Premium Essay

Exploration Network Chapter 8

In:

Submitted By syahhizal
Words 3652
Pages 15
OSI Physical Layer

Network Fundamentals – Chapter 8

ITE PC v4.0 Chapter 1

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

1

Objectives
 Explain the role of physical layer protocols and services in supporting communication across data networks.
 Describe the role of signals used to represent bits as a frame as the frame is transported across the local media.  Describe the purpose of physical layer signaling and encoding as they are used in networks.  Identify the basic characteristics of copper, fiber and wireless network media.  Describe common uses of copper, fiber and wireless network media.
ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

2

Outline
 Physical layer: Communication signals
–Purpose of the physical layer –Physical layer standards –Physical layer fundamental principles

 Physical signaling and encoding: Representing bits
–Signaling bits for the media –Encoding: Grouping bits –Data-carrying capacity

 Physical media: Connecting communication
–Types of physical media
ITE PC v4.0 Chapter 1

–Media connectors

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

3

Purpose of the Physical Layer
 The roles of the OSI physical layer:
–To encode the binary digits that represent data link layer frames into signals. –To transmit and receive these signals across the physical media.

 There are various types of physical media and they carry different types of signals.
–Copper cable – electrical voltage. –Fiber optic – light pulses. –Wireless – electromagnetic waves.

ITE PC v4.0 Chapter 1

 Physical layer will encode the binary data in a frame to the proper type of signal depending on the physical media used.
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

4

Purpose of the Physical Layer

ITE PC v4.0 Chapter 1

©

Similar Documents

Premium Essay

Ccna Chapter 6

...Manuscript CHAPTER 6 Objectives ■ Upon completion of this chapter, you should be able to answer the following questions: What are the differences between classful and classless IP addressing? What is VLSM, and what are the benefits of classless IP addressing? ■ ■ What is the role of the classless interdomain routing (CIDR) standard in making efficient use of scarce IPv4 addresses? Key Terms This chapter uses the following key terms. You can find the definitions in the Glossary at the end of the book. classful IP addressing page 280 prefix aggregation page 285 network prefix page 286 contiguous page 294 discontiguous address assignment page 280 supernet page 280 private addressing page 281 high-order bits page 282 supernetting page 294 This is a prepublication draft of the manuscript. The final book will publish in December and will be available for purchase at http://www.ciscopress.com/title/9781587132063. raft Manuscript Draft Ma cript Draft Manuscript Dra Manuscript Draft Manuscri raft Manuscript Draft Ma uscript Draft Manuscript raft Manuscript Draft Ma script Draft Manuscript D ft Manuscript Draft Manu ript Draft Manuscript Dra Manuscript Draft Manuscri t Draft Manuscript Draft M nuscript Draft Manuscript 280 Routing Protocols and Concepts, CCNA Exploration Companion Guide Prior to 1981, IP addresses used only the first 8 bits to specify the network portion of the address, limiting the Internet—then known as ARPANET—to 256 networks. Early...

Words: 10468 - Pages: 42

Premium Essay

English 310

...hardware/software for telecommunications; asynchronous and synchronous protocols; codes; case studies of current commercial applications; distributed processing; carriers, services and regulatory agencies; standards; error management; reliability; design and tuning of networks; security. Prerequisites: CIS 370 Textbooks and Other Materials Required: Business Data Communications and Networking, Eleventh Edition, by J. FitzGerald and A. Dennis (ISBN: 978-1118-086834) Recommended: Network Fundamentals, CCNA Exploration Companion Guide, 1st edition, by Mark Dye, Rick McDonald, Antoon Rufi, Publisher: Cisco Press. ISBN-10: 1-58713-208-7; ISBN-13: 978-1-58713-208-7; Published: Oct 29, 2007. Network Fundamentals, CCNA Exploration Labs and Study Guide, 1st edition, by Antoon Rufi, Priscilla Oppenheimer, Belle Woodward, Gerlinde Brady. Publisher: Cisco Press. ISBN-10: 1-58713-203-6; ISBN-13: 978-1-58713-203-2; Published: Jan 18, 2008 Supplemental Materials: CCNA Exploration Course Materials, provided online. Each student is expected to have access to the Internet. Student Learning Objectives This course provides the basic knowledge and preparation for a network administrator position. The successful student will be able to: • Explain the purpose for the OSI model and the main functions of each year. • Describe the TCP/IP...

