SlideShare a Scribd company logo
Chapter 4: 
Network Access 
Introduction to Networks 
© 2008 Cisco Systems, Inc. All Presentation_ID rights reserved. Cisco Confidential 1
Chapter 4: Objectives 
Students will be able to: 
 Explain how physical layer protocols and services 
support communications across data networks. 
 Build a simple network using the appropriate. 
 Explain the role of the data link layer in supporting 
communications across data networks. 
 Compare media access control techniques and logical 
topologies used in networks. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Chapter 4 
4.1 Physical Layer Protocols 
4.2 Network Media 
4.3 Data Link Layer Protocols 
4.4 Media Access Control 
4.5 Summary 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Getting it Connected 
Connecting to the Network 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Getting it Connected 
Connecting to the Network 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Getting it Connected 
Network Interface Cards 
Connecting to the Wireless LAN with a Range Extender 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Purpose of the Physical Layer 
The Physical Layer 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Purpose of the Physical Layer 
Physical Layer Media 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Purpose of the Physical Layer 
Physical Layer Standards 
Standard 
organization 
Networking Standards 
ISO 
• ISO 8877: Officially adopted the RJ connectors (e.g., RJ-11, RJ-45) 
• ISO 11801: Network cabling standard similar to EIA/TIA 568. 
EIA/TIA 
• TIA-568-C: Telecommunications cabling standards, used by nearly all 
voice, video and data networks. 
• TIA-569-B: Commercial Building Standards for Telecommunications 
Pathways and Spaces 
• TIA-598-C: Fiber optic color coding 
• TIA-942: Telecommunications Infrastructure Standard for Data Centers 
ANSI • 568-C: RJ-45 pinouts. Co-developed with EIA/TIA 
ITU-T • G.992: ADSL 
IEEE 
• 802.3: Ethernet 
• 802.11: Wireless LAN (WLAN) & Mesh (Wi-Fi certification) 
• 802.15: Bluetooth 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Fundamental Principles of Layer 1 
Physical Layer Fundamental Principles 
Media 
Physical 
Components 
Frame Encoding 
Technique 
Signalling 
Method 
Copper 
cable 
• UTP 
• Coaxial 
• Connectors 
• NICs 
• Ports 
• Interfaces 
• Manchester Encoding 
• Non-Return to Zero (NRZ) 
techniques 
• 4B/5B codes are used with 
Multi-Level Transition Level 3 
(MLT-3) signaling 
• 8B/10B 
• PAM5 
• Changes in the 
electromagnetic field 
• Intensity of the 
electromagnetic field 
• Phase of the 
electromagnetic wave 
Fiber Optic 
cable 
• Single-mode Fiber 
• Multimode Fiber 
• Connectors 
• NICs 
• Interfaces 
• Lasers and LEDs 
• Photoreceptors 
• Pulses of light 
• Wavelength multiplexing using 
different colors 
• A pulse equals 1. 
• No pulse is 0. 
Wireless 
media 
• Access Points 
• NICs 
• Radio 
• Antennae 
• DSSS (direct-sequence spread-spectrum) 
• OFDM (orthogonal frequency 
division multiplexing) 
• Radio waves 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Fundamental Principles of Layer 1 
Bandwidth 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Fundamental Principles of Layer 1 
Throughput 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Fundamental Principles of Layer 1 
Types of Physical Media 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Network Media 
Copper Cabling 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Copper Cabling 
Characteristics of Copper Media 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Copper Cabling 
Copper Media 
Unshielded Twisted Pair (UTP) cable Shielded Twisted Pair (STP) cable 
Coaxial cable 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Copper Cabling 
Unshielded Twisted-Pair (UTP) Cable 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Copper Cabling 
Shielded Twisted-Pair (STP) Cable 
Braided or Foil Shield 
Foil Shields 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Copper Cabling 
Coaxial Cable 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Copper Cabling 
Cooper Media Safety 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
UTP Cabling 
Properties of UTP Cabling 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
UTP Cabling 
UTP Cabling Standards 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
UTP Cabling 
UTP Connectors 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
UTP Cabling 
Types of UTP Cable 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
UTP Cabling 
Testing UTP Cables 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
UTP Cabling 
Testing UTP Cables 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Fiber Optic Cabling 
Properties of Fiber Optic Cabling 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Fiber Optic Cabling 
Fiber Media Cable Design 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Fiber Optic Cabling 
Types of Fiber Media 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Fiber Optic Cabling 
Network Fiber Connectors 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Fiber Optic Cabling 
Testing Fiber Cables 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Fiber Optic Cabling 
Fiber versus Copper 
Implementation issues Copper media Fibre-optic 
Bandwidth supported 10 Mbps – 10 Gbps 10 Mbps – 100 Gbps 
Distance 
Relatively short 
(1 – 100 meters) 
Relatively High 
(1 – 100,000 meters) 
Immunity to EMI and RFI Low 
High 
(Completely immune) 
Immunity to electrical hazards Low 
High 
