Chapter 1
Chapter 1
Introduction to networking
To understand the role that computers play in a networking system, consider the Internet.
Internet connections are essential for businesses and education. Careful planning is
required to build a network that will connect to the Internet. Even for an individual
personal computer (PC) to connect to the Internet, some planning and decisions are
required. Computer resources must be considered for Internet connection. This includes
the type of device that connects the PC to the Internet, such as a network interface card
(NIC) or modem. Protocols, or rules, must be configured before a computer can connect
to the Internet. Proper selection of a Web browser is also important.
This module covers some of the objectives for the CCNA 640-801, INTRO 640-821, and
ICND 640-811 exams.
Students who complete this lesson should be able to perform the following tasks:
• Understand the physical connections needed for a computer to connect to the
Internet
• Recognize the components of a computer
• Install and troubleshoot NICs and modems
• Configure the set of protocols needed for Internet connection
• Use basic procedures to test an Internet connection
• Demonstrate a basic ability to use Web browsers and plug-ins
1.1 conecting to the internet
1.1.1 Requitments for internet conection
This page will describe the physical and logical requirements for an Internet connection.
The Internet is the largest data network on earth. The Internet consists of many large and
small networks that are interconnected. Individual computers are the sources and
destinations of information through the Internet. Connection to the Internet can be broken
down into the physical connection, the logical connection, and applications.
A physical connection is made by connecting an adapter card, such as a modem or a
NIC, from a PC to a network. The physical connection is used to transfer signals between
PCs within the local-area network (LAN) and to remote devices on the Internet.
The logical connection uses standards called protocols. A protocol is a formal description
of a set of rules and conventions that govern how devices on a network communicate.
Connections to the Internet may use multiple protocols. The Transmission Control
Protocol/Internet Protocol (TCP/IP) suite is the primary set of protocols used on the
Internet. The TCP/IP suite works together to transmit and receive data, or information.
The last part of the connection are the applications, or software programs, that interpret
and display data in an understandable form. Applications work with protocols to send and
receive data across the Internet. A Web browser displays HTML as a Web page.
Examples of Web browsers include Internet Explorer and Netscape. File Transfer
Protocol (FTP) is used to download files and programs from the Internet. Web browsers
also use proprietary plug-in applications to display special data types such as movies or
flash animations.
This is an introductory view of the Internet, and it may seem to be a simplistic process. As
the topic is explored in greater depth, students will learn that data transmission across the
Internet is a complicated task.
The next page will describe some PC components.
1.1.2 PC basic
Computers are important building blocks in a network. Therefore, students must be able
to identify the major components of a PC. Many networking devices are special purpose
computers, with many of the same components as general purpose PCs
A computer must work properly before it can be used to access information such as Web-
based content. This will require students to troubleshoot basic hardware and software
problems. Therefore, students must be familiar with the following small, discreet PC
components:
The Lab Activity will help students find and identify the physical components of a PC.
The next page will provide more information about NICs
CENTRAL PROCESSING UNIT
FLOPPY DISK
MOTHEBOARD
EXPANSION SLOT
A NIC, or LAN adapter, provides network communication capabilities to and from a PC.
On desktop computer systems, it is a printed circuit board that resides in a slot on the
motherboard and provides an interface connection to the network media. On laptop
computer systems, it is commonly integrated into the laptop or available on a small, credit
card-sized PCMCIA card. PCMCIA stands for Personal Computer Memory Card
International Association. PCMCIA cards are also known as PC cards. The type of NIC
must match the media and protocol used on the local network.
The NIC uses an interrupt request (IRQ), an input/output (I/O) address, and upper
memory space to work with the operating system. An IRQ value is an assigned location
where the computer can expect a particular device to interrupt it when the device sends
the computer signals about its operation. For example, when a printer has finished
printing, it sends an interrupt signal to the computer. The signal momentarily interrupts
the computer so that it can decide what processing to do next. Since multiple signals to
the computer on the same interrupt line might not be understood by the computer, a
unique value must be specified for each device and its path to the computer. Prior to
Plug-and Play (PnP) devices, users often had to set IRQ values manually, or be aware of
them, when adding a new device to a computer.
