SlideShare a Scribd company logo
UNIVERSITY OF PERPETUAL HELP SYSTEM
Networking & Communications
1 - Lecture
Topic 1: Introduction to Networking
Objectives
Students completing this module should be able to perform
tasks related to the following:
• Understand the physical connection that has to take place
for a computer to connect to the Internet
• Recognize the components that comprise the computer
• Install and troubleshoot network interface cards and modems
• Use basic testing procedures to test the Internet
connection
• Demonstrate a basic understanding of the use of Web
browsers and plug-ins
• Recognize the Base 10, Base 2, and Base 16 number systems
• Perform 8-bit binary to decimal and decimal to 8-bit binary
conversions
• Perform simple conversions between decimal, binary, and
hexadecimal numbers
• Recognize the binary representation of IP addresses and
Requirements for Internet
Connection
A physical connection is made by connecting a
specialized expansion card such as a modem or a
network interface card (NIC) from a computer
(PC) to a network.
The logical connection uses standards called
protocols.
The application that interprets the data and
displays the information in an understandable
form is the last part of the connection.
PC Basics - Small, Discrete
Components
• Transistor – Device that amplifies
a signal or opens and closes a
circuit.
• Integrated circuit (IC) – Device
made of semiconductor material that
contains many transistors and
performs a specific task.
• Resistor – Device made of material
that opposes the flow of electric
current.
• Capacitor – Electronic component
that stores energy in the form of
an electrostatic field that
consists of two conducting metal
plates separated by an insulating
material.
• Connector – The part of a cable
that plugs into a port or
PC Basics
• The motherboard is the main circuit
board of your computer and is also known
as the mainboard or logic board.
• A network processor is an integrated
circuit which has a feature set
specifically targeted at the networking
application domain.
PC Basics
An expansion slot refers to any of the slots on
a motherboard that can hold an expansion card to expand
the computer's functionality, like a video card, network card,
or sound card.
Network Interface Cards
A network interface card (NIC) is a hardware
component without which a computer cannot be
connected over a network.
NIC and Modem Installation
When selecting a NIC, consider the
following factors:
• Protocols – Ethernet, Token Ring,
or FDDI
• Types of media – Twisted-pair,
coaxial, wireless, or fiberoptic
• Type of system bus – PCI or ISA
• A modem, or modulator/demodulator,
is a device that provides the
computer with connectivity to a
telephone line.
High-Speed and Dialup Connectivity
TCP/IP Description and
Configuration
Testing Connectivity with Ping
The ping command
works by sending
multiple IP packets
to a specified
destination. Each
packet sent is a
request for a reply.
Web Browser and Plug-Ins
• plug-in applications -
These applications work
in conjunction with the
browser to launch the
program required to
view the following
special files:
• Flash – plays
multimedia files,
which was created by
Macromedia Flash
• Quicktime – plays
video files, which
was created by Apple
Troubleshooting Internet
Connections
Binary Number System
The American Standard Code for Information
Interchange (ASCII) is the most commonly
used code for representing alpha-numeric
data in a computer
Bits and Bytes
Base 10 (Decimal) Numbers
• The decimal number system is based on powers of
10.
• Each column position of a value, from right to
left, is multiplied by the number 10, which is the
base number, raised to a power, which is the
exponent.
• The power that 10 is raised to depends on its
Base 2 (Binary) Numbers
• Binary number is a number expressed in the
base-2 numeral system or binary numeral
system, which uses only two symbols:
typically "0" (zero) and "1" (one).
• 101102 = (1 x 24 = 16) + (0 x 23 = 0) + (1
x 22 = 4) + (1 x 21 = 2) + (0 x 20 = 0) =
Converting Decimal numbers to 8-bit
Binary Numbers
Converting 8-bit Binary Numbers to
Decimal Numbers
Four-Octet Dotted-decimal
Representation of 32-Bit Binary
Numbers
Currently, (IP) addresses assigned to
computers on the Internet are 32-bit binary
numbers.
To make it easier to work with these
addresses, the 32-bit binary number is broken
into a series of decimal numbers.
To do this, split the binary number into four
groups of eight binary digits.
Then convert each group of eight bits, also
Hexadecimal
Hexadecimal
Boolean or Binary Logic
Boolean logic is based on digital circuitry that
accepts one or two incoming voltages.
Based on the input voltages, output voltage is
generated. For the purpose of computers the
voltage difference is associated as two states,
on or off.
These two states are in turn associated as a 1
IP Addresses and Network Masks
• Performing a Boolean AND of the IP address
10.34.23.134 and the subnet mask 255.0.0.0 produces
the network address of this host:
10.34.23.134 00001010.00100010.00010111.10000110
255.0.0.0 11111111.00000000.00000000.00000000
10.0.0.0 00001010.00000000.00000000.00000000
• Converting the result to dotted decimal, 10.0.0.0 is
the network portion of the IP address, when using
the 255.0.0.0 mask.
Summary
Reference/s:
McReynolds S, Networking Basics CCNA 1 Labs and Study Guide
Copyright 2012, Cisco Systems, Inc.
ISBN: 1-58713-187-0
Data Communications and Networking (Fourth Edition)
Online Learning Center, MC Grawhill
By Behrouz A. Forouzan, Sophia Chung Fegan
Copyright 2007
Andrew Tanenbaum. Computer Networks. Fourth Edition.
Pearson Education, Inc., Prentice Hall PTR,
copyright 2003

