You are on page 1of 0

1

Module 2 Networking Fundamentals


CCNA 1 version 3.1
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 2
Overview
Students completing this module should be able to:
Explain the importance of bandwidth in networking.
Use an analogy from their experience to explain bandwidth.
Identify bps, kbps, Mbps, and Gbps as units of bandwidth.
Explain the difference between bandwidth and throughput.
Calculate data transfer rates.
Explain why layered models are used to describe data communication.
Explain the development of the Open System Interconnection model (OSI).
List the advantages of a layered approach.
Identify each of the seven layers of the OSI model.
Identify the four layers of the TCP/IP model.
Describe the similarities and differences between the two models.
Briefly outline the history of networking.
Identify devices used in networking.
Understand the role of protocols in networking.
Define LAN, WAN, MAN, and SAN.
Explain VPNs and their advantages.
Describe the differences between intranets and extranets
2
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 3
Data networks
Evolution of networking
Duplication of Equipment Resources
Low communication efficiency
Difficult to setup and manage network
One early solution was the creation of local-area network (LAN)
standards. Because LAN standards provided an open set of
guidelines for creating network hardware and software, the equipment
from different companies could then become compatible.
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 4
Data networks
As the use of computers in businesses grew, it soon became obvious
that even LANs were not sufficient.
What was needed was a way for information to move efficiently and
quickly, not only within a company, but also from one business to
another.
The solution was the creation of metropolitan-area networks (MANs)
and wide-area networks (WANs).
3
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 5
Network History
1970s: Small computer came into existence
1983: TCP/IP become the universal language
1984: Cisco founded; up to 1000 Internet host
1996: Number of Internet host exceeds 10 mill
1998: Network Academy launched.
1999: Video, Voice and Data convergence
2001: Number of Internet host exceeds 110 mill
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 6
Networking devices
4
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 7
Networking devices
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 8
Network topology
Network topology defines the structure of the network.
Physical topology, which is the actual layout of the wire or media.
Logical topology, which defines how the media is accessed by the
hosts for sending data.
The logical topology of a network is how the hosts communicate across
the medium.
The two most common types of logical topologies are broadcast and
token passing.
5
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 9
Bus Topology
A bus topology uses a single backbone segment (length of
cable) that all the hosts connect to directly.
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 10
Ring Topology
A ring topology connects one host to the next and the last
host to the first. This creates a physical ring of cable.
6
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 11
Token Ring
Token Ring NIC and Hub (or MAU)
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 12
Star Topology
A star topology connects all cables to a central point of
concentration. This point is usually a hub or switch, which
will be described later in the chapter.
7
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 13
Extended Star Topology
An extended star topology uses the star topology to be created. It links
individual stars together by linking the hubs/switches. This, as you will
learn later in the chapter, will extend the length and size of the
network.
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 14
Mesh Topology
A mesh topology is used when there can be absolutely no break in
communications, for example the control systems of a nuclear power
plant. So as you can see in the graphic, each host has its own
connections to all other hosts. This also reflects the design of the
Internet, which has multiple paths to any one location.
There are also full mesh and partial mesh topologies, both physical and
logical, which will be discussed later in CCNA semester 4.
8
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 15
Network protocols
Protocol suites are collections of protocols that enable network
communication from one host through the network to another host.
A protocol is a formal description of a set of rules and conventions that
govern a particular aspect of how devices on a network communicate.
Protocols determine the format, timing, sequencing, and error control in
data communication.
Without protocols, the computer cannot make or rebuild the stream of
incoming bits from another computer into the original format.
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 16
Network protocols
Protocols control all aspects of data communication, which include the
following:
How the physical network is built
How computers connect to the network
How the data is formatted for transmission
How that data is sent
How to deal with errors
Examples
Institute of Electrical and Electronic Engineers (IEEE),
American National Standards Institute (ANSI),
Telecommunications Industry Association (TIA),
Electronic Industries Alliance (EIA)
International Telecommunications Union (ITU), formerly known as the
Comit Consultatif International Tlphonique et Tlgraphique
(CCITT).
9
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 17
Local-area networks (LANs)
Some common LAN technologies are:
Ethernet
Token Ring
FDDI
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 18
Wide-area networks (WANs)
Some common WAN technologies are:
Modems
Integrated Services Digital Network (ISDN)
Digital Subscriber Line (DSL)
Frame Relay
US (T) and Europe (E) Carrier Series T1, E1, T3, E3
Synchronous Optical Network (SONET)
10
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 19
Metropolitan-area networks (MANs)
A MAN is a network that spans a metropolitan area such as a city or
suburban area.
A MAN usually consists of two or more LANs in a common geographic
area.
For example, a bank with multiple branches may utilize a MAN.
