ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.

Slides:



Advertisements
Similar presentations
What is an IP Address An IP Address (or Internet Protocol address) is an address used to uniquely identify a device on an IP network. The address is made.
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Troubleshooting a “Broken LAN” Telecommunications and Networking.
BTT 101 / 2O1 Lesson 10 Dundas Valley Secondary Mr. Young.
Networking Basics lesson 17. This lesson includes the following sections: The Uses of a Network How Networks are Structured Network Topologies for LANs.
ITE PC v4.0 Chapter 1 1 Operating Systems Computer Networks– 2.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 13: Troubleshoot TCP/IP.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
IS 247 Introduction to Web Application Development Tim Wu.
Introduction to Networking. Key Terms packet  envelope of data sent between computers server  provides services to the network client  requests actions.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Addressing Networking for Home and Small Businesses – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Addressing Networking for Home and Small Businesses – Chapter.
IP Addressing Basics LAB 8.
30/11/ Q & A on Networking. Question No. 1 What is Networking? Two or more computers that are linked in order to share – Resources (such as printers.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Chapter 5 Networks Communicating and Sharing Resources
Managing Network connections. Network Cabling Ethernet Topology Bus topology – Connects each node in a line – Has no central connection point Star topology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Addressing Networking for Home and Small Businesses – Chapter 5.
Chapter 9A Network Basics.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch8. Fundamental Networks.
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Basic Concepts of a Computer Network
NETWORKS.
© 2007 Cisco Systems, Inc. All rights reserved. 1 Network Addressing Networking for Home and Small Businesses – Chapter 5 Darren Shaver – Modified Fall.
Living Online Module Lesson 23 — Networks and Telecommunication
Lecture 4 Title: Network Components and Types By: Mr Hashem Alaidaros MIS 101.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 2: Configuring Network Protocols.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Operating Systems Networking for Home and Small Businesses – Chapter.
Introduction to Computing Lecture # 11 Introduction to Computing Lecture # 11.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
S. Butler Emery High School Spring 2006 Networks Computer Technology Day 17.
Networks Computer Technology Day 17. Network  Two or more computers and other devices (printers or scanners) that are connected, for the purpose of sharing.
Networks Computer Technology Day 17. Network  Two or more computers and other devices (printers or scanners) that are connected, for the purpose of sharing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Communicating over the Network Network Fundamentals – Chapter 2.
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 3 JEOPADY Q&A by SMBender, Template by K. Martin.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
© Cengage Learning 2014 How IP Addresses Get Assigned A MAC address is embedded on a network adapter at a factory IP addresses are assigned manually or.
Linux Operations and Administration Chapter Eight Network Communications.
Higher Computing Networking. Networking – Local Area Networks.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Communicating over the Network Network Fundamentals – Chapter 2.
CSCI-235 Micro-Computer Applications The Network.
1 Syllabus at a glance – CMCN 6103 Introduction Introduction to Networking Network Fundamentals Number Systems Ethernet IP Addressing Subnetting ARP DNS.
INTRODUCTION TO COMPUTER NETWORKING  Definition of computer network  Devices that could be connected to the network  Connection media  Resources shared.
Computer Networks and Internet. 2 Objectives Computer Networks Computer Networks Internet Internet.
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
Introduction to Networks. When Personal Computers first appeared in business, software programs were designed for a single user. However as computers.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Introduction to Networking.
Computer Networks CSC September 23,
© 2015 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 7: Networking Concepts IT Essentials v6.0.
Networking for Home and Small Businesses – Chapter 5
Chapter Objectives In this chapter, you will learn:
Networking for Home and Small Businesses – Chapter 5
Instructor Materials Chapter 1 Ever Wonder How It Works?
Semester 1 Cisco Discovery JEOPADY Chapter 3.
Troubleshooting a “Broken LAN”
Final Revision Notes-Grade10
Computer Technology Notes #4
Networking for Home and Small Businesses – Chapter 5
Network Models, Hardware, Protocols and number systems
ICT Computing Lesson 4: Computing Network.
Objectives: 1.Identify different internet protocol (IP) 2.Configure sample of IP address 3.Appreciate and relate protocol in our life.
Presentation transcript:

ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different types of networks every day: Telephone system Cellular networks School computer network Corporate computer network The Internet  Computers can be linked by networks to share data and resources.  A network can be as simple as two computers connected by a single cable or as complex as hundreds of computers connected to multiple network devices. Principles of Networking

ITE PC v4.0 Chapter 8 2 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Computer Networks  Network devices include: Desktop and laptop computers Printers and scanners PDAs and Smartphones Program, file, and/or print servers Hubs, switches, routers, access points  Resources shared across networks include: Services, such as printing or scanning Storage devices, such as hard drives Applications, such as databases or programs like Read 180  Different types of network media: Copper cabling, for example Cat5 Fiber-optic cabling Wireless connection