More Related Content

Similar to Topic 1 - Introduction to Networking.pptx

Lecture 1.1 Introduction to Networking.ppt
Lecture 1.1 Introduction to Networking.pptLecture 1.1 Introduction to Networking.ppt
Lecture 1.1 Introduction to Networking.ppt
RaidTan
 
what is Networking and types of computer .pptx
what is Networking and types of computer .pptxwhat is Networking and types of computer .pptx
what is Networking and types of computer .pptx
tthind
 
Chapter 2 Networking
Chapter 2 NetworkingChapter 2 Networking
Chapter 2 Networkingmlrbrown
 
Network Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICESNetwork Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICES
Manas Rai
 
Uccn1003 -may10_-_lect01b_-_intro_to_network_devices_addressing
Uccn1003  -may10_-_lect01b_-_intro_to_network_devices_addressingUccn1003  -may10_-_lect01b_-_intro_to_network_devices_addressing
Uccn1003 -may10_-_lect01b_-_intro_to_network_devices_addressingShu Shin
 
Types of Computer Modem
Types of Computer ModemTypes of Computer Modem
Types of Computer Modem
DivyaKS12
 
Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)
Geethu Jose
 
Unit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptxUnit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptx
sahilraturi
 
Understanding local area networking
Understanding local area networkingUnderstanding local area networking
Understanding local area networking
Universidad De Manila
 
Power point presentation
Power point presentationPower point presentation
Power point presentation
rajasekarsankar
 
Training Report BHARAT ELECTRONICS LIMITED
Training Report BHARAT ELECTRONICS LIMITEDTraining Report BHARAT ELECTRONICS LIMITED
Training Report BHARAT ELECTRONICS LIMITED
HimanshiSingh71
 
Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.
Clinton Dsouza
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
GLIM Digital
 
Unit 2 - Internet Protocol Overview - IT
Unit 2 - Internet Protocol Overview - ITUnit 2 - Internet Protocol Overview - IT
Unit 2 - Internet Protocol Overview - IT
Deepraj Bhujel
 
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docxWeek 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
cockekeshia
 
KL1034 Lect1 Computer assembly.pdf
KL1034 Lect1 Computer assembly.pdfKL1034 Lect1 Computer assembly.pdf
KL1034 Lect1 Computer assembly.pdf
SysteDesig
 
Chapter 4-CIM Industrial Communication2.pptx
Chapter 4-CIM Industrial Communication2.pptxChapter 4-CIM Industrial Communication2.pptx
Chapter 4-CIM Industrial Communication2.pptx
MohdSyaifuadJasemi
 
