Sei sulla pagina 1di 68

CCNA 1 v3.

1 Module 2
Networking Fundamentals

© 2004, Cisco Systems, Inc. All rights reserved. 1


Objectives

© 2004, Cisco Systems, Inc. All rights reserved. 2


Businesses needed a solution for the problems

• How to avoid duplication of equipment


and resources

• How to communicate efficiently

• How to set up and manage a network

© 2004, Cisco Systems, Inc. All rights reserved. 3


How a LAN Stds. Created ?

• Earlier each company that created network


hardware and software used its own standards,
because of competition with other companies.

• Many of the network technologies were


incompatible with each other.

• Network equipment often had to be replaced to


implement new technologies.

© 2004, Cisco Systems, Inc. All rights reserved. 4


Why MANs & WANs ?

• As the use of computers in businesses


grew, LANs became insufficient .

• A new technology was necessary to share


information efficiently and quickly within a
company and between businesses over
large geographic areas

© 2004, Cisco Systems, Inc. All rights reserved. 5


Data Networks

© 2004, Cisco Systems, Inc. All rights reserved. 6


Network History

© 2004, Cisco Systems, Inc. All rights reserved. 7


Network History continued

© 2004, Cisco Systems, Inc. All rights reserved. 8


Classification of devices in the network

• End-user devices include computers,


printers, scanners and other devices that
provide services directly to the user.

• Network devices include all the devices


that connect the end-user devices
together to allow them to communicate .
Examples: Repeaters, hubs, bridges,
switches, and routers .

© 2004, Cisco Systems, Inc. All rights reserved. 9


Uses of Network devices

• to extend cable connections


• concentrate connections
• convert data formats
• and manage data transfers.

© 2004, Cisco Systems, Inc. All rights reserved. 10


Networking Devices

© 2004, Cisco Systems, Inc. All rights reserved. 11


Networking Devices

A repeater is a network device used to


regenerate a signal that are distorted by
transmission loss due to attenuation.

Hubs concentrate connections .


Passive Hub :without any other effect
on the data transmission.
Active hubs concentrate hosts and
also regenerate signals.

© 2004, Cisco Systems, Inc. All rights reserved. 12


Networking Devices

Bridges provide connections between


LANs. They also check data to
determine if it should cross the bridge.

Workgroup switches does not convert data


transmission formats & perform data
transfer management. Transfer data only to
the connection that needs it.

© 2004, Cisco Systems, Inc. All rights reserved. 13


Networking Devices

Routers can regenerate


signals, concentrate multiple
connections, convert data
transmission formats, and
manage data transfers. They
can also connect to a WAN,
which allows them to connect
LANs that are separated by
great distances.

© 2004, Cisco Systems, Inc. All rights reserved. 14


Network Topology

© 2004, Cisco Systems, Inc. All rights reserved. 15


Factors to be considered in choosing topology

• Easy to install
• Easy to troubleshoot
• Easy to reconfigure.
• No. of systems down because of media
failure

© 2004, Cisco Systems, Inc. All rights reserved. 16


Bus topology

• A bus topology uses a


single backbone cable
that is terminated at
both ends. All the
hosts connect directly
to this backbone.

© 2004, Cisco Systems, Inc. All rights reserved. 17


Ring & Star Topology

• A ring topology connects one host to the


next and the last host to the first. This
creates a physical ring of cable. Only the
node with the token is allowed to send data .
All other nodes must wait for the token to
come to them.

• relatively easy to install, requiring ;minimal


hardware

• A star topology connects all cables to a


central point.
• If hub goes down, entire network goes down.

• If a computer goes down, the network


functions normally.

• most scalable and reconfigurable of all


topologies

© 2004, Cisco Systems, Inc. All rights reserved. 18


Extended star & Hierarchical topology
• An extended star topology
links individual stars
together by connecting
the hubs or switches.

• A hierarchical topology is
similar to an extended
star. However, instead of
linking the hubs or
switches together, the
system is linked to a
computer that controls the
traffic on the topology.

© 2004, Cisco Systems, Inc. All rights reserved. 19


Mesh Topology

• A mesh topology is implemented to


provide as much protection as
possible from interruption of service.

• Every computer has multiple possible


connection paths to the other
computers on the network, so a
single cable break will not stop
network communications between
any two computers.

