0% found this document useful (0 votes)
38 views10 pages

Summary Cisco Chapter 1 and 2

The document covers the foundational concepts of networking, including the importance of networks in modern communication, the types of networks (LAN, WAN, Internet), and the roles of various network components and protocols. It emphasizes the evolution of network technologies, the significance of layered models for communication, and the interaction of protocols in ensuring effective data transmission. Additionally, it discusses emerging trends such as cloud computing and BYOD, as well as the necessity of security in network architecture.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views10 pages

Summary Cisco Chapter 1 and 2

The document covers the foundational concepts of networking, including the importance of networks in modern communication, the types of networks (LAN, WAN, Internet), and the roles of various network components and protocols. It emphasizes the evolution of network technologies, the significance of layered models for communication, and the interaction of protocols in ensuring effective data transmission. Additionally, it discusses emerging trends such as cloud computing and BYOD, as well as the necessity of security in network architecture.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

CISCO CCNA CHAPTER 1 AND 2

COMMUNICATION THROUGH THE NETWORK

EDISON FELIPE RIVERA PARRA

Juan Camilo Alvarado

Sebastian Rivera Aldana

TEACHING
ALVARO HERNAN ALARCON

HUILA UNIVERSITY CORPORATION (CORHUILA)

FACULTY OF ENGINEERING

SYSTEMS ENGINEERING

SUBJECT – TELEMATICS I

NEIVA – HUILA

2020
CHAPTER 1: Network Exploration

This chapter introduces the data network platform on which our social and business
relationships increasingly depend. The material presents the foundation for exploring the
services, technologies, and issues that network professionals face as they design, develop,
and maintain the modern network.

1.1 GLOBALLY CONNECTED

 Networks in everyday life: In today's world, we are connected like never before
thanks to the use of networks. News and discoveries spread around the world in a
matter of seconds. People can even connect and play with friends across the ocean
and on other continents.
 Technology Then and Now: Imagine a world without the Internet, without Google,
YouTube, instant messaging, Facebook, Wikipedia, online games, Netflix, iTunes
or easy access to current information. Over the years, data networks have slowly
expanded and transformed to improve the quality of life for people around the
world.
 Without limits: Thanks to these advances, we can create a world in which national
borders, geographical distances and physical limitations become less important and
become increasingly easier obstacles to overcome.
 Networks that support the way we learn: Networks changed the way we learn.
Access to high-quality education is no longer restricted to students who live in the
immediate vicinity of where the education is provided.
 Networks support the way we communicate: Internet globalization leads to new
forms of communication which are as follows: text, social media, collaboration
tools, blogs, wikis, podcasting and P2P.
 Networks that support the way we work: These enterprise networks evolved to
enable the transmission of many types of information services, including email,
video, messaging and telephony.

The use of networks to train employees effectively and cost-effectively is gaining


acceptance.

 Networks that support the way we play: The Internet is also used for traditional
forms of entertainment. Networks enable the creation of new forms of
entertainment, such as online gaming.
 Networks of many sizes: Networks come in all sizes. They can range from simple
networks consisting of two PCs to networks connecting millions of devices.
 Clients and servers: Servers are PCs with software that allows them to provide
information, such as email or web pages, to other terminals on the network. Clients
are PCs that have software installed that allows them to request information from
the server and display the information obtained. A web browser, such as Chrome or
Firefox, is an example of client software.
 Peer-to-peer: In small businesses and homes, many PCs function as servers and
clients on the network. This type of network is called a peer-to-peer network.
1.2 LAN, WAN AND INTERNET

 Network Components Overview: The network infrastructure contains three


categories of network components:

- Devices
- Media
- Services
 Terminals: A terminal is the origin or destination of a message transmitted through
the network.
 Intermediate network devices: These connect individual terminals to the network
and may connect multiple individual networks to form an internetwork.

 Network media: Communication over a network is carried by a medium. The


medium provides the channel through which the message travels from source to
destination. These means are the following:

- Metal wires inside cables: data is encoded in electrical impulses.


- Glass or plastic fibers (fiber optic cable): Data is encoded as pulses of light.
- Wireless transmission: Data is encoded using wavelengths of the
electromagnetic spectrum.
 Network Representations: A diagram makes it easy to understand how devices are
connected in a large network. This type of representation of a network is called a
topology diagram.
 Topology diagrams: These diagrams provide a visual map showing how the network
is connected.

There are two types of topology diagrams:

- Physical topology diagrams: Identify the physical location of intermediary devices


and cable routing.
- Logical topology diagrams: Identify devices, ports, and the addressing scheme.

