SlideShare a Scribd company logo
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 4:
Network Access
Introduction to Networks
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 4: Objectives
Students will be able to:
 Explain how physical layer protocols and services
support communications across data networks.
 Build a simple network using the appropriate.
 Explain the role of the data link layer in supporting
communications across data networks.
 Compare media access control techniques and logical
topologies used in networks.
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 4
4.1 Physical Layer Protocols
4.2 Network Media
4.3 Data Link Layer Protocols
4.4 Media Access Control
4.5 Summary
Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Getting it Connected
Connecting to the Network
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Getting it Connected
Connecting to the Network
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Getting it Connected
Network Interface Cards
Connecting to the Wireless LAN with a Range Extender
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of the Physical Layer
The Physical Layer
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of the Physical Layer
Physical Layer Media
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of the Physical Layer
Physical Layer Standards
Standard
organization
Networking Standards
ISO
• ISO 8877: Officially adopted the RJ connectors (e.g., RJ-11, RJ-45)
• ISO 11801: Network cabling standard similar to EIA/TIA 568.
EIA/TIA
• TIA-568-C: Telecommunications cabling standards, used by nearly all
voice, video and data networks.
• TIA-569-B: Commercial Building Standards for Telecommunications
Pathways and Spaces
• TIA-598-C: Fiber optic color coding
• TIA-942: Telecommunications Infrastructure Standard for Data Centers
ANSI • 568-C: RJ-45 pinouts. Co-developed with EIA/TIA
ITU-T • G.992: ADSL
IEEE
• 802.3: Ethernet
• 802.11: Wireless LAN (WLAN) & Mesh (Wi-Fi certification)
• 802.15: Bluetooth
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fundamental Principles of Layer 1
Physical Layer Fundamental Principles
Media
Physical
Components
Frame Encoding
Technique
Signalling
Method
Copper
cable
• UTP
• Coaxial
• Connectors
• NICs
• Ports
• Interfaces
• Manchester Encoding
• Non-Return to Zero (NRZ)
techniques
• 4B/5B codes are used with
Multi-Level Transition Level 3
(MLT-3) signaling
• 8B/10B
• PAM5
• Changes in the
electromagnetic field
• Intensity of the
electromagnetic field
• Phase of the
electromagnetic wave
Fiber Optic
cable
• Single-mode Fiber
• Multimode Fiber
• Connectors
• NICs
• Interfaces
• Lasers and LEDs
• Photoreceptors
• Pulses of light
• Wavelength multiplexing using
different colors
• A pulse equals 1.
• No pulse is 0.
Wireless
media
• Access Points
• NICs
• Radio
• Antennae
• DSSS (direct-sequence spread-
spectrum)
• OFDM (orthogonal frequency
division multiplexing)
• Radio waves
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fundamental Principles of Layer 1
Bandwidth
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fundamental Principles of Layer 1
Throughput
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fundamental Principles of Layer 1
Types of Physical Media
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Media
Copper Cabling
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Copper Cabling
Characteristics of Copper Media
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Copper Cabling
Copper Media
Shielded Twisted Pair (STP) cableUnshielded Twisted Pair (UTP) cable
Coaxial cable
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Copper Cabling
Unshielded Twisted-Pair (UTP) Cable
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Copper Cabling
Shielded Twisted-Pair (STP) Cable
Foil Shields
Braided or Foil Shield
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Copper Cabling
Coaxial Cable
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Copper Cabling
Cooper Media Safety
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
UTP Cabling
Properties of UTP Cabling
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
UTP Cabling
UTP Cabling Standards
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
UTP Cabling
UTP Connectors
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
UTP Cabling
Types of UTP Cable
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
UTP Cabling
Testing UTP Cables
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
UTP Cabling
Testing UTP Cables
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fiber Optic Cabling
Properties of Fiber Optic Cabling
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fiber Optic Cabling
Fiber Media Cable Design
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fiber Optic Cabling
Types of Fiber Media
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fiber Optic Cabling
Network Fiber Connectors
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fiber Optic Cabling
Testing Fiber Cables
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fiber Optic Cabling
Fiber versus Copper
Implementation issues Copper media Fibre-optic
Bandwidth supported 10 Mbps – 10 Gbps 10 Mbps – 100 Gbps
Distance
Relatively short
(1 – 100 meters)
Relatively High
(1 – 100,000 meters)
Immunity to EMI and RFI Low
High
(Completely immune)
Immunity to electrical hazards Low
