Chapter 8:          Networks  IT Essentials: PC Hardware and Software v4.0ITE PC v4.0Chapter 8                    © 2007 C...
After completing this chapter, you will meet          these learning outcomes:           Explain the principles of networ...
Introduction           Chapter 8 is an overview of network principles,            standards, and purposes           It c...
Principles of Networking           Networks are systems that are formed by links.           People use different types o...
Computer Networks           Network devices include:              Desktop and laptop computers              Printers and ...
Benefits of Networking                                                 Fewer peripherals                                 ...
ADVANTAGES & DISADVANTAGE OF                         NETWORKING                NETWORKING AKTIVITY                        ...
ADVANTAGES & DISADVANTAGE OF NETWORKING                NETWORKING AKTIVITY                                          CON   ...
Types Of NetworksITE PC v4.0Chapter 8             © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   9
Types of Networks          A computer network is identified by:           The type of media used to connect the devices  ...
Local Area Network (LAN)                              A group of interconnected                               computers t...
Wide Area Network (WAN)           A WAN connects LANs in geographically separated            locations.           A WAN ...
Wireless LAN (WLAN)               Wireless devices are used to transmit and receive                data using radio waves...
Peer-to-Peer Networking          Share files, send messages, and print to a shared printer.          Each computer has s...
Disadvantages of Peer-to-Peer           Without centralized network administration, it is difficult            to determi...
Client/Server Network          Client/server network model provides security and           control for the network.      ...
Summary                          TYPES OF NETWORK          1. This type of network uses access points and          wireles...
TYPES OF NETWORK             This type of network uses access points and wireless NIC for connectivity               WLAN...
Networking Concepts and Technologies           A computer technician is required to configure and            troubleshoot...
Bandwidth           amount of data that can            be transmitted within a            fixed time period           me...
Three Modes of Transmission          Data is transmitted in one of three modes:             Simplex (Unidirectional trans...
IP Address           An IP address is a unique number that is used to identify a            network device.           An...
IP Address Classes           Class A              Large networks, implemented by large companies and some              co...
Subnet Masks           Used to indicate the network portion of an IP address           Is a dotted decimal number       ...
GAMES              N           S       T               E           B   U                         A                K       ...
Summary       The Internet is an example of which type of network?              A. LAN              B. SAN              C...
 What is the suggested maximum number of PCs in a peer-to-        peer network?              A. 10              B. 25    ...
 Which method of data transfer allows information to be        sent and receive at the same time?              A. full du...
 Which dotted decimal number is used to distinguish the        network portion of an IP address from the host portion?   ...
IP Address Configuration           Manual configuration              Manually configure each device with the proper IP ad...
Dynamic Host Configuration Protocol          (DHCP)                              DHCP automatically                      ...
DHCP Process and Advantages          DHCP process:          2. DHCP server receives a request from a host.          3. Ser...
Configure Host to Use DHCP          Configure the host to "Obtain an IP address automatically"           in the TCP/IP pro...
Internet Protocols           A protocol is a set of rules.           Internet protocols are sets of rules governing comm...
Common Network Protocols          Protocols used for browsing the web, sending and receiving           e-mail, and transfe...
Internet Control Message Protocol (ICMP)           Internet Control Message Protocol (ICMP) is used by            devices...
Ping Command Switches          These command line switches (options) can be used           with the ping command.ITE PC v4...
Output of the Ping Command           Four ICMP echo requests (pings) are sent to the            destination computer to d...
Physical Network Components         Network devices:              Computers              Hubs              Switches      ...
Hubs           Extend the range of a signal by receiving then            regenerating it and sending it out all other por...
Bridges and Switches           A packet, along with its MAC address information, is            called a frame.          ...
Routers           Routers are devices that connect entire networks to            each other.              Use IP addresse...
Wireless Access Points                             Provide network access to                              wireless device...
Multipurpose Devices           Perform more than one function.           More convenient to purchase and            conf...
Twisted-Pair Cabling           A pair of twisted wires forms a circuit that transmits data.           The twisted wires ...
Two Basic Types of Twisted-Pair          Cables           Unshielded twisted-pair (UTP)              Has two or four pair...
Category Rating           UTP comes in several categories that are based on two            factors:              The numb...
Coaxial Cable           A copper-cored network cable surrounded by a heavy            shielding           Types of coaxi...
Fiber-Optic Cable                      A glass or plastic strand that transmits                       information using l...
Two Types of LAN Topologies                            Physical topology is the                             physical layou...
LAN Physical Topologies         A physical topology defines the way in which computers,           printers, and other     ...
Bus Topology           Each computer connects            to a common cable           Cable connects one            compu...
Ring Topology          Hosts are connected in a physical ring or circle.          The ring has no beginning or end, so t...
Star Topology           Has a central connection point:            a hub, switch, or router           Hosts connect dire...
Hierarchical or Extended Star Topology           A star network with an additional networking device            connected...
Mesh Topology           Connects all devices to each other           Failure of any cable will not affect the network   ...
Logical Topologies          The two most common types of logical topologies are           broadcast and token passing.    ...
Summary       Which network component that extend the range of a        signal by receiving then regenerating it and send...
 Which cable type is a common choice for use on Ethernet        networks?              A. thick coax              B. thin...
• Which cable has signals clearer, can go farther, and have        greater bandwidth than with copper cable              A...
 Gives 5 types of LAN physical topologiesITE PC v4.0Chapter 8                          © 2007 Cisco Systems, Inc. All rig...
LAN Architecture           Is the overall structure of a computer or communication            system.           Designed...
Ethernet           Based on the IEEE 802.3 standard, which specifies            that a network use the Carrier Sense Mult...
Token Ring          Reliable network architecture          Originally developed by IBM          Based on the token-pass...
Fiber Distributed Data Interface (FDDI)           A type of Token Ring network           Often used for LANs, connecting...
Standards Organizations                       Name                           Type                                  Standar...
Summary      • LAN architectures is the overall structure of a computer or        communication system              A. Tru...
 Which LAN architectures used with smaller computers and        mainframes              A. Ethernet              B. Token...
“Standards for the computer and electronics industry”      This standard refer to:              A. IEEE              B. IS...
Ethernet Standards              Ethernet protocols describe the rules that control how               communication occurs ...
Cabled Ethernet Standards          IEEE 802.3 Ethernet standard specifies that a network implement           the CSMA/CD ...
10BASE-T         10BASE-T is an Ethernet technology that uses a star topology.              The ten (10) represents a spe...
100BASE-TX “FastEthernet”          Has a theoretical bandwidth of 100 Mbps.          The "X" indicates different types o...
1000BASE-TX “Gigabit Ethernet”           Advantages of 1000BASE-T:              1 Gbps is ten times faster than Fast Ethe...
Wireless Ethernet Standards           IEEE 802.11 is the standard that specifies connectivity            for wireless net...
IEEE 802.11a WLAN Standard               Allows data rates as high as 54 Mbps               Devices operate in the 5 GHz...
IEEE 802.11b WLAN Standard           Operates in the 2.4 GHz frequency range           Maximum theoretical data rate of ...
IEEE 802.11g and 802.11n          802.11g              Allows data rates as high as 54 Mbps              Operates in the ...
Wireless Ethernet Standards                    Bandwidth       Frequency                Range                             ...
OSI and TCP/IP Data Models           Architectural model              Separates functions of protocols into manageable la...
The TCP/IP Reference Model          Frame of reference used to develop the Internets protocols          Consists of laye...
The OSI Model          The OSI model is an industry standard framework that is           used to divide network communica...
The OSI Model                     Layer                                   Description     Application       7     Responsi...
Compare OSI and TCP/IP ModelsITE PC v4.0Chapter 8                  © 2007 Cisco Systems, Inc. All rights reserved.   Cisco...
Configuring a NIC and a Modem           Install the NIC and the driver.                                                  ...
Install or Update a NIC Driver           Manufacturers publish new driver software for NICs              May enhance the ...
Install or Update a NIC Driver                              Alternatively, you can click the                             ...
Attach Computer to Existing Network           Plug a network cable into the            network port on the computer.     ...
Configure the NIC           The computer will now need an IP address.              If the computer does not acquire an IP...
What is the Assigned IP Address?          If you do not know your IP address yet, use the ipconfig             program, to...
Test Connectivity Using Ping           Ping your own IP address to make sure your NIC is            working properly.    ...
Modem Installation          A modem is an electronic device that transfers data           between one computer and anothe...
Dial-up Networking (DUN)           When computers use the public telephone system to            communicate, it is called...
AT Commands               AT (“Attention”) Commands - commands for modems                            Function            ...
Other Types of Connectivity           Phone, cable, satellite, and private telecommunications            companies provid...
Integrated Services Digital Network (ISDN)           A standard for sending voice, video, and data over telephone        ...
ISDN Types              Type   Description                     ISDN Basic Rate Interface offers a dedicated 128 Kbps      ...
Digital Subscriber Line (DSL)               An "always-on" technology; there is no need to dial up                each ti...
DSL Types        Type    Description                Asymmetric DSL is most common. Downstream speed from       ADSL     38...
Power Line Communication (PLC)           Uses power distribution wires (local electric grid) to            send and recei...
Broadband Connectivity           Broadband is a technique used to transmit and receive            multiple signals using ...
Cable Modem               A cable modem connects your computer to the cable                company using the same coaxial...
DSL Modem and Filter           Voice and data signals are carried            on different frequencies on the            c...
A Typical ISDN Connection               ISDN uses multiple channels and can carry voice,                video, and data; ...
Broadband Satellite                        Uses a satellite dish for two-way                         communication.      ...
Voice over IP (VoIP)           Is a method used to carry telephone calls over data            networks and the Internet. ...
Voice over IP (VoIP)ITE PC v4.0Chapter 8                        © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Pu...
Chapter 8 Summary           The fundamentals of networking           The benefits of a network           The ways to co...
Additional Resources           Telecommunication Standardization Sector of the International            Telecommunication...
Q and AITE PC v4.0Chapter 8           © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   110
ITE PC v4.0Chapter 8     © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   111
Upcoming SlideShare
Loading in...5
×

Ite pc v40_chapter8

421

Published on

PC HARDWARE AND SOFTWARE

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
421
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
25
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Cisco Networking Academy Program IT Essentials: PC Hardware and Software v4.0 Chapter 8: Networks
  • Slide 3 - Chapter 8 Objectives The purpose of this chapter is to provide an overview of network principles, standards, and purposes. After completing this chapter, students will meet these objectives: Explain the principles of networking Describe types of networks Describe basic networking concepts and technologies Describe the physical components of a network Describe LAN topologies and architectures Identify standards organizations Identify Ethernet standards Explain OSI and TCP/IP data models Describe how to configure a NIC and a modem Identify names, purposes, and characteristics of other technologies used to establish connectivity Identify and apply common preventive maintenance techniques used for networks Troubleshoot a network
  • Slide 5 - Introduction 8.0 Chapter Introduction The following types of networks will be discussed in this chapter: Local Area Network (LAN) Wide Area Network (WAN) Wireless LAN (WLAN) The different types of network topologies, protocols, and logical models and the hardware needed to create a network will also be discussed in this chapter. Configuration, troubleshooting, and preventive maintenance will be covered. You will also learn about network software, communication methods, and hardware relationships.
  • Slide 6 - Principles of Networking 8.1 Explain the principles of networking Networks are systems that are formed by links. Websites that allow individuals to link to each other’s pages are called social networking sites. A set of related ideas can be called a conceptual network. The connections you have with all your friends can be called your personal network. People use networks everyday. Examples of networks are a mail delivery system, a telephone system, a public transportation system, a corporate computer network, and the Internet. Computers can be linked by networks to share data and resources. A network can be as simple as two computers connected by a single cable or as complex as hundreds of computers connected to devices that control the flow of information. Converged data networks can include general purpose computers, such as PCs and servers, as well as devices with more specific functions, including printers, phones, televisions, and game consoles. All data, voice, video, and converged networks share information and use various methods to direct how this information flows. The information on the network goes from one place to another, sometimes via different paths, to arrive at the appropriate destination. The public transportation system is similar to a data network. The cars, trucks, and other vehicles are like the messages that travel within the network. Each driver defines a starting point (source) and an ending point (destination). Within this system, there are rules such as stop signs and traffic lights that control the flow from the source to the destination. After completing this section, students will meet these objectives: Define computer networks Explain the benefits of networking Teaching Strategy: The mail system allows messages to travel between any place that can be reached. The telephone system allows worldwide voice, fax, and Internet connections. Public transportation moves people and packages from source to destination. Each of these has a way of getting into and out of the network and a means of directing traffic. It is much the same with computer networks.
  • Slide 7 – Computer Networks 8.1.1 Define computer networks A computer data network is a collection of hosts connected by networking devices. A host is any device that sends and receives information on the network. Peripherals are devices that are connected to hosts. Some devices can serve either as hosts or peripherals. Computer networks are used globally in businesses, homes, schools, and government agencies. Many of the networks are connected to each other through the Internet. Network devices include: Desktop and laptop computers Printers and scanners PDAs and Smartphones File and print servers Resources shared across networks include: Services, such as printing or scanning Storage space on removable devices, such as hard drives or optical drives Applications, such as databases Network uses include: Access information stored on other computers Print documents using shared printers Synchronize the calendar between your computer and your smart phone Different types of network media: Copper cabling uses electrical signals to transmit data between devices Fiber-optic cabling uses glass or plastic wire, also called fiber, to carry information as light pulses Wireless connection uses radio signals, infrared technology (laser), or satellite transmissions
  • Slide 8 - Benefits of Networking 8.1.2 Explain the benefits of networks The benefits of networking computers and other devices include lower costs and increased productivity. With networks, resources can be shared, which results in less duplication and corruption of data. Fewer peripherals needed – Printers, scanners, and backup devices can be shared among the network users. Increased communication capabilities - Collaboration tools facilitate communicate between users; Examples: e-mail, forums and chats, voice and video, and instant messaging Avoid file duplication and corruption - Servers store data and share it with network users. Confidential or sensitive data can be protected and shared with the users who have permission to access that data. Document tracking software can be used to prevent users from changing files that others are accessing at the same time. Lower cost licensing – The site license allows a group of people or an entire organization to use the application for a single fee. Centralized administration - Fewer people needed to manage the network. Lower cost to the company. Easier data backup to a central location. Conserve resources - Data processing is distributed across many computers to prevent overloading one computer with processing tasks. Student Activity: The student course content includes a matching activity, 8.1.2 Advantages and Disadvantages of Networking. To complete this activity, students will identify each phrase as an advantage or a disadvantage.
