This document provides an overview of structured cabling, IP addressing, and basic local area network (LAN) concepts. It defines key structured cabling terms like the main distribution frame (MDF) and intermediate distribution facilities (IDF). It also covers IP version 4 addressing fundamentals like subnet masks and how they are used to determine network and host portions of an IP address. Finally, it discusses LAN concepts such as collision and broadcast domains as well as how network devices like hubs, switches, and routers impact these domains.
"This presentation was created through wide-ranged research and is intended specially for everyone interested in network technology".
-BRIAN S. CUNAL
KALINGA-APAYAO STATE COLLEGE
IT Instructor.
Windows network administration Basic theoriesRavi Yasas
This document contains information about networking concepts including cable types, topologies, network architectures, IP addressing, and Microsoft networking tools. It defines coaxial and twisted pair cables, and lists common network topologies like mesh, bus, ring, star and hybrid. It also explains the differences between a hub and switch, and between a workgroup and domain network architecture. The document provides details on IP addressing standards including public vs private IP ranges, static vs dynamic addressing, and IPv4 and IPv6 versions. It introduces tools like DNS, MMC, Group Policy and IIS that are used to manage Microsoft networks.
1. Serial0 is up but the line protocol is down, indicating a potential issue with the cable or configuration settings not matching on both ends.
2. Static IP addresses are manually assigned while dynamic IP addresses are assigned by a DHCP server from its IP range, and have a lease duration after which the address may change.
3. Protocols establish rules and standards for moving data across a network, such as routing protocols like RIP, IGRP, and EIGRP that determine the best path between networks.
System and network administration network servicesUc Man
Network services like DNS, DHCP, FTP, SMTP, SNMP, proxy servers, and Active Directory Services provide shared resources to devices on a network. DNS in particular converts domain names to IP addresses, caching responses for a period of time specified by their Time to Live (TTL) value to reduce server load. However, DNS was not originally designed with security in mind and is vulnerable to issues like cache poisoning. DHCP automatically assigns temporary IP addresses to devices on a network. Active Directory is a directory service used by Windows domains to centrally manage network resources and user access through objects, sites, forests, trees and domains.
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPSProf Ansari
The goal of network administration is to ensure that the users of networks receive the information and technically serves with the quality of services they expect.
Network administration means the management of network infrastructures devices (such as router and switches)
Network administration compromises of 3 majors groups:
1. Network provisioning
2. Network operations
3. Network maintenance
This document contains class notes for a data communication course. It includes definitions and explanations of key data communication concepts such as data communication, nodes, computer network types (PAN, LAN, MAN, WAN), network interface cards (NIC), MAC addresses, ports, hubs, switches, routers, bridges, repeaters, gateways, and the OSI model. The document cites online references for each topic.
Data communication refers to the transmission of digital data between two or more computers. A computer network allows computers to exchange data and consists of two or more linked computers that share resources. Personal area networks (PANs) interconnect personal devices to communicate within 10 meters, typically using wireless technology. Network nodes are active electronic devices attached to a network. Local area networks (LANs) interconnect computers within a limited area like a school or building. Every network interface has a unique 48-bit MAC address and IP address to identify it on the internet or network. Hubs, switches, and routers connect devices but routers can examine link layer addresses and connect different networks or subnetworks.
This document provides an overview of computer networks and distributed systems. It defines a computer network as a set of devices connected by communication links that allow the exchange of information. A distributed system is a collection of independent computers that appear as a single system to users. The goals of networking are discussed as performance, reliability, security, resource sharing, cost reduction, and enabling communication. Peer-to-peer and client-server are presented as the main approaches for communication within a network. Finally, common network hardware such as nodes, network interface cards, hubs, switches, repeaters, and routers are defined.
"This presentation was created through wide-ranged research and is intended specially for everyone interested in network technology".
-BRIAN S. CUNAL
KALINGA-APAYAO STATE COLLEGE
IT Instructor.
Windows network administration Basic theoriesRavi Yasas
This document contains information about networking concepts including cable types, topologies, network architectures, IP addressing, and Microsoft networking tools. It defines coaxial and twisted pair cables, and lists common network topologies like mesh, bus, ring, star and hybrid. It also explains the differences between a hub and switch, and between a workgroup and domain network architecture. The document provides details on IP addressing standards including public vs private IP ranges, static vs dynamic addressing, and IPv4 and IPv6 versions. It introduces tools like DNS, MMC, Group Policy and IIS that are used to manage Microsoft networks.
1. Serial0 is up but the line protocol is down, indicating a potential issue with the cable or configuration settings not matching on both ends.