High
(Completely immune)
Media and connector costs Lowest Highest
Installation skills required Lowest Highest
Safety precautions Lowest Highest
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Wireless Media
Properties of Wireless Media
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
• IEEE 802.11 standards
• Commonly referred to as Wi-Fi.
• Uses CSMA/CA
• Variations include:
• 802.11a: 54 Mbps, 5 GHz
• 802.11b: 11 Mbps, 2.4 GHz
• 802.11g: 54 Mbps, 2.4 GHz
• 802.11n: 600 Mbps, 2.4 and 5 GHz
• 802.11ac: 1 Gbps, 5 GHz
• 802.11ad: 7 Gbps, 2.4 GHz, 5 GHz, and 60 GHz
• IEEE 802.15 standard
• Supports speeds up to 3 Mbps
• Provides device pairing over distances from 1 to
100 meters.
• IEEE 802.16 standard
• Provides speeds up to 1 Gbps
• Uses a point-to-multipoint topology to provide
wireless broadband access.
Wireless Media
Types of Wireless Media
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Wireless Media
Wireless LAN
Cisco Linksys EA6500 802.11ac wireless router
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Wireless Media
802.11 Wi-Fi Standards
Standard
Maximum
Speed
Frequency
Backwards
compatible
802.11a 54 Mbps 5 GHz No
802.11b 11 Mbps 2.4 GHz No
802.11g 54 Mbps 2.4 GHz 802.11b
802.11n 600 Mbps 2.4 GHz or 5 GHz 802.11b/g
802.11ac
1.3 Gbps
(1300 Mbps)
2.4 GHz and 5.5
GHz
802.11b/g/n
802.11ad
7 Gbps
(7000 Mbps)
2.4 GHz, 5 GHz and
60 GHz
802.11b/g/n/ac
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of the Data Link Layer
The Data Link Layer
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of the Data Link Layer
Data Link Sublayers
Network
Data Link
LLC Sublayer
MAC Sublayer
Physical
802.3
Ethernet
802.11
Wi-Fi
802.15
Bluetooth
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of the Data Link Layer
Media Access Control
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of the Data Link Layer
Providing Access to Media
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Link Layer
Layer 2 Frame Structure
Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Layer 2 Frame Structure
Creating a Frame
Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Link Layer
Layer 2 Standards
Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Layer 2 Standards
Data Link Layer Standards
Standard
organization
Networking Standards
IEEE
• 802.2: Logical Link Control (LLC)
• 802.3: Ethernet
• 802.4: Token bus
• 802.5: Token passing
• 802.11: Wireless LAN (WLAN) & Mesh (Wi-Fi certification)
• 802.15: Bluetooth
• 802.16: WiMax
ITU-T
• G.992: ADSL
• G.8100 - G.8199: MPLS over Transport aspects
• Q.921: ISDN
• Q.922: Frame Relay
ISO
• HDLC (High Level Data Link Control)
• ISO 9314: FDDI Media Access Control (MAC)
ANSI • X3T9.5 and X3T12: Fiber Distributed Data Interface (FDDI)
Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Topologies
Controlling Access to the Media
Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Topologies
Physical and Logical Topologies
Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
WAN Topologies
Common Physical WAN Topologies
Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
WAN Topologies
Physical Point-to-Point Topology
Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
WAN Topologies
Logical Point-to-Point Topology
Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
WAN Topologies
Half and Full Duplex
Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LAN Topologies
Physical LAN Topologies
Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LAN Topologies
Logical Topology for Shared Media
Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LAN Topologies
Contention-Based Access
Characteristics Contention-Based Technologies
• Stations can transmit at any time
• Collision exist
• There are mechanisms to resolve
contention for the media
• CSMA/CD for 802.3 Ethernet networks
• CSMA/CA for 802.11 wireless networks
Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LAN Topologies
Multi-Access Topology
Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LAN Topologies
Controlled Access
Characteristics Controlled Access Technologies
• Only one station can transmit at a time
• Devices wishing to transmit must wait
their turn
• No collisions
• May use a token passing method
• Token Ring (IEEE 802.5)
• Fiber Distributed Data Interface (FDDI)
Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LAN Topologies
Ring Topology
Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Link Frame
The Frame
Presentation_ID 58© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Link Frame
The Header
Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Link Frame
Layer 2 Address
Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Link Frame
The Trailer
Presentation_ID 61© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Link Frame
LAN and WAN Frames
Presentation_ID 62© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Link Frame
Ethernet Frame
Presentation_ID 63© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Link Frame
Point-to-Point Protocol Frame
Presentation_ID 64© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Link Frame
802.11 Wireless Frame
Presentation_ID 65© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Access
Summary
• Physical Layer Protocols
• Network Media
• Data Link Layer Protocols
• Media Access Control
Presentation_ID 66© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

What's hot

Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1
Hamza Malik
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
Irsandi Hasan
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9
Irsandi Hasan
 
CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6
Irsandi Hasan
 
CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2
Irsandi Hasan
 
ccna1 v5 cap2
ccna1 v5 cap2ccna1 v5 cap2
ccna1 v5 cap2
lvstarodub
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
Nil Menon
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
Irsandi Hasan
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
Irsandi Hasan
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application Layer
Vuz Dở Hơi
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the network
Vuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
Nil Menon
 
Chapter 01 - Exploring the Network
Chapter 01 -  Exploring the NetworkChapter 01 -  Exploring the Network
Chapter 01 - Exploring the Network
Yaser Rahmati
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5
Nil Menon
 
CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7
Irsandi Hasan
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11
Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
Nil Menon
 
Itn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the networkItn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the network
joehurst87
 

What's hot (18)

Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9
 
CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6
 
CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2
 
ccna1 v5 cap2
ccna1 v5 cap2ccna1 v5 cap2
ccna1 v5 cap2
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application Layer
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the network
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
 
Chapter 01 - Exploring the Network
Chapter 01 -  Exploring the NetworkChapter 01 -  Exploring the Network
Chapter 01 - Exploring the Network
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5
 
CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
Itn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the networkItn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the network
 

Viewers also liked

Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8
Hamza Malik
 
Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3
Hamza Malik
 
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11
Hamza Malik
 
Ccna v5-S1-Chapter 9
Ccna v5-S1-Chapter 9Ccna v5-S1-Chapter 9
Ccna v5-S1-Chapter 9
Hamza Malik
 
Ccna v5-S1-Chapter 2
Ccna v5-S1-Chapter 2Ccna v5-S1-Chapter 2
Ccna v5-S1-Chapter 2
Hamza Malik
 
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
CCNAv5 - S1: Chapter 2 - Configuring a network operating systemCCNAv5 - S1: Chapter 2 - Configuring a network operating system
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
Vuz Dở Hơi
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
Vuz Dở Hơi
 
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
Vuz Dở Hơi
 
CCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCPCCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCP
Vuz Dở Hơi
 
CCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingCCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and Licensing
Vuz Dở Hơi
 
CCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanCCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The Wan
Vuz Dở Hơi
 
CCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband SolutionsCCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband Solutions
Vuz Dở Hơi
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
Vuz Dở Hơi
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
Vuz Dở Hơi
 
CCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the networkCCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the network
Vuz Dở Hơi
 
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
Vuz Dở Hơi
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
Vuz Dở Hơi
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
Vuz Dở Hơi
 
SQL JOIN
SQL JOINSQL JOIN
SQL JOIN
Ritwik Das
 
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame Relay
Vuz Dở Hơi
 

Viewers also liked (20)

Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8
 
Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3
 
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11
 
Ccna v5-S1-Chapter 9
Ccna v5-S1-Chapter 9Ccna v5-S1-Chapter 9
Ccna v5-S1-Chapter 9
 
Ccna v5-S1-Chapter 2
Ccna v5-S1-Chapter 2Ccna v5-S1-Chapter 2
Ccna v5-S1-Chapter 2
 
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
CCNAv5 - S1: Chapter 2 - Configuring a network operating systemCCNAv5 - S1: Chapter 2 - Configuring a network operating system
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
 
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
 
CCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCPCCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCP
 
CCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingCCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and Licensing
 
CCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanCCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The Wan
 
CCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband SolutionsCCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband Solutions
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
 
CCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the networkCCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the network
 