These considerations are important in the selection of a NIC:
• Protocols – Ethernet, Token Ring, or FDDI
• Types of media – Twisted-pair, coaxial, wireless, or fiber-optic
• Type of system bus – PCI or ISA
Students can use the Interactive Media Activity to view a NIC.
The next page will explain how NICs and modems are installed.
INTERNAL NIC (NETWORK INTERFACE CARD)
PCMCIA NIC
As PCs became more affordable in the 1970s, bulletin board systems (BBSs) appeared.
These BBSs allowed users to connect and post or read messages on a discussion board.
The 300-bps speed was acceptable since it was faster than the speed at which most
people could read or type. In the early 1980s, use of bulletin boards increased
exponentially and the 300 bps speed quickly became too slow for the transfer of large
files and graphics. In the 1990s, modems could operate at 9600 bps. By 1998, they
reached the current standard of 56,000 bps, or 56 kbps.
Soon the high-speed services used in the corporate environment such as Digital
Subscriber Line (DSL) and cable modem access moved to the consumer market. These
services no longer required expensive equipment or a second phone line. These are
"always on" services that provide instant access and do not require a connection to be
established for each session. This provides more reliability and flexibility and has
simplified Internet connection sharing in small office and home networks.
The ping command works by sending special Internet Protocol (IP) packets, called
Internet Control Message Protocol (ICMP) Echo Request datagrams, to a specified
destination. Each packet sent is a request for a reply. The output response for a ping
contains the success ratio and round-trip time to the destination. From this information,
it is possible to determine if there is connectivity to a destination. The ping command is
used to test the NIC transmit and receive function, the TCP/IP configuration, and network
connectivity. The following types of ping commands can be issued:
• ping 127.0.0.1 – This is a unique ping and is called an internal loopback
test. It is used to verify the TCP/IP network configuration.
• ping IP address of host computer – A ping to a host PC verifies the
TCP/IP address configuration for the local host and connectivity to the host.
• ping default-gateway IP address – A ping to the default gateway
indicates if the router that connects the local network to other networks can be
reached.
• ping remote destination IP address – A ping to a remote destination
verifies connectivity to a remote host.
Students will use the ping and tracert commands in the Lab Activity.
The next page will discuss Web browsers
1.1.8 WEB BROWSER AND PLUG IN
This page will explain what a Web browser is and how it performs the following functions:
• Contacts a Web server
• Requests information
• Receives information
• Displays the results on the screen
A Web browser is software that interprets HTML, which is one of the languages used to
code Web page content. Some new technologies use other markup languages with more
advanced features. HTML, which is the most common markup language, can display
graphics or play sound, movies, and other multimedia files. Hyperlinks that are embedded
in a Web page provide a quick link to another location on the same page or a different
Internet address.
Two of the most popular Web browsers are Internet Explorer (IE) and Netscape
Communicator. These browsers perform the same tasks. However, there are differences
between them. Some websites may not support the use of one of these browsers. It is a
good idea to have both programs installed.
Here are some features of Netscape Navigator:
• Was the first popular browser
• Uses less disk space
• Displays HTML files
• Performs e-mail and file transfers
Here are some features of IE:
• Is powerfully integrated with other Microsoft products
• Uses more disk space
• Displays HTML files
• Performs e-mail and file transfers
There are also many special, or proprietary, file types that standard Web browsers are
not able to display. To view these files the browser must be configured to use the plug-in
applications. These applications work with the browser to launch the programs required to
view special files:
• Flash – Plays multimedia files created by Macromedia Flash
• Quicktime – Plays video files created by Apple
• Real Player – Plays audio files
Use the following procedure to install the Flash plug-in:
1. Go to the Macromedia website.
2. Download the flash32.exe file.
3. Run and install the plug-in in Netscape or IE.
4. Access the Cisco Academy website to verify the installation and proper operation.
Computers also perform many other useful tasks. Many employees use a set of
applications in the form of an office suite such as Microsoft Office. Office applications
typically include the following:
• Spreadsheet software contains tables that consist of columns and rows and it is
often used with formulas to process and analyze data.
• Modern word processors allow users to create documents that include graphics
and richly formatted text.
