CCNA Discovery Chapter Four

Similar documents
Chapter 4 Connecting to the Internet through an ISP

Chapter 5. Data Communication And Internet Technology

Network+ Guide to Networks 6 th Edition. Chapter 7 Wide Area Networks

Network Design. Yiannos Mylonas

The Internet and Its Uses

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

428 MY HOME Structured cabling system for the home sector

Introduction to computer networks and Cloud Computing

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

Telecommunications systems (Part 2)

Broadband 101: Installation and Testing

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Advanced Higher Computing. Computer Networks. Homework Sheets

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Chapter 2 TCP/IP Networking Basics

Page 1 of 7. Computer Networking

Local-Area Network -LAN

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

SHEET 5 CABLE TELEVISION SYSTEM

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

INTERNET CONNECTIVITY

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Telecommunications, Networks, and Wireless Computing

Internet Public Network

Networking 101 (Networking Basics) Presentation to UCHUG - 1/03/07 G. Skalka

ADSL BROADBAND BASICS FOR THE DOMESTIC USER. The Main Limitations of ADSL Broadband are as follows.

Chapter 1 Instructor Version

11/22/

Introduction to ADSL. NEXTEP Broadband White Paper. Broadband Networks Group. A primer on Asymmetric Digital Subscriber Line transmission technology.

Networks 2. Gabriela Ochoa University of Stirling CSCU9B1 Essential Skills for the Information Age. Content

CSCI Topics: Internet Programming Fall 2008

Computer Networking Networks

CMPT 165: The Internet, Part 3

CompTIA Network+ (Exam N10-005)

Appendix A: Basic network architecture

Appendix B Network, Routing, Firewall, and Basics

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT

Networks. The two main network types are: Peer networks

TAXONOMY OF TELECOM TERMS

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.

Broadband Primer. A Guide to High Speed Internet Technologies. Indiana Office of Utility Consumer Counselor

MMGD0204 Web Application Technologies. Chapter 1 Introduction to Internet

Getting Broadband. FCC Consumer Facts. What Is Broadband?

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION

contents my HOmE - STrUCTUrEd CaBLing SYSTEm FOr THE HOmE SECTOr

Candidates should attempt FOUR questions. All questions carry 25 marks.

1.264 Lecture 34. Telecom: Connecting wired LAN, WAN. Next class: Green chapter 17. Exercise due before class

How To Get High Speed Internet In Australia

Computers Are Your Future Prentice-Hall, Inc.

Voice and Delivery Data Networks

Communication Networks. MAP-TELE 2011/12 José Ruela

Study Guide CompTIA A+ Certification, Domain 2 Networking

Digital Subscriber Line (DSL) Requirements

Internet Service Overview

Component 4: Introduction to Information and Computer Science

The part of the network that connects customers to the exchange, sometimes called the local loop or the last mile.

Things You Must Know About Gigabit Ethernet 1. Understanding Gigabit Ethernet

The OSI Model: Understanding the Seven Layers of Computer Networks

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Christopher Rathgeb ECE 453 Dr. Qi 9/19/2006. Task 1: Make an Ethernet cable yourself.

Overview of WAN Connections Module 1

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Technical Support Information Belkin internal use only

ANSI/TIA/EIA A, Commercial Building Telecommunications Cabling Standard.

IS Network Services Senior Facilities Management Group 2 Hill Farms West Division of State Facilities

Ethernet Patch Cord Wiring

Current access technologies overview

Acterna DSL Services Tester TPI 350+ Application Highlights

Introduction cont. Some Structure in the Chaos. Packet switching versus circuit switching. Access networks and physical media

Technical Glossary from Frontier

Network Simulation Traffic, Paths and Impairment

Introduction to Computer Networks and Data Communications

VoIP Glossary. Client (Softphone client): The software installed in the userâ s computer to make calls over the Internet.

Connection Services. Hakim S. ADICHE, MSc

Gigabit Ethernet on Copper Cabling Infrastructures

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

Narrowband and Broadband Access Technologies

Computer Networks and the Internet

SSVVP SIP School VVoIP Professional Certification

The Conversion Technology Experts. Media Conversion: Cost-Effectively Integrating T1 into your Fiber Network

WAN Technology. Heng Sovannarith

CMPD 323 DATA COMMUNICATION & COMPUTER NETWORKS. Chapter 5: Network Design and Troubleshooting Scenarios

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 1 BASIC CONCEPTS OF NETWORK

How to Choose the Right Cable Category

XDSL and DSLAM Access Technologies

The Internet and Network Technologies

Analysis of xdsl Technologies

The Evolution of Copper Cabling Systems from Cat5 to Cat5e to Cat6 Copper Cabling Standards and Technical Aspects

Network Cabling Guide

DSL-2600U. User Manual V 1.0

WAN Data Link Protocols

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

NXU RoIP Link to Eliminate Voice-Grade Leased Line

Transcription:

CCNA Discovery Chapter Four By Chief Eng. Amna Ahmed Institute of Telecommunication amna_ahmed28@yahoo.com Modified by Vincenzo Bruno Hacklab Cosenza

Chapter 4

Explain what the internet is Every day millions of people exchange information through the Internet - but what exactly is the Internet? The Internet is a worldwide collection of computer networks, cooperating with each other to exchange information using common standards. Through telephone wires, fiber optic cables, wireless transmissions and satellite links, Internet users can exchange information in a variety of forms. The Internet is a network of networks that connects users in every country in the world. There are currently over one billion Internet users worldwide.

Internet Service Providers(ISPs Any home, business or organization that wants to connect to the Internet must use an Internet Service Provider (ISP). An ISP is a company that provides the connections and support to access the Internet. It can also provide additional services such as Email and web hosting. ISPs range in size from small to very large and differ in terms of the area they service. ISPs may provide limited services to a small geographical area or can have a wide variety of services and support entire countries with millions of customers. ISPs also differ in the types of connection technologies and speeds they offer. Examples of well known ISPs include AOL, EarthLink, and Roadrunner.

The ISPs Relationship With the Internet Individual computers and local networks connect to the ISP at a Point of Presence (POP). A POP is the connection point between the ISP's network and the particular geographical region that the POP is servicing. An ISP may have many Pops depending on its size and the area it services. Within an ISP, a network of high-speed routers and switches move data between the various Pops. Multiple links interconnect the Pops to provide alternate routes for the data should one link fail or become overloaded with traffic and congested.

ISPs connect to other ISPs in order to send information beyond the boundaries of their own network. The Internet is made up of very high-speed data links that interconnect ISP Pops and ISPs to each other. These interconnections are part of the very large, high capacity network known as the Internet Backbone. Connecting to the ISP at the POP provides users with access to the ISP's services and the Internet.

Option for connecting to the Isp ISPs provide a variety of ways to connect to the Internet, depending on location and desired connection speed. In a major city there are typically more choices for ISPs and more connection options than in a rural area. For example, cable Internet access is only available in certain metropolitan areas where cable TV service is available. Remote areas may only have access via dial-up or satellite. Each Internet access technology uses a network access device, such as a modem, in order to connect to the ISP. It may be built in to your computer or may be provided by the ISP.

The choice of Internet access technologies depends on availability, cost, access device used, media used and the speed of the connection. Most of the technologies shown are used for both home and small business. Leased lines are typically used for business and large organizations, but can be used to provide high speed connectivity in areas where cable or DSL are not available

ISP Levels of Service Depending on the ISP and the connection technology, various services are available such as virus scanning, video on demand, and file storage. The contract with the ISP determines the type and level of services that are available. Most ISPs offer two different contract levels: home service or business class service. Home service is normally less expensive than business services, and generally provides scaled-down services such as slower connection speed, reduced web space storage, and fewer email accounts. A typical home account may include a minimum of five email addresses with additional addresses being available for a fee.

When data is transferred, it is either uploaded or downloaded. Downloading refers to information coming from the Internet to your computer, while uploading indicates the reverse path, from your computer to the Internet. When the download transfer rate is different from the upload transfer rate, it is called asymmetric. When the transfer rate is the same in both directions, it is called symmetric Asymmetric: Most commonly used for the home. Download speeds are faster than upload speeds. Necessary for users that download significantly more than upload. Most Internet users, especially those who use graphics or multimedia intensive web data, need lots of download bandwidth.

Symmetric: Most commonly used for business or individuals hosting servers on the Internet. Used when necessary to upload large amounts of traffic such as intensive graphics, multimedia, or video. It can carry large amounts of data in both directions at equal rates.

Importance of Internet Protocol IP For hosts to communicate on the Internet, they must be running Internet Protocol (IP) software. The IP protocol is one of a group of protocols that are collectively referred to as TCP/IP (Transmission Control Protocol / Internet Protocol). The Internet Protocol (IP) uses packets to carry data Each IP packet must contain a valid source and destination IP address. Without valid address information, packets sent will not reach the destination host. Return packets will not make it back to the original source.

An IP packet has a header at the beginning which contains the source and destination IP addresses. It also contains control information that describes the packet to network devices, such as routers, it passes through and also helps to control its behavior on the network. The IP packet is sometimes referred to as a datagram. IP addresses must be unique on the Internet. There are organizations responsible for controlling the distribution of IP addresses so that there is no duplication. ISPs obtain blocks of IP addresses from a local, national or regional Internet registry (RIR). It is the responsibly of the ISPs to manage these addresses and assign them to end users.

How ISPs Handle packets Before being sent on the Internet, messages are divided into packets. IP packet size is between 64 to 1500 bytes for Ethernet networks, and contains mostly user data. Downloading a single 1 MB song would require over 600 packets of 1500 bytes. Each individual packet must mus have a source and destination IP address. When a packet is sent across the Internet, the ISP determines whether the packet is destined for a local service located on the ISP network, or a remote service located on a different differen network. Every ISP has a control facility for their network, known as the Network Operations Center (NOC). The NOC usually controls traffic flow and houses services such as email and web hosting

Internet Cloud A diagram that shows all network devices and their interconnections would be very complex. Additionally, the final routing path between source and destination is not usually important, only that the source is able to communicate with the destination. Therefore, in network diagrams a cloud is often used to represent the Internet or any other complex network,

Forwarding packets across the Internet There are network utilities that test connectivity to the destination device The ping utility tests end-to-end connectivity between source and destination The traceroute utility traces the route from source to destination. Each router through which the packets travel is referred to as a hop

Device in Internet Cloud Devices that provide connectivity to end-users must match the technology used by the end-user to connect to the ISP. For example, if the end-user is using DSL technology to connect, the ISP must have a DSL Access Multiplexer (DSLAM) to accept these connections. For cable modems to connect, the ISP must have a Cable Modem Termination System (CMTS). Some ISPs still accept analog calls through modems and have banks of modems to support these users. ISPs that provide wireless access have wireless bridging equipment.

Common Network Cables

Twisted Pair Cables

Coaxial Cable

Fiber Optic Cables

Cabling Standards Cabling standards are a set of specifications for the installation and testing of cables. Standards specify types of cables to use in specific environments, conductor materials, pinouts, wire sizes, shielding, cable lengths, connector types and performance limits.

UTP Cables Twisted pair cable is most commonly used in network installations. The TIA/EIA organization defines two different patterns, or wiring scheme, called T568A and T568B. Each wiring scheme defines the pinout, or order of wire connections, on the end of the cable.

Identify and describe the cross-over and straight through cable pinouts and color codes

UTP Cable Termination UTP and STP cable is usually terminated into an RJ-45 connector The RJ-45 jack has eight conductors, and is wired according to either T568A or T568B. At the patch panel a device known as a punchdown tool is required to push the wires into the connector. The wires should be matched up to the appropriate insulation displacement connector (IDC) by color before punching them down. The punchdown tool also cuts off any excess wire. A punchdown tool is not required to terminate most wall jacks. To terminate these connectors the cables are untwisted and placed into the appropriate IDC. Placing the cap on the jack pushes the cables into the IDC and cuts through the insulation on the wires.

Describe how to test cable termination and functionality (Cable testing).

Describe how to test cable termination and functionality (Cable testing). The cable tester is used to perform initial diagnostics. The first test usually is called a continuity test and it verifies that there is end-to-end connectivity. It can also detect common cabling faults such as opens and shorts.

Attenuation, also commonly referred to as insertion loss, is a general term that refers to the reduction in the strength of a signal. Attenuation is a natural consequence of signal transmission over any medium. Attenuation limits the length of network cabling over which a message can be sent. Crosstalk is the leakage of signals between pairs. If this is measured near the transmitting end it is termed near-end crosstalk (NEXT). If measured at the receiving end of the cable it is termed far-end crosstalk (FEXT). Both forms of crosstalk degrade network performance and are often caused by untwisting too much cable when terminating.

Summary The Internet is a worldwide collection of computer networks, accessed through ISPs. Internet Protocol (IP( controls the structure and addressing of data packets for transport through the Internet cloud. ISP Network Operations Centers (NOCs( utilize highend, high-speed devices with redundancy. Home networks feature multi-function devices which perform switching and routing. Networks use physical cabling media which must conform to standards in construction and termination. Cabling best practices are designed to reduce attenuation and crosstalk.