SlideShare a Scribd company logo
Basic network
concepts I.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certification
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Encapsulation.
– Modulation.
PACE-IT.
Page 4
Basic network concepts I.
Page 5
TheOSI(OpenSystems
Interconnection)reference
modelusesalayeredapproach
toenabledisparatedevicestobe
abletocommunicateeffectively.
During communication between two devices or nodes, each layer
is only responsible for being understood by the corresponding
layer on the other device.
As data flows down from the application layer through to the
physical layer, it is encapsulated—layer information is wrapped
around the data—at each layer with information to help the
corresponding layer at the other end of the communication line
understand what is happening.
As the data is received at the other end, it is de-encapsulated—
unwrapped—as it moves up the OSI stack.
Basic network concepts I.
Page 6
– Encapsulation at work.
» The application layer begins the process by sending data that is
encapsulated, or wrapped, with application layer control
information to the presentation layer.
• The encapsulated data is called a PDU (protocol data unit).
» The application layer PDUs are segmented by the presentation
layer, with each segment being encapsulated by presentation
layer control information. They are now presentation layer
PDUs.
• The process of segmenting and encapsulating continues
down through the OSI stack until it is transmitted as bits by
the physical layer.
» The receiving physical layer passes the bits to the receiving
data link layer, which reads the data link layer PDU information
and then de-encapsulates and de-segments it, sending the new
packets to the network layer as network layer PDUs.
• The process of de-encapsulating and de-segmenting
continues up the OSI stack until it is received by the
application layer, where it is finally fully de-encapsulated and
fully reassembled.
Basic network concepts I.
Page 7
Basic network concepts I.
Page 8
The physical layer of the OSI
stack is responsible for
transmitting bits (literal zeros
and ones) of data across some
form of media (e.g., a cable).
The question arises, how does the physical layer
transmit the data across the media?
The bits of data are modulated (or encoded) by the
physical layer and placed on the carrier signal
(which can also be called a carrier channel) of the
media, which carries the modulated data on to its
next destination.
Once the bits are received, they are de-modulated
(un-encoded) by the receiving physical layer.
Basic network concepts I.
Page 9
– Carrier signal defined.
» A carrier signal is a standard waveform, usually in the form of a
sine wave, that is used as the base carrier of another input
signal.
• A sine wave is a mathematical curve that is represented by a
smooth repeating oscillation.
– Modulation defined.
» Modulation is the process of varying one or more properties of
a carrier signal with an input signal—usually for the purpose of
conveying information.
• Modulation can be used to encode digital network traffic onto
media that uses a digital carrier signal (e.g., using an ISDN
connection between two networks).
• Modulation can be used to encode a digital signal onto a
media that uses an analog carrier signal—digital network
traffic traveling over the public switched telephone network
(PSTN).
• Multiplexing can be used to increase the number of
modulated signals that can be placed onto a carrier signal.
Basic network concepts I.
Page 10
– Multiplexing explained.
» The type of carrier signal will determine if multiplexing can
occur.
• A baseband carrier signal cannot have multiplexing occur, as
the modulated signal will consume all of the available
frequency (or channel width).
• Multiplexing can be utilized on a broadband carrier channel,
as each modulated input is assigned a portion of the channel
width of the carrier signal.
» Multiplexing can use one of two methods to weave streams of
modulated signal into the carrier signal.
• Frequency division multiplexing is the process of
mathematically dividing the carrier channel frequency into
multiple segments and assigning the results to modulated
input signals.
• Time division multiplexing is the process of mathematically
dividing the carrier channel width into multiple time segments
and assigning the time slots to different modulated signal
input streams.
Basic network concepts I.
Page 11
– Baseband.
» A stream of data that is sent over a carrier channel as a digital
modulated signal.
• The digital signal will take all of the carrier signal’s available
frequency (or time).
• While the modulated input does take all of the carrier
channel’s available frequency, the communication is
bidirectional (it can flow back and forth).
– Broadband.
» A stream of data that is sent over a carrier channel as an
analog modulated signal.
• The analog signal will be assigned a portion of either the
carrier channel’s available frequency or time.
• While the modulated input doesn’t take all of the carrier
channel’s available frequency, the communication is not
bidirectional. For two way communication to take place,
multiplexed channels must be created (a channel for each
direction).
Basic network concepts I.
Page 12
Basic network concepts I.
The OSI network model relies upon a layered approach to ensure
communication can occur between disparate systems. The OSI model uses
encapsulation to help the layers understand the communication. When
sending, each layer segments and encapsulates the data that it receives
from the layer above it. When receiving the data, each layer unwraps its
layer’s control information and hands it up to the next layer.
Topic
Encapsulation.
Summary
The physical layer is responsible for modulating the data stream and
placing it on the network’s carrier signal. A carrier signal is a waveform that
can be represented as a sine wave. Modulation is the process of changing
one or more properties of the carrier channel, as a means of encoding data
into the signal. In some situations, multiplexing—either through frequency
or time division—can be used to place multiple data streams onto a carrier
signal at the same time. Baseband is when a digital modulated signal
occupies all of the carrier channel. Broadband is when an analog modulated
signal occupies only a portion of a carrier channel, allowing multiplexing to
take place.
Modulation.
Page 13
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

