SlideShare une entreprise Scribd logo
1  sur  73
Chapter 9: 
Network Access 
Network Basics 
© 2008 Cisco Systems, Inc. All Presentation_ID rights reserved. Cisco Confidential 1
Chapter 9: Objectives 
Students will be able to: 
 Explain the role of the data link layer in supporting 
communications across data networks. 
 Compare media access control techniques and logical 
topologies used in networks. 
 Explain how physical layer protocols and services 
support communications across data networks. 
 Build a simple network using the appropriate. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Chapter 9 
9.1 Data Link Layer 
9.2 Media Access Control 
9.3 Physical Layer 
9.4 Network Media 
9.5 Summary 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Purpose of the Data Link Layer 
The Data Link Layer 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Purpose of the Data Link Layer 
Data Link Sublayers 
Network 
Data Link 
LLC Sublayer 
MAC Sublayer 
Physical 
802.3 
Ethernet 
802.11 
Wi-Fi 
802.15 
Bluetooth 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Purpose of the Data Link Layer 
Media Access Control 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Purpose of the Data Link Layer 
Providing Access to Media 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Data Link Layer 
Layer 2 Frame Structure 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Layer 2 Frame Structure 
Creating a Frame 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Data Link Layer 
Layer 2 Standards 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Layer 2 Standards 
Data Link Layer Standards 
Standard 
organization 
Networking Standards 
IEEE 
• 802.2: Logical Link Control (LLC) 
• 802.3: Ethernet 
• 802.4: Token bus 
• 802.5: Token passing 
• 802.11: Wireless LAN (WLAN) & Mesh (Wi-Fi certification) 
• 802.15: Bluetooth 
• 802.16: WiMax 
ITU-T 
• G.992: ADSL 
• G.8100 - G.8199: MPLS over Transport aspects 
• Q.921: ISDN 
• Q.922: Frame Relay 
ISO 
• HDLC (High Level Data Link Control) 
• ISO 9314: FDDI Media Access Control (MAC) 
ANSI • X3T9.5 and X3T12: Fiber Distributed Data Interface (FDDI) 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Topologies 
Controlling Access to the Media 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Topologies 
Physical and Logical Topologies 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
WAN Topologies 
Common Physical WAN Topologies 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
WAN Topologies 
Point-to-Point Topology 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
WAN Topologies 
Logical Point-to-Point Topology 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
WAN Topologies 
Half and Full Duplex 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
LAN Topologies 
Physical LAN Topologies 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
LAN Topologies 
Logical Topology for Shared Media 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
LAN Topologies 
Contention-Based Access 
Characteristics Contention-Based Technologies 
• Stations can transmit at any time 
• Collision exist 
• There are mechanisms to resolve 
contention for the media 
• CSMA/CD for 802.3 Ethernet networks 
• CSMA/CA for 802.11 wireless networks 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
LAN Topologies 
Multi-Access Topology 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
LAN Topologies 
Controlled Access 
Characteristics Controlled Access Technologies 
• Only one station can transmit at a time 
• Devices wishing to transmit must wait 
their turn 
• No collisions 
• May use a token passing method 
• Token Ring (IEEE 802.5) 
• Fiber Distributed Data Interface (FDDI) 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
LAN Topologies 
Ring Topology 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Data Link Frame 
The Frame 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Data Link Frame 
The Header 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Data Link Frame 
Layer 2 Address 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Data Link Frame 
The Trailer 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Data Link Frame 
LAN and WAN Frames 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Data Link Frame 
Ethernet Frame 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Data Link Frame 
Point-to-Point Protocol Frame 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Data Link Frame 
802.11 Wireless Frame 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Network Access 
Physical Layer 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Purpose of the Physical Layer 
The Physical Layer 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Purpose of the Physical Layer 
