sem 1 ch 2
DESCRIPTION
TRANSCRIPT
![Page 1: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/1.jpg)
1
CCNA 1 v3.0 Module 2 Networking Fundamentals
![Page 2: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/2.jpg)
2
Objectives
![Page 3: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/3.jpg)
3
Networking Devices
![Page 4: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/4.jpg)
4
Network TopologyPHYSICAL AND LOGICALMost common Logical Topologies are Broadcast & Token ring
![Page 5: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/5.jpg)
5
NETWORK PROTOCOLS
How physical network is built How computers connect to the network How data is formatted for transmission How data is sent How to deal with errors
![Page 6: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/6.jpg)
6
Network Protocols
![Page 7: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/7.jpg)
7
LOCAL AREA NETWORKSLAN components Computers NICs Peripheral devices Networking Media Networking devicesLAN Technologies Ethernet Token Ring FDDI
![Page 8: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/8.jpg)
8
Local-area Networks (LANs)
![Page 9: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/9.jpg)
9
![Page 10: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/10.jpg)
10
Wide-area Networks (WANs)
![Page 11: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/11.jpg)
11
Data Networks
![Page 12: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/12.jpg)
12
SANsMoves data between Server and Storage resources.Allows high speed connectivity for Server to storage Server to server Storage to storage
PERFORMANCE-AVAILIBILITY-SCALABILITY
![Page 13: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/13.jpg)
13
Storage-Area Networks (SANS)
Performance – SANs enable concurrent access of disk or tape arrays by two or more servers at high speeds.
Availability – SANs have disaster tolerance built in, because data can be mirrored using a SAN up to 10 kilometers (km) or 6.2 miles away.
Scalability – Like a LAN/WAN, it can use a variety of technologies.
![Page 14: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/14.jpg)
14
Virtual Private Networks (VPNs)A private network constructed within a public network infrastructure.Using VPN, a Telecommuter can remotely access the network of company H/Qs.Through Internet secure Tunnel is built Between PC of Telecommuter and Router at Company H/Qs.VPNs offers secure, reliable over shared public network while maintaining same security and management policies as a private network.
![Page 15: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/15.jpg)
15
Intranet and Extranet VPN
![Page 16: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/16.jpg)
16
Importance of Bandwidth
![Page 17: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/17.jpg)
17
Bandwidth Pipe Analogy
![Page 18: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/18.jpg)
18
Bandwidth Highway Analogy
![Page 19: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/19.jpg)
19
Bandwidth Measurements
![Page 20: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/20.jpg)
20
Bandwidth Limitations
![Page 21: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/21.jpg)
21
Bandwidth > Throughput
![Page 22: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/22.jpg)
22
Digital Transfer Calculation
![Page 23: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/23.jpg)
23
EXAMPLE
Which would take less time?
1-Sending a floppy disk (1.44 MB) full of data over an ISDN BRI Line
OR2-Sending a 10GB hard drive full of data over an OC-48 line
![Page 24: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/24.jpg)
24
EXAMPLE ( Cont…..)
T = S/BW
1- S= 1.44 MB, BW=128 Kb
Thus time = 1.44 x 1000 K Bytes x 8 Bits / 128 Kbps
= 90 Seconds
2- S= 10 GB, BW= 2.488320 Gbps
Thus time = 10 G Bytes x 8 Bits/ 2.488320 Gbps
= 32.15 Seconds
![Page 25: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/25.jpg)
25
Using Layers to Describe Data Communication
![Page 26: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/26.jpg)
26
OSI Model
![Page 27: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/27.jpg)
27
OSI Layers
![Page 28: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/28.jpg)
28
OSI Layers
•Provides reliable transfer of data across media
•Provides physical/flat address
![Page 29: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/29.jpg)
29
OSI Layers
![Page 30: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/30.jpg)
30
OSI Layers
![Page 31: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/31.jpg)
31
OSI Layers
![Page 32: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/32.jpg)
32
OSI Layers
![Page 33: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/33.jpg)
33
OSI Layers
![Page 34: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/34.jpg)
34
Peer-to-Peer Communication
![Page 35: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/35.jpg)
35
TCP/IP Model
![Page 36: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/36.jpg)
36
![Page 37: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/37.jpg)
37
Encapsulation
![Page 38: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/38.jpg)
38
Names for Data at Each Layer
![Page 39: Sem 1 Ch 2](https://reader033.vdocuments.net/reader033/viewer/2022050905/54be6b9f4a7959ca468b4593/html5/thumbnails/39.jpg)
39
Summary