• Database management software is used to store, maintain, organize, sort, and
filter records. A record is a collection of information identified by some common
theme such as customer name.
• Presentation software is used to design and develop presentations to deliver at
meetings, classes, or sales presentations.
• A personal information manager includes an e-mail utility, contact lists, a
calendar, and a to-do list.
Office applications are now a part of daily work, as typewriters were before PCs.
The Lab Activity will help students understand how a Web browser works.
The next page will discuss the troubleshooting process
Computers are designed to use groupings of eight bits. This grouping of eight bits is
referred to as a byte. In a computer, one byte represents a single addressable storage
location. These storage locations represent a value or single character of data, such as
an ASCII code. The total number of combinations of the eight switches being turned on
and off is 256. The value range of a byte is from 0 to 255. So a byte is an important
concept to understand when working with computers and networks.
The next page will describe the Base 10 number system
1.2.3 BASE 10 NUMBER SYSTEM
Numbering systems consist of symbols and rules for their use. This page will discuss the
most commonly used number system, which is decimal, or Base 10.
Base 10 uses the ten symbols 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9. These symbols, can be
combined to represent all possible numeric values.
The decimal number system is based on powers of 10. Each column position of a value,
from right to left, is multiplied by the base number 10 raised to a power, which is the
exponent. The power that 10 is raised to depends on its position to the left of the decimal
point. When a decimal number is read from right to left, the first or rightmost position
represents 100, which equals 1. The second position represents 101, which equals 10.
The third position represents 102, which equals 100. The seventh position to the left
represents 106, which equals 1,000,000. This is true no matter how many columns the
number has.
Here is an example:
2134 = (2x103) + (1x102) + (3x101) + (4x100)
This review of the decimal system will help students understand the Base 2 and Base 16
number systems. These systems use the same methods as the decimal system.
The next page will describe the Base 2 number system
Here is an example:
101102 = (1 x 24 = 16) + (0 x 23 = 0) + (1 x 22 = 4) + (1 x 21 = 2) + (0 x 20 = 0) = 22 (16 + 0
+ 4 + 2 + 0)
This example shows that the binary number 10110 is equal to the decimal number 22.
The next page will explain the conversion of decimal numbers to binary numbers
Note:
Work from right to left. Remember that anything raised to the 0 power is 1.
0 x 20 = 0
0 x 21 = 0
0 x 22 = 0
0 x 23 = 0
1 x 24 = 16
1 x 25 = 32
1 x 26 = 64
0 x 27 = 0
__________
= 112
The Lab Activity will let students practice the conversion of binary numbers to decimal
numbers.
The next page will discuss dotted decimal notations
1.2.7 Four-octet dotted decimal representation of 32-bit binary numbers
This page will explain how binary numbers are represented in dotted decimal notation.
Currently, addresses assigned to computers on the Internet are 32-bit binary numbers.
To make it easier to work with these addresses, the 32-bit binary number is broken into a
series of decimal numbers. First the binary number is split into four groups of eight binary
digits. Then each group of eight bits, or octet, is converted into its decimal equivalent.
This conversion can be performed as shown on the previous page.
When written, the complete binary number is represented as four groups of decimal digits
separated by periods. This is called dotted decimal notation and provides a compact and
easy way to refer to 32-bit addresses. This representation is used frequently later in this
course, so it is necessary to understand it. For dotted decimal to binary conversions,
remember that each group of one to three decimal digits represents a group of eight
binary digits. If the decimal number that is being converted is less than 128, zeros will be
needed to be added to the left of the equivalent binary number until there are a total of
eight bits.
Try the following conversions for practice:
Convert 200.114.6.51 to its 32-bit binary equivalent.
Convert 10000000 01011101 00001111 10101010 to its dotted decimal equivalent.
The next page will introduce the hexadecimal number system.
1.2.8 Hexadecimal
This page will teach students about the hexadecimal number system. Students will also
learn how hexadecimal is used to represent binary and decimal numbers.
The hexadecimal or Base 16 number system is commonly used to represent binary
numbers in a more readable form. Computers perform computations in binary.
