Skip to main content

Posts

Showing posts from August, 2020

NETWORKING: PACKET TRACER TUTORIAL VIDEOS

 If you are new to Packet Tracer and need some tutorials, here are some tutorials to help you on which have been collected: PACKET TRACER FOR BEGINNERS - PART 1 PACKET TRACER FOR BEGINNERS - PART 2 PACKET TUTORIAL #1 PACKET TUTORIAL #2 PACKET TUTORIAL #3

NETWORKING: PACKET TRACER

INTRODUCTION TO PACKET TRACER The Packet tracer is a networking tool that helps you learn networking through hands on.  This tool  is able to help you master the networking skills on the desktop. You can use the packet tracer to: Sharpen your skills for a job interview Prepare for a certification exam Practice networking while learning Introduction to Packet Tracer Packet tracer is a tool that simulates real networks.  It provides three main menus: Add devices and connect them via cables and wireless Select, Delete, Inspect, Label and Group components within your network Manage your network Getting Started with Packet Tracer As the packet tracer simulates networks and network traffic,  the physical aspects of these networks also needs to be simulated. Finding a device to deploy requires looking into the Device-Type Selection Box Packet Tracer Deploying Services Packet Tracer Deploying Devices Packet Tracer File - email to me @ packet tracer resource Packet Tracer D

COMPUTER NETWORKING ARCHITECTURE: THE BASIC MODULES

 The main modules that constitutes a computer: The memory The processor The exchange units MEMORY Memory holds all the data used by the processor.  There are two types of data: A series of instructions Data on which to execute these instructions The information stored in a memory only becomes meaningful once it is used.  **If it is handled by a program, it consists of data, and if it is read by the control unit to be executed, it consists of instructions. For example: If we double click on the icon of a word processor, then this program, stored on a drive, is transferred to memory using a program called a LOADER, which sees it as "data" until becomes a "program" to the user. Memory is also known as memory words, made up of m electronic elements that can exist in two stable states referred to as "0" and "1".   Each cell is identified by a number - its address.  The information in the memory is accessed by setting n lines of the address buse

THE OSI MODEL: THE 7 LAYERS IN NETWORKING EXPLAINED

 The Open Systems Interconnection (OSI)  was developed by the International Organization for Standardization in 1984 to enable different types of networks to be linked together.  The model contains seven layers, as shown in the Figure below. These layers describe networking functions from the physical network interface to the software applications interfaces. The intent of the OSI model is to provide a framework for networking that ensures compatibility in the network hardware and software and to accelerate the development of new networking technologies.  Physical layer Provides the electrical and mechanical connection to the network. Examples of technologies working in this layer are Electronic Industries Alliance/Telecommunications Industry Association (EIA/TIA)–related technologies, UTP, fiber, and network interface cards (NICs).  It uses topologies: BUS, STAR, RING, MESH Communication modes: Simplex, Half Duplex, Full Duplex Hardware including networking devices, antennas, c

THE NETWORK TRANSMISSION MEDIUM: ALL STUDENTS MUST KNOW OF....

TWISTED PAIR CABLES This type of cabling is used for telephone communications and most modern Ethernet networks.  A pair of wires forms a circuit that can transmit data.  A pair of wires forms a circuit that can transmit data. If the pair of wires are not twisted, electromagnetic noises (ex:motor), will effect the closer wire more, than the further one, therefore causing error. T wisted pairs  are  cables  that are designed with two independent insulated wires wrapped around each other and with the goal to help to combat electromagnetic interference. A  twisted pair cable  comprises of two separate insulated copper  wires , which are  twisted  together and run in parallel. The copper  wires  are typically 1mm in diameter. One of the  wires  is used to transmit data and the other is the ground reference. Twisted - pair cabling  is often used in data networks for short and medium-length connections because of its relatively lower costs compared to optical fiber and coaxial  cable

HOW CAN CLIENT / SERVER NETWORK MODEL BE A CHANGE FOR YOU??

WHAT IS CLIENT / SERVER?  In the client-server network model (which is sometimes called the client-server architecture or client-server topology), resources are managed by the network operating system through a centralized directory database.  The database can be managed by one or more servers, as long as they have the same network operating system. In the midst of a WINDOWS SERVER   controls network access to a group of computers, this LOGICAL group is known as Windows DOMAIN .  The centralized directory database that keeps user account information & security for the entire group of computers is called AD (Active Directory) .   Each user on the network has his/her own domain level account assigned by the network administrator and kept in Active Directory .   A user can sign on to the network from any computer on the network and get access to the resources that Active Directory allows. The process is managed by AD DS (Active Directory Domain Services) .  A computer makes a re

PEER TO PEER NETWORK MODEL: HOW CAN IT MAKE A DIFFERENCE IN YOUR EVERYDAY TASK?

When using  peer-to-peer network model, the operating system of each computer on the network is responsible for controlling access to its resources without centralized control.  The computers are known as nodes or hosts on the network, form a logical group of computers and users that share resources.  Each computer using peer-to-peer network controls its own administration, resources and security.  Basically, it functions without any intermediary.   The types of operating system that can be installed on computers in a peer to peer network are Windows, Linux and macOS. You can also be more open to knowing how this Peer-to-peer settings can help you in your studies as well as in the future. Keep in mind that the connecting lines describes the logical arrangement or topology of the group of computers. THE ADVANTAGES OF USING PEER-TO-PEER NETWORKS: They are simple to configure. For these reason, this network type can be used where technical assistants are scarce. They are often less

HOW CAN SO MANY COMPUTERS CONNECT TOGETHER?

Computers are networked together and sharing of resources is a fame today. Many of you out there are speculating on, how can these so many computers in a home, office, society and even a nation can connect the computers together without any flaw.  There are billions of computer out there working all around the world.  How can this be?   THE RATIONAL OF TOPOLOGY A topology describes how the part of the whole work together.  When studying networking, it is important to understand both the physical topology and the logical topology of a network. PHYSICAL TOPOLOGY This refers to a network's hardware & how computers, other devices and cables fit together to form a physical network. LOGICAL TOPOLOGY This type of topology approach has a lot to do with software, how access to the network is controlled, including how users and programs initially gain access to the network and how specific resources such as applications and databases are shared on the network. THE TOPOLOGIES THAT

FUNDAMENTALS OF NETWORKING

JOB OPPORTUNITIES IN NETWORKING A short discussion can be on: Provide job opportunities that has taken your interest based on the video watched...  WHAT IS A NETWORK?  A network is  a group of computers & other devices that are connected by some type of transmission media. A network can be as small as two computers connected together by a cable or can even be made up of  billions of computers & other devices connected across the world through radio waves, satellites, infra red beams, cable, wireless and even phone lines. The other devices can be referred to cell phones, personal computers, mainframe computers, printers, scanners, security cameras, vehicles and wearable technology devices. TYPES OF NETWORK  Local Area Network (LAN) Metropolitan Area Network (MAN) Wide Area Network (WAN) Personal Area Network (PAN)