Ccna semester 1 v 3 0
1 / 69

CCNA SEMESTER 1 V 3.0 - PowerPoint PPT Presentation

  • Uploaded on

CCNA SEMESTER 1 V 3.0. CHAPTER 2. Students completing this chapter should be able to:. Explain the importance of bandwidth in networking. Use an analogy from their experience to explain bandwidth. Explain the difference between bandwidth and throughput. Calculate data transfer rates.

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about ' CCNA SEMESTER 1 V 3.0' - norman-garrison

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

Students completing this chapter should be able to
Students completing this chapter should be able to:

  • Explain the importance of bandwidth in networking.

  • Use an analogy from their experience to explain bandwidth.

  • Explain the difference between bandwidth and throughput.

  • Calculate data transfer rates.

  • Explain why layered models are used to describe data communication.

  • Explain the development of the Open System Interconnection model (OSI).

  • List the advantages of a layered approach.

  • Identify each of the seven layers of the OSI model.

  • Identify the four layers of the TCP/IP model.

  • Describe the similarities and differences between the two models.

  • Briefly outline the history of networking.

  • Identify devices used in networking.

  • Understand the role of protocols in networking.

  • Define LAN, WAN, MAN, and SAN.

  • Explain VPNs and their advantages.

  • Describe the differences between intranets and extranets.

Local area networks lan
Local Area Networks (LAN)

Businesses needed a

solution that would

successfully address the

following three problems:

  • How to avoid duplication of equipment and resources

  • How to communicate efficiently

  • How to set up and manage a network

Wide area networks wans
Wide-area networks (WANs)

  • A way for information to move efficiently and quickly

  • WANs could connect user networks over large geographic areas

Networking devices
Networking Devices

  • Equipment that connects directly to a network segment is referred to as a device. These devices are broken up into two classifications.

  • Network Devices

  • end-user devices

End user devices
End user devices

  • End-user devices that provide users with a connection to the network are also referred to as hosts

  • These devices allow users to share, create, and obtain information.

  • Host devices are physically connected to the network media using a network interface card (NIC)

Network interface card nic
Network interface card(NIC)

  • A NIC is a printed circuit board that fits into the expansion slot of a bus on a computer motherboard, or it can be a peripheral device.

Network interface card nic1
Network interface card(NIC)

  • Laptop or notebook computer NICs are usually the size of a PCMCIA card.

  • Each individual NIC carries a unique code, called a Media Access Control (MAC) address

Network devices
Network devices

  • Network devices provide transport for the data that needs to be transferred between end-user devices. Network devices provide extension of cable connections, concentration of connections, conversion of data formats, and management of data transfers.


  • A repeater is a network device used to regenerate a signal. Repeaters regenerate analog or digital signals distorted by transmission loss due to attenuation.


  • convert network transmission data formats as well as perform basic data transmission management.

  • provide connections between LANs.

  • perform a check on the data to determine whether it should cross the bridge or not. This makes each part of the network more efficient


  • Workgroup switches add more intelligence to data transfer management.

  • They can determine whether data should remain on a LAN or not

  • They can transfer the data only to the connection that needs that data.


Routers have all the capabilities listed above.

  • regenerate signals

  • concentrate multiple connections

  • convert data transmission formats, and manage data transfers

  • They can also connect to a WAN, which allows them to connect LANs that are separated by great distances

Network topology
Network topology

  • Network topology defines the structure of the network. One part of the topology definition is the physical topology, which is the actual layout of the wire or media. The other part is the logical topology, which defines how the media is accessed by the hosts for sending data

Logical topology
Logical topology

  • The logical topology of a network is how the hosts communicate across the medium

    - broadcast


    - token passing

    Token Ring

    Fiber Distributed Data Interface (FDDI)

A protocol
A protocol

  • A protocol is a formal description of a set of rules and conventions that govern a particular aspect of how devices on a network communicate.