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
 
SQL JOIN
SQL JOINSQL JOIN
SQL JOIN
 
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame Relay
 

Similar to Ccna v5-S1-Chapter 4

Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5
United International University
 
Chapter 04 - Network Access
Chapter 04 - Network AccessChapter 04 - Network Access
Chapter 04 - Network Access
Yaser Rahmati
 
Chapter 4 : Network access
Chapter 4 : Network accessChapter 4 : Network access
Chapter 4 : Network access
teknetir
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access
Vuz Dở Hơi
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
Irsandi Hasan
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
Waqas Ahmed Nawaz
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
Irsandi Hasan
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and Communications
Yaser Rahmati
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communications
teknetir
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
Vuz Dở Hơi
 
Itn6 instructor materials_chapter4
Itn6 instructor materials_chapter4Itn6 instructor materials_chapter4
Itn6 instructor materials_chapter4
limenih muluneh
 
CCNA2 Verson6 Chapter4
CCNA2 Verson6 Chapter4CCNA2 Verson6 Chapter4
CCNA2 Verson6 Chapter4
Chaing Ravuth
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
Vuz Dở Hơi
 
Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02
Mustapha Kohili
 
Chapter 1 : Exploring the Network
Chapter 1 : Exploring the NetworkChapter 1 : Exploring the Network
Chapter 1 : Exploring the Network
teknetir
 
Itn instruction ppt_chapter3
Itn instruction ppt_chapter3Itn instruction ppt_chapter3
Itn instruction ppt_chapter3
Universitas Teknokrat Indonesia
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
Waqas Ahmed Nawaz
 
NetEss_Lecture Notes 1 (1).pptx
NetEss_Lecture Notes 1 (1).pptxNetEss_Lecture Notes 1 (1).pptx
NetEss_Lecture Notes 1 (1).pptx
SaqibAhmedKhan4
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskills
Tiago Monteiro
 
Introduction of Exploring the Network Part 1
Introduction of Exploring the Network Part 1Introduction of Exploring the Network Part 1
Introduction of Exploring the Network Part 1
laylam12
 

Similar to Ccna v5-S1-Chapter 4 (20)

Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5
 
Chapter 04 - Network Access
Chapter 04 - Network AccessChapter 04 - Network Access
Chapter 04 - Network Access
 
Chapter 4 : Network access
Chapter 4 : Network accessChapter 4 : Network access
Chapter 4 : Network access
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and Communications
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communications
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
 
Itn6 instructor materials_chapter4
Itn6 instructor materials_chapter4Itn6 instructor materials_chapter4
Itn6 instructor materials_chapter4
 
CCNA2 Verson6 Chapter4
CCNA2 Verson6 Chapter4CCNA2 Verson6 Chapter4
CCNA2 Verson6 Chapter4
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
 
Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02
 
Chapter 1 : Exploring the Network
Chapter 1 : Exploring the NetworkChapter 1 : Exploring the Network
Chapter 1 : Exploring the Network
 
Itn instruction ppt_chapter3
Itn instruction ppt_chapter3Itn instruction ppt_chapter3
Itn instruction ppt_chapter3
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
 
NetEss_Lecture Notes 1 (1).pptx
NetEss_Lecture Notes 1 (1).pptxNetEss_Lecture Notes 1 (1).pptx
NetEss_Lecture Notes 1 (1).pptx
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskills
 
Introduction of Exploring the Network Part 1
Introduction of Exploring the Network Part 1Introduction of Exploring the Network Part 1
Introduction of Exploring the Network Part 1
 

Recently uploaded

Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 

Recently uploaded (20)

Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 

Ccna v5-S1-Chapter 4

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 4: Network Access Introduction to Networks
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 4: Objectives Students will be able to:  Explain how physical layer protocols and services support communications across data networks.  Build a simple network using the appropriate.  Explain the role of the data link layer in supporting communications across data networks.  Compare media access control techniques and logical topologies used in networks.
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 4 4.1 Physical Layer Protocols 4.2 Network Media 4.3 Data Link Layer Protocols 4.4 Media Access Control 4.5 Summary
  • 4. Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Getting it Connected Connecting to the Network
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Getting it Connected Connecting to the Network
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Getting it Connected Network Interface Cards Connecting to the Wireless LAN with a Range Extender
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of the Physical Layer The Physical Layer
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of the Physical Layer Physical Layer Media
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of the Physical Layer Physical Layer Standards Standard organization Networking Standards ISO • ISO 8877: Officially adopted the RJ connectors (e.g., RJ-11, RJ-45) • ISO 11801: Network cabling standard similar to EIA/TIA 568. EIA/TIA • TIA-568-C: Telecommunications cabling standards, used by nearly all voice, video and data networks. • TIA-569-B: Commercial Building Standards for Telecommunications Pathways and Spaces • TIA-598-C: Fiber optic color coding • TIA-942: Telecommunications Infrastructure Standard for Data Centers ANSI • 568-C: RJ-45 pinouts. Co-developed with EIA/TIA ITU-T • G.992: ADSL IEEE • 802.3: Ethernet • 802.11: Wireless LAN (WLAN) & Mesh (Wi-Fi certification) • 802.15: Bluetooth
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fundamental Principles of Layer 1 Physical Layer Fundamental Principles Media Physical Components Frame Encoding Technique Signalling Method Copper cable • UTP • Coaxial • Connectors • NICs • Ports • Interfaces • Manchester Encoding • Non-Return to Zero (NRZ) techniques • 4B/5B codes are used with Multi-Level Transition Level 3 (MLT-3) signaling • 8B/10B • PAM5 • Changes in the electromagnetic field • Intensity of the electromagnetic field • Phase of the electromagnetic wave Fiber Optic cable • Single-mode Fiber • Multimode Fiber • Connectors • NICs • Interfaces • Lasers and LEDs • Photoreceptors • Pulses of light • Wavelength multiplexing using different colors • A pulse equals 1. • No pulse is 0. Wireless media • Access Points • NICs • Radio • Antennae • DSSS (direct-sequence spread- spectrum) • OFDM (orthogonal frequency division multiplexing) • Radio waves
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fundamental Principles of Layer 1 Bandwidth
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fundamental Principles of Layer 1 Throughput
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fundamental Principles of Layer 1 Types of Physical Media
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Media Copper Cabling
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Copper Cabling Characteristics of Copper Media
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Copper Cabling Copper Media Shielded Twisted Pair (STP) cableUnshielded Twisted Pair (UTP) cable Coaxial cable
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Copper Cabling Unshielded Twisted-Pair (UTP) Cable
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Copper Cabling Shielded Twisted-Pair (STP) Cable Foil Shields Braided or Foil Shield
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Copper Cabling Coaxial Cable
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Copper Cabling Cooper Media Safety
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential UTP Cabling Properties of UTP Cabling
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential UTP Cabling UTP Cabling Standards
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential UTP Cabling UTP Connectors
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential UTP Cabling Types of UTP Cable
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential UTP Cabling Testing UTP Cables
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential UTP Cabling Testing UTP Cables
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fiber Optic Cabling Properties of Fiber Optic Cabling
  • 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fiber Optic Cabling Fiber Media Cable Design
  • 29. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fiber Optic Cabling Types of Fiber Media
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fiber Optic Cabling Network Fiber Connectors
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fiber Optic Cabling Testing Fiber Cables
  • 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fiber Optic Cabling Fiber versus Copper Implementation issues Copper media Fibre-optic Bandwidth supported 10 Mbps – 10 Gbps 10 Mbps – 100 Gbps Distance Relatively short (1 – 100 meters) Relatively High (1 – 100,000 meters) Immunity to EMI and RFI Low High (Completely immune) Immunity to electrical hazards Low High (Completely immune) Media and connector costs Lowest Highest Installation skills required Lowest Highest Safety precautions Lowest Highest
