Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
CCENT/CCNA: ICND1 100-105 Certification Guide
CCENT/CCNA: ICND1 100-105 Certification Guide

CCENT/CCNA: ICND1 100-105 Certification Guide: Learn computer network essentials and enhance your networking skills by obtaining the CCENT certification

eBook
$17.99 $25.99
Paperback
$32.99
Subscription
Free Trial
Renews at $19.99p/m

What do you get with Print?

Product feature icon Instant access to your digital eBook copy whilst your Print order is Shipped
Product feature icon Paperback book shipped to your preferred address
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Table of content icon View table of contents Preview book icon Preview Book

CCENT/CCNA: ICND1 100-105 Certification Guide

Introduction to Computer Networks

This chapter is designed to provide you with an introduction to computer networks. It begins with the evolution of Advanced Research Projects Agency Network (ARPANET) to the internet, and then continues with the explanation of the computer network concept. This chapter discusses the types of networks, topologies, components, architectures, network operating systems (NOSs), and network media where definitions such as personal area network (PAN), local area network (LAN), metropolitan area network (MAN), wide area network (WAN), bus, ring, star, extended star, hierarchical, mesh, hosts, nodes, peer-to-peer, and clients/servers are explained. The chapter concludes with a discussion about converged networks, and the current and future computer network trends. To facilitate the understanding of the many definitions covered in this chapter, a large part of the definitions are illustrated with relevant figures.

In this chapter, we will cover:

  • Understanding ARPANET and the internet
  • Understanding computer networks
  • Understanding types of computer networks
  • Understanding computer network topologies
  • Understanding computer network components
  • Understanding computer network architectures
  • Understanding network operating systems
  • Understanding network medium
  • Understanding converged networks
  • Understanding computer network trends

From ARPANET to internet

No one can explain the history of the internet better than the internet itself! Everything started with the US government's project to build a stable and tolerant-in-defects communication network known as the Defense Advanced Research Projects Agency (DARPA). The involvement of research centers and academic institutions in the DARPA project made this project gradually evolve into the ARPANET and the Military Network (MILNET). While the MILNET project was tasked to support operational requirements, the ARPANET project was undertaken to support the need for research (https://www.internetsociety.org/). That said, from 1962 to 1985, the internet already had built its profile. Thus, based on the saying "every new beginning is some beginning’s end", the appearance of the internet on the global computer network stage formally marked the end of the ARPANET's golden era.

According to the internetsociety.org, on October 24, 1995, the Federal Networking Council (FNC) through a resolution, priory consulted with members of the internet community and intellectual property rights, defined the term internet. According to that resolution, the internet refers to the global information system, which:

  • Is logically connected by a global unique address space based on the Internet Protocol (IP) or its subsequent updates;
  • Is able to support the communication through a TCP/IP protocol suite or its subsequent updates and other compatible protocols, and;
  • Provides, uses and makes accessible, either publicly or privately, high-level layered services on the communications and related infrastructure described in that document.

Over time, the development and advancement of computer network technologies took place. Thus, the need to connect and interconnect more computers to computer networks, and with it, more geographical locations, created a need for well-defined terms and concepts to describe computer networking. Because of this, types of computer networks, computer network topologies, computer network architectures, and computer network components were born. Certainly, a computer network represents one of the biggest inventions of mankind in the field of communications. Simply, mention the internet and one will immediately understand how huge the benefit of a computer network is to humanity.

You can learn about the brief history of the internet from https://www.internetsociety.org/internet/history-internet/.

What is a computer network?

Before defining computer network, let’s first look at the general term of a network in order to then recognize the computer network definition in particular. If you do a search for the word network in the Merriam-Webster dictionary, you’ll find the definition that a "network is a group of people or organizations that are closely linked and that work with each other." On the same Merriam-Webster dictionary, the phrase networking is defined as "exchange of information or services among individuals, groups or institutions." Both of these definitions will serve us in a simple, clear, and concrete way to define computer network in the following paragraph.

From what was said in the preceding paragraph, a computer network is a group of computers connected to each other in order to share resources. When talking about resources, usually the resources can be data, network services, and peripheral devices. So, anyone who has experience with computer networks has seen that it is very easy to share files, applications, printers, and other peripheral devices in computer networks. Figure 1.1 presents an example of a computer network:

Figure 1.1. Computer network
You can learn more about computer networks at https://www.computerhope.com/jargon/n/network.htm.

Requirements for designing a computer network

Of course, the most beautiful part of a computer network is how to design and build one. Computer network design and deployment is Designing and deploying is linked to its definition. Thus, the fundamental requirement for designing a computer network is that there must be two or more computers. Depending on the number of computers on the network and how they access the resources from the same network determines the categorization of computer network types, which will be explained in the following section.

Types of computer networks

Over time, the desire to implement the first computer network, as a result of curiosity, had already been converted to a need that would fulfill the requirements. Precisely, it also led to the development and advancement of computer networking technologies. Thus, the need to connect and interconnect more computers into computer networks, and with it, more locations, in itself resulted as the need to define topologies, architectures, technologies, and computer networking categories. In this way, the types of computer networks like PAN, LAN, MAN, and WAN were born.

You can learn more about types of computer networks at https://www.lifewire.com/lans-wans-and-other-area-networks-817376.

