Download presentation
Presentation is loading. Please wait.
1
Introduction to Networking
CCNA 1 Module 1 Introduction to Networking PowerPoint Presentation created by: Mr. John L. M. Schram Modified & Narrated by Pete Brierley From Materials Created by: 11/22/2018
2
Requirements for an Internet Connection
The Internet is the largest data network on earth. Connection to the Internet can be broken down into • the physical connection - cables, NIC • the logical connections - protocol suite: TCP/IP • the application. - Web browser, FTP 11/22/2018
3
PC Basics Personal computers have several components
• Small Discrete Components - Transistor, IC, Resistor, LED • Personal Computer Subsystems - CPU, Bus, ROM, RAM, - Microprocessor, Disk Drives, CD-ROM • Backplane Components - Backplane, NIC, Audio Card, Video Card, - Several kinds of ports to connect devices 11/22/2018
4
Network Interface Card
A network interface card (NIC) is a printed circuit board that provides network communication capabilities among PCs and other network devices. The NIC is sometimes referred to as a “LAN adapter”. 11/22/2018
5
NIC and MODEM Installation
Connectivity to the Internet requires an adapter card, which may be a modem or NIC. A modem, or modulator-demodulator (MODDEM), is a device that provides the computer with connectivity to a telephone line. Modems can be installed internally or externally to a network device. Every device on a network must have a NIC or modem. 11/22/2018
6
Overview Of High-Speed And Dial-Up Connectivity
In the 1960s MODEM were introduced with at a baud rate of 300 or 300bps (bits per second). BBS (Bulletin Board Systems) came out in th 1970s. BBS use increased exponentially by the 1980s. Users wanted to transfer files and graphics. In the 1990s Modems evolved to 56kbps. In 2000 DSL (Digital Subscriber Line) & Cable were introduced which are “always on” and do not require a dial-up for a connection to be established with your ISP (Internet Service Provider). 11/22/2018
7
TCP/IP Transmission Control Protocol/Internet Protocol (TCP/IP) is a set of protocols or rules developed to allow cooperating computers to share resources across a network. TCP/IP is configured using a PC or Server’s operating system tools. 11/22/2018
8
Testing Connectivity with Ping
A Ping command can be used to test “connectivity” between 2 networked devices. Example: ping Ping works by sending multiple “request for a reply” packets to a destination. If the replies return we know we are connected. 11/22/2018
9
Web Browsers A web browser performs the following functions:
• Connects you to a web server • Requests information • Receives information • Displays the results on the screen A web browser is software that interprets HyperText Markup Language (HTML), one of the languages used to code web page content. The two most popular web browsers are Internet Explorer (IE) and Netscape Communicator. 11/22/2018
10
Plug-Ins There are also many special, or proprietary file types that standard web browsers are not able to display. To view these files the browser must be configured to use plug-in applications. These applications work in conjunction with the browser to launch the appropriate program required to view the following special files: • Flash – plays multimedia files, created by Macromedia Flash • Quicktime – plays video files, created by Apple • Real Player – plays audio files 11/22/2018
11
Trouble-Shooting Internet Connection Problems
Follow these steps: Document the problem Gather the facts Develop a Hypothesis Document an action plan Test the hypothesis Evaluate results – No success go back to develop new hypothesis If success perform and document a “post mortem” 11/22/2018
12
Binary Representation of Data
Computers work with and store data using electronic switches that are either turned ON or OFF. 1 representing “ON” and 0 representing “OFF”. This is Binary. The American Standard Code for Information Interchange (ASCII) is the most commonly used code for representing alpha-numeric data in a computer. 11/22/2018
13
Bits and Bytes 11/22/2018
14
Base 10 Number System 213410 = (2x103) + (1x102) + (3x101) + (4x100)
100 = 1, = 10, = 100, 103=1000 = (2x103) + (1x102) + (3x101) + (4x100) 11/22/2018
15
Base 2 Number System = (1 x 24 = 16) + (0 x 23 = 0) + (1 x 22 = 4) + (1 x 21 = 2) + (0 x 20 = 0) = 2210 11/22/2018
16
Converting Decimal to Binary
Convert 201 decimal to Binary: Find the largest position value you can subtract from 201 Find the largest position value you can subtract from each result until the result is zero = = = = 11/22/2018
17
Converting Binary to Decimal
Convert to decimal: Ignore the zeros. Find all of the ones and add up the corresponding powers of 2. = You MUST memorize this series of numbers! 11/22/2018
18
4-Octet Dotted-Decimal Notation
An Octet is an 8 bit binary number. Currently, addresses assigned to computers on the Internet are 32-bit binary numbers. To make it easier to work with these IP (Internet Protocol) addresses, the 32-bit binary number is broken into 4 “octets” and converted into 4 decimal numbers. 11/22/2018
19
Hexadecimal Numbers Hexadecimal refers to a Base 16 number system.
This means there are 16 digits: and A – F Hexadecimal is used for a NIC’s MAC Address. Hexadecimal is also used in Assembly Language and for memory addresses. Hex is abbreviated with 0x. 0x11A2B39F means the same thing as 11A2B39F16 The main reason base-16 is used is that converting between base-16 and base-2 is very convenient and very easy. 11/22/2018
20
Converting Between Hex and Binary
Binary Hex 1010 A 1011 B 1100 C 1101 D 1110 E 1111 F Convert 0x7A1D9F to Binary 7 A D F 0x7A1D9F = Convert to Hex 7 A D F = 0x7A1D9F 11/22/2018
21
IP Addresses and Network Masks
When IP addresses are assigned to network devices, some of the bits on the left side of the 32-bit IP number represent a network. The bits left over in the 32-bit IP address identify a particular host computer on the network. 11/22/2018
22
Subnet Masks A subnet mask will consist of 1st from left to right consecutively, representing the network portion of the IP address, and there after all 0s to the right most bit of the mask representing the host portion of the IP address. Examples of subnet masks in octal groupings are: written in dotted decimal as or 11/22/2018
23
Boolean Logic Gates Not Or And
The only Boolean logic you will need is the Logical AND The others – NOT and OR are illustrated here just to demonstrate that the AND is not the only Boolean Gate consideration 11/22/2018
24
Boolean NOT Logic Gate NOT will take return the opposite of what you give it. 11/22/2018
25
Boolean OR Logic Gate Requires one conditions to be true to return true. 11/22/2018
26
Boolean AND Logic Gate Requires both conditions to be true to return true. 11/22/2018
27
Finding the Host portion of an IP
Converting the IP address to binary would result in: Performing a Boolean AND on the IP address and the subnet mask of produces the network address of this host: Converting the result to dotted decimal, is the network portion of the IP address, when using the mask. 11/22/2018
28
AND Converting the IP address to binary would result in: Performing a Boolean AND of the IP address and the subnet mask produces the network address of this host: Converting the result to dotted decimal, is the network portion of the IP address, when using the mask. 11/22/2018
29
NOTE TO STUDENTS: The methods of converting numbers shown in these slides are intentionally different from what is shown in the curriculum. Pick which ever method works for you. Also, there is much more to subnetting. We will spend significant time going over number conversions with a heavy emphasis on subnetting. 11/22/2018
30
Introduction to Networking
CCNA 1 Module 1 Introduction to Networking PowerPoint Presentation created by: Mr. John L. M. Schram Modified & Narrated by Pete Brierley From Materials Created by: 11/22/2018
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.