2. Static IP addresses are manually assigned while dynamic IP addresses are assigned by a DHCP server from its IP range, and have a lease duration after which the address may change.
3. Protocols establish rules and standards for moving data across a network, such as routing protocols like RIP, IGRP, and EIGRP that determine the best path between networks.
System and network administration network servicesUc Man
Network services like DNS, DHCP, FTP, SMTP, SNMP, proxy servers, and Active Directory Services provide shared resources to devices on a network. DNS in particular converts domain names to IP addresses, caching responses for a period of time specified by their Time to Live (TTL) value to reduce server load. However, DNS was not originally designed with security in mind and is vulnerable to issues like cache poisoning. DHCP automatically assigns temporary IP addresses to devices on a network. Active Directory is a directory service used by Windows domains to centrally manage network resources and user access through objects, sites, forests, trees and domains.
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPSProf Ansari
The goal of network administration is to ensure that the users of networks receive the information and technically serves with the quality of services they expect.
Network administration means the management of network infrastructures devices (such as router and switches)
Network administration compromises of 3 majors groups:
1. Network provisioning
2. Network operations
3. Network maintenance
This document contains class notes for a data communication course. It includes definitions and explanations of key data communication concepts such as data communication, nodes, computer network types (PAN, LAN, MAN, WAN), network interface cards (NIC), MAC addresses, ports, hubs, switches, routers, bridges, repeaters, gateways, and the OSI model. The document cites online references for each topic.
Data communication refers to the transmission of digital data between two or more computers. A computer network allows computers to exchange data and consists of two or more linked computers that share resources. Personal area networks (PANs) interconnect personal devices to communicate within 10 meters, typically using wireless technology. Network nodes are active electronic devices attached to a network. Local area networks (LANs) interconnect computers within a limited area like a school or building. Every network interface has a unique 48-bit MAC address and IP address to identify it on the internet or network. Hubs, switches, and routers connect devices but routers can examine link layer addresses and connect different networks or subnetworks.
This document provides an overview of computer networks and distributed systems. It defines a computer network as a set of devices connected by communication links that allow the exchange of information. A distributed system is a collection of independent computers that appear as a single system to users. The goals of networking are discussed as performance, reliability, security, resource sharing, cost reduction, and enabling communication. Peer-to-peer and client-server are presented as the main approaches for communication within a network. Finally, common network hardware such as nodes, network interface cards, hubs, switches, repeaters, and routers are defined.
This document provides an overview of computer networks, including their components, benefits, disadvantages, classifications, server types, signal parameters, transmission impairments, data rates, and communication types and modes. Key points include: A computer network connects two or more devices to share resources; the five basic network components are transmitters, receivers, channels, messages, and protocols; networks can be classified by geographical area or component roles; servers include file, printer, application, and database servers; signals can be classified in various ways; transmission can be impaired by the channel; data rate depends on bandwidth, signal levels, and noise; and communication can occur synchronously, asynchronously, or via simplex, half-duplex, or full-d
This document provides an overview of networking fundamentals including common network devices like hubs, switches, and routers. It describes protocols like MAC, IP, TCP/IP, and how they enable communication. Specific topics covered include IP addressing classes, private IP ranges, subnetting, DHCP/BOOTP, wireless networking standards, packet switching vs circuit switching, DNS, and network security concepts like intrusion detection/prevention systems and VPNs. The document is intended as a basic introduction and reference for networking and cybersecurity professionals.
This document contains definitions of common networking terms starting with letters A through D. Some of the key terms defined include: access method, acknowledgement, address resolution protocol (ARP), adjacency table, American Standard Code for Information Interchange (ASCII), bandwidth, best-effort delivery, Bootstrap Protocol (BOOTP), Bring Your Own Device (BYOD), broadcast, burned-in-address (BIA), Carrier Sense Multiple Access (CSMA), channel, circuit switched, Cisco Express Forwarding (CEF), classful addressing, classless addressing, client, client-server, cloud computing, coaxial cable, collaboration, connectionless, connection-oriented, content addressable memory (CAM) table, converged network, crosst
A computer network connects computers together to share resources and exchange information. The main types of computer networks are personal area networks (PANs), local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). LANs are commonly used within offices and buildings to share printers and files between connected computers. WANs extend across broader areas like cities or countries using transmission lines and routers to connect distant LANs and allow communication between nonlocal computers. Common network hardware includes network interface cards, switches, routers, hubs, and gateways.
