SlideShare a Scribd company logo
1 of 25
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 1
Lecture Notes1: Ever Wonder
How It Works?
Networking Essential
Module Tutor: Dr. Muhammad Ali Kazmi
Cisco Certified Network Academy Instructor
Module: LD7082
Presentation_ID 2
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Lecture 1 - Sections & Objectives
 1.1 Communicating in a Connected World
• Explain the concept of network communication.
 1.2 Local Networks
• Explain the roles of devices in a network.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 3
1.1 Communicating in a
Connected World
Presentation_ID 4
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Communicating in a Connected World
What is the Network?
 Are you Online?
• For most of us, the
Internet has become a
large part of everyday life.
 Who owns the Internet?
• No one owns the Internet.
• It is a worldwide collection of interconnected networks exchanging
information using common standards over telephone wires, fiber-optic
cables, wireless transmissions, and satellite links.
Presentation_ID 5
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Communicating in a Connected World
What is the Network?
 Local Networks
• Local networks come in all sizes from peer-to-peer (two interconnected
device), to home networks, SOHO, and large organization networks.
 Making Connections
• All types of devices connect to local networks.
Presentation_ID 6
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Communicating in a Connected World
Transmitting Data on the Network
 What Exactly is Data?
• Data is a value that represents something.
• Networks to transmit their data in order to share with others or for long-
term storage.
Presentation_ID 7
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Communicating in a Connected World
Transmitting Data on the Network
 The Mighty Bit
• Computers use binary codes to represent and interpret letters, numbers
and special characters with bits.
• Each group of eight bits, such as the representations of letters and
numbers, is known as a byte.
 Getting Bits Moving
• Bits are transmitted as
signals over copper wire
(electrical pulses), fiber-
optic cable (light pulses),
and wireless (radio waves).
Presentation_ID 8
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Communicating in a Connected World
It’s All About the Speed
 Measuring Bandwidth
• Digital bandwidth is the amount of data that can flow from one place to
another in a given amount of time measured in the number of bits that
(theoretically) can be sent across the media in a second.
 Measuring Throughput
• Throughput is the actual measure of the transfer of bits across the
media over a given period of time.
• Many factors influence throughput including the amount of data being
sent / received, the types of data being transmitted, and the
accumulated latency created by the number of network devices
encountered between source and destination.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 9
1.2 Local Networks
Presentation_ID 10
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Local Networks
Network Components
 Clients and Servers
• Servers are hosts that have software installed that enable them to
provide information, like email or web pages, to other hosts on the
network.
• Clients are computer hosts that have software installed that enable
them to request and display the information obtained from the server.
 Multiple Roles in the Network
• Servers can provide multiple services in a network
Presentation_ID 11
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Local Networks
Building Blocks of a Network
 Network Infrastructure
• This is the platform that supports the network containing end devices,
intermediate devices (routers, switches, access points, …)
interconnected using network media (wired and wireless).
 End Devices
• Includes computers, laptops, printers, tablets, smart devices, …
• Form the interface between users and the underlying communication
network.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 12
Part 2: Networks in Our
Daily Lives
Presentation_ID 13
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Lecture Notes 2 - Sections & Objectives
 2.1 Getting Online
• Explain the basic requirements for getting online.
 2.2 Other Network Considerations
• Explain the importance of network representations.
 2.3 Cabling and Media
• Build an Ethernet cable.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 14
2.1 Getting Online
Presentation_ID 15
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Getting Online
Networks are Everywhere
 Mobile phones use radio waves to transmit voice signals to antennas mounted on
towers located in specific geographic areas.
 The abbreviations 3G, 4G, and 4G-LTE are used to describe enhanced cell phone
networks that are optimized for the fast transmission of data.
 Other networks that are used by smart phones include GPS, Wi-Fi, Bluetooth, and
NFC.
Presentation_ID 16
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Getting Online
Local Network Connections
 Some examples of network components are personal computers, servers, networking
devices, and cabling. These components can be grouped into four categories: hosts,
shared peripherals, network devices, and network media.
 There are three parts to the IP configuration which must be correct for the device to
send and receive information on the network:
• IP address - identifies the host on the
network.
• Subnet mask - identifies the
network on which the host is connected.
• Default gateway - identifies the
networking device that the host uses to
access the Internet or another remote
network.
 An IP address can be configured manually
or assigned automatically by another device.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 17
2.2 Other Network
Considerations
Presentation_ID 18
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Other Network Considerations
Keeping Track of it All
 As a network grows in size and
complexity, it is important that the
network is well-planned, logically
organized, and appropriately
documented.
 When networks are installed, a
physical topology is created to
record where each host is located
and how it is connected to the
network. The physical topology
also shows where the wiring is
installed and the locations of the
networking devices that connect
the hosts.
Presentation_ID 19
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Other Network Considerations
Keeping Track of it All
 A logical topology illustrates the device names, IP addressing, configuration
information, and network designations. These are logical pieces of information that
may change more frequently than the physical topology of a network.
 The icons in the image are used to create both physical and logical topologies.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 20
2.3 Cabling and Media
Presentation_ID 21
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cabling and Media
Types of Network Media
 Modern networks primarily use three
types of media to interconnect
devices and to provide the pathway
over which data can be transmitted:
• Copper wires within cables
• Glass or plastic fibers (fiber-optic cable)
• Wireless transmission
 Twisted-Pair (TP) is a type of copper cable. TP is the most common type of
network cabling.
 Coaxial Cable is usually made of copper or aluminum. It is used by cable
television companies to provide service, and for satellite communication systems.
 Fiber-optic cables are made of glass or plastic. They have a very high bandwidth,
so they can carry vast amounts of data. Fiber-optic is used in backbone networks,
large enterprise environments, and large data centers.
Presentation_ID 22
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cabling and Media
Ethernet Cabling
 Data transmission over copper cable is sensitive to electromagnetic interference
(EMI), which can reduce the data throughput rate. Another source of interference,
known as crosstalk, occurs when long lengths of cables are bundled together. The
electrical impulses from one cable may cross over to an adjacent cable.
 There are two commonly installed types of twisted-pair cable: Unshielded
twisted-pair (UTP) and Shielded twisted-pair (STP).
Presentation_ID 23
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cabling and Media
Other Types of Network Cabling
 Like twisted-pair, coaxial cable (or coax) carries data in the form of electrical
signals. It has better shielding than UTP and can carry more data. Coaxial
cable is usually constructed of either copper or aluminum.
 Fiber-optic cable is constructed of either glass or plastic, neither of which
conducts electricity. It is immune to EMI and RFI, and is suitable for
installation in environments where interference is a problem.
Presentation_ID 24
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cabling and Media
Do the Colors Matter?
 There are two wiring schemes, called T568A and T568B. Each wiring
scheme defines the pinout, or order of wire connections, on the end of the
cable.
 Ethernet NICs and ports on networking devices send data over UTP cables.
Specific pins on the connector are associated with a transmit function and a
receive function. The interfaces on each device transmit and receive data on
designated wires within the cable.
Presentation_ID 25
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Thank You
Any Question???