What's hot

CN_lec 1_Introduction
CN_lec 1_IntroductionCN_lec 1_Introduction
CN_lec 1_Introduction
Rijutha Kumar
 
PACE-IT: WAN Technologies (part 2) - N10 006
PACE-IT: WAN Technologies (part 2) - N10 006 PACE-IT: WAN Technologies (part 2) - N10 006
PACE-IT: WAN Technologies (part 2) - N10 006
Pace IT at Edmonds Community College
 
Pace IT - Introduction to the Transport Layer
Pace IT - Introduction to the Transport LayerPace IT - Introduction to the Transport Layer
Pace IT - Introduction to the Transport Layer
Pace IT at Edmonds Community College
 
Unit-1 intro to communication networks
Unit-1 intro to communication networksUnit-1 intro to communication networks
Unit-1 intro to communication networks
SSGMCE SHEGAON
 
INTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKSINTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKS
Wipro
 
Data Communication & Networking
Data Communication & Networking Data Communication & Networking
Data Communication & Networking
Md Abdus Sobur Sikdar
 
PACE-IT: Basic Elements of Unified Communications - N10 006
PACE-IT: Basic Elements of Unified Communications - N10 006 PACE-IT: Basic Elements of Unified Communications - N10 006
PACE-IT: Basic Elements of Unified Communications - N10 006
Pace IT at Edmonds Community College
 
Pace IT Coax and Fiber
Pace IT Coax and FiberPace IT Coax and Fiber
Pace IT Coax and Fiber
Pace IT at Edmonds Community College
 
Computer networks
Computer networksComputer networks
Computer networks
Bilal Maqbool ツ
 
PACE-IT: Wan Technologies (part 4) - N10 006
PACE-IT: Wan Technologies (part 4) - N10 006PACE-IT: Wan Technologies (part 4) - N10 006
PACE-IT: Wan Technologies (part 4) - N10 006
Pace IT at Edmonds Community College
 
Emerald communication profile.ppt
Emerald communication profile.pptEmerald communication profile.ppt
Emerald communication profile.ppt
Mohammed Nour Mehyar
 
PACE-IT: Introduction to Wireless Standards
PACE-IT: Introduction to Wireless StandardsPACE-IT: Introduction to Wireless Standards
PACE-IT: Introduction to Wireless Standards
Pace IT at Edmonds Community College
 
Networking Cables & Connectors
Networking Cables & ConnectorsNetworking Cables & Connectors
Networking Cables & Connectors
Shamima Akther
 
Cable Connectors
Cable ConnectorsCable Connectors
Cable Connectors
TahsinaTabassum1
 
Communication technology
Communication technologyCommunication technology
Communication technology
Abhishek Curtis
 
Data com chapter 1 introduction
Data com chapter 1   introductionData com chapter 1   introduction
Data com chapter 1 introduction
Abdul-Hamid Donde
 
Data communication and computer networks
Data communication and computer networksData communication and computer networks
Data communication and computer networks
marwa_ma
 
Data Communication and Computer Networking Part # 1
Data Communication and Computer Networking Part # 1Data Communication and Computer Networking Part # 1
Data Communication and Computer Networking Part # 1
Quaid-i-Azam University
 
PACE-IT: Network Cabling (part 2) - N10 006
PACE-IT: Network Cabling (part 2) - N10 006 PACE-IT: Network Cabling (part 2) - N10 006
PACE-IT: Network Cabling (part 2) - N10 006
Pace IT at Edmonds Community College
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data Communication
'Rafid RezA'
 

What's hot (20)

CN_lec 1_Introduction
CN_lec 1_IntroductionCN_lec 1_Introduction
CN_lec 1_Introduction
 
