Professional Documents
Culture Documents
To understand the role that computers play in a networking system, consider the Internet. Internet connections are essential for businesses and education. Careful planning is required to build a network that will connect to the Internet. Even for an individual personal computer (PC) to connect to the Internet, some planning and decisions are required. Computer resources must be considered for Internet connection. This includes the type of device that connects the PC to the Internet, such as a network interface card (NIC) or modem. Protocols, or rules, must be configured before a computer can connect to the Internet. Proper selection of a Web browser is also important. This module covers some of the objectives for the CCNA 640-801, INTRO 640-821, and ICND 640811 exams.
Students who complete this lesson should be able to perform the following tasks: Understand the physical connections needed for a computer to connect to the Internet Recognize the components of a computer Install and troubleshoot NICs and modems Configure the set of protocols needed for Internet connection Use basic procedures to test an Internet connection
Page 1/25 M1
The Internet is the largest data network on earth. The Internet consists of many large and small networks that are interconnected. Individual computers are the sources and destinations of information through the Internet. Connection to the Internet can be broken down into the physical connection, the logical connection, and applications. A physical connection is made by connecting an adapter card, such as a modem or a NIC, from a PC to a network. The physical connection is used to transfer signals between PCs within the localarea network (LAN) and to remote devices on the Internet. The logical connection uses standards called protocols. A protocol is a formal description of a set of rules and conventions that govern how devices on a network communicate. Connections to the Internet may use multiple protocols. The Transmission Control Protocol/Internet Protocol (TCP/IP) suite is the primary set of protocols used on the Internet. The TCP/IP suite works together to transmit and receive data, or information. The last part of the connection are the applications, or software programs, that interpret and display data in an understandable form. Applications work with protocols to send and receive data across the Internet. A Web browser displays HTML as a Web page. Examples of Web browsers Page 2/25 M1
1.1.2 PC Basics
Computers are important building blocks in a network. Therefore, students must be able to identify the major components of a PC. Many networking devices are special purpose computers, with many of the same components as general purpose PCs. A computer must work properly before it can be used to access information such as Web-based content. This will require students to troubleshoot basic hardware and software problems. Therefore, students must be familiar with the following small, discreet PC components:
Students should also be familiar with the following PC subsystems: Transistor Device that amplifies a signal or opens and closes a circuit. Integrated circuit Device made of semiconductor material that contains many transistors and performs a specific task. Resistor An electrical component that limits or regulates the flow of electrical current in an electronic circuit. Capacitor Electronic component that stores energy in the form of an electrostatic field that consists of two conducting metal plates separated by an insulating material. Connector The part of a cable that plugs into a port or interface. Light emitting diode (LED) Semiconductor device that emits light when a current passes through it. Printed circuit board (PCB) A circuit board which has conducting tracks superimposed, or printed, on one or both sides. It may also contain internal signal layers and power and ground planes. Microprocessors, chips and integrated circuits and other electronic components are mounted on the PCB. CD-ROM drive A device that can read information from a CD-ROM. Central processing unit (CPU) The part of a computer that controls the operation of all the other parts. It gets instructions from memory and decodes them. It performs math and logic operations, and translates and executes instructions. Page 3/25 M1
Motherboard The main printed circuit board in a computer. The motherboard contains the bus, the microprocessor, and integrated circuits used for controlling any built-in peripherals such as the keyboard, text and graphics display, serial ports and parallel ports, joystick, and mouse interfaces. Bus A collection of wires on the motherboard through which data and timing signals are transmitted from one part of a computer to another. Random-access memory (RAM) Also known as read-write memory because new data can be written to it and stored data can be read from it. RAM requires electrical power to maintain data storage. If a computer is turned off or loses power all data stored in RAM is lost. Read-only memory (ROM) Computer memory on which data has been prerecorded. Once data has been written onto a ROM chip, it cannot be removed and can only be read. System unit The main part of a PC, which includes the chassis, microprocessor, main memory, bus, and ports. The system unit does not include the keyboard, monitor, or any external devices connected to the computer. Expansion slot A socket on the motherboard where a circuit board can be inserted to add new capabilities to the computer. Figure shows Peripheral Component Interconnect (PCI) and Accelerated Graphics Port (AGP) expansion slots. PCI is a fast connection for boards such as NICs, internal modems, and video cards. The AGP port provides a high bandwidth connection between the graphics device and the system memory. AGP provides a fast connection for 3-D graphics on computer systems. Power supply The component that supplies power to a computer. Page 4/25 M1
Think of the internal components of a PC as a network of devices that are all attached to the system bus. The Lab Activity will help students find and identify the physical components of a PC. The next page will provide more information about NICs
A NIC, or LAN adapter, provides network communication capabilities to and from a PC. On desktop computer systems, it is a printed circuit board that resides in a slot on the motherboard and provides an interface connection to the network media. On laptop computer systems, it is commonly integrated into the laptop or available on a small, credit card-sized PCMCIA card. PCMCIA stands for Personal Computer Memory Card International Association. PCMCIA cards are also known as PC cards. The type of NIC must match the media and protocol used on the local network.
