SlideShare a Scribd company logo
1 of 26
UNIVERSITY OF PERPETUAL HELP SYSTEM
Networking & Communications
1 - Lecture
Topic 1: Introduction to Networking
Objectives
Students completing this module should be able to perform
tasks related to the following:
• Understand the physical connection that has to take place
for a computer to connect to the Internet
• Recognize the components that comprise the computer
• Install and troubleshoot network interface cards and modems
• Use basic testing procedures to test the Internet
connection
• Demonstrate a basic understanding of the use of Web
browsers and plug-ins
• Recognize the Base 10, Base 2, and Base 16 number systems
• Perform 8-bit binary to decimal and decimal to 8-bit binary
conversions
• Perform simple conversions between decimal, binary, and
hexadecimal numbers
• Recognize the binary representation of IP addresses and
Requirements for Internet
Connection
A physical connection is made by connecting a
specialized expansion card such as a modem or a
network interface card (NIC) from a computer
(PC) to a network.
The logical connection uses standards called
protocols.
The application that interprets the data and
displays the information in an understandable
form is the last part of the connection.
PC Basics - Small, Discrete
Components
• Transistor – Device that amplifies
a signal or opens and closes a
circuit.
• Integrated circuit (IC) – Device
made of semiconductor material that
contains many transistors and
performs a specific task.
• Resistor – Device made of material
that opposes the flow of electric
current.
• Capacitor – Electronic component
that stores energy in the form of
an electrostatic field that
consists of two conducting metal
plates separated by an insulating
material.
• Connector – The part of a cable
that plugs into a port or
PC Basics
• The motherboard is the main circuit
board of your computer and is also known
as the mainboard or logic board.
• A network processor is an integrated
circuit which has a feature set
specifically targeted at the networking
application domain.
PC Basics
An expansion slot refers to any of the slots on
a motherboard that can hold an expansion card to expand
the computer's functionality, like a video card, network card,
or sound card.
Network Interface Cards
A network interface card (NIC) is a hardware
component without which a computer cannot be
connected over a network.
NIC and Modem Installation
When selecting a NIC, consider the
following factors:
• Protocols – Ethernet, Token Ring,
or FDDI
• Types of media – Twisted-pair,
coaxial, wireless, or fiberoptic
• Type of system bus – PCI or ISA
• A modem, or modulator/demodulator,
is a device that provides the
computer with connectivity to a
telephone line.
High-Speed and Dialup Connectivity
TCP/IP Description and
Configuration
Testing Connectivity with Ping
The ping command
works by sending
multiple IP packets
to a specified
destination. Each
packet sent is a
request for a reply.
Web Browser and Plug-Ins
• plug-in applications -
These applications work
in conjunction with the
browser to launch the
program required to
view the following
special files:
• Flash – plays
multimedia files,
which was created by
Macromedia Flash
• Quicktime – plays
video files, which
was created by Apple
Troubleshooting Internet
Connections
Binary Number System
The American Standard Code for Information
Interchange (ASCII) is the most commonly
used code for representing alpha-numeric
data in a computer
Bits and Bytes
Base 10 (Decimal) Numbers
• The decimal number system is based on powers of
10.
• Each column position of a value, from right to
left, is multiplied by the number 10, which is the
base number, raised to a power, which is the
exponent.
• The power that 10 is raised to depends on its
Base 2 (Binary) Numbers
• Binary number is a number expressed in the
base-2 numeral system or binary numeral
system, which uses only two symbols:
typically "0" (zero) and "1" (one).
• 101102 = (1 x 24 = 16) + (0 x 23 = 0) + (1
x 22 = 4) + (1 x 21 = 2) + (0 x 20 = 0) =
Converting Decimal numbers to 8-bit
Binary Numbers
Converting 8-bit Binary Numbers to
Decimal Numbers
Four-Octet Dotted-decimal
Representation of 32-Bit Binary
Numbers
Currently, (IP) addresses assigned to
computers on the Internet are 32-bit binary
numbers.
To make it easier to work with these
addresses, the 32-bit binary number is broken
into a series of decimal numbers.
To do this, split the binary number into four
groups of eight binary digits.
Then convert each group of eight bits, also
Hexadecimal
Hexadecimal
Boolean or Binary Logic
Boolean logic is based on digital circuitry that
accepts one or two incoming voltages.
Based on the input voltages, output voltage is
generated. For the purpose of computers the
voltage difference is associated as two states,
on or off.
These two states are in turn associated as a 1
IP Addresses and Network Masks
• Performing a Boolean AND of the IP address
10.34.23.134 and the subnet mask 255.0.0.0 produces
the network address of this host:
10.34.23.134 00001010.00100010.00010111.10000110
255.0.0.0 11111111.00000000.00000000.00000000
10.0.0.0 00001010.00000000.00000000.00000000
• Converting the result to dotted decimal, 10.0.0.0 is
the network portion of the IP address, when using
the 255.0.0.0 mask.
Summary
Reference/s:
McReynolds S, Networking Basics CCNA 1 Labs and Study Guide
Copyright 2012, Cisco Systems, Inc.
ISBN: 1-58713-187-0
Data Communications and Networking (Fourth Edition)
Online Learning Center, MC Grawhill
By Behrouz A. Forouzan, Sophia Chung Fegan
Copyright 2007
Andrew Tanenbaum. Computer Networks. Fourth Edition.
Pearson Education, Inc., Prentice Hall PTR,
copyright 2003

