. It is
the most used and found
network type. Sometimes
a network with 2 devices
can also be called a LAN.
Metropolitan Area Network (MAN)
• Application Layer
• Transport Layer
• Internet Layer
• Network Access Layer
OSI Model vs.
TCP/IP Model
Although the OSI reference model and the TCP/IP model
are very similar models, they differ from each other on
some points. When the TCP/IP model first emerged, it
emerged out of necessity, not aiming to be a standard.
The OSI reference model, on the other hand, aimed to
design the ideal network communication, which should
be in theory, including its practical use. The TCP/IP
The image above shows which layers in the
model was developed based on some protocols. The OSI
OSI reference model are equivalent to which
model, on the other hand, was not developed on any layers in the TCP/IP model in terms of tasks
protocol. and protocols.
IP Addressing Mechanism
While creating TCP/IP computer networks, a logical address (IP
Address) must first be assigned to each device in the network.
These assignment processes are called "IP Addressing
Mechanism". If an IP address is not assigned to a device in the
network, it cannot communicate with devices inside or outside the
network.
Module 2: Network
Components, Types, and
Connections
Networking Basics (BNET)
Module Objectives
Module Title: Network Components, Types, and Connections
Module Objective: Explain network types, components, and connections.
Clients and Servers Explain the roles of clients and servers in a network.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
2.1 Clients and Servers
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Clients and Servers
Client and Server Roles
• All computers connected to a network that participate directly in network communication are
classified as hosts.
• In modern networks, computer hosts can act as a client, a server, or both.
• The software installed on the computer determines which role the computer plays.
Type Description
The email server runs email server software.
Email
Clients use mail client software, such as Microsoft Outlook, to access email on the server.
The web server runs web server software.
Web Clients use browser software, such as Windows Internet Explorer, to access web pages
on the server.
The file server stores corporate and user files in a central location.
File The client devices access these files with client software such as the Windows File
Explorer.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Clients and Servers
Client and Server Roles (Cont.)
• Servers are hosts that have software installed which enable them to provide information, like
email or web pages, to other hosts on the network.
• Each service requires separate server software.
• For example, a host requires web server software in order to provide web services to the
network.
• Every destination that you visit online is provided to you by a server located somewhere
on a network that is connected to the global internet.
• Clients are computer hosts that have software installed enabling the hosts to request and
display the information obtained from the server.
• An example of client software is a web browser, such as Internet Explorer, Safari, Mozilla
Firefox, or Chrome.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Clients and Servers
Peer-to-Peer Networks
• Client and server software usually run on separate computers, but it is also possible for one
computer to run both client and server software at the same time.
• This type of network is called a peer-to-peer (P2P) network.
• Small businesses and homes may operate a P2P network to share resources.
• The simplest P2P network consists of two directly connected computers using either a wired or
wireless connection.
• Both computers are then able to use this simple network to exchange data and services
with each other, acting as either a client or a server, as necessary.
• Multiple PCs can also be connected to create a larger P2P network, but this requires a network
device, such as a switch, to interconnect the computers.
• In larger businesses, because of the potential for high amounts of network traffic, it is often
necessary to have dedicated servers to support the number of service requests.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Clients and Servers
Peer-to-Peer Networks (Cont.)
Advantages of P2P networking:
• Easy to set up
• Less complex
• Lower cost because network devices and dedicated servers may not be required
• Can be used for simple tasks such as transferring files and sharing printers
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Clients and Servers
Peer-to-Peer Applications
• A P2P application allows a device to act as both a
client and a server.
• Every client is a server and every server is a client.
• Both clients can simultaneously send and receive
messages.
• P2P applications require that each end device
provide a user interface and run a background
service.
• Some P2P applications use a hybrid system where
resource sharing is decentralized, but the indexes
that point to resource locations are stored in a
centralized directory.