Words: 1655 - Pages: 7

Premium Essay

Cisco Router Exam Chapter 2

...CCNA Exploration 2: Chapter 2 toets antwoorden / CCNA Routing Protocols and Concepts exam 2 answers CCNA Exploration 2: Routing Protocols and Concepts Chapter 2 Exam Answers 1. What happens to a static route entry in a routing table when the outgoing interface is not available? The route is removed from the table. The router polls neighbors for a replacement route. The route remains in the table because it was defined as static. The router redirects the static route to compensate for the loss of the next hop device. 2. The routers in the diagram use the subnet assignments shown. What is the most efficient route summary that can be configured on Router3 to advertise the internal networks to the cloud? 192.1.1.0/26 and 192.1.1.64/27 192.1.1.128/25 192.1.1.0/23 and 192.1.1.64/23 192.1.1.0/24 192.1.1.0/25 192.1.1.0/24 and 192.1.1.64/24 [pic] 3. Hosts on two separate subnets cannot communicate. The network administrator suspects a missing route in one of the routing tables. Which three commands can be used to help troubleshoot Layer 3 connectivity issues? (Choose three.) ping show arp traceroute show ip route show interface show cdp neighbor detail 4. Refer to the exhibit. How will packets destined to the 172.16.0.0 network be forwarded? Router1 will perform recursive lookup and packet will exit S0/0. Router1 will perform recursive lookup and packet will exit S0/1. There is no matching interface associated with network 172.16.0.0 so packets will...

Words: 1947 - Pages: 8

Premium Essay

Philips Case Summary

...OVERVIEW & INNOVATION ACTIVITIES New Concept Development at Philips discusses how Philips revamped its approach to innovation and new product development in the early 2000s. Philips has a long, proud history of providing radical new products—innovations like X-ray tubes, CDs, Compact Cassettes, and Ambilight TV—mostly fueled by Philips’ understanding of innovation and significant R&D investments. Yet in 2000 Philips encountered a substantial net loss and the company decided it needed to rejuvenate the Philips’ brand, and give its approach to innovation a face lift, by focusing on innovation driven by end-user insights. Philips began its new journey with exploration. First, a vision team of four individuals was created with the goal of bringing inspirational ideas from the outside in. Second, they piloted a project for car headlights that combined the Dialogue Decision Process (DDP) and a design process based on socio-cultural insights. Third, Philips established the New Business Creation (NBC) group whose role was to challenge by asking simple questions and illicit “out of the box” development. Philips’ exploratory projects led to the inception of the “Think the Lighting Future” (TTLF) project by the end of 2001. Along with a list of intangible goals, the TTLF was tasked with clarifying alternative scope definitions, defining two to three NBC projects, and defining a knowledge sharing process. From the onset, TTLF benefited from having the full support of senior management...

Words: 851 - Pages: 4

Premium Essay

Jon Jons

...This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Exploration: Network Fundamentals course as part of an official Cisco Networking Academy Program. Activity 1.1.1: Using Google Earth™ to View the World Learning Objectives Upon completion of this activity, you will be able to: • • • • • Explain the purpose of Google Earth. Explain the different versions of Google Earth. Explain the hardware and software requirements needed to use Google Earth (free edition). Experiment with Google Earth features such as Help | Tutorial. Experiment with Google Earth to explore continents, countries, and places of interest. Background Google Earth is a popular application that executes on the desktop of most operating systems. It requires a broadband connection to the Internet and displays Earth as a manipulated 2D, or 3D image. The popular world news channel, CNN, regularly uses Google Earth to emphasize where a news story has occurred. At the time of writing this activity, there are three versions of Google Earth. The version that fits most needs is Google's free version, Google Earth. A Google Earth Plus version includes GPS support, a spreadsheet importer, and other support features. The Google Earth Pro version is for professional and commercial use. The URL http://earth.google.com/product_comparison.html contains a description of the versions...

