You are on page 1of 42

1.1.

1 Everything is Online

“Hey Shad, are you online?” “Of course, I am!” How many of us still think about whether or not we are
“online”? We expect our devices, cell phones, tablets, laptops and desktop computers to always be
connected to the global internet. We use this network to interact with our friends, shop, share pictures
and experiences, and learn. The internet has become such a part of everyday life that we almost take it
for granted.

Normally, when people use the term internet, they are not referring to the physical connections in the
real world. Rather, they tend to think of it as a formless collection of connections. It is the “place” people
go to find or share information.

Complete 1.1.2 Who Owns “The Internet”?1.1.2 Who Owns “The Internet”?

The internet is not owned by any individual or group. The internet is a worldwide collection of
interconnected networks (internetwork or internet for short), cooperating with each other to exchange
information using common standards. Through telephone wires, fiber-optic cables, wireless
transmissions, and satellite links, internet users can exchange information in a variety of forms, as shown
in the figure.

Everything that you access online is located somewhere on the global internet. Social media sites,
multiplayer games, messaging centers that provide email, online courses — all of these internet
destinations are connected to local networks that send and receive information through the internet.

Think about all of the interactions that you have during the day which require you to be online.

1.1.3 Local Networks

A tabbed content container. Content can be text, graphic or both.

Local networks come in all sizes. They can range from simple networks consisting of two computers, to
networks connecting hundreds of thousands of devices. Networks installed in small offices, or homes
and home offices, are referred to as small office/home office (SOHO) networks. SOHO networks let you
share resources such as printers, documents, pictures, and music, between a few local users.
In business, large networks can be used to advertise and sell products, order supplies, and communicate
with customers. Communication over a network is usually more efficient and less expensive than
traditional forms of communication, such as regular mail or long distance phone calls. Networks allow for
rapid communication such as email and instant messaging, and provide consolidation and access to
information stored on network servers.

Business and SOHO networks usually provide a shared connection to the internet. The internet is
considered a "network of networks" because it is literally made up of thousands of local networks that
are connected to each other.

Click each button for more information.

Small Home Networks

Small home networks connect a few computers to each other and to the internet.

Small Home Networks

Small Office and Home Office Networks

Medium to Large Networks

World Wide Networks

Incomplete 1.1.4 Video - Different Network Connections1.1.4 Video - Different Network Connections

Play Video
Incomplete 1.1.5 Mobile Devices1.1.5 Mobile Devices

A tabbed content container. Content can be text, graphic or both.

The internet connects more computing devices than just desktop and laptop computers. There are
devices all around that you may interact with on a daily basis that are also connected to the internet.
These include mobile devices, home devices, and a variety of other connected devices.

Click below to learn more about mobile devices.

Smartphone

Smartphones are able to connect to the Internet from almost anywhere. Smart phones combine the
functions of many different products together, such as a telephone, camera, GPS receiver, media player,
and touch screen computer.

Smartphone

Tablet

Smartwatch

Smart Glasses

Incomplete 1.1.6 Connected Home Devices1.1.6 Connected Home Devices

List of expandable sections. Select each button to expand the content.

Many of the things in your home can also be connected to the internet so that they can be monitored
and configured remotely.

Click below to learn more about connected household devices.

Security System

Appliances

Smart TV

Gaming Console

Incomplete 1.1.7 Other Connected Devices1.1.7 Other Connected Devices

List of expandable sections. Select each button to expand the content.

There are also many connected devices found in the world outside your home that provide convenience
and useful, or even vital, information.

Click below to learn more about these commonly found connected devices.

Smart Cars

RFID Tags

Sensors and Actuators

Medical Devices

Incomplete Article title1.1.8 Check Your Understanding - Network Types


Check your understanding of network types by choosing the correct answer to the following questions.

Incomplete Question 1Question 1

This is a multiple choice question. Once you have selected an option, select the submit button below

What type of network allows computers in a home office or a remote office to connect to a corporate
network?

small home network

small office home office network

medium to large network

world wide network

Submit

Show feedback

Incomplete Question 2Question 2

This is a multiple choice question. Once you have selected an option, select the submit button below

What can be placed in or on a package so that it can be tracked?

network interface card

sensor

actuator
RFID tag

Submit

Show feedback

1.2 Data Transmission

1.2.2 Types of Personal Data

We hear about data all of the time. Customer data, personal data, health data, census data, but what
exactly is data? Perhaps the simplest definition of data is that data is a value that represents something.
In the physical world, we represent data as numbers, formulas, alphabetic characters, and pictures. Think
about all of the data that exists just about you. Some examples include birth records, baby pictures,
school records, and health records.

