SlideShare una empresa de Scribd logo
1 de 17
The Basics of Computer Networking
An introduction to Network+
Presented by Daniel Cummins
© Global Knowledge Training LLC. All rights reserved. Page 2
Presenter
Daniel Cummins
Daniel Cummins is a CompTIA Certified Technical Trainer
(CTT+) and has been CompTIA certified since 2010, having
passed all of the Core and Cybersecurity exams. Including
recertification, Daniel has taken and passed more than a
dozen CompTIA exams. He also maintains his Cisco Certified
Network Administrator certification.
What Is Computer Networking?
A computer network
consists of:
Two or more devices
connected by media
Apps to support sharing
Media
1-2
Building Blocks of Networks
Devices
Applications
Networks
Computers Servers Printers Disk drives
File transfers E-mail Imaging
andLANs WANs
Cables Routers Switches
TCP/IP
1-4
End-User Devices
Mobility is important.
Network connections are
essential.
OS must be designed for
networking.
Resources
1-5
Network Resources
Printer Servers NAS storage
1-7
Switches and Access Points
Access switches connect
end-users.
Core switches connect
switches and shared
resources.
APs connect wireless
devices.
Wireless AP
Switch
1-9
Routers
Routers connect one
network to others.
Routers control
communications.
Wireless router
Router
1-11
Media
Different types of signals
are transmitted over
different media.
Electricity is
transmitted
over copper
Radio frequencies
are transmitted
through air
Light is transmitted
over optical fiber
1-8
Network Types
PAN LAN CAN
MAN WAN
1-15
Network Topologies
A topology is the physical
layout of the connection.
7-17
The TCP/IP Networking Model
Layer Name Function Examples
Application Define applications protocol functions FTP, SSH, DNS
Transport Manage communication sessions TCP, UDP
Internet IP addressing, routing IPv4, RIP, IPv6
Network interface Physical transmission Ethernet, Wi-Fi
1-6
Peer-To-Peer Protocols: Actual Flow
From Patrick To Margaret
Application
Transport
Internet
Network interface
Application
Transport
Internet
Network interface
Data
AH
AH
AH TH
TH IHAH
AH
AH TH
AH TH IH NH
IH
TH
AH
TH
IH
NH
1-8
Peer-To-Peer Protocols: Effective Flow
Application
Transport
Internet
Network interface
Application
Transport
Internet
Network interface
1-8
Internet Access Technologies
Dial-up modem
DSL
Cable modem
WiMax
Cellular data
Wi-Fi hot spot
Satellite
Internet
Mobile user Branch site
12-30
Activity: Build a LAN
In this activity, you will arrange network components properly to build a LAN with
a connection to a WAN.
Click GO to start the activity. Once it opens, drag each network component or
technology into the appropriate box in the network diagram to complete the
diagram.
GO
© Global Knowledge Training LLC. All rights reserved. Page 17
Courses
Networking Basics:
Understanding Networking
Fundamentals
CompTIA Network+
Certification Prep
(N10-007)

Más contenido relacionado

La actualidad más candente

Introduction to Network Applications & Network Services
Introduction to  Network Applications &  Network ServicesIntroduction to  Network Applications &  Network Services
Introduction to Network Applications & Network ServicesMuhammadRizaHilmi
 
Network servers
Network serversNetwork servers
Network serversOnline
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Alan Mark
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networksTatheer Fatima
 
Introduction of computer network
Introduction of computer networkIntroduction of computer network
Introduction of computer networkVivek Kumar Sinha
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals Kirti Verma
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network TroubleshootingJoy Sarker
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devicesNumaan Tole
 
Network and Protocol
 Network and Protocol Network and Protocol
Network and ProtocolSaif Muttair
 
Introduction to network
Introduction to networkIntroduction to network
Introduction to networkDhani Ahmad
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of NetworkingMukesh Tekwani
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentalsjpprakash
 
Networking concepts
Networking conceptsNetworking concepts
Networking conceptsritajindal2
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networkingkieshore
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsRajet Veshin
 

La actualidad más candente (20)

Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Introduction to Network Applications & Network Services
Introduction to  Network Applications &  Network ServicesIntroduction to  Network Applications &  Network Services
Introduction to Network Applications & Network Services
 
Network servers
Network serversNetwork servers
Network servers
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networks
 
Introduction of computer network
Introduction of computer networkIntroduction of computer network
Introduction of computer network
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network Troubleshooting
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devices
 
Network and Protocol
 Network and Protocol Network and Protocol
Network and Protocol
 
Introduction to network
Introduction to networkIntroduction to network
Introduction to network
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 

Similar a The Basics of Computer Networking

Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applicationsjajinekkanti
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)nnmaurya
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jhamanish jha
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha
 
thebasicsofcomputernetworking-190520201622.pdf
thebasicsofcomputernetworking-190520201622.pdfthebasicsofcomputernetworking-190520201622.pdf
thebasicsofcomputernetworking-190520201622.pdfMarkJunniesNarido
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Lakeisha Jones
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XIIDeepak Singh
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networkingshankars73
 
