0% found this document useful (0 votes)
12 views157 pages

Networking Reviewer

The document outlines the basics of communications in a connected world, focusing on network types, data transmission, and bandwidth. It explains how networks facilitate online interactions and the various devices that connect to the internet, including mobile and home devices. Additionally, it covers data transmission methods and the concepts of bandwidth and throughput, highlighting their importance in network performance.

Uploaded by

Anjo Fernandez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views157 pages

Networking Reviewer

The document outlines the basics of communications in a connected world, focusing on network types, data transmission, and bandwidth. It explains how networks facilitate online interactions and the various devices that connect to the internet, including mobile and home devices. Additionally, it covers data transmission methods and the concepts of bandwidth and throughput, highlighting their importance in network performance.

Uploaded by

Anjo Fernandez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 157

Module 1:

Communications in a
Connected World
Networking Basics (BNET)
Module Objectives
Module Title: Communications in a Connected World
Module Objective: Explain important concepts in network communication.

Topic Title Topic Objective

Network Types Explain the concept of a network.

Data Transmission Describe network data.

Bandwidth and Throughput Explain network transmission and speed and capacity.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
1.1 Network Types

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Network Types
Everything is Online
• How many of us still think about whether or not we are “online”?
• We expect our phones, tablets, laptops, and desktop computers to always connect to the global
internet.
• We use this network to interact with friends, shop, share pictures and experiences and learn.
• The internet has become such a part of everyday life that we almost take it for granted.
• Typically, when people use the term internet, they are not referring to the physical connections in
the real world.
• Instead, they think of it as a formless collection of connections. It is the “place” people go to find or
share information.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Network Types
Who Owns “The Internet”?
• Any individual or group does not own the internet.
• It is a worldwide collection of interconnected networks
cooperating to exchange information using common
standards.
• Through telephone wires, fiber-optic cables, wireless
transmissions, and satellite links, internet users can
exchange information in various forms, as shown in the
figure.
• Everything that you access online is located somewhere on
the global internet.
• Social media sites, multiplayer games, messaging centers
that provide email, and online courses — all these internet
destinations connect to local networks that send and receive
information through the internet.
• Think about all your daily interactions that require you to be
online.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Network Types
Local Networks
• Local networks come in all sizes.
• They can range from simple networks consisting of two computers to networks connecting
hundreds of thousands of devices.
• Networks installed in small offices, or homes and home offices, are referred to as SOHO
networks.
• SOHO networks let you share resources, such as printers, documents, pictures, and music,
between a few local users.
• Large networks can advertise and sell products, order supplies, and communicate with customers.
• Communication over a network is usually more efficient and less expensive than traditional forms
of communication, such as regular mail or long-distance phone calls.
• Networks allow for rapid communication, such as email and instant messaging, and provide
consolidation and access to information stored on network servers.
• Business and SOHO networks usually provide a shared connection to the internet.
• The internet is considered a "network of networks" because it makes up thousands of connected
local networks.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Network Types
Local Networks (Cont.)

Small home networks connect a few computers to each other and the
Small Home Networks
internet.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Network Types
Local Networks (Cont.)

Small Office and Home The SOHO network allows computers in a home or remote office to connect
Office Networks to a corporate network or access centralized, shared resources.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Network Types
Local Networks (Cont.)

Medium to large networks, such as those used by corporations and schools,


Medium to Large Networks can have many locations with hundreds or thousands of interconnected
hosts.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Network Types
Local Networks (Cont.)

The internet is a network that connects hundreds of millions of computers


World Wide Networks
worldwide.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Network Types
Mobile Devices
• The internet connects more computing devices than just desktop and laptop computers.
• There are devices all around that you may interact with daily that connect to the internet (mobile
devices, home devices, and a variety of other connected devices).

Smartphone It connects to the internet from almost anywhere. It combines the functions of many different
products, such as a telephone, camera, GPS receiver, media player, and touchscreen
computer.
Tablet It also has the functionality of multiple devices like a smartphone. With the additional screen
size, they are ideal for watching videos and reading magazines or books. With on-screen
keyboards, users do many things they used to do on their laptop computer, such as
composing emails or browsing the web.
Smartwatch It can connect to a smartphone to provide the user with alerts and messages. Additional
functions, such as heart rate monitoring and counting steps, like a pedometer, can help
people who are wearing the device to track their health.
Smart Glasses A wearable computer in the form of glasses, such as Google Glass, contains a tiny screen
that displays information to the wearer, similar to a fighter pilot's Head-Up Display (HUD). A
small touchpad on the side allows the user to navigate menus while
© 2020 still
Cisco and/or being
its affiliates. ableCiscotoConfidential
All rights reserved. see 20

through the smart glasses.


Network Types
Connected Home Devices
• Many things in your home can connect to the internet to be monitored and configured
remotely.

Many home items, such as security systems, lighting, and climate controls, can be
Security System
monitored and configured remotely using a mobile device.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Network Types
Connected Home Devices
• Many things in your home can connect to the internet to be monitored and configured
remotely.

Household appliances such as refrigerators, ovens, and dishwashers can connect to the
internet, allowing the homeowner to power them on or off, monitor the appliance's status,
Appliances
and be alerted to preset conditions, such as when the temperature in the refrigerator
rises above an acceptable level.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Network Types
Connected Home Devices
• Many things in your home can connect to the internet to be monitored and configured
remotely.

It can be connected to the internet to access content without needing TV service provider
Smart TV equipment. Also, it can allow a user to browse the web, compose an email, or display
video, audio, or photos stored on a computer.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Network Types
Connected Home Devices
• Many things in your home can connect to the internet to be monitored and configured
remotely.

Gaming consoles can connect to the internet to download games and play with friends
Gaming Console
online.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Network Types
Other Connected Devices
• There are also many connected devices found in the world outside your home that provide
convenience and valuable, or even vital, information.

Many modern cars can connect to the internet to access maps, audio and video content, or
information about a destination. They can even send a text message or email if there is an
Smart Cars attempted theft or call for assistance in case of an accident. These cars can also connect to
smartphones and tablets to display information about the different engine systems, provide
maintenance alerts, or display the security system's status.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Network Types
Other Connected Devices
• There are also many connected devices found in the world outside your home that provide
convenience and valuable, or even vital, information.

Radiofrequency identification (RFID) tags can be placed in or on objects to track them or


RFID Tags
monitor sensors for many conditions.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Network Types
Other Connected Devices
• There are also many connected devices found in the world outside your home that provide
convenience and valuable, or even vital, information.

Connected sensors provide temperature, humidity, wind speed, barometric pressure, and soil
moisture data. Actuators can then be automatically triggered based on current conditions. For
Sensors and example, a smart sensor can periodically send soil moisture data to a monitoring station. The
Actuators monitoring station can then signal an actuator to begin watering. The sensor will continue to
send soil moisture data allowing the monitoring station to determine when to deactivate the
actuator.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Network Types
Other Connected Devices
• There are also many connected devices found in the world outside your home that provide
convenience and valuable, or even vital, information.