More Related Content

Similar to Topic 1 - Introduction to Networking.pptx

Lecture 1.1 Introduction to Networking.ppt
Lecture 1.1 Introduction to Networking.pptLecture 1.1 Introduction to Networking.ppt
Lecture 1.1 Introduction to Networking.pptRaidTan
 
what is Networking and types of computer .pptx
what is Networking and types of computer .pptxwhat is Networking and types of computer .pptx
what is Networking and types of computer .pptxtthind
 
Chapter 2 Networking
Chapter 2 NetworkingChapter 2 Networking
Chapter 2 Networkingmlrbrown
 
Network Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICESNetwork Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICESManas Rai
 
Uccn1003 -may10_-_lect01b_-_intro_to_network_devices_addressing
Uccn1003  -may10_-_lect01b_-_intro_to_network_devices_addressingUccn1003  -may10_-_lect01b_-_intro_to_network_devices_addressing
Uccn1003 -may10_-_lect01b_-_intro_to_network_devices_addressingShu Shin
 
Types of Computer Modem
Types of Computer ModemTypes of Computer Modem
Types of Computer ModemDivyaKS12
 
Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)Geethu Jose
 
Unit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptxUnit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptxsahilraturi
 
Power point presentation
Power point presentationPower point presentation
Power point presentationrajasekarsankar
 
Training Report BHARAT ELECTRONICS LIMITED
Training Report BHARAT ELECTRONICS LIMITEDTraining Report BHARAT ELECTRONICS LIMITED
Training Report BHARAT ELECTRONICS LIMITEDHimanshiSingh71
 
Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.Clinton Dsouza
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocolGLIM Digital
 
Unit 2 - Internet Protocol Overview - IT
Unit 2 - Internet Protocol Overview - ITUnit 2 - Internet Protocol Overview - IT
Unit 2 - Internet Protocol Overview - ITDeepraj Bhujel
 
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docxWeek 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docxcockekeshia
 
KL1034 Lect1 Computer assembly.pdf
KL1034 Lect1 Computer assembly.pdfKL1034 Lect1 Computer assembly.pdf
KL1034 Lect1 Computer assembly.pdfSysteDesig
 
Chapter 4-CIM Industrial Communication2.pptx
Chapter 4-CIM Industrial Communication2.pptxChapter 4-CIM Industrial Communication2.pptx
Chapter 4-CIM Industrial Communication2.pptxMohdSyaifuadJasemi
 