Page 5/25 M1
Students can use the Interactive Media Activity to view a NIC. The next page will explain how NICs and modems are installed.
A modem, or modulator-demodulator, is a device that provides the computer with connectivity to a telephone line. A modem converts data from a digital signal to an analog signal that is compatible with a standard phone line. The modem at the receiving end demodulates the signal, which converts it back to digital. Modems may be installed internally or attached externally to the computer using a phone line. A NIC must be installed for each device on a network. A NIC provides a network interface for each host. Different types of NICs are used for various device configurations. Notebook computers may have a built-in interface or use a PCMCIA card. Figure shows PCMCIA wired, wireless network cards, and a Universal Serial Bus (USB) Ethernet adapter. Desktop systems may use an internal network adapter , called a NIC, or an external network adapter that connects to the network through a USB port.
Page 6/25 M1
Situations that require NIC installation include the following: Installation of a NIC on a PC that does not already have one Replacement of a malfunctioning or damaged NIC Upgrade from a 10-Mbps NIC to a 10/100/1000-Mbps NIC Change to a different type of NIC, such as wireless Installation of a secondary, or backup, NIC for network security reasons
To perform the installation of a NIC or modem the following resources may be required: Knowledge of how the adapter, jumpers, and plug-and-play software are configured Availability of diagnostic tools Ability to resolve hardware resource conflicts
Page 7/25 M1
TCP/IP is a set of protocols or rules that have been developed to allow computers to share resources across a network. The operating system tools must be used to configure TCP/IP on a workstation. The process is very similar for Windows or Mac operating systems. The Lab Activity will teach students how to obtain basic TCP/IP configuration information. The next page will introduce the pn i command. g
Page 8/25 M1
Ping is a basic program that verifies a particular IP address exists and can accept requests. The computer acronym ping stands for Packet Internet or Inter-Network Groper. The name was contrived to match the submariners' term for the sound of a returned sonar pulse from an underwater object. The ping command works by sending special Internet Protocol (IP) packets, called Internet Control Message Protocol (ICMP) Echo Request datagrams, to a specified destination. Each packet sent is a request for a reply. The output response for a ping contains the success ratio and round-trip time to the destination. From this information, it is possible to determine if there is connectivity to a destination. The pn i command is used to test the NIC transmit and receive function, the TCP/IP configuration, and network connectivity. The following types of ping commands can be issued: p This is a unique ping and is called an internal loopback test. It is used to verify the TCP/IP 1 i network configuration. p A ping to a host PC verifies the TCP/IP address configuration for the local host and I i connectivity to the host. pdA ping to the default gateway indicates if the router that connects the local network to dPr Id i a other networks can be reached. di ping to a remote destination verifies connectivity to a remote host. as iA pn It e P g n
Students will use the p and ta commands in the Lab Activity. i r c The next page will discuss Web browsers.
A Web browser is software that interprets HTML, which is one of the languages used to code Web page content. Some new technologies use other markup languages with more advanced features. HTML, which is the most common markup language, can display graphics or play sound, movies, and other multimedia files. Hyperlinks that are embedded in a Web page provide a quick link to another location on the same page or a different Internet address.