The document discusses key concepts of networking including the three basic elements required: network hardware, software, and protocols. It describes common network types like LAN, WAN, and MAN and compares peer-to-peer and server-based networks. The OSI reference model and TCP/IP model are explained along with common network devices, cabling, and IP addressing schemes.
This document provides an overview of computer networking concepts and terminology. It introduces the key components of a computer including the processor, memory, and input/output devices. It also covers communication devices and how they can be synchronous or asynchronous. The document discusses how networks are connected including different types of buses and hierarchies. It provides an overview of different operating systems from various developers. It also covers network structure, topologies, media, reliability, flow control, congestion, and the layered protocol architecture of the OSI model.
This document provides an overview of networking fundamentals, including definitions of common network types like LANs and WANs. It describes network topologies like bus, star, and ring configurations. Communication protocols and hardware like hubs, routers, and firewalls are defined. The roles of gateways and modems in transmitting data are also summarized.
The document provides an overview of computer networks and details regarding the school's network. It discusses why networks are important, defines what a network is, and describes the key components and types of networks. The school's network uses a hierarchical extended star design with fiber optic cables connecting the school to servers located offsite. The network includes a wireless local area network (WLAN) within the school, a wide area network (WAN) connecting the school to other district sites, a storage area network (SAN) for student data, personal area networks (PANs) within classrooms, and a virtual private network (VPN) allowing remote access to files.
This document provides an overview of basic networking concepts including protocols, protocol layers, network interconnection, and the Internet. It describes how networks are defined and addressed. The key protocol layers of OSI and TCP/IP models are examined including physical, data link, network, transport, and application layers. Common network types, topologies, and connectivity options are also summarized.
The document provides an overview of networking concepts including the OSI model, WAN technologies, convergence, wireless networking, and authentication methods. It describes the seven layers of the OSI model and technologies associated with each layer such as Ethernet and IP. It also discusses WAN options like leased lines, MPLS, and QoS mechanisms for prioritizing traffic. Wireless topics covered include frequencies, modulation, authentication, encryption, and next-generation centralized wireless network architectures.
This document provides an overview of networking fundamentals including defining computer networks, types of networks like peer-to-peer and client/server, local and wide area networks, network interface cards, physical components like cabling and devices, and network architectures like Ethernet and Token Ring. Key points covered include how networks allow file sharing, printing, and communication between devices, examples of networking media and common devices, and standards for networking protocols and architectures.
This document defines and describes different types of computer networks and networking devices. It discusses local area networks (LANs) that connect computers within a small area like a building or lab, metropolitan area networks (MANs) that connect networks within a larger region like a city, and wide area networks (WANs) that connect large geographic areas like countries or continents. Common networking devices described include hubs, switches, bridges, routers, gateways, interfaces, modems, and firewalls.
A network allows nodes such as computers and devices to be connected so they can communicate. It has a topology that determines how the nodes are arranged and linked. It also uses transmission media like wires or wireless to transmit data between nodes. The purpose of networks is to facilitate communication both within and outside an organization by allowing sharing of resources like hardware, data, and applications.
A computer network is network of computer .It connects multiple computer in manner to enable meaningful transmission and exchange of data among them.Main objective of CN is sharing of information ,resources and processing load among the connected computer.
you can easily get basic introduction of COMPUTER NETWORK
The document provides an overview of networking concepts across different layers of the networking model. It discusses that a network includes interconnected devices like computers, servers, routers and wireless devices. The network core consists of routers that route data between hosts using protocols like IP. Modern data networks are packet switched, where data is divided into packets that are transmitted independently.
This document discusses various types of network hardware and software components. It describes network interface cards (NICs), hubs, switches, bridges, routers, gateways, and modems. NICs connect devices to the network, while hubs and switches connect multiple devices but switches have more intelligence. Bridges and routers connect different network segments, with routers having more advanced routing abilities. Gateways connect networks with different protocols. Modems convert digital and analog signals to connect networks to the internet.
Data Communication
Networks & Internet
Protocols & Standards
Layered Tasks
Internet Model
OSI Model
Digital Transmission
Analog Transmission
Multiplexing
Transmission Media
Circuit switching and Telephone Network
Signals
Digital Transmission
Analog Transmission
Multiplexing
Transmission Media
The document provides guidelines for installing premises cabling systems, including considerations for installing twisted pair, optical fiber, cable management, labeling, and termination. Key points covered include bend radius limits, pulling tensions, support spacing, minimizing sharp bends and compression, proper slack at jacks and racks, pathway types, and wiring standard color codes and pinouts.