• In a hybrid system, each peer accesses an index
server to get the location of a resource stored on
another peer.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Clients and Servers
Multiple Roles in the Network
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
2.2 Network Components
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Network Components
Network Infrastructure
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Network Components
End Devices
• The network devices that people are most familiar with are called end devices, or hosts.
• Computers (workstations, laptops, file servers, web servers)
• Network printers
• Telephones and teleconferencing equipment
• Security cameras
• Mobile devices (such as smart phones, tablets, PDAs, and wireless debit/credit card readers
and barcode scanners)
• An end device (or host) is either the source or destination of a message transmitted over the network.
• To uniquely identify hosts, addresses are used.
• When a host initiates communication, it uses the address of the destination host to specify where the
message should be sent.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
2.3 ISP Connectivity Options
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
ISP Connectivity Options
ISP Services
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
ISP Connectivity Options
ISP Services (Cont.)
• Each ISP connects to other ISPs to form a network of links that interconnect users all over the world.
• ISPs are connected in a hierarchical manner that ensures that internet traffic generally takes the
shortest path from the source to the destination.
• ISPs provides high-speed data links to connect the various service provider networks in major
metropolitan areas around the world.
• The primary medium that connects the internet backbone is fiber-optic cable installed underground to
connect cities within continents and under the sea to connect continents, countries, and cities.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
ISP Connectivity Options
ISP Connections
• The interconnection of ISPs that forms the backbone of the internet is a complex web of fiber-optic
cables with expensive networking switches and routers that direct the flow of information between
source and destination hosts.
• The simplest ISP connection option consists of a modem that provides a direct connection between
a computer and the ISP.
• However, this is not a secure option as a computer is not protected on the internet.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
ISP Connectivity Options
ISP Connections (Cont.)
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
ISP Connectivity Options
Cable and DSL Connections
Most home network users connect to the internet using either Cable or DSL.
Cable
• Typically offered by cable television service
providers option, the internet data signal is
carried on the same coaxial cable that delivers
cable television.
• It provides a high bandwidth, always on,
connection to the internet.
• A special cable modem separates the internet
data signal from the other signals carried on
the cable and provides an Ethernet connection
to a host computer or LAN.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
ISP Connectivity Options
Cable and DSL Connections (Cont.)
DSL
• Digital Subscriber Line (DSL) provides a high bandwidth, always on, connection to the internet.
• It requires a special high-speed modem that separates the DSL signal from the telephone signal
and provides an Ethernet connection to a host computer or LAN.
• DSL runs over a telephone line, with the line split into three channels.
• One channel is used for voice telephone calls. This channel allows an individual to receive
phone calls without disconnecting from the internet.
• A second channel is a faster download channel, used to receive information from the
internet.
• The third channel is used for sending or uploading information. This channel is usually
slightly slower than the download channel.
• The quality and speed of the DSL connection depends mainly on the quality of the phone line and
the distance from the central office of your phone company. The farther you are from the central
office, the slower the connection.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
ISP Connectivity Options
Additional Connectivity Options
• Other ISP connection options for home users include the following:
• Cellular – Connects using the same cell service as smartphones to provide roaming
internet connectivity. However, additional service charges may apply.
• Satellite – Provides acceptable bandwidth internet connectivity to remote areas.
However, equipment and installation costs can be high with a moderate monthly fee
thereafter.
• Dial-up Telephone – An inexpensive option that uses any land phone line and a
modem. This provides the lowest bandwidth option and should only be considered
when higher speed connection options are not available.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
2.4 Network Components,
Types, and Connections
Summary
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Network Components, Types, and Connections Summary
What Did I Learn in this Module?
• All computers connected to a network are classified as hosts.
• Computer hosts can act as a client, a server, or both and the software installed on the computer
determines which role the computer plays.
• In a P2P network, used by small businesses and homes, many computers function as the servers and
clients on the network.
• In larger businesses, dedicated servers are used to support the number of service requests.
