0% found this document useful (0 votes)
383 views

Module 1 - Introduction To Networking Presentation

This document provides an overview of the objectives and content covered in Module 1 of the Jimma University Cisco Networking Academy. The 3-sentence summary is: Module 1 introduces students to the physical, logical, and application requirements for internet connection, including networking components like network interface cards (NICs) and modems, protocols like TCP/IP, and applications like web browsers; it also covers basic networking concepts such as binary number systems, IP addressing using subnet masks, and using ping to test connectivity. The module is divided into two learning objectives covering connecting to the internet and network math concepts.

Uploaded by

sfnjhnmnj
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
383 views

Module 1 - Introduction To Networking Presentation

This document provides an overview of the objectives and content covered in Module 1 of the Jimma University Cisco Networking Academy. The 3-sentence summary is: Module 1 introduces students to the physical, logical, and application requirements for internet connection, including networking components like network interface cards (NICs) and modems, protocols like TCP/IP, and applications like web browsers; it also covers basic networking concepts such as binary number systems, IP addressing using subnet masks, and using ping to test connectivity. The module is divided into two learning objectives covering connecting to the internet and network math concepts.

Uploaded by

sfnjhnmnj
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 25

Jimma University Cisco

Networking Academy

Module 1
Introduction to Networking
Module Objectives
• At the end of this module students are expected
to:
– Identify the physical connections needed for a
computer to connect to the Internet
– Recognize the components of a computer system
– Install and troubleshoot NICs and modems
– Configure the set of protocols needed for Internet
connection
– Use basic procedures to test an Internet connection
• This Module is organized into 2 Learning
Objectives
– Connecting to the Internet
– Network Math
Requirements for Internet
Connection
• Internet is the largest data network. It is, in
fact, a collection of large and small
networks
• Connection to the Internet can be broken
down into
– the physical connection
– the logical connection and
– applications
Requirements…
• Physical Connection
– Connecting an adapter card such as a Network Interface Card
(NIC) or a modem from a PC to a Network
• Logical Connection
– uses standards called protocols
– A protocol is a formal description of a set of rules and
conventions that govern how devices on a network
communicate.
– The Transmission Control Protocol/Internet Protocol (TCP/IP)
suite is the primary set of protocols used on the Internet.
• Application
– Applications work with protocols to send and receive data across
the Internet.
• Web Browsers (IE, Opera, …)
• FTP
PC Basics
• Computers are important building blocks
in a network
• Many networking devices are special
purpose computers, with many of the
same components as general purpose
PCs.
• You should know the basic components of
a network
Network Interface Card
• A NIC, or LAN adapter, provides network
communication capabilities to and from a PC.
• On desktop computer systems, it is a printed
circuit board that resides in a slot on the
motherboard and provides an interface
connection to the network media.
• On laptop computer systems, it is commonly
integrated into the laptop or available on a small,
credit card-sized PCMCIA card.
– PCMCIA stands for Personal Computer Memory Card
International Association.
NIC
NIC…
• These considerations are important in the
selection of a NIC:
– Protocols – Ethernet, Token Ring, or FDDI
– Types of media – Twisted-pair, coaxial,
wireless, or fiber-optic
– Type of system bus – PCI or ISA
NIC and Modem Installation
• Modem – Modulator/Demodulator
– Used to convert data from digital to analog and vice versa
– Modems could be internal or external
– For dialup networking we use modems
• NICs must be installed before a PC can communicate
with other PCs on a network
• Situations that require NIC installation include the
following:
– Installation of a NIC on a PC that does not already have one
– Replacement of a malfunctioning or damaged NIC
– Upgrade from a 10-Mbps NIC to a 10/100/1000-Mbps NIC
– Change to a different type of NIC, such as wireless
– Installation of a secondary, or backup, NIC for network security
reasons
High-speed and Dialup connection
TCP/IP
Testing Connectivity using Ping
• Ping is a basic program that verifies a particular IP address exists and
can accept requests.
• The ping command works by sending special Internet Protocol (IP)
packets, called Internet Control Message Protocol (ICMP) Echo Request
datagrams, to a specified destination.
– ping 127.0.0.1 – This is a unique ping and is called an internal
loopback test. It is used to verify the TCP/IP network
configuration.
– ping IP address of host computer – A ping to a host PC verifies
the TCP/IP address configuration for the local host and
connectivity to the host.
– ping default-gateway IP address – A ping to the default gateway
indicates if the router that connects the local network to other
networks can be reached.
– ping remote destination IP address – A ping to a remote
destination verifies connectivity to a remote host.
Ping…
Network Math
• Computers work with and store data using electronic
switches that are either ON or OFF (0 and 1)
• American Standard Code for Information Interchange
(ASCII) is the code that is most commonly used to
represent alpha-numeric data in a computer.
Bits and Bytes
Base 10 Number System
Base 2 Number system
Converting decimal numbers to
8-bit binary numbers
Four-octet dotted decimal representation of
32-bit binary numbers
• Currently, addresses assigned to computers on the
Internet are 32-bit binary numbers.
• To make it easier to work with these addresses, the 32-
bit binary number is broken into a series of decimal
numbers.
Hexadecimal Number System
• Base 16 . There are 16 different symbols
0 – 9, A, B, C, D, E, F
• Usually Hexadecimal numbers are
preceded by 0x
– Hex number 5A is usually written as 0x5A
Boolean or Binary Logic
Boolean…
Boolean…
IP addresses and network masks
• The IP address of a computer consists of a network and
a host part.
• To inform a computer how the 32-bit IP address has
been split, a second 32-bit number called a subnetwork
mask is used.
• This mask indicates how many of the bits are used to
identify the network of the computer.
• subnet mask will always be all 1s until the network
address is identified and then it will be all 0s to the end of
the mask.
• A Boolean AND of the IP address 10.34.23.134 and the
subnet mask 255.0.0.0 produces the network address of
this host: 10.0.0.0

You might also like