SlideShare a Scribd company logo
A Deep Dive in the World of IT Networking (Part 1)
We manage learning.
“Building an Innovative Learning Organization. A Framework to Build a
Smarter Workforce, Adapt to Change, and Drive Growth”. Download now!
NetCom Learning
NetCom Learning – Managed Learning Services
Agenda
• To be a Successful ICT Professional.
• Running the IT projects successfully.
• Benefit of networking.
• Network Components.
• Data Transfer.
• IP Address.
• Windows Commands.
• Types of LANS.
• Network Topologies.
• Centralized Computing Vs. Distributive Computing.
• Client Server Model.
• Peer to Peer Networks
• Q&A
To be successful ICT Professional
The main qualities that any successful ICTP must be
keen to merit:
• Certificates.
• Experiences.
• Language Skills.
• Communications Skills.
• Eagerly learn more.
Running the ICT projects successfully
To Run any ICT Project successfully regardless of it’s
type whether it’s infrastructure project of software
development or programming project. It’s
• Documentation.
• Backup .
• Patch.
Benefit Of Networking
• Networks are used to exchange data.
• Sharing.
• Communication.
• Organization.
• Money.
What is the Network
•A data network is a group of devices connected by network medium.
•The network medium carries signals between computers.
•Signals reduce complex information to the simplest possible form.
•Devices communicate by using a language called a protocol.
Network Components
Network adapters
Cables and connectors
Cables and connectors
Hub
•A hub is the most basic of central connecting
devices.
•It connects each of the networked computers,
known as hosts, to one another by way of
copper-based cables.
•Any host that sends data must first send that
data to the hub, where it is amplified and
broadcast to the rest of the network.
Switch
•Switch is like a Hub but built in with
advanced features. It uses physical device
addresses in each incoming messages so
that it can deliver the message to the
right destination or port.
•switch don’t broadcast the received
message to entire network, rather before
sending it checks to which system or port
should the message be sent. In other
words switch connects the source and
destination directly which increases the
speed of the network. Both switch and
hub have common features: Multiple RJ-
45 ports, power supply and connection
lights.
Router
•The router acts as a central connecting
device, but it also has a special
communications link to the Internet,
thereby allowing the hosts to send data
to and receive data from computers on
the Internet.
•This communications link between the
router and the Internet is where the LAN
ends.
Data Transfer
Serial Data Transfer
•Generally, when data is transferred on a Network, it is sent in a serial
fashion over twisted-pair cabling.
•Serial data transfer means the transfer of one bit at a time … in other
words, transfer in a single-bit stream.
Types of Data Transfer
•Broadcast has data sent to every other host on the network.
•Unicast has data sent to one host only.
Data Transfer Rate
•Data transfer rate, otherwise known as bit rate defines the maximum bits
per second (bps) that can be transmitted over a network.
•As mentioned, this value is rated in bits, and it is signified with a
lowercase b (for example, 10 Mbps).
•The lowercase b helps differentiate this amount from data that is stored
on a hard drive, which uses an upper case B that stands for bytes (for
example 10 MB).
Ethernet
•Ethernet is a set of rules that govern the transmission of data between
network adapters and various central connecting devices.
•All network adapters and central connecting devices must be compatible
with Ethernet in order to communicate with each other.
•Common types of Ethernet include:
802.3u or Fast Ethernet that runs at 100 Mbps.
802.3ab or Gigabit Ethernet runs at 1000 Mbps.
IP Address
•every computer and many other devices have such an address.
•An IP address allows each computer to send and receive information
back and forth in an orderly and efficient manner.
•An IP address identifies your computer number and the network it
lives on.
•IP address is made of 32-bit address. The address is divided into four
sections of eight bits each called octets (math).
•IP divided in to 5 classes or categories class (A,B,C,D,E) each of them
has a unique range of addresses
•In order to know the class of the address we are forced to look to the
first octet of the address.
Class A (1-126),(255.0.0.0),(N.H.H.H)
Class B (128-191),(255,255,0,0),(N.N.H.H)
Class C (192-223),(255,255,255,0),(N.N.N.H)
•127.0.0.0 : This network address is reserved for the loopback
address. (Note: This address is not included in the range of Class A or
Class B addresses.) The address 127.0.0.1 refers to the local host.
•The following address ranges have been reserved for private use.
10.0.0.0 to 10.255.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
•Use addresses in these ranges for your private networks. Routers
connected to the Internet typically filter messages within these ranges
and prevent them from being propagated to the Internet.
Special IP Address
Subnet Mask
•The subnet mask is a group of four numbers that define what IP network the
computer is a member of.
