Вы находитесь на странице: 1из 31

IT Essentials PC Hardware and Software 4.

1
Instructional Resource Chapter 8: Fundamental Networks

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 8: Objectives
Explain the principles of networking. Describe types of networks.

Describe basic networking concepts and technologies.


Describe the physical components of a network. Describe LAN topologies and architectures. Identify standards organizations.

Identify Ethernet standards.


Explain OSI and TCP/IP data models. Describe how to configure a NIC and a modem. Identify names, purposes, and characteristics of other technologies that are used to establish connectivity. Identify and apply common preventive maintenance techniques that are used for networks. Troubleshoot a network.
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Chapter 8: Critical Concepts


What is this chapter about and why is it important? The chapter introduces networking and the basic concepts that are associated with networking. Networks are everywhere; with voice, video, and data converging on the same network, it is important for students to be able to install devices on a network. Even students who are not planning on entering the networking field must be able to add devices to the network, understand basic networking concepts as they relate to such installations, and be able to configure basic network settings. Included in this introduction are the different types of networks, IP addressing including using DHCP and ICMP to check for connectivity, network components and cabling, Ethernet standards, Internet connectivity, and basic network troubleshooting.

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 8: Activities
What activities are associated with this chapter? 8.3.2 Worksheet: Identify IP Address Classes

8.4.2 Packet Tracer Activity: Cabling a Simple Network


8.9.1 Worksheet: Internet Search for NIC Drivers 8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows XP 8.9.2 Optional Lab: Configure an Ethernet NIC to use DHCP in Windows Vista 8.9.2 Packet Tracer Activity: Adding Computers to an Existing Network

8.10.3 Worksheet: Answer Broadband Questions


8.12.2 Worksheet: Diagnose a Network Problem Chapter 8 Quiz

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 8: New Terms


What terms are introduced in this chapter?
1000BASE-T 100BASE-FX 100BASE-TX 100BASE-X 10BASE2 10BASE5 10BASE-FL 10BASE-T access point Address Resolution Protocol (ARP) 8.7.1 8.7.1 8.7.1 8.7.1 8.4.2 8.4.2 8.7.1 8.7.1 8.4.1 8.8.1

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 8: New Terms (continued)


What terms are introduced in this chapter?
American National Standards Institute (ANSI) analog transmission AppleTalk Application Layer Asymmetric DSL (ADSL) attention (AT) command set Automatic Private IP Addressing (APIPA) bandwidth Basic Rate Interface (BRI) bit 8.6 8.10.1 8.3.4 8.8.2 8.10.1 8.9.3 8.3.3 8.3.1 8.10.1 8.3.1

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 8: New Terms (continued)


What terms are introduced in this chapter?
bit rate bridge broadband broadband satellite bus topology byte cable modem Category 3 Category 5 Category 5e 8.3.1 8.4.1 8.10.3 8.10.3 8.5.1 8.3.1 8.10.3 8.4.2 8.4.2 8.4.2

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 8: New Terms (continued)


What terms are introduced in this chapter?
Category 6 cellular WAN client/server network coaxial cable Comit Consultatif International Tlphonique et Tlgraphique (CCITT) computer network copper cable CSMA/CD Data Link Layer de-encapsulation 8.4.2 8.10.3 8.2.5 8.4.2 8.6 8.1.1 8.1.1 8.7.1 8.8.2 8.8.2

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 8: New Terms (continued)


What terms are introduced in this chapter?
default gateway Dial-up Networking (DUN) Digital Subscriber Line (DSL) domain Domain Name System (DNS) dual ring Dynamic Host Configuration Protocol (DHCP) Electronic Industries Alliance (EIA) electronic mail (e-mail) encapsulation 8.3.3 8.9.3 8.10.1 8.2.5 8.3.3 8.5.2 8.3.3 8.6 8.1.2 8.8.2

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 8: New Terms (continued)


What terms are introduced in this chapter?
Extended-star topology external modem Fast Ethernet Fiber Distributed Data Interface (FDDI) fiber-optic cable File Transfer Protocol (FTP) full-duplex transmission half-duplex transmission hierarchical star topology High Data Rate DSL (HDSL) 8.5.1 8.9.3 8.7.1 8.5.2 8.1.1 8.3.4 8.3.1 8.3.1 8.5.1 8.10.1