  • Protocols determine the format, timing, sequencing, and error control in data communication


Protocols control all aspects of data

communication, which include the following:


  • How the physical network is built

  • How computers connect to the network

  • How the data is formatted for transmission

  • How that data is sent

  • How to deal with errors

Local area networks lans

LANs consist of the

following components:


Network interface cards

Peripheral devices

Networking media

Network devices

Some common LAN

technologies are:


Token Ring


Local-area networks (LANs)

Wide area networks wans1

WANs interconnect LANs, which then provide access to computers or file servers in other locations.

Some common WAN

technologies are:


Integrated Services Digital Network (ISDN)

Digital Subscriber Line (DSL)

Frame Relay

US (T) and Europe (E) Carrier Series – T1, E1, T3, E3

Synchronous Optical Network (SONET)

Wide-area networks (WANs)

Metropolitan area networks mans
Metropolitan-area networks (MANs)

  • A MAN is a network that spans a metropolitan area such as a city or suburban area. A MAN usually consists of two or more LANs in a common geographic area .

Storage area networks sans
Storage-area networks (SANs)

A SAN is a dedicated, high-performance network used to

move data between servers and storage resources

SANs offer the following features:

  • Performance – SANs enable concurrent access of disk or tape arrays by two or more servers at high speeds.

  • Availability – SANs have disaster tolerance built in, because data can be mirrored using a SAN up to 10 kilometers (km) or 6.2 miles away.

  • Scalability – Like a LAN/WAN, it can use a variety of technologies. This allows easy relocation of backup data, operations, file migration, and data replication between systems.

Virtual private network vpn
Virtual private network (VPN)

  • A VPN is a private network that is constructed within a public network infrastructure such as the global Internet. Using VPN, a telecommuter can access the network of the company headquarters through the Internet by building a secure tunnel between the telecommuter’s PC and a VPN router in the headquarters

Types of vpns
Types of VPNs

  • Access VPNs– Access VPNs provide remote access to a mobile worker and small office/home office (SOHO) to the headquarters of the Intranet or Extranet over a shared infrastructure.

  • Intranet VPNs – Intranet VPNs link regional and remote offices to the headquarters of the internal network over a shared infrastructure using dedicated connections

  • Extranet VPNs – Extranet VPNs link business partners to the headquarters of the network over a shared infrastructure using dedicated connections

Benefits of VPNs

  • A VPN is a service that offers secure, reliable connectivity over a shared public network infrastructure such as the Internet.

  • They are the most cost-effective method of establishing a point-to-point connection between remote users and an enterprise customer's network

Intranets and extranets
Intranets and extranets

  • Intranets are designed to permit access by users who have access privileges to the internal LAN of the organization.

  • Extranets refer to applications and services that are Intranet based, and use extended, secure access to external users or enterprises.

Importance of bandwidth
Importance of bandwidth

  • Bandwidth is defined as the amount of information that can flow through a network connection in a given period of time.


  • In digital systems, the basic unit of bandwidth is bits per second (bps). Bandwidth is the measure of how much information, or bits, can flow from one place to another in a given amount of time, or seconds.


  • Bandwidth varies depending upon the type of media as well as the LAN and WAN technologies used. The physics of the media account for some of the difference.

  • The actual bandwidth of a network is determined by a combination of the physical media and the technologies chosen for signaling and detecting network signals.


  • Throughput refers to actual measured bandwidth, at a specific time of day, using specific Internet routes, and while a specific set of data is transmitted on the network

Digital versus analog
Digital versus analog

  • Electromagnetic waves are called analog because they have the sameshapes as the light and sound waves produced by the transmitters

  • Analog bandwidth is measured by how much of the electromagnetic spectrum is occupied by each signal. The basic unit of analog bandwidth is hertz (Hz), or cycles per second.

  • In digital signaling all information is sent as bits, regardless of the kind of information it is. Voice, video, and data all become streams of bits when they are prepared for transmission over digital media.

  • Unlimited amounts of information can be sent over the smallest or lowest bandwidth digital channel.