Medical Medical devices such as pacemakers, insulin pumps, and hospital monitors provide users or
Devices medical professionals with feedback or alerts when vital signs are at specific levels.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
1.2 Data Transmission

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Data Transmission
The Bit
• Did you know that computers and networks only work with binary digits, zeros, and ones?
• It cannot be easy to imagine that all our data is stored and transmitted as bits.
• Each bit can only have one of two possible values, 0 or 1.
• The term bit is an abbreviation of “binary digit” and represents the smallest piece of data.
• Humans interpret words and pictures computers to analyze only patterns of bits.
• A bit is stored and transmitted as one of two possible discrete states.
• This can include two directions of magnetization, two different voltage or current levels, two distinct
levels of light intensity, or any other physical system of two discrete states.
• For example, a light switch can be either On or Off; in binary representation, these states
correspond to 1 and 0, respectively.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Data Transmission
The Bit (Cont.)
• Every input device (mouse, keyboard, voice-activated receiver) will translate human interaction into
binary code for the CPU to process and store.
• Every output device (printer, speakers, monitors, etc.) will take binary data and translate it into
human-recognizable form.
• Within the computer itself, all data is processed and stored as binary.
• Computers use binary codes to represent and interpret letters, numbers, and special characters
with bits.
• A commonly used code is ASCII, where each character represents eight bits.
• For example:
• Capital letter: A = 01000001
• Number: 9 = 00111001
• Unique character: # = 00100011
• Each group of eight bits, such as the representations of letters and numbers, is known as a byte.
• The use of codes can represent almost any type of information digitally, including computer data,
graphics, photos, voice, video, and music.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Data Transmission
Common Methods of Data Transmission
• After the data transforms into bits, it converts into signals sent across the network media to its
destination.

• Media refers to the physical medium on which the signals are transmitted.

• Examples of media are copper wire, fiber-optic cable, and electromagnetic waves through the air.

• A signal consists of electrical or optical patterns transmitted from one connected device to another.

• These patterns represent the digital bits (the data) and travel across the media from source to
destination as either a series of pulses of electricity, vibrations of light, or radio waves.

• Signals may be converted many times before reaching the destination, as corresponding media
changes between source and destination.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Data Transmission
Common Methods of Data Transmission (Cont.)

• There are three standard methods of signal


transmission used in networks:
• Electrical signals - Transmission is achieved
by representing data as electrical pulses on
copper wire.
• Optical signals - Transmission is achieved by
converting the electrical signals into light
pulses.
• Wireless signals - Transmission is achieved by
using infrared, microwave, or radio waves
through the air.
• Most homes and small businesses transmit network
signals across copper wires (cables) or Wi-Fi-enabled
wireless connections.
• More extensive networks employ fiber-optic cables to
carry signals for longer distances reliably.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
1.3 Bandwidth and Throughput

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Bandwidth and Throughput
Bandwidth
• Streaming a movie or playing a multiplayer game requires reliable, fast connections.

• Networks can transmit and receive bits at a very high rate to support high-bandwidth applications.

• Different physical media support the transfer of bits at different speeds.

• The data transfer rate is usually discussed in terms of bandwidth and throughput.

• Bandwidth is the capacity of a medium to carry data.

• Digital bandwidth measures the amount of data that can flow from one place to another in a given
amount of time.

• Bandwidth measures the number of bits that are (theoretically) sent across the media in a second.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Bandwidth and Throughput
Bandwidth (Cont.)
• Common bandwidth measurements are as follows:
• Thousands of bits per second (Kbps)
• Millions of bits per second (Mbps)
• Billions of bits per second (Gbps)

• Physical media properties, current technologies, and the laws of physics all play a role in
determining available bandwidth.

• The table shows the commonly used units of measure for bandwidth.

Unit of Bandwidth Abbreviation Equivalence


Bits per second bps 1 bps = fundamental unit of bandwidth
Kilobits per second Kbps 1 Kbps = 1,000 bps = 103 bps
Megabits per second Mbps 1 Mbps = 1,000,000 bps = 106 bps
Gigabits per second Gbps 1 Gbps = 1,000,000,000 bps = 109 bps
Terabits per second Tbps 1 Tbps = 1,000,000,000,000 bps = 1012
bps
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Bandwidth and Throughput
Throughput
• Like bandwidth, throughput is the measure of the transfer of bits across the media over a given
period.

• However, the throughput does not usually match the specified bandwidth due to several factors.

• Many factors influence throughput, including:

• The amount of data being sent and received over the connection
• The types of data being transmitted
• The latency created by the number of network devices encountered between the source and
destination

• Latency refers to the time, including delays, for data to travel from one given point to another.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Bandwidth and Throughput
Throughput (Cont.)
• Throughput measurements do not consider the validity or usefulness of the bits being transmitted
and received.

• Many messages received through the network are not destined for specific user applications.

• An example would be network control messages that regulate traffic and correct errors.

• In an internetwork or network with multiple segments, throughput cannot be faster than the slowest
link of the path from sending device to the receiving device.

• Even if all or most of the segments have high bandwidth, it will only take one part in the path with
lower bandwidth to create a slowdown of the throughput of the entire network.

• Many online speed tests can reveal the throughput of an internet connection.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
1.4 Communications in a
Connected World Summary

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Communications in a Connected World Summary
What Did I Learn in This Module?
• The internet is a worldwide collection of interconnected networks cooperating to exchange information
using common standards.
• Internet users can exchange information in various forms through telephone wires, fiber-optic cables,
wireless transmissions, and satellite links.
• Small home networks connect a few computers to each other and the internet.
• The SOHO network allows computers in a home or remote office to connect to a corporate network or
access centralized, shared resources.
• Medium to large networks, such as those used by corporations and schools, can have many locations with
hundreds or thousands of interconnected hosts.
• There are devices all around that you may interact with daily that connects to the internet.
• These include mobile devices such as smartphones, tablets, smartwatches, and smart glasses.
• Things in your home can connect to the internet, such as a security system, appliances, your smart TV,
and your gaming console.
• Outside your home, there are smart cars, RFID tags, sensors and actuators, and even medical devices
which can be connected.
• The categories used to classify types of personal data are volunteered data, observed data, and inferred
data.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Communications in a Connected World Summary
What Did I Learn in This Module? (Cont.)
• The term bit is an abbreviation of “binary digit” and represents the smallest piece of data.
• Each bit can only have one of two possible values, 0 or 1.
• There are three standard methods of signal transmission used in networks: electrical signals, optical
signals, and wireless signals.
• Bandwidth is the capacity of a medium to carry data.
• Digital bandwidth measures the amount of data that can flow from one place to another in a given amount
of time.
• The number of bits (theoretically) sent across the media in a second typically measures bandwidth.
• Common bandwidth measurements are thousands of bits per second (Kbps), millions of bits per second
(Mbps), and billions of bits per second (Gbps).
• Throughput usually varies from the specified bandwidth.
• Many factors influence throughput, including:
• The amount of data being sent and received over the connection
• The latency is created by the number of network devices encountered between the source and
destination.
• Latency refers to the time, including delays, for data to travel from one given point to another.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Networking Fundamentals
What is Computer
Network?
• People and digital devices are
entities that communicate with each
other among themselves. Just as
people have a circle, devices in the
digital world have a circle.
Purposes of Computer Networks
Computer networks have become usable for many different purposes
with the developing technology. The main uses of computer networks are
as follows:

• Providing image and sound transfer (Chat and online meetings)


• Hardware sharing (Printer sharing)
• File, data and information sharing
• Software sharing
• Central management
• Support
Types of Networks
Computer networks are
geographically divided into many
groups according to their size.
There may be large networks with
millions of devices in them and
small networks consisting of 2-3
devices. The following image
shows some types of computer
networks by size.
Personal Area Network (PAN)
• Personal Area Network (PAN) refers to networks with a minimal
and small number of devices that cover very short distances (for
example, up to 10 meters).