PACE-IT: WAN Technologies (part 2) - N10 006
PACE-IT: WAN Technologies (part 2) - N10 006 PACE-IT: WAN Technologies (part 2) - N10 006
PACE-IT: WAN Technologies (part 2) - N10 006
 
Pace IT - Introduction to the Transport Layer
Pace IT - Introduction to the Transport LayerPace IT - Introduction to the Transport Layer
Pace IT - Introduction to the Transport Layer
 
Unit-1 intro to communication networks
Unit-1 intro to communication networksUnit-1 intro to communication networks
Unit-1 intro to communication networks
 
INTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKSINTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKS
 
Data Communication & Networking
Data Communication & Networking Data Communication & Networking
Data Communication & Networking
 
PACE-IT: Basic Elements of Unified Communications - N10 006
PACE-IT: Basic Elements of Unified Communications - N10 006 PACE-IT: Basic Elements of Unified Communications - N10 006
PACE-IT: Basic Elements of Unified Communications - N10 006
 
Pace IT Coax and Fiber
Pace IT Coax and FiberPace IT Coax and Fiber
Pace IT Coax and Fiber
 
Computer networks
Computer networksComputer networks
Computer networks
 
PACE-IT: Wan Technologies (part 4) - N10 006
PACE-IT: Wan Technologies (part 4) - N10 006PACE-IT: Wan Technologies (part 4) - N10 006
PACE-IT: Wan Technologies (part 4) - N10 006
 
Emerald communication profile.ppt
Emerald communication profile.pptEmerald communication profile.ppt
Emerald communication profile.ppt
 
PACE-IT: Introduction to Wireless Standards
PACE-IT: Introduction to Wireless StandardsPACE-IT: Introduction to Wireless Standards
PACE-IT: Introduction to Wireless Standards
 
Networking Cables & Connectors
Networking Cables & ConnectorsNetworking Cables & Connectors
Networking Cables & Connectors
 
Cable Connectors
Cable ConnectorsCable Connectors
Cable Connectors
 
Communication technology
Communication technologyCommunication technology
Communication technology
 
Data com chapter 1 introduction
Data com chapter 1   introductionData com chapter 1   introduction
Data com chapter 1 introduction
 
Data communication and computer networks
Data communication and computer networksData communication and computer networks
Data communication and computer networks
 
Data Communication and Computer Networking Part # 1
Data Communication and Computer Networking Part # 1Data Communication and Computer Networking Part # 1
Data Communication and Computer Networking Part # 1
 
PACE-IT: Network Cabling (part 2) - N10 006
PACE-IT: Network Cabling (part 2) - N10 006 PACE-IT: Network Cabling (part 2) - N10 006
PACE-IT: Network Cabling (part 2) - N10 006
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data Communication
 

Viewers also liked

Basic Network Concepts
Basic Network ConceptsBasic Network Concepts
Basic Network Concepts
Abhishek Singh
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Ashita Agrawal
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
Hj Habib
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
rahul kapoliya
 
Lecture5
Lecture5Lecture5
Lecture5
Majid Taghiloo
 
Security concepts
Security conceptsSecurity concepts
Security concepts
artisriva
 
5 Ways to Secure Your Containers for Docker and Beyond
5 Ways to Secure Your Containers for Docker and Beyond5 Ways to Secure Your Containers for Docker and Beyond
5 Ways to Secure Your Containers for Docker and Beyond
Black Duck by Synopsys
 
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric VanderburgNetworking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Eric Vanderburg
 
360suite Business Objects Xi3 New Security Concepts
360suite Business Objects Xi3 New Security Concepts360suite Business Objects Xi3 New Security Concepts
360suite Business Objects Xi3 New Security Concepts
Sebastien Goiffon
 
Network security
Network securityNetwork security
Network security
Nandini Raj
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
Computing Cage
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security+1.2: Secure Network Administration ConceptsPACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security+1.2: Secure Network Administration Concepts
Pace IT at Edmonds Community College
 
Information Security Management. Security solutions copy
Information Security Management. Security solutions copyInformation Security Management. Security solutions copy
Information Security Management. Security solutions copy
yuliana_mar
 
Lecture Lesson 1 Windows 7 Configuration
Lecture Lesson 1 Windows 7 ConfigurationLecture Lesson 1 Windows 7 Configuration
Lecture Lesson 1 Windows 7 Configuration
Ken Hutchins
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
IGZ Software house
 