•All of the 255s in a subnet mask collectively refer to the network portion,
whereas the 0s refer to the host portion.
Windows Commands
IPConfig command shows IP configuration information.
IPConfig
Ping Command
Types Of Local Area Network
Wired LAN
Computers and
other devices are
wired using
copper-based
twisted-pair
cables
Wireless Local Area Network (WLAN)
•A wireless local
area network
(WLAN) has many
advantages, the
most obvious of
which is the ability
to roam.
•The wireless access
point (WAP) acts as
the central
connecting device
for the network.
Virtual Local Area Network (VLAN)
A Virtual LAN is a
group of hosts with
a common set of
requirements that
communicate as if
they were
connected together
in a normal fashion
on one switch,
regardless of their
physical location.
Network Topology
A network topology : defines the physical connections of hosts in a computer network.
There are several types of physical topologies including:
Bus, Ring, Star, Mesh, … etc.
Star Topology
•Most Common topology
•Each computer is
individually wired to a
central connecting device
(hub, switch or SOHO
router) with twisted-pair
cabling.
Mesh Topology
Every computer connects to
every other computer; no
central connecting device is
needed.
Ring Topology
•In a LAN environment, each computer is
connected to the network using a closed
loop.
•Used by Token Ring and FDDI.
•A Token Ring network sends data logically in
a ring fashion, meaning that a token goes to
each computer, one at a time, and continues
on in cycles.
•However, Token Ring computers are
physically connected in a star fashion.
•Namely, all computers in a Token Ring
network are connected to a central
connecting device known as a Multi Access
Unit (MAU) or MultiStation Access Unit
(MSAU).
Centralized Computing
•The older type of
computing was known as
centralized computing.
•This was the case during
the days of the mainframe,
in which there was one
super computer and the rest
of the devices that
connected to the super
computer were known as
terminals (or dumb
terminals).
•Each terminal consisted
solely of a keyboard and
display with no processing
power.
Distributive Computing
Today’s computing is
known as
distributive
computing and is
used for both client-
server and peer-to-
peer networks.
This means that
every device or
workstation has its
own processing
power.
Client/Server ModelThe client-server model
is an architecture that
distributes applications
between servers that
typically powerful
computers that run the
software that controls
and maintains the
network. This software
is known as the network
operating system such
as Windows Server
2016 and client
computers such as
Windows 8 or Windows
10 machines.
Computers that
provide services:
•File Server
•Print Server
•Web Server
•Database server
•Proxy Server
•Application Server
•Mail (Messaging )
Server
•Fax Server
•Remote Access
Server
•Telephony Server
Servers
Peer-to-Peer Networking
•Peer-to-peer networking first and
foremost means that each computer
is treated as an equal.
•Today, peer computers can serve
data; the only difference is that they
can only serve it to a limited number
of computers at the same time.
•Each user is responsible for local
backup.
• Security considerations are minimal.
Watch the Live Demonstration
Watch the recorded webinar here!
Recommended Courses
NetCom Learning offers a comprehensive portfolio for IT Networking training
options. Please see below the list of recommended courses:
CompTIA Network+ Certification
Interconnecting Cisco Networking Devices, Part 1 v 3.0 - ICND1 (Entry)
Routing & Switching (ICND1 and ICND2) v3.0 Prep Boot Camp - CCNAX
(Associate)
Check out more IT Networking training options with NetCom Learning – CLICK
HERE
Our live webinars will help you to touch base a wide variety of IT, soft skills and
business productivity topics; and keep you up to date on the latest IT industry trends.
Register now for our upcoming webinars:
How to Manage & Secure Data with Microsoft Datacenters?- May 11
VMware vCenter 6.5 Consoles and Connections – May 15
Office 365 on any Platform (Windows, Mac, Mobile/Tablet) – May 18
Microsoft Word Power Shortcuts & Tips Part-1 – May 23
A Deep Dive in the World of IT Networking (Part 2) – May 25
Special Promotion
Whether you're learning new IT or Business skills, or you are developing a learning plan for
your team, now you can register for our Guaranteed to Run classes with confidence.
From Microsoft, to CompTIA, to CISSP; all classes delivered by top-notch instructors in in-
person Instructor-led Classroom or Live Online.
Learn more»
We manage learning.
“Building an Innovative Learning Organization. A Framework to Build a Smarter
Workforce, Adapt to Change, and Drive Growth”. Download now!
SarderTV is a B2B Media Platform headquartered in New York. The platform publishes exclusive
video based media content from Top Corporate Leaders of Fortune 1000, Best Selling Global
Authors & Ivy League Professors. Learn more - http://sardertv.com
To get latest technology updates, please follow our social media pages!
THANK YOU !!!
We manage learning.
“Building an Innovative Learning Organization. A Framework to Build a
Smarter Workforce, Adapt to Change, and Drive Growth”. Download now!

