Ccna
Ccna
Ccna
Introduction
1.Computer Network :
2. Network types
2.1 Definition :
Two or more computers connected that allows sharing their data, resources, and
application is called a computer network. The vital computer network is divided into
four types based on their size and functions. They are LAN, MAN, PAN, and WAN.
Here LAN stands for Local Area Network,MAN stands for Metropolitan Area
Network, Personal Area Network is abbreviated into PAN whereas WAN is expanded
as Wide Area Network. PAN is further divided into Wired Personal Area Network and
Wireless Personal Area Network. There are many applications based on the computer
network and each of the broadly divided networks has unique features that are to be
applied accordingly for effective purpose.
It is available at low cost and built with cheaply available hardware such as ethernet
cables, network adapters, and hubs. Here the transfer rate of data is high with minimal
response time. This is a highly safe network less prone to hacks and data loss.
2. PAN(Personal Area Network)
PAN is expanded as Personal Area Network is configured in a person in range of
approximately ten meters and is mostly employed for connecting internet range for
personal usage. It has the coverage range to thirty meters. Personal equipment includes
desktop, laptop, smartphones, game stations, electronic gadgets, and music players.
1. Body Area Network: Body Area Network moves along with a person like a
smartphone or a watch that moves with a person. He can also connect with other
people to interlink the device for sharing the data.
2. Offline Network: The offline network can be deployed inside the house which is
also called a home network. It is planned to connect with television, printers which are
not accessible to the internet.
3. Small Home Office: Small Home office is used to link the devices to cyberspace via
a VPN that is a virtual private network.
Here mostly telephone cables are used to connect LAN to form MAN. The protocols
applied widely in MAN are Frame Relay, ISDN, ATM, ADSL, and RS-232. MAN is
deployed mostly in Airline reservation and establish communication between banking
sectors in a city. It is also deployed in the Military range for effective communications.
It can also be deployed inside the collages within that town.
4. WAN(Wide Area Network)
Wireless Area Network provides services for the user to connect to wireless using
remote or public or private access. The connection is established in a huge geographic
range like a complete city that uses the current network structure of mobile operators.
The WAN started with a standard of 802.20 and is the goal is to achieve optimization
of Mobile Broadband Wireless Access which is called MBWA. This 802.20 standard
stands as a tough competitor for classical models of 2.5 and 3G.
The WWAN successfully made the possibility of superficial voice transfer. It is also
measured in GPS is Global positioning system, General Packet Radio Service is called
as GPRS is, EDGE is abbreviated from Enhanced Data rates for global evolution,
Universal mobile telecommunication system is known as UMTS, HSUPA is a high-
speed uplink packet and HSPDA is a high-speed downlink packet access.
Advantages
The advantages of network technology include the following.
It is extremely flexible
It improves communication & accessibility of information.
It allows for convenient resource sharing.
Files can be easily shared.
It is less cost
Storage capacity will be enhanced.
Disadvantages
The disadvantages of network technology include the following.
3. Network standards
3.1Definition
Networking standards define the rules for data communications that are needed for
interoperability of networking technologies and processes. Standards help in creating
and maintaining open markets and allow different vendors to compete on the basis of
the quality of their products while being compatible with existing market products.
3.2Types of Standards
Standards are of two types
De facto − These are the standards that are followed without any formal plan or
approval by any organization. They have come into existence due to traditions
or facts. For example, the HTTP had started as a de facto standard.
De jure − These standards are the ones which have been adopted through
legislation by any officially recognized standards organization. Most of the
communication standards that are used today are de jure standards.
3.3Standards Organizations
Some of the noted standards organizations are
International Standards Organization (ISO)
International Telecommunication Union (ITU)
Institute of Electronics and Electrical Engineers (IEEE)
American National Standards Institute (ANSI)
Internet Research Task Force (IETF)
Electronic Industries Association (EIA)
4.Network topology
4.1 Definition :
In computer networks, there are mainly two types of topologies, they are:
Physical Topology: A physical topology describes the way in which the computers or
nodes are connected with each other in a computer network. It is the arrangement of
various elements(link, nodes, etc.), including the device location and code installation
of a computer network. In other words, we can say that it is the physical layout of
nodes, workstations, and cables in the network.
Logical Topology: A logical topology describes the way, data flow from one computer
to another. It is bound to a network protocol and defines how data is moved throughout
the network and which path it takes. In other words, it is the way in which the devices
communicate internally.
Network topology defines the layout, virtual shape, or structure of the network, not
only physically but also logically. A network can have one physical topology and
multiple logical topologies at the same time.
In this blog, we will mainly concentrate on physical topologies. We'll learn about
different types of physical topologies, their advantages, and disadvantages.
In a computer network, there are mainly six types of physical topology, they are:
1.Bus Topology
2.Ring Topology
3.Star Topology
4.Mesh Topology
5.Tree Topology
6.Hybrid Topology
When a sender sends a message, all other computers can hear it, but only the receiver
accepts it(verifying the mac address attached with the data frame) and others reject it.
Bus technology is mainly suited for small networks like LAN, etc.
In this topology, the bus acts as the backbone of the network, which joins every
computer and peripherals in the network. Both ends of the shared channel have line
terminators. The data is sent only in one direction and as soon as it reaches the end,
the terminator removes the data from the communication line(to prevent signal
bounce and data flow disruption).
In a ring topology, if a token is free then the node can capture the token and attach
the data and destination address to the token, and then leaves the token for
communication. When this token reaches the destination node, the data is removed
by the receiver and the token is made free to carry the next data.