Got SIEM? Now what? Getting SIEM Work For You
Got SIEM? Now what? Getting SIEM Work For YouGot SIEM? Now what? Getting SIEM Work For You
Got SIEM? Now what? Getting SIEM Work For You
Anton Chuvakin
 
3 computer network - basic concepts
3   computer network - basic concepts3   computer network - basic concepts
3 computer network - basic concepts
Ankit Garg
 
Guide To Windows 7 - Installing Windows 7
Guide To Windows 7 - Installing Windows 7Guide To Windows 7 - Installing Windows 7
Guide To Windows 7 - Installing Windows 7
Gene Carboni
 
Installing windows 7 (STANDIN)
Installing windows 7 (STANDIN)Installing windows 7 (STANDIN)
Installing windows 7 (STANDIN)
ronbongo
 

Viewers also liked (20)

Basic Network Concepts
Basic Network ConceptsBasic Network Concepts
Basic Network Concepts
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 
Lecture5
Lecture5Lecture5
Lecture5
 
Security concepts
Security conceptsSecurity concepts
Security concepts
 
5 Ways to Secure Your Containers for Docker and Beyond
5 Ways to Secure Your Containers for Docker and Beyond5 Ways to Secure Your Containers for Docker and Beyond
5 Ways to Secure Your Containers for Docker and Beyond
 
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric VanderburgNetworking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
 
360suite Business Objects Xi3 New Security Concepts
360suite Business Objects Xi3 New Security Concepts360suite Business Objects Xi3 New Security Concepts
360suite Business Objects Xi3 New Security Concepts
 
Network security
Network securityNetwork security
Network security
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security+1.2: Secure Network Administration ConceptsPACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security+1.2: Secure Network Administration Concepts
 
Information Security Management. Security solutions copy
Information Security Management. Security solutions copyInformation Security Management. Security solutions copy
Information Security Management. Security solutions copy
 
Lecture Lesson 1 Windows 7 Configuration
Lecture Lesson 1 Windows 7 ConfigurationLecture Lesson 1 Windows 7 Configuration
Lecture Lesson 1 Windows 7 Configuration
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Got SIEM? Now what? Getting SIEM Work For You
Got SIEM? Now what? Getting SIEM Work For YouGot SIEM? Now what? Getting SIEM Work For You
Got SIEM? Now what? Getting SIEM Work For You
 
3 computer network - basic concepts
3   computer network - basic concepts3   computer network - basic concepts
3 computer network - basic concepts
 
Guide To Windows 7 - Installing Windows 7
Guide To Windows 7 - Installing Windows 7Guide To Windows 7 - Installing Windows 7
Guide To Windows 7 - Installing Windows 7
 
Installing windows 7 (STANDIN)
Installing windows 7 (STANDIN)Installing windows 7 (STANDIN)
Installing windows 7 (STANDIN)
 

Similar to PACE-IT: Basic Network Concepts (part 1)

Pace IT - Network Devices (part 1)
Pace IT - Network Devices (part 1)Pace IT - Network Devices (part 1)
Pace IT - Network Devices (part 1)
Pace IT at Edmonds Community College
 
Module 1 computer networks imtroduction,data link layer
Module 1  computer networks imtroduction,data link layerModule 1  computer networks imtroduction,data link layer
Module 1 computer networks imtroduction,data link layer
Deepak John
 
Assignment 02
Assignment 02Assignment 02
Assignment 02
Robuilislam
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTU
Siddharaj Junnarkar
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
IOSR Journals
 
CCN 1 Slide (1).pptx
CCN 1 Slide (1).pptxCCN 1 Slide (1).pptx
CCN 1 Slide (1).pptx
DrRaghavendraRMaggav
 
Classroom Shared Whiteboard System using Multicast Protocol
Classroom Shared Whiteboard System using Multicast ProtocolClassroom Shared Whiteboard System using Multicast Protocol
Classroom Shared Whiteboard System using Multicast Protocol
ijtsrd
 
Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...
Susan Cox
 
Te 1 introduction to telecommunications_updated
Te 1 introduction to telecommunications_updatedTe 1 introduction to telecommunications_updated
Te 1 introduction to telecommunications_updated
Shohan Ean
 
Ex 1 chapter02-communicating-network-tony_chen
Ex 1 chapter02-communicating-network-tony_chenEx 1 chapter02-communicating-network-tony_chen
Ex 1 chapter02-communicating-network-tony_chen
Đô GiẢn
 