Personal area network (PAN)

A PAN is defined as a computer network that is used to connect and transmit data among devices located in a personal area, usually over Bluetooth or Wi-Fi to interconnect devices (see Figure 1.2). Occasionally, this computer network is called a home area network (HAN) too:

Figure 1.2. Personal Area Network (PAN)

Local area network (LAN)

To understand the LAN, let's compare it with the PAN. A PAN is dominated by portable devices (for example, smartphone), while a LAN mainly consists of fixed devices. Both computer networks are covering the local area; however, the LAN has a greater coverage than the PAN, because the LAN usually can cover the floor of the building, several floors of the building, an entire building, or even a few buildings that are close to one another. From that, the main difference is that a PAN is mainly organized around an individual, while a LAN is organized around an organization, business, or legal entity. This then precisely defines the LAN as a computer network that connects two or more computers in a local area for the purpose of sharing resources, as in Figure 1.1.

Metropolitan area network (MAN)

From the standpoint of coverage, the MAN is bigger than the LAN and smaller than the WAN, whilst from the viewpoint of data transmission speeds, the MAN is faster than both the LAN and WAN. As it was with the PAN and LAN, the reason for the MAN's existence is the need for sharing and accessing the resources in the city or metro. From that, a MAN represents a group of LANs interconnected within the geographical boundary of a town or city, as in Figure 1.3:

Figure 1.3. Metropolitan Area Network (MAN)

Wide area network (WAN)

Areas that are not covered by a LAN or MAN are covered by a WAN. Thus, a WAN is a computer network that covers a wide geographic area using dedicated telecommunication lines such as telephone lines, leased lines, or satellites. That being said, unlike other computer networks which have geographic restrictions of their physical reach, WAN does not. From that, it is obvious that WANs are made up of PANs, LANs, and MANs (see Figure 1.4). With that in mind, the best example of a WAN is the internet:

Figure 1.4. Wide Area Network (WAN)

Intranet

The intranet is a networking platform primarily designed for employees. That said, it is considered to be the private network of an organization where employees can access network services. The intranet is not just a portal; instead, it is a network that consists of hardware and software too. To better understand it, consider the intranet as an organization's extended LAN, or MAN, or even WAN network. It consists of multiple cables, network devices such as switches, routers, microwave and satellite antennas, access points, servers, computers, and various applications. All that enables employees to communicate, develop content, collaborate in joint projects, and get the job done.

Extranet

In contrast, the extranet can be thought of as an intranet with a controlled access. Like the intranet, the extranet is a networking platform too; however, besides employees, the extranet enables controlled access to an organization's intranet for authorized partners, suppliers, customers, or others business-related individuals and organizations outside the company. Specifically, the extranet represents a controlled access method of the organization's intranet using internet infrastructure.

Computer network topologies

Another way to categorize computer networks is by their topology, or the way in which hosts and nodes are arranged and connected to one another, and how they communicate. The computer network mainly recognizes two types of topologies: physical, and logical.

You can learn more about computer network topologies at http://www.certiology.com/computing/computer-networking/network-topology.html.

Physical topology

Physical topology presents ordering, arrangement, and placement of the physical parts of a computer network, such as computers, peripheral devices, cables for data transmission, and network equipment. Thus, the physical topology of the computer network actually represents its physical structure, which is usually presented in the following shapes: bus, ring, star, extended star, hierarchical, and mesh.

Bus

Bus is the physical topology in which computers, peripheral and network devices are connected through the bus that mainly consists of a coaxial cable (see Figure 1.5):

Figure 1.5. Bus physical topology

Ring

Ring is the physical topology in which computers, peripheral and network devices form a closed cycle that takes the shape of a ring network where each device is connected to each other (see Figure 1.6). In the past, the coaxial cable was used, but nowadays in dual ring networks, optical fiber is used:

Figure 1.6. Ring physical topology

Star

Star is the physical topology in which computers, peripheral and network devices are connected independently with a central device (see Figure 1.7). For this type of topology, mainly a twisted pair cable is used:

Figure 1.7. Star physical topology

Extended star

Extended star is the physical topology in which computers and peripheral and network devices are connected into two or more star topology networks and then the central components (that is, switches) are interconnected over a bus. In appearance, this type of topology combines star and bus topologies (see Figure 1.8). Mainly, a twisted cable pair is used for the star topology, while an optical fiber is used for the bus topology:

Figure 1.8. Extended star physical topology

Hierarchical

Hierarchical is the physical topology that represents a combination of star and bus topologies. This topology must have at least three levels of hierarchy in which star topologies connect one or more nodes to a single main node, so that all these together are related to the main trunk of the tree (see Figure 1.9). As in the case of an extended star topology, this topology uses twisted pair cables and optical fiber:

Figure 1.9. Hierarchical physical topology

Mesh

Mesh is the physical topology in which each computer is connected with every computer to form the network (see Figure 1.10). Usually, this type of topology is utilized by a WAN to interconnect LANs:

Figure 1.10. Mesh physical topology

Logical topology

Unlike physical topology, logical topology represents the logical aspect of the computer network. In logical topology, it is the logical paths that are used to carry electric or light signals from one computer to another, or from one network node to another node. Thus, this topology represents the way in which the data accesses the transmission medium and transmits packets through it. Figure 1.11 presents the logical topology with its logical components such as computer names, network equipment, network communication technology, and IP addresses:

Figure 1.11. Logical topology

Computer network components

Obviously, when talking about computer networks it is essential to mention components of a computer network, because computer networks are ultimately composed of their constituent components. Usually, computers and peripheral devices are just some of the computer network components known to most people; however, there are also intermediary devices and network media.

Knowing that the primary purpose of the computer networks has to do with sharing resources, it is very important to understand the process of how the resources are both shared and accessed. Here comes into play the concept of the client and the server, where the client is the one that always requests resources, and the server is the one that provides the requested resources. To better understand clients and servers, as well as the concept of requesting and providing resources, the following sections explain the network components.