Most people use networks to transmit their data in order to share with others, or for long-term storage.
Every time you hit “send” or “share” in an app or computer application, you are telling your device to
send your data to a destination somewhere on the network. Sometimes, data is being sent by your
devices and you may not even be aware that this is happening. Examples of this are when you set up an
automatic backup utility, or when your device automatically searches for the router in a Wi-Fi hotspot.

The following categories are used to classify types of personal data:

Volunteered data - This is created and explicitly shared by individuals, such as social network profiles.
This type of data might include video files, pictures, text or audio files.

Observed data - This is captured by recording the actions of individuals, such as location data when using
cell phones.

Inferred data - This is data such as a credit score, which is based on analysis of volunteered or observed
data.

Incomplete 1.2.3 The Bit1.2.3 The Bit

Did you know that computers and networks only work with binary digits, zeros and ones? It can be
difficult to imagine that all of our data is stored and transmitted as a series of bits. Each bit can only have
one of two possible values, 0 or 1. The term bit is an abbreviation of “binary digit” and represents the
smallest piece of data. Humans interpret words and pictures, computers interpret only patterns of bits.
A bit is stored and transmitted as one of two possible discrete states. This can include two directions of
magnetization, two distinct voltage or current levels, two distinct levels of light intensity, or any other
physical system of two discrete states. For example, a light switch can be either On or Off; in binary
representation, these states would correspond to 1 and 0 respectively.

Every input device (mouse, keyboard, voice-activated receiver) will translate human interaction into
binary code for the CPU to process and store. Every output device (printer, speakers, monitors, etc.) will
take binary data and translate it back into human recognizable form. Within the computer itself, all data
is processed and stored as binary.

Computers use binary codes to represent and interpret letters, numbers and special characters with bits.
A commonly used code is the American Standard Code for Information Interchange (ASCII). With ASCII,
each character is represented by eight bits. For example:

Capital letter: A = 01000001

Number: 9 = 00111001

Special character: # = 00100011

Each group of eight bits, such as the representations of letters and numbers, is known as a byte.

Codes can be used to represent almost any type of information digitally including computer data,
graphics, photos, voice, video, and music.

In the figure, enter up to five characters in the Characters field, then click the Show Me button to see the
ASCII bit translation. Click Reset to enter a different group of characters.

Show Me

Reset

Incomplete 1.2.4 Common Methods of Data Transmission1.2.4 Common Methods of Data Transmission
After the data is transformed into a series of bits, it must be converted into signals that can be sent
across the network media to its destination. Media refers to the physical medium on which the signals
are transmitted. Examples of media are copper wire, fiber-optic cable, and electromagnetic waves
through the air. A signal consists of electrical or optical patterns that are transmitted from one connected
device to another. These patterns represent the digital bits (i.e. the data) and travel across the media
from source to destination as either a series of pulses of electricity, pulses of light, or radio waves.
Signals may be converted many times before ultimately reaching the destination, as corresponding
media changes between source and destination.

There are three common methods of signal transmission used in networks:

Electrical signals - Transmission is achieved by representing data as electrical pulses on copper wire.

Optical signals - Transmission is achieved by converting the electrical signals into light pulses.

Wireless signals - Transmission is achieved by using infrared, microwave, or radio waves through the air.

Click Play in the figure to see an animation of the three types of signal transmissions.

In most homes and small businesses, network signals are transmitted across copper wires (cables) or Wi-
Fi enabled wireless connections. Larger networks employ fiber-optic cables in order to reliably carry
signals for longer distances.

1.2.5 Check Your Understanding - Data Transmission

Check your understanding of network types by choosing the correct answer to the following questions.

Incomplete Question 1Question 1

This is a multiple choice question. Once you have selected an option, select the submit button below

A basic unit of information that represents one of two discrete states is known as a:

bit

byte
octet

electrical signal

Submit

Show feedback

Incomplete Question 2Question 2

This is a multiple choice question. Once you have selected an option, select the submit button below

When using your credit card to make purchases at several places, the credit card company can use this
information to learn about your location and your preferences. This type of personal data is known as:

secret data

volunteered data

observed data

inferred data

Submit

Show feedback

Incomplete Question 3Question 3

This is a multiple choice question. Once you have selected an option, select the submit button below

Which of the following methods of signal transmission uses frequencies or pulses of light?
electrical signals

optical signals

wireless signals

Submit

Wireless Networks

Scroll to begin

Incomplete 2.1.1 Video - Types of Wireless Networks2.1.1 Video - Types of Wireless Networks

Play Video

Completed 2.1.2 Mobile Telephones2.1.2 Mobile Telephones

A common way that people get online is through their mobile phones. Did you know that most mobile
phones can be connected to many different types of networks simultaneously? Let’s review some of the
ways that mobile phones, smart phones in particular, interact with the various network technologies and
learn some new terminology in the process.

Mobile phones use radio waves to transmit voice signals to antennas mounted on towers located in
specific geographic areas. Mobile phones are often referred to as “cell phones” because the geographic
area in which an individual tower can provide a signal to a phone is called a cell. When a telephone call is
made, the voice signal is relayed from one tower to another tower until it is delivered to its destination.
This type of network is used when you make a phone call to another mobile phone or to a wired
telephone. It is also used to send text messages directly from the phone. The most common type of
cellular telephone network is called a GSM network, an abbreviation of the title “Global System for
Mobile Communications”.

Incomplete 2.1.3 Cell Phone Network2.1.3 Cell Phone Network

The design of the first cell phone radio transmitters did not allow for the efficient transmission of digital
data, so enhancements were made to improve the way that data is sent across cell phone networks. The
abbreviations 3G, 4G, 4G-LTE, and 5G are used to describe enhanced cell phone networks that are
optimized for the fast transmission of data. The “G” in these designations represents the word
“generation,” so 5G is the fifth generation of the cell network. Most mobile phones and smart phones
have an indicator that shows when a 4G or 5G signal is available.

Currently, 4G still dominates as the current mobile network used by most phones. 4G delivers speeds
that are 10 times the previous 3G networks. Introduced in 2019, 5G is the latest standard. It is more
efficient than previous standards. 5G holds the promise of delivering 100 times faster speeds than 4G
and connecting more devices to the network than ever before.

The figure shows that 4G will continue to be the dominant source of global mobile traffic in 2022.
However, 5G will use an increasingly larger portion.

2.1.5 Other Wireless Networks

In addition to the GSM and 4G/5G transmitters and receivers, smartphones make connections to
different types of networks.

Click below to learn more about other networks that are used by smartphones.

GPS

Wi-Fi

Bluetooth

Near Field Communications

Incomplete 2.1.6 Check Your Understanding - Wireless Networks2.1.6 Check Your Understanding -
Wireless Networks

Check your understanding of wireless networks by choosing the correct answer to the following
questions.

Incomplete Question 1Question 1


Multiple choice question

Which of the following is a low-power, shorter range wireless technology that is intended to replace
wired connectivity for accessories such as speakers or a mouse?

NFC

GPS

Wi-Fi

Bluetooth

Submit

Show feedback

Incomplete Question 2Question 2

Multiple choice question

Which of the following is a wireless communication technology that enables a smartphone to


communicate with a payment system within a few centimeters away?

NFC

GPS

Wi-Fi
Bluetooth

Local Network Connections

Scroll to begin

Incomplete 2.2.1 Video - Types of Network Components2.2.1 Video - Types of Network Components

Play Video

Incomplete 2.2.2 LAN Components2.2.2 LAN Components

In addition to smart phones and mobile devices, there are many other components that can be part of a
local area network. Some examples of network components are personal computers, servers,
networking devices, and cabling. These components can be grouped into four main categories:

Hosts

Peripherals

Network devices

Network media

Click each category below for examples and a brief description.

Hosts

Peripherals

Network Devices

Network Media

The network components that you are probably most familiar with are hosts and shared peripherals.
Remember that hosts are any devices that send and receive messages directly across the network.
Shared peripherals are not directly connected to the network, but instead are connected to hosts. The
host is then responsible for sharing the peripheral across the network. Hosts have software configured to
enable people on the network to use the attached peripheral devices.

The network devices, as well as the networking media, are used to interconnect hosts. Networking
devices are sometimes referred to as “intermediary devices” because they are usually located in the path
that messages take between a source host and a destination host.

The term network media describes the cables and wires used in wired networks, along with radio
frequency waves used in wireless networks. These wired and wireless networks provide the paths over
which messages travel between the various network components.

Some devices can play more than one role, depending on how they are connected. For example, a
printer that is directly connected to a host (local printer) is a peripheral. A printer that is directly
connected to a network device and participates directly in network communications is a host.

Ethernet is technology commonly used in local area networks. Developed at Xerox PARC, Ethernet was
commercially introduced in 1980 by Digital Equipment Corporation (DEC), Intel, and Xerox. Ethernet was
later standardized in 1983 as IEEE 802.3. Devices access the Ethernet LAN using an Ethernet Network
Interface Card (NIC). Each Ethernet NIC has a unique address permanently embedded on the card known
as a Media Access Control (MAC) address.

Incomplete 2.2.3 Video - Configure IP Addressing Information on Windows2.2.3 Video - Configure IP


Addressing Information on Windows

Play Video

Incomplete 2.2.4 End Device Addressing2.2.4 End Device Addressing

To physically connect to a network, an end-user device must have a network interface card (NIC). The NIC
is a piece of hardware that enables the device to connect to the network medium, either wired or
wireless. It may be integrated into the device motherboard or may be a separately installed card.

In addition to the physical connection, some configuration of the operating system is required for the
device to participate in the network. Most networks connect to the internet and use the internet to
exchange information. An end-user device requires an Internet Protocol (IP) address, as well as other
information, to identify it to the other devices in the network. As shown in the figure, there are three
parts to the IP configuration which must be correct for the device to send and receive information on the
network:

IP address - This identifies the host on the network.

Subnet mask - This is used to identify the network on which the host is connected.

Default gateway - This identifies the networking device that the host uses to access the internet or
another remote network.

Note: Most network applications use a domain name, such as www.cisco.com, instead of an IP address
when accessing information on the internet. A DNS server is used to translate the domain name to its IP
address. Without an IP address of a DNS server, the user will have difficulty accessing the internet.

Network Documentation

Scroll to begin

Incomplete 2.3.1 Device Names and Address Planning2.3.1 Device Names and Address Planning

As a network grows in size and complexity, it becomes increasingly important that it is well planned,
logically organized, and well documented, as shown in the figure.

Many organizations develop conventions for the naming and addressing of computers and other end-
user devices. These provide guidelines and rules that can be used by network support personnel when
performing these tasks.

Computer operating systems such as Microsoft Windows allow the naming of a device such as a
computer or a printer. Device names must be unique and should have a consistent format that conveys
meaningful information. This can help to determine device type, function, location, and sequence
number based on the device name. IP addresses must also be unique to each device.

The use of logical device naming and addressing conventions that are well documented can greatly
simplify the task of training and network management and can help as well with troubleshooting when
problems arise.
The figure is a simplified physical topology of the second floor of building C. The rooms are numbered
from 201 through 209 and each room contains two or four host computers. One of the host computers
in room 209 has a text block which reads My name is C209dash01. I am in building C, room 209. My I. P.
address is 192.168.3.1. They know where to find me if there is a problem.

2.3.2 Network Topologies and Representations

In a simple network consisting of a few computers, it is easy for you to visualize how all of the various
components connect. As networks grow, it becomes more difficult to keep track of the location of each
component, and how each is connected to the network. Wired networks require lots of cabling and
network devices to provide connectivity for all network hosts. A diagram provides an easy way to
understand how the devices in a large network are connected.

When networks are installed, a physical topology diagram is created to record where each host is located
and how it is connected to the network. The physical topology diagram also shows where the wiring is
installed and the locations of the networking devices that connect the hosts. Such a diagram uses
symbols or icons to represent the different devices and connections that make up a network. The figure
illustrates some of the icons used to represent network components on diagrams.

End Devices Desktop, ComputerLaptop,PrinterIP ,PhoneWireless, TabletTelePresence.


EndpointIntermediary Devices. Wireless RouterLAN, Switch,outerMultilayer, SwitchFirewall.
ApplianceNetwork .MediaWireless MediaLAN ,MediaWAN Media

2.3.4 Logical Network Information

Documenting the physical connections and devices in your network will provide you with the
information that you need to know when connecting new devices or finding problems with broken
connectivity. But there is other information that you must have when troubleshooting network
problems. This information cannot be “seen” from the physical view of the network. The device names,
IP addressing, configuration information, and network designations are logical pieces of information that
may change more frequently than the physical connectivity.

A diagram called a logical topology illustrates the relevant network configuration information.

Think about the devices in your home or school that access the internet. At home, do you have devices
that you can control or manage from your mobile phone or tablet? Draw a physical topology of the
network at your home or in your classroom. Compare your topology with those created by your
classmates.
Click below for an example of a physical and a logical network topology.

Physical Topology

Logical Topology

Incomplete 2.3.5 Check Your Understanding - Network Documentation2.3.5 Check Your Understanding -
Network Documentation

Incomplete Question 1Question 1

Multiple choice question

A physical topology diagram includes which of the following? (Choose three)

where hosts are located

IP addressing on each device

where networking devices are located

device names

where wiring is installed

Submit

Show feedback

Incomplete Question 2Question 2

Multiple choice question


When a network administrator changes the IPv4 and IPv6 address of a computer, which topology
diagram will need to be updated?

physical topology diagram

logical topology diagram

both physical and logical topology diagrams

Submit

Show feedback

Online Connections Summary

Scroll to begin

Incomplete 2.4.1 What Did I Learn in this Module?2.4.1 What Did I Learn in this Module?

Wireless Networks

Local Network Connections

Network Documentation

Incomplete 2.4.2 Module 2 - Online Connections Quiz2.4.2 Module 2 - Online Connections Quiz

Incomplete Question 1Question 1

Multiple choice question

Which category of network components includes wires and cables used in a wired network?
hosts

devices

media

peripherals

Incomplete Question 2Question 2

Multiple choice question

Which statement describes the physical topology for a LAN?

It describes whether the LAN is a broadcast or token-passing network.

It depicts the addressing scheme that is employed in the LAN.

It shows the order in which hosts access the network.

It defines how hosts and network devices connect to the LAN.

Incomplete Question 3Question 3

Multiple choice question

Which wireless technology is used on smart phones to transmit data to another device within very close
proximity?
Bluetooth

Wi-Fi

NFC

3G/4G

Incomplete Question 4Question 4

Multiple choice question

Which IP configuration parameter provides the IP address of a network device that a computer would
use to access the internet?

DNS server

default gateway

subnet mask

host IP address

Incomplete Question 5Question 5

Multiple choice question

A traveling sales representative uses a cell phone to interact with the home office and customers, track
samples, make sales calls, log mileage, and upload/download data while at a hotel. Which internet
connectivity method would be a preferred method to use on the mobile device due to the low cost?
cellular

Wi-Fi

DSL

cable

Incomplete Question 6Question 6

Multiple choice question

Logical or Physical?

Refer to the exhibit. Which type of topology drawing is shown?

physical

logical

Incomplete Question 7Question 7

Multiple choice question

When the growth of a small network is being planned, which design element will include the physical
and logical topology of the network?

traffic analysis
network documentation

device inventory

budget

Incomplete Question 8Question 8

Multiple choice question

What are two recommendations for an organization that is implementing network device naming
standards? (Choose two.)

Device names should be in a consistent format.

Each device name should include upper/lower case letters, numbers, and symbols.

A device name, especially for PCs, should include an IP address.

Each device should have a unique, meaningful name.

A device name should be more than 8 characters.

Incomplete Question 9Question 9

Multiple choice question

Which type of technology is used to provide digital data transmissions over cell phone networks?

Bluetooth
Wi-Fi

NFC

4G

Incomplete Question 10Question 10

Multiple choice question

Which wireless technology can be used to connect wireless headphones to a computer?

Bluetooth

Wi-Fi

NFC

4G-LTE

Incomplete Question 11Question 11

Multiple choice question

A teenager has asked the grandparents for a specific type of mobile technology. The grandparents do not
remember the specific name of the device, but remember that the teenager wants to receive a cell
phone call on it. Which technology is likely to be the one the teenager wants?

e-reader
smart watch

VR headset

GPS

Incomplete Question 12Question 12

Multiple choice question

What is a technology used in a cellular telephone network?

Bluetooth

fiber-optic

Wi-Fi

Global System for Mobile Communications (GSM)

Click 'Submit' if you are happy with your answers above.

Submit

There is incomplete content above. You must complete this before you can proceed through the course.

Packet Tracer Network Simulator

Scroll to begin

Incomplete 3.1.1 Video - Introduction to Cisco Packet Tracer3.1.1 Video - Introduction to Cisco Packet
Tracer
This is a media player component. Select the play / pause button to watch or listen.

Cisco Packet Tracer is an innovative network simulation and visualization tool. This free software helps
you to practice your network configuration and troubleshooting skills via your desktop computer. Packet
Tracer is available for both the Linux Windows and macOS desktop environments.

With Packet Tracer you can choose to build a network from scratch, use a pre-built sample network, or
complete lab activities. Packet Tracer allows you to easily explore how data traverses your network.
Packet Tracer provides an easy way to design and build networks of varying sizes without expensive lab
equipment. While this software is not a replacement for practicing on physical routers, switches,
firewalls, and servers, it provides too many benefits to ignore!

Click Play in the video to learn more about Cisco Packet Tracer.

Play Video

The Packet Tracer User Interface

Scroll to begin

Incomplete 3.3.1 Video - Getting Started in Cisco Packet Tracer3.3.1 Video - Getting Started in Cisco
Packet Tracer

This is a media player component. Select the play / pause button to watch or listen.

Packet Tracer is a tool that allows you to simulate real networks. It provides three main menus that you
can use for the following:

Add devices and connect them via cables or wireless

Select, delete, inspect, label, and group components within your network

Manage your network

The network management menu lets you do the following:

Open an existing/sample network


Save your current network

Modify your user profile or your preferences

Click Play in the video to learn how to use the menus and how to create your first Packet Tracer network.

Play Video

If you have used any program such as a word processor or spreadsheet, you are already familiar with the
File menu commands located in the top menu bar. The Open, Save, Save As, and Exit commands work as
they would for any program, but there are two commands that are special to Packet Tracer:

The Open Samples command will display a directory of prebuilt examples of features and configurations
of various network and Internet of Things devices included within Packet Tracer.

The Exit and Logout command will remove the registration information for this copy of Packet Tracer and
require the next user of this copy of Packet Tracer to do the login procedure again.

Complete 3.3.2 Locate and Deploy Devices3.3.2 Locate and Deploy Devices

Because Packet Tracer simulates networks and network traffic, the physical aspects of these networks
also need to be simulated. This includes actually finding and deploying physical devices, customizing
those devices, and cabling those devices. After the physical deployment and cabling is done, then it is
time for configuration of the interfaces used to connect the devices.

Finding a device to deploy requires looking in the Device-Type Selection Box. The Device-Type Selection
Box works on the concept of categories and sub-categories, as shown in the figure.

The top row of icons represents the category list consisting of: [Networking Devices], [End Devices],
[Components], [Connections], [Miscellaneous], and [Multiuser]. Each category contains at least one sub-
category group.

Incomplete 3.3.3 Packet Tracer - Deploy Devices3.3.3 Packet Tracer - Deploy Devices

In this activity, you will open a sample file, locate and deploy multiple devices, and then save the file.
Deploy Devices

Deploy Devices

Incomplete 3.3.

Packet Tracer Network Configuration

Scroll to begin

Incomplete 3.4.1 Video - Device Configuration in Packet Tracer3.4.1 Video - Device Configuration in
Packet Tracer

This is a media player component. Select the play / pause button to watch or listen.

After your network has been created, it is time to configure the devices and components. Packet Tracer
lets you configure the different intermediate and end devices that make up your network. To access the
configuration interface of any devices, first click the device that you wish to configure. A popup window
will appear displaying a series of tabs. Different types of devices have different interfaces.

Click Play in the video to learn how to configure devices and components in your simulated network.

Play Video

Incomplete 3.4.2 GUI and CLI Configuration in Packet Tracer3.4.2 GUI and CLI Configuration in Packet
Tracer

List of expandable sections. Select each button to expand the content.

Packet Tracer also provides a variety of tabs for device configuration including the following:

Physical

Config

CLI

Desktop
Services

The tabs that are shown depend on the device you are currently configuring.

Note: You may see other tabs on different devices. These additional tabs are beyond the scope of this
course.

Click below to for more information on tabs relevant to this course.

Physical Tab

Config Tab

CLI Tab

Desktop Tab

Services Tab

Incomplete 3.4.3 Packet Tracer - Configure End Devices3.4.3 Packet Tracer - Configure End Devices

In this activity, you will construct a simple Packet Tracer network and complete basic configuration of end
devices.

Explore Networks with Packet Tracer Summary

Scroll to begin

Incomplete 3.5.1 Packet Tracer - Create a Simple Network3.5.1 Packet Tracer - Create a Simple Network

In this activity, you will complete the following objectives:


Part 1: Build a simple network in the logical topology workspace.

Part 2: Configure the network devices.

Part 3: Test connectivity between network devices.

Part 4: Save the file and close Packet Tracer.

Create a Simple Network

Create a Simple Network

Incomplete 3.5.2 What Did I Learn in this Module?3.5.2 What Did I Learn in this Module?

Packet Tracer Network Simulator

Packet Tracer Installation

Packet Tracer User Interface

Packet Tracer Network Configuration

Incomplete 3.5.3 Module 3 - Explore Networks with Packet Tracer Quiz3.5.3 Module 3 - Explore
Networks with Packet Tracer Quiz

Incomplete Question 1Question 1

Multiple choice question

What is a feature of Packet Tracer?

It allows a functional replacement for real physical network equipment.

It allows building and modeling network configurations.


It can be used to trace a packet from source to destination using real corporate data.

It can be used to examine network data flows for a corporate network that connects to the internet.

Incomplete Question 2Question 2

Multiple choice question

Refer to the exhibit. Which network device is being configured within Packet Tracer?

home wireless router

laptop

PC

switch

Incomplete Question 3Question 3

Multiple choice question

Refer to the exhibit. A user is building a home wireless network within Packet Tracer. The user adds 2 PCs
and 2 laptops. Which device would be needed to create the network?

the device labeled A


the device labeled B

the device labeled C

the device labeled D

Incomplete Question 4Question 4

Multiple choice question

Refer to the exhibit. Which menu item would be used to bring up a web browser?

Physical

Config

Desktop

Programming

Attributes

Incomplete Question 5Question 5

Multiple choice question

Which type of cable connection would be used in Packet Tracer to connect a FastEthernet port on a PC to
a switch port?
console

crossover

fiber

straight-through

Incomplete Question 6Question 6

Multiple choice question

A student is creating a wired network in Packet Tracer. The student added six PCs. What other device is
needed so that the PCs can communicate with one another?

cloud

firewall

switch

IoT gateway

Incomplete Question 7Question 7

Multiple choice question


Refer to the exhibit. A user is creating a wired and wireless network using Packet Tracer. The user has
added a home wireless router, a PC, and a laptop. The user configures the home wireless router. Which
icon represents the tool that can be used on the laptop to view the SSID and connect to the wireless
router?

Command Prompt

IP Configuration

Web Browser

PC Wireless

Incomplete Question 8Question 8

Multiple choice question

Refer to the exhibit. A student is working on a Packet Tracer lab that includes a home wireless router to
be used for both wired and wireless devices. The router and laptop have been placed within the logical
workspace. The student adds a laptop device and wants to replace the wired network card with a
wireless network card. What is the first step the student should do to install the wireless card?

Power off the laptop by clicking on the power button.

Drag the wired network card into the list on the left side.

Select the Config tab and then the wireless network card checkbox.
Select the WPC300N option from the left and drag that card to the side of the laptop.

Incomplete Question 9Question 9

Multiple choice question

A technician selected the GUI interface on a wireless router and added a DNS address of 208.67.220.220.
The technician then immediately exited the GUI interface. What will occur as a result of this
configuration?

All connected host devices, configured with DHCP, will automatically be sent the IP address of the DNS
server.

Because the technician forgot to save the configuration, the DNS server address will not be sent to
connected devices.

The technician should have used the Config tab to enter the DNS address

The technician should check the Physical tab to ensure that the wireless router is powered on.

Incomplete Question 10Question 10

Multiple choice question

Refer to the exhibit. Which Packet Tracer menu option would be used to change the preferences such as
showing port labels in the logical workspace?
File

Edit

Options

Tools

Extensions

Network Media Types

Scroll to begin

Incomplete 4.1.1 Video - Network Media Types4.1.1 Video - Network Media Types

This is a media player component. Select the play / pause button to watch or listen.

Select the play button to watch video.

Play Video

Incomplete 4.1.2 Three Media Types4.1.2 Three Media Types

The four main criteria for choosing network media are these:

What is the maximum distance that the media can successfully carry a signal?

What is the environment in which the media will be installed?

What is the amount of data and at what speed must it be transmitted?

What is the cost of the media and installation?


Communication transmits across a network on media. The media provides the channel over which the
message travels from source to destination.

Modern networks primarily use three types of media to interconnect devices, as shown in the figure:

Metal wires within cables - Data is encoded into electrical impulses.

Glass or plastic fibers within cables (fiber-optic cable) - Data is encoded into pulses of light.

Wireless transmission - Data is encoded via modulation of specific frequencies of electromagnetic waves.

4.1.3 Common Network Cables

List of expandable sections. Select each button to expand the content.

The three most common network cables are twisted-pair, coaxial cable, and fiber-optic cable.

Click below for more information about each cable type.

Twisted-Pair Cable

Coaxial Cable

Fiber-Optic Cable

Incomplete 4.1.4 Check Your Understanding - Network Media Types4.1.4 Check Your Understanding -
Network Media Types

Check your understanding of network media types by choosing the correct answer to the following
questions.

Incomplete Question 1Question 1

This is a multiple choice question. Once you have selected an option, select the submit button below

Which of the following is NOT a criterion for choosing a network media?


The type of data that can be transmitted

The maximum distance that the media can successfully carry a signal

The cost of installing the media

The environment in which the media is installed

Submit

Show feedback

Incomplete Question 2Question 2

This is a multiple choice question. Once you have selected an option, select the submit button below

What is the most common type of wired media used by TV companies to connect and carry signals to a
set-top box within a home?

twisted-pair cable

coaxial cable

fiber-optic cable

Submit

Show feedback

Incomplete Question 3Question 3

This is a multiple choice question. Once you have selected an option, select the submit button below

Which type of wired media is used to carry digital information at very high speeds over long distances?
twisted-pair cable

coaxial cable

fiber-optic cable

Submit

Show feedback

Incomplete Question 4Question 4

This is a multiple choice question. Once you have selected an option, select the submit button below

Which is the most common type of wired media to connect end devices to an Ethernet LAN?

twisted-pair cable

coaxial cable

fiber-optic cable

Submit

Show feedback

Ethernet Cabling

Scroll to begin

Incomplete 4.2.1 Twisted-Pair Cables4.2.1 Twisted-Pair Cables

The networks in most homes and schools are wired with twisted-pair copper cable. This type of cable is
inexpensive compared to other types of cabling, and it is readily available. The Ethernet patch cables
that you can purchase through the internet or at a retail store are an example of copper twisted-pair
cable

Twisted-pair cables consist of one or more pairs of insulated copper wires that are twisted together and
housed in a protective jacket. Like all copper cables, twisted-pair uses pulses of electricity to transmit
data.

Data transmission over copper cable is sensitive to electromagnetic interference (EMI), which can reduce
the data throughput rate that a cable can provide. Common items in a home that can create EMI include
microwave ovens and fluorescent light fixtures.

Another source of interference, known as crosstalk, occurs when cables are bundled together for long
lengths. The electrical impulses from one cable can cross over to an adjacent cable. This occurs most
frequently when cables are improperly installed and terminated. When data transmission is corrupted
due to interference such as crosstalk, the data must be retransmitted. This can degrade the data carrying
capacity of the medium.

The figure illustrates how data transmission is affected by interference.

4.2.2 Types of Twisted-Pair Cables

A tabbed content container. Content can be text, graphic or both.

There are two commonly installed types of twisted-pair cable:

Unshielded twisted-pair (UTP) - This is the most commonly encountered type of network cable in North
America and many other areas.

Shielded cables (STP) - These are used almost exclusively in European countries.

Click each twisted-pair type for more information.

UTP Cable

UTP cable is inexpensive, offers a high bandwidth, and is easy to install. This type of cable is used to
connect workstations, hosts and network devices. It can come with many different numbers of pairs
inside the jacket, but the most common number of pairs is four. Each pair is identified by a specific color
code.
UTP Cable

STP Cable

Many different categories of UTP cables have been developed over time, as shown in the table. Each
category of cable was developed to support a specific technology and most are no longer encountered in
homes or offices. The cable types which are still commonly found include Categories 3, 5, 5e, and 6.

All categories of data grade UTP cable are traditionally terminated into an RJ-45 connector. There are still
some applications that require the smaller RJ-11 connector, such as analog phones and some fax
machines. In the figure below, an example of an RJ-11 connector is on the left. The RJ-45 connector is on
the right.

Incomplete RJ-11 and RJ-45 ConnectorsRJ-11 and RJ-45 Connectors

Incomplete 4.2.3 Check Your Understanding - Ethernet Cabling4.2.3 Check Your Understanding - Ethernet
Cabling

Check your understanding of Ethernet cabling by choosing the correct answer to the following questions.

Incomplete Question 1Question 1

This is a multiple choice question. Once you have selected an option, select the submit button below

A type of interference that occurs when cables are bundled together for long lengths is known as:

crosstalk

cross-interference
bundled-interference

crosscheck

Submit

Show feedback

Incomplete Question 2Question 2

This is a multiple choice question. Once you have selected an option, select the submit button below

What type of Ethernet twisted-pair cable may be required when the electrical environment has strong
EMI and RFI interference?

UTP

STP

fiber-optic

coaxial

Submit

Show feedback

Incomplete Question 3Question 3

This is a multiple choice question. Once you have selected an option, select the submit button below

Which of the following is the most common type of connector used to terminate twisted-pair cabling?
RJ-10

RJ-11

RJ-41

RJ-45

Submit

Show feedback

You might also like