• P2P networks are easy to set up, less complex, lower in cost, and can be used for simple tasks such as
transferring files and sharing printers. However, there is no centralized administration, have less
security, are not scalable, and can perform slower.
• The network infrastructure is the platform that supports the network and provides the stable and reliable
channel over which our communications can occur.
• Symbols represent various types of networking equipment.
• The network infrastructure contains three categories of hardware components including end devices,
intermediate devices, and network media.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Network Components, Types, and Connections Summary
What Did I Learn in this Module? (Cont.)
• End devices, or hosts, form the interface between users and the underlying communication network.
• End devices include computers, network printers, telephones and teleconferencing equipment, security
cameras, and mobile devices (such as smartphones, tablets, PDAs, wireless debit/credit card
readers, and barcode scanners).
• An ISP provides the link between the home network and the internet using a local cable provider, a
landline telephone service provider, the cellular network that provides your smartphone service, or an
independent provider who leases bandwidth on the physical network infrastructure of another company.
• ISPs are connected in a hierarchical manner that ensures that internet traffic generally takes the
shortest path from the source to the destination.
• A home user usually connects to the ISP using a wireless integrated router.
• The router includes a switch to connect wired hosts, a wireless AP to connect wireless hosts, and
provides client IP addressing information and security for inside hosts.
• The two most common internet connections methods are cable and DSL while other options include
cellular, satellite, and dial-up telephone.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Module 3: Wireless and Mobile
Networks
1
Module 3: Wireless and Mobile Networks
Background:
r Two main wireless architectures
m Cellular data networks
m 802.11 wireless networks
6-2
Elements of a wireless network
wireless hosts
r laptop, PDA, IP phone
r run applications
r may be stationary
(non-mobile) or mobile
network m wireless does not
infrastructure always mean mobility
6-3
Elements of a wireless network
base station
r typically connected to
wired network
r relay - responsible
for sending packets
between wired
network network and wireless
infrastructure host(s) in its “area”
m e.g., cell towers,
802.11 access
points
6-4
Elements of a wireless network
wireless link
r typically used to
connect mobile(s) to
base station
r multiple access
protocol coordinates
network link access
infrastructure r various data rates,
transmission distance
6-5
Characteristics of selected wireless link
standards
200 802.11n
6-6
Elements of a wireless network
infrastructure mode
r base station connects
mobiles into wired
network
r handoff: mobile
changes base station
network providing connection
infrastructure into wired network
6-7
Elements of a wireless network
ad hoc mode
r no base stations
r nodes can only
transmit to other
nodes within link
coverage
r nodes organize
themselves into a
network: route among
themselves
6-8
Wireless network taxonomy
single hop multiple hops
no base station, no
no
connection to larger
no base station, no
infrastructure Internet. May have to
connection to larger
relay to reach other
Internet (Bluetooth,
a given wireless node
ad hoc nets)
MANET, VANET
6-9
Wireless Link Characteristics (1)
6-10
Wireless Link Characteristics (2)
r SNR: signal-to-noise ratio 10-1
BER
10-4
A B C
C
space
Hidden terminal problem
r B, A hear each other Signal attenuation:
r B, C hear each other r B, A hear each other
r A, C can not hear each other r B, C hear each other
means A, C unaware of their r A, C can not hear each other
interference at B interfering at B
6-12
Code Division Multiple Access (CDMA)
r Used in several wireless broadcast channels
(cellular, satellite, etc) standards
r Unique “code” assigned to each user; i.e., code set
partitioning
r All users share same frequency, but each user has
own “chipping” sequence (i.e., code) to encode data
r Encoded signal = (original data) X (chipping sequence)
r Decoding: inner-product of encoded signal and
chipping sequence
r Allows multiple users to “coexist” and transmit
simultaneously with minimal interference (if codes
are “orthogonal”)
M
Di = Σ Zi,m.cm
m=1
M
received 1 1 1 1 1 1 1 1
d0 = 1
-1 -1 -1 -1 -1 -1 -1 -1
input d1 = -1
1 1 1 1 1 1 1 1 slot 1 slot 0
code channel channel
-1 -1 -1 -1 -1 -1 -1 -1
16
IEEE 802.11 Wireless LAN
r 802.11b r 802.11a
m 2.4-5 GHz unlicensed spectrum m 5-6 GHz range
m up to 11 Mbps m up to 54 Mbps
BSS 2
6: Wireless and Mobile Networks 6-18
Wireless Networks
Other Wireless Networks
In addition to the GSM and 4G/5G transmitters and receivers, smartphones make connections in a
variety of ways.
It uses satellites to transmit signals that cover the globe. The smartphone can receive these
GPS
signals and calculate the phone’s location to an accuracy of within 10 meters.
Wi-Fi transmitters and receivers located within the smartphone enable the phone to connect to
local networks and the internet. The phone needs to be within the range of the signal from a
Wi-Fi wireless network access point to receive and send data on a Wi-Fi network. Wi-Fi networks are
usually privately owned but often provide guest or public access hotspots. Wi-Fi network
connections on the phone are like network connections on a laptop computer.
It is a low-power, shorter range wireless technology that is intended to replace wired connectivity
for accessories such as speakers, headphones, and microphones. It can also be used to connect
Bluetooth a smartwatch to a smartphone. Because Bluetooth technology can be used to transmit both data
and voice, it can be used to create small local networks. It is wireless technology that allows
multiple devices to communicate over short distances.
It is a wireless communication technology that enables data to be exchanged by devices that are
NFC in very close proximity to each other, usually less than a few centimeters. It uses electromagnetic 19
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
802.11: Channels, association
r 802.11b: 2.4GHz-2.485GHz spectrum divided into
11 channels at different frequencies
m AP admin chooses frequency for AP
m interference possible: channel can be same as
that chosen by neighboring AP!
r Host: must associate with an AP
m scans channels, listening for beacon frames
containing AP’s name (SSID) and MAC address
m selects AP to associate with
m may perform authentication
• See chapter 8 in textbook
m will typically run DHCP to get IP address in
AP’s subnet
6: Wireless and Mobile Networks 6-20
802.11: passive/active scanning
BBS 1 BBS 2 BBS 1 BBS 2
AP 1 AP 2 AP 1 1 AP 2
1 1 2 2
2 3
3 4
H1 H1
A B C
C
A’s signal C’s signal
B strength strength
A
space
6-22
IEEE 802.11 MAC Protocol: CSMA/CA
802.11 sender
1 if sense channel idle for DIFS then sender receiver
transmit entire frame (no CD)
2 if sense channel busy then DIFS
RTS(A) RTS(B)
reservation collision
RTS(A)
CTS(A) CTS(A)
DATA (A)
defer
time
ACK(A) ACK(A)
2 2 6 6 6 2 6 0 - 2312 4
addres addres addres addres
frame duratio seq
s s s s payload CRC
control n control
1 2 3 4
Internet
H1 R1 router
AP
802.3 frame
802.11 frame
6: Wireless and Mobile Networks 6-27
802.11 frame: more
frame seq #
duration of reserved
(for RDT)
transmission time (RTS/CTS)
2 2 6 6 6 2 6 0 - 2312 4
addres addres addres addres
frame duratio seq
s s s s payload CRC
control n control
1 2 3 4
2 2 4 1 1 1 1 1 1 1 1
Powe
Protocol To From More More
Type Subtype Retry r WEP Rsvd
version AP AP frag data
mgt
frame type
(RTS, CTS, ACK, data)
r Final
m Friday 12/14, 12-2PM
10-2
r base station, mobile
10-3
dynamically change
BER
10-4
transmission rate 10-5
(physical layer 10-6
r Master/slaves: S P
S P
m slaves request permission to
send (to master)
m master grants requests
r 802.15: evolved from M Master device
Bluetooth specification Slave device
S
m 2.4-2.5 GHz radio band P Parked device (inactive)
m up to 721 kbps
6: Wireless and Mobile Networks 6-34
802.16: WiMAX
point-to-point
r Like 802.11 & cellular:
base station model
m transmissions to/from
base station by hosts
with omnidirectional
antenna
m base station-to-base point-to-multipoint
station backhaul with
point-to-point antenna
r Unlike 802.11:
m range ~ 6 miles (“city
rather than coffee
shop”)
m ~14 Mbps
6: Wireless and Mobile Networks 6-35
802.16: WiMAX: downlink, uplink scheduling
r Transmission frame
m down-link subframe: base station to node
m uplink subframe: node to base station
… …
pream.