1. The document discusses fiber optic installation including fiber connector types, splicing, mechanical splices, fusion splices, connectors, cleaving, polishing, inspection, cabling systems, parameters, cable types, distances, and testing.
2. Key aspects covered include link loss budgets, power budgets, attenuation specifications for links, certification standards, and troubleshooting faults.
3. Installation and testing of fiber optic cabling must follow industry standards to ensure the link meets power and attenuation budgets and performs as specified.
This document provides an overview of computer networks, including their components, benefits, disadvantages, classifications, server types, signal parameters, transmission impairments, data rates, and communication types and modes. Key points include: A computer network connects two or more devices to share resources; the five basic network components are transmitters, receivers, channels, messages, and protocols; networks can be classified by geographical area or component roles; servers include file, printer, application, and database servers; signals can be classified in various ways; transmission can be impaired by the channel; data rate depends on bandwidth, signal levels, and noise; and communication can occur synchronously, asynchronously, or via simplex, half-duplex, or full-d
This document provides an overview of networking fundamentals including common network devices like hubs, switches, and routers. It describes protocols like MAC, IP, TCP/IP, and how they enable communication. Specific topics covered include IP addressing classes, private IP ranges, subnetting, DHCP/BOOTP, wireless networking standards, packet switching vs circuit switching, DNS, and network security concepts like intrusion detection/prevention systems and VPNs. The document is intended as a basic introduction and reference for networking and cybersecurity professionals.
This document contains definitions of common networking terms starting with letters A through D. Some of the key terms defined include: access method, acknowledgement, address resolution protocol (ARP), adjacency table, American Standard Code for Information Interchange (ASCII), bandwidth, best-effort delivery, Bootstrap Protocol (BOOTP), Bring Your Own Device (BYOD), broadcast, burned-in-address (BIA), Carrier Sense Multiple Access (CSMA), channel, circuit switched, Cisco Express Forwarding (CEF), classful addressing, classless addressing, client, client-server, cloud computing, coaxial cable, collaboration, connectionless, connection-oriented, content addressable memory (CAM) table, converged network, crosst
A computer network connects computers together to share resources and exchange information. The main types of computer networks are personal area networks (PANs), local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). LANs are commonly used within offices and buildings to share printers and files between connected computers. WANs extend across broader areas like cities or countries using transmission lines and routers to connect distant LANs and allow communication between nonlocal computers. Common network hardware includes network interface cards, switches, routers, hubs, and gateways.
The document discusses key concepts of networking including the three basic elements required: network hardware, software, and protocols. It describes common network types like LAN, WAN, and MAN and compares peer-to-peer and server-based networks. The OSI reference model and TCP/IP model are explained along with common network devices, cabling, and IP addressing schemes.
This document provides an overview of computer networking concepts and terminology. It introduces the key components of a computer including the processor, memory, and input/output devices. It also covers communication devices and how they can be synchronous or asynchronous. The document discusses how networks are connected including different types of buses and hierarchies. It provides an overview of different operating systems from various developers. It also covers network structure, topologies, media, reliability, flow control, congestion, and the layered protocol architecture of the OSI model.
This document provides an overview of networking fundamentals, including definitions of common network types like LANs and WANs. It describes network topologies like bus, star, and ring configurations. Communication protocols and hardware like hubs, routers, and firewalls are defined. The roles of gateways and modems in transmitting data are also summarized.
The document provides an overview of computer networks and details regarding the school's network. It discusses why networks are important, defines what a network is, and describes the key components and types of networks. The school's network uses a hierarchical extended star design with fiber optic cables connecting the school to servers located offsite. The network includes a wireless local area network (WLAN) within the school, a wide area network (WAN) connecting the school to other district sites, a storage area network (SAN) for student data, personal area networks (PANs) within classrooms, and a virtual private network (VPN) allowing remote access to files.
This document provides an overview of basic networking concepts including protocols, protocol layers, network interconnection, and the Internet. It describes how networks are defined and addressed. The key protocol layers of OSI and TCP/IP models are examined including physical, data link, network, transport, and application layers. Common network types, topologies, and connectivity options are also summarized.
The document provides an overview of networking concepts including the OSI model, WAN technologies, convergence, wireless networking, and authentication methods. It describes the seven layers of the OSI model and technologies associated with each layer such as Ethernet and IP. It also discusses WAN options like leased lines, MPLS, and QoS mechanisms for prioritizing traffic. Wireless topics covered include frequencies, modulation, authentication, encryption, and next-generation centralized wireless network architectures.
