ECDCOM30 Reviewer
ECDCOM30 Reviewer
- The network is composed of client and servers - The Open Systems Interconnection (OSI)
o Servers provide resources o A conceptual framework showing us
o Client receives resources how data moves throughout a
- Servers provide centralized control over network. Developed by the
network resources (files, printers, etc.) International Organization for
- Centralizes user accounts, security, and access Standardization (ISO) in 1977.
controls to simplify network administration - Its purpose is to give us a guide to
- More difficult to setup and requires an IT understanding how networks operate.
administrator - It’s only a reference model, so don’t get
wrapped up in the details.
Why Build a Computer Network?
o Wasn’t implemented in the real
- Before computer networks, people sent and world, TCP/IP is.
received information by hand, using the postal
The OSI Model Stack
service. This is slow and can be unreliable.
- Computer networks enable faster, more - The OSI Model breaks down the complex task
efficient modes of communication. (i.e., email, of computer-to-computer network
video conferencing, etc.) communications into seven layers.
- Computer networks and the sharing of - Upper Layers (Host Layers)
electronic data encourage the use of standard o Handled by the host computer and
policies and procedures. performs application-specific
- Computer networks provide backup and functions, such as data formatting,
recovery support for our data. (i.e., encryption, and connection
redundancy) management.
- Computer networks lead to cost savings - Lower Layers (Media Layers)
o Provide network-specific functions,
Introduction to Computer Networking Protocols
such as routing, addressing, and flow
- Computers communicate with each other control.
with network protocols.
The OSI Model Visualized
- Protocols are rules governing how machines
exchange data and enable effective
communication.
- Some Everyday Examples
o When you call somebody, you pick up
the phone, ensure there is a dial tone,
and if there is, you dial the number.
o When you drive your car, you obey
the rules of the road.
Protocols Continued
IP Addresses
Unicast (One-to-One)
Multicast (One-to-Many)
LESSON 2: ETHERNET
Ring Topology
- Peer-to-peer (P2P) wireless network where no - Used to connect devices together within a
wireless access point (WAP) infrastructure network.
exits. - Used in early networks; replaced by Switches
- The devices communicate directly with one - “Multi-Port Repeater”
another. o Traffic goes in one port and is
- Personal area networks (PANs) are a common repeated (broadcasted) out every
- Example of Ad hoc other port
o Wireless networks o OSI Layer 1 Device
o Dumb Network Device
Infrastructure
o Causes increased network collision
- Wireless network that uses a wireless access errors
point (WAP) as its central connecting device. - Much less efficient than a Switch.
- Infrastructure wireless networks (WLANs) are - Legacy Equipment no longer used.
commonly used in homes and small offices.
Switches
Mesh
- Connects devices together just like a Hub
- Just like a wired mesh design, wireless mesh - Intelligent Network Device (OSI Layer 2)
networks utilize several wireless access points memorizes the MAC Address of each device
(nodes) to create a robust wireless network connected to it via a MAC Address Table,
that is: sometimes called a Content Addressable
o Scalable Self – Healing Memory (CAM) Table.
o Reliable (Redundancy) - Pays attention to Source and Destination MAC
- Common in larger homes and businesses Addresses during communication process.
- Use Application-Specific Integrated Circuitry
(ASIC), which makes them extremely fast.
- Breaks up collision domains.
- Traffic goes in one port and is repeated out to
only destination port.
- Designed for high bandwidth.
- Standard in today’s Network Infrastructure.
Routers
Modems (Modulator/Demodulators)
DHCP Server
RJ-11
DB-9