  • Slide 9 - Types of Networks 8.2 Describe types of networks Data networks continue to evolve in complexity, use, and design. To communicate about networks, different types of networks are given different descriptive names. A computer network is identified by the following specific characteristics: The type of media used to connect the devices The type of networking devices used How the resources are managed How the network is organized How the data is stored The area it serves After completing this section, students will meet these objectives: Describe a LAN Describe a WAN Describe a WLAN Explain peer-to-peer networks Explain client/server networks
  • Slide 10 – Local Area Network (LAN) 8.2.1 Describe a LAN Local Area Network (LAN) refers to a group of interconnected computers that is under the same administrative control. In the past, LANs were considered to be small networks that existed in a single physical location. Although LANs can be as small as a single local network installed in a home or small office, over time, the definition of LANs has evolved to include interconnected local networks consisting of many hundreds of hosts, installed in multiple buildings and locations. All the local networks within a LAN are under one administrative control group that governs the security and access control policies that are in force on the network. In this context, the word “Local” in Local Area Network refers to local consistent control rather than being physically close to each other. Devices in a LAN may be physically close, but it is not a requirement.
  • Slide 11 – Wide Area Network (WAN) 8.2.2 Describe a WAN Wide Area Networks (WANs) are networks that connect LANs in geographically separated locations. A WAN covers a much larger area than a LAN. The most common example of a WAN is the Internet. The Internet is a large WAN that is comprised of millions of interconnected LANs. All of these networks are connected together using WAN connections, such as a phone company, cable company, or Internet Service Provider (ISP). Telecommunications service providers (TSP) are used to interconnect these LANs at different locations.
  • Slide 12 – Wireless LAN (WLAN) 8.2.3 Describe a WLAN Traditionally, in a LAN, devices are connected together using copper cabling. In some environments, installing copper cabling may not be practical, desirable, or even possible. In these situations, wireless devices are used to transmit and receive data using radio waves. These networks are called wireless LANs, or WLANs. In a WLAN, wireless devices connect to access points within a specified area. Access points are typically connected to the network using copper cabling. WLAN coverage can be limited to the area of a room or can have greater range. As with LANs, you can share resources such as files and printers, and access the Internet on a WLAN. Student Activity: The student course content includes a matching activity, 8.2.3 Network Types. To complete this activity, students will match each description to its network type. Teaching Strategy: The physical cables that connect devices in a LAN can be replaced by radio waves. In this case, a LAN becomes a Wireless Local Area Network (WLAN). A hotspot is the area where wireless access is available around a wireless access point. Hotspots can overlap, causing them to interconnect.
  • Slide 13 – Peer-to-Peer Networking 8.2.4 Explain peer-to-peer networks In a peer-to-peer network, devices are connected directly to each other without any additional networking devices between them. Each device has equivalent capabilities and responsibilities. Individual users are responsible for their own resources and can decide which data and devices to share. There is no central point of control or administration in the network. Peer-to-peer networks work best in environments with ten or fewer computers. Teaching Strategy: In a peer-to-peer network, networked computers act as equal partners, or peers, to each other. Individual users control their own resources. They may decide to share certain files with other users and may require passwords before they allow others to access their resources. Since individual users make these decisions, there is no central point of control or administration in the network. In addition, individual users must back up their own systems to be able to recover from data loss in case of failures. Peer-to-peer networks are relatively easy to install and operate. No additional equipment is necessary beyond a suitable operating system in each computer. Since users control their own resources, no dedicated administrators are needed. A peer-to-peer network works well with ten or fewer computers.
  • Slide 14 – Disadvantages of Peer-to-Peer 8.2.4 Explain peer-to-peer networks Peer-to-peer networks have several disadvantages: There is no centralized network administration which makes it difficult to determine who controls resources on the network. There is no centralized security. Each computer must use separate security measures for data protection. The network becomes more complex and difficult to manage as the number of computers on the network increases. There may be no centralized data storage. Separate data backups must be maintained. This responsibility falls on the individual users. Peer-to-peer networks still exist inside larger networks today. Even on a large client network, users can still share resources directly with other users without using a network server. In your home, if you have more than one computer, you can set up a peer-to-peer network.
  • Slide 15 – Client Server Network 8.2.5 Explain client/server networks In a client/server model, the client requests information or services from the server. The server provides the requested information or service to the client. Servers on a client/server network commonly perform some of the processing work for client machines; for example, sorting through a database before delivering only the records requested by the client. In a client/server model, the servers are maintained by network administrators. Data backups and security measures are implemented by the network administrator. The network administrator also controls user access to the network resources. All of the data on the network is stored on a centralized file server. Shared printers on the network are managed by a centralized print server. Network users with the proper permissions can access both the data and shared printers. Each user must provide an authorized username and password to gain access to network resources that they are permitted to use. For data protection, an administrator performs a routine backup of all the files on the servers. If a computer crashes, or data is lost, the administrator can easily recover the data from a recent backup. Teaching Strategy: As networks grow larger, peer-to-peer relationships become increasingly difficult to coordinate. They do not scale well, since their efficiency decreases rapidly as the number of computers on the network increases. Since individual users control access to the resources on their computers, security may be difficult to maintain. Client/server networks address these limitations of the peer-to-peer arrangement.
  • Slide 16 - Networking Concepts and Technologies 8.3 Describe basic networking concepts and technologies As a computer technician, you will be required to configure and troubleshoot computers on a network. To effectively configure a computer on the network, you should understand IP addressing, protocols, and other network concepts. After completing this section, students will meet these objectives: Explain bandwidth and data transmission Describe IP addressing Define DHCP Define Internet protocols and applications Define ICMP Teaching Strategy: A computer technician needs to understand the type of network they are working on and how to configure a computer for that network. Networking concepts and technologies encompass the software, configuration methods, and protocols involved in the communication between devices.
  • Slide 17 - Bandwidth 8.3.1 Explain bandwidth and data transmission Data is sent in small chunks called packets. A packet has a header, containing the source and destination of the packet. A header has sequencing information so that the packets can be assembled at the destination. Bandwidth is the amount of data that can be transmitted within a fixed time period. Bandwidth is measured in bits per second and is usually denoted by the following: bps - bits per second Kbps - kilobits per second Mbps - megabits per second Bandwidth can be compared to highway traffic flow On a highway, cars represent the data. Number of lanes represents the number of cars that could travel on the highway at the same time. An eight-lane highway allows four times as many cars as a two-lane highway.
  • Slide 18 – Three Modes of Transmission 8.3.1 Explain bandwidth and data transmission Data is transmitted in one of three modes: Simplex (Unidirectional transmission) is a single, one-way transmission. Example: The signal sent from a TV station to your TV. Half-duplex allows data to flow in one direction at a time. Simultaneous transmission in two directions is not allowed. Example: Two-way radios, police or emergency mobile radios Full-duplex allows data to flow in both directions at the same time. Bandwidth is measured in only one direction. 100 Mbps full-duplex means a bandwidth of 100 Mbps in each direction. A telephone conversation is an example of full-duplex communication. Both people can talk at the same time, and can still hear each other. Broadband technologies, such as digital subscriber line (DSL) and cable, operate in full-duplex mode. Broadband allows multiple signals to travel on the same wire simultaneously. Full-duplex networking technology increases network performance because data can be sent and received at the same time. Example: With DSL, users can download data and talk on the telephone at the same time.
  • Slide 19 – IP Address 8.3.2 Describe IP addressing An IP address is a number that is used to identify a device on the network. Each device on a network has a unique IP address. A network device is referred to as a host or node. Each host must have an IP address within the same network to be able to communicate with each other. The IP address is similar to the mailing address of a person. It is known as a logical address because it is logically assigned based on the host location. The IP address, or network address, is based on the local network and is assigned to each host by a network administrator. This process is similar to the local government assigning a street address based on the logical description of the city or village and neighborhood. An IP address consists of a series of 32 binary bits (ones and zeros). The 32 bits are grouped into four 8-bit bytes called octets. Example: 10111110.01100100.00000101.00110110 An IP address is also represented in a dotted decimal format. Example: the binary IP address shown above is 190.100.5.54 When a host is configured with an IP address, it is entered as a dotted decimal number, such as 192.168.1.5. Imagine if you had to enter the 32-bit binary equivalent of this: 11000000101010000000000100000101. If just one bit were mistyped, the address would be different and the host may not be able to communicate on the network. Unique IP addresses on a network ensure that data can be sent to and received from the correct network device.
  • Slide 20 – IP Address Classes 8.3.2 Describe IP addressing The logical 32-bit IP address is hierarchical and is composed of two parts. The first part identifies the network and the second part identifies a host on that network. Both parts are required in an IP address. As an example, if a host has IP address 192.168.18.57, the first three octets, 192.168.18, identify the network portion of the address, and the last octet, 57 identifies the host. This is known as hierarchical addressing, because the network portion indicates the network on which each unique host address is located. Routers only need to know how to reach each network and not the location of each individual host. Class A - Large networks, implemented by large companies and some countries. First octet is from 1-127. 127.0.0.0 is a special network reserved for testing. 127.0.0.1 is a loopback address. Class B - Medium-sized networks, implemented by universities. First octet is from 128-191. Class C - Small networks, implemented by ISP for customer subscriptions. First octet is from 192-223. Class D - Special use for multicasting. First octet is from 224-240. Class E - Used for experimental testing
  • Slide 21 – Subnet Masks 8.3.2 Describe IP addressing The subnet mask is used to indicate the network portion of an IP address. It is a dotted decimal number. Usually all hosts within a LAN (bounded by routers) use the same subnet mask. The default subnet masks for three classes of IP addresses: 255.0.0.0 - Class A, which indicates the first octet of the IP address is the network portion. 255.255.0.0 - Class B, which indicates the first two octets of the IP address is the network portion. 255.255.255.0 - Class C, which indicates the first three octets of the IP address is the network portion. If an organization owns one Class B network but needs to provide IP addresses for four LANs, the organization will subdivide the Class B network into four smaller parts by using subnetting, which is a logical division of a network. The subnet mask specifies how it is subdivided. An experienced network administrator typically performs subnetting. After the subnetting scheme has been created, the proper IP addresses and subnet masks can be configured on the hosts in the four subnetted LANs. These skills are taught in the Cisco Networking Academy courses related to CCNA level networking skills.
  • Slide 22 – IP Address Configuration 8.3.2 Describe IP addressing Manual IP address configuration In a network with a small number of hosts, it is easy to manually configure each device with the proper IP address. A network administrator who understands IP addressing should assign the addresses and should know how to choose a valid address for a particular network. To manually enter an IP address on a host, go to the TCP/IP settings in the Properties window for the Network Interface Card (NIC). The NIC is the hardware that enables a computer to connect to a network. It has an address called the Media Access Control (MAC) address. Whereas the IP address is a logical address that is defined by the network administrator, a MAC address is "burned-in" or permanently programmed into the NIC when it is manufactured. The IP address of a NIC can be changed, but the MAC address never changes. The main difference between an IP address and a MAC address is that the MAC address is used to deliver frames on the LAN, while an IP address is used to transport frames outside the LAN. A frame is a data packet, along with address information added to the beginning and end of the packet before transmission over the network. Once a frame is delivered to the destination LAN, the MAC address is used to deliver the frame to the end host on that LAN. Dynamic IP address configuration If more than a few computers comprise the LAN, manually configuring IP addresses for every host on the network can be time-consuming and prone to errors. In this case, the use of a Dynamic Host Configuration Protocol (DHCP) server would automatically assign IP addresses and greatly simplify the addressing process. Student Activity: The student course content includes worksheet, 8.3.2 Identify IP Address Classes. To complete this worksheet, students will specify the IP Address Class for each given IP address and mask.
  • Slide 23 – Dynamic Host Configuration Protocol (DHCP) 8.3.3 Define DHCP Dynamic Host Configuration Protocol (DHCP) is a software utility used to dynamically assign IP addresses to network devices. This dynamic process eliminates the need for manually assigning IP addresses. A DHCP server can be set up and the hosts can be configured to automatically obtain an IP address. When a computer is set to obtain an IP address automatically, all of the other IP addressing configuration boxes are dimmed. The server maintains a list of IP addresses to assign, and manages the process so that every device on the network receives a unique IP address. Each address is held for a predetermined amount of time. When the time expires, the DHCP server can use this address for any computer that joins the network. This is the IP address information that a DHCP server can assign to hosts includes: IP address Subnet mask Default gateway Optional values, such as a Domain Name System (DNS) server address
  • Slide 24 – DHCP Process and Advantages 8.3.3 Define DHCP The DHCP server receives a request from a host. The server then selects IP address information from a set of predefined addresses that are stored in a database. Once the IP address information is selected, the DHCP server offers these values to the requesting host on the network. If the host accepts the offer, the DHCP server leases the IP address for a specific period of time. Using a DHCP server simplifies the administration of a network because the software keeps track of IP addresses. Automatically configuring TCP/IP also reduces the possibility of assigning duplicate or invalid IP addresses. For a computer on the network to take advantage of the DHCP server services, the computer must be able to identify the server on the local network. A computer can be configured to accept an IP address from a DHCP server by selecting the "Obtain an IP address automatically" option in the NIC configuration window. If your computer cannot communicate with the DHCP server to obtain an IP address, the Windows operating system will automatically assign a private IP address. If your computer is assigned an IP address in the range of 169.254.0.0 to 169.254.255.255, you computer will only be able to communicate with other computers in the same range. An example of when these private addresses would be useful is in a classroom lab where you wish to prevent access outside of your network. This operating system feature is called Automatic Private IP Addressing (APIPA). APIPA will continually request an IP address from a DHCP server for your computer.
  • Slide 25 – Configure Host to Use DHCP 8.3.3 Define DHCP For a computer on the network to take advantage of the DHCP server services, the computer must be able to identify the server on the local network. A computer can be configured to accept an IP address from a DHCP server by selecting the "Obtain an IP address automatically" option in the NIC configuration window.