(Completely immune) 
Media and connector costs Lowest Highest 
Installation skills required Lowest Highest 
Safety precautions Lowest Highest 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Wireless Media 
Properties of Wireless Media 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Wireless Media 
Types of Wireless Media 
• IEEE 802.11 standards 
• Commonly referred to as Wi-Fi. 
• Uses CSMA/CA 
• Variations include: 
• 802.11a: 54 Mbps, 5 GHz 
• 802.11b: 11 Mbps, 2.4 GHz 
• 802.11g: 54 Mbps, 2.4 GHz 
• 802.11n: 600 Mbps, 2.4 and 5 GHz 
• 802.11ac: 1 Gbps, 5 GHz 
• 802.11ad: 7 Gbps, 2.4 GHz, 5 GHz, and 60 GHz 
• IEEE 802.15 standard 
• Supports speeds up to 3 Mbps 
• Provides device pairing over distances from 1 to 
100 meters. 
• IEEE 802.16 standard 
• Provides speeds up to 1 Gbps 
• Uses a point-to-multipoint topology to provide 
wireless broadband access. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Wireless Media 
Wireless LAN 
Cisco Linksys EA6500 802.11ac wireless router 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Wireless Media 
802.11 Wi-Fi Standards 
Standard 
Maximum 
Speed 
Frequency 
Backwards 
compatible 
802.11a 54 Mbps 5 GHz No 
802.11b 11 Mbps 2.4 GHz No 
802.11g 54 Mbps 2.4 GHz 802.11b 
802.11n 600 Mbps 2.4 GHz or 5 GHz 802.11b/g 
802.11ac 
1.3 Gbps 
(1300 Mbps) 
2.4 GHz and 5.5 
GHz 
802.11b/g/n 
802.11ad 
7 Gbps 
(7000 Mbps) 
2.4 GHz, 5 GHz and 
60 GHz 
802.11b/g/n/ac 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
Purpose of the Data Link Layer 
The Data Link Layer 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
Purpose of the Data Link Layer 
Data Link Sublayers 
Network 
Data Link 
LLC Sublayer 
MAC Sublayer 
Physical 
802.3 
Ethernet 
802.11 
Wi-Fi 
802.15 
Bluetooth 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
Purpose of the Data Link Layer 
Media Access Control 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
Purpose of the Data Link Layer 
Providing Access to Media 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
Data Link Layer 
Layer 2 Frame Structure 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
Layer 2 Frame Structure 
Creating a Frame 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
Data Link Layer 
Layer 2 Standards 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
Layer 2 Standards 
Data Link Layer Standards 
Standard 
organization 
Networking Standards 
IEEE 
• 802.2: Logical Link Control (LLC) 
• 802.3: Ethernet 
• 802.4: Token bus 
• 802.5: Token passing 
• 802.11: Wireless LAN (WLAN) & Mesh (Wi-Fi certification) 
• 802.15: Bluetooth 
• 802.16: WiMax 
ITU-T 
• G.992: ADSL 
• G.8100 - G.8199: MPLS over Transport aspects 
• Q.921: ISDN 
• Q.922: Frame Relay 
ISO 
• HDLC (High Level Data Link Control) 
• ISO 9314: FDDI Media Access Control (MAC) 
ANSI • X3T9.5 and X3T12: Fiber Distributed Data Interface (FDDI) 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
Topologies 
Controlling Access to the Media 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
Topologies 
Physical and Logical Topologies 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
WAN Topologies 
Common Physical WAN Topologies 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
WAN Topologies 
Physical Point-to-Point Topology 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
WAN Topologies 
Logical Point-to-Point Topology 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
WAN Topologies 
Half and Full Duplex 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
LAN Topologies 
Physical LAN Topologies 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51
LAN Topologies 
Logical Topology for Shared Media 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52
LAN Topologies 
Contention-Based Access 
Characteristics Contention-Based Technologies 
• Stations can transmit at any time 
• Collision exist 
• There are mechanisms to resolve 
contention for the media 
• CSMA/CD for 802.3 Ethernet networks 
• CSMA/CA for 802.11 wireless networks 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53
LAN Topologies 
Multi-Access Topology 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54
LAN Topologies 
Controlled Access 
Characteristics Controlled Access Technologies 
• Only one station can transmit at a time 
• Devices wishing to transmit must wait 
their turn 
• No collisions 
• May use a token passing method 
• Token Ring (IEEE 802.5) 
• Fiber Distributed Data Interface (FDDI) 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 55
LAN Topologies 
Ring Topology 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 56
Data Link Frame 
The Frame 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 57
Data Link Frame 
The Header 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 58
Data Link Frame 
Layer 2 Address 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 59
Data Link Frame 
The Trailer 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 60
Data Link Frame 
LAN and WAN Frames 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 61
Data Link Frame 
Ethernet Frame 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 62
Data Link Frame 
Point-to-Point Protocol Frame 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 63
Data Link Frame 
802.11 Wireless Frame 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 64
Network Access 
Summary 
• Physical Layer Protocols 
• Network Media 
• Data Link Layer Protocols 
• Media Access Control 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 65
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 66