You can learn more about computer network components at https://en.wikiversity.org/wiki/Basic_computer_network_components.

Clients

Now, going back to the concepts of requesting a resource and providing a resource, actually, that is what is shaping the definition of clients and servers in the computer network. Clients, in most cases, are computers that request the resources in a computer network. Clients have an active role in the computer network (see Figure 1.11).

Servers

Furthermore, servers are network components that provide resources to clients. Servers too have an active role. The following figure, Figure 1.1, presents the server with a shared printer in the role of the resource provider, and the PC and laptop in the role of resource requesters.

Hosts and nodes

When talking about hosts and nodes, although their first impression might drive us towards thinking that they are the same thing, in fact they are not! The difference between hosts and nodes is that, while all hosts can be nodes, not every node can act as a host. That way, to every host there is an assigned IP address. So, a host is any device with an IP address that requests or provides networking resources to any other host or node on the network; however, there are devices such as hubs, bridges, switches, modems, and access points that have no IP address assigned, but are still used for communications. That said, a node is any device that can generate, receive, and transmit the networking resources on the computer network but has no interface with an IP address. Based on that, in Figure 1.1, server, smartphone, PC, and laptop are hosts, while switch and Access Point (AP) act as nodes.

Network interface

A network interface is a component-like network card or LAN port on network equipment that enables clients, servers, peripheral devices, and network equipment to get connected and communicate with each other. The network interface has both a passive and an active (manageable network equipment) role in the computer network (see Figure 1.12):

Figure 1.12. Network interface card (NIC)

Peripheral devices

Peripheral devices are printers, scanners, storage area networks (SANs), and any other peripheral device that provides resources to clients, either through a LAN or as a shared device on a network. These devices play both a passive and an active (like SAN and NAS) role in the computer network:

Figure 1.13. Storage area network (SAN)

Applications and shared data

Applications and shared data are virtual network components that represent applications and files shared on the network that are usually provided by servers. These components themselves play a passive role in the computer network, but the server that hosts these services plays an active role in the computer network.

Hubs and switches

Hubs and switches are acting as central components (in Ethernet communication technology) of the computer network to enable interconnection and communication between clients, servers, and peripheral devices, as in Figure 1.14 . Most hubs are passive devices, while switches play an active role in the computer network:

Figure 1.14. Stack of Cisco switches

Routers

Routers (see Figure 1.15) are computer network components that enable routing of the data (that is, packets) from a LAN to the internet, and vice versa. Routers have an active role in the computer network:

Figure 1.15. Stack of Cisco routers

Infrastructure components

Network infrastructure is also the part of the discussion when we discuss about network components. So, of course, the question is, what is network infrastructure? In its simple format the answer would be that network infrastructure is any physical and logical network component that enables connection, communication, operation, management, and security of the network.

Firewall

No matter what professional background you might have, it is just enough to get to know the name of the firewall and you will immediately think that there is no joke with such device. Leaving the humor aside, a firewall (see Figure 1.16) is a network device that provides security to the network infrastructure. It does so by controlling and monitoring both incoming and outgoing traffic based on configured security rules. In a nutshell, the firewall to a network infrastructure is like a security officer at an organization's main gate:

Figure 1.16. Cisco firewall

Wireless access point

Nowadays, we often hear expressions like "I got connected to the internet with wireless" or "I've found an open wireless." This and many other similar expressions make us understand that the discussion is about the access point. That said, an AP (see Figure 1.17), often known as a wireless access point, is a network device that enables access to the wired network. With APs in a network infrastructure, the network becomes more accessible by enabling the access to organization services while on the go. In addition, it enables the support for the new trends like Bring Your Own Devices (BYOD):

Figure 1.17. Stack of access points (APs)

Wireless access controller

Since network infrastructure has many network devices, including APs for the security purposes as well as for the quality of services (QoS), organizations will employ a wireless access controller. It is a networking device that enables organizations to centrally manage APs.

Computer network architectures

When talking about computer networks, actually we are talking about the essential and broader concept of the elements that make up a computer network. In this form of discussion, while the computer network types deal with the area coverage, the physical and logical topologies deal with the physical arrangement and logical structure of the computer network. Having said that, the computer network architecture represents the computer network design that allows the computer network components to communicate with one another.

You can learn more about computer network architectures at https://it.toolbox.com/blogs/craigborysowich/network-architecture-types-092110.

Peer-to-peer networking (P2P)

Peer-to-peer is a computer network in which the participating computers do not play the predefined roles in the network, but instead they change roles from client to server, and vice versa, based on the actual activity on the network. For example, if computer A is accessing resources from computer B, then computer A acts as the client, while computer B acts as the server. After some time, if computer B accesses resources from computer A, then computer B becomes a client and computer A becomes a server. As you may notice, they switch roles based on who is requesting and who is providing a resource on the network. Figure 1.18 presents an example of peer-to-peer networking:

Figure 1.18. Peer-to-peer computer network

Client/server networking

Client/server is a computer network in which participating computers have a predefined role. That means that, in this computer network architecture, computers that access resources act as clients, while computers that provide resources act as servers. In general, this is a computer network architecture with dedicated servers that provide resources on the network. Midsize and enterprise computer networks are the best example of the client/server computer network. Figure 1.19 presents an example of client/server networking:

Figure 1.19. Client/server computer network

Network operating system (NOS)

An NOS is software that, alongside the execution of common computer programs, enables the provision of network services too. The most common network services are file and print sharing; however, today's NOSs are noticeably more advanced. Thus, NOS enables you to configure network services such as directory services, web server, mail server, database server, proxy server, DHCP server, remote access server, and many more. Just as the services provided by NOS are varied, the NOS itself is different too. So, the most popular NOSs today are Windows Server, Linux Server, and macOS X server.