  • Slide 26 – Internet Protocols 8.3.4 Describe Internet protocols and applications A protocol is a set of rules. Internet protocols are sets of rules governing communication within and between computers on a network. Protocol specifications define the format of the messages that are exchanged. Timing is crucial to network operation. Protocols require messages to arrive within certain time intervals so that computers will not wait indefinitely for messages that may have been lost. Therefore, systems maintain one or more timers during transmission of data. Protocols also initiate alternative actions if the network does not meet the timing rules. Many protocols consist of a suite of other protocols that are stacked in layers. These layers depend on the operation of the other layers in the suite to function properly. These are the main functions of protocols: Identifying errors Compressing the data Deciding how data is to be sent Addressing data Deciding how to announce sent and received data
  • Slide 27 – Common Network Protocols 8.3.4 Describe Internet protocols and applications Here is a summarized list of some of the more common protocols used on networks and the Internet. These protocols are used to browse the web, send and receive e-mail, and transfer data files. TCP/IP - A protocol used to transport data on the Internet. NETBEUI and NETBIOS – A small, fast protocol designed for a workgroup network that requires no connection to the Internet. IPX and SPX – A protocol used to transport data on a Novell Netware network. HTTP and HTTPS – A protocol that defines how files are exchanged on the Web. FTP – A protocol that provides services for file transfer and manipulation. SSH – A protocol that is used to connect computers together securely. Telnet – A protocol that uses a text-based connection to a remote computer. POP – A protocol used to download email messages from an email server. IMAP – A protocol used to download email messages from an email server. SMTP – A protocol used to send mail in a TCP/IP network. Student Activity: The student course content includes a matching activity, 8.3.4 Network Protocols. To complete this matching activity, students will match the definition to the appropriate protocol.
  • Slide 28 – Internet Control Message Protocol (ICMP) 8.3.5 Define ICMP Internet Control Message Protocol (ICMP) is used by devices on a network to send control and error messages to computers and servers. There are several different uses for ICMP, such as announcing network errors, announcing network congestion, and troubleshooting. Packet internet groper (ping) is commonly used to test connections between computers. Ping is a simple but highly useful command line utility used to determine whether a specific IP address is accessible. Ping can be used with either the hostname or the IP address to test IP connectivity. Ping works by sending an ICMP echo request to a destination computer or other network device. The receiving device then sends back an ICMP echo reply message.
  • Slide 29 – Ping Command Switches 8.3.5 Define ICMP Ping is a troubleshooting tool used to determine basic connectivity. These command line switches that can be used with the ping command. Four ICMP echo requests (pings) are sent to the destination computer. If it is reachable, the destination computer responds with four ICMP echo replies. The percentage of successful replies can help you to determine the reliability and accessibility of the destination computer.
  • Slide 30 – Output of the Ping Command 8.3.5 Define ICMP It is also possible to use ping to find the IP address of a host when the name is known. If you ping the name of a website, for example, www.cisco.com, the IP address of the server displays. Other ICMP messages are used to report: Undeliverable packets Data on an IP network that includes source and destination IP addresses Whether a device is too busy to handle the packet A data packet arrives at a router, which is a networking device that forwards data packets to other networks. If the router does not know where to send the packet, the router deletes it. The router then sends an ICMP message back to the sending computer. A busy router may send an ICMP message to the sending computer advising it to slow down because of network congestion.
  • Slide 31 – Physical Network Components 8.4 Describe the physical components of a network There are many devices that can be used in a network to provide connectivity. The device you use will depend on how many devices you are connecting, the type of connections that they use, and the speed at which the devices operate. These are the most common devices on a network: Computers Hubs Switches Routers Wireless access points The physical components of a network are needed to move data between these devices. The characteristics of the media determine where and how the components are used. These are the most common media used on networks: Twisted-pair copper cabling Fiber-optic cabling Radio waves After completing this section, students will meet these objectives: Identify names, purposes, and characteristics of network devices Identify names, purposes, and characteristics of the common network cables
  • Slide 32 – Hubs 8.4.1 Identify names, purposes, and characteristics of network devices To make data transmission more extensible and efficient than a simple peer-to-peer network, network designers use specialized network devices, such as hubs, switches, routers, and wireless access points, to send data between network devices. The type of connection that is needed determines the device that is used. Hubs are devices that extend the range of a network by receiving a signal on one port, then regenerating the signal and sending it out to all other ports. This process means that all traffic from a device connected to the hub is sent to all the other devices connected to the hub every time the hub transmits data. This causes a great amount of network traffic. Hubs are also called concentrators, because they serve as a central connection point for a LAN.
  • Slide 33 – Bridges and Switches 8.4.1 Identify names, purposes, and characteristics of network devices Files are broken up into small pieces of data, called packets, before they are transmitted over a network. This allows for error checking and easier retransmission if the packet is lost or corrupted. Address information is added to the beginning and to the end of packets before they are transmitted over the network. The packet, along with the address information, is called a frame. LANs are often divided into sections called segments bounded by bridges. A bridge has the intelligence to determine if an incoming frame is to be sent to a different segment, or dropped. This improves traffic flow of data by keeping frames from entering the wrong segment. A bridge has two ports. Switches are sometimes called multiport bridges. A typical bridge may have just two ports, linking two segments of the same network. A switch has several ports, depending on how many network segments are to be linked. A switch is a more sophisticated device than a bridge. A switch maintains a table of the MAC addresses for computers that are connected to each port. When a frame arrives at a port, the switch compares the address information in the frame to its MAC address table. The switch then determines which port to use to forward the frame.
  • Slide 34 – Routers 8.4.1 Identify names, purposes, and characteristics of network devices While a switch connects segments of a network, routers are devices that connect entire networks to each other. Switches use MAC addresses to forward a frame within a single network. Routers use IP addresses to forward frames to other networks. A router can be a computer with special network software installed, or a router can be a device built by network equipment manufacturers. Routers contain tables of IP addresses along with optimal destination routes to other networks.
  • Slide 35 – Wireless Access Points 8.4.1 Identify names, purposes, and characteristics of network devices Wireless access points provide network access to wireless devices such as laptops and PDAs. The wireless access point uses radio waves to communicate with radios in computers, PDAs, and other wireless access points. An access point has limited range of coverage. Large networks require several access points to provide adequate wireless coverage.
  • Slide 36 – Multipurpose Devices 8.4.1 Identify names, purposes, and characteristics of network devices There are network devices that perform more than one function. It is more convenient to purchase and configure one device that serves all of your needs than to purchase a separate device for each function. This is especially true for the home user. In your home, you would purchase a multipurpose device instead of a switch, a router, and a wireless access point. The Linksys 300N is an example of a multipurpose device.
  • Slide 37 – Twisted-Pair Cabling 8.4.2 Identify names, purposes, and characteristics of common network cables Until recently, cables were the only medium used to connect devices on networks. A wide variety of networking cables are available. Coaxial and twisted-pair cables use copper to transmit data. Fiber-optic cables use glass or plastic to transmit data. These cables differ in bandwidth, size, and cost. As a technician, you need to know what type of cable to use in different situations so that you are able to install the correct cables for the job. You will also need to be able to troubleshoot and repair problems that you encounter. Twisted-pair is a type of copper cabling that is used for telephone communications and most Ethernet networks. A pair of wires forms a circuit that can transmit data. The pair is twisted to provide protection against crosstalk, which is the noise generated by adjacent pairs of wires in the cable. Pairs of copper wires are encased in color-coded plastic insulation and twisted together. An outer jacket protects the bundles of twisted pairs called poly-vinyl chloride (PVC). PVC will produce hazardous fumes when burned. Most network cables are installed in the plenum space, or areas in the ceiling, in the walls, and under the floor. If cables with the PVC jackets do burn in the plenum space, hazardous fumes can spread quickly through a building. To avoid this danger, only install plenum-grade fire resistant cabling in the plenum space. When electricity flows through a copper wire, a magnetic field is created around the wire. A circuit has two wires, and in a circuit, the two wires have oppositely charged magnetic fields. When the two wires of the circuit are next to each other, the magnetic fields cancel each other out. This is called the cancellation effect. Without the cancellation effect, your network communications become slow due to the interference caused by the magnetic fields.
  • Slide 38 – Two Basic Types of Twisted-pair Cables 8.4.2 Identify names, purposes, and characteristics of common network cables There are two basic types of twisted-pair cables: Unshielded twisted-pair (UTP) Has two or four pairs of wires Relies on the cancellation effect for reduction of interference caused by electromagnetic interface (EMI) and radio frequency interference (RFI) Most commonly used cabling in networks Has a range of 328 ft (100 meters) Shielded twisted-pair (STP) Each pair is wrapped in metallic foil to better shield the wires from electrical noise. Four pairs of wires are then wrapped in an overall metallic braid or foil. STP reduces electrical noise from within the cable. It also reduces EMI and RFI from outside the cable. Facts about STP Prevents interference better than UTP. Primarily used outside North America. Disadvantages of STP More expensive because of extra shielding. More difficult to install because of the thickness. Metallic shielding must be grounded at both ends. If not, shield acts like an antenna picking up unwanted signals.
  • Slide 39 – Category Rating 8.4.2 Identify names, purposes, and characteristics of common network cables UTP comes in several categories that are based on two factors: The number of wires in the cable The number of twists in those wires Category 3 is the wiring used for telephone connections. It has four pairs of wires and a maximum data transmission rate of up to 16 Mbps. Category 5 and Category 5e have four pairs of wires with a maximum data transmission rate of up to 100 Mbps. Category 5 and 5e are the most common network cables used. Category 5e has more twists per foot than Category 5 wiring. These extra twists further prevent interference from outside sources and the other wires within the cable. Category 6 cable uses a plastic divider to separate and maintain the position of the pairs of wires relative to each other. This prevents interference. The pairs also have more twists than Category 5e cable.
  • Slide 40 – Coaxial Cable 8.4.2 Identify names, purposes, and characteristics of the common network cables Coaxial cable is a copper-cored cable surrounded by a heavy shielding. Coaxial cable is used to connect computers in a network. There are several types of coaxial cable, including the following: Thicknet or 10Base5 - Coax cable that was used in networks and operated at 10 megabits per second with a maximum length of 500 meters. Thinnet or 10Base2 - Coax cable that was used in networks and operated at 10 megabits per second with a maximum length of 185 meters. RG-59 - Most commonly used for cable television in the US RG-6 - Higher quality cable than RG-59 with more bandwidth and less susceptibility to interference
  • Slide 41 – Fiber-Optic Cable 8.4.2 Identify names, purposes, and characteristics of common network cables A glass or plastic strand that transmits information using light and is made up of one or more optical fibers enclosed together in a sheath or jacket. Not affected by electromagnetic or radio frequency interference. All signals are converted to light pulses to enter the cable, and converted back into electrical signals when they leave it. Signals are clearer, can go farther, and have greater bandwidth than with copper cable. Signal can travel several miles or kilometers before the signal needs to be regenerated. Usually more expensive to use than copper cabling and the connectors are more costly and harder to assemble. Common connectors for fiber-optic networks are SC, ST, and LC. These three types of fiber-optic connectors are half-duplex, which allows data to flow in only one direction. Therefore, two cables are needed. Two types of glass fiber-optic cable: Multimode - Cable that has a thicker core than single-mode cable. It is easier to make, can use simpler light sources (LEDs), and works well over distances of a few kilometers or less. Single-mode - Cable that has a very thin core. It is harder to make, uses lasers as a light source, and can transmit signals dozens of kilometers with ease.
  • Slide 42 – LAN Topologies and Architectures 8.5 Describe LAN topologies and architectures Topologies and architectures are building blocks for designing a computer network. A technician needs to understand how networks are designed in order to work on computers that are part of a network. There are two types of LAN topologies: physical and logical. A physical topology is the physical layout of the components on the network. A logical topology determines how the hosts communicate across a medium, such as a cable or the airwaves. Topologies are commonly represented as network diagrams. A LAN architecture is built around a topology. LAN architecture comprises all the components that make up the structure of a communications system. These components include the hardware, software, protocols, and sequence of operations. After completing this section, students will meet these objectives: Describe LAN topologies Describe LAN architectures
  • Slide 43 - LAN Physical Topologies 8.5.1 Describe LAN topologies A physical topology defines the way in which computers, printers, and other devices are connected to a network. A logical topology describes how the hosts access the medium and communicate on the network. The type of topology determines the capabilities of the network, such as ease of setup, speed, and cable lengths. These are common LAN physical topologies: Bus Ring Star Hierarchical star Mesh
  • Slide 44 – Bus Topology 8.5.1 Describe LAN topologies In a bus topology, each computer connects to a common cable. The cable connects one computer to the next, like a bus line going through a city. The cable has a small cap installed at the end of the wire, called a terminator. The terminator prevents signals from bouncing back and causing network errors. Only one computer can transmit data at a time. When multiple computers send frames at the same time, these frames collide and are destroyed. When this happens, the computers must resend the frames. This topology is rarely used and would only be suitable for a home office or small business with few hosts.
  • Slide 45 – Ring Topology 8.5.1 Describe LAN topologies In a ring topology, hosts are connected in a physical ring or circle. The ring topology has no beginning or end, so the cable does not need to be terminated. A specially-formatted frame, called a token , travels around the ring, stopping at each host. If a host wants to transmit data, the host adds the data and the destination address to the frame. The frame then continues around the ring until the frame stops at the host with the destination address. The destination host takes the data out of the frame. The advantage of using a ring topology is that there are no collisions . When electrical signals run into each other, they cancel each other out. This is called a collision. There are no collisions because the host with the token is the only host that is allowed to transmit data. There are two types of ring topologies: Single-ring - All the devices on the network connect to a single cable and the data travels in one direction only. Each device has an opportunity to send data over the network. Dual ring - All the devices on the network connect to two cables and the data travels in both directions. Only one cable is used at a time. In the event of a failure of one ring, data is transmitted on the other ring. A Token Ring network is the most common implementation of the ring topology. A Token Ring network uses a ring topology and a token-passing methodology to prevent collisions. Some characteristics of Token Ring networks are: Token Ring was developed by IBM and conforms to the Institute of Electrical and Electronics Engineers (IEEE) 802.5 standard. Token Ring networks typically operate at 4 or 16 Mbps.
  • Slide 46 – Star Topology 8.5.1 Describe LAN topologies The star topology has a central connection point, which is normally a device such as a hub, switch, or router. Each host on a network has a cable segment that attaches the host directly to the central connection point. A star topology costs more to implement than the bus topology because more cable is used, and a central device is needed, such as a hub, switch, or router. The advantage of a star topology is that it is easy to troubleshoot. Each host is connected to the central device with its own wire. If there is a problem with that cable, only that host is affected. The rest of the network remains operational.
  • Slide 47 – Hierarchical Star Topology 8.5.1 Describe LAN topologies A hierarchical or extended star topology is a star network with an additional networking device connected to the main networking device. Typically, a network cable connects to one hub, and then several other hubs connect to the first hub. A hierarchical star topology can be used with network devices that filter frames or packets, such as bridges, switches, and routers. This topology, when used with these devices, significantly reduces congestion by sending packets only to the network segment of the destination host. Larger networks, such as those of corporations or universities, use the hierarchical star topology.
  • Slide 48 – Mesh Topology 8.5.1 Describe LAN topologies The mesh topology connects all devices to each other. When every device is connected to every other device, a failure of any cable will not affect the network. The mesh topology is used in WANs that interconnect LANs. Mesh topologies are expensive and difficult to install because of the amount of cable necessary to connect every device to every other device on the network. The Internet is a good example of a mesh topology. On the Internet, if one device breaks down, the data can be routed through another device. Mesh topologies are often used by governments when data must be available even in the event of a network failure.
  • Slide 49 – Logical Topologies 8.5.1 Describe LAN topologies The two most common types of logical topologies are broadcast and token passing. In a broadcast topology, each host addresses either data to a particular host or to all hosts connected on a network. There is no order that the hosts must follow to use the network – it is first come, first served for transmitting data on the network. Token passing controls network access by passing an electronic token sequentially to each host. When a host receives the token, it can send data on the network. If the host has no data to send, it passes the token to the next host and the process repeats itself.
  • Slide 50 – LAN Architecture 8.5.2 Describe LAN architectures A LAN architecture is the overall structure of a computer or communication system and determines the capabilities and limitations of the system. LAN architectures are designed for a specific use and have different speeds and capabilities. LAN architecture describes both the physical and logical topologies used in a network. These are the three most common LAN architectures: Ethernet Token Ring Fiber-Distributed Data Interface (FDDI)
  • Slide 51 – Ethernet 8.5.2 Describe LAN architectures The Ethernet architecture is based on the IEEE 802.3 standard, which specifies that a network use the Carrier Sense Multiple Access with the Collision Detection ( CSMA/CD ) access control method. In CSMA/CD, hosts access the network using the first come, first served broadcast topology method to transmit data. Ethernet uses a logical bus or broadcast topology and either a bus or star physical topology. As networks expand, most Ethernet networks are implemented using an extended star or hierarchical star topology. Standard transfer rates are 10 Mbps or 100 Mbps, but new standards outline Gigabit Ethernet, which is capable of attaining speeds up to 1000 Mbps (1 Gbps).
  • Slide 52 – Token Ring 8.5.2 Describe LAN architectures IBM originally developed Token Ring as reliable network architecture based on the token-passing access control method. Token Ring is often integrated with IBM mainframe systems. Token Ring is used with computers and mainframes. Token Ring is an example of an architecture where the physical topology is different from its logical topology. The Token Ring topology is referred to as a star-wired ring because the outer appearance of the network design is a star. The computers connect to a central hub, called a multistation access unit (MSAU). Inside the device, however, the wiring forms a circular data path, creating a logical ring. The logical ring is created by the token traveling out of a MSAU port to a computer. If the computer does not have any data to send, the token is sent back to the MSAU port and then out the next port to the next computer. This process continues for all computers and therefore resembles a physical ring.
  • Slide 53 – Fiber Distributed Data Interface (FDDI) 8.5.2 Describe LAN architectures FDDI is a type of Token Ring network. The implementation and topology of FDDI differ from the IBM Token Ring LAN architecture. FDDI is often used for LANs, such as those connecting several buildings in an office complex or on a university campus. FDDI runs on fiber-optic cable. FDDI combines high-speed performance with the advantages of the token-passing ring topology. FDDI runs at 100 Mbps on a dual-ring topology. The outer ring is called the primary ring and the inner ring is called the secondary ring. Normally, traffic flows only on the primary ring. If the primary ring fails, the data automatically flows onto the secondary ring in the opposite direction. A FDDI dual ring supports a maximum of 500 computers per ring. The total distance of each length of the cable ring is 62 miles (100 km). A repeater, which is a device that regenerates signals, is required every 1.2 miles (2 km). Note: ISPs have used FDDI due to the redundancy FDDI provides with its dual ring. The newer forms of Ethernet and other enhancements to Ethernet have begun to replace FDDI in this role. In recent years, many token ring networks have been replaced by faster Ethernet networks. Resources: http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/fddi.htm
  • Slide 54 - Standards Organizations 8.6 Identify standards organizations Several worldwide standards organizations are responsible for settings networking standards. Standards are used by manufacturers as a basis for developing technology, especially communications and networking technologies. Standardizing technology ensures that products will be able to communicate with any other products using the same technology. The standards groups create, examine, and update standards and technology to meet the demands for higher bandwidth, efficient communication, and reliable service. These standards are applied to the development of technology to meet the demands for higher bandwidth, efficient communication, and reliable service. Be familiar with these standards to implement and repair equipment that follows the guidelines described in the standards. If the standards are not followed during a cable installation, for example, the network may not operate at the speed needed. When you do not adhere to standards, you may also find that you have trouble updating, replacing, or upgrading network components. Resources: Telecommunication Standardization Sector of the International Telecommunications Union (ITU-T) http://www.itu.int/ITU-T/ Institute of Electrical and Electronics Engineers (IEEE) http://www.ieee.org/ International Organization for Standardization (ISO) http://www.iso.ch/iso/ Internet Architecture Board (IAB) http://www.iab.org/ International Electrotechnical Commission (IEC) http://www.iec.ch/ American National Standards Institute (ANSI) http://www.ansi.org/ Telecommunications Industry Association (TIA) http://www.tiaonline.org/ Electronic Industries Alliance (EIA) http://www.eia.org/
  • Slide 55 – Ethernet Standards 8.7 Identify Ethernet standards Ethernet protocols describe the rules that control how communication occurs on an Ethernet network. To ensure that all Ethernet devices are compatible with each other, the IEEE developed standards for manufacturers and programmers to follow when making and programming Ethernet devices. After completing this section, students will meet these objectives: Explain cabled Ethernet standards Explain wireless Ethernet standards
  • Slide 56 – Cabled Ethernet Standards 8.7.1 Explain cabled Ethernet standards The Ethernet architecture is based on the IEEE 802.3 standard. The IEEE 802.3 standard specifies that a network implement the CSMA/CD access control method. In CSMA/CD, all end stations "listen" to the network wire for clearance to send data. This process is similar to waiting to hear a dial tone on a phone before dialing a number. When the end station detects that no other host is transmitting, the end station will attempt to send data. If no other station sends any data at the same time, this transmission will arrive at the destination computer with no problems. If another end station observed the same clear signal and transmitted at the same time, a collision will occur on the network media. The first station that detects the collision, or the doubling of voltage, sends out a jam signal that tells all stations to stop transmitting and to run a backoff algorithm. A backoff algorithm calculates random times in which the end station will start to try network transmission again. This random time is typically in one or two milliseconds (ms), or thousandths of a second. This sequence occurs every time there is a collision on the network and can reduce Ethernet transmission by up to 40%.
  • Slide 57 - 10BASE-T 8.7.1 Explain cabled Ethernet standards The IEEE 802.3 standard defines several physical implementations that support Ethernet. Some of the common implementations are described here. 10BASE-T is an Ethernet technology that uses a star topology. 10BASE-T is a popular Ethernet architecture whose features are indicated in its name: The ten (10) represents a speed of 10 Mbps. BASE represents baseband transmission. In baseband transmission, the entire bandwidth of a cable is used for one type of signal. The T represents twisted-pair copper cabling. Advantages of10BASE-T: Installation of cable is inexpensive compared to fiber-optic installation. Cables are thin, flexible, and easier to install than coaxial cabling. Equipment and cables are easy to upgrade. Disadvantages of 10BASE-T: The maximum length for a 10BASE-T segment is only 328 ft (100 m). Cables are susceptible to Electromagnetic Interference (EMI).
  • Slide 58 – 100BASE-TX “FastEthernet” 8.7.1 Explain cabled Ethernet standards The high bandwidth demands of many modern applications, such as live video conferencing and streaming audio, have created a need for higher data-transfer speeds. Many networks require more bandwidth than 10 Mbps Ethernet. 100BASE-TX is much faster than 10BASE-T and has a theoretical bandwidth of 100 Mbps. The "X" indicates that you can use many different types of copper and fiber-optic cabling. Advantages of 100BASE-TX: At 100 Mbps, transfer rates of 100BASE-TX are ten times that of 10BASE-T. 100BASE-X uses twisted-pair cabling, which is inexpensive and easy to install. Disadvantages of 100BASE-TX: The maximum length for a 100BASE-TX segment is only 328 ft (100 m). Cables are susceptible to Electromagnetic Interference (EMI).
  • Slide 59 – 1000BASE-TX “Gigabit Ethernet” 8.7.1 Explain cabled Ethernet standards 1000BASE -T is commonly known as Gigabit Ethernet. Gigabit Ethernet is a LAN architecture. Advantages of 1000BASE-T: The 1000BASE-T architecture supports data transfer rates of 1 Gbps. At 1 Gbps, it is ten times faster than Fast Ethernet, and 100 times faster than Ethernet. This increased speed makes it possible to implement bandwidth-intensive applications, such as live video. The 1000BASE-T architecture has interoperability with 10BASE-T and 100BASE-TX. Disadvantages of 1000BASE-T: The maximum length for a 1000BASE-T segment is only 328 ft (100 m). It is susceptible to interference. Gigabit NICs and switches are expensive. Additional equipment is required.
  • Slide 60 – Wireless Ethernet Standards 8.7.2 Explain wireless Ethernet standards IEEE 802.11 is the standard that specifies connectivity for wireless networks. IEEE 802.11, or Wi-Fi (wireless fidelity), refers to the collective group of standards, 802.11 (the original specification), 802.11b, 802.11a, 802.11g, and 802.11n. These protocols specify the frequencies, speeds, and other capabilities of the different Wi-Fi standards. 802.11a - Devices conforming to the 802.11a standard allow WLANs to achieve data rates as high as 54 Mbps. IEEE 802.11a devices operate in the 5 GHz radio frequency range and within a maximum range of 150 feet (45.7 m). 802.11b operates in the 2.4 GHz frequency range with a maximum theoretical data rate of 11 Mbps. These devices operate within a maximum range of 300 feet (91 m). 802.11g provides the same theoretical maximum speed as 802.11a, which is 54 Mbps, but operates in the same 2.4 GHz spectrum as 802.11b. Unlike 802.11a, 802.11g is backward-compatible with 802.11b. 802.11g also has a maximum range of 300 feet (91 m). 802.11n is a newer wireless standard that has a theoretical bandwidth of 540 Mbps and operates in either the 2.4 GHz or 5 GHz frequency range with a maximum range of 984 feet (250 m).
  • Slide 61 – IEEE 802.11a WLAN Standard 8.7.2 Explain wireless Ethernet standards Devices conforming to the 802.11a standard allow WLANs to achieve data rates as high as 54 Mbps. IEEE 802.11a devices operate in the 5 GHz radio frequency range. The 802.11a standard positively affects performance because of the devices operating on a higher frequency, and the combination of the coding and modulation techniques used. 802.11a is in a wider frequency, 5 GHz, to access the higher speeds, and also to avoid interference issues in the crowded 2.4 GHz band where 802.11b WLANs, HomeRF LANs, Bluetooth devices, cordless phones, and even microwave ovens operate. The benefits of using the 5 GHz spectrum may be canceled out by the lack of backward compatibility with the current generation of 802.11b LANs. This is because the frequencies do not match. Many vendors are addressing this problem by producing dual-mode products that contain two radios, one that operates in the 2.4 GHz range, and one that operates in the 5 GHz range. 802.11a has a range of approximately 100 ft (30 m).
  • Slide 62 – IEEE 802.11b WLAN Standard 8.7.2 Explain wireless Ethernet standards Ratified in 1999, 802.11b is an extension of the original 802.11 standard. 802.11b operates in the 2.4 GHz frequency range with a maximum theoretical data rate of 11 Mbps. Because of process within the protocol, common data rates are typically reduced to 6.5 Mbps. 802.11b has an average range of approximately 100 ft (30 m) at 11 Mbps and 295 ft (90 m) at 1 Mbps. This range fluctuates depending on the operational speed. Signal quality dictates the operational speed of 802.11b.
  • Slide 63 – IEEE 802.11g and 802.11n 8.7.2 Explain wireless Ethernet standards The IEEE 802.11g standard was published in July 2003. 802.11g provides the same theoretical maximum speed as 802.11a, which is 54 Mbps, but operates in the same 2.4 GHz spectrum as 802.11b. Unlike 802.11a, 802.11g is backward compatible with 802.11b. Interoperability among and between all speeds exists, so the entire WLAN does not need to be upgraded when moving to higher speeds. 802.11g has an average range of approximately 100 ft (30 m). 802.11n will have a theoretical bandwidth of 540 Mbps and operate in either the 2.4 GHz or 5 GHz frequency range with a maximum range of 164 ft (50 m). The IEEE 802.11 project timeline expects 802.11n to be approved in April 2008. In January 2007, the task group adjusted this timeline to ratify 802.11n earlier than April 2008.
  • Slide 64 – Wireless Ethernet Standards 8.7.2 Explain wireless Ethernet standards An 802.11 access point has three different operating modes: Legacy - Only 802.11a, b, and g Mixed - Both 802.11a, b, g, and n Greenfield - Only 802.11n Resources: http://www.csot.com/ethernet/wireless.htm
  • Slide 65 – OSI and TCP/IP Data Models 8.8 Explain OSI and TCP/IP data models An architectural model is a common frame of reference for explaining Internet communications and developing communication protocols. It separates the functions of protocols into manageable layers. Each layer performs a specific function in the process of communicating over a network. The TCP/IP model was created by researchers in the US Department of Defense (DoD). The TCP/IP model is a tool used to help explain the TCP/IP suite of protocols, which is the dominant standard for transporting data across networks. This model has four layers. In the early 1980s, the International Standards Organization (ISO) developed the Open Systems Interconnect (OSI) model, which was defined in ISO standard 7498-1, to standardize the way devices communicate on a network. This was a major step forward to ensuring that there would be interoperability between network devices. After completing this section, students will meet these objectives: Define the TCP/IP model Define the OSI model Compare OSI and TCP/IP
  • Slide 66 – TCP/IP Model 8.8.1 Define the TCP/IP model The TCP/IP reference model Frame of reference used to develop the Internet's protocols Consists of layers that perform functions necessary to prepare data for transmission over a network A message moves from the top (Application) layer down the TCP/IP layers to the bottom network access layer. Header information is added to the message as it moves down through each layer and is then transmitted. After reaching the destination, the message travels back up through each layer of the TCP/IP model. The header information that was added to the message is stripped away as the message moves up through the layers toward its destination. Application protocols provide network services to user applications such as web browsers and e-mail programs Transport protocols provide end-to-end management of the data and divides the data into manageable segments for easier transport across the network Internet protocols provide connectivity between hosts in the network Network Access protocols describe the standards that hosts use to access the physical media. The IEEE 802.3 Ethernet standards and technologies, such as CSMA/CD and 10BASE-T are defined in this layer.
  • Slide 67 - The OSI Model 8.8.2 Define the OSI model The OSI model is an industry standard framework that is used to divide network communications into seven distinct layers. Although other models exist, most network vendors today build their products using this framework. A system that implements protocol behavior consisting of a series of these layers is known as a protocol stack. Protocol stacks can be implemented either in hardware or software, or a combination of both. Typically, only the lower layers are implemented in hardware, and the higher layers are implemented in software.
  • Slide 68 - The OSI Model 8.8.2 Define the OSI model Each layer is responsible for part of the processing to prepare data for transmission on the network. The chart shows what each layer of the OSI model does. NOTE: Mnemonics can help you remember the seven layers of the OSI. Some examples include: "All People Seem To Need Data Processing" and "Please Do Not Throw Sausage Pizza Away".
  • Slide 69 – Compare OSI and TCP/IP Models 8.8.3 Compare OSI and TCP/IP The OSI model and the TCP/IP model are both reference models used to describe the data communication process. The TCP/IP model is used specifically for the TCP/IP suite of protocols and the OSI model is used for development of standard communication for equipment and applications from different vendors. The TCP/IP model performs the same process as the OSI model, but uses four layers instead of seven. Student Activity: The student course content includes a matching activity, 8.8.3 OSI Model. To complete this activity, students will match the OSI layers to the TCP/IP layers.
  • Slide 70 – Configuring a NIC and a Modem 8.9 Describe how to configure a NIC and a modem A network interface card (NIC) is required to connect to the Internet. The NIC may come preinstalled or you may have to purchase one separately. Use the driver that comes with the motherboard or adapter. If necessary, download an updated driver from the manufacturer. After completing this section, students will meet these objectives: Install or update a NIC driver Attach the computer to an existing network Describe installation of modem
  • Slide 71 – Install or Update a NIC Driver 8.9.1 Install or update a NIC driver Manufacturers will publish new driver software for a NIC. May enhance the functionality of the NIC May be needed for operating system compatibility To install a new driver Disable virus protection software Install only one driver at a time Close all applications that are running so that they are not using any files associated with the driver update. Visit the manufacturer's website and download a self-extracting executable driver file that will automatically install or update the driver
  • Slide 72 – Install or Update a NIC Driver 8.9.1 Install or update a NIC driver Alternatively, you can click the Update Driver button in the toolbar of the Device Manager Choose Start > Control Panel > System > Hardware tab. In the Device Manager area, click Device Manager tab and click Update Driver… The " + " next to the Network adapters category allows you to expand the category and show the network adapters installed in your system To view and change the properties of the adapter, double-click the adapter In the Adapter Properties window, and select the driver After updating, reboot the computer Rebooting after driver changes will make sure that the installation has gone as planned and the new driver is working properly When installing multiple drivers, reboot the computer between each update to make sure there are no conflicts Uninstall a NIC Driver - If a new NIC driver does not perform as expected after it has been installed, the driver can be uninstalled, or rolled back, to the previous driver Double-click the adapter in the Device Manager . In the Adapter Properties window, select the Driver tab and click Roll Back Driver If there was no driver installed before the update, this option will not be available You will need to find a driver for the device and install it manually if the operating system could not find a suitable driver for the NIC. Student Activity: The student course content includes worksheet, 8.9.1 Internet Search for NIC Drivers. To complete this worksheet, students will research the latest NIC drivers for various network cards.
  • Slide 73 – Attach Computer to Existing Network 8.9.2 Attach Computer to existing network Now that the NIC drivers are installed, connect to the network. Plug a network cable, also called an Ethernet patch or straight-through cable, into the network port on the computer. Plug the other end into the network device or wall jack. After connecting the network cable, look at the LEDs, or link lights, next to the Ethernet port on the NIC. If there is no activity, this may indicate a faulty cable, a faulty hub port, or even a faulty NIC. You may have to replace one or more of these devices to correct the problem.
  • Slide 74 – Configure the NIC 8.9.2 Attach Computer to existing network The computer will now need an IP address. Most networks are set up so that the computer will receive an IP address automatically from a local DHCP server. If the computer does not have an IP address, you will need to enter a unique IP address in the TCP/IP properties of the NIC. Click Start > Control Panel > Network Connections > Local Area Connection Every NIC must be configured with the following information: The same protocol must be implemented between any two computers that communicate on the same network. The IP address is configurable and must be unique to each device. The IP address can be manually configured or automatically assigned by DHCP. Each device has a unique MAC address . The MAC address is assigned by the manufacturer and cannot be changed.
  • Slide 75 – What is the Assigned IP Address? 8.9.2 Attach Computer to existing network Once the computer is connected to the network, you should test connectivity. Use the ipconfig program to find out the IP address assigned to the computer.
  • Slide 76 – Test Connectivity 8.9.2 Attach Computer to existing network Ping your own IP address to make sure that your NIC is working properly. Once you have determined that your NIC is working, ping your default gateway or another computer on your network. A default gateway is a computer or router that serves as the entry point and exit point of your subnet. If you have an Internet connection, ping a popular website, such as www.cisco.com. If you can ping an Internet site successfully, everything is working properly with your connection. If you cannot ping one of these items, you will need to begin troubleshooting the connection. Student Activity: The student course content includes the lab, 8.9.2 Lab: Configure an Ethernet NIC to use DHCP. To complete this lab, students will configure an Ethernet NIC to use DHCP to obtain an IP address.
  • Slide 77 – Modem Installation 8.9.3 Describe the installation of a modem A modem is an electronic device that transfers data between one computer and another using analog signals over a telephone line. A transmitting modem converts digital data to analog signals. The receiving modem reconverts the analog signals back to digital data. These processes are called modulation/demodulation. An internal modem plugs into an expansion slot on the motherboard. To configure a modem, jumpers may have to be set to select the IRQ and I/O addresses. No configuration is needed for a plug-and-play modem. A modem using a serial port that is not yet in use must be configured. Additionally, the software drivers that come with the modem must be installed for the modem to work properly. External modems connect to a computer through the serial and USB ports.
  • Slide 78 – Dial-up Networking (DUN) 8.9.3 Describe the installation of a modem When computers use the public telephone system to communicate, it is called dial-up networking ( DUN ). Modems communicate with each other using audio tone signals. Modems can duplicate the dialing characteristics of a telephone. DUN creates a Point-to-Point Protocol (PPP) connection between two computers over a phone line. After the line connection has been established, a "handshaking sequence" takes place between the two modems and the computers. The handshaking sequence is a series of short communications that occur between the two systems. This is done to establish the readiness of the two modems and computers to engage in data exchange. Dial-up modems send data over the serial telephone line in the form of an analog signal. Analog signals can be drawn as waves because they change gradually and continuously. In this system, the digital signals are represented by 1s and 0s. The digital signals must be converted to a waveform to travel across telephone lines. They are converted back to the digital form, 1s and 0s, by the receiving modem so that the receiving computer can process the data.
  • Slide 79 – AT Commands 8.9.3 Describe the installation of a modem All modems require software to control the communication session. Most modem software uses the Hayes-compatible command set. The Hayes command set is based on a group of instructions that always begins with a set of attention characters (AT), followed by the command characters. These are known as AT commands. The AT commands are modem control commands. The AT command set is used to issue dial, hang up, reset, and other instructions to the modem. Most user manuals that come with a modem contain a complete listing of the AT command set. The standard Hayes compatible code to dial is ATDxxxxxxx. There are usually no spaces in an AT string. If a space is inserted, most modems will ignore it. The "x" signifies the number dialed. There will be seven digits for a local call and 11 digits for a long-distance call. A W indicates that the modem will wait for an outside line, if necessary, to establish a tone before proceeding. Sometimes, a T is added to signify tone dialing or a P is added to signify pulse dialing.
  • Slide 80 – Other types of Connectivity 8.10 Identify names, purposes, and characteristics of other technologies used to establish connectivity Phone, cable, satellite, and private telecommunications companies provide Internet connections. In the 1990s, low-speed modems used the plain old telephone system (POTS) to send and receive data. Today, many businesses and home users have switched to high-speed Internet connections, which allows for transmission of data, voice and video. A technician should understand how users connect to the Internet and the advantages and disadvantages of different connection types. After completing this section, students will meet these objectives: Describe telephone technologies Define power line communication Define broadband Define VOIP
  • Slide 81 – Integrated Services Digital Network 8.10.1 Describe telephone technologies There are several WAN solutions available for connecting between sites or to the Internet. WAN connection services provide different speeds and levels of service. Before committing to any type of Internet connection, research all available services to determine the best solution to match the needs of your customer. Analog telephone technology uses standard voice telephone lines. This type of service uses a modem to place a telephone call to another modem at a remote site, such as an Internet Service provider. There are two major disadvantages of using the phone line with an analog modem. The first is that the telephone line cannot be used for voice calls while the modem is in use. The second is the limited bandwidth provided by analog phone service. The maximum bandwidth using an analog modem is 56 Kbps, but in reality, it is usually much lower than that. An analog modem is not a good solution for the demands of busy networks. Integrated Services Digital Network (ISDN) is a standard for sending voice, video, and data over normal telephone wires. ISDN technology uses the telephone wires as an analog telephone service. Because ISDN uses digital technology, it provides higher-quality voice and higher-speed data transfer than traditional analog telephone service. Three services are offered by ISDN digital connections: Basic Rate Interface (BRI), Primary Rate Interface (PRI), and Broadband ISDN (BISDN). ISDN uses two different types of communications channels: "B" channel is used to carry the information - data, voice, or video. "D" channel is usually used for controlling and signaling, but can be used for data.
  • Slide 82 – ISDN Types 8.10.1 Describe telephone technologies ISDN Basic Rate Interface (BRI) offers a dedicated 128 Kbps connection using two 64 Kbps B channels. ISDN BRI also uses on 16 Kbps D channel for call setup, control, and teardown. ISDN Primary Rate Interface (PRI) offers up to 1.544 Mbps over 23 B channels in North America and Japan or 2.048 Mbps over 30 B channels in Europe and Australia. ISDN PRI also uses one D channel for call maintenance. Broadband ISDN (BISDN) manages different types of service all at the same time. BISDN is mostly used only in network backbones.
  • Slide 83 – Digital Subscriber Line (DSL) 8.10.1 Describe telephone technologies DSL is an "always-on" technology. There is no need to dial up each time to connect to the Internet. DSL uses the existing copper telephone lines to provide high-speed data communication between end users and telephone companies. Unlike ISDN, where the digital data communications replaces the analog voice communications, DSL shares the telephone wire with analog signals. This sharing of the phone wire allows voice calls to be placed while DSL is connecting to the Internet. Two major considerations when selecting DSL: DSL has distance limitations. The voice information and the data carried by DSL must be separated at the customer site. Asymmetric DSL (ADSL) is currently the most commonly used DSL technology. Has different bandwidth capabilities in each direction, Has a fast downstream speed - typically 1.5 Mbps. Downstream is the process of transferring data from the server to the end user. Upload rate of ADSL is slower. Does not perform well when hosting a web server or FTP server, both of which involve upload-intensive Internet activities.
  • Slide 84 – DSL Types 8.10.1 Describe telephone technologies Asymmetric DSL (ADSL) currently is the most common implementation. It has speeds that vary from 384 Kbps to more than 6 Mbps downstream. The upstream speed is typically lower than the downstream speed. High Data Rate DSL (HDSL) provides equal bandwidth in both directions. It is 1.544 Mbps in North America and 2.048 Mbps in Europe. Symmetric DSL (SDSL) provides the same speed, up to 3 Mbps, for uploads and downloads. Very High Data Rate DSL (VDSL) is capable of bandwidths between 13 and 52 Mbps downstream, and 16 Mbps upstream. ISDN DSL (IDSL) is actually DSL over ISDN lines. It is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire as well as over other media with a top speed of 144 Kbps. ISDN is available in areas that do not qualify for other DSL implementations. An ISDN adapter at both ends, user side in place of the modem and service provider, is required. ISDN is generally available in urban areas in the United States and Europe from the local phone company.
  • Slide 85 – Power Line Communication (PLC) 8.10.2 Define power line communication Power line communication (PLC) is a communication method that uses power distribution wires (local electric grid) to send and receive data. PLC is known by other names: Power Line Networking (PLN) Mains Communication Power Line Telecoms (PLT) With PLC, an electric company can superimpose an analog signal over the standard 50 or 60 Hz AC that travels in power lines. The analog signal can carry voice and data signals. PLC may be available in areas where other high-speed connections are not. PLC is faster than an analog modem. PLC may cost much less than other high-speed connection types. As this technology matures, it will become more common to find and may increase in speed You can use PLC to network computers within your home instead of installing network cabling or wireless technology. PLC connections can be used anywhere there is an electrical outlet. You can control lighting and appliances using PLC without installing control wiring. Resources: EU launches power line Net initiative | InfoWorld | News | 2004-02-02 | By John Blau, IDG News Service http://www.infoworld.com/article/04/02/02/HNeupowerline_1.html O'Reilly Network -- An Introduction to Power Line Communications http://www.oreillynet.com/pub/a/etel/2007/02/15/an-introduction-to-power-line-communications.html ITworld.com - FCC endorses power line communications http://www.itworld.com/Man/2697/060804fcc/
  • Slide 86 – Broadband Connectivity 8.10.3 Define broadband Broadband is a technique used to transmit and receive multiple signals using multiple frequencies over one cable. For example, the cable used to bring cable television to your home can carry computer network transmissions at the same time. Because the two transmission types use different frequencies, they do not interfere with each other. Broadband uses a wide range of frequencies that may be further divided into channels. In networking, the term broadband describes communication methods that transmit two or more signals at the same time. Sending two or more signals simultaneously increases the rate of transmission. Some common broadband network connections include cable, DSL, ISDN, and satellite.
  • Slide 87 – Cable Modem 8.10.3 Define broadband A cable modem connects your computer to the cable company using the same coaxial cable that connects to your cable television. You can connect the computer directly into the cable modem. You can connect a router, switch, hub, or multipurpose network device so multiple computers can share the Internet connection.
  • Slide 88 – DSL Modem and Filter 8.10.3 Define broadband With DSL, the voice and data signals are carried on different frequencies on the copper telephone wires. A filter is used to prevent DSL signals from interfering with phone signals. Plug the filter into a phone jack and plug the phone into the filter. The DSL modem does not need a filter. The DSL modem is not affected by the frequencies of the telephone. A DSL modem can connect directly to your computer, or it can be connected to a networking device to share the Internet connection between multiple computers.
  • Slide 89 – A Typical ISDN Connection 8.10.3 Define broadband ISDN is another example of broadband. ISDN uses multiple channels and can carry different types of services; therefore, it is considered a type of broadband. ISDN can carry voice, video, and data. This slide shows a typical ISDN connection.
  • Slide 90 – Broadband Satellite 8.10.3 Define broadband Broadband satellite is an alternative for customers who cannot get cable or DSL connections. A satellite connection does not require a phone line or cable, but uses a satellite dish for two-way communication. Download speeds are typically up to 500 Kbps, while uploads are closer to 56 Kbps. It takes time for the signal from the satellite dish to relay to your Internet Service Provider (ISP) through the satellite orbiting the Earth. People in rural areas often use satellite broadband because they need a faster connection than dial-up and no other broadband connection is available. Student Activity: The student course content includes worksheet, 8.10.3 Answer Broadband Questions. To complete this worksheet, students will answer questions about broadband connectivity options.
  • Slide 91 – Voice over IP (VoIP) 8.10.4 Define VoIP Voice over IP (VoIP) is a method to carry telephone calls over data networks and the Internet. VoIP converts the analog signals of voices into digital information that is transported in IP packets. VoIP can also use an existing IP network to provide access to the public switched telephone network (PSTN). VoIP depends on a reliable Internet connection. This can be a disadvantage if the Internet connection experiences an interruption in service. When a service interruption occurs the user cannot make phone calls. Resources: Cisco Unified IP Phones 7900 Series - Products & Services - Cisco Systems http://www.cisco.com/en/US/products/hw/phones/ps379/index.html
  • Slide 101 - Chapter 8 Summary 8.13 Chapter 8 Summary This chapter introduced you to the fundamentals of networking, the benefits of having a network, and the ways to connect computers to a network. The different aspects of troubleshooting a network were discussed with examples of how to analyze and implement simple solutions. The following are some of the important concepts to remember from this chapter: A computer network is composed of two or more computers that share data and resources. A Local Area Network (LAN) refers to a group of interconnected computers that are under the same administrative control. A Wide Area Network (WAN) is a network that connects LANs in geographically separated locations. In a peer-to-peer network, devices are connected directly to each other. A peer-to-peer network is easy to install, and no additional equipment or dedicated administrator is required. Users control their own resources, and a network works best with a small number of computers. A client/server network uses a dedicated system that functions as the server. The server responds to requests made by users or clients connected to the network. A LAN uses a direct connection from one computer to another. It is suitable for a small area, such as in a home, building, or school. A WAN uses point-to-point or point-to-multipoint, serial communications lines to communicate over greater distances. A WLAN uses wireless technology to connect devices together. The network topology defines the way in which computers, printers, and other devices are connected. Physical topology describes the layout of the wire and devices, as well as the paths used by data transmissions. Logical topology is the path that signals travel from one point to another. Topologies include bus, star, ring, and mesh. Networking devices are used to connect computers and peripheral devices so that they can communicate. These include hubs, bridges, switches, routers, and multipurpose devices. The type of device implemented depends on the type of network. Networking media can be defined as the means by which signals, or data, are sent from one computer to another. Signals can be transmitted either by cable or wireless means. The media types discussed were coaxial, twisted-pair, fiber-optic cabling, and radio frequencies. Ethernet architecture is now the most popular type of LAN architecture. Architecture refers to the overall structure of a computer or communications system. It determines the capabilities and limitations of the system. The Ethernet architecture is based on the IEEE 802.3 standard. The IEEE 802.3 standard specifies that a network implement the CSMA/CD access control method. The OSI reference model is an industry standard framework that is used to divide the functions of networking into seven distinct layers. These layers include Application, Presentation, Session, Transport, Network, Data Link, and Physical. It is important to understand the purpose of each layer. The TCP/IP suite of protocols has become the dominant standard for the Internet. TCP/IP represents a set of public standards that specify how packets of information are exchanged between computers over one or more networks. A NIC is a device that plugs into a motherboard and provides ports for the network cable connections. It is the computer interface with the LAN. A modem is an electronic device that is used for computer communications through telephone lines. It allows data transfer between one computer and another. The modem converts byte-oriented data to serial bit streams. All modems require software to control the communication session. The set of commands that most modem software uses is known as the Hayes-compatible command set. The three transmission methods to sending signals over data channels are simplex, half-duplex, and full-duplex. Full-duplex networking technology increases performance because data can be sent and received at the same time. DSL, two-way cable modem, and other broadband technologies operate in full-duplex mode. Network devices and media, such as computer components, must be maintained. It is important to clean equipment regularly and use a proactive approach to prevent problems. Repair or replace broken equipment to prevent downtime. When troubleshooting network problems, listen to what your customer tells you so that you can formulate open-ended and closed-ended questions that will help you determine where to begin fixing the problem. Verify obvious issues and try quick solutions before escalating the troubleshooting process.
  • Slide 105 – Additional Resources Fiber Distributed Data Interface (FDDI) http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/fddi.htm Wireless Ethernet http://www.csot.com/ethernet/wireless.htm Cisco Unified IP Phones 7900 Series - Products & Services - Cisco Systems http://www.cisco.com/en/US/products/hw/phones/ps379/index.html Telecommunication Standardization Sector of the International Telecommunications Union (ITU-T) http://www.itu.int/ITU-T/ Institute of Electrical and Electronics Engineers (IEEE) http://www.ieee.org/ International Organization for Standardization (ISO) http://www.iso.ch/iso/ Internet Architecture Board (IAB) http://www.iab.org/ International Electrotechnical Commission (IEC) http://www.iec.ch/ American National Standards Institute (ANSI) http://www.ansi.org/ Telecommunications Industry Association (TIA) http://www.tiaonline.org/ Electronic Industries Alliance (EIA) http://www.eia.org/ EU launches power line Net initiative | InfoWorld | News | 2004-02-02 | By John Blau, IDG News Service http://www.infoworld.com/article/04/02/02/HNeupowerline_1.html O'Reilly Network -- An Introduction to Power Line Communications http://www.oreillynet.com/pub/a/etel/2007/02/15/an-introduction-to-power-line-communications.html ITworld.com - FCC endorses power line communications http://www.itworld.com/Man/2697/060804fcc/ Whatis?com: IT Encyclopedia and Learning Center http://whatis.com TechTarget: The Most Targeted IT Media http://techtarget.com ZDNet: Tech News, Blogs and White Papers for IT Professionals http://www.zdnet.com HowStuffWorks: It's Good to Know http://computer.howstuffworks.com CNET.com http://www.cnet.com PC World http://www.pcworld.com ComputerWorld http://www.computerworld.com WIRED NEWS http://www.wired.com eWEEK.com http://www.eweek.com
  • Slide 106 – Q and A
  • Ite pc v40_chapter8

    1. 1. Chapter 8: Networks IT Essentials: PC Hardware and Software v4.0ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
    2. 2. After completing this chapter, you will meet these learning outcomes:  Explain the principles of networking  Describe types of networksITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2
    3. 3. Introduction  Chapter 8 is an overview of network principles, standards, and purposes  It covers the following types of networks: Local Area Network (LAN) Wide Area Network (WAN) Wireless LAN (WLAN)  These topics are covered: Network topologies, protocols, and logical models Hardware needed to create a network Configuration, troubleshooting, and preventive maintenance Network software, communication methods, and hardware relationshipsITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3
    4. 4. Principles of Networking  Networks are systems that are formed by links.  People use different types of networks every day: Mail delivery system Telephone system Public transportation system Corporate computer network The Internet  Computers can be linked by networks to share data and resources.  A network can be as simple as two computers connected by a single cable or as complex as hundreds of computers connected to devices that control the flowITE PC v4.0 of information.Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4
    5. 5. Computer Networks  Network devices include: Desktop and laptop computers Printers and scanners PDAs and Smartphones File and print servers  Resources shared across networks include: Services, such as printing or scanning Storage devices, such as hard drives or optical drives Applications, such as databases  Different types of network media: Copper cabling Fiber-optic cabling Wireless connectionITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5
    6. 6. Benefits of Networking  Fewer peripherals needed  Increased communication capabilities  Avoid file duplication and corruption  Lower cost licensing  Centralized administration  Conserve resourcesITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6
    7. 7. ADVANTAGES & DISADVANTAGE OF NETWORKING NETWORKING AKTIVITY CON PRO Networks have to be administered Centralized backup of data Peripherals can be shared Networks allow group access to documents Can be difficult to troubleshootITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 7
    8. 8. ADVANTAGES & DISADVANTAGE OF NETWORKING NETWORKING AKTIVITY CON PRO Networks have to be administered √ Centralized backup of data √ Peripherals can be shared √ Networks allow group access to documents √ Can be difficult to troubleshoot √ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 8
    9. 9. Types Of NetworksITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9
    10. 10. Types of Networks A computer network is identified by:  The type of media used to connect the devices  The type of networking devices used  How the resources are managed  How the network is organized  How the data is stored  The area it servesITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10
    11. 11. Local Area Network (LAN)  A group of interconnected computers that is under the same administrative control.  Can be as small as a single local network installed in a home or small office.  Can consist of interconnected local networks consisting of many hundreds of hosts, installed in multiple buildings and locations.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11
    12. 12. Wide Area Network (WAN)  A WAN connects LANs in geographically separated locations.  A WAN covers a much larger area than a LAN. The Internet is a large WAN.  Telecommunications service providers (TSP) are used to interconnect these LANs at different locations.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
    13. 13. Wireless LAN (WLAN)  Wireless devices are used to transmit and receive data using radio waves.  Wireless devices connect to access points within a specified area.  Access points connect to the network using copper cabling.  WLAN coverage can be limited to the area of a room, or can have greater range.  You can share resources such as files and printers, and access the Internet on a WLAN.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13
    14. 14. Peer-to-Peer Networking  Share files, send messages, and print to a shared printer.  Each computer has similar capabilities and responsibilities.  Each user decides which data and devices to share.  No central point of control in the network.  Best if there are ten or fewer computers.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14
    15. 15. Disadvantages of Peer-to-Peer  Without centralized network administration, it is difficult to determine who controls network resources.  Without centralized security, each computer must use separate security measures for data protection.  More complex and difficult to manage as the number of computers on the network increases.  Without centralized data storage, data backups must be performed by users.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15
    16. 16. Client/Server Network  Client/server network model provides security and control for the network.  Client requests information or services from the server.  Server provides the requested information or service.  Servers are maintained by network administrators. Data backups and security measures Control of user access to network resources  Centralized storage and services include: Data stored on a centralized file server Shared printers managed by a print server Users have proper permissions to access data or printersITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16
    17. 17. Summary TYPES OF NETWORK 1. This type of network uses access points and wireless NIC for connectivity 2. This type of network uses many technologies to connect distant networks 3. This type of network uses cable connections in a single administrative group 4. This type of network are provides security and control for the network. 5. No central point of control in the network.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 17
    18. 18. TYPES OF NETWORK  This type of network uses access points and wireless NIC for connectivity WLAN  This type of network uses many technologies to connect distant networks WAN  This type of network uses cable connections in a single administrative group LAN  This type of network are provides security and control for the network. CLIENT/SERVER  No central point of control in the network. PEER-TO-PEERITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 18
    19. 19. Networking Concepts and Technologies  A computer technician is required to configure and troubleshoot computers on a network.  A computer technician should understand IP addressing, protocols, and other network concepts.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 19
    20. 20. Bandwidth  amount of data that can be transmitted within a fixed time period  measured in bits per second and is usually denoted by the following: bps - bits per second Kbps - kilobits per second Mbps - megabits per secondITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 20
    21. 21. Three Modes of Transmission Data is transmitted in one of three modes:  Simplex (Unidirectional transmission) is a single, one-way transmission. Example: The signal sent from a TV station to your TV.  Half-duplex allows data to flow in one direction at a time. Simultaneous transmission in two directions is not allowed. Example: Two-way radios, police or emergency mobile radios  Full-duplex allows data to flow in both directions at the same time. Bandwidth is measured in only one direction. 100 Mbps full-duplex means a bandwidth of 100 Mbps in each direction. Broadband technologies, such as digital subscriber line (DSL) and cable, operate in full-duplex mode.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 21
    22. 22. IP Address  An IP address is a unique number that is used to identify a network device.  An IP address is represented as a 32-bit binary number, divided into four octets (groups of eight bits): Example: 10111110.01100100.00000101.00110110  An IP address is also represented in a dotted decimal format. Example: 190.100.5.54  When a host is configured with an IP address, it is entered as a dotted decimal number, such as 192.168.1.5.  Unique IP addresses on a network ensure that data can be sent to and received from the correct network device.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 22
    23. 23. IP Address Classes  Class A Large networks, implemented by large companies and some countries  Class B Medium-sized networks, implemented by universities  Class C Small networks, implemented by ISP for customer subscriptions  Class D Special use for multicasting  Class E Used for experimental testingITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 23
    24. 24. Subnet Masks  Used to indicate the network portion of an IP address  Is a dotted decimal number  Usually, all hosts within a broadcast domain of a LAN (bounded by routers) use the same subnet mask.  The default subnet masks for three classes of IP addresses: 255.0.0.0 is the subnet mask for Class A 255.255.0.0 is the subnet mask for Class B 255.255.255.0 is the subnet mask for Class C  If an organization owns one Class B network but needs to provide IP addresses for four LANs, the organization will subdivide the Class B network into four smaller parts by using subnetting, which is a logical division of a network. The subnet mask specifies how it is subdivided.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 24