More Related Content

What's hot

CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
Vuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
Nil Menon
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the network
Vuz Dở Hơi
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
Irsandi Hasan
 
CCNA3 Verson6 Chapter3
CCNA3 Verson6 Chapter3CCNA3 Verson6 Chapter3
CCNA3 Verson6 Chapter3
Chaing Ravuth
 
CCNA3 Verson6 Chapter1
CCNA3 Verson6 Chapter1CCNA3 Verson6 Chapter1
CCNA3 Verson6 Chapter1
Chaing Ravuth
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
Nil Menon
 
CCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCPCCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCP
Vuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3
Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9
Nil Menon
 
Cisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined NetworkingCisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined Networking
Zivaro Inc
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
Nil Menon
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communications
teknetir
 
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1
Nil Menon
 
CCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the networkCCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the network
Vuz Dở Hơi
 
CCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetCCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - Ethernet
Vuz Dở Hơi
 
Addressing the Network – IPv4
Addressing the Network – IPv4Addressing the Network – IPv4
Addressing the Network – IPv4
Sachii Dosti
 
Cisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advanceCisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advance
Bertrand Duvivier
 
Ccnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] ClassCcnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] Class
SagarR24
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)
Peter R. Egli
 

What's hot (20)

CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the network
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA3 Verson6 Chapter3
CCNA3 Verson6 Chapter3CCNA3 Verson6 Chapter3
CCNA3 Verson6 Chapter3
 
CCNA3 Verson6 Chapter1
CCNA3 Verson6 Chapter1CCNA3 Verson6 Chapter1
CCNA3 Verson6 Chapter1
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
 
CCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCPCCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCP
 
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3
 
CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9
 
Cisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined NetworkingCisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined Networking
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communications
 
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1
 
CCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the networkCCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the network
 
CCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetCCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - Ethernet
 
Addressing the Network – IPv4
Addressing the Network – IPv4Addressing the Network – IPv4
Addressing the Network – IPv4
 
Cisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advanceCisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advance
 
Ccnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] ClassCcnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] Class
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)
 

Viewers also liked

CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentals
Ahmed Habib
 
CCNA Security - Chapter 7
CCNA Security - Chapter 7CCNA Security - Chapter 7
CCNA Security - Chapter 7Irsandi Hasan
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5Irsandi Hasan
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9Irsandi Hasan
 
CCNA Security - Chapter 8
CCNA Security - Chapter 8CCNA Security - Chapter 8
CCNA Security - Chapter 8Irsandi Hasan
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
Irsandi Hasan
 
CCNA Security - Chapter 6
CCNA Security - Chapter 6CCNA Security - Chapter 6
CCNA Security - Chapter 6Irsandi Hasan
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4Irsandi Hasan
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
Irsandi Hasan
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asa
Ahmed Habib
 
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
Ahmed Habib
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4Irsandi Hasan
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3Irsandi Hasan
 
CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8
Irsandi Hasan
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7
Irsandi Hasan
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAA
Ahmed Habib
 

Viewers also liked (20)

CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentals
 
CCNA Security - Chapter 7
CCNA Security - Chapter 7CCNA Security - Chapter 7
CCNA Security - Chapter 7
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9
 
OSPF v3
OSPF v3OSPF v3
OSPF v3
 
ITE - Chapter 9
ITE - Chapter 9ITE - Chapter 9
ITE - Chapter 9
 
CCNA Security - Chapter 8
CCNA Security - Chapter 8CCNA Security - Chapter 8
CCNA Security - Chapter 8
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA Security - Chapter 6
CCNA Security - Chapter 6CCNA Security - Chapter 6
CCNA Security - Chapter 6
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
ITE - Chapter 2
ITE - Chapter 2ITE - Chapter 2
ITE - Chapter 2
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asa
 
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3
 
CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7
 
ITE - Chapter 7
ITE - Chapter 7ITE - Chapter 7
ITE - Chapter 7
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAA
 

Similar to CCNA RS_ITN - Chapter 4

Itn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessItn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_access
Universitas Teknokrat Indonesia
 
Itn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessItn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_access
bebe tampan
 
Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4
Hamza Malik
 
Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5
United International University
 
Chapter 04 - Network Access
Chapter 04 - Network AccessChapter 04 - Network Access
Chapter 04 - Network Access
Yaser Rahmati
 
Chapter 4 : Network access
Chapter 4 : Network accessChapter 4 : Network access
Chapter 4 : Network access
teknetir
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access
Vuz Dở Hơi
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
Irsandi Hasan
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
Waqas Ahmed Nawaz
 
Itn6 instructor materials_chapter4
Itn6 instructor materials_chapter4Itn6 instructor materials_chapter4
Itn6 instructor materials_chapter4
limenih muluneh
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
Irsandi Hasan
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
Nil Menon
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and Communications
Yaser Rahmati
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
Vuz Dở Hơi
 
Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3
Hamza Malik
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
Vuz Dở Hơi
 
Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2
Sachii Dosti
 
CCNA2 Verson6 Chapter4
CCNA2 Verson6 Chapter4CCNA2 Verson6 Chapter4
CCNA2 Verson6 Chapter4
Chaing Ravuth
 
Itn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the networkItn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the network
joehurst87
 

Similar to CCNA RS_ITN - Chapter 4 (20)

Itn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessItn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_access
 
Itn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessItn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_access
 
Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4
 
Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5
 
Chapter 04 - Network Access
Chapter 04 - Network AccessChapter 04 - Network Access
Chapter 04 - Network Access
 
Chapter 4 : Network access
Chapter 4 : Network accessChapter 4 : Network access
Chapter 4 : Network access
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
 
Itn6 instructor materials_chapter4
Itn6 instructor materials_chapter4Itn6 instructor materials_chapter4
Itn6 instructor materials_chapter4
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and Communications
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
 
Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
 
Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2
 
CCNA2 Verson6 Chapter4
CCNA2 Verson6 Chapter4CCNA2 Verson6 Chapter4
CCNA2 Verson6 Chapter4
 
Itn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the networkItn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the network
 

More from Irsandi Hasan

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
Irsandi Hasan
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
Irsandi Hasan
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
Irsandi Hasan
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
Irsandi Hasan
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
Irsandi Hasan
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
Irsandi Hasan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
Irsandi Hasan
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2
Irsandi Hasan
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
Irsandi Hasan
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
Irsandi Hasan
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10
Irsandi Hasan
 

More from Irsandi Hasan (20)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10
 