Windows

The Windows Server (see Figure 1.20) is Microsoft's OS designed for servers. It is a Graphical User Interface (GUI)-based OS; however, since Windows Server 2008, there is a Server Core option that is based on the Command Line Interface (CLI). As of the Windows Server 2012 R2 version, they are offered only in 64-bit platform. The New Technology File System (NTFS) continues to be Microsoft's Windows Server filesystem; however, Windows Server 2012 has introduced the Resilient File System (ReFS) as an attempt to succeed the NTFS:

Figure 1.20. Login screen in Windows Server 2016

Linux

If there is something worth mentioning in the world of information technology in general, operating systems in particular, it is unequivocally the Linux OS (see Figure 1.21). That is because the world of technology knows no innovative initiative to have gathered more volunteers than Linux itself. Unlike Windows Server, known to be proprietary OS, Linux server is licensed under the GNU GPL (free software license) and distributed by several distros such as Red Hat, SUSE, Oracle, Novell, Ubuntu, Debian, Mandrake, Mandriva, and so on. The Linux community is one of the largest communities in the world of volunteer developers from across the globe that would contribute to further Linux development. In essence, Linux is CLI-based, but there are also versions of graphical user interfaces like KDE and GNOME among the most popular. Linux, like Windows Server, is offered in 64-bit platform too:

Figure 1.21. Login screen in SUSE Linux Enterprise Server 11

macOS X Server

Perhaps by age, macOS X Server (see Figure 1.22) is younger than Windows Server and Linux Server NOSs, but in terms of reliability it is gaining more and more industrial support. In its heart, macOS X Server is basically a version of Unix OS, but has been customized to conform to the familiar GUI of Apple OS for Mac computers. Like Windows Server and Linux Server, macOS X Server is offered in 64-bit too. It is worth mentioning the unique fact that the macOS X Server runs only on Apple's hardware. It is a GUI-based NOS; however, considering the UNIX origin, obviously it can be administered entirely through the CLI as well:

Figure 1.22. Login screen in macOS X Server

Network medium

Depending on whether it is a physical medium (cable) or a wave-based communication (wireless), mainly the following networking mediums for data transferring and communication are used:

  • Metallic mediums, copper wires in twisted pairs and coaxial cables transmit electrical impulses
  • Glass mediums, fibre optic cable transmit pulses of light
  • Air mediums, waves and rays from the electromagnetic spectrum transmit signals in different frequencies
You can learn more about computer network mediums at https://www.techwalla.com/articles/types-of-media-used-in-computer-networking.

Twisted pairs

Twisted pairs, as in Figure 1.23, is a cable that contains four twisted pairs of copper; a total of eight wires, each with a specified color. The single wires are twisted around each other forming twisted pairs, and then the pairs are twisted around each other forming the cable; and that is done to reduce electromagnetic interference (EMI) and cross-talk. Usually, it is available in two types: unshielded twisted pair (UTP), and shielded twisted pair (STP). Mainly, it is used for designing LANs. The maximum distance that the twisted pairs medium can successfully carry a signal in an Ethernet network is 100 m.

Figure 1.23. UTP cable

Coaxial

Coaxial, as in Figure 1.24, is a copper cable presented in two forms: thin coaxial, with a length up to 185 m; and thick coaxial, with a length up to 500 m. In the past, it was used to implement computer networks with the bus and ring physical topologies. Nowadays, it is mainly used by cable Internet Service Providers (ISP) for transferring data and video signal:

Figure 1.24. Coaxial cable

Fibre optic

Fibre optic, as in Figure 1.25, is a cable made up of glass through which the light is transmitted. Based on the light transmission, it is offered in two modes:

  • Single mode utilizes only one light, and can reach a length from 40 km to 60 km
  • Multimode utilizes multiple lights, and can reach a length from 2 km to 3 km.

Apart from its traditional usage in WANs, today fibre optic is used a lot for the implementation of fiber to the home (FTTH), and MAN networks:

Figure 1.25. Fibre optic cable

Infrared and Bluetooth

Infrared and Bluetooth are wireless technologies for transmission of data over short distances. Infrared, as the name explains, uses infrared rays, and requires the line of sight to transmit the infrared signal. On the contrary, Bluetooth operates under 2.4 GHz frequency standard, and it does not suffer from the line of sight communication.

Radio waves

Radio waves, otherwise known as electromagnetic radiation, uses electromagnetic waves with a longer spectrum of wavelengths than infrared rays. Since they operate on different frequencies, hence, it makes it possible to cover large areas. Radio waves have found application in WAN's.

Satellite

Whereever the infrared, Bluetooth and radio waves cannot reach the destination, it will be reached by satellite signals. Unlike aforementioned wireless technologies, satellite technology uses a wide spectrum of wavelengths and frequencies. Today, it is estimated that there are more than 2,000 satellites in Earth's orbit that enable telecommunications around the globe.

Converged networks

Converged networks, known also as triple-play services networks, are networks that have the ability to transmit data, voice, and video, or any combination of these services over the same networks. Converged networks are considered modern networks compared to traditional networks, where only dedicated services were provided on the networks. That has been the reason why we have existing networks such as telephone networks for transmitting voice, broadcast networks for transmitting video, and computer networks for transmitting data.