Lec0.ppt
Lec0.pptLec0.ppt
Lec0.pptputmy
 

Similar to Topic 1 - Introduction to Networking.pptx (20)

Lecture 1.1 Introduction to Networking.ppt
Lecture 1.1 Introduction to Networking.pptLecture 1.1 Introduction to Networking.ppt
Lecture 1.1 Introduction to Networking.ppt
 
what is Networking and types of computer .pptx
what is Networking and types of computer .pptxwhat is Networking and types of computer .pptx
what is Networking and types of computer .pptx
 
Chapter 2 Networking
Chapter 2 NetworkingChapter 2 Networking
Chapter 2 Networking
 
Network Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICESNetwork Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICES
 
Uccn1003 -may10_-_lect01b_-_intro_to_network_devices_addressing
Uccn1003  -may10_-_lect01b_-_intro_to_network_devices_addressingUccn1003  -may10_-_lect01b_-_intro_to_network_devices_addressing
Uccn1003 -may10_-_lect01b_-_intro_to_network_devices_addressing
 
Types of Computer Modem
Types of Computer ModemTypes of Computer Modem
Types of Computer Modem
 
Nic -cst
Nic -cstNic -cst
Nic -cst
 
Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)
 
Unit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptxUnit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptx
 
Overview of comp system
Overview of comp systemOverview of comp system
Overview of comp system
 
Understanding local area networking
Understanding local area networkingUnderstanding local area networking
Understanding local area networking
 
Power point presentation
Power point presentationPower point presentation
Power point presentation
 
Training Report BHARAT ELECTRONICS LIMITED
Training Report BHARAT ELECTRONICS LIMITEDTraining Report BHARAT ELECTRONICS LIMITED
Training Report BHARAT ELECTRONICS LIMITED
 
Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
Unit 2 - Internet Protocol Overview - IT
Unit 2 - Internet Protocol Overview - ITUnit 2 - Internet Protocol Overview - IT
Unit 2 - Internet Protocol Overview - IT
 
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docxWeek 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
 
KL1034 Lect1 Computer assembly.pdf
KL1034 Lect1 Computer assembly.pdfKL1034 Lect1 Computer assembly.pdf
KL1034 Lect1 Computer assembly.pdf
 
Chapter 4-CIM Industrial Communication2.pptx
Chapter 4-CIM Industrial Communication2.pptxChapter 4-CIM Industrial Communication2.pptx
Chapter 4-CIM Industrial Communication2.pptx
 
Lec0.ppt
Lec0.pptLec0.ppt
Lec0.ppt
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Recently uploaded (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Topic 1 - Introduction to Networking.pptx