Itmg360 chapter one_v05
Itmg360 chapter one_v05Itmg360 chapter one_v05
Itmg360 chapter one_v05raj_rohit
 
DevOps Project Training | DevOps Training in Ameerpet.pdf
 DevOps Project Training  |  DevOps Training in Ameerpet.pdf DevOps Project Training  |  DevOps Training in Ameerpet.pdf
DevOps Project Training | DevOps Training in Ameerpet.pdfTalluriRenuka
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital SecurityLindsey Jones
 
This course introduces students to issues in IT infrastructu.docx
This course introduces students to issues in IT infrastructu.docxThis course introduces students to issues in IT infrastructu.docx
This course introduces students to issues in IT infrastructu.docxchristalgrieg
 

Similar a The Basics of Computer Networking (20)

Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 
Basics of Computer Networks
Basics of Computer NetworksBasics of Computer Networks
Basics of Computer Networks
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jha
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics Requriement
 
MUSIC.pptx
MUSIC.pptxMUSIC.pptx
MUSIC.pptx
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
thebasicsofcomputernetworking-190520201622.pdf
thebasicsofcomputernetworking-190520201622.pdfthebasicsofcomputernetworking-190520201622.pdf
thebasicsofcomputernetworking-190520201622.pdf
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1
 
Week11
Week11Week11
Week11
 
Week11
Week11Week11
Week11
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
Week11
Week11Week11
Week11
 
Networking.pptx
Networking.pptxNetworking.pptx
Networking.pptx
 
Itmg360 chapter one_v05
Itmg360 chapter one_v05Itmg360 chapter one_v05
Itmg360 chapter one_v05
 
DevOps Project Training | DevOps Training in Ameerpet.pdf
 DevOps Project Training  |  DevOps Training in Ameerpet.pdf DevOps Project Training  |  DevOps Training in Ameerpet.pdf
DevOps Project Training | DevOps Training in Ameerpet.pdf
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
 
This course introduces students to issues in IT infrastructu.docx
This course introduces students to issues in IT infrastructu.docxThis course introduces students to issues in IT infrastructu.docx
This course introduces students to issues in IT infrastructu.docx
 

Más de Global Knowledge Training

PAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention EverywherePAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention EverywhereGlobal Knowledge Training
 
How To Troubleshoot Group Policy in Windows 10
How To Troubleshoot Group Policy in Windows 10How To Troubleshoot Group Policy in Windows 10
How To Troubleshoot Group Policy in Windows 10Global Knowledge Training
 
Why Pentesting is Vital to the Modern DoD Workforce
Why Pentesting is Vital to the Modern DoD WorkforceWhy Pentesting is Vital to the Modern DoD Workforce
Why Pentesting is Vital to the Modern DoD WorkforceGlobal Knowledge Training
 
Develop Your Skills with Unlimited Access to Red Hat Online Learning
Develop Your Skills with Unlimited Access to Red Hat Online LearningDevelop Your Skills with Unlimited Access to Red Hat Online Learning
Develop Your Skills with Unlimited Access to Red Hat Online LearningGlobal Knowledge Training
 
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7Global Knowledge Training
 
What’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification JourneyWhat’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification JourneyGlobal Knowledge Training
 
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined NetworksCisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined NetworksGlobal Knowledge Training
 
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Global Knowledge Training
 
The Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your OrganizationThe Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your OrganizationGlobal Knowledge Training
 
How to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your OrganizationHow to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your OrganizationGlobal Knowledge Training
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?Global Knowledge Training
 
How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success Global Knowledge Training
 
Tackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People ManagementTackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People ManagementGlobal Knowledge Training
 

Más de Global Knowledge Training (20)

Taking Advantage of Microsoft PowerShell
Taking Advantage of Microsoft PowerShell Taking Advantage of Microsoft PowerShell
Taking Advantage of Microsoft PowerShell
 
PAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention EverywherePAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention Everywhere
 
How To Troubleshoot Group Policy in Windows 10
How To Troubleshoot Group Policy in Windows 10How To Troubleshoot Group Policy in Windows 10
How To Troubleshoot Group Policy in Windows 10
 
Accelerating with Ansible
Accelerating with AnsibleAccelerating with Ansible
Accelerating with Ansible
 
Why Pentesting is Vital to the Modern DoD Workforce
Why Pentesting is Vital to the Modern DoD WorkforceWhy Pentesting is Vital to the Modern DoD Workforce
Why Pentesting is Vital to the Modern DoD Workforce
 
How to Maximize Your Training Budget
How to Maximize Your Training BudgetHow to Maximize Your Training Budget
How to Maximize Your Training Budget
 
Develop Your Skills with Unlimited Access to Red Hat Online Learning
Develop Your Skills with Unlimited Access to Red Hat Online LearningDevelop Your Skills with Unlimited Access to Red Hat Online Learning
Develop Your Skills with Unlimited Access to Red Hat Online Learning
 
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
 
What’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification JourneyWhat’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification Journey
 
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined NetworksCisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
 
How to Build a Web Server with AWS Lambda
How to Build a Web Server with AWS LambdaHow to Build a Web Server with AWS Lambda
How to Build a Web Server with AWS Lambda
 
The Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your OrganizationThe Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your Organization
 
How to Migrate a Web App to AWS
How to Migrate a Web App to AWSHow to Migrate a Web App to AWS
How to Migrate a Web App to AWS
 
How to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your OrganizationHow to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your Organization
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?
 
How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success
 
How to Avoid Cloud Migration Pitfalls
How to Avoid Cloud Migration PitfallsHow to Avoid Cloud Migration Pitfalls
How to Avoid Cloud Migration Pitfalls
 
Tackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People ManagementTackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People Management
 

Último

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 

Último (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 

The Basics of Computer Networking

  • 1. The Basics of Computer Networking An introduction to Network+ Presented by Daniel Cummins
  • 2. © Global Knowledge Training LLC. All rights reserved. Page 2 Presenter Daniel Cummins Daniel Cummins is a CompTIA Certified Technical Trainer (CTT+) and has been CompTIA certified since 2010, having passed all of the Core and Cybersecurity exams. Including recertification, Daniel has taken and passed more than a dozen CompTIA exams. He also maintains his Cisco Certified Network Administrator certification.
  • 3. What Is Computer Networking? A computer network consists of: Two or more devices connected by media Apps to support sharing Media 1-2
  • 4. Building Blocks of Networks Devices Applications Networks Computers Servers Printers Disk drives File transfers E-mail Imaging andLANs WANs Cables Routers Switches TCP/IP 1-4
  • 5. End-User Devices Mobility is important. Network connections are essential. OS must be designed for networking. Resources 1-5
  • 7. Switches and Access Points Access switches connect end-users. Core switches connect switches and shared resources. APs connect wireless devices. Wireless AP Switch 1-9
  • 8. Routers Routers connect one network to others. Routers control communications. Wireless router Router 1-11
  • 9. Media Different types of signals are transmitted over different media. Electricity is transmitted over copper Radio frequencies are transmitted through air Light is transmitted over optical fiber 1-8
  • 10. Network Types PAN LAN CAN MAN WAN 1-15
  • 11. Network Topologies A topology is the physical layout of the connection. 7-17
  • 12. The TCP/IP Networking Model Layer Name Function Examples Application Define applications protocol functions FTP, SSH, DNS Transport Manage communication sessions TCP, UDP Internet IP addressing, routing IPv4, RIP, IPv6 Network interface Physical transmission Ethernet, Wi-Fi 1-6
  • 13. Peer-To-Peer Protocols: Actual Flow From Patrick To Margaret Application Transport Internet Network interface Application Transport Internet Network interface Data AH AH AH TH TH IHAH AH AH TH AH TH IH NH IH TH AH TH IH NH 1-8
  • 14. Peer-To-Peer Protocols: Effective Flow Application Transport Internet Network interface Application Transport Internet Network interface 1-8
  • 15. Internet Access Technologies Dial-up modem DSL Cable modem WiMax Cellular data Wi-Fi hot spot Satellite Internet Mobile user Branch site 12-30
  • 16. Activity: Build a LAN In this activity, you will arrange network components properly to build a LAN with a connection to a WAN. Click GO to start the activity. Once it opens, drag each network component or technology into the appropriate box in the network diagram to complete the diagram. GO
  • 17. © Global Knowledge Training LLC. All rights reserved. Page 17 Courses Networking Basics: Understanding Networking Fundamentals CompTIA Network+ Certification Prep (N10-007)

Notas del editor

  1. Instructor Notes The preferred method of execution for this activity is to have students click GO on the slide from their Adobe Connect window. If for any reason students have trouble executing the file this way, use one of the preferred methods described below the correct answers (listed below). The activity is drag and drop. The network components are listed in the lower right corner of the screen. Students complete the exercise by dragging each component to the correct box in the network diagram. As a debrief, you might launch the activity yourself and show students the correct answers. The correct answers are as follows: 802.11n medium: Radio waves Box to right of 802.11n medium: WAP 802.11n collision handling: CSMA/CA 802.3 medium: Ethernet cable Box to right of 802.3 medium: Access switch 802.3 collision handling: CSMA/CD Box to right of core switch: Router Box to left of WAN cloud: Firewall Alternate File Execution Method: Individual Exercise In virtual and C+V classes, this activity can be accomplished as an individual exercise. Load the 3705_IT_Funds_9-LAN.swf file into a share pod in Adobe Connect to launch the activity. (The file is located in the Energizers folder in the IT Fundamentals folder in the Shared Content library.) Once you open the file, make sure the Sync button is not pressed. Students should now be able to complete the exercise on their own. Alternate File Execution Method: Class Exercise In ILT classes (and as an alternative method of delivery in virtual and C+V classes), conduct this activity as a class exercise. Go through and answer the activity as a class, with students offering suggestions on correct answers. NOTE! The file is located in the Adobe Connect Shared Content library. If you are teaching an ILT class, you will need to log into Adobe Connect to run the file from this location. As an alternative, you can run the file directly—3705_IT_Funds_9–LAN.swf—which is provided as part of the slides Zip package on the FTP.