+ All Categories
Home > Education > Sem 1 Ch 2

Sem 1 Ch 2

Date post: 20-Jan-2015
Category:
Upload: aqeelhaider74
View: 259 times
Download: 0 times
Share this document with a friend
Description:
 
Popular Tags:
39
1 CCNA 1 v3.0 Module 2 Networking Fundamentals
Transcript
Page 1: Sem 1 Ch 2

1

CCNA 1 v3.0 Module 2 Networking Fundamentals

Page 2: Sem 1 Ch 2

2

Objectives

Page 3: Sem 1 Ch 2

3

Networking Devices

Page 4: Sem 1 Ch 2

4

Network TopologyPHYSICAL AND LOGICALMost common Logical Topologies are Broadcast & Token ring

Page 5: Sem 1 Ch 2

5

NETWORK PROTOCOLS

How physical network is built How computers connect to the network How data is formatted for transmission How data is sent How to deal with errors

Page 6: Sem 1 Ch 2

6

Network Protocols

Page 7: Sem 1 Ch 2

7

LOCAL AREA NETWORKSLAN components Computers NICs Peripheral devices Networking Media Networking devicesLAN Technologies Ethernet Token Ring FDDI

Page 8: Sem 1 Ch 2

8

Local-area Networks (LANs)

Page 9: Sem 1 Ch 2

9

Page 10: Sem 1 Ch 2

10

Wide-area Networks (WANs)

Page 11: Sem 1 Ch 2

11

Data Networks

Page 12: Sem 1 Ch 2

12

SANsMoves data between Server and Storage resources.Allows high speed connectivity for Server to storage Server to server Storage to storage

PERFORMANCE-AVAILIBILITY-SCALABILITY

Page 13: Sem 1 Ch 2

13

Storage-Area Networks (SANS)

Performance – SANs enable concurrent access of disk or tape arrays by two or more servers at high speeds.

Availability – SANs have disaster tolerance built in, because data can be mirrored using a SAN up to 10 kilometers (km) or 6.2 miles away.

Scalability – Like a LAN/WAN, it can use a variety of technologies.

Page 14: Sem 1 Ch 2

14

Virtual Private Networks (VPNs)A private network constructed within a public network infrastructure.Using VPN, a Telecommuter can remotely access the network of company H/Qs.Through Internet secure Tunnel is built Between PC of Telecommuter and Router at Company H/Qs.VPNs offers secure, reliable over shared public network while maintaining same security and management policies as a private network.

Page 15: Sem 1 Ch 2

15

Intranet and Extranet VPN

Page 16: Sem 1 Ch 2

16

Importance of Bandwidth

Page 17: Sem 1 Ch 2

17

Bandwidth Pipe Analogy

Page 18: Sem 1 Ch 2

18

Bandwidth Highway Analogy

Page 19: Sem 1 Ch 2

19

Bandwidth Measurements

Page 20: Sem 1 Ch 2

20

Bandwidth Limitations

Page 21: Sem 1 Ch 2

21

Bandwidth > Throughput

Page 22: Sem 1 Ch 2

22

Digital Transfer Calculation

Page 23: Sem 1 Ch 2

23

EXAMPLE

Which would take less time?

1-Sending a floppy disk (1.44 MB) full of data over an ISDN BRI Line

OR2-Sending a 10GB hard drive full of data over an OC-48 line

Page 24: Sem 1 Ch 2

24

EXAMPLE ( Cont…..)

T = S/BW

1- S= 1.44 MB, BW=128 Kb

Thus time = 1.44 x 1000 K Bytes x 8 Bits / 128 Kbps

= 90 Seconds

2- S= 10 GB, BW= 2.488320 Gbps

Thus time = 10 G Bytes x 8 Bits/ 2.488320 Gbps

= 32.15 Seconds

Page 25: Sem 1 Ch 2

25

Using Layers to Describe Data Communication

Page 26: Sem 1 Ch 2

26

OSI Model

Page 27: Sem 1 Ch 2

27

OSI Layers

Page 28: Sem 1 Ch 2

28

OSI Layers

•Provides reliable transfer of data across media

•Provides physical/flat address

Page 29: Sem 1 Ch 2

29

OSI Layers

Page 30: Sem 1 Ch 2

30

OSI Layers

Page 31: Sem 1 Ch 2

31

OSI Layers

Page 32: Sem 1 Ch 2

32

OSI Layers

Page 33: Sem 1 Ch 2

33

OSI Layers

Page 34: Sem 1 Ch 2

34

Peer-to-Peer Communication

Page 35: Sem 1 Ch 2

35

TCP/IP Model

Page 36: Sem 1 Ch 2

36

Page 37: Sem 1 Ch 2

37

Encapsulation

Page 38: Sem 1 Ch 2

38

Names for Data at Each Layer

Page 39: Sem 1 Ch 2

39

Summary


Recommended