Example:
• Bluetooth
• Hotspot
Local Area
Network (LAN)
Local Area Network (LAN)
has a larger area than PAN.
The number of devices in it
can be much more. It is
the most used and found
network type. Sometimes
a network with 2 devices
can also be called a LAN.
Metropolitan Area Network (MAN)

The Metropolitan Area Network (MAN)


is a geographically city-sized computer
network in which many LAN computer
networks are interconnected. It
connects networks with fiber optic
cabling.
Wide Area Network
(WAN)

Wide Area Network (WAN) is


the computer network with the
largest geographical area
among computer networks.
This computer network is so
large that it can even contain
continents. It hosts all other
computer networks within it.
Campus Area Network (CAN)

Campus Area Network (CAN) is a computer


network that is geographically smaller than
MAN and larger than LAN. This computer
network can contain several LANs. Usually,
the computer networks of universities,
institutions, or private companies are given
as an example of this computer network.
Network Topologies
Network topology is a visual map to understand the physical or
logical structure of a computer network. The locations of the
devices and cables in the network are among the factors that
determine the network topology. There are many benefits to having
a network topology.

Network topology is divided into 2 type:


• Physical Topology
• Logical Topology
Physical Topology

It is a type of topology in which all devices and components in the


network are drawn in terms of their exact locations. Looking at this
topology, it is seen which cabling is made over which paths and
devices. What is seen in the drawing has a physical counterpart.
For example, if there is a network device in the path from device A
to device B, this device is seen in the physical topology.
Logical Topology
It does not show the exact location of the devices in the topology like physical
topology. It often contains fewer elements than physical topology. Because
data flow is important in logical topology. For example, data going from device
A to device B may not be included in the topology if it passes over device C
between device A and device B, and device C has no effect on the data that
would need to be displayed on it. In this topology, it is the path of the data flow
that is desired to be emphasized rather than the physical placement of the
devices.
Common Network Topologies
Star Topology
Each node in the Star topology is connected
to a central node. All data flow is done
through the central node. Star topology is one
of the most common computer network
topologies.
Ring Topology
It works in a closed loop logic. The sent data
travels around the ring in one direction until it
reaches the destination. Each node passes
the incoming data over it and ensures that it
reaches the target. There is no hierarchical
relationship between nodes.
Mesh Topology
It is a network topology where there
is no central node and each node
can be directly connected to the
other. Mesh topology is not a
suitable topology for large
networks.
It is divided into 2 types:
• Full-mesh
• Partial-mesh
Full-Mesh
In the Full-Mesh topology,
each node in the network is
connected to all other nodes
by cabling separately. In this
topology, it is unlikely that the
connection between two
nodes will be broken.
Because there are alternative
ways of connecting.
Partial-Mesh

In the Partial-Mesh topology,


although each node is not directly
connected to all other nodes, they
are largely interconnected. Just like
in Full-Mesh topology, there are
alternative ways to reach the target
node in case of disconnection.
What is the OSI
Reference Model?
The Open Systems Interconnection (OSI) reference
model was developed by ISO (International
Organization of Standardization) in 1978. The OSI
model is a model created to enable communication
between different operating systems. With this model,
it has become easier to understand network structures.
It is a reference quality and has a layered architecture.
Each layer in the OSI model has separate tasks. There is
a hierarchical order between these layers and each
layer serves the next layer. The number of layers in the
OSI model is 7.
Network Devices
In a computer network, there are network devices, each responsible for a
separate task. Without these components in a computer network, the network
cannot fulfill its task. Therefore, knowing the tasks and capabilities of network
devices allows for solving problems in the network and understanding security
breaches. In this way, a solution is reached by taking quick action. In this part
of the training, information about network devices in an IT network will be
discussed.
Switch
The switch is one of the network devices
operating at layer 2 according to the OSI
reference model. However, some switches
with more manageable features operate at
layer 3 according to the OSI reference model.
The switch is the interconnection device and is
used to connect the nodes that want to
connect to the network. Sizes may vary
depending on the number of ports on it.
Router
The router is one of the network equipment working at the
3rd layer according to the OSI reference model. The router
is a packet routing device with highly advanced features
that contains an operating system (IOS - Internetworking
Operating System). It is network equipment used by
placing it between two computer networks. For example, it
is often used in LAN-LAN connections and WAN-LAN
connections. The most basic task of the router is packet
routing and thanks to this device, the networks are
separated from each other (segmentation). In other words,
it is one of the devices that separate computer networks
from each other. It is a configurable device.
Hub
The hub is one of the network
hardware operating at layer 1
according to the OSI reference
model. The hub device, which
has a very simple structure, is
one of the devices used to
connect computers that want to
connect to the network.
What is the TCP/IP Model?
The TCP/IP model was designed and developed by the
Department of Defense (DoD) in the 1960s. When the TCP/IP
model was introduced, there was no model that set the
standards in computer network communication yet. With this
model, it was determined how the network communication
should be on the basis of the internet.

The TCP/IP model has a layered architecture and consists of 4


layers:

• Application Layer
• Transport Layer
• Internet Layer
• Network Access Layer
OSI Model vs.
TCP/IP Model
Although the OSI reference model and the TCP/IP model
are very similar models, they differ from each other on
some points. When the TCP/IP model first emerged, it
emerged out of necessity, not aiming to be a standard.
The OSI reference model, on the other hand, aimed to
design the ideal network communication, which should
be in theory, including its practical use. The TCP/IP
The image above shows which layers in the
model was developed based on some protocols. The OSI
OSI reference model are equivalent to which
model, on the other hand, was not developed on any layers in the TCP/IP model in terms of tasks
protocol. and protocols.
IP Addressing Mechanism
While creating TCP/IP computer networks, a logical address (IP
Address) must first be assigned to each device in the network.
These assignment processes are called "IP Addressing
Mechanism". If an IP address is not assigned to a device in the
network, it cannot communicate with devices inside or outside the
network.
Module 2: Network
Components, Types, and
Connections
Networking Basics (BNET)
Module Objectives
Module Title: Network Components, Types, and Connections
Module Objective: Explain network types, components, and connections.

Topic Title Topic Objective

Clients and Servers Explain the roles of clients and servers in a network.

Network Components Explain the roles of network infrastructure devices.

ISP Connectivity Options Describe ISP connectivity options.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
2.1 Clients and Servers

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Clients and Servers
Client and Server Roles
• All computers connected to a network that participate directly in network communication are
classified as hosts.
• In modern networks, computer hosts can act as a client, a server, or both.
• The software installed on the computer determines which role the computer plays.