More Related Content

Similar to NetEss_Lecture Notes 1 (1).pptx

CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access Vuz Dở Hơi
 
Chapter 04 - Network Access
Chapter 04 - Network AccessChapter 04 - Network Access
Chapter 04 - Network AccessYaser Rahmati
 
Chapter 4 : Network access
Chapter 4 : Network accessChapter 4 : Network access
Chapter 4 : Network accessteknetir
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3Irsandi Hasan
 
ITN_Module_1.pptx
ITN_Module_1.pptxITN_Module_1.pptx
ITN_Module_1.pptxNguynVngQuc
 
CCNA Introduction to Networks Module 1
CCNA Introduction to Networks Module 1CCNA Introduction to Networks Module 1
CCNA Introduction to Networks Module 1AbhayPatidar13
 
ITN_Module_1.pptx
ITN_Module_1.pptxITN_Module_1.pptx
ITN_Module_1.pptxargost1003
 
Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Hamza Malik
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3Nil Menon
 
Itn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessItn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessbebe tampan
 
Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Hamza Malik
 
ITN_Module_1.pptx
ITN_Module_1.pptxITN_Module_1.pptx
ITN_Module_1.pptxAshiruMUmar
 
ITN_Module_1-Networking Today.pptx
ITN_Module_1-Networking Today.pptxITN_Module_1-Networking Today.pptx
ITN_Module_1-Networking Today.pptxcongbach3
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1Waqas Ahmed Nawaz
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4Nil Menon
 

Similar to NetEss_Lecture Notes 1 (1).pptx (20)

CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access
 
Chapter 04 - Network Access
Chapter 04 - Network AccessChapter 04 - Network Access
Chapter 04 - Network Access
 
Chapter 4 : Network access
Chapter 4 : Network accessChapter 4 : Network access
Chapter 4 : Network access
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
 
ITN_Module_1.pptx
ITN_Module_1.pptxITN_Module_1.pptx
ITN_Module_1.pptx
 
CCNA Introduction to Networks Module 1
CCNA Introduction to Networks Module 1CCNA Introduction to Networks Module 1
CCNA Introduction to Networks Module 1
 
ITN_Module_1.pptx
ITN_Module_1.pptxITN_Module_1.pptx
ITN_Module_1.pptx
 
ITN_Module_1.pptx
ITN_Module_1.pptxITN_Module_1.pptx
ITN_Module_1.pptx
 
Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
Itn module 1
Itn module 1Itn module 1
Itn module 1
 
Itn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessItn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_access
 
Itn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessItn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_access
 
Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4
 
ITN_Module_1.pptx
ITN_Module_1.pptxITN_Module_1.pptx
ITN_Module_1.pptx
 
ITN_Module_1.pptx
ITN_Module_1.pptxITN_Module_1.pptx
ITN_Module_1.pptx
 
ITN_Module_1-Networking Today.pptx
ITN_Module_1-Networking Today.pptxITN_Module_1-Networking Today.pptx
ITN_Module_1-Networking Today.pptx
 
ITN_Module_1.pdf
ITN_Module_1.pdfITN_Module_1.pdf
ITN_Module_1.pdf
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
 

More from SaqibAhmedKhan4

Lecture_Network Design, InterVlan Routing and Trunking_.pptx
Lecture_Network Design, InterVlan Routing and Trunking_.pptxLecture_Network Design, InterVlan Routing and Trunking_.pptx
Lecture_Network Design, InterVlan Routing and Trunking_.pptxSaqibAhmedKhan4
 
Lecture Notes- Network Services - Copy.pptx
Lecture Notes- Network Services - Copy.pptxLecture Notes- Network Services - Copy.pptx
Lecture Notes- Network Services - Copy.pptxSaqibAhmedKhan4
 
CPS Theory Presentation.pptx
CPS Theory Presentation.pptxCPS Theory Presentation.pptx
CPS Theory Presentation.pptxSaqibAhmedKhan4
 
Wireless Network Design for Walmart.pptx
Wireless Network Design for Walmart.pptxWireless Network Design for Walmart.pptx
Wireless Network Design for Walmart.pptxSaqibAhmedKhan4
 
Database Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptxDatabase Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptxSaqibAhmedKhan4
 

More from SaqibAhmedKhan4 (7)

Lecture_Network Design, InterVlan Routing and Trunking_.pptx
Lecture_Network Design, InterVlan Routing and Trunking_.pptxLecture_Network Design, InterVlan Routing and Trunking_.pptx
Lecture_Network Design, InterVlan Routing and Trunking_.pptx
 
Lecture Notes- Network Services - Copy.pptx
Lecture Notes- Network Services - Copy.pptxLecture Notes- Network Services - Copy.pptx
Lecture Notes- Network Services - Copy.pptx
 
Notion.pptx
Notion.pptxNotion.pptx
Notion.pptx
 
CPS Theory Presentation.pptx
CPS Theory Presentation.pptxCPS Theory Presentation.pptx
CPS Theory Presentation.pptx
 
Mental Health.pptx
Mental Health.pptxMental Health.pptx
Mental Health.pptx
 
Wireless Network Design for Walmart.pptx
Wireless Network Design for Walmart.pptxWireless Network Design for Walmart.pptx
Wireless Network Design for Walmart.pptx
 
Database Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptxDatabase Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptx
 

Recently uploaded

Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct CommiteemenRoberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemenkfjstone13
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docxkfjstone13
 
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election CampaignN Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaignanjanibaddipudi1
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfLorenzo Lemes
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkbhavenpr
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012ankitnayak356677
 
Chandrayaan 3 Successful Moon Landing Mission.pdf
Chandrayaan 3 Successful Moon Landing Mission.pdfChandrayaan 3 Successful Moon Landing Mission.pdf
Chandrayaan 3 Successful Moon Landing Mission.pdfauroraaudrey4826
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsnaxymaxyy
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...AlexisTorres963861
 