Lec0.ppt
Lec0.pptLec0.ppt
Lec0.ppt
putmy
 

Similar to Topic 1 - Introduction to Networking.pptx (20)

Lecture 1.1 Introduction to Networking.ppt
Lecture 1.1 Introduction to Networking.pptLecture 1.1 Introduction to Networking.ppt
Lecture 1.1 Introduction to Networking.ppt
 
what is Networking and types of computer .pptx
what is Networking and types of computer .pptxwhat is Networking and types of computer .pptx
what is Networking and types of computer .pptx
 
Chapter 2 Networking
Chapter 2 NetworkingChapter 2 Networking
Chapter 2 Networking
 
Network Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICESNetwork Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICES
 
Uccn1003 -may10_-_lect01b_-_intro_to_network_devices_addressing
Uccn1003  -may10_-_lect01b_-_intro_to_network_devices_addressingUccn1003  -may10_-_lect01b_-_intro_to_network_devices_addressing
Uccn1003 -may10_-_lect01b_-_intro_to_network_devices_addressing
 
Types of Computer Modem
Types of Computer ModemTypes of Computer Modem
Types of Computer Modem
 
Nic -cst
Nic -cstNic -cst
Nic -cst
 
Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)
 
Unit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptxUnit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptx
 
Overview of comp system
Overview of comp systemOverview of comp system
Overview of comp system
 
Understanding local area networking
Understanding local area networkingUnderstanding local area networking
Understanding local area networking
 
Power point presentation
Power point presentationPower point presentation
Power point presentation
 
Training Report BHARAT ELECTRONICS LIMITED
Training Report BHARAT ELECTRONICS LIMITEDTraining Report BHARAT ELECTRONICS LIMITED
Training Report BHARAT ELECTRONICS LIMITED
 
Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
Unit 2 - Internet Protocol Overview - IT
Unit 2 - Internet Protocol Overview - ITUnit 2 - Internet Protocol Overview - IT
Unit 2 - Internet Protocol Overview - IT
 
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docxWeek 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
 
KL1034 Lect1 Computer assembly.pdf
KL1034 Lect1 Computer assembly.pdfKL1034 Lect1 Computer assembly.pdf
KL1034 Lect1 Computer assembly.pdf
 
Chapter 4-CIM Industrial Communication2.pptx
Chapter 4-CIM Industrial Communication2.pptxChapter 4-CIM Industrial Communication2.pptx
Chapter 4-CIM Industrial Communication2.pptx
 
Lec0.ppt
Lec0.pptLec0.ppt
Lec0.ppt
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