Physical Layer Media 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Purpose of the Physical Layer 
Physical Layer Standards 
Standard 
organization 
Networking Standards 
ISO 
• ISO 8877: Officially adopted the RJ connectors (e.g., RJ-11, RJ-45) 
• ISO 11801: Network cabling standard similar to EIA/TIA 568. 
EIA/TIA 
• TIA-568-C: Telecommunications cabling standards, used by nearly all 
voice, video and data networks. 
• TIA-569-B: Commercial Building Standards for Telecommunications 
Pathways and Spaces 
• TIA-598-C: Fiber optic color coding 
• TIA-942: Telecommunications Infrastructure Standard for Data Centers 
ANSI • 568-C: RJ-45 pinouts. Co-developed with EIA/TIA 
ITU-T • G.992: ADSL 
IEEE 
• 802.3: Ethernet 
• 802.11: Wireless LAN (WLAN) & Mesh (Wi-Fi certification) 
• 802.15: Bluetooth 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Characteristics of the Physical Layer 
Physical Layer Functions 
Media 
Physical 
Components 
Frame Encoding 
Technique 
Signalling 
Method 
Copper 
cable 
• UTP 
• Coaxial 
• Connectors 
• NICs 
• Ports 
• Interfaces 
• Manchester Encoding 
• Non-Return to Zero (NRZ) 
techniques 
• 4B/5B codes are used with 
Multi-Level Transition Level 3 
(MLT-3) signaling 
• 8B/10B 
• PAM5 
• Changes in the 
electromagnetic field 
• Intensity of the 
electromagnetic field 
• Phase of the 
electromagnetic wave 
Fiber Optic 
cable 
• Single-mode Fiber 
• Multimode Fiber 
• Connectors 
• NICs 
• Interfaces 
• Lasers and LEDs 
• Photoreceptors 
• Pulses of light 
• Wavelength multiplexing using 
different colors 
• A pulse equals 1. 
• No pulse is 0. 
Wireless 
media 
• Access Points 
• NICs 
• Radio 
• Antennae 
• DSSS (direct-sequence spread-spectrum) 
• OFDM (orthogonal frequency 
division multiplexing) 
• Radio waves 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
Characteristics of the Physical Layer 
Physical Components 
Gigabit Ethernet 
Interfaces 
SHDSL 
Interface 
Management 
Ports 
USB Type A 
Connector 
FastEthernet 
Switch ports 
USB Mini-B 
Connector 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
Characteristics of the Physical Layer 
Frame Encoding Techniques 
 Manchester encoding 
 Non-Return to Zero (NRZ) 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
Characteristics of the Physical Layer 
Signaling Method 
Asynchronous 
Signal 
Arbitrary gap of time 
Synchronous 
Signal 
Bursty data 
Data transitions align with bit time slots 
Bit time slot 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
Characteristics of the Physical Layer 
Signaling Method 
Amplitude modulation 
Frequency modulation 
Phase modulation 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
Characteristics of the Physical Layer 
Signaling Method 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
Characteristics of the Physical Layer 
Bandwidth 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
Characteristics of the Physical Layer 
Throughput 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
Network Media 
Copper Cabling 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
Copper Cabling 
Characteristics of Copper Media 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
Copper Cabling 
Copper Media 
Unshielded Twisted Pair (UTP) cable Shielded Twisted Pair (STP) cable 
Coaxial cable 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
Copper Cabling 
Unshielded Twisted-Pair (UTP) Cable 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
Copper Cabling 
Shielded Twisted-Pair (STP) Cable 
Braided or Foil Shield 
Foil Shields 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
Copper Cabling 
Coaxial Cable 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
Copper Cabling 
Cooper Media Safety 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
UTP Cabling 
Properties of UTP Cabling 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51
UTP Cabling 
UTP Cabling Standards 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52
UTP Cabling 
UTP Connectors 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53
UTP Cabling 
Types of UTP Cable 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54
UTP Cabling 
LAN Cabling Areas 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 55
UTP Cabling 
Testing UTP Cables 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 56
Fiber Optic Cabling 
Properties of Fiber Optic Cabling 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 57
Fiber Optic Cabling 
Fiber Media Cable Design 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 58
Fiber Optic Cabling 
Types of Fiber Media 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 59
Fiber Optic Cabling 
Network Fiber Connectors 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 60
Fiber Optic Cabling 