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 20
Storage-area networks (SANs)
A SAN is a dedicated, high-performance network used to move data between
servers and storage resources.
SANs offer the following features:
Performance SANs enable concurrent access of disk or tape arrays by
two or more servers at high speeds, providing enhanced system
performance.
Availability SANs have disaster tolerance built in, because data can be
mirrored using a SAN up to 10 kilometers (km) or 6.2 miles away.
Scalability Like a LAN/WAN, it can use a variety of technologies. This
allows easy relocation of backup data, operations, file migration, and data
replication between systems.
11
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 21
Virtual private network (VPN)
VPN is a private network that is constructed within a public network
infrastructure such as the global Internet.
Using VPN, a telecommuter can access the network of the company
headquarters through the Internet by building a secure tunnel between
the telecommuters PC and a VPN router in the headquarters.
A VPN is a service that offers secure, reliable connectivity over a
shared public network infrastructure such as the Internet.
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 22
Benefits of VPNs
The following are the three main types of VPNs:
Access VPNs Access VPNs provide remote access to a mobile worker and small
office/home office (SOHO) to the headquarters of the Intranet or Extranet over a shared
infrastructure.
Intranet VPNs Intranet VPNs link regional and remote offices to the headquarters of
the internal network over a shared infrastructure using dedicated connections. Allow
access only to the employees of the enterprise.
Extranet VPNs Extranet VPNs link business partners to the headquarters of the
network over a shared infrastructure using dedicated connections. Allow access to users
outside the enterprise.
12
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 23
Intranets and extranets
Intranets are designed to permit access by users who have access privileges to the
internal LAN of the organization.
Within an Intranet, Web servers are installed in the network.
Browser technology is used as the common front end to access information such as
financial data or graphical, text-based data stored on those servers.
Extranets refer to applications and services that are Intranet based, and use extended,
secure access to external users or enterprises.
This access is usually accomplished through passwords, user IDs, and other application-
level security.
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 24
Importance of bandwidth
Bandwidth is defined as the amount of information that can flow through a
network connection in a given period of time.
13
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 25
Analogies
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 26
Measurement
In digital systems, the basic unit of bandwidth is bits per
second (bps).
Bandwidth is the measure of how much information, or bits,
can flow from one place to another in a given amount of
time, or seconds.
14
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 27
Limitations
Bandwidth varies depending upon the type of media as well as the LAN and
WAN technologies used.
The physics of the media account for some of the difference.
Signals travel through twisted-pair copper wire, coaxial cable, optical fiber, and
air.
The actual bandwidth of a network is determined by a combination of the
physical media and the technologies chosen for signaling and detecting
network signals.
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 28
Throughput
Throughput refers to actual measured bandwidth, at a specific time of day,
using specific Internet routes, and while a specific set of data is transmitted on
the network.
Throughput is often far less than the maximum possible digital bandwidth of
the medium that is being used. Internetworking devices
The following are some of the factors that determine throughput:
Type of data being transferred
Network topology
Number of users on the network
User computer
Server computer
Power conditions
15
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 29
Data transfer calculation
Using the formula transfer time = size of file / bandwidth (T=S/BW)
allows a network administrator to estimate several of the important
components of network performance.
If the typical file size for a given application is known, dividing the file
size by the network bandwidth yields an estimate of the fastest time
that the file can be transferred.
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 30
Digital versus analog
Analog bandwidth is measured by how much of the electromagnetic spectrum
is occupied by each signal.
The basic unit of analog bandwidth is hertz (Hz), or cycles per second.
While analog signals are capable of carrying a variety of information, they have
some significant disadvantages in comparison to digital transmissions.
The analog video signal that requires a wide frequency range for transmission
cannot be squeezed into a smaller band.
Therefore, if the necessary analog bandwidth is not available, the signal cannot
be sent.
In digital signaling all information is sent as bits, regardless of the kind of
information it is.
16
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 31
Digital and Analog Bandwidth
Bandwidth = The width or carrying capacity of a communications circuit.
Digital bandwidth = the number of bits per second (bps) the circuit can
carry
used in digital communications such as T-1 or DDS
measure in bps
T-1 -> 1.544 Mbps
Analog bandwidth = the range of frequencies the circuit can carry
used in analog communications such as voice (telephones)
measured in Hertz (Hz), cycles per second
voice-grade telephone lines have a 3,100 Hz bandwidth
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 32
The concept of layers is used to describe communication from one computer to
another.
The OSI and TCP/IP models have layers that explain how data is
communicated from one computer to another.
The models differ in the number and function of the layers.
However, each model can be used to help describe and provide details about
the flow of information from a source to a destination.
Networking Models
17
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 33
Using layers to describe data communication
In order for data packets to travel from a source to a
destination on a network, it is important that all the devices
on the network speak the same language or protocol.
A protocol is a set of rules that make communication on a
network more efficient.
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 34
OSI model
To address the problem of network incompatibility, the International
Organization for Standardization (ISO) researched networking models like
Digital Equipment Corporation net (DECnet), Systems Network Architecture
(SNA), and TCP/IP in order to find a generally applicable set of rules for all
networks.
Using this research, the ISO created a network model that helps vendors
create networks that are compatible with other networks.
The Open System Interconnection (OSI) reference model released in 1984
was the descriptive network model that the ISO created.
It provided vendors with a set of standards that ensured greater compatibility
and interoperability among various network technologies produced by
companies around the world.
18
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 35
OSI layers
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 36
OSI layers
It breaks network communication into smaller, more manageable parts.
It standardizes network components to allow multiple vendor development and
support.
It allows different types of network hardware and software to communicate with
each other.
It prevents changes in one layer from affecting other layers.
It divides network communication into smaller parts to make learning it easier to
understand.
19
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 37
Peer-to-peer communications
In order for data to travel from the source to the destination, each layer
of the OSI model at the source must communicate with its peer layer at
the destination.
This form of communication is referred to as peer-to-peer.
During this process, the protocols of each layer exchange information,
called protocol data units (PDUs).
Each layer of communication on the source computer communicates
with a layer-specific PDU, and with its peer layer on the destination
computer as illustrated in Figure
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 38
TCP/IP model
Unlike the proprietary networking technologies mentioned earlier,
TCP/IP was developed as an open standard.
This meant that anyone was free to use TCP/IP. This helped speed up
the development of TCP/IP as a standard.
Although some of the layers in the TCP/IP model have the same name
as layers in the OSI model, the layers of the two models do not
correspond exactly.
20
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 39
TCP/IP model
Some of the common protocols specified by the TCP/IP reference model layers. Some of the
most commonly used application layer protocols include the following:
File Transfer Protocol (FTP)
Hypertext Transfer Protocol (HTTP)
Simple Mail Transfer Protocol (SMTP)
Domain Name System (DNS)
Trivial File Transfer Protocol (TFTP)
The common transport layer
protocols include:
Transport Control Protocol (TCP)
User Datagram Protocol (UDP)
The primary protocol of the
Internet layer is:
Internet Protocol (IP)
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 40
TCP/IP model
Networking professionals differ in their opinions on which model to use. Due to the
nature of the industry it is necessary to become familiar with both. Both the OSI
and TCP/IP models will be referred to throughout the curriculum. The focus will
be on the following:
TCP as an OSI Layer 4 protocol
IP as an OSI Layer 3 protocol
Ethernet as a Layer 2 and Layer 1 technology
Remember that there is a difference between a model and an actual protocol that
is used in networking. The OSI model will be used to describe TCP/IP
protocols.
21
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 41
Detailed encapsulation process
All communications on a network originate at a source, and are sent to
a destination.
The information sent on a network is referred to as data or data
packets. If one computer (host A) wants to send data to another
computer (host B), the data must first be packaged through a process
called encapsulation.
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 42
Detailed encapsulation process
Networks must perform the following five conversion steps in order to
encapsulate data:
1. Build the data.
2. Package the data for end-to-end transport.
3. Add the network IP address to the header.
4. Add the data link layer header and trailer.
5. Convert to bits for transmission.
22
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 43
Application
Header + data
Data Encapsulation Example
010010100100100100111010010001101000
Application Layer
Layer 4: Transport Layer
Layer 3: Network Layer
Layer 2:
Network
Layer
Layer 1: Physical
Layer
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 44
Summary
23
Hc vin mng Cisco Bch Khoa - Website: www.ciscobachkhoa.com 45
Web References
http://www.webwisdom.com/edu_content/cps640fall00/lectures/module3/WAN/sld004.h
tm
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci214083,00.html
http://www.gcn.com/21_16/guide/19055-1.html
http://www.pcunix.com/Basics/vpn.html
http://www.clavister.com/manuals/ver8x/manual/vpn/vpn_overview.htm
http://www.intrack.com/intranet/faqbasic.cfm
http://www.jegsworks.com/Lessons/lessonintro.htm
http://academic.udayton.edu/streaming/2_StreamingAtUD/analogy.htm
http://english.peopledaily.com.cn/200105/18/eng20010518_70356.html
http://www.commweb.com/article/COM20020517S0004
http://www.teamits.com/internet/support/?/internet/support/datatransferfaq.html
http://www.olemiss.edu/courses/EE/ELE_335/Spring2000/Htmlnotes/DigitalvsAnalog/
http://nes.aueb.gr/presentations/p2p.pdf
http://www.pku.edu.cn/academic/research/computer-center/tc/html/TC0102.html
http://www.firewall.cx/osi-encap-decap.php

You might also like