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

10

Chapter 8: New Terms (continued)


What terms are introduced in this chapter?
host hub Hypertext Markup Language (HTML) Hypertext Transfer Protocol (HTTP) Hypertext Transfer Protocol Secure (HTTPS) IEEE 802.11a IEEE 802.11b IEEE 802.11g IEEE 802.11n IEEE 802.3 8.1.1 8.4.1 8.8.1 8.3.4 8.3.4 8.7.2 8.7.2 8.7.2 8.7.2 8.7.1

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

11

Chapter 8: New Terms (continued)


What terms are introduced in this chapter?
Institute of Electrical and Electronics Engineers (IEEE) International Electrotechnical Commission (IEC) International Organization for Standardization (ISO) Internet Internet Architecture Board (IAB) Internet Control Message Protocol (ICMP) Internet Message Access Protocol (IMAP) Internet Protocol (IP) Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) IP address 8.6 8.6 8.6 8.10 8.6 8.3.5 8.3.4 8.8.1 8.3.4 8.3.2

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

12

Chapter 8: New Terms (continued)


What terms are introduced in this chapter?
ISDN DSL (IDSL) kilobytes per second (KB/s) Local Area Network (LAN) logical topology MAC address megabit Megabits per second (Mbps) mesh topology multimode NetBIOS Extended User Interface (NetBEUI) 8.10.1 8.3.1 8.2.1 8.5 8.4.1 8.3.1 8.3.1 8.5.1 8.4.2 8.3.4

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

13

Chapter 8: New Terms (continued)


What terms are introduced in this chapter?
network network administration network basic input/output system (NetBIOS) network indicator LED Network Layer Open Systems Interconnection (OSI) model packet Packet Internet Gopher (ping) peer-to-peer computing physical layer 8.1 8.2.5 8.3.4 8.9.2 8.8.2 8.8.2 8.3.1 8.3.5 8.2.4 8.8.2

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

14

Chapter 8: New Terms (continued)


What terms are introduced in this chapter?
physical topology Plain Old Telephone Service (POTS) Post Office Protocol (POP) Power Line Communication (PLC) Presentation Layer Primary Rate Interface (PRI) protocol Protocol Data Unit (PDU) Public Switched Telephone Network (PSTN) ring topology 8.5 8.10 8.3.4 8.10.2 8.8.2 8.10.1 8.3.4 8.8.2 8.10.4 8.5.1

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

15

Chapter 8: New Terms (continued)


What terms are introduced in this chapter?
router Routing Information Protocol (RIP) Secure Socket Host (SSH) segment Session Layer Shielded Twisted Pair (STP) Simple Mail Transfer Protocol (SMTP) simplex single-mode star topology 8.4.1 8.8.1 8.3.4 8.4.1 8.8.2 8.4.2 8.3.4 8.3.1 8.4.2 8.5.1

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

16

Chapter 8: New Terms (continued)


What terms are introduced in this chapter?
subnet mask subnetting switch Symmetric DSL (SDSL) TCP/IP Model Telecommunications Industry Association (TIA) Telnet ThickNet ThinNet Token Ring network 8.3.2 8.3.2 8.4.1 8.10.1 8.8 8.6 8.3.4 8.4.2 8.4.2 8.5.2

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

17

Chapter 8: New Terms (continued)


What terms are introduced in this chapter?
topology tracert Transmission Control Protocol (TCP) Transmission Control Protocol/Internet Protocol (TCP/IP) Transport Layer twisted pair uUnshielded Twisted Pair (UTP) User Datagram Protocol (UDP) very-high-data-rate DSL (VDSL) Virtual Private Network (VPN) 8.5 8.9.2 8.8.1 8.3.4 8.8.2 8.4.2 8.4.2 8.8.1 8.10.1 8.10.5

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

18

Chapter 8: New Terms (continued)


What terms are introduced in this chapter?
Voice over IP (VoIP) Wide-Area Network (WAN) Wireless Access Point (WAP) wireless connection workgroup 8.10.4 8.2.2 8.4.1 8.1.1 8.2.5

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

19

Chapter 8: Changes
What has changed from the previous version (4.0) of ITEPC? Page 8.2.5 Explain client/server networks Basics of workgroups and domains Page 8.3.1 Explain bandwidth and data transmission Latency