This document provides an overview of networking fundamentals including defining computer networks, types of networks like peer-to-peer and client/server, local and wide area networks, network interface cards, physical components like cabling and devices, and network architectures like Ethernet and Token Ring. Key points covered include how networks allow file sharing, printing, and communication between devices, examples of networking media and common devices, and standards for networking protocols and architectures.
This document defines and describes different types of computer networks and networking devices. It discusses local area networks (LANs) that connect computers within a small area like a building or lab, metropolitan area networks (MANs) that connect networks within a larger region like a city, and wide area networks (WANs) that connect large geographic areas like countries or continents. Common networking devices described include hubs, switches, bridges, routers, gateways, interfaces, modems, and firewalls.
A network allows nodes such as computers and devices to be connected so they can communicate. It has a topology that determines how the nodes are arranged and linked. It also uses transmission media like wires or wireless to transmit data between nodes. The purpose of networks is to facilitate communication both within and outside an organization by allowing sharing of resources like hardware, data, and applications.
A computer network is network of computer .It connects multiple computer in manner to enable meaningful transmission and exchange of data among them.Main objective of CN is sharing of information ,resources and processing load among the connected computer.
you can easily get basic introduction of COMPUTER NETWORK
The document provides an overview of networking concepts across different layers of the networking model. It discusses that a network includes interconnected devices like computers, servers, routers and wireless devices. The network core consists of routers that route data between hosts using protocols like IP. Modern data networks are packet switched, where data is divided into packets that are transmitted independently.
This document discusses various types of network hardware and software components. It describes network interface cards (NICs), hubs, switches, bridges, routers, gateways, and modems. NICs connect devices to the network, while hubs and switches connect multiple devices but switches have more intelligence. Bridges and routers connect different network segments, with routers having more advanced routing abilities. Gateways connect networks with different protocols. Modems convert digital and analog signals to connect networks to the internet.
Data Communication
Networks & Internet
Protocols & Standards
Layered Tasks
Internet Model
OSI Model
Digital Transmission
Analog Transmission
Multiplexing
Transmission Media
Circuit switching and Telephone Network
Signals
Digital Transmission
Analog Transmission
Multiplexing
Transmission Media
The document provides guidelines for installing premises cabling systems, including considerations for installing twisted pair, optical fiber, cable management, labeling, and termination. Key points covered include bend radius limits, pulling tensions, support spacing, minimizing sharp bends and compression, proper slack at jacks and racks, pathway types, and wiring standard color codes and pinouts.
1. The document discusses fiber optic installation including fiber connector types, splicing, mechanical splices, fusion splices, connectors, cleaving, polishing, inspection, cabling systems, parameters, cable types, distances, and testing.
2. Key aspects covered include link loss budgets, power budgets, attenuation specifications for links, certification standards, and troubleshooting faults.
3. Installation and testing of fiber optic cabling must follow industry standards to ensure the link meets power and attenuation budgets and performs as specified.
PABX is a private branch exchange phone system that allows organizations to have internal phone lines and make external calls. It consists of a chassis, telecom card, extension card, controller card, and internet card and works by routing calls internally or externally through these components. The system can be expanded and integrated with VoIP technology to provide additional phone lines over an internet connection for both private and public use within organizations and businesses.
A structured cabling system allows for constant moves and changes to be performed by on-site personnel with growth and flexibility built into the cabling scheme. It supports and outlives most network components while only representing 5% of the total network investment. A structured cabling system allows moves, adds, and changes to occur quickly and cost-effectively, preventing downtime that can cost between $1,000 and $50,000 per hour.
Structured Cabling Technologies for NetworkingTharindu Kumara
Structured cabling is building or campus telecommunications cabling infrastructure that consists of a number of standardized smaller elements (hence structured) called subsystems.(wikipedia)
Basic Campus Network Design - Network Cabling SystemMd. Abdul Awal
This document provides an overview of basic campus network design and structured cabling. It discusses network cabling systems, transmission media like twisted pair and optical fiber cables. It describes categories of unshielded twisted pair cables and their applications. The document outlines considerations for proper cable installation, including bend radius, tension, and termination. It also discusses components of structured cabling like patch panels, cable management, and documentation standards. The goal is to understand standard cabling processes and best practices for campus network design.
This document provides information on designing structured cabling systems, including premises and backbone cabling. It discusses network-specific and open cabling systems, as well as centralized and distributed network architectures. Key considerations for cabling system design include applications, hardware, software, physical plant and cost. The document also covers telecommunications outlet placement, telecommunications and equipment room design, horizontal and backbone cabling, media types, and standards bodies. Diagrams illustrate typical topologies, pathways, and closet layouts.