Recently uploaded

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

CCNA RS_ITN - Chapter 4

  • 1. Chapter 4: Network Access Introduction to Networks © 2008 Cisco Systems, Inc. All Presentation_ID rights reserved. Cisco Confidential 1
  • 2. Chapter 4: Objectives Students will be able to:  Explain how physical layer protocols and services support communications across data networks.  Build a simple network using the appropriate.  Explain the role of the data link layer in supporting communications across data networks.  Compare media access control techniques and logical topologies used in networks. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
  • 3. Chapter 4 4.1 Physical Layer Protocols 4.2 Network Media 4.3 Data Link Layer Protocols 4.4 Media Access Control 4.5 Summary Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  • 4. Getting it Connected Connecting to the Network Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
  • 5. Getting it Connected Connecting to the Network Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
  • 6. Getting it Connected Network Interface Cards Connecting to the Wireless LAN with a Range Extender Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
  • 7. Purpose of the Physical Layer The Physical Layer Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
  • 8. Purpose of the Physical Layer Physical Layer Media Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
  • 9. Purpose of the Physical Layer Physical Layer Standards Standard organization Networking Standards ISO • ISO 8877: Officially adopted the RJ connectors (e.g., RJ-11, RJ-45) • ISO 11801: Network cabling standard similar to EIA/TIA 568. EIA/TIA • TIA-568-C: Telecommunications cabling standards, used by nearly all voice, video and data networks. • TIA-569-B: Commercial Building Standards for Telecommunications Pathways and Spaces • TIA-598-C: Fiber optic color coding • TIA-942: Telecommunications Infrastructure Standard for Data Centers ANSI • 568-C: RJ-45 pinouts. Co-developed with EIA/TIA ITU-T • G.992: ADSL IEEE • 802.3: Ethernet • 802.11: Wireless LAN (WLAN) & Mesh (Wi-Fi certification) • 802.15: Bluetooth Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
  • 10. Fundamental Principles of Layer 1 Physical Layer Fundamental Principles Media Physical Components Frame Encoding Technique Signalling Method Copper cable • UTP • Coaxial • Connectors • NICs • Ports • Interfaces • Manchester Encoding • Non-Return to Zero (NRZ) techniques • 4B/5B codes are used with Multi-Level Transition Level 3 (MLT-3) signaling • 8B/10B • PAM5 • Changes in the electromagnetic field • Intensity of the electromagnetic field • Phase of the electromagnetic wave Fiber Optic cable • Single-mode Fiber • Multimode Fiber • Connectors • NICs • Interfaces • Lasers and LEDs • Photoreceptors • Pulses of light • Wavelength multiplexing using different colors • A pulse equals 1. • No pulse is 0. Wireless media • Access Points • NICs • Radio • Antennae • DSSS (direct-sequence spread-spectrum) • OFDM (orthogonal frequency division multiplexing) • Radio waves Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
  • 11. Fundamental Principles of Layer 1 Bandwidth Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
  • 12. Fundamental Principles of Layer 1 Throughput Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
  • 13. Fundamental Principles of Layer 1 Types of Physical Media Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
  • 14. Network Media Copper Cabling Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
  • 15. Copper Cabling Characteristics of Copper Media Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
  • 16. Copper Cabling Copper Media Unshielded Twisted Pair (UTP) cable Shielded Twisted Pair (STP) cable Coaxial cable Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
  • 17. Copper Cabling Unshielded Twisted-Pair (UTP) Cable Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
  • 18. Copper Cabling Shielded Twisted-Pair (STP) Cable Braided or Foil Shield Foil Shields Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
  • 19. Copper Cabling Coaxial Cable Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
  • 20. Copper Cabling Cooper Media Safety Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
  • 21. UTP Cabling Properties of UTP Cabling Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
  • 22. UTP Cabling UTP Cabling Standards Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
  • 23. UTP Cabling UTP Connectors Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
  • 24. UTP Cabling Types of UTP Cable Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
  • 25. UTP Cabling Testing UTP Cables Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
  • 26. UTP Cabling Testing UTP Cables Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
  • 27. Fiber Optic Cabling Properties of Fiber Optic Cabling Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
  • 28. Fiber Optic Cabling Fiber Media Cable Design Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
  • 29. Fiber Optic Cabling Types of Fiber Media Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
  • 30. Fiber Optic Cabling Network Fiber Connectors Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
  • 31. Fiber Optic Cabling Testing Fiber Cables Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
  • 32. Fiber Optic Cabling Fiber versus Copper Implementation issues Copper media Fibre-optic Bandwidth supported 10 Mbps – 10 Gbps 10 Mbps – 100 Gbps Distance Relatively short (1 – 100 meters) Relatively High (1 – 100,000 meters) Immunity to EMI and RFI Low High (Completely immune) Immunity to electrical hazards Low High (Completely immune) Media and connector costs Lowest Highest Installation skills required Lowest Highest Safety precautions Lowest Highest Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