base station tells nodes who will get to receive (DL map)
and who will get to send (UL map), and when
Home Network Basics Describe the components required to build a home network.
Network Technologies in the
Describe wired and wireless network technologies.
Home
Wireless Standards Describe Wi-Fi.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
4.1 Home Network Basics
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Home Network Basics
Components of a Home Network
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Home Network Basics
Typical Home Network Routers
• Small business and home routers typically have two primary types of
ports:
• Ethernet Ports: They connect to the internal switch portion of
the router and are usually labeled “Ethernet” or “LAN”. All
devices connected to the switch ports are on the same local
network.
• Internet Port: It is used to connect the device to another
network. It connects the router to a different network than the
Ethernet ports. It is often used to connect to the cable or DSL
modem to access the internet.
• Many home routers also include a radio antenna and a built-in wireless access point.
• By default, the wireless devices are on the same local network as the devices physically plugged into
the LAN switch ports.
• The internet port is the only port that is on a different network in the default configuration.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
4.2 Network Technologies in
the Home
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Network Technologies in the Home
LAN Wireless Frequencies
• The wireless technologies most frequently used in home networks are in the unlicensed 2.4 GHz
and 5 GHz frequency ranges.
• Bluetooth is a technology that makes use of the 2.4 GHz band.
• It is limited to low-speed, short-range communications, but has the advantage of communicating
with many devices at the same time.
• This one-to-many communication has made Bluetooth technology the preferred method for
connecting computer peripherals such as wireless mice, keyboards, and printers.
• Bluetooth is a good method for transmitting audio to speakers or headphones.
• Other technologies that use the 2.4 GHz and 5 GHz bands are the modern wireless LAN
technologies that conform to the various IEEE 802.11 standards.
• Unlike Bluetooth technology, 802.11 devices transmit at a much higher power level giving them a
great range and improved throughput.
• Certain areas of the electromagnetic spectrum can be used without a permit.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Network Technologies in the Home
LAN Wireless Frequencies (Cont.)
The figure shows where wireless technologies exist on the electromagnetic spectrum.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Network Technologies in the Home
Wired Network Technologies
• Although many home network devices support wireless communications, there are still a few
applications where devices benefit from a wired switch connection that is not shared with other
users on the network.
• The most implemented wired protocol is the Ethernet protocol.
• Ethernet uses a suite of protocols that allow network devices to communicate over a wired LAN
connection.
• An Ethernet LAN can connect devices using many different types of wiring media.
• Directly connected devices use an Ethernet patch cable, usually unshielded twisted pair.
• These cables can be purchased with the RJ-45 connectors already installed, and they come in
various lengths.
• Recently constructed homes may have Ethernet jacks already wired in the walls of the home.
• For those homes that do not have UTP wiring, there are other technologies, such as powerline,
that can distribute wired connectivity throughout the premises.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Network Technologies in the Home
Wired Network Technologies (Cont.)
Category 5e Cable It is the most common wiring used in a LAN. The cable is made up of 4 pairs of wires
that are twisted to reduce electrical interference.
Coaxial Cable It has an inner wire surrounded by a tubular insulating layer that is then surrounded by a
tubular conducting shield. Most coax cables also have an external insulating sheath or
jacket.
Fiber-optic Cable It can be either glass or plastic with a diameter about the same as a human hair and can
carry digital information at very high speeds over long distances. Fiber-optic cables
have a very high bandwidth, which enables them to carry very large amounts of data.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
4.3 Wireless Standards
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Wireless Standards
Wi-Fi Networks
• Standards specify the RF spectrum used, data rates, how the information is transmitted, and
more.
• The main organization responsible for the creation of wireless technical standards is the IEEE.
• The IEEE 802.11 standard governs the WLAN environment.
• There are amendments to the IEEE 802.11 standard that describe characteristics for different
standards of wireless communications.
• Wireless standards for LANs use the 2.4 GHz and 5 GHz frequency bands.
• Collectively these technologies are referred to as Wi-Fi.
• Another organization, the Wi-Fi Alliance, is responsible for testing wireless LAN devices from
different manufacturers.
• The Wi-Fi logo on a device means that this equipment meets standards and should operate with
other devices that use the same standard.
• Wireless standards are constantly improving the connectivity and speed of Wi-Fi networks.
• It is important to be aware of new standards as they are introduced because manufacturers
of wireless devices will implement these standards quickly in their new products.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Wireless Standards
Wireless Settings
The Packet Tracer Basic Wireless Settings interface is shown in the figure.
• Wireless routers using the 802.11 standards have multiple
settings to be configured, including:
• Network Mode: The type of technology that must be
supported (802.11b, 802.11g, 802.11n or Mixed Mode).
• Network Name (SSID): Identifies the WLAN. All
devices that wish to participate in the WLAN must have
the same service set identifier (SSID).
• Standard Channel: Specifies the channel over which
communication will occur. By default, this is set
to Auto to allow the AP to determine the optimum
channel to use.
• SSID Broadcast: Determines if the SSID will be
broadcast to all devices within range. By default, it's set
to Enabled.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Wireless Standards
Wireless Settings (Cont.)
Network Mode:
• The 802.11 protocol can provide increased throughput based on the wireless network
environment.
• If all wireless devices connect with the same 802.11 standard, maximum speeds can be
obtained for that standard.
• If the access point is configured to accept only one 802.11 standard, devices that do not use
that standard cannot connect to the access point.
• A mixed mode wireless network environment can include devices that use any of the existing
Wi-Fi standards.
• This environment provides easy access for older devices that need a wireless connection but
do not support the latest standards.
• When building a wireless network, it is important that the wireless components connect to the
appropriate WLAN. This is done using the SSID.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Wireless Standards
Wireless Settings (Cont.)
• The SSID is a case-sensitive, alphanumeric string that contains up to 32 characters.
• It is sent in the header of all frames transmitted over the WLAN.
• It is used to tell wireless devices (STAs), which WLAN they belong to and with which other
devices they can communicate.
• We use the SSID to identify a specific wireless network that is essentially the name of the network.
• The SSID broadcast allows other devices and wireless clients to automatically discover the name
of the wireless network.
• When the SSID broadcast is disabled, you must manually enter the SSID on wireless devices.
• Disabling SSID broadcasting can make it more difficult for legitimate clients to find the
wireless network.
• Simply turning off the SSID broadcast is not sufficient to prevent unauthorized clients from
connecting to the wireless network.
• All wireless networks should use the strongest available encryption to restrict unauthorized
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
access.
4.4 Set Up a Home Router
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Set Up a Home Router
First Time Setup
• Many wireless routers designed for home use have an automatic setup utility that can be used to
configure the basic settings on the router.
• These utilities usually require a PC or laptop to be connected to a wired port on the router.
• If no device is available that has a wired connection, it may be necessary to configure the wireless client
software on the laptop or tablet first.
• Some home routers may have a built-in modem for internet connections.
• If so, verify that the type of connection is correct for your internet service.
• A cable modem connection will have a coaxial terminal to accept a BNC-type connector.