More Related Content

What's hot

Networking
Networking Networking
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5
APSU
 
Networking Components
Networking ComponentsNetworking Components
Networking Components
AkNirojan
 
Net essentials6e ch7
Net essentials6e ch7Net essentials6e ch7
Net essentials6e ch7
APSU
 
Net essentials6e ch2
Net essentials6e ch2Net essentials6e ch2
Net essentials6e ch2
APSU
 
Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1
WedgeB
 
Power point presentation
Power point presentationPower point presentation
Power point presentation
rajasekarsankar
 
Setting up a network
Setting up a networkSetting up a network
Setting up a network
Rachel Espino
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
Rubal Sagwal
 
Computer networks
Computer networks Computer networks
Computer networks
ABUBAKAR270
 
98 366 mva slides lesson 6
98 366 mva slides lesson 698 366 mva slides lesson 6
98 366 mva slides lesson 6
suddenven
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
Sanat Maharjan
 
Net essentials6e ch13
Net essentials6e ch13Net essentials6e ch13
Net essentials6e ch13
APSU
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network Topology
Karthikeyan Dhayalan
 
Networking.
Networking.Networking.
Networking.
Adnan Shah
 
Building an Enterprise Fiber Network for a Local Government, An Architectural...
Building an Enterprise Fiber Network for a Local Government, An Architectural...Building an Enterprise Fiber Network for a Local Government, An Architectural...
Building an Enterprise Fiber Network for a Local Government, An Architectural...
The University of Texas (UTRGV)
 
Net essentials6e ch11
Net essentials6e ch11Net essentials6e ch11
Net essentials6e ch11
APSU
 
Net essentials6e ch12
Net essentials6e ch12Net essentials6e ch12
Net essentials6e ch12APSU
 
Communication using network
Communication using networkCommunication using network
Communication using network
Online
 
Net essentials6e ch6
Net essentials6e ch6Net essentials6e ch6
Net essentials6e ch6
APSU
 

What's hot (20)

Networking
Networking Networking
Networking
 
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5
 
Networking Components
Networking ComponentsNetworking Components
Networking Components
 
Net essentials6e ch7
Net essentials6e ch7Net essentials6e ch7
Net essentials6e ch7
 
Net essentials6e ch2
Net essentials6e ch2Net essentials6e ch2
Net essentials6e ch2
 
Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1
 
Power point presentation
Power point presentationPower point presentation
Power point presentation
 
Setting up a network
Setting up a networkSetting up a network
Setting up a network
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
 
Computer networks
Computer networks Computer networks
Computer networks
 
98 366 mva slides lesson 6
98 366 mva slides lesson 698 366 mva slides lesson 6
98 366 mva slides lesson 6
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
 
Net essentials6e ch13
Net essentials6e ch13Net essentials6e ch13
Net essentials6e ch13
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network Topology
 
Networking.
Networking.Networking.
Networking.
 
Building an Enterprise Fiber Network for a Local Government, An Architectural...
Building an Enterprise Fiber Network for a Local Government, An Architectural...Building an Enterprise Fiber Network for a Local Government, An Architectural...
Building an Enterprise Fiber Network for a Local Government, An Architectural...
 
Net essentials6e ch11
Net essentials6e ch11Net essentials6e ch11
Net essentials6e ch11
 
Net essentials6e ch12
Net essentials6e ch12Net essentials6e ch12
Net essentials6e ch12
 
Communication using network
Communication using networkCommunication using network
Communication using network
 
Net essentials6e ch6
Net essentials6e ch6Net essentials6e ch6
Net essentials6e ch6
 

Similar to A Deep Dive in the World of IT Networking (part 1)

Networking basics
Networking basicsNetworking basics
Networking basics
Vadiraj Jahagirdar
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
Sithu PM
 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptx
HaythanSunday
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1
TnNguyn57021
 
Vision
VisionVision
Vision
Gaurav Rai
 
Computer Networks basics
Computer Networks basicsComputer Networks basics
Computer Networks basics
BiplabaSamantaray
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
GLIM Digital
 
4.1 Networks.pdf
4.1 Networks.pdf4.1 Networks.pdf
4.1 Networks.pdf
tazbeedrahman
 
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptxICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
mbombongafu
 
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6
Irsandi Hasan
 
Communications and Networking
Communications and NetworkingCommunications and Networking
Communications and Networking
Sajitha Pathirana
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
Md Saylab
 
Network Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICESNetwork Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICES
Manas Rai
 
Network Concepts
Network ConceptsNetwork Concepts
Network Concepts
Rajamanickam Gomathijayam
 
ppt on servicenow.pptx
ppt on servicenow.pptxppt on servicenow.pptx
ppt on servicenow.pptx
SimarpreetKaur735622
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptx
ADITYAKUMAR554673
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
AnushaJagadeesh4
 