Words: 60675 - Pages: 243

Premium Essay

Shale

...SHALE GAS :AN UNCONVETIONAL GAS RESERVOIR SUNJAY,SUSHEEL KUMAR AND NIKHIL JAIN Geophysics ,Geology ,Mining Engg-IIT ,BHU ,Varansi 221005 ,India Sunjay.sunjay@gmail.com,skumarpetro09@gmail.com, nikhilchhajar@gmail.com Summary With a view to energy security of the world, unconventional energy resources - coalbed methane (CBM) , Methane Gas Hydrate, shale gas, basin centred gas ,tight gas, oil shale and heavy oil- exploration and exploitation is pertinent task before geoscientist . Shale gas is natural gas from shale formations which acts as both the source and the reservoir for the natural gas. Each Shale gas reservoir has unique characteristics. Shale has low matrix permeability, so gas production in commercial quantities requires fractures to provide permeability. For a given matrix permeability and pressure, gas production are determined by the number and complexity of fractures created, their effective conductivity, and the ability to effectively reduce the pressure throughout the fracture network to initiate gas production. Understanding the relationship between fracture complexity, fracture conductivity, matrix permeability, and gas recovery is a fundamental challenge of shale-gas development. Shale gas reservoirs almost always have two different storage volumes (dual porosity) for hydrocarbons, the rock matrix and the natural fractures .Because of the plastic nature of shale formations, these natural fractures are generally closed due to the pressure...

Words: 3175 - Pages: 13

Premium Essay

Ccna 3 Pt Lab Manual

...This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Exploration: LAN Switching and Wireless course as part of an official Cisco Networking Academy Program. PT Activity 1.2.4: Build a Hierarchical Topology Topology Diagram Learning Objectives • • Add devices to a topology. Connect the devices. Introduction Packet Tracer is integrated throughout this course. You must know how to navigate the Packet Tracer environment to complete this course. Use the tutorials if you need a review of Packet Tracer fundamentals. The tutorials are located in the Packet Tracer Help menu. This activity focuses on building a hierarchical topology, from the core to the distribution and access layers. All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 3 CCNA Exploration LAN Switching and Wireless: LAN Design PT Activity 1.2.4: Build a Hierarchical Topology Task 1: Add Devices to the Topology Step 1. Add the missing distribution layer routers. The routers you need are located in Custom Made Devices. R1 and R3 are 1841 routers. Ctrl-click the 1841 router to add more than one. Press ESC to cancel. R2 is a 2621XM router. Step 2. Add the remaining access layer switches. Following the topology diagram, add nine 2960-24TT switches to complete the rest of the access...

Words: 48601 - Pages: 195

Premium Essay

Chapter 2

...2. Oil and gas sector This chapter begins with an overview of the oil and gas industry in Malaysia. Description of the value chain of the industry is given in section 2.2, followed by the industry’s economic performance in section 2.3. Section 2.4 focuses on the scope of the inquiry regarding issues in the oil and gas industry. 2.1 Oil and gas industry in Malaysia This section provides an overview of the oil and gas industry in Malaysia. 2.1.1 History Oil and gas production have been a mainstay of Malaysia’s growth since oil was first drilled in 1910 in Miri, Sarawak. The first oil well (known as The Grand Old Lady) which was discovered by Shell, started with a production of 83 barrels per day (bbls/d) and reached a maximum of 15,000 bbls/d in 1929. There were no other drilling activities elsewhere in Borneo or Peninsular Malaya until the 1950s. [1, 2, 3] Petroleum activities began increasing significantly in 1960s due to the discovery and development of offshore fields in Borneo. The late 1960s saw the beginning of offshore oil exploration in the east coast of Peninsular Malaysia. In the 1970s, some oil fields in Malaysia were producing 90,000 to 99,000 bbls/d. [2] In the early days, foreign oil companies dominated the oil and gas industry in Malaysia with Shell and Esso being the two major players. This was followed by several other foreign companies such as Conoco, Mobil, Aquitaine, Oceanic and Teiseki. The national company, Petronas came on to the scene in...

Words: 6202 - Pages: 25

Premium Essay

Nt 1210

...Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520...

Words: 4400 - Pages: 18

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520...

Words: 4400 - Pages: 18

Premium Essay

Siwes

...A REPORT ON SIX MONTHS STUDENTS INDUSTRIAL WORK EXPERIENCE SCHEME. AT NIKORMA (A SUBSIDIARY OF NIGERIAN NATIONAL PETROLEUM CORPORATION) HEADQUATERS, This located at no.7 lake chart crescent, Maitama. Abuja BY CS/08/1332 IN PARTIAL FULFILLMENT FOR THE REQUIREMENT FOR THE AWARD OF BACHELOR DEGREE IN TECHNOLOGY (B.TECH) IN COMPUTER SCIENCE. MODIBBO ADAMA UNIVERSITY OF TECHNOLOGY YOLA, NIGER STATE OCTOBER 2012 DEDICATION This report is dedicated to the Almighty ALLAH and to my beloved mother and Mrs Aisha Tijjani and her husband also with the entire staffs and students of Surveying and Geo-informatics Federal University of Technology Minna. ACKNOWLEDGEMENT My profound gratitude goes to the Almighty God who saw me through this training program and thanks my parents and siblings who encouraged me when the road seemed too tough, for shelter and financial support. My appreciation goes to the staff of Pipeline and Products Marketing Company (PPMC) especially my supervisor and the staff of Pipeline Right Of Way (PROW) and to all NNPC staff and development control for their kind support and for the knowledge they impacted on me during the period of my training. My thanks goes to the SIWES and ITF coordinators especially the Federal University Of Technology Minna SIWES coordinator, my Head of Department...

Words: 9120 - Pages: 37

Free Essay

Green It

...Is Green IT Threat to Security Dissertation Supervisor name: Student name : Student number: Intake: Contents 1 Introduction 4 1.2 purposes of study 6 1.3 Problem Gartner research on Green 6 1.4 Background and Motivation 7 1.5 Audience 8 1.6 Outcome of Study 8 2 Introduction 10 2.1 Green IT 10 2.2 Why IT Need to be Green 12 2.3 Benefits of Green IT 13 2.4 Companies Interest in Green IT 14 2.5 Green IT and Information Assurance and Security 14 2.6 Information Assurance and Security 15 2.7 Green IT from Information Assurance viewpoint 16 2.8 Dimension of Green IT 18 2.9 Green IT Initiatives 19 3 Introduction 21 3.1 Research design 21 3.2 Justification of paradigm and methodology 22 3.3 Data Collection Methods 23 3.3.1 Questionnaires 23 3.3.2 Interview 24 3.4 Data Analysis and Interpretation 25 3.5 Ethical Considerations 25 3.6 Chapter Summary 26 4 Introduction 27 4.1 Presentation and Analysis of data 28 4.1.1 Quantitative data analysis 29 4.1.2 Demographic Questions: 29 4.2 Technical question 32 4.2.1 Quantitative analysis 46 4.3 Quantitative analysis 46 4.4 Chapter summary: 47 4.5 Recommendation and suggestions 48 5 Introduction 49 5.1 Security assurance in cloud computing 50 5.1.1 Confidentiality 51 5.1.2 Correctness Assurance 51 5.1.3 Availability 51 5.1.4 Data Integrity 52 5.2 Security guideline 52 5.2.1 Cloud Service Provider Agent (CSPA)...

