Ccna 1 networking basics ebook




















A router is an electronic device used to connect network on LAN. It connects at least two networks and forwards packets among them. According to the information in the packet headers and routing tables, the router connects the network. Computer over the Internet communicates through an IP address.

Each device in the network is identified by a unique IP address. These IP addresses use binary digit, which is converted to a decimal number. We will see this in the later part, first see some basic binary digit lessons. Binary numbers include numbers 1,1,0,0,1,1. But how this number is used in routing and communicate between networks. Let start with some basic binary lesson. In binary arithmetic, every binary value consists of 8 bits, either 1 or 0.

You will be familiar with decimals positions like 10, , , 10, and so on. Which is nothing but just power to Binary values work in a similar way but instead of base 10, it will use the base to 2. The values for the bits ascends from left to right.

For this, you will get values like 1,2,4,…. Now since you are familiar with the value of each bit in a byte. The next step is to understand how these numbers are converted to binary like and so on. In the table above, you can see that the bits with the value 64, 32, 8, 4 and 2 are turned on and represented as binary 1. So for the binary values in the table , we add the numbers. For constructing a network, first, we need to understand how IP address works. An IP address is an Internet protocol.

It is primarily responsible for routing packets across a packet switched network. The IP address is made up of 32 binary bits that are divisible to a network portion and host portion.

Each octet is converted to decimal and separated by a period dot. The value in each octet ranges from 0 to decimal. The right most bit of octet holds a value of 2 0 and gradually increases till 2 7 as shown below. For example, we have an IP address Now, if you convert them into a binary form. It will look something like this, For any organization, you might require a small network of several dozen standalone machines.

For that, one must require setting up a network with more than hosts in several buildings. This arrangement can be made by dividing the network into subdivision known as Subnets. Performance can be adversely affected under heavy traffic loads, due to collisions and the resulting retransmissions. For that subnet masking can be a useful strategy. Applying the subnet mask to an IP address, split IP address into two parts extended network address and host address. Subnet mask helps you to pinpoint where the end points on the subnet are if you are provided within that subnet.

Secure your router from unauthorized access, tampering, and eavesdropping. For this use technologies like,. Data can be divided into two categories. Skip to content. What is CCNA? What You Will Learn.

Report a Bug. Previous Prev. Next Continue. Home Testing Expand child menu Expand. SAP Expand child menu Expand. Web Expand child menu Expand. Must Learn Expand child menu Expand. Big Data Expand child menu Expand. Live Project Expand child menu Expand. This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising.

Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure. Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider.

Marketing preferences may be changed at any time. If a user's personally identifiable information changes such as your postal address or email address , we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page.

If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service informit. Users can always make an informed choice as to whether they should proceed with certain services offered by Cisco Press. If you choose to remove yourself from our mailing list s simply visit the following page and uncheck any communication you no longer want to receive: www.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest pearson. California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice.

The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services. This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites.

We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information. We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way.

Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions. All rights reserved. Cisco Press. Join Sign In. View Larger Image. Part of the Companion Guide series. Book Sorry, this book is no longer in print. Not for Sale. Description Sample Content Updates.

Key terms—Refer to the updated lists of networking vocabulary introduced in each chapter and turn to the highlighted terms in context. Glossary—Consult the all-new glossary with more than terms. Check Your Understanding questions and answer key—Evaluate your readiness with the updated end-of-chapter questions that match the style of questions you see in the online course assessments.

By using our site, you agree to our collection of information through the use of cookies. To learn more, view our Privacy Policy. To browse Academia. Log in with Facebook Log in with Google.

Remember me on this computer. Enter the email address you signed up with and we'll email you a reset link. Need an account? Click here to sign up. Download Free PDF. Roxana Vlad. A short summary of this paper. Download Download PDF. Translate PDF.



0コメント

  • 1000 / 1000