Similar to A Deep Dive in the World of IT Networking (part 1) (20)

Networking basics
Networking basicsNetworking basics
Networking basics
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptx
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1
 
Vision
VisionVision
Vision
 
Computer Networks basics
Computer Networks basicsComputer Networks basics
Computer Networks basics
 
Networks Intro.ppt
Networks Intro.pptNetworks Intro.ppt
Networks Intro.ppt
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
4.1 Networks.pdf
4.1 Networks.pdf4.1 Networks.pdf
4.1 Networks.pdf
 
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptxICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
 
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6
 
Communications and Networking
Communications and NetworkingCommunications and Networking
Communications and Networking
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
 
Networking
NetworkingNetworking
Networking
 
Network Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICESNetwork Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICES
 
Network Concepts
Network ConceptsNetwork Concepts
Network Concepts
 
ppt on servicenow.pptx
ppt on servicenow.pptxppt on servicenow.pptx
ppt on servicenow.pptx
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptx
 
Basics of Networking
Basics of NetworkingBasics of Networking
Basics of Networking
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 

More from Tuan Yang

Learn How to Configure Cisco Data Center Core Networking(Handouts).pdf
Learn How to Configure Cisco Data Center Core Networking(Handouts).pdfLearn How to Configure Cisco Data Center Core Networking(Handouts).pdf
Learn How to Configure Cisco Data Center Core Networking(Handouts).pdf
Tuan Yang
 
Best Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdfBest Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdf
Tuan Yang
 
Defense Against Multi-Network Breaches.pdf
Defense Against Multi-Network Breaches.pdfDefense Against Multi-Network Breaches.pdf
Defense Against Multi-Network Breaches.pdf
Tuan Yang
 
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdf
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdfCybersecurity Incident Handling & Response in Under 40 Minutes.pdf
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdf
Tuan Yang
 
An Introduction to CompTIA Security+ - SY0-601.pdf
An Introduction to CompTIA Security+ - SY0-601.pdfAn Introduction to CompTIA Security+ - SY0-601.pdf
An Introduction to CompTIA Security+ - SY0-601.pdf
Tuan Yang
 
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...
Tuan Yang
 
What is New with CompTIA Network+.pdf
What is New with CompTIA Network+.pdfWhat is New with CompTIA Network+.pdf
What is New with CompTIA Network+.pdf
Tuan Yang
 
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdf
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdfWhat is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdf
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdf
Tuan Yang
 
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdf
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdfAgile Fundamentals One Step Guide for Agile Projects(Handout).pdf
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdf
Tuan Yang
 
Getting Started with AWS Devops.pdf
Getting Started with AWS Devops.pdfGetting Started with AWS Devops.pdf
Getting Started with AWS Devops.pdf
Tuan Yang
 
Certified Ethical Hacker v11 First Look.pdf
Certified Ethical Hacker v11 First Look.pdfCertified Ethical Hacker v11 First Look.pdf
Certified Ethical Hacker v11 First Look.pdf
Tuan Yang
 
An overview of agile methods and agile project management
An overview of agile methods and agile project management An overview of agile methods and agile project management
An overview of agile methods and agile project management
Tuan Yang
 
The essentials of ccna master the latest principles(handouts)
The essentials of ccna master the latest principles(handouts)The essentials of ccna master the latest principles(handouts)
The essentials of ccna master the latest principles(handouts)
Tuan Yang
 
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
Tuan Yang
 
CHFI First Look by NetCom Learning - A Free Course on Digital Forensics
CHFI First Look by NetCom Learning - A Free Course on Digital ForensicsCHFI First Look by NetCom Learning - A Free Course on Digital Forensics
CHFI First Look by NetCom Learning - A Free Course on Digital Forensics
Tuan Yang
 
Master Class: Understand the Fundamentals of Architecting on AWS
Master Class: Understand the Fundamentals of Architecting on AWSMaster Class: Understand the Fundamentals of Architecting on AWS
Master Class: Understand the Fundamentals of Architecting on AWS
Tuan Yang
 
How to Deploy Microsoft 365 Apps and Workloads.
How to Deploy Microsoft 365 Apps and Workloads.How to Deploy Microsoft 365 Apps and Workloads.
How to Deploy Microsoft 365 Apps and Workloads.
Tuan Yang
 
Learn to utilize cisco unified communications for better collaboration( hando...
Learn to utilize cisco unified communications for better collaboration( hando...Learn to utilize cisco unified communications for better collaboration( hando...
Learn to utilize cisco unified communications for better collaboration( hando...
Tuan Yang
 