Testing Fiber Cables 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 61
Fiber Optic Cabling 
Fiber versus Copper 
Implementation issues Copper media Fibre-optic 
Bandwidth supported 10 Mbps – 10 Gbps 10 Mbps – 100 Gbps 
Distance 
Relatively short 
(1 – 100 meters) 
Relatively High 
(1 – 100,000 meters) 
Immunity to EMI and RFI Low 
High 
(Completely immune) 
Immunity to electrical hazards Low 
High 
(Completely immune) 
Media and connector costs Lowest Highest 
Installation skills required Lowest Highest 
Safety precautions Lowest Highest 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 62
Network Media 
Wireless Media 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 63
Wireless Media 
Properties of Wireless Media 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 64
Wireless Media 
Types of Wireless Media 
• IEEE 802.11 standards 
• Commonly referred to as Wi-Fi. 
• Uses CSMA/CA 
• Variations include: 
• 802.11a: 54 Mbps, 5 GHz 
• 802.11b: 11 Mbps, 2.4 GHz 
• 802.11g: 54 Mbps, 2.4 GHz 
• 802.11n: 600 Mbps, 2.4 and 5 GHz 
• 802.11ac: 1 Gbps, 5 GHz 
• 802.11ad: 7 Gbps, 2.4 GHz, 5 GHz, and 60 GHz 
• IEEE 802.15 standard 
• Supports speeds up to 3 Mbps 
• Provides device pairing over distances from 1 to 
100 meters. 
• IEEE 802.16 standard 
• Provides speeds up to 1 Gbps 
• Uses a point-to-multipoint topology to provide 
wireless broadband access. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 65
Wireless Media 
Wireless LAN 
Cisco Linksys EA6500 802.11ac wireless router 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 66
Wireless Media 
802.11 Wi-Fi Standards 
Standard 
Maximum 
Speed 
Frequency 
Backwards 
compatible 
802.11a 54 Mbps 5 GHz No 
802.11b 11 Mbps 2.4 GHz No 
802.11g 54 Mbps 2.4 GHz 802.11b 
802.11n 600 Mbps 2.4 GHz or 5 GHz 802.11b/g 
802.11ac 
1.3 Gbps 
(1300 Mbps) 
2.4 GHz and 5.5 
GHz 
802.11b/g/n 
802.11ad 
7 Gbps 
(7000 Mbps) 
2.4 GHz, 5 GHz and 
60 GHz 
802.11b/g/n/ac 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 67
Network Access 
Summary 
In this chapter, you learned: 
 The TCP/IP network access layer is the equivalent of the OSI 
data link layer (Layer 2) and the physical layer (Layer 1). 
 The data link layer is responsible for the exchange of frames 
between nodes over a physical network media. 
 Among the different implementations of the data link layer 
protocols, there are different methods of controlling access to 
the media. 
 The actual media access control method used depends on 
the topology and media sharing. 
 LAN and WAN topologies can be physical or logical. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 68
Network Access 
Summary 
In this chapter, you learned: 
 It is the logical topology that influences the type of network 
framing and media access control used. 
 WANs are commonly interconnected using the point-to-point, 
hub and spoke, or mesh physical topologies. 
 In shared media LANs, end devices can be interconnected 
using the star, bus, ring, or extended star (hybrid) physical 
topologies. 
 All data link layer protocols encapsulate the Layer 3 PDU 
within the data field of the frame. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 69
Network Access 
Summary 
In this chapter, you learned: 
 The OSI physical layer provides the means to transport the 
bits that make up a data link layer frame across the network 
media. 
 Hardware components such as network adapters (NICs), 
interfaces and connectors, cable materials, and cable 
designs are all specified in standards associated with the 
physical layer. 
 The physical layer standards address three functional areas: 
physical components, frame encoding technique, and 
signaling method. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 70
Network Access 
Summary 
In this chapter, you learned: 
 Using the proper media is an important part of network 
communications. 
 Wired communication consists of copper media and fiber 
cable. 
 There are three main types of copper media used in 
networking: unshielded-twisted pair (UTP), shielded-twisted 
pair (STP), and coaxial cable. UTP cabling is the most 
common copper networking media. 
 Optical fiber cable has become very popular for 
interconnecting infrastructure network devices. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 71
Network Access 
Summary 
In this chapter, you learned: 
 Wireless media carry electromagnetic signals that represent 
the binary digits of data communications using radio or 
microwave frequencies. 
 The number of wireless enabled devices continues to 
increase. 
 Wireless has become the medium of choice for home 
networks and is quickly gaining in popularity in enterprise 
networks. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 72
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 73