Networking models
Networking Models

  • The concept of layers is used to describe communication from one computer to another

  • As the data passes between layers, each layer adds additional information that enables effective communication with the corresponding layer on the other computer

  • The OSI and TCP/IP models have layers that explain how data is communicated from one computer to another.

Layer communication
Layer Communication

  • Layer 4 on the source computer communicates with Layer 4 on the destination computer. The rules and conventions used for this layer are known as Layer 4 protocols.

Osi layers
OSI layers

The OSI reference model explains how packets travel through the

various layers to another device on a network

Dividing the network into seven layers provides the following


  • It breaks network communication into smaller, more manageable parts.

  • It standardizes network components to allow multiple vendor development and support.

  • It allows different types of network hardware and software to communicate with each other.

  • It prevents changes in one layer from affecting other layers.

  • It divides network communication into smaller parts to make learning it easier to understand.

Peer to peer communications
Peer-to-peer communications

  • Each layer of the OSI model at the source communicate with its peer layer at the destination

  • The protocols of each layer exchange information, called protocol data units (PDUs).

  • Each layer depends on the service function of the OSI layer below it.

  • The lower layer uses encapsulation to put the PDU from the upper layer into its data field; then it adds whatever headers and trailers the layer needs to perform its function.

Tcp ip model
TCP/IP model

  • Application layer handles issues of representation, encoding, and dialog control.

  • The transport layer deals with the quality of service issues of reliability, flow control, and error correction

  • Internet layer divides TCP segments into packets and send them from any network

  • Network layer is concerned with all of the components, both physical and logical, that are required to make a physical link

Common tcp ip protocols
Common TCP/IP Protocols

The relationship between IP and TCP is an important one. IP can be thought to point the way for the packets, while TCP provides a reliable transport

Comparing tcp ip with osi
Comparing TCP/IP with OSI




Detailed encapsulation process
Detailed encapsulation process

  • If one computer (host A) wants to send data to another computer (host B), the data must first be packaged through a process called encapsulation.

  • Encapsulation wraps data with the necessary protocol information before network transit.

An understanding of the following key points should have been achieved
An understanding of the following key points should have been achieved:

  • Understanding bandwidth is essential when studying networking

  • Bandwidth is finite, costs money, and the demand for it increases daily

  • Bandwidth is measured in bits per second, bps, kpbs, Mbps, or Gbps

  • Limitations on bandwidth include type of media used, LAN and WAN technologies, and network equipment

  • Throughput refers to actual measured bandwidth, which is affected by factors that include number of users on network, networking devices, type of data, user’s computer and the server

  • The formula T=S/BW (transfer time = size of file / bandwidth) can be used to calculate data transfer time

  • Comparison of analog and digital bandwidth

An understanding of the following key points should have been achieved1
An understanding of the following key points should have been achieved:

  • Network communication is described by layered models

  • The OSI and TCP/IP are the two most important models of network communication

  • The International Organization for Standardization developed the OSI model to address the problems of network incompatibility

  • The seven layers of the OSI are application, presentation, session, transport, network, data link, and physical

  • The four layers of the TCP/IP are application, transport, internet, and network access

  • The TCP/IP application layer is equivalent to the OSI application, presentation, and session layers

  • Fundamental networking devices are hubs, bridges, switches, and routers

  • The physical topology layouts include the bus, ring, star, extended star, hierarchical, and mesh

  • A WAN consists of two or more LANs spanning a common geographic area

An understanding of the following key points should have been achieved2
An understanding of the following key points should have been achieved:

  • A SAN provides enhanced system performance, is scalable, and has disaster tolerance built in

  • A VPN is a private network that is constructed within a public network infrastructure

  • Three main types of VPNs are access, Intranet, and Extranet VPNs

  • Intranets are designed to be available to users who have access privileges to the internal network of an organization

  • Extranets are designed to deliver applications and services that are Intranet based, using extended, secured access to external users or enterprises