NetCom learning webinar how to manage your projects with disciplined agile (d...
NetCom learning webinar how to manage your projects with disciplined agile (d...NetCom learning webinar how to manage your projects with disciplined agile (d...
NetCom learning webinar how to manage your projects with disciplined agile (d...
Tuan Yang
 
NetCom learning webinar cnd first look by netcom learning - network defender fre
NetCom learning webinar cnd first look by netcom learning - network defender freNetCom learning webinar cnd first look by netcom learning - network defender fre
NetCom learning webinar cnd first look by netcom learning - network defender fre
Tuan Yang
 

More from Tuan Yang (20)

Learn How to Configure Cisco Data Center Core Networking(Handouts).pdf
Learn How to Configure Cisco Data Center Core Networking(Handouts).pdfLearn How to Configure Cisco Data Center Core Networking(Handouts).pdf
Learn How to Configure Cisco Data Center Core Networking(Handouts).pdf
 
Best Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdfBest Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdf
 
Defense Against Multi-Network Breaches.pdf
Defense Against Multi-Network Breaches.pdfDefense Against Multi-Network Breaches.pdf
Defense Against Multi-Network Breaches.pdf
 
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdf
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdfCybersecurity Incident Handling & Response in Under 40 Minutes.pdf
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdf
 
An Introduction to CompTIA Security+ - SY0-601.pdf
An Introduction to CompTIA Security+ - SY0-601.pdfAn Introduction to CompTIA Security+ - SY0-601.pdf
An Introduction to CompTIA Security+ - SY0-601.pdf
 
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...
 
What is New with CompTIA Network+.pdf
What is New with CompTIA Network+.pdfWhat is New with CompTIA Network+.pdf
What is New with CompTIA Network+.pdf
 
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdf
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdfWhat is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdf
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdf
 
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdf
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdfAgile Fundamentals One Step Guide for Agile Projects(Handout).pdf
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdf
 
Getting Started with AWS Devops.pdf
Getting Started with AWS Devops.pdfGetting Started with AWS Devops.pdf
Getting Started with AWS Devops.pdf
 
Certified Ethical Hacker v11 First Look.pdf
Certified Ethical Hacker v11 First Look.pdfCertified Ethical Hacker v11 First Look.pdf
Certified Ethical Hacker v11 First Look.pdf
 
An overview of agile methods and agile project management
An overview of agile methods and agile project management An overview of agile methods and agile project management
An overview of agile methods and agile project management
 
The essentials of ccna master the latest principles(handouts)
The essentials of ccna master the latest principles(handouts)The essentials of ccna master the latest principles(handouts)
The essentials of ccna master the latest principles(handouts)
 
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
 
CHFI First Look by NetCom Learning - A Free Course on Digital Forensics
CHFI First Look by NetCom Learning - A Free Course on Digital ForensicsCHFI First Look by NetCom Learning - A Free Course on Digital Forensics
CHFI First Look by NetCom Learning - A Free Course on Digital Forensics
 
Master Class: Understand the Fundamentals of Architecting on AWS
Master Class: Understand the Fundamentals of Architecting on AWSMaster Class: Understand the Fundamentals of Architecting on AWS
Master Class: Understand the Fundamentals of Architecting on AWS
 
How to Deploy Microsoft 365 Apps and Workloads.
How to Deploy Microsoft 365 Apps and Workloads.How to Deploy Microsoft 365 Apps and Workloads.
How to Deploy Microsoft 365 Apps and Workloads.
 
Learn to utilize cisco unified communications for better collaboration( hando...
Learn to utilize cisco unified communications for better collaboration( hando...Learn to utilize cisco unified communications for better collaboration( hando...
Learn to utilize cisco unified communications for better collaboration( hando...
 
NetCom learning webinar how to manage your projects with disciplined agile (d...
NetCom learning webinar how to manage your projects with disciplined agile (d...NetCom learning webinar how to manage your projects with disciplined agile (d...
NetCom learning webinar how to manage your projects with disciplined agile (d...
 
NetCom learning webinar cnd first look by netcom learning - network defender fre
NetCom learning webinar cnd first look by netcom learning - network defender freNetCom learning webinar cnd first look by netcom learning - network defender fre
NetCom learning webinar cnd first look by netcom learning - network defender fre
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 

A Deep Dive in the World of IT Networking (part 1)

  • 1. A Deep Dive in the World of IT Networking (Part 1) We manage learning. “Building an Innovative Learning Organization. A Framework to Build a Smarter Workforce, Adapt to Change, and Drive Growth”. Download now!
  • 3. NetCom Learning – Managed Learning Services
  • 4.
  • 5. Agenda • To be a Successful ICT Professional. • Running the IT projects successfully. • Benefit of networking. • Network Components. • Data Transfer. • IP Address. • Windows Commands. • Types of LANS. • Network Topologies. • Centralized Computing Vs. Distributive Computing. • Client Server Model. • Peer to Peer Networks • Q&A
  • 6. To be successful ICT Professional The main qualities that any successful ICTP must be keen to merit: • Certificates. • Experiences. • Language Skills. • Communications Skills. • Eagerly learn more.
  • 7. Running the ICT projects successfully To Run any ICT Project successfully regardless of it’s type whether it’s infrastructure project of software development or programming project. It’s • Documentation. • Backup . • Patch.
  • 8. Benefit Of Networking • Networks are used to exchange data. • Sharing. • Communication. • Organization. • Money.
  • 9. What is the Network •A data network is a group of devices connected by network medium. •The network medium carries signals between computers. •Signals reduce complex information to the simplest possible form. •Devices communicate by using a language called a protocol.
  • 13. Hub •A hub is the most basic of central connecting devices. •It connects each of the networked computers, known as hosts, to one another by way of copper-based cables. •Any host that sends data must first send that data to the hub, where it is amplified and broadcast to the rest of the network.
  • 14. Switch •Switch is like a Hub but built in with advanced features. It uses physical device addresses in each incoming messages so that it can deliver the message to the right destination or port. •switch don’t broadcast the received message to entire network, rather before sending it checks to which system or port should the message be sent. In other words switch connects the source and destination directly which increases the speed of the network. Both switch and hub have common features: Multiple RJ- 45 ports, power supply and connection lights.
  • 15. Router •The router acts as a central connecting device, but it also has a special communications link to the Internet, thereby allowing the hosts to send data to and receive data from computers on the Internet. •This communications link between the router and the Internet is where the LAN ends.
  • 16. Data Transfer Serial Data Transfer •Generally, when data is transferred on a Network, it is sent in a serial fashion over twisted-pair cabling. •Serial data transfer means the transfer of one bit at a time … in other words, transfer in a single-bit stream.
  • 17. Types of Data Transfer •Broadcast has data sent to every other host on the network. •Unicast has data sent to one host only. Data Transfer Rate •Data transfer rate, otherwise known as bit rate defines the maximum bits per second (bps) that can be transmitted over a network. •As mentioned, this value is rated in bits, and it is signified with a lowercase b (for example, 10 Mbps). •The lowercase b helps differentiate this amount from data that is stored on a hard drive, which uses an upper case B that stands for bytes (for example 10 MB).
  • 18. Ethernet •Ethernet is a set of rules that govern the transmission of data between network adapters and various central connecting devices. •All network adapters and central connecting devices must be compatible with Ethernet in order to communicate with each other. •Common types of Ethernet include: 802.3u or Fast Ethernet that runs at 100 Mbps. 802.3ab or Gigabit Ethernet runs at 1000 Mbps.
  • 19. IP Address •every computer and many other devices have such an address. •An IP address allows each computer to send and receive information back and forth in an orderly and efficient manner. •An IP address identifies your computer number and the network it lives on. •IP address is made of 32-bit address. The address is divided into four sections of eight bits each called octets (math). •IP divided in to 5 classes or categories class (A,B,C,D,E) each of them has a unique range of addresses •In order to know the class of the address we are forced to look to the first octet of the address. Class A (1-126),(255.0.0.0),(N.H.H.H) Class B (128-191),(255,255,0,0),(N.N.H.H) Class C (192-223),(255,255,255,0),(N.N.N.H)
  • 20. •127.0.0.0 : This network address is reserved for the loopback address. (Note: This address is not included in the range of Class A or Class B addresses.) The address 127.0.0.1 refers to the local host. •The following address ranges have been reserved for private use. 10.0.0.0 to 10.255.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255 •Use addresses in these ranges for your private networks. Routers connected to the Internet typically filter messages within these ranges and prevent them from being propagated to the Internet. Special IP Address
  • 21. Subnet Mask •The subnet mask is a group of four numbers that define what IP network the computer is a member of. •All of the 255s in a subnet mask collectively refer to the network portion, whereas the 0s refer to the host portion.
  • 22. Windows Commands IPConfig command shows IP configuration information. IPConfig
  • 24. Types Of Local Area Network Wired LAN Computers and other devices are wired using copper-based twisted-pair cables
  • 25. Wireless Local Area Network (WLAN) •A wireless local area network (WLAN) has many advantages, the most obvious of which is the ability to roam. •The wireless access point (WAP) acts as the central connecting device for the network.
  • 26. Virtual Local Area Network (VLAN) A Virtual LAN is a group of hosts with a common set of requirements that communicate as if they were connected together in a normal fashion on one switch, regardless of their physical location.
  • 27. Network Topology A network topology : defines the physical connections of hosts in a computer network. There are several types of physical topologies including: Bus, Ring, Star, Mesh, … etc. Star Topology •Most Common topology •Each computer is individually wired to a central connecting device (hub, switch or SOHO router) with twisted-pair cabling.
  • 28. Mesh Topology Every computer connects to every other computer; no central connecting device is needed.
  • 29. Ring Topology •In a LAN environment, each computer is connected to the network using a closed loop. •Used by Token Ring and FDDI. •A Token Ring network sends data logically in a ring fashion, meaning that a token goes to each computer, one at a time, and continues on in cycles. •However, Token Ring computers are physically connected in a star fashion. •Namely, all computers in a Token Ring network are connected to a central connecting device known as a Multi Access Unit (MAU) or MultiStation Access Unit (MSAU).
  • 30. Centralized Computing •The older type of computing was known as centralized computing. •This was the case during the days of the mainframe, in which there was one super computer and the rest of the devices that connected to the super computer were known as terminals (or dumb terminals). •Each terminal consisted solely of a keyboard and display with no processing power.
  • 31. Distributive Computing Today’s computing is known as distributive computing and is used for both client- server and peer-to- peer networks. This means that every device or workstation has its own processing power.
  • 32. Client/Server ModelThe client-server model is an architecture that distributes applications between servers that typically powerful computers that run the software that controls and maintains the network. This software is known as the network operating system such as Windows Server 2016 and client computers such as Windows 8 or Windows 10 machines.
  • 33. Computers that provide services: •File Server •Print Server •Web Server •Database server •Proxy Server •Application Server •Mail (Messaging ) Server •Fax Server •Remote Access Server •Telephony Server Servers
  • 34. Peer-to-Peer Networking •Peer-to-peer networking first and foremost means that each computer is treated as an equal. •Today, peer computers can serve data; the only difference is that they can only serve it to a limited number of computers at the same time. •Each user is responsible for local backup. • Security considerations are minimal.
  • 35. Watch the Live Demonstration Watch the recorded webinar here!
  • 36. Recommended Courses NetCom Learning offers a comprehensive portfolio for IT Networking training options. Please see below the list of recommended courses: CompTIA Network+ Certification Interconnecting Cisco Networking Devices, Part 1 v 3.0 - ICND1 (Entry) Routing & Switching (ICND1 and ICND2) v3.0 Prep Boot Camp - CCNAX (Associate) Check out more IT Networking training options with NetCom Learning – CLICK HERE
  • 37. Our live webinars will help you to touch base a wide variety of IT, soft skills and business productivity topics; and keep you up to date on the latest IT industry trends. Register now for our upcoming webinars: How to Manage & Secure Data with Microsoft Datacenters?- May 11 VMware vCenter 6.5 Consoles and Connections – May 15 Office 365 on any Platform (Windows, Mac, Mobile/Tablet) – May 18 Microsoft Word Power Shortcuts & Tips Part-1 – May 23 A Deep Dive in the World of IT Networking (Part 2) – May 25
  • 38. Special Promotion Whether you're learning new IT or Business skills, or you are developing a learning plan for your team, now you can register for our Guaranteed to Run classes with confidence. From Microsoft, to CompTIA, to CISSP; all classes delivered by top-notch instructors in in- person Instructor-led Classroom or Live Online. Learn more»
  • 39. We manage learning. “Building an Innovative Learning Organization. A Framework to Build a Smarter Workforce, Adapt to Change, and Drive Growth”. Download now! SarderTV is a B2B Media Platform headquartered in New York. The platform publishes exclusive video based media content from Top Corporate Leaders of Fortune 1000, Best Selling Global Authors & Ivy League Professors. Learn more - http://sardertv.com
  • 40. To get latest technology updates, please follow our social media pages!
  • 41.
  • 42. THANK YOU !!! We manage learning. “Building an Innovative Learning Organization. A Framework to Build a Smarter Workforce, Adapt to Change, and Drive Growth”. Download now!