Contenu connexe

Tendances

CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsVuz Dở Hơi
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3Irsandi Hasan
 
Chapter 02 - Configuring a Network Operating System
Chapter 02 - Configuring a Network Operating SystemChapter 02 - Configuring a Network Operating System
Chapter 02 - Configuring a Network Operating SystemYaser Rahmati
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4Irsandi Hasan
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkVuz Dở Hơi
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkVuz Dở Hơi
 
CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7Irsandi Hasan
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11Irsandi Hasan
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1Irsandi Hasan
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6Irsandi Hasan
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3Irsandi Hasan
 
Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6Hamza Malik
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignVuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11Nil Menon
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8Irsandi Hasan
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerVuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2Nil Menon
 
Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7Hamza Malik
 

Tendances (19)

CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
Chapter 02 - Configuring a Network Operating System
Chapter 02 - Configuring a Network Operating SystemChapter 02 - Configuring a Network Operating System
Chapter 02 - Configuring a Network Operating System
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the network
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
 
CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
 
Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application Layer
 
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2
 
Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7
 

En vedette

CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8Irsandi Hasan
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10Irsandi Hasan
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 
ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9Irsandi Hasan
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9Irsandi Hasan
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4Irsandi Hasan
 
ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2Irsandi Hasan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1Irsandi Hasan
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
ITE v5.0 - Chapter 8
ITE v5.0 - Chapter 8ITE v5.0 - Chapter 8
ITE v5.0 - Chapter 8Irsandi Hasan
 
ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3Irsandi Hasan
 
ITE v5.0 - Chapter 12
ITE v5.0 - Chapter 12ITE v5.0 - Chapter 12
ITE v5.0 - Chapter 12Irsandi Hasan
 
CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8Irsandi Hasan
 
ITE v5.0 - Chapter 11
ITE v5.0 - Chapter 11ITE v5.0 - Chapter 11
ITE v5.0 - Chapter 11Irsandi Hasan
 
CCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the networkCCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the networkVuz Dở Hơi
 
ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5Irsandi Hasan
 
CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9Nil Menon
 

En vedette (20)

CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4
 
ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2
 
IT Essentials Chapter 9
IT Essentials Chapter 9IT Essentials Chapter 9
IT Essentials Chapter 9
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
ITE v5.0 - Chapter 8
ITE v5.0 - Chapter 8ITE v5.0 - Chapter 8
ITE v5.0 - Chapter 8
 
ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3
 
ITE v5.0 - Chapter 12
ITE v5.0 - Chapter 12ITE v5.0 - Chapter 12
ITE v5.0 - Chapter 12
 
CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8
 
ITE v5.0 - Chapter 11
ITE v5.0 - Chapter 11ITE v5.0 - Chapter 11
ITE v5.0 - Chapter 11
 
CCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the networkCCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the network
 
ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5
 
CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9
 

Similaire à CCNA RS_NB - Chapter 9

Itn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessItn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessbebe tampan
 
Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Hamza Malik
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4Nil Menon
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4Waqas Ahmed Nawaz
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access Vuz Dở Hơi
 
Chapter 04 - Network Access
Chapter 04 - Network AccessChapter 04 - Network Access
Chapter 04 - Network AccessYaser Rahmati
 
Chapter 4 : Network access
Chapter 4 : Network accessChapter 4 : Network access
Chapter 4 : Network accessteknetir
 
Itn6 instructor materials_chapter4
Itn6 instructor materials_chapter4Itn6 instructor materials_chapter4
Itn6 instructor materials_chapter4limenih muluneh
 
Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5Hamza Malik
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3Nil Menon
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3Waqas Ahmed Nawaz
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsYaser Rahmati
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsteknetir
 
Chapter 05 - Ethernet
Chapter 05 - EthernetChapter 05 - Ethernet
Chapter 05 - EthernetYaser Rahmati
 
Chapter 5 : Ethernet
Chapter 5 : EthernetChapter 5 : Ethernet
Chapter 5 : Ethernetteknetir
 
CCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetCCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetVuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5Nil Menon
 
Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Sachii Dosti
 

Similaire à CCNA RS_NB - Chapter 9 (20)

Itn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessItn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_access
 
Itn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessItn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_access
 
Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4
 
Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access
 
Chapter 04 - Network Access
Chapter 04 - Network AccessChapter 04 - Network Access
Chapter 04 - Network Access
 
Chapter 4 : Network access
Chapter 4 : Network accessChapter 4 : Network access
Chapter 4 : Network access
 
Itn6 instructor materials_chapter4
Itn6 instructor materials_chapter4Itn6 instructor materials_chapter4
Itn6 instructor materials_chapter4
 
Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and Communications
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communications
 
Chapter 05 - Ethernet
Chapter 05 - EthernetChapter 05 - Ethernet
Chapter 05 - Ethernet
 
Chapter 5 : Ethernet
Chapter 5 : EthernetChapter 5 : Ethernet
Chapter 5 : Ethernet
 
CCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetCCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - Ethernet
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5
 
Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2
 

Plus de Irsandi Hasan

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10Irsandi Hasan
 
CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6Irsandi Hasan
 

Plus de Irsandi Hasan (13)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10
 
CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6
 

Dernier

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Dernier (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

CCNA RS_NB - Chapter 9

  • 1. Chapter 9: Network Access Network Basics © 2008 Cisco Systems, Inc. All Presentation_ID rights reserved. Cisco Confidential 1
  • 2. Chapter 9: Objectives Students will be able to:  Explain the role of the data link layer in supporting communications across data networks.  Compare media access control techniques and logical topologies used in networks.  Explain how physical layer protocols and services support communications across data networks.  Build a simple network using the appropriate. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
  • 3. Chapter 9 9.1 Data Link Layer 9.2 Media Access Control 9.3 Physical Layer 9.4 Network Media 9.5 Summary Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  • 4. Purpose of the Data Link Layer The Data Link Layer Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
  • 5. Purpose of the Data Link Layer Data Link Sublayers Network Data Link LLC Sublayer MAC Sublayer Physical 802.3 Ethernet 802.11 Wi-Fi 802.15 Bluetooth Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
  • 6. Purpose of the Data Link Layer Media Access Control Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
  • 7. Purpose of the Data Link Layer Providing Access to Media Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
  • 8. Data Link Layer Layer 2 Frame Structure Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
  • 9. Layer 2 Frame Structure Creating a Frame Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
  • 10. Data Link Layer Layer 2 Standards Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
  • 11. Layer 2 Standards Data Link Layer Standards Standard organization Networking Standards IEEE • 802.2: Logical Link Control (LLC) • 802.3: Ethernet • 802.4: Token bus • 802.5: Token passing • 802.11: Wireless LAN (WLAN) & Mesh (Wi-Fi certification) • 802.15: Bluetooth • 802.16: WiMax ITU-T • G.992: ADSL • G.8100 - G.8199: MPLS over Transport aspects • Q.921: ISDN • Q.922: Frame Relay ISO • HDLC (High Level Data Link Control) • ISO 9314: FDDI Media Access Control (MAC) ANSI • X3T9.5 and X3T12: Fiber Distributed Data Interface (FDDI) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
  • 12. Topologies Controlling Access to the Media Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
  • 13. Topologies Physical and Logical Topologies Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
  • 14. WAN Topologies Common Physical WAN Topologies Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
  • 15. WAN Topologies Point-to-Point Topology Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
  • 16. WAN Topologies Logical Point-to-Point Topology Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
  • 17. WAN Topologies Half and Full Duplex Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
  • 18. LAN Topologies Physical LAN Topologies Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
  • 19. LAN Topologies Logical Topology for Shared Media Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
  • 20. LAN Topologies Contention-Based Access Characteristics Contention-Based Technologies • Stations can transmit at any time • Collision exist • There are mechanisms to resolve contention for the media • CSMA/CD for 802.3 Ethernet networks • CSMA/CA for 802.11 wireless networks Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
  • 21. LAN Topologies Multi-Access Topology Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
  • 22. LAN Topologies Controlled Access Characteristics Controlled Access Technologies • Only one station can transmit at a time • Devices wishing to transmit must wait their turn • No collisions • May use a token passing method • Token Ring (IEEE 802.5) • Fiber Distributed Data Interface (FDDI) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
  • 23. LAN Topologies Ring Topology Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
  • 24. Data Link Frame The Frame Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
  • 25. Data Link Frame The Header Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
  • 26. Data Link Frame Layer 2 Address Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
  • 27. Data Link Frame The Trailer Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
  • 28. Data Link Frame LAN and WAN Frames Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
  • 29. Data Link Frame Ethernet Frame Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
  • 30. Data Link Frame Point-to-Point Protocol Frame Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
  • 31. Data Link Frame 802.11 Wireless Frame Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
  • 32. Network Access Physical Layer Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
  • 33. Purpose of the Physical Layer The Physical Layer Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
  • 34. Purpose of the Physical Layer Physical Layer Media Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
  • 35. Purpose of the Physical Layer Physical Layer Standards Standard organization Networking Standards ISO • ISO 8877: Officially adopted the RJ connectors (e.g., RJ-11, RJ-45) • ISO 11801: Network cabling standard similar to EIA/TIA 568. EIA/TIA • TIA-568-C: Telecommunications cabling standards, used by nearly all voice, video and data networks. • TIA-569-B: Commercial Building Standards for Telecommunications Pathways and Spaces • TIA-598-C: Fiber optic color coding • TIA-942: Telecommunications Infrastructure Standard for Data Centers ANSI • 568-C: RJ-45 pinouts. Co-developed with EIA/TIA ITU-T • G.992: ADSL IEEE • 802.3: Ethernet • 802.11: Wireless LAN (WLAN) & Mesh (Wi-Fi certification) • 802.15: Bluetooth Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
  • 36. Characteristics of the Physical Layer Physical Layer Functions Media Physical Components Frame Encoding Technique Signalling Method Copper cable • UTP • Coaxial • Connectors • NICs • Ports • Interfaces • Manchester Encoding • Non-Return to Zero (NRZ) techniques • 4B/5B codes are used with Multi-Level Transition Level 3 (MLT-3) signaling • 8B/10B • PAM5 • Changes in the electromagnetic field • Intensity of the electromagnetic field • Phase of the electromagnetic wave Fiber Optic cable • Single-mode Fiber • Multimode Fiber • Connectors • NICs • Interfaces • Lasers and LEDs • Photoreceptors • Pulses of light • Wavelength multiplexing using different colors • A pulse equals 1. • No pulse is 0. Wireless media • Access Points • NICs • Radio • Antennae • DSSS (direct-sequence spread-spectrum) • OFDM (orthogonal frequency division multiplexing) • Radio waves Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
  • 37. Characteristics of the Physical Layer Physical Components Gigabit Ethernet Interfaces SHDSL Interface Management Ports USB Type A Connector FastEthernet Switch ports USB Mini-B Connector Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
  • 38. Characteristics of the Physical Layer Frame Encoding Techniques  Manchester encoding  Non-Return to Zero (NRZ) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
  • 39. Characteristics of the Physical Layer Signaling Method Asynchronous Signal Arbitrary gap of time Synchronous Signal Bursty data Data transitions align with bit time slots Bit time slot Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
  • 40. Characteristics of the Physical Layer Signaling Method Amplitude modulation Frequency modulation Phase modulation Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
  • 41. Characteristics of the Physical Layer Signaling Method Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
  • 42. Characteristics of the Physical Layer Bandwidth Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
  • 43. Characteristics of the Physical Layer Throughput Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
  • 44. Network Media Copper Cabling Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
  • 45. Copper Cabling Characteristics of Copper Media Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
  • 46. Copper Cabling Copper Media Unshielded Twisted Pair (UTP) cable Shielded Twisted Pair (STP) cable Coaxial cable Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
  • 47. Copper Cabling Unshielded Twisted-Pair (UTP) Cable Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
  • 48. Copper Cabling Shielded Twisted-Pair (STP) Cable Braided or Foil Shield Foil Shields Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
  • 49. Copper Cabling Coaxial Cable Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
  • 50. Copper Cabling Cooper Media Safety Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
  • 51. UTP Cabling Properties of UTP Cabling Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51
  • 52. UTP Cabling UTP Cabling Standards Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52
  • 53. UTP Cabling UTP Connectors Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53
  • 54. UTP Cabling Types of UTP Cable Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54
  • 55. UTP Cabling LAN Cabling Areas Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 55
  • 56. UTP Cabling Testing UTP Cables Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 56
  • 57. Fiber Optic Cabling Properties of Fiber Optic Cabling Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 57
  • 58. Fiber Optic Cabling Fiber Media Cable Design Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 58
  • 59. Fiber Optic Cabling Types of Fiber Media Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 59
  • 60. Fiber Optic Cabling Network Fiber Connectors Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 60
  • 61. Fiber Optic Cabling Testing Fiber Cables Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 61
  • 62. Fiber Optic Cabling Fiber versus Copper Implementation issues Copper media Fibre-optic Bandwidth supported 10 Mbps – 10 Gbps 10 Mbps – 100 Gbps Distance Relatively short (1 – 100 meters) Relatively High (1 – 100,000 meters) Immunity to EMI and RFI Low High (Completely immune) Immunity to electrical hazards Low High (Completely immune) Media and connector costs Lowest Highest Installation skills required Lowest Highest Safety precautions Lowest Highest Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 62
  • 63. Network Media Wireless Media Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 63
  • 64. Wireless Media Properties of Wireless Media Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 64
  • 65. Wireless Media Types of Wireless Media • IEEE 802.11 standards • Commonly referred to as Wi-Fi. • Uses CSMA/CA • Variations include: • 802.11a: 54 Mbps, 5 GHz • 802.11b: 11 Mbps, 2.4 GHz • 802.11g: 54 Mbps, 2.4 GHz • 802.11n: 600 Mbps, 2.4 and 5 GHz • 802.11ac: 1 Gbps, 5 GHz • 802.11ad: 7 Gbps, 2.4 GHz, 5 GHz, and 60 GHz • IEEE 802.15 standard • Supports speeds up to 3 Mbps • Provides device pairing over distances from 1 to 100 meters. • IEEE 802.16 standard • Provides speeds up to 1 Gbps • Uses a point-to-multipoint topology to provide wireless broadband access. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 65
  • 66. Wireless Media Wireless LAN Cisco Linksys EA6500 802.11ac wireless router Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 66
  • 67. Wireless Media 802.11 Wi-Fi Standards Standard Maximum Speed Frequency Backwards compatible 802.11a 54 Mbps 5 GHz No 802.11b 11 Mbps 2.4 GHz No 802.11g 54 Mbps 2.4 GHz 802.11b 802.11n 600 Mbps 2.4 GHz or 5 GHz 802.11b/g 802.11ac 1.3 Gbps (1300 Mbps) 2.4 GHz and 5.5 GHz 802.11b/g/n 802.11ad 7 Gbps (7000 Mbps) 2.4 GHz, 5 GHz and 60 GHz 802.11b/g/n/ac Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 67
  • 68. Network Access Summary In this chapter, you learned:  The TCP/IP network access layer is the equivalent of the OSI data link layer (Layer 2) and the physical layer (Layer 1).  The data link layer is responsible for the exchange of frames between nodes over a physical network media.  Among the different implementations of the data link layer protocols, there are different methods of controlling access to the media.  The actual media access control method used depends on the topology and media sharing.  LAN and WAN topologies can be physical or logical. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 68
  • 69. Network Access Summary In this chapter, you learned:  It is the logical topology that influences the type of network framing and media access control used.  WANs are commonly interconnected using the point-to-point, hub and spoke, or mesh physical topologies.  In shared media LANs, end devices can be interconnected using the star, bus, ring, or extended star (hybrid) physical topologies.  All data link layer protocols encapsulate the Layer 3 PDU within the data field of the frame. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 69
  • 70. Network Access Summary In this chapter, you learned:  The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.  Hardware components such as network adapters (NICs), interfaces and connectors, cable materials, and cable designs are all specified in standards associated with the physical layer.  The physical layer standards address three functional areas: physical components, frame encoding technique, and signaling method. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 70
  • 71. Network Access Summary In this chapter, you learned:  Using the proper media is an important part of network communications.  Wired communication consists of copper media and fiber cable.  There are three main types of copper media used in networking: unshielded-twisted pair (UTP), shielded-twisted pair (STP), and coaxial cable. UTP cabling is the most common copper networking media.  Optical fiber cable has become very popular for interconnecting infrastructure network devices. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 71
  • 72. Network Access Summary In this chapter, you learned:  Wireless media carry electromagnetic signals that represent the binary digits of data communications using radio or microwave frequencies.  The number of wireless enabled devices continues to increase.  Wireless has become the medium of choice for home networks and is quickly gaining in popularity in enterprise networks. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 72
  • 73. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 73