Growing complexity of networks

To understand the growing complexity of networks, let's compare the classic phone devices of many decades ago with today's smartphones. Obviously, the great potential that the smartphones offer compared to the classic phones makes this comparison sound naive; however, it is worth mentioning the fact that while the classic phones have used a dedicated voice communication network that understandably must have been less complex, by contrast the smartphones use a more complex communication network. That is because today’s communications networks, from frontend devices to backend devices, are various vendor technologies, resulting in more complexity when it comes to network scaling, upgrading, or patching.

Elements of converged networks

As explained earlier, the converged network integrates data, voice, and video into a single network. This is achieved thanks to the technologically advanced equipment and the TCP/IP protocol. Thus, it can be said that the elements of converged networks are a convergent device and a converged service. An example of a convergent device is the multiplexer (as in Figure 1.26) that, at its input, merges multiple communication signals into a single signal at its output. For the converged service, it can be said that it is a service that provides voice, data, and video signals in a single network, thus providing services for all modes of communication:

Figure 1.26. Orthogonal Frequency Division Multiplexing (OFDM) multiplexing technique used in DSL Wireless Router
You can learn more about Orthogonal Frequency Division Multiplexing (OFDM) from http://searchnetworking.techtarget.com/definition/orthogonal-frequency-division-multiplexing.

Access, distribution, and core layers

Cisco's three-layered architecture helps defining the enterprise networks by simplifying the process of designing a reliable, highly-redundant, and scalable hierarchical inter-network. The three layers of Cisco architecture are as follows:

  • Access layer, as the name indicates, is the layer in which network services are accessed. This layer mainly consists of computers, servers, hubs, layer 2 switches, access points, and other network end devices. A LAN network can be considered as an access layer analogy.
  • Distribution layer is the middle layer that plays the role of the bridge by interconnecting the access layer and the core layer. This layer mainly uses layer 3 switches and routers. Extended LANs that form the MAN can be considered as a distribution layer analogy.
  • Core layer is a fast and highly redundant network that is managed by core switches and routers. It is a backbone of the corporate network that enables the packet's movement between distribution-layer devices in different segments of the network. A WAN network can be considered as a core layer analogy.

Network trends

We live in the Internet of Things (IoT) era in which the internet dictates the way we live and work. Therefore, things that were only science fiction a few years ago have started to become a reality. Thus, the overwhelming development of technology has transformed our world into an ever-changing environment. This necessarily requires everyone to adapt to this new reality. Some of the current trends in computer networks include the following:

  • Improved security is becoming the topmost priority of enterprise networks. That is due to the fact that the number of users is growing more and more, and with that, more sophisticated have become the cyber criminals attacks.
  • Increased bandwidth is ranked by analysts as enterprises second priority, right after the security. That is due to continuously increasing demands for traffic, thus putting the networks under pressure as they carry traffic.
  • Software-defined networks (SDNs) continue to increase in popularity, especially by enterprises. That has to do with the convergence nature of SDNs, which multiplex data over multiple physical links, thus providing better performance than dedicated communication networks.
  • Video communication, besides having made the distance communication between individuals more appealing, has enabled great opportunities for online collaboration and entertainment.
  • Online collaboration, including video communication, brings people together on a common project. In addition to businesses, more and more of this trend is being embraced by educational institutions and individuals.
  • Bring your own devices (BYODs) is a network trend that enables users to use their personal equipment to access business data. Obviously, that enables freedom, flexibility, and more opportunities for end users.
  • Cloud computing, other than changing the way we access and store data, is reshaping the internet too. From businesses to individuals, cloud computing provides on-demand services to any device, anywhere in the world, securely and economically.

Summary

We summarize the chapter with the following points:

  • The internet is the network of the networks.
  • A computer network is a group of computers connected to each other in order to share resources.
  • Usually, the resources can be data, network services, and peripheral devices.
  • The fundamental requirement for designing a computer network is that there must be two or more computers:
    • A PAN is defined as a computer network that is used to connect and transmit data among devices located in a personal area, usually utilizing Bluetooth or Wi-Fi to interconnect devices
    • A LAN usually covers the floor of the building, several floors of the building, an entire building, or even a few buildings that are close to one another
    • A MAN represents a group of LANs interconnected within the geographical boundary of the town or city
    • A WAN is a computer network that covers a wide geographic area using dedicated telecommunication lines such as telephone lines, leased lines, or satellites
  • The intranet is considered to be the private network of an organization where employees can access network services.
  • The extranet can be thought of as an intranet with a controlled access.
  • Physical topology presents ordering, arrangement, and placement of the physical parts of a computer network, such as computers, peripheral devices, cables for data transmission, and network equipment:
    • Bus is the physical topology in which computers, peripheral and network devices are connected through the bus that mainly consists of coaxial cable.
    • Ring is the physical topology in which computers, peripheral and network devices form a closed cycle that takes the shape of a ring network where each device is connected to each other.
    • Star is the physical topology in which computers and peripheral and network devices are connected independently with a central device.
    • Extended star is the physical topology in which computers, peripheral and network devices are connected into two or more star topology networks, and then the central components (that is switches) are interconnected over a bus.
    • Hierarchical is the physical topology that represents a combination of star and bus topologies.
    • Mesh is the physical topology in which each computer is connected with every computer to form the network.
  • Logical topology represents the logical aspect of the computer network.
  • In logical topology, it is the logical paths that are used to carry electric or light signals from one computer to another, or from one network node to another node.
  • Clients are computers that request the resources in a computer network.
  • Servers are network components that provide resources to clients. Servers too have an active role.
  • A host is any device with an IP address that requests or provides networking resources to any other host or node on the network.
  • A node is any device that can generate, receive, and transmit the networking resources on the computer network.
  • A network interface is a component-like network card or LAN port on network equipment that enables clients, servers, peripheral devices, and network equipment to get connected and communicate with each other.
  • Peripheral devices are printers, scanners, SAN, and any other peripheral device that provides resources to clients either through a LAN or as a shared device on a network.
  • Applications and shared data are virtual network components that represent applications and files shared on the network that are usually provided by servers.
  • Hubs and switches are acting as central components (in Ethernet communication technology) of the computer network to enable interconnection and communication between clients, servers, and peripheral devices.
  • Routers are a computer network component that enables routing of the data (that is, packets) from an LAN to the internet, and vice versa.
  • The computer network architecture represents the computer network design that allows the computer network components to communicate with one another:
    • Peer-to-peer is a computer network in which the participating computers do not play the predefined roles in the network, but instead they change roles from client to server and vice versa, based on the actual activity on the network.
    • Client/server is a computer network in which participating computers have a predefined role. That means that, in this computer network architecture, computers that access resources act as clients, while computers that provide resources act as servers.
  • NOSs are software that are capable of managing, maintaining, and providing resources in the network.
  • In metallic mediums, copper wires in twisted pairs and coaxial cables transmit electrical impulses.
  • In glass mediums, fibre optic cable transmits pulses of light.
  • In air mediums, waves and rays from the electromagnetic spectrum transmit signals in different frequencies.
  • Twisted pairs is a cable that contains four twisted pairs of copper with a total of eight wires, each with a specified color.
  • Coaxial is a copper cable presented in two forms: thin coaxial with the length up to 185 m, and thick coaxial with the length up to 500 m.
  • Fibre optic is a cable made up of glass through which the light is transmitted:
    • Single mode utilizes only one light, and can reach the length from 40 km to 60 km
    • Multimode utilizes multiple lights, and can reach the length from 2 km to 3 km
  • Infrared and Bluetooth are wireless technologies for transmission of data over short distances.
  • Radio waves, or otherwise known as electromagnetic radiation, uses electromagnetic waves with the longer spectrum of wavelengths than infrared rays.
  • Satellite technology uses a wide spectrum of wavelengths and frequencies.
  • The converged networks, known also as triple play services networks, are networks that have the ability to transmit data, voice, and video, or any combination of these services over the same networks:
    • A convergent device is the multiplexer that, at its input, merges multiple communication signals into a single signal at its output
    • A converged service is a service that provides voice, data, and video signals in a single network, thus providing services for all modes of communication
  • Cisco's three-layered hierarchical model helps define the enterprise networks by simplifying the process of designing a reliable, highly redundant, and scalable hierarchical internetworks:
    • Access layer, as the name indicates, is the layer in which network services are accessed.
    • Distribution layer is the middle layer that plays the role of the bridge by interconnecting the access layer and the core layer.
    • Core layer is a fast and highly redundant network that is managed by core switches and routers.
  • We live in the IoT era in which the internet dictates the way we live and work.

Questions

  1. A computer network is a group of computers connected to each other in order to share resources. (True | False)
  2. _________________ represents a group of LANs interconnected within the geographical boundary of the town or city.
  3. Which of the following are the layers of Cisco's three-layered hierarchical model? (Choose two):
    1. Access
    2. Services
    3. Peripheral
    4. Core
  4. The converged networks, known also as triple play services networks, are networks that don't have the ability to transmit data, voice, and video, or any combination of these services over the same networks. (True | False)
  5. _________________ is a cable that contains four twisted pairs of copper with a total of eight wires, each with a specified color.
  6. Which of the following are fibre optic modes?
    1. Single
    2. Dual
    3. Triple
    4. Multi
  7. The computer network architecture represents the computer network design that allows the computer network components to communicate with one another. (True | False)
  8. _________________ are a computer network component that enables routing of the data (that is, packets) from LAN to the internet, and vice versa.
  9. Which of the following are types of computer networks? (Choose two)
    1. PAN
    2. DAS
    3. NAS
    4. LAN
  10. In logical topology, it is the logical paths that are used to carry electric or light signals from one computer to another, or from one network node to another node. (True | False)
  1. _________________ is the physical topology in which computers and peripheral and network devices are connected independently with a central device.
  2. Which of the following represent the physical topologies? (Choose all that apply)
    1. Bus
    2. Ring
    3. Star
    4. All of the above
  3. The intranet is considered to be the public network of an organization where employees can access network services. (True | False)
  4. _________________ is defined as a computer network that is used to connect and transmit data among devices located in a personal area, usually utilizing Bluetooth or Wi-Fi to interconnect devices.
  5. Which of the following represent the network architectures? (Choose two)
    1. Peer-to-peer
    2. Client/server
    3. Storage area network (SAN)
    4. Network-attached storage (NAS)
  6. The computer network architecture represents the computer network design that allows the computer network components to communicate with one another. (True | False)
  7. _________________ is the network of the networks.
  8. Which of the following are network mediums? (Choose all that apply)
    1. Metallic
    2. Glass
    3. Air
    4. All of the above
Left arrow icon Right arrow icon

Key benefits

  • •A step by step guide that will build you skills from basic concepts to completely understanding network communication
  • •Comprehensive coverage to help you implement the knowledge you've gained in real-world scenarios
  • •Take practice questions and mock tests to check how prepared you are for the CCENT exam

Description

CCENT is the entry-level certification for those looking to venture into the networking world. This guide will help you stay up-to date with your networking skills. This book starts with the basics and will take you through everything essential to pass the certification exam. It extensively covers IPv4 and IPv6 addressing, IP data networks, switching and routing, network security, and much more—all in some detail. This guide will provide real-world examples with a bunch of hands-on labs to give you immense expertise in important networking tasks, with a practical approach. Each chapter consists of practice questions to help you take up a challenge from what you have procured. This book ends with mock tests with several examples to help you confidently pass the certification. This Certification Guide consists of everything you need to know in order to pass the ICND 1 100-105 Exam, thus obtaining a CCENT certification. However, practicing with real switches and routers or a switch or router simulator will help you succeed.