  • 33. Wireless Media Properties of Wireless Media Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
  • 34. Wireless Media Types of Wireless Media • IEEE 802.11 standards • Commonly referred to as Wi-Fi. • Uses CSMA/CA • Variations include: • 802.11a: 54 Mbps, 5 GHz • 802.11b: 11 Mbps, 2.4 GHz • 802.11g: 54 Mbps, 2.4 GHz • 802.11n: 600 Mbps, 2.4 and 5 GHz • 802.11ac: 1 Gbps, 5 GHz • 802.11ad: 7 Gbps, 2.4 GHz, 5 GHz, and 60 GHz • IEEE 802.15 standard • Supports speeds up to 3 Mbps • Provides device pairing over distances from 1 to 100 meters. • IEEE 802.16 standard • Provides speeds up to 1 Gbps • Uses a point-to-multipoint topology to provide wireless broadband access. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
  • 35. Wireless Media Wireless LAN Cisco Linksys EA6500 802.11ac wireless router Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
  • 36. Wireless Media 802.11 Wi-Fi Standards Standard Maximum Speed Frequency Backwards compatible 802.11a 54 Mbps 5 GHz No 802.11b 11 Mbps 2.4 GHz No 802.11g 54 Mbps 2.4 GHz 802.11b 802.11n 600 Mbps 2.4 GHz or 5 GHz 802.11b/g 802.11ac 1.3 Gbps (1300 Mbps) 2.4 GHz and 5.5 GHz 802.11b/g/n 802.11ad 7 Gbps (7000 Mbps) 2.4 GHz, 5 GHz and 60 GHz 802.11b/g/n/ac Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
  • 37. Purpose of the Data Link Layer The Data Link Layer Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
  • 38. Purpose of the Data Link Layer Data Link Sublayers Network Data Link LLC Sublayer MAC Sublayer Physical 802.3 Ethernet 802.11 Wi-Fi 802.15 Bluetooth Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
  • 39. Purpose of the Data Link Layer Media Access Control Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
  • 40. Purpose of the Data Link Layer Providing Access to Media Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
  • 41. Data Link Layer Layer 2 Frame Structure Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
  • 42. Layer 2 Frame Structure Creating a Frame Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
  • 43. Data Link Layer Layer 2 Standards Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
  • 44. Layer 2 Standards Data Link Layer Standards Standard organization Networking Standards IEEE • 802.2: Logical Link Control (LLC) • 802.3: Ethernet • 802.4: Token bus • 802.5: Token passing • 802.11: Wireless LAN (WLAN) & Mesh (Wi-Fi certification) • 802.15: Bluetooth • 802.16: WiMax ITU-T • G.992: ADSL • G.8100 - G.8199: MPLS over Transport aspects • Q.921: ISDN • Q.922: Frame Relay ISO • HDLC (High Level Data Link Control) • ISO 9314: FDDI Media Access Control (MAC) ANSI • X3T9.5 and X3T12: Fiber Distributed Data Interface (FDDI) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
  • 45. Topologies Controlling Access to the Media Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
  • 46. Topologies Physical and Logical Topologies Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
  • 47. WAN Topologies Common Physical WAN Topologies Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
  • 48. WAN Topologies Physical Point-to-Point Topology Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
  • 49. WAN Topologies Logical Point-to-Point Topology Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
  • 50. WAN Topologies Half and Full Duplex Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
  • 51. LAN Topologies Physical LAN Topologies Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51
  • 52. LAN Topologies Logical Topology for Shared Media Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52
  • 53. LAN Topologies Contention-Based Access Characteristics Contention-Based Technologies • Stations can transmit at any time • Collision exist • There are mechanisms to resolve contention for the media • CSMA/CD for 802.3 Ethernet networks • CSMA/CA for 802.11 wireless networks Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53
  • 54. LAN Topologies Multi-Access Topology Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54
  • 55. LAN Topologies Controlled Access Characteristics Controlled Access Technologies • Only one station can transmit at a time • Devices wishing to transmit must wait their turn • No collisions • May use a token passing method • Token Ring (IEEE 802.5) • Fiber Distributed Data Interface (FDDI) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 55
  • 56. LAN Topologies Ring Topology Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 56
  • 57. Data Link Frame The Frame Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 57
  • 58. Data Link Frame The Header Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 58
  • 59. Data Link Frame Layer 2 Address Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 59
  • 60. Data Link Frame The Trailer Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 60
  • 61. Data Link Frame LAN and WAN Frames Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 61
  • 62. Data Link Frame Ethernet Frame Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 62
  • 63. Data Link Frame Point-to-Point Protocol Frame Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 63
  • 64. Data Link Frame 802.11 Wireless Frame Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 64
  • 65. Network Access Summary • Physical Layer Protocols • Network Media • Data Link Layer Protocols • Media Access Control Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 65
  • 66. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 66