    25. 25. GAMES N S T E B U A K M S S E E N T I T N R C O P O R T O L X S I L E P M L H A F P X D L U E L U L F L D X P U E N D W H B A D T IITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 25
    26. 26. Summary  The Internet is an example of which type of network? A. LAN B. SAN C. WAN D. WLANITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 26
    27. 27.  What is the suggested maximum number of PCs in a peer-to- peer network? A. 10 B. 25 C. 50 D. 100ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 27
    28. 28.  Which method of data transfer allows information to be sent and receive at the same time? A. full duplex B. half duplex C. multiplex D. simplexITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 28
    29. 29.  Which dotted decimal number is used to distinguish the network portion of an IP address from the host portion? A. default gateway B. MAC address C. physical address D. subnet maskITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 29
    30. 30. IP Address Configuration  Manual configuration Manually configure each device with the proper IP address and subnet mask.  Dynamic configuration A Dynamic Host Configuration Protocol (DHCP) server automatically assigns IP addresses to network hosts.  Network Interface Card (NIC) is the hardware that enables a computer to connect to a network and it has two addresses: The IP address is a logical address that can be changed. The Media Access Control (MAC) address is "burned-in" or permanently programmed into the NIC when manufactured. The MAC address cannot be changed.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 30
    31. 31. Dynamic Host Configuration Protocol (DHCP)  DHCP automatically provides computers with an IP address.  The DHCP server can assign these to hosts: IP address Subnet mask Default gateway Domain Name System (DNS) server addressITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 31
    32. 32. DHCP Process and Advantages DHCP process: 2. DHCP server receives a request from a host. 3. Server selects IP address information from a database. 4. Server offers the addresses to requesting host. 5. If the host accepts the offer, the server leases the IP address for a specific period of time. Advantages of DHCP:  Simplifies the administration of a network  Reduces the possibility of assigning duplicate or invalid addressesITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 32
    33. 33. Configure Host to Use DHCP Configure the host to "Obtain an IP address automatically" in the TCP/IP properties of the NIC configuration windowITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 33
    34. 34. Internet Protocols  A protocol is a set of rules.  Internet protocols are sets of rules governing communication within and between computers on a network.  Many protocols consist of a suite (or group) of protocols stacked in layers. These layers depend on the operation of the other layers in the suite to function properly.  The main functions of protocols: Identifying errors Compressing the data Deciding how data is to be sent Addressing data Deciding how to announce sent and received dataITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 34
    35. 35. Common Network Protocols Protocols used for browsing the web, sending and receiving e-mail, and transferring data files Description TCP/IP A protocol used to transport data on the Internet. NETBEUI A small, fast protocol designed for a workgroup network that NETBIOS requires no connection to the Internet. IPX and A protocol used to transport data on a Novell Netware network. SPX HTTP and A protocol that defines how files are exchanged on the Web. HTTPS FTP A protocol that provides services for file transfer and manipulation. SSH A protocol that is used to connect computers together securely. Telnet A protocol that uses a text-based connection to a remote computer. POP A protocol used to download email messages from an email server. IMAP A protocol used to download email messages from an email server. SMTP A protocol used to send mail in a TCP/IP network.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 35
    36. 36. Internet Control Message Protocol (ICMP)  Internet Control Message Protocol (ICMP) is used by devices on a network to send control and error messages to computers and servers.  PING (Packet Internet Groper) is a simple command line utility used to test connections between computers Used to determine whether a specific IP address is accessible. Used with either the hostname or the IP address. Works by sending an ICMP echo request to a destination computer. Receiving device sends back an ICMP echo reply message.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 36
    37. 37. Ping Command Switches These command line switches (options) can be used with the ping command.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 37
    38. 38. Output of the Ping Command  Four ICMP echo requests (pings) are sent to the destination computer to determine the reliability and reachability of the destination computer.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 38
    39. 39. Physical Network Components  Network devices: Computers Hubs Switches Routers Wireless access points  Network media: Twisted-pair copper cabling Fiber-optic cabling Radio wavesITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 39
    40. 40. Hubs  Extend the range of a signal by receiving then regenerating it and sending it out all other ports  Traffic is sent out all ports of the hub  Allow a lot of collisions on the network segment and are often not a good solution  Also called concentrators because they serve as a central connection point for a LANITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 40
    41. 41. Bridges and Switches  A packet, along with its MAC address information, is called a frame.  LANs are often divided into sections called segments bounded by bridges.  A bridge has the intelligence to determine if an incoming frame is to be sent to a different segment, or dropped. A bridge has two ports.  A switch (multiport bridge) has several ports and refers to a table of MAC addresses to determine which port to use to forward the frame.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 41
    42. 42. Routers  Routers are devices that connect entire networks to each other. Use IP addresses to forward packets to other networks. Can be a computer with special network software installed. Can be a device built by network equipment manufacturers. Contain tables of IP addresses along with optimal routes to other networks.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 42
    43. 43. Wireless Access Points  Provide network access to wireless devices such as laptops and PDAs.  Use radio waves to communicate with radios in computers, PDAs, and other wireless access points.  Have limited range of coverage.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 43
    44. 44. Multipurpose Devices  Perform more than one function.  More convenient to purchase and configure just one device.  Combines the functions of a switch, a router and a wireless access point into one device.  The Linksys 300N is an example of a multipurpose device.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 44
    45. 45. Twisted-Pair Cabling  A pair of twisted wires forms a circuit that transmits data.  The twisted wires provide protection against crosstalk (electrical noise) because of the cancellation effect. Pairs of copper wires are encased in color-coded plastic insulation and twisted together. An outer jacket, called poly-vinyl chloride (PVC), protects the bundles of twisted pairs.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 45
    46. 46. Two Basic Types of Twisted-Pair Cables  Unshielded twisted-pair (UTP) Has two or four pairs of wires Relies on the cancellation effect for reduction of interference caused by electromagnetic interface (EMI) and radio frequency interference (RFI) Most commonly used cabling in networks Has a range of 328 ft (100 meters)  Shielded twisted-pair (STP) Each pair is wrapped in metallic foil to better shield the wires from electrical noise and then the four pairs of wires are then wrapped in an overall metallic braid or foil. Reduces electrical noise from within the cable. Reduces EMI and RFI from outside the cable.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 46
    47. 47. Category Rating  UTP comes in several categories that are based on two factors: The number of wires in the cable The number of twists in those wires  Category 3 is used for telephone connections.  Category 5 and Category 5e have are the most common network cables used.  Category 6 cable has higher data rate than the Cat 5 cables.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 47
    48. 48. Coaxial Cable  A copper-cored network cable surrounded by a heavy shielding  Types of coaxial cable: Thicknet or 10Base5 - Coax cable that was used in networks and operated at 10 megabits per second with a maximum length of 500 m Thinnet or 10Base2 - Coax cable that was used in networks and operated at 10 megabits per second with a maximum length of 185 m RG-59 - Most commonly used for cable television in the US RG-6 - Higher quality cable than RG-59 with more bandwidth and less susceptibility to interferenceITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 48
    49. 49. Fiber-Optic Cable  A glass or plastic strand that transmits information using light and is made up of one or more optical fibers enclosed together in a sheath or jacket.  Not affected by electromagnetic or radio frequency interference.  Signals are clearer, can go farther, and have greater bandwidth than with copper cable.  Usually more expensive than copper cabling and the connectors are more costly and harder to assemble.  Two types of glass fiber-optic cable: Multimode and Single-modeITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 49
    50. 50. Two Types of LAN Topologies Physical topology is the physical layout of the components on the network Logical topology determines how the hosts access the medium to communicate across the networkITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 50
    51. 51. LAN Physical Topologies A physical topology defines the way in which computers, printers, and other devices are connected to a network.  Bus  Ring  Star  Hierarchical star  MeshITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 51
    52. 52. Bus Topology  Each computer connects to a common cable  Cable connects one computer to the next  Ends of the cable have a terminator installed to prevent signal reflections and network errors  Only one computer can transmit data at a time or frames will collide and be destroyed  Bus topology is rarely used today. Possibly suitable for a home office or small business with few hostsITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 52
    53. 53. Ring Topology  Hosts are connected in a physical ring or circle.  The ring has no beginning or end, so the cable does not need to be terminated.  A special frame, a token, travels around the ring, stopping at each host.  The advantage of a ring topology is that there are no collisions.  There are two types of ring topologies: Single-ring and Dual-ringITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 53
    54. 54. Star Topology  Has a central connection point: a hub, switch, or router  Hosts connect directly to the central point with a cable  Costs more to implement than the bus topology because more cable is used, and a central device is needed  Easy to troubleshoot, since each host is connected to the central device with its own wire.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 54
    55. 55. Hierarchical or Extended Star Topology  A star network with an additional networking device connected to the main networking device to increase the size of the network.  Used for larger networksITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 55
    56. 56. Mesh Topology  Connects all devices to each other  Failure of any cable will not affect the network  Used in WANs that interconnect LANs  Expensive and difficult to install because of the amount of cable needed  The Internet is an example of a mesh topology  Often used by governments when data must be available in the event of a partial network failureITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 56
    57. 57. Logical Topologies The two most common types of logical topologies are broadcast and token passing.  In a broadcast topology, there is no order that the hosts must follow to use the network – it is first come, first served for transmitting data on the network.  Token passing controls network access by passing an electronic token sequentially to each host. When a host receives the token, it can send data on the network. If the host has no data to send, it passes the token to the next host and the process repeats itself.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 57
    58. 58. Summary  Which network component that extend the range of a signal by receiving then regenerating it and sending it out all other ports? A. Hubs B. Switch C. Router D. Wireless Access PointITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 58
    59. 59.  Which cable type is a common choice for use on Ethernet networks? A. thick coax B. thin coax C. STP D. UTPITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 59
    60. 60. • Which cable has signals clearer, can go farther, and have greater bandwidth than with copper cable A. UTP B. STP C. fiber-optic cable D. coaxial cableITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 60
    61. 61.  Gives 5 types of LAN physical topologiesITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 61
    62. 62. LAN Architecture  Is the overall structure of a computer or communication system.  Designed for a specific use and have different speeds and capabilities.  Describes both the physical and logical topologies used in a network.  The three most common LAN architectures: Ethernet Token Ring Fiber-Distributed Data Interface (FDDI)ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 62
    63. 63. Ethernet  Based on the IEEE 802.3 standard, which specifies that a network use the Carrier Sense Multiple Access with the Collision Detection (CSMA/CD) access control method. Hosts access the network using the first come, first served broadcast topology method to transmit data.  Standard transfer rates 10 Mbps (Ethernet) “10Base-T” 100 Mbps (FastEthernet) “100Base-T” 1000 Mbps = 1 Gbps (Gigabit Ethernet) “1000Base-T”ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 63
    64. 64. Token Ring  Reliable network architecture  Originally developed by IBM  Based on the token-passing access control method  Often integrated with IBM mainframe systems  Used with smaller computers and mainframes  Physically, a star-wired ring because the outer appearance of the network design is a star  Inside the device, wiring forms a circular data path, creating a logical ringITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 64
    65. 65. Fiber Distributed Data Interface (FDDI)  A type of Token Ring network  Often used for LANs, connecting several buildings in an office complex or on a university campus  Runs on fiber-optic cable  High-speed performance combined with token-passing advantage  Runs at 100 Mbps with a primary and secondary ring topology  Normally, traffic flows only on the primary ring and uses a secondary ring is a backup.  FDDI dual ring supports up to 500 computers per ringITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 65
    66. 66. Standards Organizations Name Type Standards Established ITU Telecommunication one of the three Sectors of Standards covering all Became ITU-T in ITU-T Standardization Sector the International fields of 1992 (formerly CCITT) Telecommunication Union telecommunications Standards for the Institute of Electrical and A non-profit, technical IEEE Electronics Engineers professional association computer and electronics 1884 industry International A network of the national Promote the development ISO Organization for standards institutes of 157 of international standards 1947 Standardization countries agreements Oversees the technical Internet Architecture A committee; an advisory and engineering 1979; first named IAB Board body development of the ICCB Internet International Standards for all IEC Electrotechnical Global organization electrical, electronic, and 1906 Commission related technologies American National Private, non-profit Seeks to establish ANSI Standards Institute organization consensus among groups 1918 Telecommunications After the Industry Association / Standards for voice and deregulation of theTIA/EIA Electronic Industries Trade associations data wiring for LANs U.S. telephoneITE PC v4.0 Alliance industry in 1984Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 66
    67. 67. Summary • LAN architectures is the overall structure of a computer or communication system A. True B. FalseITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 67
    68. 68.  Which LAN architectures used with smaller computers and mainframes A. Ethernet B. Token Ring C. Fiber-Distributed Data Interface (FDDI)ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 68
    69. 69. “Standards for the computer and electronics industry” This standard refer to: A. IEEE B. ISO C. ANSI D. AIBITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 69
    70. 70. Ethernet Standards Ethernet protocols describe the rules that control how communication occurs on an Ethernet network.  The 802.2 standard defines how a device addresses other devices on the medium.  The 802.3 standard defines the methodology that devices must use when they use the media.  The 802.11x standards define how wireless devices communicate using radio waves.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 70
    71. 71. Cabled Ethernet Standards  IEEE 802.3 Ethernet standard specifies that a network implement the CSMA/CD access control method.  In CSMA/CD operation: All end stations "listen" to the network wire for clearance to send data. When the end station detects that no other host is transmitting, the end station will attempt to send data. If no other station sends any data at the same time, this transmission will arrive at the destination computer successfully. If another end station transmits at the same time, a collision will occur on the network media. The first station that detects the collision, sends out a jam signal to tell all stations to stop transmitting and to run a backoff algorithm. All stations stop transmitting and re-try after a random period of time.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 71
