CCNA 1 v3.0 Module 2  Networking Fundamentals
Objectives
Networking Devices Network devices End user devices
Network Topology PHYSICAL AND LOGICAL Most common Logical Topologies are Broadcast & Token ring
NETWORK PROTOCOLS <ul><li>How physical network is built </li></ul><ul><li>How computers connect to the network </li></ul><...
Network Protocols
LOCAL AREA NETWORKS <ul><li>LAN components </li></ul><ul><li>Computers </li></ul><ul><li>NICs </li></ul><ul><li>Peripheral...
Local-area Networks (LANs)
 
Wide-area Networks (WANs)
Data Networks
SANs <ul><li>Moves data between Server and Storage resources.Allows high speed connectivity for </li></ul><ul><li>Server t...
Storage - Area Networks (SANS) Performance  – SANs enable concurrent access of disk or tape arrays by two or more servers ...
Virtual Private Networks (VPN s ) A private network constructed within a public network infrastructure. Using VPN, a Telec...
Intranet and Extranet VPN Intranetwebserver
Importance of Bandwidth
Bandwidth Pipe Analogy
Bandwidth Highway Analogy
Bandwidth Measurements
Bandwidth Limitations
Bandwidth > Throughput
Digital Transfer Calculation
EXAMPLE Which would take less time? 1-Sending a floppy disk (1.44 MB) full of data over an ISDN BRI Line  OR 2-Sending a 1...
EXAMPLE ( Cont…..) T = S/BW 1-  S= 1.44 MB, BW=128 Kb Thus time = 1.44 x 1000 K Bytes x 8 Bits / 128 Kbps   = 90 Seconds 2...
Using Layers to Describe Data Communication
OSI Model
OSI Layers
OSI Layers  <ul><li>Provides reliable transfer of data across media </li></ul><ul><li>Provides physical/flat address </li>...
OSI Layers
OSI Layers
OSI Layers
OSI Layers
OSI Layers
Peer-to-Peer Communication
TCP/IP Model
 
Encapsulation
Names for Data at Each Layer
Summary
Upcoming SlideShare
Loading in …5
×

Sem 1 Ch 2

432 views

Published on

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
432
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Sem 1 Ch 2

  1. 1. CCNA 1 v3.0 Module 2 Networking Fundamentals
  2. 2. Objectives
  3. 3. Networking Devices Network devices End user devices
  4. 4. Network Topology PHYSICAL AND LOGICAL Most common Logical Topologies are Broadcast & Token ring
  5. 5. NETWORK PROTOCOLS <ul><li>How physical network is built </li></ul><ul><li>How computers connect to the network </li></ul><ul><li>How data is formatted for transmission </li></ul><ul><li>How data is sent </li></ul><ul><li>How to deal with errors </li></ul>
  6. 6. Network Protocols
  7. 7. LOCAL AREA NETWORKS <ul><li>LAN components </li></ul><ul><li>Computers </li></ul><ul><li>NICs </li></ul><ul><li>Peripheral devices </li></ul><ul><li>Networking Media </li></ul><ul><li>Networking devices </li></ul><ul><li>LAN Technologies </li></ul><ul><li>Ethernet </li></ul><ul><li>Token Ring </li></ul><ul><li>FDDI </li></ul>
  8. 8. Local-area Networks (LANs)
  9. 10. Wide-area Networks (WANs)
  10. 11. Data Networks
  11. 12. SANs <ul><li>Moves data between Server and Storage resources.Allows high speed connectivity for </li></ul><ul><li>Server to storage </li></ul><ul><li>Server to server </li></ul><ul><li>Storage to storage </li></ul><ul><li>PERFORMANCE-AVAILIBILITY-SCALABILITY </li></ul>
  12. 13. Storage - Area Networks (SANS) Performance – SANs enable concurrent access of disk or tape arrays by two or more servers at high speeds. Availability – SANs have disaster tolerance built in, because data can be mirrored using a SAN up to 10 kilometers (km) or 6.2 miles away. Scalability – Like a LAN/WAN, it can use a variety of technologies.
  13. 14. Virtual Private Networks (VPN s ) A private network constructed within a public network infrastructure. Using VPN, a Telecommuter can remotely access the network of company H/Qs.Through Internet secure Tunnel is built Between PC of Telecommuter and Router at Company H/Qs. VPNs offers secure, reliable over shared public network while maintaining same security and management policies as a private network.
  14. 15. Intranet and Extranet VPN Intranetwebserver
  15. 16. Importance of Bandwidth
  16. 17. Bandwidth Pipe Analogy
  17. 18. Bandwidth Highway Analogy
  18. 19. Bandwidth Measurements
  19. 20. Bandwidth Limitations
  20. 21. Bandwidth > Throughput
  21. 22. Digital Transfer Calculation
  22. 23. EXAMPLE Which would take less time? 1-Sending a floppy disk (1.44 MB) full of data over an ISDN BRI Line OR 2-Sending a 10GB hard drive full of data over an OC-48 line
  23. 24. EXAMPLE ( Cont…..) T = S/BW 1- S= 1.44 MB, BW=128 Kb Thus time = 1.44 x 1000 K Bytes x 8 Bits / 128 Kbps = 90 Seconds 2- S= 10 GB, BW= 2.488320 Gbps Thus time = 10 G Bytes x 8 Bits/ 2.488320 Gbps = 32.15 Seconds
  24. 25. Using Layers to Describe Data Communication
  25. 26. OSI Model
  26. 27. OSI Layers
  27. 28. OSI Layers <ul><li>Provides reliable transfer of data across media </li></ul><ul><li>Provides physical/flat address </li></ul>
  28. 29. OSI Layers
  29. 30. OSI Layers
  30. 31. OSI Layers
  31. 32. OSI Layers
  32. 33. OSI Layers
  33. 34. Peer-to-Peer Communication
  34. 35. TCP/IP Model
  35. 37. Encapsulation
  36. 38. Names for Data at Each Layer
  37. 39. Summary

×