• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Sem 1 Ch 2
 

Sem 1 Ch 2

on

  • 358 views

 

Statistics

Views

Total Views
358
Views on SlideShare
358
Embed Views
0

Actions

Likes
0
Downloads
6
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Sem 1 Ch 2 Sem 1 Ch 2 Presentation Transcript

    • CCNA 1 v3.0 Module 2 Networking Fundamentals
    • Objectives
    • Networking Devices Network devices End user devices
    • Network Topology PHYSICAL AND LOGICAL Most common Logical Topologies are Broadcast & Token ring
    • NETWORK PROTOCOLS
      • How physical network is built
      • How computers connect to the network
      • How data is formatted for transmission
      • How data is sent
      • How to deal with errors
    • Network Protocols
    • LOCAL AREA NETWORKS
      • LAN components
      • Computers
      • NICs
      • Peripheral devices
      • Networking Media
      • Networking devices
      • LAN Technologies
      • Ethernet
      • Token Ring
      • FDDI
    • Local-area Networks (LANs)
    •  
    • Wide-area Networks (WANs)
    • Data Networks
    • SANs
      • Moves data between Server and Storage resources.Allows high speed connectivity for
      • Server to storage
      • Server to server
      • Storage to storage
      • PERFORMANCE-AVAILIBILITY-SCALABILITY
    • Storage - Area Networks (SANS) Performance – SANs enable concurrent access of disk or tape arrays by two or more servers at high speeds. Availability – SANs have disaster tolerance built in, because data can be mirrored using a SAN up to 10 kilometers (km) or 6.2 miles away. Scalability – Like a LAN/WAN, it can use a variety of technologies.
    • Virtual Private Networks (VPN s ) A private network constructed within a public network infrastructure. Using VPN, a Telecommuter can remotely access the network of company H/Qs.Through Internet secure Tunnel is built Between PC of Telecommuter and Router at Company H/Qs. VPNs offers secure, reliable over shared public network while maintaining same security and management policies as a private network.
    • Intranet and Extranet VPN Intranetwebserver
    • Importance of Bandwidth
    • Bandwidth Pipe Analogy
    • Bandwidth Highway Analogy
    • Bandwidth Measurements
    • Bandwidth Limitations
    • Bandwidth > Throughput
    • Digital Transfer Calculation
    • EXAMPLE Which would take less time? 1-Sending a floppy disk (1.44 MB) full of data over an ISDN BRI Line OR 2-Sending a 10GB hard drive full of data over an OC-48 line
    • EXAMPLE ( Cont…..) T = S/BW 1- S= 1.44 MB, BW=128 Kb Thus time = 1.44 x 1000 K Bytes x 8 Bits / 128 Kbps = 90 Seconds 2- S= 10 GB, BW= 2.488320 Gbps Thus time = 10 G Bytes x 8 Bits/ 2.488320 Gbps = 32.15 Seconds
    • Using Layers to Describe Data Communication
    • OSI Model
    • OSI Layers
    • OSI Layers
      • Provides reliable transfer of data across media
      • Provides physical/flat address
    • OSI Layers
    • OSI Layers
    • OSI Layers
    • OSI Layers
    • OSI Layers
    • Peer-to-Peer Communication
    • TCP/IP Model
    •  
    • Encapsulation
    • Names for Data at Each Layer
    • Summary