Class notes 1
Class notes 1Class notes 1
Class notes 1
FaysalAhmed395259
 
Presentation1 Networking.pptx
Presentation1 Networking.pptxPresentation1 Networking.pptx
Presentation1 Networking.pptx
MohammedAnas871930
 
Communication and computer networks
Communication and computer networksCommunication and computer networks
Communication and computer networks
Rabail Khowaja
 
Data communications ch 1
Data communications   ch 1Data communications   ch 1
Data communications ch 1
Mukesh Tekwani
 
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006 PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
Pace IT at Edmonds Community College
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13
Sehrish Rafiq
 
Network
NetworkNetwork
Network
Mark Muhama
 
computer network basics
computer network basicscomputer network basics
computer network basics
MohammedAdhil11
 
Lect-3-M2M-IoT.pptx
Lect-3-M2M-IoT.pptxLect-3-M2M-IoT.pptx
Lect-3-M2M-IoT.pptx
Amar Nath Dsilva
 
18ECC303J-Unit1-Week1-AY2020-21.pptx
18ECC303J-Unit1-Week1-AY2020-21.pptx18ECC303J-Unit1-Week1-AY2020-21.pptx
18ECC303J-Unit1-Week1-AY2020-21.pptx
elaelango
 

Similar to PACE-IT: Basic Network Concepts (part 1) (20)

Pace IT - Network Devices (part 1)
Pace IT - Network Devices (part 1)Pace IT - Network Devices (part 1)
Pace IT - Network Devices (part 1)
 
Module 1 computer networks imtroduction,data link layer
Module 1  computer networks imtroduction,data link layerModule 1  computer networks imtroduction,data link layer
Module 1 computer networks imtroduction,data link layer
 
Assignment 02
Assignment 02Assignment 02
Assignment 02
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTU
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
CCN 1 Slide (1).pptx
CCN 1 Slide (1).pptxCCN 1 Slide (1).pptx
CCN 1 Slide (1).pptx
 
Classroom Shared Whiteboard System using Multicast Protocol
Classroom Shared Whiteboard System using Multicast ProtocolClassroom Shared Whiteboard System using Multicast Protocol
Classroom Shared Whiteboard System using Multicast Protocol
 
Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...
 
Te 1 introduction to telecommunications_updated
Te 1 introduction to telecommunications_updatedTe 1 introduction to telecommunications_updated
Te 1 introduction to telecommunications_updated
 
Ex 1 chapter02-communicating-network-tony_chen
Ex 1 chapter02-communicating-network-tony_chenEx 1 chapter02-communicating-network-tony_chen
Ex 1 chapter02-communicating-network-tony_chen
 
Class notes 1
Class notes 1Class notes 1
Class notes 1
 
Presentation1 Networking.pptx
Presentation1 Networking.pptxPresentation1 Networking.pptx
Presentation1 Networking.pptx
 
Communication and computer networks
Communication and computer networksCommunication and computer networks
Communication and computer networks
 
Data communications ch 1
Data communications   ch 1Data communications   ch 1
Data communications ch 1
 
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006 PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13
 
Network
NetworkNetwork
Network
 
computer network basics
computer network basicscomputer network basics
computer network basics
 
Lect-3-M2M-IoT.pptx
Lect-3-M2M-IoT.pptxLect-3-M2M-IoT.pptx
Lect-3-M2M-IoT.pptx
 
18ECC303J-Unit1-Week1-AY2020-21.pptx
18ECC303J-Unit1-Week1-AY2020-21.pptx18ECC303J-Unit1-Week1-AY2020-21.pptx
18ECC303J-Unit1-Week1-AY2020-21.pptx
 

More from Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless AttacksPACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless Attacks
Pace IT at Edmonds Community College
 

More from Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless AttacksPACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless Attacks
 

Recently uploaded

RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
Nguyen Thanh Tu Collection
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
OH TEIK BIN
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
Celine George
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
khuleseema60
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 

Recently uploaded (20)

RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 

PACE-IT: Basic Network Concepts (part 1)