Editor's Notes

  1. Cable is one way of transmission media which can transmit communication signals. The wired network typology uses special type of cable to connect computers on a network. There are a number of solid transmission Media types, which are listed below. - Twisted pair wire It is classified as Category 1, 2, 3, 4, 5, 5E, 6 and 7. Category 5E, 6 and 7 are high-speed cables that can transmit 1Gbps or more. - Coaxial cable Coaxial cable more resembles like TV installation cable. It is more expensive than twisted-pair cable but provide high data transmission speed.
  2. Fiber-optic cable It is a high-speed cable which transmits data using light beams through a glass bound fibers. Fiber-optic cable is high data transmission cable comparing to the other cable types. But the cost of fiber optics is very expensive which can only be purchased and installed on governmental level. ST (an AT&T Trademark) is probably still the most popular connector for multimode networks (ca. 2005), like most buildings and campuses. It has a bayonet mount and a long cylindrical 2.5 mm ceramic (usually) or polymer ferrule to hold the fiber. Most ferrules are ceramic, but some are metal or plastic. ST (an AT&T Trademark) is probably still the most popular connector for multimode networks (ca. 2005), like most buildings and campuses. It has a bayonet mount and a long cylindrical 2.5 mm ceramic (usually) or polymer ferrule to hold the fiber. Most ferrules are ceramic, but some are metal or plastic.
  3. Ping command is used to test network connectivity between two hosts.
  4. Today, such networks can consist of many types of devices other than traditional PCs, including smart phones, PDAs, tablet computers, and micro computers. Not to mention the fact that PCs and laptops equipped with wireless network adapters can connect to these networks as well.
  5. SOHO stands for small office/home office. SOHOs usually consist of businesses that are privately owned or individuals who are self-employed, so the term usually refers to both a small office space as well as a small number of employees. Since the workload for these types of businesses are often primarily on the internet, they require a local area network (LAN), which means their network hardware is structured specifically for that purpose. A SOHO network can be a mixed network of wired and wireless computers just like other local networks. Since these types of networks are meant for businesses, they also tend to include printers and sometimes voice over IP (VoIP) and fax over IP technology. A SOHO router is a model of broadband router built and marketed for use by such organizations. These are often the same routers used for standard home networking. Note: SOHO is sometimes referred to as a virtual office or single location firm. SOHO Routers vs. Home Routers While home networks shifted to predominantly Wi-Fi configurations years ago, SOHO routers continued to feature wired Ethernet. In fact, many SOHO routers did not support Wi-Fi at all. Typical examples of Ethernet SOHO routers were common such as the TP-Link TL-R402M (4-port), TL-R460 (4-port), and TL-R860 (8-port).  Another common feature of older routers was ISDN internet support. Small businesses relied on ISDN for internet connectivity as a faster alternative to dial-up networking. Modern SOHO routers require most all the same functions as home broadband routers, and in fact small businesses use the same models. Some vendors also sell routers with more advanced security and manageability features added, like the ZyXEL P-661HNU-Fx Security Gateway, a DSL broadband router with SNMP support. Another example of a popular SOHO router is the Cisco SOHO 90 Series, which is meant for up to 5 employees and includes firewall protection and VPN encryption. Other Types of SOHO Network Equipment Printers that combine the features of a basic printer with copy, scanning, and fax capability are popular with home office professionals. These so-called all-in-one printers include Wi-Fi support for joining to a home network. SOHO networks sometimes also operate an intranet web, email, and file server. These servers can be high-end PCs with added storage capacity (multi-drive disk arrays). Issues with SOHO Networking Security challenges impact SOHO networks more than other kinds of networks. Unlike larger ones, small businesses generally cannot afford to hire professional staff to manage their networks. Small businesses also are more likely targets of security attacks than households due to their financial and community position. As a business grows, it can be difficult to know how much to invest in the network infrastructure to keep it expanding to meet the company's needs. Over-investing too soon wastes valuable funds, while under-investing can significantly impact business productivity. Monitoring the network load and the responsiveness of the company's top few business applications can help identify bottlenecks before they become critical. How Small Is the "S" in SOHO? The standard definition limits SOHO networks to those that support between 1 and 10 people, but there isn't any magic that happens when the 11th person or device joins the network. The term "SOHO" is used only to identify a small network, so the number isn't as relevant. In practice, SOHO routers can support somewhat larger networks than this.
  6. Fiber Distributed Data Interface (FDDI) is a standard for data transmission in a local area network. It uses optical fiber as its standard underlying physical medium, although it was also later specified to use copper cable, in which case it may be called CDDI (Copper Distributed Data Interface), standardized as TP-PMD (Twisted-Pair Physical Medium-Dependent), also referred to as TP-DDI (Twisted-Pair Distributed Data Interface). "MSAU" redirects here. For the settlement in the Coast Province, An IBM 8226 Multistation Access Unit featuring LEDs An IBM 8228 Multistation Access Unit with accompanying Setup Aid A Media Access Unit (MAU), also known as a Multistation Access Unit (MAU or MSAU) is a device to attach multiple network stations in a Star topology as a token ring network, internally wired to connect the stations into a logical ring (generally passive i.e. non-switched and unmanaged; however managed token ring MAUs do exist in the form of CAUs, or Controlled Access Units). Passive token ring was an active IBM networking product in the 1997 time-frame, after which it was rapidly displaced by switched