Type Description
The email server runs email server software.
Email
Clients use mail client software, such as Microsoft Outlook, to access email on the server.
The web server runs web server software.
Web Clients use browser software, such as Windows Internet Explorer, to access web pages
on the server.
The file server stores corporate and user files in a central location.
File The client devices access these files with client software such as the Windows File
Explorer.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Clients and Servers
Client and Server Roles (Cont.)
• Servers are hosts that have software installed which enable them to provide information, like
email or web pages, to other hosts on the network.
• Each service requires separate server software.
• For example, a host requires web server software in order to provide web services to the
network.
• Every destination that you visit online is provided to you by a server located somewhere
on a network that is connected to the global internet.

• Clients are computer hosts that have software installed enabling the hosts to request and
display the information obtained from the server.
• An example of client software is a web browser, such as Internet Explorer, Safari, Mozilla
Firefox, or Chrome.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Clients and Servers
Peer-to-Peer Networks

• Client and server software usually run on separate computers, but it is also possible for one
computer to run both client and server software at the same time.
• This type of network is called a peer-to-peer (P2P) network.
• Small businesses and homes may operate a P2P network to share resources.
• The simplest P2P network consists of two directly connected computers using either a wired or
wireless connection.
• Both computers are then able to use this simple network to exchange data and services
with each other, acting as either a client or a server, as necessary.
• Multiple PCs can also be connected to create a larger P2P network, but this requires a network
device, such as a switch, to interconnect the computers.
• In larger businesses, because of the potential for high amounts of network traffic, it is often
necessary to have dedicated servers to support the number of service requests.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Clients and Servers
Peer-to-Peer Networks (Cont.)
Advantages of P2P networking:
• Easy to set up
• Less complex
• Lower cost because network devices and dedicated servers may not be required
• Can be used for simple tasks such as transferring files and sharing printers

Disadvantages of P2P networking:


• No centralized administration
• Not as secure
• Not scalable
• All devices may act as both clients and servers which can slow their performance

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Clients and Servers
Peer-to-Peer Applications
• A P2P application allows a device to act as both a
client and a server.
• Every client is a server and every server is a client.
• Both clients can simultaneously send and receive
messages.
• P2P applications require that each end device
provide a user interface and run a background
service.
• Some P2P applications use a hybrid system where
resource sharing is decentralized, but the indexes
that point to resource locations are stored in a
centralized directory.
• In a hybrid system, each peer accesses an index
server to get the location of a resource stored on
another peer.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Clients and Servers
Multiple Roles in the Network

• A computer with server software can provide services


simultaneously to one or many clients.

• A single server can be a file server, a web server, and an


email server.

• A client computer can also connect to multiple servers


using client software such web browser, client email
application, and more.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
2.2 Network Components

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Network Components
Network Infrastructure

• The network infrastructure contains three


categories of hardware components.
• End Devices
• Intermediary Devices
• Network Media

• The following icons are used in network


topologies to identify a networking
component.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Network Components
End Devices

• The network devices that people are most familiar with are called end devices, or hosts.
• Computers (workstations, laptops, file servers, web servers)
• Network printers
• Telephones and teleconferencing equipment
• Security cameras
• Mobile devices (such as smart phones, tablets, PDAs, and wireless debit/credit card readers
and barcode scanners)

• An end device (or host) is either the source or destination of a message transmitted over the network.
• To uniquely identify hosts, addresses are used.
• When a host initiates communication, it uses the address of the destination host to specify where the
message should be sent.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
2.3 ISP Connectivity Options

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
ISP Connectivity Options
ISP Services

• An Internet Service Provider (ISP) provides


the link between a network and the internet.

• Many ISPs also offer additional services to


their contract subscribers as shown in the
figure.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
ISP Connectivity Options
ISP Services (Cont.)

• Each ISP connects to other ISPs to form a network of links that interconnect users all over the world.

• ISPs are connected in a hierarchical manner that ensures that internet traffic generally takes the
shortest path from the source to the destination.

• ISPs provides high-speed data links to connect the various service provider networks in major
metropolitan areas around the world.

• The primary medium that connects the internet backbone is fiber-optic cable installed underground to
connect cities within continents and under the sea to connect continents, countries, and cities.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
ISP Connectivity Options
ISP Connections

• The interconnection of ISPs that forms the backbone of the internet is a complex web of fiber-optic
cables with expensive networking switches and routers that direct the flow of information between
source and destination hosts.

• The simplest ISP connection option consists of a modem that provides a direct connection between
a computer and the ISP.
• However, this is not a secure option as a computer is not protected on the internet.

• A router (or wireless router) is required to securely connect a computer to an ISP.


• The router includes a switch to connect wired hosts and a wireless AP to connect wireless
hosts.
• The router also provides client IP addressing information and security for inside hosts.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
ISP Connectivity Options
ISP Connections (Cont.)

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
ISP Connectivity Options
Cable and DSL Connections

Most home network users connect to the internet using either Cable or DSL.

Cable
• Typically offered by cable television service
providers option, the internet data signal is
carried on the same coaxial cable that delivers
cable television.
• It provides a high bandwidth, always on,
connection to the internet.
• A special cable modem separates the internet
data signal from the other signals carried on
the cable and provides an Ethernet connection
to a host computer or LAN.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
ISP Connectivity Options
Cable and DSL Connections (Cont.)
DSL
• Digital Subscriber Line (DSL) provides a high bandwidth, always on, connection to the internet.
• It requires a special high-speed modem that separates the DSL signal from the telephone signal
and provides an Ethernet connection to a host computer or LAN.
• DSL runs over a telephone line, with the line split into three channels.
• One channel is used for voice telephone calls. This channel allows an individual to receive
phone calls without disconnecting from the internet.
• A second channel is a faster download channel, used to receive information from the
internet.
• The third channel is used for sending or uploading information. This channel is usually
slightly slower than the download channel.
• The quality and speed of the DSL connection depends mainly on the quality of the phone line and
the distance from the central office of your phone company. The farther you are from the central
office, the slower the connection.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
ISP Connectivity Options
Additional Connectivity Options

• Other ISP connection options for home users include the following:

• Cellular – Connects using the same cell service as smartphones to provide roaming
internet connectivity. However, additional service charges may apply.
• Satellite – Provides acceptable bandwidth internet connectivity to remote areas.
However, equipment and installation costs can be high with a moderate monthly fee
thereafter.
• Dial-up Telephone – An inexpensive option that uses any land phone line and a
modem. This provides the lowest bandwidth option and should only be considered
when higher speed connection options are not available.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
2.4 Network Components,
Types, and Connections
Summary
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Network Components, Types, and Connections Summary
What Did I Learn in this Module?
• All computers connected to a network are classified as hosts.
• Computer hosts can act as a client, a server, or both and the software installed on the computer
determines which role the computer plays.
• In a P2P network, used by small businesses and homes, many computers function as the servers and
clients on the network.
• In larger businesses, dedicated servers are used to support the number of service requests.
• P2P networks are easy to set up, less complex, lower in cost, and can be used for simple tasks such as
transferring files and sharing printers. However, there is no centralized administration, have less
security, are not scalable, and can perform slower.
• The network infrastructure is the platform that supports the network and provides the stable and reliable
channel over which our communications can occur.
• Symbols represent various types of networking equipment.
• The network infrastructure contains three categories of hardware components including end devices,
intermediate devices, and network media.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Network Components, Types, and Connections Summary
What Did I Learn in this Module? (Cont.)
• End devices, or hosts, form the interface between users and the underlying communication network.
• End devices include computers, network printers, telephones and teleconferencing equipment, security
cameras, and mobile devices (such as smartphones, tablets, PDAs, wireless debit/credit card
readers, and barcode scanners).
• An ISP provides the link between the home network and the internet using a local cable provider, a
landline telephone service provider, the cellular network that provides your smartphone service, or an
independent provider who leases bandwidth on the physical network infrastructure of another company.
• ISPs are connected in a hierarchical manner that ensures that internet traffic generally takes the
shortest path from the source to the destination.
• A home user usually connects to the ISP using a wireless integrated router.
• The router includes a switch to connect wired hosts, a wireless AP to connect wireless hosts, and
provides client IP addressing information and security for inside hosts.
• The two most common internet connections methods are cable and DSL while other options include
cellular, satellite, and dial-up telephone.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Module 3: Wireless and Mobile
Networks

1
Module 3: Wireless and Mobile Networks
Background:
r Two main wireless architectures
m Cellular data networks
m 802.11 wireless networks

r two important (but different) challenges


m wireless: communication over wireless link
m mobility: handling the mobile user who changes point
of attachment to network

6-2
Elements of a wireless network

wireless hosts
r laptop, PDA, IP phone
r run applications
r may be stationary
(non-mobile) or mobile
network m wireless does not
infrastructure always mean mobility

6-3
Elements of a wireless network
base station
r typically connected to
wired network
r relay - responsible
for sending packets
between wired
network network and wireless
infrastructure host(s) in its “area”
m e.g., cell towers,
802.11 access
points

6-4
Elements of a wireless network
wireless link
r typically used to
connect mobile(s) to
base station
r multiple access
protocol coordinates
network link access
infrastructure r various data rates,
transmission distance

6-5
Characteristics of selected wireless link
standards

200 802.11n

54 802.11a,g 802.11a,g point-to-point data


Data rate (Mbps)

5-11 802.11b 802.16 (WiMAX)

4 UMTS/WCDMA-HSPDA, CDMA2000-1xEVDO 3G cellular


enhanced
1 802.15

.384 UMTS/WCDMA, CDMA2000 3G

.056 IS-95, CDMA, GSM 2G

Indoor Outdoor Mid-range Long-range


10-30m 50-200m outdoor outdoor
200m – 4 Km 5Km – 20 Km

6-6
Elements of a wireless network
infrastructure mode
r base station connects
mobiles into wired
network
r handoff: mobile
changes base station
network providing connection
infrastructure into wired network

6-7
Elements of a wireless network
ad hoc mode
r no base stations
r nodes can only
transmit to other
nodes within link
coverage
r nodes organize
themselves into a
network: route among
themselves

6-8
Wireless network taxonomy
single hop multiple hops

host connects to host may have to


infrastructure base station (WiFi, relay through several
(e.g., APs) WiMAX, cellular) wireless nodes to
which connects to connect to larger
larger Internet Internet: mesh net

no base station, no
no
connection to larger
no base station, no
infrastructure Internet. May have to
connection to larger
relay to reach other
Internet (Bluetooth,
a given wireless node
ad hoc nets)
MANET, VANET

6-9
Wireless Link Characteristics (1)

m Decreased signal strength: radio signal


attenuates as it propagates through matter
(path loss)
m Interference from other sources: standardized
wireless network frequencies (e.g., 2.4 GHz)
shared by other devices (e.g., phone); devices
(motors) interfere as well
m Multipath propagation: radio signal reflects off
objects, arriving at destination at slightly
different times

6-10
Wireless Link Characteristics (2)
r SNR: signal-to-noise ratio 10-1

m larger SNR – easier to 10-2


extract signal from noise (a
10-3
“good thing”)
r SNR versus BER tradeoffs

BER
10-4

m Given physical layer:


10-5
increase power -> increase
SNR->decrease BER 10-6

m Given SNR: choose physical


10-7
layer that meets BER 10 20 30 40
SNR(dB)
requirement, giving highest
throughput QAM256 (8 Mbps)
• SNR may change with
QAM16 (4 Mbps)
mobility: dynamically adapt
physical layer (modulation BPSK (1 Mbps)
technique, rate)
6-11
Wireless network characteristics
Multiple wireless senders and receivers create
additional problems (beyond multiple access):

A B C
C

A’s signal C’s signal


B strength strength
A

space
Hidden terminal problem
r B, A hear each other Signal attenuation:
r B, C hear each other r B, A hear each other
r A, C can not hear each other r B, C hear each other
means A, C unaware of their r A, C can not hear each other
interference at B interfering at B

6-12
Code Division Multiple Access (CDMA)
r Used in several wireless broadcast channels
(cellular, satellite, etc) standards
r Unique “code” assigned to each user; i.e., code set
partitioning
r All users share same frequency, but each user has
own “chipping” sequence (i.e., code) to encode data
r Encoded signal = (original data) X (chipping sequence)
r Decoding: inner-product of encoded signal and
chipping sequence
r Allows multiple users to “coexist” and transmit
simultaneously with minimal interference (if codes
are “orthogonal”)

6: Wireless and Mobile Networks 6-13


CDMA Encode/Decode
channel output Zi,m
d0 = 1
Zi,m= di.cm
data 1 1 1 1 1 1 1 1
d1 = -1
bits -1 -1 -1 -1 -1 -1 -1 -1
sender
1 1 1 1 1 1 1 1 slot 1 slot 0
code channel channel
-1 -1 -1 -1 -1 -1 -1 -1
output output
slot 1 slot 0

M
Di = Σ Zi,m.cm
m=1
M
received 1 1 1 1 1 1 1 1
d0 = 1
-1 -1 -1 -1 -1 -1 -1 -1
input d1 = -1

1 1 1 1 1 1 1 1 slot 1 slot 0
code channel channel
-1 -1 -1 -1 -1 -1 -1 -1

receiver output output


slot 1 slot 0

6: Wireless and Mobile Networks 6-14


CDMA: two-sender interference

6: Wireless and Mobile Networks 6-15


Wi-Fi

16
IEEE 802.11 Wireless LAN
r 802.11b r 802.11a
m 2.4-5 GHz unlicensed spectrum m 5-6 GHz range

m up to 11 Mbps m up to 54 Mbps

m direct sequence spread r 802.11g


spectrum (DSSS) in physical m 2.4-5 GHz range
layer m up to 54 Mbps
• all hosts use same chipping
r 802.11n: multiple antennae
code
m 2.4-5 GHz range
m up to 200-450 Mbps

r All use CSMA/CA for multiple access


r All have base-station and ad-hoc network versions

6: Wireless and Mobile Networks 6-17


802.11 LAN architecture
r Wireless host communicates
Internet with base station
m base station = access
point (AP)
r Basic Service Set (BSS) (aka
“cell”) in infrastructure
hub, switch
or router
mode contains:
AP m wireless hosts
m access point (AP): base
BSS 1
station
AP
m ad hoc mode: hosts only