For example, a nuclear power in a


networked control systems

© 2004, Cisco Systems, Inc. All rights reserved. 20


Logical topology of a network

• It determines how the hosts communicate across the


medium. Two most common types of logical topologies are :

Broadcast --- example Ethernet Technology

Token passing --- example Token Ring and


Fiber Distributed Data Interface (FDDI)

© 2004, Cisco Systems, Inc. All rights reserved. 21


Network Protocols

• A protocol is a formal description of a set of rules


and conventions that govern a particular aspect of
how devices on a network communicate.

• Protocols determine
the format timing
sequencing
error control in data communication.

© 2004, Cisco Systems, Inc. All rights reserved. 22


Network rules are created and Maintained by.

• Electrical and Electronic Engineers IEEE)

• American National Standards Institute (ANSI)

• Telecommunications Industry Association (TIA)

• Electronic Industries Alliance (EIA)

• International Telecommunications Union (ITU), formerly known


as the Comité Consultatif International Téléphonique et
Télégraphique (CCITT).

© 2004, Cisco Systems, Inc. All rights reserved. 23


Local-area Networks (LANs)

© 2004, Cisco Systems, Inc. All rights reserved. 24


LAN devices & Tecnologies

LANs consist of the following components:


• Computers
• Network interface cards
• Peripheral devices
• Networking media
• Network devices

LAN technologies include the following:


• Ethernet
• Token Ring
• FDDI

© 2004, Cisco Systems, Inc. All rights reserved. 25


Wide-area Networks (WANs)

© 2004, Cisco Systems, Inc. All rights reserved. 26


Uses of WAN

• Operate over a large and geographically


separated area
• Allow users to have real-time communication
capabilities with other users
• Provide full-time remote resources connected to
local services
• Provide e-mail, Internet, file transfer, and e-
commerce services

© 2004, Cisco Systems, Inc. All rights reserved. 27


WAN technologies

• Modems
• Integrated Services Digital Network (ISDN)
• Digital subscriber line (DSL)
• Frame Relay
• T1, E1, T3, and E3
• Synchronous Optical Network (SONET)

© 2004, Cisco Systems, Inc. All rights reserved. 28


Metropolitan-Area Network (MANs)

© 2004, Cisco Systems, Inc. All rights reserved. 29


MAN

• A MAN usually consists of two or more LANs in a


common geographic area. For example, a bank
with multiple branches may utilize a MAN.

• Typically, a service provider is used to connect


two or more LAN sites using private
communication lines or optical services.

© 2004, Cisco Systems, Inc. All rights reserved. 30


Storage-Area Networks (SANS)

© 2004, Cisco Systems, Inc. All rights reserved. 31


Storage Area Network (SAN)

• A storage-area network (SAN) is a


dedicated, high-performance network
used to move data between servers and
storage resources.

© 2004, Cisco Systems, Inc. All rights reserved. 32


SAN features

• Performance – SANs allow concurrent access of disk or tape


arrays by two or more servers at high speeds. This provides
enhanced system performance.

• Availability – SANs have built-in disaster tolerance. Data can


be duplicated on a SAN.

• Scalability – A SAN can use a variety of technologies. It


grows with more storage capacity

© 2004, Cisco Systems, Inc. All rights reserved. 33


Virtual Private Networks (VPNs)

© 2004, Cisco Systems, Inc. All rights reserved. 34


Virtual Private Network

• A VPN is a service that offers secure,


reliable connectivity over a shared public
network infrastructure such as the
Internet.

© 2004, Cisco Systems, Inc. All rights reserved. 35


Three types of VPN

• VPN for SOHO users


• Intranet
• Extranet

© 2004, Cisco Systems, Inc. All rights reserved. 36


Purpose of VPN

• VPNs maintain the same security and


management policies as a private network.

• The use of a VPN is the most cost-effective


way to establish a point-to-point connection
between remote users and an enterprise
network.

© 2004, Cisco Systems, Inc. All rights reserved. 37


Intranet VPN

• Intranet VPNs use dedicated connections to


link regional and remote offices to an
internal network over a shared infrastructure.

• Intranet VPNs allow access only to the


employees of the enterprise.

© 2004, Cisco Systems, Inc. All rights reserved. 38


Extranet VPNs

• Extranet VPNs use dedicated connections


to link business partners to an internal
network over a shared infrastructure.

• Extranet VPNs allow access to users


outside the enterprise.

© 2004, Cisco Systems, Inc. All rights reserved. 39


Benefits of VPNs

© 2004, Cisco Systems, Inc. All rights reserved. 40


Intranet and Extranet VPN

© 2004, Cisco Systems, Inc. All rights reserved. 41


Importance of Bandwidth

© 2004, Cisco Systems, Inc. All rights reserved. 42


Bandwidth Pipe Analogy

Bandwidth is defined as the amount of information that can flow


through a network connection in a given period of time.
© 2004, Cisco Systems, Inc. All rights reserved. 43
Bandwidth Highway Analogy

© 2004, Cisco Systems, Inc. All rights reserved. 44


Bandwidth Measurements

© 2004, Cisco Systems, Inc. All rights reserved. 45


Bandwidth Limitations

© 2004, Cisco Systems, Inc. All rights reserved. 46


Bandwidth Throughput

© 2004, Cisco Systems, Inc. All rights reserved. 47


Digital Transfer Calculation

© 2004, Cisco Systems, Inc. All rights reserved. 48


Digital versus Analog

© 2004, Cisco Systems, Inc. All rights reserved. 49


Using Layers to Analyze Problems

© 2004, Cisco Systems, Inc. All rights reserved. 50


Network Protocols

© 2004, Cisco Systems, Inc. All rights reserved. 51


Using Layers to Describe Data Communication

© 2004, Cisco Systems, Inc. All rights reserved. 52


OSI Model

© 2004, Cisco Systems, Inc. All rights reserved. 53


OSI Layers

© 2004, Cisco Systems, Inc. All rights reserved. 54


Physical Layer Functions

• Physical Characteristics of interfaces & media


(deals with electrical & mechanical specifications)
• Representation of bits (electromagnetic or optical)
• Data Rate (bits per sec.)
• Synchronisation (Sender & Reciever clock)
• Physical Topology (Star,Bus….)
• Transmission Mode (directionof transmission between 2
devices; e.g Half, Full between devices)

© 2004, Cisco Systems, Inc. All rights reserved. 55


Data Link Layer Functions

• Framing
• Physical addressing (MAC of sender/reciever as
Header)
• Flow Control (Matching the Speed)
• Error Control (FCS Trailor )
• Access control ( Which device uses the media)

© 2004, Cisco Systems, Inc. All rights reserved. 56


Network Player Functions

• Logical Addressing (IP addressing used for the


communication out of the network)

• Routing (Packets are routed in the internetwork to the final


destination)

© 2004, Cisco Systems, Inc. All rights reserved. 57


Transport Layer Functions

• Service- Point or Port addressing( Port no. as header to


segment)

• Segmentation & re-assembly (sequence no. to segments


when sending & replace the missing packets when recieves)

• Connection control ( connectionless or connection oriented)

• Flow & error control( applied over entire message & error
correction is through retransmission)

© 2004, Cisco Systems, Inc. All rights reserved. 58


Session Layer Function

• Dialog Control (half duplex or full duplex


between application processes)

• Synchronization (incertion of checkpoints


in the stream of data for recovery)

© 2004, Cisco Systems, Inc. All rights reserved. 59


Presentation Layer Funtions

• Translation(sender dependent format -


common format – Receiver dependent
format)
• Encryption & decryption
• Compression & decompression(for
multimedia information)

© 2004, Cisco Systems, Inc. All rights reserved. 60


Application Layer Functions

• when you use your Web browser, that


actual software is an application running
on your PC .It doesn't really “reside” at the
application layer. Rather, it makes use of
the services offered by a protocol that
operates at the application layer, which is
called the HTTP Other e.g FTP, E-Mail etc

© 2004, Cisco Systems, Inc. All rights reserved. 61


OSI Model

OSI Model

Data unit Layer Function

Application Network process to application

Host
Data Presentation Data representation and encryption
layers
Session Interhost communication

Segments Transport End-to-end connections and reliability

Packets Network Path determination and logical addressing (IP)


Media
layers Frames Data link Physical addressing (MAC & LLC)

Bits Physical Media, signal and binary transmission

© 2004, Cisco Systems, Inc. All rights reserved. 62


© 2004, Cisco Systems, Inc. All rights reserved. 63
Peer-to-Peer Communication

© 2004, Cisco Systems, Inc. All rights reserved. 64


TCP/IP Model

© 2004, Cisco Systems, Inc. All rights reserved. 65


Encapsulation

© 2004, Cisco Systems, Inc. All rights reserved. 66


Names for Data at Each Layer

© 2004, Cisco Systems, Inc. All rights reserved. 67


Summary

© 2004, Cisco Systems, Inc. All rights reserved. 68

Potrebbero piacerti anche