Who is this book for?

If you are a Network Administrator, Network Technician, Networking professional, or would simply like to prepare for your CCENT certification, then this book is for you. Some basic understanding of networks and how they work would be helpful. Sufficient information will be provided to those new to this field.

What you will learn

  • •Get to grips with the computer network concepts
  • •Understand computer network components and learn to create a computer network
  • •Understand switching and learn how to configure a switch
  • •Understand routing and learn how to configure a router
  • •Understand network services and the maintenance process
  • •Learn how to troubleshoot networking issues
  • •Become familiar with, and learn how to prepare for, the ICND1 100-105 exam
Estimated delivery fee Deliver to Colombia

Standard delivery 10 - 13 business days

$19.95

Premium delivery 3 - 6 business days

$40.95
(Includes tracking information)

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Apr 30, 2018
Length: 362 pages
Edition : 1st
Language : English
ISBN-13 : 9781788621434
Tools :

What do you get with Print?

Product feature icon Instant access to your digital eBook copy whilst your Print order is Shipped
Product feature icon Paperback book shipped to your preferred address
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Estimated delivery fee Deliver to Colombia

Standard delivery 10 - 13 business days

$19.95

Premium delivery 3 - 6 business days

$40.95
(Includes tracking information)

Product Details

Publication date : Apr 30, 2018
Length: 362 pages
Edition : 1st
Language : English
ISBN-13 : 9781788621434
Tools :

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total $ 120.97
CCNA Routing and Switching 200-125 Certification Guide
$43.99
CCNA Security 210-260 Certification Guide
$43.99
CCENT/CCNA: ICND1 100-105 Certification Guide
$32.99
Total $ 120.97 Stars icon

Table of Contents

10 Chapters
Introduction to Computer Networks Chevron down icon Chevron up icon
Communication in Computer Networks Chevron down icon Chevron up icon
Introduction to Switching Chevron down icon Chevron up icon
Setting Up the Switch Chevron down icon Chevron up icon
Introduction to Routing Chevron down icon Chevron up icon
Setting up the Router Chevron down icon Chevron up icon
Networking Services and Maintenance Chevron down icon Chevron up icon
Network Troubleshooting Chevron down icon Chevron up icon
Studying and Preparing for ICND 1 (100-105) Exam Chevron down icon Chevron up icon
Other Books you may enjoy Chevron down icon Chevron up icon

Customer reviews

Rating distribution
Full star icon Full star icon Full star icon Full star icon Full star icon 5
(1 Ratings)
5 star 100%
4 star 0%
3 star 0%
2 star 0%
1 star 0%
Fred Wan Aug 31, 2019
Full star icon Full star icon Full star icon Full star icon Full star icon 5
It's all starting to make more sense now.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

What is the delivery time and cost of print book? Chevron down icon Chevron up icon

Shipping Details

USA:

'

Economy: Delivery to most addresses in the US within 10-15 business days

Premium: Trackable Delivery to most addresses in the US within 3-8 business days

UK:

Economy: Delivery to most addresses in the U.K. within 7-9 business days.
Shipments are not trackable

Premium: Trackable delivery to most addresses in the U.K. within 3-4 business days!
Add one extra business day for deliveries to Northern Ireland and Scottish Highlands and islands

EU:

Premium: Trackable delivery to most EU destinations within 4-9 business days.

Australia:

Economy: Can deliver to P. O. Boxes and private residences.
Trackable service with delivery to addresses in Australia only.
Delivery time ranges from 7-9 business days for VIC and 8-10 business days for Interstate metro
Delivery time is up to 15 business days for remote areas of WA, NT & QLD.

Premium: Delivery to addresses in Australia only
Trackable delivery to most P. O. Boxes and private residences in Australia within 4-5 days based on the distance to a destination following dispatch.

India:

Premium: Delivery to most Indian addresses within 5-6 business days

Rest of the World:

Premium: Countries in the American continent: Trackable delivery to most countries within 4-7 business days

Asia:

Premium: Delivery to most Asian addresses within 5-9 business days

Disclaimer:
All orders received before 5 PM U.K time would start printing from the next business day. So the estimated delivery times start from the next day as well. Orders received after 5 PM U.K time (in our internal systems) on a business day or anytime on the weekend will begin printing the second to next business day. For example, an order placed at 11 AM today will begin printing tomorrow, whereas an order placed at 9 PM tonight will begin printing the day after tomorrow.


Unfortunately, due to several restrictions, we are unable to ship to the following countries:

  1. Afghanistan
  2. American Samoa
  3. Belarus
  4. Brunei Darussalam
  5. Central African Republic
  6. The Democratic Republic of Congo
  7. Eritrea
  8. Guinea-bissau
  9. Iran
  10. Lebanon
  11. Libiya Arab Jamahriya
  12. Somalia
  13. Sudan
  14. Russian Federation
  15. Syrian Arab Republic
  16. Ukraine
  17. Venezuela
What is custom duty/charge? Chevron down icon Chevron up icon

Customs duty are charges levied on goods when they cross international borders. It is a tax that is imposed on imported goods. These duties are charged by special authorities and bodies created by local governments and are meant to protect local industries, economies, and businesses.

Do I have to pay customs charges for the print book order? Chevron down icon Chevron up icon

The orders shipped to the countries that are listed under EU27 will not bear custom charges. They are paid by Packt as part of the order.