BSS 2
6: Wireless and Mobile Networks 6-18
Wireless Networks
Other Wireless Networks
In addition to the GSM and 4G/5G transmitters and receivers, smartphones make connections in a
variety of ways.
It uses satellites to transmit signals that cover the globe. The smartphone can receive these
GPS
signals and calculate the phone’s location to an accuracy of within 10 meters.
Wi-Fi transmitters and receivers located within the smartphone enable the phone to connect to
local networks and the internet. The phone needs to be within the range of the signal from a
Wi-Fi wireless network access point to receive and send data on a Wi-Fi network. Wi-Fi networks are
usually privately owned but often provide guest or public access hotspots. Wi-Fi network
connections on the phone are like network connections on a laptop computer.
It is a low-power, shorter range wireless technology that is intended to replace wired connectivity
for accessories such as speakers, headphones, and microphones. It can also be used to connect
Bluetooth a smartwatch to a smartphone. Because Bluetooth technology can be used to transmit both data
and voice, it can be used to create small local networks. It is wireless technology that allows
multiple devices to communicate over short distances.
It is a wireless communication technology that enables data to be exchanged by devices that are
NFC in very close proximity to each other, usually less than a few centimeters. It uses electromagnetic 19

fields to transmit data.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
802.11: Channels, association
r 802.11b: 2.4GHz-2.485GHz spectrum divided into
11 channels at different frequencies
m AP admin chooses frequency for AP
m interference possible: channel can be same as
that chosen by neighboring AP!
r Host: must associate with an AP
m scans channels, listening for beacon frames
containing AP’s name (SSID) and MAC address
m selects AP to associate with
m may perform authentication
• See chapter 8 in textbook
m will typically run DHCP to get IP address in
AP’s subnet
6: Wireless and Mobile Networks 6-20
802.11: passive/active scanning
BBS 1 BBS 2 BBS 1 BBS 2

AP 1 AP 2 AP 1 1 AP 2
1 1 2 2
2 3
3 4

H1 H1

Passive Scanning: Active Scanning:


(1) beacon frames sent from APs (1) Probe Request frame broadcast
(2) association Request frame sent: from H1
H1 to selected AP (2) Probes response frame sent from
(3) association Response frame sent: APs
selected AP to H1 (3) Association Request frame sent:
H1 to selected AP
(4) Association Response frame
sent: selected AP to H1
6-21
IEEE 802.11: multiple access
r Avoid collisions: 2+ nodes transmitting at same time
r 802.11: CSMA - sense before transmitting
m don’t collide with ongoing transmission by other node

r 802.11: no collision detection!


m difficult to receive (sense collisions) when transmitting due
to weak received signals (fading)
m can’t sense all collisions in any case: hidden terminal, fading
m goal: avoid collisions: CSMA/C(ollision)A(voidance)

A B C
C
A’s signal C’s signal
B strength strength
A
space
6-22
IEEE 802.11 MAC Protocol: CSMA/CA
802.11 sender
1 if sense channel idle for DIFS then sender receiver
transmit entire frame (no CD)
2 if sense channel busy then DIFS

start random backoff time


timer counts down while channel idle data
transmit when timer expires
if no ACK, increase random backoff
interval, repeat 2 SIFS

802.11 receiver ACK


- if frame received OK
return ACK after SIFS (ACK needed due to
hidden terminal problem)

6: Wireless and Mobile Networks 6-23


Avoiding collisions (more)
Idea: allow sender to “reserve” channel rather than random
access of data frames: avoid collisions of long data frames
r Sender first transmits small request-to-send (RTS) packets
to BS using CSMA
m RTSs may still collide with each other (but they’re short)
r BS broadcasts clear-to-send CTS in response to RTS
r CTS heard by all nodes
m sender transmits data frame
m other stations defer transmissions

avoid data frame collisions completely


using small reservation packets!

6: Wireless and Mobile Networks 6-24


Collision Avoidance: RTS-CTS exchange
A B
AP

RTS(A) RTS(B)

reservation collision
RTS(A)

CTS(A) CTS(A)

DATA (A)
defer

time
ACK(A) ACK(A)

6: Wireless and Mobile Networks 6-25


802.11 frame: addressing

2 2 6 6 6 2 6 0 - 2312 4
addres addres addres addres
frame duratio seq
s s s s payload CRC
control n control
1 2 3 4

Address 4: used only


in ad hoc mode
Address 1: MAC address
of wireless host or AP Address 3: MAC address
to receive this frame of router interface to
which AP is attached
Address 2: MAC address
of wireless host or AP
transmitting this frame

6: Wireless and Mobile Networks 6-26


802.11 frame: addressing

Internet
H1 R1 router
AP

R1 MAC addr H1 MAC addr


dest. address source address

802.3 frame

AP MAC addr H1 MAC addr R1 MAC addr


address 1 address 2 address 3

802.11 frame
6: Wireless and Mobile Networks 6-27
802.11 frame: more
frame seq #
duration of reserved
(for RDT)
transmission time (RTS/CTS)

2 2 6 6 6 2 6 0 - 2312 4
addres addres addres addres
frame duratio seq
s s s s payload CRC
control n control
1 2 3 4

2 2 4 1 1 1 1 1 1 1 1
Powe
Protocol To From More More
Type Subtype Retry r WEP Rsvd
version AP AP frag data
mgt

frame type
(RTS, CTS, ACK, data)

6: Wireless and Mobile Networks 6-28


END OF SLIDE

6: Wireless and Mobile Networks 6-29


And… We’re done!
r Next Week
m Tues
• Lab session of some kind
• Unless things are hopelessly broken…
m Thurs.
• Final Review

r Final
m Friday 12/14, 12-2PM

6: Wireless and Mobile Networks 6-30


802.11: mobility within same subnet

r H1 remains in same IP router


subnet: IP address
can remain same hub or
r switch: which AP is switch

associated with H1? BBS 1


m self-learning (Ch. 5):
switch will see frame AP 1
from H1 and AP 2
“remember” which
switch port can be H1 BBS 2
used to reach H1

6: Wireless and Mobile Networks 6-31


802.11: advanced capabilities
Rate Adaptation 10-1

10-2
r base station, mobile
10-3
dynamically change

BER
10-4
transmission rate 10-5
(physical layer 10-6

modulation technique) 10-7


10 20 30 40
as mobile moves, SNR SNR(dB)

varies 1. SNR decreases, BER


increase as node moves
QAM256 (8 Mbps) away from base station
QAM16 (4 Mbps)
BPSK (1 Mbps) 2. When BER becomes too
operating point
high, switch to lower
transmission rate but with
lower BER

6: Wireless and Mobile Networks 6-32


802.11: advanced capabilities
Power Management
r Node-to-AP: “I am going to sleep until next
beacon frame”
m AP knows not to transmit frames to this
node
m node wakes up before next beacon frame
r Beacon frame: contains list of mobiles with
AP-to-mobile frames waiting to be sent
m node will stay awake if AP-to-mobile frames
to be sent; otherwise sleep again until next
beacon frame

