Copyright 2021 - All rights reserved.
This document is geared towards providing exact and reliable information in regards to the topic and issue covered. The publication is sold with the idea that the publisher is not required to render accounting, officially permitted or otherwise qualified services. If advice is necessary, legal or professional, a practiced individual in the profession should be ordered.
From a Declaration of Principles which was accepted and approved equally by a Committee of the American Bar Association and a Committee of Publishers and Associations.
In no way is it legal to reproduce, duplicate, or transmit any part of this document in either electronic means or in printed format. Recording of this publication is strictly prohibited, and any storage of this document is not allowed unless with written permission from the publisher. All rights reserved.
The information provided herein is truthful and consistent, in that any liability, in terms of inattention or otherwise, by any usage or abuse of any policies, processes, or directions contained within is the solitary and utter responsibility of the recipient reader. Under no circumstances will any legal responsibility or blame be held against the publisher for any reparation, damages, or monetary loss due to the information herein, either directly or indirectly.
Respective authors own all copyrights not held by the publisher.
The information herein is offered for informational purposes solely and is universal as so. The presentation of the information is without a contract or any type of guarantee assurance.
The trademarks that are used are without any consent, and the publication of the trademark is without permission or backing by the trademark owner. All trademarks and brands within this book are for clarifying purposes only and are owned by the owners themselves, not affiliated with this document.
Table of Contents
A Comprehensive Beginner's Guide from A-Z
for CCNA and Computer Networking Users
Cisco CCNA
Command Guide
A Comprehensive Beginner's Guide from A-Z for CCNA and Computer Networking Users
Stuart Nicholas
Introduction
In addition to a connection between two or more devices to share resources and exchange of information, a computer network enables the interaction of people, reduction of transportation costs, and the realization of distributed processing. To perform these activities, a computer network works with different complexities, because for each objective to be achieved, a network may have different equipment and ways of working. To help you understand these structures, in this chapter, you will study the first concepts about what makes up a computer network and how it works.
In this chapter, you will learn about conceptualizing protocol, Rate networks as its scope, recognize the different topologies of computer networks, and Compare the components as well as physical means used in a network.
With the evolution and the emergence of minicomputers in the 1960s, users had available terminals connected to these central computers, creating the first idea of computer networks. In the mid-1970s, the United States Department of Defense (DoD) has expanded its network used in research and military operations for universities. With this network, it was possible to share the physical environment and using multiple ways to connect two points without the need to use a telephone line connection, starting the ARPAnet.
The Beginning of Data Sharing
However, it was in the 1980s that was a great expansion of information technology and computer networks for home users because, with the advent of personal computers (PCs), home users have access to information technologies, which led to the need for connection between these importers computed. At that time, they originated the Bulletin boards (BBS), where users shared messages and files from your computer to other computers via telephone lines.
Then, in the 1990s, it was the union of these two ideas, the possibility of sharing data and information for users and companies using the physical environment, thus resulting in the internet.
The Internet Today
We are currently experiencing the second generation of the Internet, where certain information is not available in one physical location in the world. Today, information is available on the concept of clouds, i.e., the same information can be in several places in the world and still be changed location without users noticing this movement.
This book will help you to contribute to the evolution of the Internet, understanding and performing the deployment of such services.
Server Architecture and Peer
If you need to connect home computers or business, the way simpler to deploy a computer network is each component looks user folders from their computers to be accessed by others. These mannerisms, you are using the point to point architecture in which all computers on the network share and access data from other computers.
In architecture servers, there is a computer responsible for maintaining and provide information, called a server; computers accessing this information are called stations.
This architecture is widely used in enterprises and institutions that need to ensure the security and availability of information. Therefore, the centered data, it is much easier to perform backups (backup) or ensure the security of information against possible attacks.
The point to point architecture can be expanded to the internet where, through specific programs, you can share files with other users on the internet. Research peer to peer client.
Internet, Intranet, and Extranet
The intranet is where a company can use the same systems and servers that provide information to the internet, only back for the internal public, that is, a place that allows its employees to access restricted information from within the company, but with the same interface a site.
As we have seen, the Internet is a framework that enables information sharing among all global way. However, some information is not de- be public, especially in the business area.
Imagine companies having access to the purchase price of products from its current con-, or your personal data are available for all to access? To protect this information, it created the concept of the intranet.
Already the extranet is an evolution of the intranet; It is to share restricted information from a company with its customers or suppliers, making use of any means of protection as cryptographic cards or passwords. Thus, an undertaking client can access the system from a supplier, for example, ordering products online form.
Structure of Information Sharing
Internet | It is a framework that enables the sharing of data worldwide. |
Intranet | It is a network that uses the same systems and servers internet; however, with the internal operation, usually on an enterprise level. |
Extranet | It is a resource based on the intranet, typically used in enterprise-level, which allows data sharing restricted between company and customers. |
Protocols of Communication
In our relationships in society, daily, use the protocol of good manners, how to respond "OK" or "more or less" when someone asks us "as you are?". This is the concept of protocol, preset messages, and responses that can be used both by individuals or computers to conduct communication.