Two of the most popular Web browsers are Internet Explorer (IE) and Netscape Communicator. These browsers perform the same tasks. However, there are differences between them. Some websites may not support the use of one of these browsers. It is a good idea to have both programs installed. Here are some features of Netscape Navigator: Was the first popular browser Uses less disk space Displays HTML files Performs e-mail and file transfers
Here are some features of IE: Is powerfully integrated with other Microsoft products Uses more disk space Displays HTML files Performs e-mail and file transfers
There are also many special, or proprietary, file types that standard Web browsers are not able to display. To view these files the browser must be configured to use the plug-in applications. These applications work with the browser to launch the programs required to view special files: Flash Plays multimedia files created by Macromedia Flash Quicktime Plays video files created by Apple Real Player Plays audio files
Use the following procedure to install the Flash plug-in: 1. Go to the Macromedia website. 2. Download the latest flash player installer file. 3. Run and install the plug-in in Netscape or IE. Page 10/25 M1
Office applications are now a part of daily work, as typewriters were before PCs. The Lab Activity will help students understand how a Web browser works. The next page will discuss the troubleshooting process.
This page concludes this lesson. The next lesson will discuss computer number systems. The first page will describe the binary system.
Network Math
1.2.1 Binary presentation of data
This page will explain how computers use the binary number system to represent data. Computers work with and store data using electronic switches that are either ON or OFF. Computers can only understand and use data that is in this two-state or binary format. The 1s and 0s are used to represent the two possible states of an electronic component in a computer. 1 is Page 11/25 M1
American Standard Code for Information Interchange (ASCII) is the code that is most commonly used to represent alpha-numeric data in a computer. ASCII uses binary digits to represent the symbols typed on the keyboard. When computers send ON or OFF states over a network, electrical, light, or radio waves are used to represent the 1s and 0s. Notice that each character is represented by a unique pattern of eight binary digits. Because computers are designed to work with ON/OFF switches, binary digits and binary numbers are natural to them. Humans use the decimal number system, which is relatively simple when compared to the long series of 1s and 0s used by computers. So the computer binary numbers need to be converted to decimal numbers. Sometimes binary numbers are converted to hexadecimal numbers. This reduces a long string of binary digits to a few hexadecimal characters. It is easier to remember and to work with hexadecimal numbers. The next page will discuss bits and bytes.
Page 12/25 M1
Computers are designed to use groupings of eight bits. This grouping of eight bits is referred to as a byte. In a computer, one byte represents a single addressable storage location. These storage locations represent a value or single character of data, such as an ASCII code. The total number of combinations of the eight switches being turned on and off is 256. The value range of a byte is from 0 to 255. So a byte is an important concept to understand when working with computers and networks. The next page will describe the Base 10 number system.
Base 10 uses the ten symbols 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9. These symbols, can be combined to represent all possible numeric values. The decimal number system is based on powers of 10. Each column position of a value, from right to left, is multiplied by the base number 10 raised to a power, which is the exponent. The power that 10 is raised to depends on its position to the left of the decimal point. When a decimal number is read from right to left, the first or rightmost position represents 100, which equals 1. The second position represents 101, which equals 10. The third position represents 102, which equals 100. The seventh position to the left represents 106, which equals 1,000,000. This is true no matter how many columns the number has.
Page 13/25 M1
Here is an example: 101102 = (1 x 24 = 16) + (0 x 23 = 0) + (1 x 22 = 4) + (1 x 21 = 2) + (0 x 20 = 0) = 22 (16 + 0 + 4 + 2 + 0) This example shows that the binary number 10110 is equal to the decimal number 22. The next page will explain the conversion of decimal numbers to binary numbers.
Page 14/25 M1
This example shows that the decimal number 168 is equal to the binary number 10101000. The number converter activity in Figure will allow students to practice decimal to binary conversions. In the Lab Activity, students will practice the conversion of decimal numbers to binary numbers. The next page will discuss the conversion of binary numbers to decimal numbers.
Page 15/25 M1
Page 16/25 M1
Page 17/25 M1
The Lab Activity will let students practice the conversion of binary numbers to decimal numbers. The next page will discuss dotted decimal notations.
Currently, addresses assigned to computers on the Internet are 32-bit binary numbers. To make it easier to work with these addresses, the 32-bit binary number is broken into a series of decimal numbers. First the binary number is split into four groups of eight binary digits. Then each group of eight bits, or octet, is converted into its decimal equivalent. This conversion can be performed as shown on the previous page.