The document summarizes a student teacher's observation of their resource teacher developing an English lesson on sentence expansion using subordination. It describes how the resource teacher began the lesson with a motivating selection about a happy family. The teacher then had students analyze sentences from the selection and state the two ideas in each. To end, the teacher asked students to generalize about expanding sentences using subordination rather than stating it directly. The student teacher observed assessment and checking for understanding throughout the lesson.
Detailed Lesson Plan (ENGLISH, MATH, SCIENCE, FILIPINO)Junnie Salud
Thanks everybody! The lesson plans presented were actually outdated and can still be improved. I was also a college student when I did these. There were minor errors but the important thing is, the structure and flow of activities (for an hour-long class) are included here. I appreciate all of your comments! Please like my fan page on facebook search for JUNNIE SALUD.
*The detailed LP for English is from Ms. Juliana Patricia Tenzasas. I just revised it a little.
For questions about education-related matters, you can directly email me at mr_junniesalud@yahoo.com
The document discusses planning and cabling for a CCNA Exploration course. It covers topics like identifying media for LANs and WANs, cable types and standards, switch and router configurations. Examples are provided for designing addressing schemes for networks using VLSM and subnetting techniques. The document compares different network designs and components like hubs, switches and routers. It also discusses cable lengths, types and connections used within networks and between networks.
Zdalna komunikacja sieciowa - zagadnienia sieciowe Agnieszka Kuba
This document discusses remote communication and networking concepts. It covers transmission modes, Ethernet basics, the TCP/IP model including layers, IP addressing and subnets, network devices like routers and firewalls, protocols like TCP, UDP, DNS, DHCP, and VPN technology. Mobile networks including 2G, 3G, 4G and LTE standards are also summarized along with examples of mobile remote access solutions.
This document provides an overview of networking concepts including network components, layers of the OSI model, network structures, IP addressing, subnetting, routing, and TCP/IP protocols. Key points covered include the core, distribution, and access layers of a network hierarchy; functions of the physical, data link, network, and transport layers; MAC addressing; IP addressing classes and subnetting; TCP and port numbers; and routing protocols.
The document discusses network technologies and concepts. It covers topics like network layers, IP addressing, routing, and protocols. It provides an overview of common network standards and technologies used in both home and enterprise networks, such as Ethernet, switches, WiFi, and IP routing.
This document provides an overview of Ethernet networking including:
1. Ethernet uses layers 1 and 2 of the OSI model and the Network Access layer of the TCP/IP model. It evolved from early LAN technologies and uses frames, MAC addressing, and CSMA/CD.
2. Switches avoid collisions by forwarding frames only to destination ports, improving performance over hubs. Higher bandwidth standards like Fast Ethernet and Gigabit Ethernet require full-duplex links without collisions.
3. Ethernet addressing uses MAC addresses to identify devices locally and IP addresses to route between networks. ARP resolves IP addresses to MAC addresses to allow communication between hosts.
UMTS uses WCDMA technology which allows all cells to reuse the same frequency band by differentiating users through the use of unique scrambling codes. It provides benefits like improved voice quality, higher data rates up to 384kbps, and new multimedia services. UMTS network architecture utilizes scrambling codes to distinguish between base stations and user equipment on the downlink and uplink respectively, enabling frequency reuse across all cells.
The document discusses IP addressing and networking concepts, including the structure of an IP address, purpose of IP addresses for identifying devices and routing data, and how IP addresses and network masks are used to define networks and assign addresses in a hierarchical and classless manner. It also covers special IP addresses and how addressing has evolved from early class-based systems to current classless inter-domain routing.
This document discusses several common networking devices and their functions. It describes hubs, switches, bridges, routers, gateways, CSU/DSUs, NICs, ISDN adapters, modems, and firewalls. Hubs broadcast traffic to all ports, wasting bandwidth, while switches only forward frames to their destination port. Bridges operate at the data link layer and routers at the network layer. Gateways perform protocol translation. NICs connect devices to the network. Modems convert digital to analog signals for transmission over phone lines. Firewalls control network access for security.