6: Wireless and Mobile Networks 6-33


802.15: personal area network
r Less than 10 m diameter
r Replacement for cables
P
(mouse, keyboard, S
headphones) P
radius of
M
r Ad hoc: no infrastructure coverage

r Master/slaves: S P
S P
m slaves request permission to
send (to master)
m master grants requests
r 802.15: evolved from M Master device
Bluetooth specification Slave device
S
m 2.4-2.5 GHz radio band P Parked device (inactive)
m up to 721 kbps
6: Wireless and Mobile Networks 6-34
802.16: WiMAX
point-to-point
r Like 802.11 & cellular:
base station model
m transmissions to/from
base station by hosts
with omnidirectional
antenna
m base station-to-base point-to-multipoint
station backhaul with
point-to-point antenna
r Unlike 802.11:
m range ~ 6 miles (“city
rather than coffee
shop”)
m ~14 Mbps
6: Wireless and Mobile Networks 6-35
802.16: WiMAX: downlink, uplink scheduling

r Transmission frame
m down-link subframe: base station to node
m uplink subframe: node to base station

… …
pream.

DL- UL- DL DL DL Initial request


SS #1 SS #2 SS #k
MAP MAP burst 1 burst 2 burst n maint. conn.
… …
downlink subframe uplink subframe

base station tells nodes who will get to receive (DL map)
and who will get to send (UL map), and when

r WiMAX standard provide mechanism for


scheduling, but not scheduling algorithm
6: Wireless and Mobile Networks 6-36
Module 4: Build a Home
Network
Networking Basics (BNET)
Module Objectives

Module Title: Build a Home Network


Module Objective: Configure an integrated wireless router and wireless client to connect securely to the
internet.

Topic Title Topic Objective

Home Network Basics Describe the components required to build a home network.
Network Technologies in the
Describe wired and wireless network technologies.
Home
Wireless Standards Describe Wi-Fi.

Set Up a Home Router Configure wireless devices for secure communications.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
4.1 Home Network Basics

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Home Network Basics
Components of a Home Network

• In addition to an integrated router, there are many


Home Wireless Local Area Network (WLAN)
different types of devices that might be
connecting to a home network, as shown in the
figure.
• Here are a few examples:
• Desktop computers
• Gaming systems
• Smart TV systems
• Printers
• Scanners
• Security cameras
• Telephones
• Climate control devices
• As the new technologies come on the market,
more and more household functions will rely on
the network to provide connectivity and control.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Home Network Basics
Typical Home Network Routers

• Small business and home routers typically have two primary types of
ports:
• Ethernet Ports: They connect to the internal switch portion of
the router and are usually labeled “Ethernet” or “LAN”. All
devices connected to the switch ports are on the same local
network.
• Internet Port: It is used to connect the device to another
network. It connects the router to a different network than the
Ethernet ports. It is often used to connect to the cable or DSL
modem to access the internet.
• Many home routers also include a radio antenna and a built-in wireless access point.
• By default, the wireless devices are on the same local network as the devices physically plugged into
the LAN switch ports.
• The internet port is the only port that is on a different network in the default configuration.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
4.2 Network Technologies in
the Home

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Network Technologies in the Home
LAN Wireless Frequencies

• The wireless technologies most frequently used in home networks are in the unlicensed 2.4 GHz
and 5 GHz frequency ranges.
• Bluetooth is a technology that makes use of the 2.4 GHz band.
• It is limited to low-speed, short-range communications, but has the advantage of communicating
with many devices at the same time.
• This one-to-many communication has made Bluetooth technology the preferred method for
connecting computer peripherals such as wireless mice, keyboards, and printers.
• Bluetooth is a good method for transmitting audio to speakers or headphones.
• Other technologies that use the 2.4 GHz and 5 GHz bands are the modern wireless LAN
technologies that conform to the various IEEE 802.11 standards.
• Unlike Bluetooth technology, 802.11 devices transmit at a much higher power level giving them a
great range and improved throughput.
• Certain areas of the electromagnetic spectrum can be used without a permit.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Network Technologies in the Home
LAN Wireless Frequencies (Cont.)

The figure shows where wireless technologies exist on the electromagnetic spectrum.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Network Technologies in the Home
Wired Network Technologies

• Although many home network devices support wireless communications, there are still a few
applications where devices benefit from a wired switch connection that is not shared with other
users on the network.
• The most implemented wired protocol is the Ethernet protocol.
• Ethernet uses a suite of protocols that allow network devices to communicate over a wired LAN
connection.
• An Ethernet LAN can connect devices using many different types of wiring media.
• Directly connected devices use an Ethernet patch cable, usually unshielded twisted pair.
• These cables can be purchased with the RJ-45 connectors already installed, and they come in
various lengths.
• Recently constructed homes may have Ethernet jacks already wired in the walls of the home.
• For those homes that do not have UTP wiring, there are other technologies, such as powerline,
that can distribute wired connectivity throughout the premises.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Network Technologies in the Home
Wired Network Technologies (Cont.)

Wired technologies include:

Category 5e Cable It is the most common wiring used in a LAN. The cable is made up of 4 pairs of wires
that are twisted to reduce electrical interference.
Coaxial Cable It has an inner wire surrounded by a tubular insulating layer that is then surrounded by a
tubular conducting shield. Most coax cables also have an external insulating sheath or
jacket.
Fiber-optic Cable It can be either glass or plastic with a diameter about the same as a human hair and can
carry digital information at very high speeds over long distances. Fiber-optic cables
have a very high bandwidth, which enables them to carry very large amounts of data.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
4.3 Wireless Standards

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Wireless Standards
Wi-Fi Networks
• Standards specify the RF spectrum used, data rates, how the information is transmitted, and
more.
• The main organization responsible for the creation of wireless technical standards is the IEEE.
• The IEEE 802.11 standard governs the WLAN environment.
• There are amendments to the IEEE 802.11 standard that describe characteristics for different
standards of wireless communications.
• Wireless standards for LANs use the 2.4 GHz and 5 GHz frequency bands.
• Collectively these technologies are referred to as Wi-Fi.
• Another organization, the Wi-Fi Alliance, is responsible for testing wireless LAN devices from
different manufacturers.
• The Wi-Fi logo on a device means that this equipment meets standards and should operate with
other devices that use the same standard.
• Wireless standards are constantly improving the connectivity and speed of Wi-Fi networks.
• It is important to be aware of new standards as they are introduced because manufacturers
of wireless devices will implement these standards quickly in their new products.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Wireless Standards
Wireless Settings
The Packet Tracer Basic Wireless Settings interface is shown in the figure.
• Wireless routers using the 802.11 standards have multiple
settings to be configured, including:
• Network Mode: The type of technology that must be
supported (802.11b, 802.11g, 802.11n or Mixed Mode).
• Network Name (SSID): Identifies the WLAN. All
devices that wish to participate in the WLAN must have
the same service set identifier (SSID).
• Standard Channel: Specifies the channel over which
communication will occur. By default, this is set
to Auto to allow the AP to determine the optimum
channel to use.
• SSID Broadcast: Determines if the SSID will be
broadcast to all devices within range. By default, it's set
to Enabled.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Wireless Standards
Wireless Settings (Cont.)