List of EU27 countries: www.gov.uk/eu-eea:

A custom duty or localized taxes may be applicable on the shipment and would be charged by the recipient country outside of the EU27 which should be paid by the customer and these duties are not included in the shipping charges been charged on the order.

How do I know my custom duty charges? Chevron down icon Chevron up icon

The amount of duty payable varies greatly depending on the imported goods, the country of origin and several other factors like the total invoice amount or dimensions like weight, and other such criteria applicable in your country.

For example:

  • If you live in Mexico, and the declared value of your ordered items is over $ 50, for you to receive a package, you will have to pay additional import tax of 19% which will be $ 9.50 to the courier service.
  • Whereas if you live in Turkey, and the declared value of your ordered items is over € 22, for you to receive a package, you will have to pay additional import tax of 18% which will be € 3.96 to the courier service.
How can I cancel my order? Chevron down icon Chevron up icon

Cancellation Policy for Published Printed Books:

You can cancel any order within 1 hour of placing the order. Simply contact customercare@packt.com with your order details or payment transaction id. If your order has already started the shipment process, we will do our best to stop it. However, if it is already on the way to you then when you receive it, you can contact us at customercare@packt.com using the returns and refund process.

Please understand that Packt Publishing cannot provide refunds or cancel any order except for the cases described in our Return Policy (i.e. Packt Publishing agrees to replace your printed book because it arrives damaged or material defect in book), Packt Publishing will not accept returns.

What is your returns and refunds policy? Chevron down icon Chevron up icon

Return Policy:

We want you to be happy with your purchase from Packtpub.com. We will not hassle you with returning print books to us. If the print book you receive from us is incorrect, damaged, doesn't work or is unacceptably late, please contact Customer Relations Team on customercare@packt.com with the order number and issue details as explained below:

  1. If you ordered (eBook, Video or Print Book) incorrectly or accidentally, please contact Customer Relations Team on customercare@packt.com within one hour of placing the order and we will replace/refund you the item cost.
  2. Sadly, if your eBook or Video file is faulty or a fault occurs during the eBook or Video being made available to you, i.e. during download then you should contact Customer Relations Team within 14 days of purchase on customercare@packt.com who will be able to resolve this issue for you.
  3. You will have a choice of replacement or refund of the problem items.(damaged, defective or incorrect)
  4. Once Customer Care Team confirms that you will be refunded, you should receive the refund within 10 to 12 working days.
  5. If you are only requesting a refund of one book from a multiple order, then we will refund you the appropriate single item.
  6. Where the items were shipped under a free shipping offer, there will be no shipping costs to refund.

On the off chance your printed book arrives damaged, with book material defect, contact our Customer Relation Team on customercare@packt.com within 14 days of receipt of the book with appropriate evidence of damage and we will work with you to secure a replacement copy, if necessary. Please note that each printed book you order from us is individually made by Packt's professional book-printing partner which is on a print-on-demand basis.

What tax is charged? Chevron down icon Chevron up icon

Currently, no tax is charged on the purchase of any print book (subject to change based on the laws and regulations). A localized VAT fee is charged only to our European and UK customers on eBooks, Video and subscriptions that they buy. GST is charged to Indian customers for eBooks and video purchases.

What payment methods can I use? Chevron down icon Chevron up icon

You can pay with the following card types:

  1. Visa Debit
  2. Visa Credit
  3. MasterCard
  4. PayPal
What is the delivery time and cost of print books? Chevron down icon Chevron up icon

Shipping Details

USA:

'

Economy: Delivery to most addresses in the US within 10-15 business days

Premium: Trackable Delivery to most addresses in the US within 3-8 business days

UK:

Economy: Delivery to most addresses in the U.K. within 7-9 business days.
Shipments are not trackable

Premium: Trackable delivery to most addresses in the U.K. within 3-4 business days!
Add one extra business day for deliveries to Northern Ireland and Scottish Highlands and islands

EU:

Premium: Trackable delivery to most EU destinations within 4-9 business days.

Australia:

Economy: Can deliver to P. O. Boxes and private residences.
Trackable service with delivery to addresses in Australia only.
Delivery time ranges from 7-9 business days for VIC and 8-10 business days for Interstate metro
Delivery time is up to 15 business days for remote areas of WA, NT & QLD.

Premium: Delivery to addresses in Australia only
Trackable delivery to most P. O. Boxes and private residences in Australia within 4-5 days based on the distance to a destination following dispatch.

India:

Premium: Delivery to most Indian addresses within 5-6 business days

Rest of the World:

Premium: Countries in the American continent: Trackable delivery to most countries within 4-7 business days

Asia:

Premium: Delivery to most Asian addresses within 5-9 business days

Disclaimer:
All orders received before 5 PM U.K time would start printing from the next business day. So the estimated delivery times start from the next day as well. Orders received after 5 PM U.K time (in our internal systems) on a business day or anytime on the weekend will begin printing the second to next business day. For example, an order placed at 11 AM today will begin printing tomorrow, whereas an order placed at 9 PM tonight will begin printing the day after tomorrow.


Unfortunately, due to several restrictions, we are unable to ship to the following countries:

  1. Afghanistan
  2. American Samoa
  3. Belarus
  4. Brunei Darussalam
  5. Central African Republic
  6. The Democratic Republic of Congo
  7. Eritrea
  8. Guinea-bissau
  9. Iran
  10. Lebanon
  11. Libiya Arab Jamahriya
  12. Somalia
  13. Sudan
  14. Russian Federation
  15. Syrian Arab Republic
  16. Ukraine
  17. Venezuela