This document discusses various networking devices and their functions. It describes hubs, switches, bridges, routers, gateways, CSU/DSU, NICs, ISDN adapters, modems and firewalls. It explains that hubs broadcast traffic to all ports, wasting bandwidth, while switches only forward frames to their destination port based on MAC addresses. Routers route packets based on IP addresses and connect LANs and WANs. Gateways translate between different data formats. NICs allow devices to connect to networks. Modems convert digital to analog signals for transmission over phone lines. Firewalls control network access for security.
lecture note 2023 up10 stud2.ppt for anspeterhaile1
This document discusses network devices and components used to connect devices on a network. It describes physical components like end devices, intermediary devices, and network media. It also explains logical components like network interfaces, clients, servers, and different types of network devices and their functions, including switches, routers, gateways, and access points. The document also covers network topologies, representations, and the process of subnetting networks to create smaller broadcast domains.
This document discusses three types of LAN transmissions: unicast, multicast, and broadcast. It provides examples of each type of network topology. It also discusses LAN addressing, including MAC addresses at the data link layer and network layer addresses that identify devices. Multimedia broadcasts are noted to consume significant bandwidth.
The document discusses the key responsibilities and functions of the network layer in computer networking. The network layer is responsible for getting packets from their source to their destination across multiple hops and routers. It must choose appropriate paths through the network topology and balance traffic loads across lines and routers. The network layer provides either a connectionless or connection-oriented service and uses different packet forwarding mechanisms depending on the chosen service.
The document provides an overview of IT network design and installation topics covered in a MaxWiFi training course, including network models, IP addressing, NAT, routing, DHCP, VLANs, wireless networking, and Cisco device configuration.
The document provides answers to exam questions for CCNA 1 chapters 3 through 9. It includes questions from CCNA 1 final exams as well as chapter exams. For each chapter, it lists 2 multiple choice questions followed by short answers. The questions cover topics such as IP addressing, Ethernet, cabling, routers, switches, TCP/IP model and network fundamentals.
ccna workbook and lab manual by NETWORKERS HOME. NETWORKERS HOME understand the importance of CCNA workbook when it comes Cisco certification which is why we offered free CCNA workbook.
This document provides an overview of Ethernet and wireless computer networks. It discusses Ethernet standards and protocols including CSMA/CD, frame formats, addressing, and the transmitter algorithm. It also covers wireless networking technologies such as Bluetooth, Wi-Fi (IEEE 802.11), and WiMAX (IEEE 802.16). Key aspects summarized include the use of carrier sensing and collision detection in Ethernet, exponential backoff for retransmission after collisions, and the use of frequency hopping and direct sequence spread spectrum in wireless networks.
This document provides answers to exam questions for the CCNA 1 certification. It includes answers for chapters 6-11 covering topics like IP addressing, Ethernet, network cabling, routers, switches and the OSI model. For each chapter there are 2-3 multiple choice questions with explanations for the answers. The site CCNAAnswers.com provides practice exam questions and training for the CCNA certification.
This document provides answers to exam questions for the CCNA 1 certification. It includes answers for the final exam, chapter exams, and practice questions covering topics like IP addressing, Ethernet, network cabling, OSI model, TCP/IP model and network devices. The answers explain networking concepts and help students prepare for the CCNA 1 certification exam.
3. Structured cabling terms
MDF(main distribution frame)- A telecommunications room or
wiring closet, in a small, single-floor network
It is where all of the network cable concentrates to a single
point
IDF(Intermediate Distribution Facilities)-additional wiring
closets required
6. Some terms to considered in
designing
Backbone cable: The part of a network that handles the
major traffic
Cable labeling system: Proper labeling system or scheme to
identify cables
Electrical considerations: Premises should have adequate
outlets to support electrical requirements of network
equipment
Cable management system: Series of trays and straps used
to guide and protect cable runs
7. STRUCTURED CABLING BEST
PRACTICES
1.Type of cable should depends on the data that will flow on it.
2. Cable standards specify maximum lengths for different types
of cables. Always adhere to the length restrictions for the type of
cable being installed.
3. UTP, like all copper cable, is susceptible to EMI. It is
important to install cable away from sources of interference such
as high-voltage cables and fluorescent lighting. Televisions,
computer monitors and microwaves are other possible sources
of interference. In some environments it may be necessary to
install data cables in conduit to protect them from EMI and RFI.
8. 4. Improper termination and the use of low quality cables and
connectors can degrade the signal carrying capacity of the
cable. Always follow the rules for cable termination and test
to verify that the termination has been done properly.
5. Test all cable installations to ensure proper connectivity
and operation.
6. Label all cables as they are installed, and record the
location of cables in network documentation.
9. Ip v4 address
The IP address is a logical network address that identifies a
particular host(alias)
Operates on the Network Layer
10. Ipv4 structure
An IP address is simply a series of 32 binary bits (ones and
zeros). It is very difficult for humans to read a binary IP
address. For this reason, the 32 bits are grouped into four 8-
bit bytes called octets.