    72. 72. 10BASE-T  10BASE-T is an Ethernet technology that uses a star topology. The ten (10) represents a speed of 10 Mbps. BASE represents baseband transmission. The T represents twisted-pair cabling.  Advantages of 10BASE-T: Installation is inexpensive compared to fiber-optic installation. Cables are thin, flexible, and easier to install than coaxial cabling. Equipment and cables are easy to upgrade.  Disadvantages of 10BASE-T: The maximum length for a 10BASE-T segment is 328 ft (100 m). Cables are susceptible to Electromagnetic Interference (EMI).ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 72
    73. 73. 100BASE-TX “FastEthernet”  Has a theoretical bandwidth of 100 Mbps.  The "X" indicates different types of copper and fiber-optic can be used.  Advantages of 100BASE-TX: Transfer rates of 100BASE-TX are ten times that of 10BASE-T 100BASE-X uses twisted-pair, inexpensive and easy to install  Disadvantages of 100BASE-TX: Maximum length for a 100BASE-TX segment is 329 ft (100 m). Cables are susceptible to Electromagnetic Interference (EMI).ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 73
    74. 74. 1000BASE-TX “Gigabit Ethernet”  Advantages of 1000BASE-T: 1 Gbps is ten times faster than Fast Ethernet and 100 times faster than Ethernet. Increased speed makes it possible to implement bandwidth- intensive applications, such as live video. The 1000BASE-T architecture has interoperability with 10BASE- T and 100BASE-TX.  Disadvantages of 1000BASE-T: Maximum length for a 1000BASE-T segment is 328 ft (100 m). It is susceptible to interference. Gigabit NICs and Switches are expensive. Additional equipment is required.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 74
    75. 75. Wireless Ethernet Standards  IEEE 802.11 is the standard that specifies connectivity for wireless networks.  Wi-Fi (wireless fidelity), refers to the 802.11 family 802.11 (the original specification) 802.11b 802.11a 802.11g 802.11n These protocols specify the frequencies, speeds, and other capabilities of the different Wi-Fi standards.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 75
    76. 76. IEEE 802.11a WLAN Standard  Allows data rates as high as 54 Mbps  Devices operate in the 5 GHz radio frequency range  Avoids some interference issues of 802.11b  802.11a is not backward compatible to 802.11b  Dual mode wireless NICs are available  802.11a has a range of approximately 100 ft (30 m)ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 76
    77. 77. IEEE 802.11b WLAN Standard  Operates in the 2.4 GHz frequency range  Maximum theoretical data rate of 11 Mbps, but typically about 6.5 Mbps  Average range of approximately 100 ft (30 m) at 11 Mbps and 295 ft (90 m) at 1 Mbps  Range fluctuates depending on the operational speed.  Signal quality dictates the operational speed of 802.11b.  Bluetooth devices, cordless phones, and even microwave ovens operate in the 2.4 GHz band, possibly causing interference.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 77
    78. 78. IEEE 802.11g and 802.11n  802.11g Allows data rates as high as 54 Mbps Operates in the same 2.4 GHz spectrum as 802.11b 802.11g is backward compatible with 802.11b Interoperability among all speeds (a, b, g) exists Average range of approximately 100 ft (30 m)  802.11n Has a theoretical bandwidth of 540 Mbps Operates in either the 2.4 GHz or 5 GHz frequency range Maximum range of 164 ft (50 m) Expected approval for 802.11n is April 2008 or earlierITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 78
    79. 79. Wireless Ethernet Standards Bandwidth Frequency Range Interoperability Not interoperable with 100 feet 802.11a Up to 54 Mbps 5 GHz band (30 meters) 802.11b, 802.11g, or 802.11n 100 feet Interoperable with 802.11b Up to 11 Mbps 2.4 GHz band (30 meters) 802.11g 100 feet Interoperable with 802.11g Up to 54 Mbps 2.4 GHz band (30 meters) 802.11b 802.11n 164 feet Interoperable with Up to 540 Mbps 2.4 GHz band (Pre-standard) (50 meters) 802.11b and 802.11g 2.4 GHz band 802.15.1 Up to 2 Mbps or 5 GHz 30 feet Not interoperable with Bluetooth (10 meters) any other 802.11 bandITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 79
    80. 80. OSI and TCP/IP Data Models  Architectural model Separates functions of protocols into manageable layers Each layer performs a specific function in network communication  TCP/IP model A four-layer model that explains the TCP/IP suite of protocols TCP/IP is the dominant standard for transporting data across networks  Open Systems Interconnect (OSI) model Standards defining how devices communicate on a network Ensures interoperability between network devicesITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 80
    81. 81. The TCP/IP Reference Model  Frame of reference used to develop the Internets protocols  Consists of layers that perform functions necessary to prepare data for transmission over a network Description Protocols HTTP, HTML, Provides network services to user Application applications Telnet, FTP, SMTP, DNS Provides end-to-end management of data Transport and divides data into segments TCP, UDP Provides connectivity between hosts in the Internet network IP, ICMP, RIP, ARP Network Describes the standards that hosts use to Access access the physical mediaITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 81
    82. 82. The OSI Model  The OSI model is an industry standard framework that is used to divide network communications into seven layers.  Although other models exist, most network vendors today build their products using this framework.  A protocol stack is a system that implements protocol behavior using a series of layers. Protocol stacks can be implemented either in hardware or software, or in a combination of both. Typically, only the lower layers are implemented in hardware, and the higher layers are implemented in software.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 82
    83. 83. The OSI Model Layer Description Application 7 Responsible for network services to applications Transforms data formats to provide a standard interface Presentation 6 for the Application layer Establishes, manages and terminates the connections Session 5 between the local and remote application Provides reliable transport and flow control across a Transport 4 network Responsible for logical addressing and the domain of Network 3 routing Provides physical addressing and media access Data Link 2 procedures Defines all the electrical and physical specifications for Physical 1 devices Remember the OSI layers with this mnemonic:ITE PC v4.0 "Please Do Not Throw Sausage Pizza Away"Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 83
    84. 84. Compare OSI and TCP/IP ModelsITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 84
    85. 85. Configuring a NIC and a Modem  Install the NIC and the driver. NIC If necessary, download an updated driver from the manufacturer.  Connect the computer to the network.  Also, you may need to install a modem to connect to the Internet. ModemITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 85
    86. 86. Install or Update a NIC Driver  Manufacturers publish new driver software for NICs May enhance the functionality of the NIC May be needed for operating system compatibility  Install a new driver Disable virus protection software Install only one driver at a time Close all applications that are running so that they are not using any files associated with the driver update. Visit the manufacturers website and download a self- extracting executable driver file that will automatically install or update the driverITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 86
    87. 87. Install or Update a NIC Driver  Alternatively, you can click the Update Driver button in the toolbar of the Device Manager.  After updating the driver, reboot the computer.  If a new NIC driver does not perform as expected after it has been installed, the driver can be uninstalled, or rolled back, to the previous driver.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 87
    88. 88. Attach Computer to Existing Network  Plug a network cable into the network port on the computer.  Plug the other end into the network device or wall jack.  After connecting the network cable, look at the LEDs, or link lights, next to the Ethernet port on the NIC.  If there is no activity, you may have to replace a faulty cable, a faulty hub port, or even a faulty NIC to correct the problem.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 88
    89. 89. Configure the NIC  The computer will now need an IP address. If the computer does not acquire an IP address from a DHCP server, you will need to enter a unique IP address in the TCP/IP properties of the NIC. Click Start > Control Panel > Network Connections > Local Area Connection  Every NIC must be configured with the following information: The same protocol must be implemented between any two computers that communicate on the same network. The IP address must be unique to each device and can be configured manually or dynamically. The MAC address is a unique address assigned by the manufacturer and cannot be changed.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 89
    90. 90. What is the Assigned IP Address? If you do not know your IP address yet, use the ipconfig program, to find it.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 90
    91. 91. Test Connectivity Using Ping  Ping your own IP address to make sure your NIC is working properly.  Ping your default gateway or another computer on your network.  Ping a popular website.  If you cannot ping one of these items, you may need to begin troubleshooting.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 91
    92. 92. Modem Installation  A modem is an electronic device that transfers data between one computer and another using analog signals over a telephone line. A transmitting modem converts digital data to analog signals, called modulation. The receiving modem reconverts the analog signals back to digital data, called demodulation.  An internal modem plugs into an expansion slot on the motherboard and a software driver is installed.  External modems connect to a computer through the serial and USB ports and also require a software driver.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 92
    93. 93. Dial-up Networking (DUN)  When computers use the public telephone system to communicate, it is called dial-up networking (DUN).  Modems communicate with each other using audio tone signals. DUN creates a Point-to-Point Protocol (PPP) connection between two computers over a phone line.  After the line connection has been established, a "handshaking sequence" takes place between the two modems and the computers.  The digital signals from the computers must be converted to an analog signal to travel across telephone lines. They are converted back to the digital form, 1s and 0s, by the receiving modem so that the receiving computer can process the data.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 93
    94. 94. AT Commands  AT (“Attention”) Commands - commands for modems Function AT Most modem software uses precedes all modem action commands Attention code that the Hayes-compatible command set. AP Dial the phone number, xxxxxxx, using pulse dialing  The AT commandphoneis usedxxxxxxx, using tonehang up, ATDT xxxxxxx Dial the set number, to issue dial, dialing reset, and other instructions to the modem. ATA Answer the phone immediately ATHO modem user manuals list the AT command set. Most Hang up the phone immediately ATZ Reset the modem to its power up settings  The Standard Hayes compatible code to dial is ATF ATDxxxxxxxReset modem parameters and settings to the factory defaults AT+++ Break the signal, change from data mode to command mode Usually no spaces in an AT string. P Signifies pulse dialing The "x" signifies thetone dialing number dialed. T Signifies Seven digits for a local callmodem will wait for long-distance. W Indicates that the and 11 digitsITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 94
    95. 95. Other Types of Connectivity  Phone, cable, satellite, and private telecommunications companies provide Internet connections.  In the 1990s, low-speed modems used the plain old telephone system (POTS) to send and receive data.  Today, many businesses and home users have switched to high-speed Internet connections, which allows for transmission of data, voice and video.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 95
    96. 96. Integrated Services Digital Network (ISDN)  A standard for sending voice, video, and data over telephone wires.  Provides higher-quality voice and higher-speed data transfer than traditional analog telephone service.  Three services offered by ISDN digital connections: Basic Rate Interface (BRI), Primary Rate Interface (PRI), and Broadband ISDN (BISDN).  ISDN uses two different types of communications channels: "B" channel is used to carry the information - data, voice, or video. "D" channel is usually used for controlling and signaling, but can be used for data.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 96
    97. 97. ISDN Types Type Description ISDN Basic Rate Interface offers a dedicated 128 Kbps connection using two 64 Kbps B channels. ISDN BRI also BRI uses on 16 Kbps D channel for call setup, control, and teardown. ISDN Primary Rate Interface offers up to 1.544 Mbps over 23 B channels in North America and Japan or 2.048 Mbps PRI over 30 B channels in Europe and Australia. ISDN PRI also uses one D channel for call maintenance. Broadband ISDN manages different types of service all at BISDN the same time. BISDN is mostly used only in network backbones.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 97
    98. 98. Digital Subscriber Line (DSL)  An "always-on" technology; there is no need to dial up each time to connect to the Internet.  Uses the existing copper telephone lines to provide high-speed data communication between end users and telephone companies.  Asymmetric DSL (ADSL) is currently the most commonly used DSL technology. Has a fast downstream speed, typically 1.5 Mbps. Upload rate of ADSL is slower. Not the best solution for hosting a web server or FTP server.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 98
    99. 99. DSL Types Type Description Asymmetric DSL is most common. Downstream speed from ADSL 384 Kbps to 6 Mbps. Upstream speeds lower than downstream speeds. High Data Rate DSL provides equal bandwidth in both HDSL directions. Symmetric DSL provides the same speed, up to 3 Mbps, for SDSL uploads and downloads Very High Data Rate DSL is capable of bandwidths between 13 VDSL and 52 Mbps downstream, and 16 Mbps upstream. ISDN DSL is DSL over ISDN lines. Uses ordinary phone lines. IDSL Requires ISDN adaptersITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 99
    100. 100. Power Line Communication (PLC)  Uses power distribution wires (local electric grid) to send and receive data.  May be available in areas without any other service.  Is faster than an analog modem.  May cost less than other high-speed connections.  Will become more common in time.  Can be used in a home or office environment through an electrical outlet.  Can control lighting and appliances.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 100
    101. 101. Broadband Connectivity  Broadband is a technique used to transmit and receive multiple signals using multiple frequencies over one cable.  Broadband uses a wide range of frequencies that may be further divided into channels.  Some common broadband network connections include: Cable Digital Subscriber Line (DSL) Integrated Services Digital Network (ISDN) SatelliteITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 101
    102. 102. Cable Modem  A cable modem connects your computer to the cable company using the same coaxial cable that connects to your cable television. You can connect the computer directly into the cable modem. You can connect a router, switch, hub, or multipurpose network device so multiple computers can share the Internet connection.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 102
    103. 103. DSL Modem and Filter  Voice and data signals are carried on different frequencies on the copper telephone wires.  A filter is used to prevent DSL signals from interfering with phone signals. Plug the filter into a phone jack and plug the phone into the filter.  The DSL modem does not need a filter. A DSL modem can connect directly to your computer, or it can be connected to a networking device to share the Internet connection between multiple computers.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 103
    104. 104. A Typical ISDN Connection  ISDN uses multiple channels and can carry voice, video, and data; therefore, it is considered a type of broadband.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 104
    105. 105. Broadband Satellite  Uses a satellite dish for two-way communication.  Download speeds are typically up to 500 Kbps, while uploads are closer to 56 Kbps.  People in rural areas often use satellite broadband because it is a faster connection than dial-up and no other broadband connection may be available.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 105
    106. 106. Voice over IP (VoIP)  Is a method used to carry telephone calls over data networks and the Internet.  Converts the analog signals of voices into digital information that is transported in IP packets.  Can also use an existing IP network to provide access to the public switched telephone network (PSTN).  Depends on a reliable Internet connection. When a service interruption occurs the user cannot make phone calls.ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 106
    107. 107. Voice over IP (VoIP)ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 107
    108. 108. Chapter 8 Summary  The fundamentals of networking  The benefits of a network  The ways to connect computers to a network  The different aspects of troubleshooting a network  How to analyze problems and implement simple solutionsITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 108
    109. 109. Additional Resources  Telecommunication Standardization Sector of the International Telecommunications Union (ITU-T) http://www.itu.int/ITU-T/  Institute of Electrical and Electronics Engineers (IEEE) http://www.ieee.org/  International Organization for Standardization (ISO) http://www.iso.ch/iso/  Internet Architecture Board (IAB) http://www.iab.org/  International Electrotechnical Commission (IEC) http://www.iec.ch/  American National Standards Institute (ANSI) http://www.ansi.org/  Telecommunications Industry Association (TIA) http://www.tiaonline.org/  Electronic Industries Alliance (EIA) http://www.eia.org/ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 109
    110. 110. Q and AITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 110
    111. 111. ITE PC v4.0Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 111
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×