SlideShare a Scribd company logo
1 of 28
CCNA 1 v3.1 Module 2  Networking Fundamentals Nasir Majeed
Objectives
Networking Devices
Network Topology
Network Protocols
Local-area Networks (LANs)
Wide-area Networks (WANs)
Importance of Bandwidth
Bandwidth Pipe Analogy
Bandwidth Measurements
Bandwidth Limitations
Bandwidth Throughput
Digital Transfer Calculation
Digital versus Analog
Using Layers to Describe Data Communication
OSI Model
OSI Layers
OSI Layers  ,[object Object],[object Object],[object Object]
OSI Layers
OSI Layers
OSI Layers
OSI Layers
OSI Layers
Peer-to-Peer Communication
TCP/IP Model
Encapsulation
Names for Data at Each Layer
Summary

More Related Content

What's hot

Crankshaft protocol
Crankshaft protocolCrankshaft protocol
Crankshaft protocolgmeneses23
 
Extended summery of performance limits of network densification
Extended summery of performance limits of network densificationExtended summery of performance limits of network densification
Extended summery of performance limits of network densificationMassimilianoBarp
 
Generation and wired/wireless transmission of IEEE802.16m signal using solito...
Generation and wired/wireless transmission of IEEE802.16m signal using solito...Generation and wired/wireless transmission of IEEE802.16m signal using solito...
Generation and wired/wireless transmission of IEEE802.16m signal using solito...University of Malaya (UM)
 
An exponential rayleigh model for rss-based device-free localization and trac...
An exponential rayleigh model for rss-based device-free localization and trac...An exponential rayleigh model for rss-based device-free localization and trac...
An exponential rayleigh model for rss-based device-free localization and trac...ieeeprojectschennai
 
TOWARD TRANSPARENT COEXISTENCE FOR MULTIHOP SECONDARY COGNITIVE RADIO NETWORKS
TOWARD TRANSPARENT COEXISTENCE FOR MULTIHOP SECONDARY COGNITIVE RADIO NETWORKSTOWARD TRANSPARENT COEXISTENCE FOR MULTIHOP SECONDARY COGNITIVE RADIO NETWORKS
TOWARD TRANSPARENT COEXISTENCE FOR MULTIHOP SECONDARY COGNITIVE RADIO NETWORKSI3E Technologies
 
Routing protocols
Routing protocolsRouting protocols
Routing protocolsmehulpatira
 
WIRELESS Visual SENSOR NETWORK
WIRELESS Visual SENSOR NETWORKWIRELESS Visual SENSOR NETWORK
WIRELESS Visual SENSOR NETWORKMohamed Hafez
 
Intrusion Detection in A Smart Forest-Fire Early Warning Sensory System
 Intrusion Detection in A Smart Forest-Fire Early Warning Sensory System Intrusion Detection in A Smart Forest-Fire Early Warning Sensory System
Intrusion Detection in A Smart Forest-Fire Early Warning Sensory SystemRatul Alahy
 
A Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor NetworksA Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor NetworksIJMER
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSvtunotesbysree
 
Final presentation on computer network
Final presentation on computer networkFinal presentation on computer network
Final presentation on computer networkVivek Kumar Sinha
 
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...Torsten Braun, Universität Bern
 
A detection & prevention of wormhole attack in wsn project abstract
A detection & prevention of wormhole attack in wsn project abstractA detection & prevention of wormhole attack in wsn project abstract
A detection & prevention of wormhole attack in wsn project abstractvishnuRajan20
 
Iaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd Iaetsd
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networksPriya Kaushal
 
Visual Sensor Network & Coverage Issue
Visual Sensor Network  & Coverage Issue Visual Sensor Network  & Coverage Issue
Visual Sensor Network & Coverage Issue AJIT NEGI
 

What's hot (20)

Crankshaft protocol
Crankshaft protocolCrankshaft protocol
Crankshaft protocol
 
Indoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor NetworksIndoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor Networks
 
Extended summery of performance limits of network densification
Extended summery of performance limits of network densificationExtended summery of performance limits of network densification
Extended summery of performance limits of network densification
 
Generation and wired/wireless transmission of IEEE802.16m signal using solito...
Generation and wired/wireless transmission of IEEE802.16m signal using solito...Generation and wired/wireless transmission of IEEE802.16m signal using solito...
Generation and wired/wireless transmission of IEEE802.16m signal using solito...
 