11000000.10101000.0000000100000101
11. Subnet mask (basic)
-allows the flow of network
traffic between hosts to be
segregated based on a network
configuration
255.255.255.0—11111111.11111111.11111111.00000000
means the first 3 octet are for network
And the last octet is for the host
Cidr=24
16. How subnet mask and ip address
interact
H1 will check the subnet mask coming from H2. H1 will check the
subnet mask to know what octet is for the network and what is for the host. If the
H1 finds that they have same subnet mask as to H2, H1 will check the
IP address of H2 if they are the same network address. On the figure
Above, H1 and H2 will communicate since they are on the same network
Address based on the subnet mask.
23. Determining the number of host
available on a particular mask
importance;
in order to determine the number of host in a give mask
# of host:2^(number of zero on the host octet)
25. Why?
Because two ip is reserved for broadcast and the network
address
broadcast ip address- is the last ip on the network
network address- is the first ip on the network
26. Exercise
For example
192.168.100.0 subnet mask 255.255.255.0
192.168.100.0 is the subnet address
192.168.100.1 is the first usable address
192.168.100.254 is the last usable address
192.168.100.255 is the broadcast address
27. For example
What is the broadcast address for 192.168.1.0 mask
255.255.255.0?
What are the usable address?
192.168.1.1 to 192.168.1.254
28. For example
What is the broadcast address for 192.168.1.0 mask
255.255.255.0?
What are the usable address?
30. now try!!!
255.255.0.0
Cidr=/ 16
Binary equivalent=11111111.11111111.00000000.00000000
Number of hosts=65536
Number of usable hosts=65534
And also
172.16.0.0 mask 255.255.0.0
Broadcast address=172.16.255.255
Subnet address-172.16.0.0
Last usable ip=172.16.255.254
32. But..
127 is not a usable ip since it is used for loopback or for
testing
33. RESERVED PRIVATE IP
ASSIGNED
10.0.0.0 UP TO 10.255.255.254
172.16.0.0 UP TO 172.32.255.254
192.168.0.0 UP T0 192.168.255.254
AND THE REST ARE PUBLIC IP (INTERNET)
AND CANNOT BE USED ON THE NETWORK
40. Collision domain -A collision domain is a logical
network segment where data packets can
“collide” with one another for being sent on a
shared medium, in particular in the Ethernet
networking protocol (analogy)
41. Collision domain -A collision domain is a logical
network segment where data packets can
“collide” with one another for being sent on a
shared medium, in particular in the Ethernet
networking protocol (analogy)
Imagine a road using one lane only to be used for
both direction. It means one car can only pass unto
road while some car will wait until the car had pass
unto the road.
42. CSMA-CD( Carrier Sense Multi
Access- Collision Detection
I f the two will sent a data
simultaneously on the same
collision domain, There will be
a collision and will be detected
using CSMA- CD. The
computer will said the network
will be jam and wait for a
particular time in order to send
again( used by Hub)
CSMA- Collision Avoidance-
used on wireless
communication on routers and
Access points.
43. Broadcast Domain- A broadcast domain is a
logical division of a computer network, in which
all nodes can reach each other by broadcast at
the data link layer.
44. NETWORK DEVICES
hub SWITCH
H
One collision domain Collision domain depends
on number of port
Divides the bandwidth
by the number of user Dedicated bandwidth
Half duplex Full duplex
Layer 1
Layer 2
One broadcast domain
45. NETWORK DEVICES
router SWITCH
Collision domain depends
Collision domain depends
on number of port
on number of port
Dedicated bandwidth
Dedicated bandwidth
Used to connect two
Used to connect pc on the
different network
same network
Full duplex Full duplex
Layer 3
Layer 2
One broadcast in
One broadcast for
every port
every port
47. Exercise( 100 MBPS hub)
How many collision? 1
How many broadcast?1
Bandwidth on each pc?33.33
MBps
48. 100 MBPs switch
How many collision domain?
How many broadcast domain?
Bandwidth on each pc?
49. 100 MBPs switch
How many collision domain?2
How many broadcast domain?1
Bandwidth on each pc?100
MBPS
50. 100 MBps hub and 100 MBps
switch
How many collision domain?
How many broadcast domain?
Bandwidth on each pc?
51. 100 MBps hub and 100 MBps
switch
How many collision domain? 3
How many broadcast domain?1
Bandwidth on each pc?
PC0-33MBPS PC1=33MBPS PC2= 33MBPS PC3-
100MBPS PC4= MBPS