 Types of networks: two most common types of network infrastructures:


- Local Area Network (LAN): A network infrastructure that provides access to users
or terminals in a small geographic area.
- Wide Area Network (WAN): A network infrastructure that provides access to other
networks over a large geographic area
-
 Local Area Networks: LANs are network infrastructures that span a small
geographic area.
 Wide Area Networks: WANs are network infrastructures that span a large
geographic area. Typically, WAN management is handled by service providers.
 Internet: The Internet is a global collection of interconnected networks. The
Internet does not belong to one person or one group.
 Intranets and Extranets: The term intranet is often used to refer to a private LAN
and WAN connection that belongs to an organization.
An organization may use an extranet to provide secure access to people who work for
another organization, but require company data.

 Internet Access Technologies: Home users, telecommuters (remote workers),


and small offices typically require a connection to an Internet Service Provider
(ISP) to access the Internet. Connection options vary considerably depending on
ISPs and geographic location.
 Home and Small Office Internet Connections: Common connection options for
home and small office users are shown, including: cable, DSL, cellular, satellite,
and dial-up technology.
 Business Internet Connections: Available connection options vary depending on
the type of service providers nearby. Common connection options for businesses
include: Dedicated leased lines, Ethernet WAN, DSL, and satellite.
 Packet Tracer: Navigation Help and Tips is a flexible and fun take-home
software program that will help you with your Cisco Certified Network Associate
studies.
1.3 THE NETWORK AS A PLATFORM

 Traditional separate networks: Each network used different technologies to


transport the communication signal. Each network had its own set of rules and
standards to ensure successful communication.
 The Converged Network: Converged networks can transmit data, voice, and
video between many different types of devices on the same network infrastructure.

 Network architecture: Refers to the technologies that support the infrastructure and
services and the programmed rules, or protocols, that move data across the network.
As networks evolve, we find that there are four basic characteristics that underlying
architectures need to meet user expectations:

- Fault tolerance: is that which limits the impact of failures, so that the number of
affected devices is as small as possible. In addition, it is built in a way that allows
for quick recovery when a failure occurs.
- Scalability: You can quickly expand to support new users and applications without
impacting the performance of the service delivered to current users.
- Quality of service: This is an increasingly important requirement for networks
today. New applications available to users on internetworks, such as live voice and
video streaming, generate higher expectations about the quality of services
provided.
- Security: refers to protecting the information contained in the packets transmitted
over the network and the information stored on devices connected to the network.
To achieve network security goals, there are three main requirements: reliability,
integrity, and availability.
1.4 THE CHANGING NETWORK ENVIRONMENT

 Emerging Trends: As new technologies and end-user devices are brought to


market, businesses and consumers must continue to adapt to this ever-evolving
environment. Some of the key trends include:

- BYOD (Bring Your Own Device): The BYOD trend gives end users the freedom to
use personal tools to access information and communicate across a business or
campus network.
- Online Collaboration: Collaboration is defined as “the act of working with other
people on a joint project.”
- Video Communications: Video is currently used for communication, collaboration
and entertainment purposes. Video calls can be made from anywhere with an
Internet connection.
- Cloud computing: This system allows us to store personal files and even create
backup copies of our entire hard drive on servers over the Internet. Through the
cloud, you can access word processing, photo editing, and other applications.
 Technology Trends in the Home: Networking trends are not only affecting the
way we communicate at work and school, they are also changing virtually every
aspect of the home.
 Powerline networking: Refers to the ability to connect a device to the network
wherever there is a power outlet. This saves the cost of installing data cables and
does not incur any additional costs on the electricity bill.

 Wireless Broadband:

- Wireless Internet Service Provider (WISP): A wireless Internet service provider


(WISP) is an ISP that connects subscribers to a designated access point or hotspot
using wireless technologies similar to those found in wireless local area networks.
- Wireless Broadband Service: This option uses the same cellular network
technology used to access the Internet with a smartphone or tablet.

 Security Threats: The network security implemented must take into account the
environment as well as the network tools and requirements. It must be able to
protect data while maintaining the quality of service expected from the network.
 Security Solutions: The implementation of home network security is very basic. It
is usually implemented in the connection terminals as well as at the Internet
connection point and may even depend on services contracted from the ISP.
 Cisco Network Architecture: Refers to the devices, connections, and products that
integrate to support the necessary technologies and applications. A well-planned
network technology architecture helps ensure the connection of any device in any
combination of networks. In addition to ensuring connectivity
 CCENT and CCNA Certification: Demonstrates that you have knowledge of
fundamental technologies and ensures that you are relevant with skill sets required
for the adoption of next-generation technologies.

To earn the CCNA Routing and Switching certification, you must pass two exams or a
composite exam. Candidates who pass the first exam are eligible to be called Cisco
Certified Entry Network Technician (CCENT).

 . Cisco Network Architecture

Network architecture refers to the devices, connections, and products that are integrated to
support the necessary technologies and applications. A well-planned network technology
architecture helps ensure the connection of any device in any combination of networks. In
addition to ensuring connectivity, it also increases profitability by integrating security and
management of
CISCO CCNA CHAPTER 2
Communication through the Network

Introduction The evolution of networks has been closely linked to the advance in
technologies and devices for this task, they have become more efficient and secure to give
more availability to the users who are using them, providing new services and generating
changes to improve day by day.
Goals
Learn what a network is structured like and the advantages of using a layered model.
Know the function of protocols and layers in network models.

