Вы находитесь на странице: 1из 25

Jimma University Cisco

Networking Academy

Module 1
Introduction to Networking
Module Objectives
• At the end of this module students are expected
to:
– Identify the physical connections needed for a
computer to connect to the Internet
– Recognize the components of a computer system
– Install and troubleshoot NICs and modems
– Configure the set of protocols needed for Internet
connection
– Use basic procedures to test an Internet connection
• This Module is organized into 2 Learning
Objectives
– Connecting to the Internet
– Network Math
Requirements for Internet
Connection
• Internet is the largest data network. It is, in
fact, a collection of large and small
networks
• Connection to the Internet can be broken
down into
– the physical connection
– the logical connection and
– applications
Requirements…
• Physical Connection
– Connecting an adapter card such as a Network Interface Card
(NIC) or a modem from a PC to a Network
• Logical Connection
– uses standards called protocols
– A protocol is a formal description of a set of rules and
conventions that govern how devices on a network
communicate.
– The Transmission Control Protocol/Internet Protocol (TCP/IP)
suite is the primary set of protocols used on the Internet.
• Application
– Applications work with protocols to send and receive data across
the Internet.
• Web Browsers (IE, Opera, …)
• FTP
PC Basics
• Computers are important building blocks
in a network
• Many networking devices are special
purpose computers, with many of the
same components as general purpose
PCs.
• You should know the basic components of
a network
Network Interface Card
• A NIC, or LAN adapter, provides network
communication capabilities to and from a PC.
• On desktop computer systems, it is a printed
circuit board that resides in a slot on the
motherboard and provides an interface
connection to the network media.
• On laptop computer systems, it is commonly
integrated into the laptop or available on a small,
credit card-sized PCMCIA card.
– PCMCIA stands for Personal Computer Memory Card
International Association.
NIC
NIC…
• These considerations are important in the
selection of a NIC:
– Protocols – Ethernet, Token Ring, or FDDI
– Types of media – Twisted-pair, coaxial,
wireless, or fiber-optic
– Type of system bus – PCI or ISA
NIC and Modem Installation
• Modem – Modulator/Demodulator
– Used to convert data from digital to analog and vice versa
– Modems could be internal or external
– For dialup networking we use modems
• NICs must be installed before a PC can communicate
with other PCs on a network
• Situations that require NIC installation include the
following:
– Installation of a NIC on a PC that does not already have one
– Replacement of a malfunctioning or damaged NIC
– Upgrade from a 10-Mbps NIC to a 10/100/1000-Mbps NIC
– Change to a different type of NIC, such as wireless
– Installation of a secondary, or backup, NIC for network security
reasons
High-speed and Dialup connection
TCP/IP
Testing Connectivity using Ping
• Ping is a basic program that verifies a particular IP address exists and
can accept requests.
• The ping command works by sending special Internet Protocol (IP)
packets, called Internet Control Message Protocol (ICMP) Echo Request
datagrams, to a specified destination.
– ping 127.0.0.1 – This is a unique ping and is called an internal
loopback test. It is used to verify the TCP/IP network
configuration.
– ping IP address of host computer – A ping to a host PC verifies
the TCP/IP address configuration for the local host and
connectivity to the host.
– ping default-gateway IP address – A ping to the default gateway
indicates if the router that connects the local network to other
networks can be reached.
– ping remote destination IP address – A ping to a remote
destination verifies connectivity to a remote host.
Ping…
Network Math
• Computers work with and store data using electronic
switches that are either ON or OFF (0 and 1)
• American Standard Code for Information Interchange
(ASCII) is the code that is most commonly used to
represent alpha-numeric data in a computer.
Bits and Bytes
Base 10 Number System
Base 2 Number system
Converting decimal numbers to
8-bit binary numbers
Four-octet dotted decimal representation of
32-bit binary numbers
• Currently, addresses assigned to computers on the
Internet are 32-bit binary numbers.
• To make it easier to work with these addresses, the 32-
bit binary number is broken into a series of decimal
numbers.
Hexadecimal Number System
• Base 16 . There are 16 different symbols
0 – 9, A, B, C, D, E, F
• Usually Hexadecimal numbers are
preceded by 0x
– Hex number 5A is usually written as 0x5A
Boolean or Binary Logic
Boolean…
Boolean…
IP addresses and network masks
• The IP address of a computer consists of a network and
a host part.
• To inform a computer how the 32-bit IP address has
been split, a second 32-bit number called a subnetwork
mask is used.
• This mask indicates how many of the bits are used to
identify the network of the computer.
• subnet mask will always be all 1s until the network
address is identified and then it will be all 0s to the end of
the mask.
• A Boolean AND of the IP address 10.34.23.134 and the
subnet mask 255.0.0.0 produces the network address of
this host: 10.0.0.0

Вам также может понравиться