College Call Girls Kolhapur Aanya 8617697112 Independent Escort Service Kolhapur
College Call Girls Kolhapur Aanya 8617697112 Independent Escort Service KolhapurCollege Call Girls Kolhapur Aanya 8617697112 Independent Escort Service Kolhapur
College Call Girls Kolhapur Aanya 8617697112 Independent Escort Service KolhapurCall girls in Ahmedabad High profile
 
26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoSABC News
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfauroraaudrey4826
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Krish109503
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerOmarCabrera39
 
Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Ismail Fahmi
 
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docxkfjstone13
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docxkfjstone13
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...Ismail Fahmi
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victoryanjanibaddipudi1
 

Recently uploaded (20)

Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct CommiteemenRoberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
 
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election CampaignN Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdf
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpk
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012
 
Chandrayaan 3 Successful Moon Landing Mission.pdf
Chandrayaan 3 Successful Moon Landing Mission.pdfChandrayaan 3 Successful Moon Landing Mission.pdf
Chandrayaan 3 Successful Moon Landing Mission.pdf
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the rounds
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
 
College Call Girls Kolhapur Aanya 8617697112 Independent Escort Service Kolhapur
College Call Girls Kolhapur Aanya 8617697112 Independent Escort Service KolhapurCollege Call Girls Kolhapur Aanya 8617697112 Independent Escort Service Kolhapur
College Call Girls Kolhapur Aanya 8617697112 Independent Escort Service Kolhapur
 
26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election Manifesto
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdf
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert Oppenheimer
 
Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024
 
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
 

NetEss_Lecture Notes 1 (1).pptx

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 1 Lecture Notes1: Ever Wonder How It Works? Networking Essential Module Tutor: Dr. Muhammad Ali Kazmi Cisco Certified Network Academy Instructor Module: LD7082
  • 2. Presentation_ID 2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Lecture 1 - Sections & Objectives  1.1 Communicating in a Connected World • Explain the concept of network communication.  1.2 Local Networks • Explain the roles of devices in a network.
  • 3. © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 3 1.1 Communicating in a Connected World
  • 4. Presentation_ID 4 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Communicating in a Connected World What is the Network?  Are you Online? • For most of us, the Internet has become a large part of everyday life.  Who owns the Internet? • No one owns the Internet. • It is a worldwide collection of interconnected networks exchanging information using common standards over telephone wires, fiber-optic cables, wireless transmissions, and satellite links.
  • 5. Presentation_ID 5 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Communicating in a Connected World What is the Network?  Local Networks • Local networks come in all sizes from peer-to-peer (two interconnected device), to home networks, SOHO, and large organization networks.  Making Connections • All types of devices connect to local networks.
  • 6. Presentation_ID 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Communicating in a Connected World Transmitting Data on the Network  What Exactly is Data? • Data is a value that represents something. • Networks to transmit their data in order to share with others or for long- term storage.
  • 7. Presentation_ID 7 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Communicating in a Connected World Transmitting Data on the Network  The Mighty Bit • Computers use binary codes to represent and interpret letters, numbers and special characters with bits. • Each group of eight bits, such as the representations of letters and numbers, is known as a byte.  Getting Bits Moving • Bits are transmitted as signals over copper wire (electrical pulses), fiber- optic cable (light pulses), and wireless (radio waves).
  • 8. Presentation_ID 8 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Communicating in a Connected World It’s All About the Speed  Measuring Bandwidth • Digital bandwidth is the amount of data that can flow from one place to another in a given amount of time measured in the number of bits that (theoretically) can be sent across the media in a second.  Measuring Throughput • Throughput is the actual measure of the transfer of bits across the media over a given period of time. • Many factors influence throughput including the amount of data being sent / received, the types of data being transmitted, and the accumulated latency created by the number of network devices encountered between source and destination.
  • 9. © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 9 1.2 Local Networks
  • 10. Presentation_ID 10 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Local Networks Network Components  Clients and Servers • Servers are hosts that have software installed that enable them to provide information, like email or web pages, to other hosts on the network. • Clients are computer hosts that have software installed that enable them to request and display the information obtained from the server.  Multiple Roles in the Network • Servers can provide multiple services in a network
  • 11. Presentation_ID 11 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Local Networks Building Blocks of a Network  Network Infrastructure • This is the platform that supports the network containing end devices, intermediate devices (routers, switches, access points, …) interconnected using network media (wired and wireless).  End Devices • Includes computers, laptops, printers, tablets, smart devices, … • Form the interface between users and the underlying communication network.
  • 12. © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 12 Part 2: Networks in Our Daily Lives
  • 13. Presentation_ID 13 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Lecture Notes 2 - Sections & Objectives  2.1 Getting Online • Explain the basic requirements for getting online.  2.2 Other Network Considerations • Explain the importance of network representations.  2.3 Cabling and Media • Build an Ethernet cable.
  • 14. © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 14 2.1 Getting Online
  • 15. Presentation_ID 15 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Getting Online Networks are Everywhere  Mobile phones use radio waves to transmit voice signals to antennas mounted on towers located in specific geographic areas.  The abbreviations 3G, 4G, and 4G-LTE are used to describe enhanced cell phone networks that are optimized for the fast transmission of data.  Other networks that are used by smart phones include GPS, Wi-Fi, Bluetooth, and NFC.
  • 16. Presentation_ID 16 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Getting Online Local Network Connections  Some examples of network components are personal computers, servers, networking devices, and cabling. These components can be grouped into four categories: hosts, shared peripherals, network devices, and network media.  There are three parts to the IP configuration which must be correct for the device to send and receive information on the network: • IP address - identifies the host on the network. • Subnet mask - identifies the network on which the host is connected. • Default gateway - identifies the networking device that the host uses to access the Internet or another remote network.  An IP address can be configured manually or assigned automatically by another device.
  • 17. © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 17 2.2 Other Network Considerations
  • 18. Presentation_ID 18 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Other Network Considerations Keeping Track of it All  As a network grows in size and complexity, it is important that the network is well-planned, logically organized, and appropriately documented.  When networks are installed, a physical topology is created to record where each host is located and how it is connected to the network. The physical topology also shows where the wiring is installed and the locations of the networking devices that connect the hosts.
  • 19. Presentation_ID 19 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Other Network Considerations Keeping Track of it All  A logical topology illustrates the device names, IP addressing, configuration information, and network designations. These are logical pieces of information that may change more frequently than the physical topology of a network.  The icons in the image are used to create both physical and logical topologies.
  • 20. © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 20 2.3 Cabling and Media
  • 21. Presentation_ID 21 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cabling and Media Types of Network Media  Modern networks primarily use three types of media to interconnect devices and to provide the pathway over which data can be transmitted: • Copper wires within cables • Glass or plastic fibers (fiber-optic cable) • Wireless transmission  Twisted-Pair (TP) is a type of copper cable. TP is the most common type of network cabling.  Coaxial Cable is usually made of copper or aluminum. It is used by cable television companies to provide service, and for satellite communication systems.  Fiber-optic cables are made of glass or plastic. They have a very high bandwidth, so they can carry vast amounts of data. Fiber-optic is used in backbone networks, large enterprise environments, and large data centers.
  • 22. Presentation_ID 22 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cabling and Media Ethernet Cabling  Data transmission over copper cable is sensitive to electromagnetic interference (EMI), which can reduce the data throughput rate. Another source of interference, known as crosstalk, occurs when long lengths of cables are bundled together. The electrical impulses from one cable may cross over to an adjacent cable.  There are two commonly installed types of twisted-pair cable: Unshielded twisted-pair (UTP) and Shielded twisted-pair (STP).
  • 23. Presentation_ID 23 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cabling and Media Other Types of Network Cabling  Like twisted-pair, coaxial cable (or coax) carries data in the form of electrical signals. It has better shielding than UTP and can carry more data. Coaxial cable is usually constructed of either copper or aluminum.  Fiber-optic cable is constructed of either glass or plastic, neither of which conducts electricity. It is immune to EMI and RFI, and is suitable for installation in environments where interference is a problem.
  • 24. Presentation_ID 24 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cabling and Media Do the Colors Matter?  There are two wiring schemes, called T568A and T568B. Each wiring scheme defines the pinout, or order of wire connections, on the end of the cable.  Ethernet NICs and ports on networking devices send data over UTP cables. Specific pins on the connector are associated with a transmit function and a receive function. The interfaces on each device transmit and receive data on designated wires within the cable.
  • 25. Presentation_ID 25 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Thank You Any Question???