1. Easy Installation.
2. Less Cabling Required.
3. Reduces chances of data collision(unidirectional).
4. Easy to troubleshoot(the faulty node does not pass the token).
5. Each node gets the same access time.
Following are the disadvantages of Ring topology:
In a star topology, hub and switch act as a server, and the other connected devices act
as clients. Only one input-output port and one cable are required to connect a node to
the central device. This topology is better in terms of security because the data does
not pass through every node.
1. Centralized control.
2. Less Expensive.
3. Easy to troubleshoot(the faulty node does not give response).
4. Good fault tolerance due to centralized control on nodes.
5. Easy to scale(nodes can be added or removed to the network easily).
6. If a node fails, it will not affect other nodes.
7. Easy to reconfigure and upgrade(configured using a central device).
Following are the disadvantages of Star topology:
Mesh Topology
Mesh topology is a computer network topology in which nodes are interconnected
with each other. In other words, direct communication takes place between the nodes
in the network.
There are mainly two types of Mesh:
1. Full Mesh: In which each node is connected to every other node in the
network.
2. Partial Mesh: In which, some nodes are not connected to every node in the
network.
In a fully connected mesh topology, each device has a point to point link with every
other device in the network. If there are 'n' devices in the network, then each device
has exactly '(n-1)' input-output ports and communication links. These links are
simplex links, i.e., the data moves only in one direction. A duplex link(in which data
can travel in both the directions simultaneously) can replace two simplex links.
If we are using simplex links, then the number of communication links will be 'n(n-
1)' for 'n' devices, while it is 'n(n-1)/2' if we are using duplex links in the mesh
topology.
In this topology, all topologies are interconnected according to the needs to form a
hybrid. All the good features of each topology can be used to make an efficient
hybrid topology.
1. Complex design.
2. Expensive to implement.
3. Multi-Station Access Unit(MSAL) required.
4.4 Important of network topology
Functions on demand: In recent times, networks have been widely used. It is used to
characterize and create sophisticated prototypes in a variety of economic, technical,
and biological precompiled systems. The topology of massive social, technological,
and biological systems like the WWW or similar interface networks has gotten a lot of
attention. The development of the network has been studied by computer network
specialists. And per the investigation, numerous topological properties may be
classified as scale-free-like, broad-tailed and influential connections. This may be
accomplished through its diverse scopes and functionalities.
A network consists of multiple computers connected using some interface. Each has
one or more interface devices such as a Network Interface Card (NIC) and a serial
device for PPP networking. Each computer is supported by network software that
provides the server or client functionality. The hardware used to transmit data across
the network is called the media. It may include copper cable, fiber optic, or wireless
transmission. The standard cabling used for this document is the 10Base-T category 5
Ethernet cable. It is twisted copper cabling, which appears at the surface to look
similar to TV coaxial cable. It is terminated on each end by a connector that looks
much like a phone connector. Its maximum segment length is 100 meters.
In a peer-to-peer network, various computers on the network can act both as clients
and servers. For instance, many Microsoft Windows-based computers will allow file
and print sharing. These computers can work both as clients and servers and are also
referred to as peers. Many networks are a combination of peer-to-peer and server-
based networks. The network operating system uses a network data protocol to
communicate on the net to other computers. The network operating system supports
the applications on that computer. A Network Operating System (NOS) includes
Windows NT, Novell Netware, Linux, Unix, and others.
5 . Network communication
5.1 Definition:
1. Vertical Network
The communication which passes from one person or process to another person or
process in a vertical pattern is called Vertical Network. It can happen either in the top
response as the receiver receives the information faster than any other network. We
can call this network as a formal network. The best example is the communication
between top level and bottom level employees. Miscommunication does not happen in
to top communication does not happen. Superiors ordering the subordinates is the best
example of this type of network. Also, the leader leading the group of people is an
example of Chain Network. The message has to reach from top-level to bottom level
without any alteration of meaning or words. Care should be taken to avoid the same.
This network is not fast and few people who don’t understand the message will remain
in the loop.
3. Circuit Network
When the communication between two people happens simultaneously in a circuit is
called Circuit Network. Though it works like Vertical Network, there are no superiors
or subordinates or at least not considered like them. Here the communication is a two-
in the network. The entire network is highly centralized format and expects immediate
feedback once the message is given to the receiver. And due to this, we can call this
Chain Network. Since the information is received directly from the central authority,
network enables people to communicate with each other or with people who are
wheel network with no central person to control the way of communication. All are
free to communicate with each other. No restrictions are present to block the
Star Network.
the same network should be clear and should be free from any jargon. Active
voice should be preferred and the message should be in simple words and short.
If the message is long, it is better to transfer the message with bulleted points.
The message has to be concise which only then the listener be careful to read
with full attention and with no loss of concentration. Long or lengthy messages
should be avoided at any cost. People will not have enough patience to read the
The message passed should be explained well with concrete information. False
mishaps.
The messages should be passed in relevant order. It is not good if the message
is passed saying the end in the beginning or finishing the message without full
The transmitter person should be honest, respecting others and open with the
listener at the bottom level or end of the conversation. The transmitter should be
considerate with the listener and should use polite words. The messenger should
not be rude at all as the rude messenger will not find any receptors for his
racist and should never use such terms while passing the information. All the
persons in the other end receiving the information should be considered equal
and should never use inconsiderate words while transmitting the information.
The listener also plays an important role in the communication network. They
should understand the information very well and should clarify the same if
possible. The message should be detected from the mixed words, non-verbal
Care should be there from the listener’s side to focus the message when it is
not use his knowledge to pass information to other people in the loop. The
focus should only be on the information passed from the top level.
The type of network to be used depends on the message to be passed from one level to
another. Also, security has to be considered for the network communication. Each