Page 8.3.2 Describe IP addressing IP addresses Classes Subnet Mask


Page 8.3.3 Define DHCP Automatic configuration APIPA NAT

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

20

Chapter 8: Changes (continued)


What has changed from the previous version (4.0) of ITEPC? Page 8.3.4 Describe Internet protocols and applications TCP/IP properties Common protocols and ports HTTP, FTP, POP, SMTP, Telnet, and HTTPS Page 8.3.5 Define ICMP Ping Page 8.4.2 Identify names, purposes, and characteristics of common network cables Connectors RJ-45 RJ-11

Page 8.7.1 Explain cabled Ethernet standards IEEE 802.3

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

21

Chapter 8: Changes (continued)


What has changed from the previous version (4.0) of ITEPC? Page 8.7.2 Explain wireless Ethernet standards 802.11a 802.11b 802.11g 802.11n Page 8.8.1 Define the TCP/IP model Application Layer Protocols Transport Layer Protocols Internet Layer Protocols Network Access Layer ProtocolsPage 8.9.2 Attach a computer to existing network Ipconfig Command Ping Command Telent Service

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

22

Chapter 8: Changes (continued)


What has changed from the previous version (4.0) of ITEPC?
Page 8.10.3 Define broadband Bluetooth Cellular Fiber Broadband Page 8.10.5 Define VPN Virtual Private Networks Page 8.12.1 Review the troubleshooting process

Identify the Problem


Establish a Theory of Probable Causes Determine an Exact Cause Implement a Solution Verify Solution and Full System Functionality Document Findings
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

23

Chapter 8: Changes (continued)


What has changed from the previous version (4.0) of ITEPC? Page 8.12.2 Identify common network problems and solutions NIC LEDs are not lit A user is unable to use Telnet An older laptop cannot detect a wireless router A computer has an invalid IP address A remote device does not respond to a ping request A user is unable to connect to the Internet A laptop cannot connect to the wireless network

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

24

Chapter 8: Classroom Management


Use the Cisco Discovery Networking for Home and Small Business curriculum activities for extra networking practice: 3.1.3.2 explains network components 3.5.3.2 explains default gateway 5.1.3.2 explains network numbers 5.2.1.2 explains default subnet mask 5.2.2.3 explains public and private IP addressing 6.2.7.2 explains port numbers 6.3.3.3 explains OSI model Use the Cisco Exploration Network Fundamentals curriculum activities for extra networking practice: 4.2.2.1 explains port numbers 6.4.1.1 explains the network and host portion of an IP address As a class project or homework assignment, the students should research the technologies that are available in the area to connect to a network, such as cellular, VoIP, satellite, etc.

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

25

Chapter 8: Teaching Analogies


The OSI model is similar to creating a set of guidelines for building any type of bicycle. The guidelines specify how to guide and stop the bicycle, how to carry a person, and what type of tires to use for the bicycle. A traditional analog phone call could be compared to the television signals received through an antenna. A VoIP phone call could be compared to the television digital signals received through a cable provider. Data must be broken up into packets to be sent across the Internet. This is similar to sorting a big basket of clothes by color and fabric in the laundry room. The capacity of the washer determines the amount of clothes that can be washed, similar to how a protocol specifies the amount of data that can go in one packet. Protocols are a set of rules that have been developed for a specific type of communication. An analogy for the different protocols would be the rules that are set before a meeting, such as agenda items and discussion time limits.

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

26

Chapter 8: Suggested Class Discussions


What are some examples of different types of networks in our lives? Possible examples may include a phone network, a cell phone network, a network of friends, or a social or professional network. Compare and contrast the OSI versus TCP/IP models. Emphasize how the TCP/IP model has real protocols where the OSI model is a theoretical model. What are protocols? What kind of rules would a network need? How do you test communication?

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

27

Chapter 8: Best Practices

Network two computers using a crossover cable or multiple computers using a switch or hub.
Share a printer on a network and print to it from another computer on the same network. Configure a wireless access point and have the students connect to it with any type of wireless device. Have the students work in teams to act out the rules of particular protocols, such as TCP versus UDP.

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

28

Chapter 8: Outside Reading


Ethernet and Routing Basics by Cisco Systems http://www.cisco.com

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

29

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

30

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

31

Вам также может понравиться