Summary Cisco Chapter 1 and 2
Summary Cisco Chapter 1 and 2
TEACHING
ALVARO HERNAN ALARCON
FACULTY OF ENGINEERING
SYSTEMS ENGINEERING
SUBJECT – TELEMATICS I
NEIVA – HUILA
2020
CHAPTER 1: Network Exploration
This chapter introduces the data network platform on which our social and business
relationships increasingly depend. The material presents the foundation for exploring the
services, technologies, and issues that network professionals face as they design, develop,
and maintain the modern network.
Networks in everyday life: In today's world, we are connected like never before
thanks to the use of networks. News and discoveries spread around the world in a
matter of seconds. People can even connect and play with friends across the ocean
and on other continents.
Technology Then and Now: Imagine a world without the Internet, without Google,
YouTube, instant messaging, Facebook, Wikipedia, online games, Netflix, iTunes
or easy access to current information. Over the years, data networks have slowly
expanded and transformed to improve the quality of life for people around the
world.
Without limits: Thanks to these advances, we can create a world in which national
borders, geographical distances and physical limitations become less important and
become increasingly easier obstacles to overcome.
Networks that support the way we learn: Networks changed the way we learn.
Access to high-quality education is no longer restricted to students who live in the
immediate vicinity of where the education is provided.
Networks support the way we communicate: Internet globalization leads to new
forms of communication which are as follows: text, social media, collaboration
tools, blogs, wikis, podcasting and P2P.
Networks that support the way we work: These enterprise networks evolved to
enable the transmission of many types of information services, including email,
video, messaging and telephony.
Networks that support the way we play: The Internet is also used for traditional
forms of entertainment. Networks enable the creation of new forms of
entertainment, such as online gaming.
Networks of many sizes: Networks come in all sizes. They can range from simple
networks consisting of two PCs to networks connecting millions of devices.
Clients and servers: Servers are PCs with software that allows them to provide
information, such as email or web pages, to other terminals on the network. Clients
are PCs that have software installed that allows them to request information from
the server and display the information obtained. A web browser, such as Chrome or
Firefox, is an example of client software.
Peer-to-peer: In small businesses and homes, many PCs function as servers and
clients on the network. This type of network is called a peer-to-peer network.
1.2 LAN, WAN AND INTERNET
- Devices
- Media
- Services
Terminals: A terminal is the origin or destination of a message transmitted through
the network.
Intermediate network devices: These connect individual terminals to the network
and may connect multiple individual networks to form an internetwork.
Network architecture: Refers to the technologies that support the infrastructure and
services and the programmed rules, or protocols, that move data across the network.
As networks evolve, we find that there are four basic characteristics that underlying
architectures need to meet user expectations:
- Fault tolerance: is that which limits the impact of failures, so that the number of
affected devices is as small as possible. In addition, it is built in a way that allows
for quick recovery when a failure occurs.
- Scalability: You can quickly expand to support new users and applications without
impacting the performance of the service delivered to current users.
- Quality of service: This is an increasingly important requirement for networks
today. New applications available to users on internetworks, such as live voice and
video streaming, generate higher expectations about the quality of services
provided.
- Security: refers to protecting the information contained in the packets transmitted
over the network and the information stored on devices connected to the network.
To achieve network security goals, there are three main requirements: reliability,
integrity, and availability.
1.4 THE CHANGING NETWORK ENVIRONMENT
- BYOD (Bring Your Own Device): The BYOD trend gives end users the freedom to
use personal tools to access information and communicate across a business or
campus network.
- Online Collaboration: Collaboration is defined as “the act of working with other
people on a joint project.”
- Video Communications: Video is currently used for communication, collaboration
and entertainment purposes. Video calls can be made from anywhere with an
Internet connection.
- Cloud computing: This system allows us to store personal files and even create
backup copies of our entire hard drive on servers over the Internet. Through the
cloud, you can access word processing, photo editing, and other applications.
Technology Trends in the Home: Networking trends are not only affecting the
way we communicate at work and school, they are also changing virtually every
aspect of the home.
Powerline networking: Refers to the ability to connect a device to the network
wherever there is a power outlet. This saves the cost of installing data cables and
does not incur any additional costs on the electricity bill.
Wireless Broadband:
Security Threats: The network security implemented must take into account the
environment as well as the network tools and requirements. It must be able to
protect data while maintaining the quality of service expected from the network.
Security Solutions: The implementation of home network security is very basic. It
is usually implemented in the connection terminals as well as at the Internet
connection point and may even depend on services contracted from the ISP.
Cisco Network Architecture: Refers to the devices, connections, and products that
integrate to support the necessary technologies and applications. A well-planned
network technology architecture helps ensure the connection of any device in any
combination of networks. In addition to ensuring connectivity
CCENT and CCNA Certification: Demonstrates that you have knowledge of
fundamental technologies and ensures that you are relevant with skill sets required
for the adoption of next-generation technologies.
To earn the CCNA Routing and Switching certification, you must pass two exams or a
composite exam. Candidates who pass the first exam are eligible to be called Cisco
Certified Entry Network Technician (CCENT).
Network architecture refers to the devices, connections, and products that are integrated to
support the necessary technologies and applications. A well-planned network technology
architecture helps ensure the connection of any device in any combination of networks. In
addition to ensuring connectivity, it also increases profitability by integrating security and
management of
CISCO CCNA CHAPTER 2
Communication through the Network
Introduction The evolution of networks has been closely linked to the advance in
technologies and devices for this task, they have become more efficient and secure to give
more availability to the users who are using them, providing new services and generating
changes to improve day by day.
Goals
Learn what a network is structured like and the advantages of using a layered model.
Know the function of protocols and layers in network models.
Communication of messages
If the transmission of a message were continuous without having messages, taking into
account that if an error occurred in the transmission the information would be lost and
would have to be sent again, for this reason data segmentation is used so that several
transmissions can be made at the same time and using the same network. We must know
that the segmentation process is very complex because it means that each message packet
has a header specifying the origin and destination of the message, and identifying in which
position the packet is located so that it can be assembled upon arrival at the destination.
Network components
Hardware: the physical part, the devices and the media (wired or wireless). Software:
These are the programs that run and are used on network devices to manage processes in
network services.
End devices and their role in the network
They are those that allow the interface between people and the network, they are where
messages originate and are destined. They have software installed that allows them to
communicate through a network.
Network media
These are the paths through which messages will be transported from origin to destination.
These are: These media are:
1. metallic threads,
2. Optical fiber
3. wireless transmission.
LAN (Local Area Network), WAN (Wide Area Network) and Internetworks
Local Area Networks
They are used by companies that want to manage an internal network, provide services to
an organizational community, and their administration and security are handled internally.
These provide interconnection between LANs and use devices designed specifically for
these connections. They allow forms of communication such as email exchange, corporate
training and access to resources. Despite the benefits of LANs and WANs, one
disadvantage is that they do not allow communication outside the local organization.
It is a global mesh of networks that are interconnected and provide access to millions of
users around the world.
Network Representations This is made easier if done visually and this is why network
devices and media have graphical symbology.
Protocols
Rules governing communications predetermined rules called protocols that are specific to
the characteristics of the conversation, interrelated that are necessary to perform a
communication function.
Network Protocols Communication rules that enable communication between devices. And
they are:
1. the format or structure of the message.
2. the method by which devices share route information with other networks.
3. the start and end of data transfer sessions.
Interaction of protocols To see the interaction between protocols we can observe the
behavior between a Web server and a Web browser, here we can see how the information
exchange process between them is. Some of these protocols are:
Application Protocol: (HTTP) is a common protocol that defines the content and format of
requests and responses exchanged between the client and the server.
Transport Protocol: (TCP) is the transport protocol that manages individual conversations
between Web servers and Web clients. Internetwork Protocol (IP) is responsible for taking
the formatted TCP segments, encapsulating them into packets, assigning them the correct
addresses, and selecting the best path to the destination host. Network Access Protocols:
These protocols manage the data link and the physical transmission of data over the media.
Using layered models
Benefits of using a layered model
1. Assists in protocol design, because protocols that work at a particular layer possess
information.
2. It encourages competition, as products from different suppliers can work together.
3. Prevents changes in technology or capabilities in one layer from affecting other layers
above and below.
4. Provides a common language for describing network functions and capabilities.
Protocol Models: Provides a model that closely matches the structure of a particular
protocol suite. Reference models provide a common reference to maintain consistency
across all types of protocols and services.
TCP/IP model is a layered protocol model for internetwork communications, defining four
categories of functions that must take place for communications to be successful.
Communication Process Protocols that are implemented at both the sending and receiving
hosts and interact to provide end-to-end delivery of applications over a network.
Information passes through each layer, starting at the Application layer on the transmitting
host, continuing to the Physical layer, passing through the communications channel to the
destination host, where the information goes back up the hierarchy and ends at the
Application layer.
OSI model.
It represents in an abstract way the interconnection of open systems, in order to
subsequently design network protocols. It is based on different logical layers, each with
specific functionalities.
Network Addressing
The OSI model describes the processes of encoding, formatting, segmenting, and
encapsulating data for transmission over the network. Each segment of the message
contains enough identifying information to get to the correct destination (end device).
Networking Terminology.
Straight-through cable: Unshielded twisted pair (UTP) copper cable for connecting
different network devices.
Crossover Cable: UTP copper cable for connecting similar network devices.