Page 18/25 M1
When written, the complete binary number is represented as four groups of decimal digits separated by periods. This is called dotted decimal notation and provides a compact and easy way to refer to 32-bit addresses. This representation is used frequently later in this course, so it is necessary to understand it. For dotted decimal to binary conversions, remember that each group of one to three decimal digits represents a group of eight binary digits. If the decimal number that is being converted is less than 128, zeros will be needed to be added to the left of the equivalent binary number until there are a total of eight bits. Try the following conversions for practice: Convert 200.114.6.51 to its 32-bit binary equivalent. Convert 10000000 01011101 00001111 10101010 to its dotted decimal equivalent. The next page will introduce the hexadecimal number system.
1.2.8 Hexadecimal
This page will teach students about the hexadecimal number system. Students will also learn how hexadecimal is used to represent binary and decimal numbers.
The hexadecimal or Base 16 number system is commonly used to represent binary numbers in a more readable form. Computers perform computations in binary. However, there are several
Page 19/25 M1
The configuration register in Cisco routers often requires hexadecimal to binary and binary to hexadecimal conversions. Cisco routers have a configuration register that is 16 bits long. The 16-bit binary number can be represented as a four-digit hexadecimal number. For example, 0010000100000010 in binary equals 2102 in hexadecimal. A hexadecimal number is often indicated with a 0x. For example, the hexadecimal number 2102 would be written as 0x2102.
Like the binary and decimal systems, the hexadecimal system is based on the use of symbols, powers, and positions. The symbols that hexadecimal uses are the digits 0 through 9 and the letters A through F.
Page 20/25 M1
All combinations of four binary digits can be represented with one hexadecimal symbol. These values require one or two decimal symbols. Two hexadecimal digits can efficiently represent any combination of eight binary digits. The decimal representation of an eight-bit binary number will require either two or three decimal digits. Since one hexadecimal digit always represents four binary digits, hexadecimal symbols are easier to use than decimal symbols when working with large binary numbers. Using hexadecimal representation also reduces the confusion of reading long strings of binary numbers and the amount of space it takes to write binary numbers. Remember that 0x may be used to indicate a hexadecimal value. The hexadecimal number 5D might be written as 0x5D. To convert to binary, simply expand each hexadecimal digit into its four-bit binary equivalent. The Lab Activity will teach students how to convert hexadecimal numbers into decimal and binary values. The next page will discuss Boolean logic.
Page 21/25 M1
The NOT operation takes the value that is presented and inverts it. A 1 becomes a 0 and a 0 becomes a 1. Remember that the logic gates are electronic devices built specifically for this purpose. The logic rule that they follow is whatever the input is, the output is the opposite. The AND operation compares two input values. If both values are 1, the logic gate generates a 1 as the output. Otherwise it outputs a 0. There are four combinations of input values. Three of these combinations generate a 0, and one combination generates a 1.
Page 22/25 M1
To inform a computer how the 32-bit IP address has been split, a second 32-bit number called a subnetwork mask is used. This mask is a guide that determines how the IP address is interpreted. It indicates how many of the bits are used to identify the network of the computer. The subnetwork mask sequentially fills in the 1s from the left side of the mask. A subnet mask will always be all 1s until the network address is identified and then it will be all 0s to the end of the mask. The bits in the subnet mask that are 0 identify the computer or host. Some examples of subnet masks are as follows: 11111111000000000000000000000000 written in dotted decimal as 255.0.0.0 11111111111111110000000000000000 written in dotted decimal as 255.255.0.0 In the first example, the first eight bits from the left represent the network portion of the address, and the last 24 bits represent the host portion of the address. In the second example the first 16 bits represent the network portion of the address, and the last 16 bits represent the host portion of the address. The IP address 10.34.23.134 in binary form is 00001010.00100010.00010111.10000110.
Page 23/25 M1
Summary
Decimal representation of IP addresses and network masks. This page summarizes the topics discussed in this module.
A connection to a computer network can be broken down into the physical connection, the logical connection, and the applications that interpret the data and display the information. Establishment and maintenance of the physical connection requires knowledge of PC components and peripherals. Connectivity to the Internet requires an adapter card, which may be a modem or a network interface card (NIC).
Page 24/25 M1
Page 25/25 M1