• A DSL connection will have a port for a telephone-type cable, usually an RJ-11 connector.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Set Up a Home Router
First Time Setup (Cont.)
• After confirming that the computer is connected to the network router and the link lights on the
NIC indicate a working connection, the computer needs an IP address.
• Most network routers are set up so that the computer receives an IP address automatically from a
local DHCP server automatically configured on the wireless router.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Set Up a Home Router
Design Considerations
• Before entering the configuration utility, or manually configuring the router through a web browser,
you should consider how your network will be used.
• You do not want to configure the router and have that configuration limit what you are able to do on
the network, nor do you want to leave your network unprotected.
• If SSID broadcasting is on, the SSID name will be seen by all wireless clients within your
signal range.
• Many times, the SSID gives away too much information about the network to unknown
What should my
client devices.
network be called?
• It is not a good practice to include the device model or brand name as part of the SSID.
• Wireless devices have default settings that are easy to find on the internet, as well as
known security weaknesses.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Set Up a Home Router
Design Considerations (Cont.)
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Set Up a Home Router
Design Considerations (Cont.)
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Set Up a Home Router
Packet Tracer - Configure a Wireless Router and Client
In this Packet Tracer activity, you will complete the following objectives:
• Part 1: Connect the devices.
• Part 2: Configure the wireless router.
• Part 3: Configure IP addressing and test connectivity.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
4.5 Build a Home Network
Summary
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Build a Home Network Summary
What Did I Learn in this Module?
• Most home networks consist of at least two separate networks with the public network coming in from the service
provider.
• The router is connected to the internet and is most likely equipped with both wired and wireless capabilities.
• A home network is a small LAN with devices that usually connect to an integrated router and to each other to
exchange information.
• Other types of devices that might be connecting to a home network include desktop computers, gaming systems,
smart tv systems, printers, scanners, security cameras, and climate control devices.
• Port types for small business and home routers include ethernet ports and internet ports.
• Many home routers include wired ports, a radio antenna, and a built-in wireless access point.
• Wireless technologies use electromagnetic waves to carry information between devices and most frequently use the
unlicensed 2.4 GHz and 5 GHz frequency ranges in home networks.
• Bluetooth uses the 2.4 GHz band.
• Other technologies that use the 2.4 GHz and 5 GHz bands are modern wireless LAN technologies that conform to
the various IEEE 802.11 standards.
• 802.11 devices transmit at a much higher power level than Bluetooth technology, giving them a great range and
improved throughput.
• Directly connected devices use an Ethernet patch cable, usually unshielded twisted pair.
• Category 5e, the most common wiring used in a LAN, is made up of 4 pairs of wires that are twisted to reduce
electrical interference.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Build a Home Network Summary
What Did I Learn in this Module? (Cont.)
• The IEEE 802.11 standard governs the WLAN environment and Wireless standards for LANs use the 2.4 GHz and
5 GHz frequency bands and are collectively referred to as Wi-Fi.
• Wireless routers using the 802.11 standards have multiple settings to be configured such as network mode,
network name (SSID), standard channel, and SSID broadcast.
• When building a wireless network, it is important that the wireless components connect to the appropriate WLAN
using the SSID.
• The SSID broadcast allows other devices and wireless clients to automatically discover the name of the wireless
network, but if disabled, it must be manually entered on wireless devices.
• Many wireless routers designed for home use have an automatic setup utility that can be used to configure the
basic settings on the router.
• Most network routers are set up so that the computer receives an IP address automatically from a local DHCP
server automatically configured on the wireless router.
• It is not good practice to include the device model or brand name as part of the SSID as internet searches can
expose security weaknesses.
• Who can access your home network should be determined by how you plan to use the network.
• Many routers support MAC address filtering enabling you to specifically identify who is allowed on the wireless
network.
• Guest access on wireless routers is a special SSID coverage area that allows open access but restricts that access
to using the internet only.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33