1. Cisco Network Support Certifications 2. Networking Terms 3. INTRODUCTION TO NETWORKING 4. TYPES OF NETWORK 5. The Development of the Internet 6. NETWORK ARCHITECTURE 7. TOPOLOGY 8. BUS TOPOLOGY 9. RING TOPOLOGY 10. STAR TOPOLOGY 11. MESH TOPOLOGY 12. HYBRID TOPOLOGY 13. Speed of Networking device 14. NETWORK DEVICES 15. Exploring Wireless Network 16. REPEATERS 17. HUB 18. SWITCH 19. BRIDGE 20. ROUTERS 21. TRANSMISSION Telecommunication 22. Difference between Full Duplex, Half Duplex and Simplex 23. IP-ADDRESSING and IPV4 24. IPv4 address classes 25. IPV6 [ Internet Protocol Version 6 ] 26. SPEED OF VARIOUS DEVICES 27. Network Security 28. Some basic suggestion and steps to prevent Attacks and Network security 29. OSI model 30. UPPER and LOWER Layer 31. Application Layer (Layer 7) 32. Presentation Layer (Layer 6) 33. Session Layer (Layer 5) 34. Transport Layer (Layer 4) 35. Network Layer (Layer 3) 36. Data Link Layer 2 37. Physical Layer 1 38. TCP/IP The DoD Model 39. ROUTED PROTOCOL 40. Ports and Application 41. Important Application, Protocol and Port Number 42. Router Function 43. Types of Routing Protocols 44. STARTING ROUTER 45. CISCO IOS 46. Logging in to the Router 47. CISCO Router IOS commands List 48. Setting time and date of router 49. Router configuration commands 50. Optimizing Switch and Router 51. Understanding Router Terms 52. ROUTER SECURITY 53. Configuring CISCO SWITCH Security Policy 54. IMPLEMENTING STATIC ROUTING 55. UNDERSTANDING THE NEED FOR NAT 56. WAN Connections 57. Access List [ACL] 58. VLAN [Virtual Local Area Network] 59. SPANNING TREE :- BROADCAST STORM 60. Lab 1 Setting up a Serial Interface 61. Lab 2 : IP Addressing 62. Lab 3 Static Routes 63. Lab 4 Default Routes 64. Lab 5 RIP Routes 65. Lab 6 IGRP Routes 66. Lab 7 EIGRP Routes 67. Lab 8 OSPF Routes 68. Lab 9 CHAP and RIP 69. Lab 10 Standard Access-Lists with RIP 70. Lab 11 Extended Access-Lists with RIP 71. Lab 12 Static NAT 72. Lab 13 Many to One NAT 73. Lab 14 NAT Pool 74. Lab 15 ( 2950 Trunk ) 75. Lab 16 ( 2950 Trunk Dynamic ) 76. Lab 17 (2950 VLANs) 77. Lab 18 ( 2950 Deleting VLANs ) 78. Lab 19 ( 2950 VTP ) 79. Lab 20 ( 2950 VTP w/ client ) 80. Lab 21 ( 2950 Telnet )
Pr.Pg Next Pg


The way in which computers participate on a network is known as the NETWORK ARCHITECTURE. There are 3 types of network architecture.





  • In order to select any of above type of network, organization has to look after many factors i.e.

  • geographical location,

  • number of users,

  • special application needs,

  • network bandwidth available and

  • Amount of technical support available.



  • As name suggest everyone is peer [equal] to each other

  • This type of network allows 10 or fewer users to effectively share and manage resources on their network with others. APPLE was first to introduce peer-to-peer network with Macintosh Plus in 1984. Microsoft introduced it in 1992 with Windows for workgroup 3.11

  • It reduces TCO (Total Cost of Ownership) as user can share resource such as Folder, Printer, CD-Rom drives in a decentralize way. User files are not stored on central location.

  • Server is not available so additional S/w or H/w is not required.

  • They allow computers to communicate easily, it is easy to configure.

  • It has little or no security and it donít require extra network administrator.


  • However it suffers from sluggish performance

  • It doesnít allow centralized management

  • Suitable only for limited no. of users.

  • It offers very poor security.




  • Before client-server network model, there were terminals attached to host computer.

  • The host computer/server, were in-fact mainframe or mini-computer responsible for all communication, storage and processing.

  • Terminal were called dummy terminal, run the application from host computer. The terminal did not have its own hard-disk or other means to store data. It was just dump device to input key-stokes and display output on screen that were sent by host computer.

  • Files were saved centrally and hence it could be easily backed up.

  • High level of security can be implemented to protect valuable data.

  • Users are relieved from managing resources, but it needed dedicated staff for centralized for managing server



  • As latest development took place powerful computers were developed and this technology gave way to client-server network technology.

  • Today most users have computer that can independently store data, run application on it and process it.

  • Server hardware and software were very expensive.

  • Planning, designing and managing were complicated and dedicated staff was required to manage server.




  • This is centralized model for data storage, security, running applications and network administration. Today it is most common networking architecture.

  • Client-Server network is also referred as Server-based network. Here Client is a computer which request for information, where as Server is a computer that respond to the request.

  • They employ server :- specialized computer that provide services to client computers.

  • They are based on scalable model that can support small network of 10 users to very large network with thousands of users.

  • They allow a high level of security

  • Most servers are centrally managed by network administrator or team of specialist.



  • Keep in mind that a server is what a computer is doing in the network. Windows Server 2003 is just a name of the latest Microsoft operating system; it can be both a server and a client, depending on what itís doing.

  • For example, a computer running the Windows 98 operating system could be the companyís print server, and that another computer running Windows Server 2003 could be a print client of the 98 machine. At the same time, the Windows Server 2003 system could be providing DNS name resolution services to the Windows 98 client machine.

  • Disadvantage

  • Server hardware and software were very expensive.

  • Planning, designing and managing were complicated and dedicated staff was required to manage server.

  • Planning, design and management are complicated.

Pr.Pg border                                              Next Pg