  • 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Wireless Media Properties of Wireless Media
  • 34. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential • IEEE 802.11 standards • Commonly referred to as Wi-Fi. • Uses CSMA/CA • Variations include: • 802.11a: 54 Mbps, 5 GHz • 802.11b: 11 Mbps, 2.4 GHz • 802.11g: 54 Mbps, 2.4 GHz • 802.11n: 600 Mbps, 2.4 and 5 GHz • 802.11ac: 1 Gbps, 5 GHz • 802.11ad: 7 Gbps, 2.4 GHz, 5 GHz, and 60 GHz • IEEE 802.15 standard • Supports speeds up to 3 Mbps • Provides device pairing over distances from 1 to 100 meters. • IEEE 802.16 standard • Provides speeds up to 1 Gbps • Uses a point-to-multipoint topology to provide wireless broadband access. Wireless Media Types of Wireless Media
  • 35. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Wireless Media Wireless LAN Cisco Linksys EA6500 802.11ac wireless router
  • 36. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Wireless Media 802.11 Wi-Fi Standards Standard Maximum Speed Frequency Backwards compatible 802.11a 54 Mbps 5 GHz No 802.11b 11 Mbps 2.4 GHz No 802.11g 54 Mbps 2.4 GHz 802.11b 802.11n 600 Mbps 2.4 GHz or 5 GHz 802.11b/g 802.11ac 1.3 Gbps (1300 Mbps) 2.4 GHz and 5.5 GHz 802.11b/g/n 802.11ad 7 Gbps (7000 Mbps) 2.4 GHz, 5 GHz and 60 GHz 802.11b/g/n/ac
  • 37. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of the Data Link Layer The Data Link Layer
  • 38. Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of the Data Link Layer Data Link Sublayers Network Data Link LLC Sublayer MAC Sublayer Physical 802.3 Ethernet 802.11 Wi-Fi 802.15 Bluetooth
  • 39. Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of the Data Link Layer Media Access Control
  • 40. Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of the Data Link Layer Providing Access to Media
  • 41. Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Link Layer Layer 2 Frame Structure
  • 42. Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Layer 2 Frame Structure Creating a Frame
  • 43. Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Link Layer Layer 2 Standards
  • 44. Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Layer 2 Standards Data Link Layer Standards Standard organization Networking Standards IEEE • 802.2: Logical Link Control (LLC) • 802.3: Ethernet • 802.4: Token bus • 802.5: Token passing • 802.11: Wireless LAN (WLAN) & Mesh (Wi-Fi certification) • 802.15: Bluetooth • 802.16: WiMax ITU-T • G.992: ADSL • G.8100 - G.8199: MPLS over Transport aspects • Q.921: ISDN • Q.922: Frame Relay ISO • HDLC (High Level Data Link Control) • ISO 9314: FDDI Media Access Control (MAC) ANSI • X3T9.5 and X3T12: Fiber Distributed Data Interface (FDDI)
  • 45. Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Topologies Controlling Access to the Media
  • 46. Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Topologies Physical and Logical Topologies
  • 47. Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential WAN Topologies Common Physical WAN Topologies
  • 48. Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential WAN Topologies Physical Point-to-Point Topology
  • 49. Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential WAN Topologies Logical Point-to-Point Topology
  • 50. Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential WAN Topologies Half and Full Duplex
  • 51. Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LAN Topologies Physical LAN Topologies
  • 52. Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LAN Topologies Logical Topology for Shared Media
  • 53. Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LAN Topologies Contention-Based Access Characteristics Contention-Based Technologies • Stations can transmit at any time • Collision exist • There are mechanisms to resolve contention for the media • CSMA/CD for 802.3 Ethernet networks • CSMA/CA for 802.11 wireless networks
  • 54. Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LAN Topologies Multi-Access Topology
  • 55. Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LAN Topologies Controlled Access Characteristics Controlled Access Technologies • Only one station can transmit at a time • Devices wishing to transmit must wait their turn • No collisions • May use a token passing method • Token Ring (IEEE 802.5) • Fiber Distributed Data Interface (FDDI)
  • 56. Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LAN Topologies Ring Topology
  • 57. Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Link Frame The Frame
  • 58. Presentation_ID 58© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Link Frame The Header
  • 59. Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Link Frame Layer 2 Address
  • 60. Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Link Frame The Trailer
  • 61. Presentation_ID 61© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Link Frame LAN and WAN Frames
  • 62. Presentation_ID 62© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Link Frame Ethernet Frame
  • 63. Presentation_ID 63© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Link Frame Point-to-Point Protocol Frame
  • 64. Presentation_ID 64© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Link Frame 802.11 Wireless Frame
  • 65. Presentation_ID 65© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Access Summary • Physical Layer Protocols • Network Media • Data Link Layer Protocols • Media Access Control
  • 66. Presentation_ID 66© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential