Professional Documents
Culture Documents
CCNA Basics
1/19
1/10/2015
You must have seen in our college, there is one administration department. This department has 5 PCs
(say). All the PCs can share information among each other. This is data sharing. But you must have
also noticed that each PC does not have a separate printer. There is only one printer for all 5 PCs. Thus
they share a common device as well. As the department can share data as well as a device, this is called
resource sharing.
DATA SHARING allows groups of users to:
Exchange Information
Route data from user to user
Use E-mail to communicate
RESOURCE SHARING allows sharing peripheral devices such as:
Printers
Scanners
Fax
LOCAL AND REMOTE COMPUTERS
Local Computer: Computer on which a user is working
Remote Computer: Computer which a user controls or works on via a network connection
NETWORK TERMINOLOGIES: SOME IMPORTANT TERMS
NODE: anything device connected to a network is called a node. It may be a computer, printer or a
CD-ROM.
SEGMENT: the portion of the network separated by a switch or bridge or a router from other parts of
network is called a segment
BACKBONE: it is the main cabling of network that all segments connect to. It carries more
information that individual segments.
http://ccnabasics.com/category/a-basics-of-networking/
2/19
1/10/2015
TOPOLOGY: the computers can be connected in different ways. Various ways of connecting
computers together is called topology.
UNICAST: in unicast, communication is from a single host to another single host. There is one device
transmitting a message destined for one receiver. Example:
MULTICAST: it is a special protocol for use with IP. Multicast enables a single device to communicate
with a specific set of hosts. Example:
http://ccnabasics.com/category/a-basics-of-networking/
3/19
1/10/2015
Multicast resembles a conference call. Anyone from anywhere can join the conference, and everyone at
the conference hears what the speaker has to say. The speakers message isnt broadcasted everywhere,
but only to those in the conference call itself.
BROADCAST: Broadcast is when a single device is transmitting a message to all other devices in a
given address range. This broadcast could reach all hosts on the network. Example:
WORKSTATION: a workstation is generally an intelligent machine that can function without the help
of a network. Dumb Terminals and printers are not workstations as they always need to be connected
to a PC and cannot work without them.
PROTOCOL: It is a set of rules that governs the communication between computers in network.
SERVER: any machine (PC) sharing information with another machine is called a server.
CLIENT: any machine receiving information from the server and making use of it is called a client.
PACKET: a packet is the smallest chuck of data transmitted on a network.
Large files are segmented (broken into smaller pieces) and a trailer and header are attached.
Header: Contains information needed to get the packet from source to the destination.
Trailer: Contains techniques ensuring that errors do not occur during transmission.
http://ccnabasics.com/category/a-basics-of-networking/
4/19
1/10/2015
http://ccnabasics.com/category/a-basics-of-networking/
5/19
1/10/2015
6/19
1/10/2015
1. An ARP Request. Computer A asks the network, Who has this IP address?
2. An ARP Reply. Computer B tells Computer A, I have that IP. My MAC address is [whatever it
is].
3. A Reverse ARP Request (RARP). Same concept as ARP Request, but Computer A asks, Who
has this MAC address?
4. A RARP Reply. Computer B tells Computer A, I have that MAC. My IP address is [whatever it
is]
All network devices have an ARP table, a short-term memory of all the IP addresses and MAC
addresses the device has already matched together. The ARP table ensures that the device doesnt have
to repeat ARP Requests for devices it has already communicated with.
MEDIA ACCESS CONTROL ADDRESS (MAC ADDRESS): The MAC address is a unique value
associated with a network adapter (http://compnetworking.about.com/library/glossary/bldefadapter.htm). MAC addresses are also known as hardware addresses or physical addresses. They
uniquely identify an adapter on a LAN (http://compnetworking.about.com/library/glossary/bldeflan.htm).
MAC addresses are 12-digit hexadecimal numbers (48 bits in length). By convention, MAC addresses
are usually written in one of the following two formats:
MM:MM:MM:SS:SS:SS or MM-MM-MM-SS-SS-SS
The first half of a MAC address contains the ID number of the adapter manufacturer. These IDs are
regulated by an Internet standards body (ISBs). The second half of a MAC address represents the serial
number assigned to the adapter by the manufacturer.
http://ccnabasics.com/category/a-basics-of-networking/
7/19
1/10/2015
MAC address is burned into ROM on a network interface card (NIC). TCP/IP and other mainstream
networking architectures generally adopt the OSI model
(http://compnetworking.about.com/library/glossary/bldef-osi.htm). In this model, network
functionality is subdivided into layers: MAC addresses function at the data link layer (layer 2 in the
OSI model). They allow computers to uniquely identify themselves on a network at this relatively low
level.
8/19
1/10/2015
A NIC can be wired or wireless and it has digital circuitry and microprocessor. A wireless NIC is used
to connect the computers with each other wirelessly. There are different vendors of the NIC such as DLink, 3Com, Intel etc.
Before buying and installing a network interface card in your computer make sure that it is compatible
with the other network devices. NIC card operates on the Data Link and physical layer of the OSI
layers model.
For every computer in a network, it is required to have a NIC to communicate with other computers.
Every NIC has unique MAC address and no two NIC cards from two different vendors can have the
same MAC address. NIC has twisted pair, BNC and AUI sockets. The one end of the network cable is
used to connect with the NIC and the other end is used to connect with the hub or switch.
NIC provides the fulltime connectivity for the data transmission. Sometimes computers do not
communicate with each other due to the malfunctioning of the NIC. The network interface cards
problems can be resolved with the following tips.
Make sure that you have the updated and correct version of the LAN cards driver.
Ensure that the LEDs of the NIC are working properly.
Check that the network cable is properly connected at both ends.
Right click on the network status icon on the right bottom of the desktop and click repair.
Ensure that the TCP/IP settings are accurate.
Disable the antivirus and firewall.
If the problem still persists then try to replace the NIC with a new one.
Hub or a switch in a computer network acts as a relay that passes the information from one computer
to another. It is important that the LAN card is compatible with the hub or switch to make the data
flow faster to avoid the packet loss and network congestion.
PHYSICAL TOPOLOGY: It tells the physical arrangement of the nodes in a network. There are 5
http://ccnabasics.com/category/a-basics-of-networking/
9/19
1/10/2015
PHYSICAL TOPOLOGY: It tells the physical arrangement of the nodes in a network. There are 5
major physical topologies:
1.
2.
3.
4.
5.
Bus
Star
Ring
Mesh
Hybrid
LOGICAL TOPOLOGY: it tells how the message travels in the network. There are 3 major ways of
data travelling in a network:
1. Ethernet
2. Token ring
3. FDDI
PHYSICAL TOPOLGY:
BUS TOPOLOGY:
In the bus topology, the network nodes (computers, printers, and other devices connected together
to share information) are connected to a common backbone cable. Ends of backbone cable are
terminated with a resistor.
http://ccnabasics.com/category/a-basics-of-networking/
10/19
1/10/2015
Data is sent to all computers on the network. Each computer examines EVERY packet on the wire
to determine who the packet is for and accepts only messages addressed to them.
Example: in the figure shown above, if laptop computer sends message for laser printer, the packets
header will have the address of laser printer. The packet will circulate to all devices through the
backbone. All the devices will receive the packet but since the packets header has address of laser
printer, only laser printer will accept the packet and other devices will reject it.
Advantages of bus topology:
Works well for small networks (fewer than 10 devices).
Inexpensive to implement on a small scale.
Requires less cable.
Easy to add another workstation.
Disadvantages of bus topology:
Management costs often too high.
Subject to congestion from network traffic.
Adding more computers to the network degrades the performance.
Only one node can transfer data at a time.
STAR TOPOLOGY: The star topology is a network configured with a central hub and individual
cable segments connected to the hub, resembling the shape of a star as shown in figure below.
A hub is a central device used in the star topology that joins single cable segments or individual LANs
into one network. Hub takes signal that comes from any node and passes it along to all other nodes in
the network.
Logically, star topology is a bus topology because here also the message is carried to all devices but the
device whose address matches the headers address accepts the packet while others reject it.
http://ccnabasics.com/category/a-basics-of-networking/
11/19
1/10/2015
In the figure above, you have been shown a dual ring. A dual ring allows data to be sent in both
directions. Devices may be connected via single ring too. A single ring allows the data to be sent in one
direction only.
A frame travels round the ring, stopping at each node. If a node wants to transmit data, it adds data
and destination address to the frame. The frame continues travelling round the ring until it finds the
destination node which takes data out of the frame.
Advantages of ring topology:
Easier to manage than a bus.
Easier to locate node and cable problems.
Good over long distances.
Handles high-volume traffic well.
Very reliable.
http://ccnabasics.com/category/a-basics-of-networking/
12/19
1/10/2015
http://ccnabasics.com/category/a-basics-of-networking/
13/19
1/10/2015
LOGICAL TOPOLOGY:
Ethernet: Ethernet is the most popular network architecture. It can be configured in a star or bus
topology.
In a star topology, all devices are connected to a central device. This device is usually a hub or
switch.
In a bus topology, each computer is connected to a single cable or a backbone.
14/19
1/10/2015
data.
Multiple Access check that more than one device is attached to the network.
Collision detect The ability to detect and respond to collisions.
TOKEN RING: we studied in ring topology that a frame circulates along the devices to deliver the
packet. Similarly, here a token Ring network uses a token (that is, a special signal) to control access to
the cable.
The Token is a special packet of data that floats around the network. The token can travel in either
direction around the ring, but only in one direction at a time carrying data.
http://ccnabasics.com/category/a-basics-of-networking/
15/19
1/10/2015
Although FDDI normally uses fiber optic cable it can use UTP (unshielded twisted pair cable) as well.
Because of the cost, FDDI is usually used to connect LANs together and not devices. FDDI works very
much like Token Ring. However, FDDI allows multiple users to attach data to the Token.
FDDI is sometimes called Dual-Counter Rotating Rings. It uses the concept of dual ring we discussed in
ring topology. There are two pieces of fiber that carry data in opposite directions. One ring is called the
Primary the other the Secondary. Most data gets transmitted on the primary ring. The secondary ring
is usually reserved for system maintenance and if there is a failure of the primary ring. If one ring
breaks, any device can switch data from one ring to the other. This causes the data to travel in the
opposite direction.
Posted in a. BASICS OF NETWORKING
2 Comments
August 1, 2012
16/19
1/10/2015
Based upon the size or range of the network, it has been classified into 3 major categories:
1. LAN: Local Area Network
2. WAN: Wide Area Network
3. MAN: Metropolitan Area Network
LOCAL AREA NETWORK:
A group of computers that share a common connection and are usually in a small area or even in the
same building use LAN. For example an office or home network. They are usually connected by
Ethernet cables and have high speed connections.
If it was a wireless setup it would be called a WLAN, which would have a lower connection speed.
WIDE AREA NETWORK:
This is the largest network and can interconnect networks throughout the world and is not restricted to
a geographical location. The Internet is an example of a worldwide public WAN. Most WANs exist to
connect LANs that are not in the same geographical area. This technology is high speed and very
expensive to setup.
METROPILITAN AREA NETWORK:
This is a larger network that connects computer users in a particular geographic area or region. For
example a large university may have a network so large that it may be classified as a MAN. The MAN
network usually exists to provide connectivity to 2 or more LANs. It is far larger than a LAN and
smaller than a WAN.
HOW TO SELECT WHICH NETWORK TO USE?
To build a network, following factors need to be discussed to decide the software and
hardware requirements.
Network model
Network topology
Network protocol
NETWORK MODEL: there are 2 types of network models
Peer to peer model
Client-server
PEER TO PEER NETWORK MODEL: it is also called P2P network model. P2P networking allows
computers to communicate directly with one another rather than through a central server. Any
computer can start information sharing process.
Every computer on a peer-to-peer network can function as both a server and a client
http://ccnabasics.com/category/a-basics-of-networking/
17/19
1/10/2015
http://ccnabasics.com/category/a-basics-of-networking/
18/19
1/10/2015
In the figure above, all 5 PCs are clients and they can communicate with each other only through the
server.
Posted in a. BASICS OF NETWORKING
1 Comment
http://ccnabasics.com/category/a-basics-of-networking/
19/19