Platform for communications


Elements of communication The essential thing in communication is that there is a
message, and for there to be a transmission of this message there must be three essential
elements, which are:
1. an issuer.
2. a receiver.
3. a medium

Communication of messages

If the transmission of a message were continuous without having messages, taking into
account that if an error occurred in the transmission the information would be lost and
would have to be sent again, for this reason data segmentation is used so that several
transmissions can be made at the same time and using the same network. We must know
that the segmentation process is very complex because it means that each message packet
has a header specifying the origin and destination of the message, and identifying in which
position the packet is located so that it can be assembled upon arrival at the destination.
Network components

Hardware: the physical part, the devices and the media (wired or wireless). Software:
These are the programs that run and are used on network devices to manage processes in
network services.
End devices and their role in the network

They are those that allow the interface between people and the network, they are where
messages originate and are destined. They have software installed that allows them to
communicate through a network.

Intermediary devices and their role in the network


.
These allow connectivity between end devices and connect different networks. They
manage information as it flows through the network.

Network media

These are the paths through which messages will be transported from origin to destination.
These are: These media are:
1. metallic threads,
2. Optical fiber
3. wireless transmission.

LAN (Local Area Network), WAN (Wide Area Network) and Internetworks
Local Area Networks

They are used by companies that want to manage an internal network, provide services to
an organizational community, and their administration and security are handled internally.

Wide Area Networks

These provide interconnection between LANs and use devices designed specifically for
these connections. They allow forms of communication such as email exchange, corporate
training and access to resources. Despite the benefits of LANs and WANs, one
disadvantage is that they do not allow communication outside the local organization.

Internet: a network of networks

It is a global mesh of networks that are interconnected and provide access to millions of
users around the world.
Network Representations This is made easier if done visually and this is why network
devices and media have graphical symbology.

Protocols
Rules governing communications predetermined rules called protocols that are specific to
the characteristics of the conversation, interrelated that are necessary to perform a
communication function.

Network Protocols Communication rules that enable communication between devices. And
they are:
1. the format or structure of the message.
2. the method by which devices share route information with other networks.
3. the start and end of data transfer sessions.

Protocol suites and industry standards


A good study is carried out when developing protocols, at the time of execution it is
ensured that products from different manufacturers can work together and be efficient.

Interaction of protocols To see the interaction between protocols we can observe the
behavior between a Web server and a Web browser, here we can see how the information
exchange process between them is. Some of these protocols are:
Application Protocol: (HTTP) is a common protocol that defines the content and format of
requests and responses exchanged between the client and the server.
Transport Protocol: (TCP) is the transport protocol that manages individual conversations
between Web servers and Web clients. Internetwork Protocol (IP) is responsible for taking
the formatted TCP segments, encapsulating them into packets, assigning them the correct
addresses, and selecting the best path to the destination host. Network Access Protocols:
These protocols manage the data link and the physical transmission of data over the media.
Using layered models
Benefits of using a layered model
1. Assists in protocol design, because protocols that work at a particular layer possess
information.
2. It encourages competition, as products from different suppliers can work together.
3. Prevents changes in technology or capabilities in one layer from affecting other layers
above and below.
4. Provides a common language for describing network functions and capabilities.

Protocol and reference models

Protocol Models: Provides a model that closely matches the structure of a particular
protocol suite. Reference models provide a common reference to maintain consistency
across all types of protocols and services.
TCP/IP model is a layered protocol model for internetwork communications, defining four
categories of functions that must take place for communications to be successful.

Communication Process Protocols that are implemented at both the sending and receiving
hosts and interact to provide end-to-end delivery of applications over a network.

Protocol data unit and encapsulation


Protocol Data Unit (PDU) The form that a section of data takes at any layer.
Encapsulation: Information added at each level by the protocols.

Shipping and receiving process

Information passes through each layer, starting at the Application layer on the transmitting
host, continuing to the Physical layer, passing through the communications channel to the
destination host, where the information goes back up the hierarchy and ends at the
Application layer.
OSI model.
It represents in an abstract way the interconnection of open systems, in order to
subsequently design network protocols. It is based on different logical layers, each with
specific functionalities.
Network Addressing
The OSI model describes the processes of encoding, formatting, segmenting, and
encapsulating data for transmission over the network. Each segment of the message
contains enough identifying information to get to the correct destination (end device).
Networking Terminology.
Straight-through cable: Unshielded twisted pair (UTP) copper cable for connecting
different network devices.

Crossover Cable: UTP copper cable for connecting similar network devices.

Serial Cable: Copper cable typical for wide area connections.

Ethernet: dominant local area network technology.

MAC Address: Ethernet Layer 2, Physical Address.

IP address: logical address

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy