42
1 CCNA 1 v3.0 Module 5 Cabling LANs and WANs .

Sem 1 Ch 5

Embed Size (px)

Citation preview

Page 1: Sem 1 Ch 5

1

CCNA 1 v3.0 Module 5 Cabling LANs and WANs

.

Page 2: Sem 1 Ch 5

2

Objectives

Page 3: Sem 1 Ch 5

3

LAN and Physical Layer

Page 4: Sem 1 Ch 5

4

LAN and Physical Layer

Page 5: Sem 1 Ch 5

5

Ethernet Media and Connector Requirements

Page 6: Sem 1 Ch 5

6

Connection Media

Page 7: Sem 1 Ch 5

7

UTP Implementation

Page 8: Sem 1 Ch 5

8

UTP Implementation

Page 9: Sem 1 Ch 5

9

UTP Implementation

Page 10: Sem 1 Ch 5

10

UTP Implementation

Page 11: Sem 1 Ch 5

11

UTP Implementation

Page 12: Sem 1 Ch 5

12

UTP Implementation

Page 13: Sem 1 Ch 5

13

DEVICE CONNECTIONS THROUGH UTP

Straight-through cable for: Switch to Router Switch to PC/Server Hub to PC/Server

Crossover Cable for: Switch to switch Switch to Hub Hub to Hub Router to Router PC to PC Router to PC

Page 14: Sem 1 Ch 5

14

Repeaters

Page 15: Sem 1 Ch 5

15

5-4-3 RULE

Between any two nodes on the network, there can only be a maximum of five segments, connected through four repeaters/Concentrators, and only three of the five segments may contain user connections.

REASONEthernet protocol requires that any signal sent over the LAN must reach every part of LAN within a specified time. Rule ensures this condition. Repeater takes some time to process.Too much latency increases late collisions making LAN less efficient.

Page 16: Sem 1 Ch 5

16

HUBS

•Passive – A passive hub serves as a physical connection point only. It does not boost or clean the signal and does not need electrical power.

•Active – An active hub needs power to repeat the signal before passing it out the other ports.

•Intelligent – Intelligent or smart hubs are active hubs with a microprocessor chip and diagnostic capabilities

•Also called a Concentrator or Multiport Repeater.

Page 17: Sem 1 Ch 5

17

•Devices attached to a hub receive all traffic traveling through the hub.

•The more devices there are attached to the hub, the more likely there will be collisions.

•A collision occurs when two or more workstations send data over the network wire at the same time.

•All data is corrupted when that occurs.

•Every device connected to the same network segment is said to be a member of a collision domain.

Page 18: Sem 1 Ch 5

18

Bridges

Page 19: Sem 1 Ch 5

19

•There are times when it is necessary to break up a large LAN into smaller, more easily managed segments.

•This decreases the amount of traffic on a single LAN and can extend the geographical area past what a single LAN can support.

•The devices that are used to connect network segments together include bridges, switches, routers, and gateways.

•Switches and bridges operate at the Data Link layer of the OSI model.

•The function of the bridge or switch is to make intelligent decisions about whether or not to pass signals on to the next segment of a network.

•They makes these decisions based upon the layer 2 physical address (MAC).

•A switch therefore has two main functions:

•switch data frames

•build and maintain tables If placed strategically, a bridge can greatly improve network performance.

Page 20: Sem 1 Ch 5

20

•If the destination device is on a different segment, the bridge forwards the frame to the appropriate segment.

•If the destination address is unknown to the bridge, the bridge forwards the frame to all segments except the one on which it was received. This process is known as flooding.

Page 21: Sem 1 Ch 5

21

Switches

Page 22: Sem 1 Ch 5

22

Switches

Page 23: Sem 1 Ch 5

23

A switch has many ports with many network segments connected to them. A switch chooses the port to which the destination device or workstation is connected. Ethernet switches are becoming popular connectivity solutions replacing hubs...

•reduces network congestion

•maximizes bandwidth

•reduces collision domain size

Page 24: Sem 1 Ch 5

24

Host Connectivity

Page 25: Sem 1 Ch 5

25

Host Connectivity

Page 26: Sem 1 Ch 5

26

Peer-to-Peer

Page 27: Sem 1 Ch 5

27

1. Two computers typically communicate with each other by using request/response protocols.

2. The requestor takes on the role of a client, and the responder takes on the role of a server.

3. In a peer-to-peer network, networked computers act as equal partners, or peers.

4. As peers, each computer can take on the client function or the server function.

5. Recommended maximum number of peer-to-peer hosts is 10.

6. Each computer control its own resources

Page 28: Sem 1 Ch 5

28

Peer-to-Peer

Page 29: Sem 1 Ch 5

29

•Peer-to-peer networks are relatively easy to install and operate.

•No additional equipment is necessary beyond a suitable operating system installed on each computer.

•Since users control their own resources, no dedicated administrators are needed.

•As networks grow, peer-to-peer relationships become increasingly difficult to coordinate.

•A peer-to-peer network works well with 10 or fewer computers.

•Their efficiency decreases rapidly as the number of computers on the network increases.

•Also, individual users control access to the resources on their computers, which means security may be difficult to maintain.

•The client/server model of networking can be used to overcome the limitations of the peer-to-peer network.

Page 30: Sem 1 Ch 5

30

Client/Server

Page 31: Sem 1 Ch 5

31

Client/Server

•In a client/server arrangement, network services are located on a dedicated server.

•The server is a central computer that is continuously available to respond to requests from clients for file, print, application, and other services.

•Most network operating systems adopt the form of a client/server relationship.

•Typically, desktop computers are the clients and one or more computers with additional processing power, memory, and specialized software function as servers.

Page 32: Sem 1 Ch 5

32

Client/Server•easy to create

•no centralized equipment required

•centralized administrator not required

•centralized security

•centralized backups

•enhanced network services

Page 33: Sem 1 Ch 5

33

Client/Server

Page 34: Sem 1 Ch 5

34

WAN Physical Layer

Page 35: Sem 1 Ch 5

35

WAN Serial Connections

Page 36: Sem 1 Ch 5

36

WAN Serial Connections

Page 37: Sem 1 Ch 5

37

Routers and Serial Connections

Page 38: Sem 1 Ch 5

38

Routers and Serial Connections

Page 39: Sem 1 Ch 5

39

Page 40: Sem 1 Ch 5

40

Page 41: Sem 1 Ch 5

41

Routers and DSL Connections

Page 42: Sem 1 Ch 5

42

Summary