Words: 12275 - Pages: 50

Premium Essay

Mprl E&P Pte Company's Strategic Analysis

...Table of Contents Chapter 1 INRODUCTION 1.1 Company Background, Geographical area 1.2 Overall investment in Oil and gas production 1.3 Vision, Mission statements, goal, objective 1.4 Competitive advantages Chapter 2 Strategic Management process 2.1 Competitive advantages 2.2 External Analysis ( PESTEL, Industry analysis using Poters five forces) 2.3 Internal Analysis (Resources and capabilities of the company) 2.4 SWOT Analysis Chapter 3 Strategy Formulation. 3.1 Business level strategies 3.2 Corporate level strategies Chapter 4 Strategy Implementation 4.1 Structure, control, corporate governance, culture, business ethics, 4.2 Decision making structure, CSR Chapter 5 Conclusion & Recommendation 5.1 Conclusion 5.2 Recommendation 5.3 References 5.4 Appendices ( Appendix A,B,C,D) Chapter 1 INRODUCTION I had an...

Words: 4878 - Pages: 20

Premium Essay

Dfdfasdfa

...Chapter: 07 Telecommunications, The Internet and Wireless Technology 1. Question: What are the principal components of telecommunications networks and key networking technologies? Answer: The principal components of telecommunications networks: Telecommunications are the means of electronic transmission of information over distances. The information may be in the form of voice telephone calls, data, text, images, or video. Today, telecommunications are used to organize more or less remote computer systems into telecommunications networks. These networks themselves are run by computers. A telecommunications network is an arrangement of computing and telecommunications resources for communication of information between distant locations. A telecommunications network includes the following components: Figure: principal components of a simple computer network 1. Computer: Computers that process information and are interconnected by the network 2. Network Interface: Each computer on the network contains a network interface device called a network interface card (NIC). 3. A Connection medium: The connection medium for linking network components can be a telephone wire, Coaxial cable or radio signal in the case of cell phone and wireless local area networks. 4. Network operating System software: The network operating system (NOS) routes and manages communications on the network and coordinates network resources. ...

Words: 1634 - Pages: 7

Premium Essay

Intro to Data Mining

...Data Mining: Concepts and Techniques (3rd ed.) Jiawei Han, Micheline Kamber, and Jian Pei University of Illinois at Urbana-Champaign & Simon Fraser University ©2011 Han, Kamber & Pei. All rights reserved. Adapted for CSE 347-447, Lecture 1b, Spring 2015 1 1 Introduction n  n  n  n  n  n  n  n  n  n  Why Data Mining? What Is Data Mining? A Multi-Dimensional View of Data Mining What Kind of Data Can Be Mined? What Kinds of Patterns Can Be Mined? What Technologies Are Used? What Kind of Applications Are Targeted? Major Issues in Data Mining A Brief History of Data Mining and Data Mining Society Summary 2 Why Data Mining? n  The Explosive Growth of Data: from terabytes to petabytes n  Data collection and data availability n  Automated data collection tools, database systems, Web, computerized society n  Major sources of abundant data n  n  n  Business: Web, e-commerce, transactions, stocks, … Science: Remote sensing, bioinformatics, scientific simulation, … Society and everyone: news, digital cameras, YouTube n  n  We are drowning in data, but starving for knowledge! “Necessity is the mother of invention”—Data mining—Automated analysis of massive data sets 3 Evolution of Sciences: New Data Science Era n  n  Before 1600: Empirical science 1600-1950s: Theoretical science n  Each discipline has grown a theoretical component. Theoretical models often motivate experiments and generalize our understanding...

Words: 3169 - Pages: 13