Topic 1 - Introduction to Networking.pptx

  • 1. UNIVERSITY OF PERPETUAL HELP SYSTEM Networking & Communications 1 - Lecture Topic 1: Introduction to Networking
  • 2. Objectives Students completing this module should be able to perform tasks related to the following: • Understand the physical connection that has to take place for a computer to connect to the Internet • Recognize the components that comprise the computer • Install and troubleshoot network interface cards and modems • Use basic testing procedures to test the Internet connection • Demonstrate a basic understanding of the use of Web browsers and plug-ins • Recognize the Base 10, Base 2, and Base 16 number systems • Perform 8-bit binary to decimal and decimal to 8-bit binary conversions • Perform simple conversions between decimal, binary, and hexadecimal numbers • Recognize the binary representation of IP addresses and
  • 3. Requirements for Internet Connection A physical connection is made by connecting a specialized expansion card such as a modem or a network interface card (NIC) from a computer (PC) to a network. The logical connection uses standards called protocols. The application that interprets the data and displays the information in an understandable form is the last part of the connection.
  • 4. PC Basics - Small, Discrete Components • Transistor – Device that amplifies a signal or opens and closes a circuit. • Integrated circuit (IC) – Device made of semiconductor material that contains many transistors and performs a specific task. • Resistor – Device made of material that opposes the flow of electric current. • Capacitor – Electronic component that stores energy in the form of an electrostatic field that consists of two conducting metal plates separated by an insulating material. • Connector – The part of a cable that plugs into a port or
  • 5. PC Basics • The motherboard is the main circuit board of your computer and is also known as the mainboard or logic board. • A network processor is an integrated circuit which has a feature set specifically targeted at the networking application domain.
  • 6. PC Basics An expansion slot refers to any of the slots on a motherboard that can hold an expansion card to expand the computer's functionality, like a video card, network card, or sound card.
  • 7. Network Interface Cards A network interface card (NIC) is a hardware component without which a computer cannot be connected over a network.
  • 8. NIC and Modem Installation When selecting a NIC, consider the following factors: • Protocols – Ethernet, Token Ring, or FDDI • Types of media – Twisted-pair, coaxial, wireless, or fiberoptic • Type of system bus – PCI or ISA • A modem, or modulator/demodulator, is a device that provides the computer with connectivity to a telephone line.
  • 9. High-Speed and Dialup Connectivity
  • 11. Testing Connectivity with Ping The ping command works by sending multiple IP packets to a specified destination. Each packet sent is a request for a reply.
  • 12. Web Browser and Plug-Ins • plug-in applications - These applications work in conjunction with the browser to launch the program required to view the following special files: • Flash – plays multimedia files, which was created by Macromedia Flash • Quicktime – plays video files, which was created by Apple
  • 14. Binary Number System The American Standard Code for Information Interchange (ASCII) is the most commonly used code for representing alpha-numeric data in a computer
  • 16. Base 10 (Decimal) Numbers • The decimal number system is based on powers of 10. • Each column position of a value, from right to left, is multiplied by the number 10, which is the base number, raised to a power, which is the exponent. • The power that 10 is raised to depends on its
  • 17. Base 2 (Binary) Numbers • Binary number is a number expressed in the base-2 numeral system or binary numeral system, which uses only two symbols: typically "0" (zero) and "1" (one). • 101102 = (1 x 24 = 16) + (0 x 23 = 0) + (1 x 22 = 4) + (1 x 21 = 2) + (0 x 20 = 0) =
  • 18. Converting Decimal numbers to 8-bit Binary Numbers
  • 19. Converting 8-bit Binary Numbers to Decimal Numbers
  • 20. Four-Octet Dotted-decimal Representation of 32-Bit Binary Numbers Currently, (IP) addresses assigned to computers on the Internet are 32-bit binary numbers. To make it easier to work with these addresses, the 32-bit binary number is broken into a series of decimal numbers. To do this, split the binary number into four groups of eight binary digits. Then convert each group of eight bits, also
  • 23. Boolean or Binary Logic Boolean logic is based on digital circuitry that accepts one or two incoming voltages. Based on the input voltages, output voltage is generated. For the purpose of computers the voltage difference is associated as two states, on or off. These two states are in turn associated as a 1
  • 24. IP Addresses and Network Masks • Performing a Boolean AND of the IP address 10.34.23.134 and the subnet mask 255.0.0.0 produces the network address of this host: 10.34.23.134 00001010.00100010.00010111.10000110 255.0.0.0 11111111.00000000.00000000.00000000 10.0.0.0 00001010.00000000.00000000.00000000 • Converting the result to dotted decimal, 10.0.0.0 is the network portion of the IP address, when using the 255.0.0.0 mask.
  • 26. Reference/s: McReynolds S, Networking Basics CCNA 1 Labs and Study Guide Copyright 2012, Cisco Systems, Inc. ISBN: 1-58713-187-0 Data Communications and Networking (Fourth Edition) Online Learning Center, MC Grawhill By Behrouz A. Forouzan, Sophia Chung Fegan Copyright 2007 Andrew Tanenbaum. Computer Networks. Fourth Edition. Pearson Education, Inc., Prentice Hall PTR, copyright 2003