An exponential rayleigh model for rss-based device-free localization and trac...
An exponential rayleigh model for rss-based device-free localization and trac...An exponential rayleigh model for rss-based device-free localization and trac...
An exponential rayleigh model for rss-based device-free localization and trac...
 
Introduction to MANETs
Introduction to MANETsIntroduction to MANETs
Introduction to MANETs
 
TOWARD TRANSPARENT COEXISTENCE FOR MULTIHOP SECONDARY COGNITIVE RADIO NETWORKS
TOWARD TRANSPARENT COEXISTENCE FOR MULTIHOP SECONDARY COGNITIVE RADIO NETWORKSTOWARD TRANSPARENT COEXISTENCE FOR MULTIHOP SECONDARY COGNITIVE RADIO NETWORKS
TOWARD TRANSPARENT COEXISTENCE FOR MULTIHOP SECONDARY COGNITIVE RADIO NETWORKS
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
wb2-1
wb2-1wb2-1
wb2-1
 
WIRELESS Visual SENSOR NETWORK
WIRELESS Visual SENSOR NETWORKWIRELESS Visual SENSOR NETWORK
WIRELESS Visual SENSOR NETWORK
 
Intrusion Detection in A Smart Forest-Fire Early Warning Sensory System
 Intrusion Detection in A Smart Forest-Fire Early Warning Sensory System Intrusion Detection in A Smart Forest-Fire Early Warning Sensory System
Intrusion Detection in A Smart Forest-Fire Early Warning Sensory System
 
A Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor NetworksA Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor Networks
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
 
Final presentation on computer network
Final presentation on computer networkFinal presentation on computer network
Final presentation on computer network
 
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...
 
A detection & prevention of wormhole attack in wsn project abstract
A detection & prevention of wormhole attack in wsn project abstractA detection & prevention of wormhole attack in wsn project abstract
A detection & prevention of wormhole attack in wsn project abstract
 
Iaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless ad
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networks
 
Manet
ManetManet
Manet
 
Visual Sensor Network & Coverage Issue
Visual Sensor Network  & Coverage Issue Visual Sensor Network  & Coverage Issue
Visual Sensor Network & Coverage Issue
 

Viewers also liked

Cisco CCNA-Standard Access List
Cisco CCNA-Standard Access ListCisco CCNA-Standard Access List
Cisco CCNA-Standard Access ListHamed Moghaddam
 
Ccna(routing &and switching)
Ccna(routing &and switching)Ccna(routing &and switching)
Ccna(routing &and switching)Shweta Kumari
 
CCNA Routing and Switching IT Certifications
CCNA Routing and Switching  IT CertificationsCCNA Routing and Switching  IT Certifications
CCNA Routing and Switching IT CertificationsMuhammad Qasim
 

Viewers also liked (6)

Cisco CCNA-Standard Access List
Cisco CCNA-Standard Access ListCisco CCNA-Standard Access List
Cisco CCNA-Standard Access List
 
Ccna(routing &and switching)
Ccna(routing &and switching)Ccna(routing &and switching)
Ccna(routing &and switching)
 
Modes of router
Modes of routerModes of router
Modes of router
 
Cisco CCNA- DHCP Server
Cisco CCNA-  DHCP ServerCisco CCNA-  DHCP Server
Cisco CCNA- DHCP Server
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
 
CCNA Routing and Switching IT Certifications
CCNA Routing and Switching  IT CertificationsCCNA Routing and Switching  IT Certifications
CCNA Routing and Switching IT Certifications
 

More from aqeelhaider74

More from aqeelhaider74 (8)

Sem 1 Ch 11
Sem 1 Ch 11Sem 1 Ch 11
Sem 1 Ch 11
 
Ch10 Subnetting Class
Ch10 Subnetting ClassCh10 Subnetting Class
Ch10 Subnetting Class
 
Sem 1 Ch 2
Sem 1 Ch 2Sem 1 Ch 2
Sem 1 Ch 2
 
Sem 1 Ch 7
Sem 1 Ch 7Sem 1 Ch 7
Sem 1 Ch 7
 
Ccna1v3 Mod09
Ccna1v3 Mod09Ccna1v3 Mod09
Ccna1v3 Mod09
 
Sem 1 Ch 5
Sem 1 Ch 5Sem 1 Ch 5
Sem 1 Ch 5
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
Cable
CableCable
Cable