However, there are several instances when the binary output of a computer is expressed
in hexadecimal to make it easier to read.
The configuration register in Cisco routers often requires hexadecimal to binary and
binary to hexadecimal conversions. Cisco routers have a configuration register that is 16
bits long. The 16-bit binary number can be represented as a four-digit hexadecimal
number. For example, 0010000100000010 in binary equals 2102 in hexadecimal. A
hexadecimal number is often indicated with a 0x. For example, the hexadecimal number
2102 would be written as 0x2102.
Like the binary and decimal systems, the hexadecimal system is based on the use of
symbols, powers, and positions. The symbols that hexadecimal uses are the digits 0
through 9 and the letters A through F.
All combinations of four binary digits can be represented with one hexadecimal symbol.
These values require one or two decimal symbols. Two hexadecimal digits can efficiently
represent any combination of eight binary digits. This would require up to four decimal
digits. The use of two decimal digits to represent four bits could cause confusion. For
example, the eight bit binary number 01110011 would be 115 if converted to decimal
digits. It is unclear if this is 11 and 5 or 1 and 15. If 11-5 is used, the binary number would
be 1011 0101, which is not the number originally converted. The hexadecimal conversion
is 1F, which always converts back to 00011111.
An eight-bit binary number can be converted to two hexadecimal digits. This reduces the
confusion of reading long strings of binary numbers and the amount of space it takes to
write binary numbers. Remember that 0x may be used to indicate a hexadecimal value.
The hexadecimal number 5D might be written as 0x5D.
To convert to binary, simply expand each hexadecimal digit into its four-bit binary
equivalent.
The Lab Activity will teach students how to convert hexadecimal numbers into decimal
and binary values.
The next page will discuss Boolean logic.
11111111.00000000.00000000.00000000
00001010.00000000.00000000.00000000
The dotted decimal conversion is 10.0.0.0 which is the network portion of the IP address
when the 255.0.0.0 mask is used.
A Boolean AND of the IP address 10.34.23.134 and the subnet mask 255.255.0.0
produces the network address of this host:
00001010.00100010.00010111.10000110
11111111.11111111.00000000.00000000
00001010.00100010.00000000.00000000
The dotted decimal conversion is 10.34.0.0 which is the network portion of the IP address
when the 255.255.0.0 mask is used.
This is a brief illustration of the effect that a network mask has on an IP address. The
importance of masking will become much clearer as more work with IP addresses is
done. For right now it is only important that the concept of the mask is understood.
This page concludes this lesson. The next page will summarize the main points from the
module
SUMMARY
Decimal representation of IP addresses and network masksThis page summarizes the
topics discussed in this module.
A connection to a computer network can be broken down into the physical connection,
the logical connection, and the applications that interpret the data and display the
information. Establishment and maintenance of the physical connection requires
knowledge of PC components and peripherals. Connectivity to the Internet requires an
adapter card, which may be a modem or a network interface card (NIC).
In the early 1960s modems were introduced to provide connectivity to a central computer.
Today, access methods have progressed to services that provide constant, high-speed
access.
The logical connection uses standards called protocols. The Transmission Control
Protocol/Internet Protocol (TCP/IP) suite is the primary group of protocols used on the
Internet. TCP/IP can be configured on a workstation using operating system tools. The
ping utility can be used to test connectivity.
A web browser is software that is installed on the PC to gain access to the Internet and
local web pages. Occasionally a browser may require plug-in applications. These
applications work in conjunction with the browser to launch the program required to view
special or proprietary files.
Computers recognize and process data using the binary, or Base 2, numbering system.
Often the binary output of a computer is expressed in hexadecimal to make it easier to
read. The ablility to convert decimal numbers to binary numbers is valuable when
converting dotted decimal IP addresses to machine-readable binary format. Conversion
of hexadecimal numbers to binary, and binary numbers to hexadecimal, is a common
task when dealing with the configuration register in Cisco routers.
Boolean logic is a binary logic that allows two numbers to be compared and a choice
generated based on the two numbers. Two networking operations that use Boolean logic
are subnetting and wildcard masking.
The 32-bit binary addresses used on the Internet are referred to as Internet Protocol (IP)
addresses.