ITE PC v4.0 Chapter 8 3 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Benefits of Networking  Fewer peripherals needed  Increased communication capabilities  Avoid file duplication and corruption  Lower cost licensing  Centralized administration

ITE PC v4.0 Chapter 8 4 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Types of Networks A computer network is identified by:  The type of media used to connect the devices  The type of networking devices used  How the resources are managed  How the data is stored  The area it serves

ITE PC v4.0 Chapter 8 5 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Local Area Network (LAN)  A group of interconnected computers that is under the same administrative control.  Can be as small as a single local network installed in a home or small office.  Can consist of interconnected local networks consisting of many hundreds of hosts, installed in multiple buildings and locations.

ITE PC v4.0 Chapter 8 6 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Wide Area Network (WAN)  A WAN connects LANs in geographically separated locations.  A WAN covers a much larger area than a LAN. The Internet is a large WAN.  Telecommunications service providers (TSP) are used to interconnect these LANs at different locations.

ITE PC v4.0 Chapter 8 7 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Wireless LAN (WLAN)  Wireless devices are used to transmit and receive data using radio waves.  Wireless devices connect to access points within a specified area.  Access points connect to the network using copper cabling.  WLAN coverage can be limited to the area of a room, or can have greater range.  You can share resources such as files and printers, and access the Internet on a WLAN.

ITE PC v4.0 Chapter 8 8 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Peer-to-Peer Networking  Share files, send messages, and print to a shared printer.  Each computer has similar capabilities and responsibilities.  Each user decides which data and devices to share.  No central point of control in the network.  Best if there are ten or fewer computers.

ITE PC v4.0 Chapter 8 9 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Disadvantages of Peer-to-Peer  Without centralized network administration, it is difficult to determine who controls network resources.  Without centralized security, each computer must use separate security measures for data protection.  More complex and difficult to manage as the number of computers on the network increases.  Without centralized data storage, data backups must be performed by users.

ITE PC v4.0 Chapter 8 10 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Client/Server Network  Client/server network model provides security and control for the network.  Client requests information or services from the server.  Server provides the requested information or service.  Servers are maintained by network administrators. Data backups and security measures Control of user access to network resources  Centralized storage and services include: Data stored on a centralized file server Shared printers managed by a print server Users have proper permissions to access data or printers

ITE PC v4.0 Chapter 8 11 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Bandwidth  amount of data that can be transmitted within a fixed time period  measured in bits per second and is usually denoted by the following: bps - bits per second Kbps - kilobits per second Mbps - megabits per second the amount of time it takes data to travel from source to destination. Latency

ITE PC v4.0 Chapter 8 12 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public IP Address  An IP address is a unique number that is used to identify a network device.  An IP address is represented as a 32-bit binary number, divided into four octets (groups of eight bits): Example:  An IP address is also represented in a dotted decimal format. Example:  When a host is configured with an IP address, it is entered as a dotted decimal number, such as  Unique IP addresses on a network ensure that data can be sent to and received from the correct network device. This prevents IP conflicts.

ITE PC v4.0 Chapter 8 13 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Subnet Masks  Used to indicate the network portion of an IP address  Is a dotted decimal number  Usually, all hosts within a broadcast domain of a LAN (bounded by routers) use the same subnet mask.  The default subnet masks for three classes of IP addresses: is the subnet mask for Class A is the subnet mask for Class B is the subnet mask for Class C

ITE PC v4.0 Chapter 8 14 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public IP Address Configuration  Manual configuration Manually configure each device with the proper IP address and subnet mask.  Dynamic configuration A Dynamic Host Configuration Protocol (DHCP) server automatically assigns IP addresses to network hosts.  Network Interface Card (NIC) is the hardware that enables a computer to connect to a network and it has two addresses: The IP address is a logical address that can be changed. The Media Access Control (MAC) address is "burned-in" or permanently programmed into the NIC when manufactured. The MAC address cannot be changed.

ITE PC v4.0 Chapter 8 15 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public What is the Assigned IP Address? If you do not know your IP address yet, use the ipconfig program, to find it.

ITE PC v4.0 Chapter 8 16 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Test Connectivity Using Ping  Ping your own IP address to make sure your NIC is working properly.  Ping your default gateway or another computer on your network.  Ping a popular website.  If you cannot ping one of these items, you may need to begin troubleshooting.

ITE PC v4.0 Chapter 8 17 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Output of the Ping Command  Four ICMP echo requests (pings) are sent to the destination computer to determine the reliability and reachability of the destination computer.