  • 1. UNIVERSITY OF PERPETUAL HELP SYSTEM Networking & Communications 1 - Lecture Topic 1: Introduction to Networking
  • 2. Objectives Students completing this module should be able to perform tasks related to the following: • Understand the physical connection that has to take place for a computer to connect to the Internet • Recognize the components that comprise the computer • Install and troubleshoot network interface cards and modems • Use basic testing procedures to test the Internet connection • Demonstrate a basic understanding of the use of Web browsers and plug-ins • Recognize the Base 10, Base 2, and Base 16 number systems • Perform 8-bit binary to decimal and decimal to 8-bit binary conversions • Perform simple conversions between decimal, binary, and hexadecimal numbers • Recognize the binary representation of IP addresses and
  • 3. Requirements for Internet Connection A physical connection is made by connecting a specialized expansion card such as a modem or a network interface card (NIC) from a computer (PC) to a network. The logical connection uses standards called protocols. The application that interprets the data and displays the information in an understandable form is the last part of the connection.
  • 4. PC Basics - Small, Discrete Components • Transistor – Device that amplifies a signal or opens and closes a circuit. • Integrated circuit (IC) – Device made of semiconductor material that contains many transistors and performs a specific task. • Resistor – Device made of material that opposes the flow of electric current. • Capacitor – Electronic component that stores energy in the form of an electrostatic field that consists of two conducting metal plates separated by an insulating material. • Connector – The part of a cable that plugs into a port or
  • 5. PC Basics • The motherboard is the main circuit board of your computer and is also known as the mainboard or logic board. • A network processor is an integrated circuit which has a feature set specifically targeted at the networking application domain.
  • 6. PC Basics An expansion slot refers to any of the slots on a motherboard that can hold an expansion card to expand the computer's functionality, like a video card, network card, or sound card.
  • 7. Network Interface Cards A network interface card (NIC) is a hardware component without which a computer cannot be connected over a network.
  • 8. NIC and Modem Installation When selecting a NIC, consider the following factors: • Protocols – Ethernet, Token Ring, or FDDI • Types of media – Twisted-pair, coaxial, wireless, or fiberoptic • Type of system bus – PCI or ISA • A modem, or modulator/demodulator, is a device that provides the computer with connectivity to a telephone line.
  • 9. High-Speed and Dialup Connectivity
  • 11. Testing Connectivity with Ping The ping command works by sending multiple IP packets to a specified destination. Each packet sent is a request for a reply.
  • 12. Web Browser and Plug-Ins • plug-in applications - These applications work in conjunction with the browser to launch the program required to view the following special files: • Flash – plays multimedia files, which was created by Macromedia Flash • Quicktime – plays video files, which was created by Apple
  • 14. Binary Number System The American Standard Code for Information Interchange (ASCII) is the most commonly used code for representing alpha-numeric data in a computer
  • 16. Base 10 (Decimal) Numbers • The decimal number system is based on powers of 10. • Each column position of a value, from right to left, is multiplied by the number 10, which is the base number, raised to a power, which is the exponent. • The power that 10 is raised to depends on its
  • 17. Base 2 (Binary) Numbers • Binary number is a number expressed in the base-2 numeral system or binary numeral system, which uses only two symbols: typically "0" (zero) and "1" (one). • 101102 = (1 x 24 = 16) + (0 x 23 = 0) + (1 x 22 = 4) + (1 x 21 = 2) + (0 x 20 = 0) =
  • 18. Converting Decimal numbers to 8-bit Binary Numbers
  • 19. Converting 8-bit Binary Numbers to Decimal Numbers
  • 20. Four-Octet Dotted-decimal Representation of 32-Bit Binary Numbers Currently, (IP) addresses assigned to computers on the Internet are 32-bit binary numbers. To make it easier to work with these addresses, the 32-bit binary number is broken into a series of decimal numbers. To do this, split the binary number into four groups of eight binary digits. Then convert each group of eight bits, also
  • 23. Boolean or Binary Logic Boolean logic is based on digital circuitry that accepts one or two incoming voltages. Based on the input voltages, output voltage is generated. For the purpose of computers the voltage difference is associated as two states, on or off. These two states are in turn associated as a 1
  • 24. IP Addresses and Network Masks • Performing a Boolean AND of the IP address 10.34.23.134 and the subnet mask 255.0.0.0 produces the network address of this host: 10.34.23.134 00001010.00100010.00010111.10000110 255.0.0.0 11111111.00000000.00000000.00000000 10.0.0.0 00001010.00000000.00000000.00000000 • Converting the result to dotted decimal, 10.0.0.0 is the network portion of the IP address, when using the 255.0.0.0 mask.
  • 26. Reference/s: McReynolds S, Networking Basics CCNA 1 Labs and Study Guide Copyright 2012, Cisco Systems, Inc. ISBN: 1-58713-187-0 Data Communications and Networking (Fourth Edition) Online Learning Center, MC Grawhill By Behrouz A. Forouzan, Sophia Chung Fegan Copyright 2007 Andrew Tanenbaum. Computer Networks. Fourth Edition. Pearson Education, Inc., Prentice Hall PTR, copyright 2003