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certification  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Encapsulation. – Modulation. PACE-IT.
  • 4. Page 4 Basic network concepts I.
  • 5. Page 5 TheOSI(OpenSystems Interconnection)reference modelusesalayeredapproach toenabledisparatedevicestobe abletocommunicateeffectively. During communication between two devices or nodes, each layer is only responsible for being understood by the corresponding layer on the other device. As data flows down from the application layer through to the physical layer, it is encapsulated—layer information is wrapped around the data—at each layer with information to help the corresponding layer at the other end of the communication line understand what is happening. As the data is received at the other end, it is de-encapsulated— unwrapped—as it moves up the OSI stack. Basic network concepts I.
  • 6. Page 6 – Encapsulation at work. » The application layer begins the process by sending data that is encapsulated, or wrapped, with application layer control information to the presentation layer. • The encapsulated data is called a PDU (protocol data unit). » The application layer PDUs are segmented by the presentation layer, with each segment being encapsulated by presentation layer control information. They are now presentation layer PDUs. • The process of segmenting and encapsulating continues down through the OSI stack until it is transmitted as bits by the physical layer. » The receiving physical layer passes the bits to the receiving data link layer, which reads the data link layer PDU information and then de-encapsulates and de-segments it, sending the new packets to the network layer as network layer PDUs. • The process of de-encapsulating and de-segmenting continues up the OSI stack until it is received by the application layer, where it is finally fully de-encapsulated and fully reassembled. Basic network concepts I.
  • 7. Page 7 Basic network concepts I.
  • 8. Page 8 The physical layer of the OSI stack is responsible for transmitting bits (literal zeros and ones) of data across some form of media (e.g., a cable). The question arises, how does the physical layer transmit the data across the media? The bits of data are modulated (or encoded) by the physical layer and placed on the carrier signal (which can also be called a carrier channel) of the media, which carries the modulated data on to its next destination. Once the bits are received, they are de-modulated (un-encoded) by the receiving physical layer. Basic network concepts I.
  • 9. Page 9 – Carrier signal defined. » A carrier signal is a standard waveform, usually in the form of a sine wave, that is used as the base carrier of another input signal. • A sine wave is a mathematical curve that is represented by a smooth repeating oscillation. – Modulation defined. » Modulation is the process of varying one or more properties of a carrier signal with an input signal—usually for the purpose of conveying information. • Modulation can be used to encode digital network traffic onto media that uses a digital carrier signal (e.g., using an ISDN connection between two networks). • Modulation can be used to encode a digital signal onto a media that uses an analog carrier signal—digital network traffic traveling over the public switched telephone network (PSTN). • Multiplexing can be used to increase the number of modulated signals that can be placed onto a carrier signal. Basic network concepts I.
  • 10. Page 10 – Multiplexing explained. » The type of carrier signal will determine if multiplexing can occur. • A baseband carrier signal cannot have multiplexing occur, as the modulated signal will consume all of the available frequency (or channel width). • Multiplexing can be utilized on a broadband carrier channel, as each modulated input is assigned a portion of the channel width of the carrier signal. » Multiplexing can use one of two methods to weave streams of modulated signal into the carrier signal. • Frequency division multiplexing is the process of mathematically dividing the carrier channel frequency into multiple segments and assigning the results to modulated input signals. • Time division multiplexing is the process of mathematically dividing the carrier channel width into multiple time segments and assigning the time slots to different modulated signal input streams. Basic network concepts I.
  • 11. Page 11 – Baseband. » A stream of data that is sent over a carrier channel as a digital modulated signal. • The digital signal will take all of the carrier signal’s available frequency (or time). • While the modulated input does take all of the carrier channel’s available frequency, the communication is bidirectional (it can flow back and forth). – Broadband. » A stream of data that is sent over a carrier channel as an analog modulated signal. • The analog signal will be assigned a portion of either the carrier channel’s available frequency or time. • While the modulated input doesn’t take all of the carrier channel’s available frequency, the communication is not bidirectional. For two way communication to take place, multiplexed channels must be created (a channel for each direction). Basic network concepts I.
  • 12. Page 12 Basic network concepts I. The OSI network model relies upon a layered approach to ensure communication can occur between disparate systems. The OSI model uses encapsulation to help the layers understand the communication. When sending, each layer segments and encapsulates the data that it receives from the layer above it. When receiving the data, each layer unwraps its layer’s control information and hands it up to the next layer. Topic Encapsulation. Summary The physical layer is responsible for modulating the data stream and placing it on the network’s carrier signal. A carrier signal is a waveform that can be represented as a sine wave. Modulation is the process of changing one or more properties of the carrier channel, as a means of encoding data into the signal. In some situations, multiplexing—either through frequency or time division—can be used to place multiple data streams onto a carrier signal at the same time. Baseband is when a digital modulated signal occupies all of the carrier channel. Broadband is when an analog modulated signal occupies only a portion of a carrier channel, allowing multiplexing to take place. Modulation.
  • 14. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.