Network Mode:

• The 802.11 protocol can provide increased throughput based on the wireless network
environment.
• If all wireless devices connect with the same 802.11 standard, maximum speeds can be
obtained for that standard.
• If the access point is configured to accept only one 802.11 standard, devices that do not use
that standard cannot connect to the access point.
• A mixed mode wireless network environment can include devices that use any of the existing
Wi-Fi standards.
• This environment provides easy access for older devices that need a wireless connection but
do not support the latest standards.
• When building a wireless network, it is important that the wireless components connect to the
appropriate WLAN. This is done using the SSID.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Wireless Standards
Wireless Settings (Cont.)
• The SSID is a case-sensitive, alphanumeric string that contains up to 32 characters.
• It is sent in the header of all frames transmitted over the WLAN.
• It is used to tell wireless devices (STAs), which WLAN they belong to and with which other
devices they can communicate.

• We use the SSID to identify a specific wireless network that is essentially the name of the network.

• Wireless routers usually broadcast their configured SSIDs by default.

• The SSID broadcast allows other devices and wireless clients to automatically discover the name
of the wireless network.

• When the SSID broadcast is disabled, you must manually enter the SSID on wireless devices.
• Disabling SSID broadcasting can make it more difficult for legitimate clients to find the
wireless network.
• Simply turning off the SSID broadcast is not sufficient to prevent unauthorized clients from
connecting to the wireless network.
• All wireless networks should use the strongest available encryption to restrict unauthorized
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
access.
4.4 Set Up a Home Router

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Set Up a Home Router
First Time Setup
• Many wireless routers designed for home use have an automatic setup utility that can be used to
configure the basic settings on the router.
• These utilities usually require a PC or laptop to be connected to a wired port on the router.

• If no device is available that has a wired connection, it may be necessary to configure the wireless client
software on the laptop or tablet first.

• To connect to the router using a wired connection:


• Plug an Ethernet patch cable into the network port on the computer.
• Plug the other end into a LAN port on the router.
• Do not plug the cable into the port or interface that is labeled “Internet” as it will connect to the DSL
or cable modem.

• Some home routers may have a built-in modem for internet connections.
• If so, verify that the type of connection is correct for your internet service.

• A cable modem connection will have a coaxial terminal to accept a BNC-type connector.

• A DSL connection will have a port for a telephone-type cable, usually an RJ-11 connector.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Set Up a Home Router
First Time Setup (Cont.)

• After confirming that the computer is connected to the network router and the link lights on the
NIC indicate a working connection, the computer needs an IP address.

• Most network routers are set up so that the computer receives an IP address automatically from a
local DHCP server automatically configured on the wireless router.

• If the computer does not have an IP address:


• Check the router documentation.
• Configure the PC or tablet with a unique IP address, subnet mask, default gateway, and DNS
information.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Set Up a Home Router
Design Considerations

• Before entering the configuration utility, or manually configuring the router through a web browser,
you should consider how your network will be used.

• You do not want to configure the router and have that configuration limit what you are able to do on
the network, nor do you want to leave your network unprotected.

• If SSID broadcasting is on, the SSID name will be seen by all wireless clients within your
signal range.
• Many times, the SSID gives away too much information about the network to unknown
What should my
client devices.
network be called?
• It is not a good practice to include the device model or brand name as part of the SSID.
• Wireless devices have default settings that are easy to find on the internet, as well as
known security weaknesses.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Set Up a Home Router
Design Considerations (Cont.)

• Wireless devices contain radio transmitter/receivers that function within a specific


frequency range.
• If a device only has the necessary radio for 802.11 b/g, it will not connect if the wireless
router or access point is configured to only accept 802.11n or 802.11ac standards.
What types of
• If all devices support the same standard, the network will work at its optimum speed.
devices will attach to
• If you have devices that do not support the n or ac standards, then you will have to enable
my network?
legacy mode.
• A legacy mode wireless network environment varies between router models.
• This environment provides easy access for legacy devices that need a wireless
connection.
• The decision regarding who can access your home network should be determined by how
you plan to use the network.
How Do I Add New
• On some wireless routers, it is possible to set up guest access.
Devices?
• This is a special SSID coverage area that allows open access but restricts that access to
using the internet only.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Set Up a Home Router
Design Considerations (Cont.)

• The figure shows a wireless


setup screen.

• Some wireless routers may


label legacy mode as mixed
mode.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Set Up a Home Router
Packet Tracer - Configure a Wireless Router and Client

In this Packet Tracer activity, you will complete the following objectives:
• Part 1: Connect the devices.
• Part 2: Configure the wireless router.
• Part 3: Configure IP addressing and test connectivity.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
4.5 Build a Home Network
Summary

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Build a Home Network Summary
What Did I Learn in this Module?
• Most home networks consist of at least two separate networks with the public network coming in from the service
provider.
• The router is connected to the internet and is most likely equipped with both wired and wireless capabilities.
• A home network is a small LAN with devices that usually connect to an integrated router and to each other to
exchange information.
• Other types of devices that might be connecting to a home network include desktop computers, gaming systems,
smart tv systems, printers, scanners, security cameras, and climate control devices.
• Port types for small business and home routers include ethernet ports and internet ports.
• Many home routers include wired ports, a radio antenna, and a built-in wireless access point.
• Wireless technologies use electromagnetic waves to carry information between devices and most frequently use the
unlicensed 2.4 GHz and 5 GHz frequency ranges in home networks.
• Bluetooth uses the 2.4 GHz band.
• Other technologies that use the 2.4 GHz and 5 GHz bands are modern wireless LAN technologies that conform to
the various IEEE 802.11 standards.
• 802.11 devices transmit at a much higher power level than Bluetooth technology, giving them a great range and
improved throughput.
• Directly connected devices use an Ethernet patch cable, usually unshielded twisted pair.
• Category 5e, the most common wiring used in a LAN, is made up of 4 pairs of wires that are twisted to reduce
electrical interference.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Build a Home Network Summary
What Did I Learn in this Module? (Cont.)
• The IEEE 802.11 standard governs the WLAN environment and Wireless standards for LANs use the 2.4 GHz and
5 GHz frequency bands and are collectively referred to as Wi-Fi.
• Wireless routers using the 802.11 standards have multiple settings to be configured such as network mode,
network name (SSID), standard channel, and SSID broadcast.
• When building a wireless network, it is important that the wireless components connect to the appropriate WLAN
using the SSID.
• The SSID broadcast allows other devices and wireless clients to automatically discover the name of the wireless
network, but if disabled, it must be manually entered on wireless devices.
• Many wireless routers designed for home use have an automatic setup utility that can be used to configure the
basic settings on the router.
• Most network routers are set up so that the computer receives an IP address automatically from a local DHCP
server automatically configured on the wireless router.
• It is not good practice to include the device model or brand name as part of the SSID as internet searches can
expose security weaknesses.
• Who can access your home network should be determined by how you plan to use the network.
• Many routers support MAC address filtering enabling you to specifically identify who is allowed on the wireless
network.
• Guest access on wireless routers is a special SSID coverage area that allows open access but restricts that access
to using the internet only.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33

You might also like