1. Cisco Network Support Certifications 2. Networking Terms 3. INTRODUCTION TO NETWORKING 4. TYPES OF NETWORK 5. The Development of the Internet 6. NETWORK ARCHITECTURE 7. TOPOLOGY 8. BUS TOPOLOGY 9. RING TOPOLOGY 10. STAR TOPOLOGY 11. MESH TOPOLOGY 12. HYBRID TOPOLOGY 13. Speed of Networking device 14. NETWORK DEVICES 15. Exploring Wireless Network 16. REPEATERS 17. HUB 18. SWITCH 19. BRIDGE 20. ROUTERS 21. TRANSMISSION Telecommunication 22. Difference between Full Duplex, Half Duplex and Simplex 23. IP-ADDRESSING and IPV4 24. IPv4 address classes 25. IPV6 [ Internet Protocol Version 6 ] 26. SPEED OF VARIOUS DEVICES 27. Network Security 28. Some basic suggestion and steps to prevent Attacks and Network security 29. OSI model 30. UPPER and LOWER Layer 31. Application Layer (Layer 7) 32. Presentation Layer (Layer 6) 33. Session Layer (Layer 5) 34. Transport Layer (Layer 4) 35. Network Layer (Layer 3) 36. Data Link Layer 2 37. Physical Layer 1 38. TCP/IP The DoD Model 39. ROUTED PROTOCOL 40. Ports and Application 41. Important Application, Protocol and Port Number 42. Router Function 43. Types of Routing Protocols 44. STARTING ROUTER 45. CISCO IOS 46. Logging in to the Router 47. CISCO Router IOS commands List 48. Setting time and date of router 49. Router configuration commands 50. Optimizing Switch and Router 51. Understanding Router Terms 52. ROUTER SECURITY 53. Configuring CISCO SWITCH Security Policy 54. IMPLEMENTING STATIC ROUTING 55. UNDERSTANDING THE NEED FOR NAT 56. WAN Connections 57. Access List [ACL] 58. VLAN [Virtual Local Area Network] 59. SPANNING TREE :- BROADCAST STORM 60. Lab 1 Setting up a Serial Interface 61. Lab 2 : IP Addressing 62. Lab 3 Static Routes 63. Lab 4 Default Routes 64. Lab 5 RIP Routes 65. Lab 6 IGRP Routes 66. Lab 7 EIGRP Routes 67. Lab 8 OSPF Routes 68. Lab 9 CHAP and RIP 69. Lab 10 Standard Access-Lists with RIP 70. Lab 11 Extended Access-Lists with RIP 71. Lab 12 Static NAT 72. Lab 13 Many to One NAT 73. Lab 14 NAT Pool 74. Lab 15 ( 2950 Trunk ) 75. Lab 16 ( 2950 Trunk Dynamic ) 76. Lab 17 (2950 VLANs) 77. Lab 18 ( 2950 Deleting VLANs ) 78. Lab 19 ( 2950 VTP ) 79. Lab 20 ( 2950 VTP w/ client ) 80. Lab 21 ( 2950 Telnet )
Pr.Pg Next Pg

Networking Terms tutorials

NIC Card:

  • Network interface card (NIC): Connects a PC to a LAN, commonly known as LAN card.



  • The physical transport used to carry data. Most of the time, this can be just a cable twisted-pair, CAT cable, fiber or Air (for wireless transmission).



  • A set of communication rules used by computer or network devices.


Cisco IOS Software:

  • The most widely deployed network system software. Cisco IOS services include basic connec≠tivity, security, network management & other adv. services.



  • A computer or device that requests information from a server.



  • A computer or device that provides services of information to clients.


Network operating system (NOS):

  • Refers to the operating system running on servers. This includes Windows 2003 Server, Novell NetWare, UNIX, and Linux.


Connectivity device:

  • Any device that connects cable segments, connects two or more small networks into a larger one, or divides a large network into small ones.



  • Defines the design of the network. Most common topologies are BUS, RING, STAR, MESH and HYBRID.


Physical topology:

  • These shapes include linear bus, ring, star, and mesh. It defines the physical shape & components of the network cables, network devices, and so on.


Logical topology:

  • It is the path that data takes from one computer to another.



  • Also called data rate, speed is how fast data is transmitted over the network.



  • The general cost of network components, installation, and maintenance.



  • Defines how secure the network and network data are.



  • The measure of the likelihood that the network will be available for use when

  • required. Calculated using the following formula:

[(525,600 - Minutes downtime) / 525,600] * 100.

[Here :- 525,600 is the total number of minutes in a year i.e. 365*24*60]



  • How well the network can accommodate more users and more data.



  • The dependability of the devices that make up the network (for example, switches, routers, PCs, and so on).



  • Data sent between one device to another device, i.e. 1 to 1



  • Data sent between one to many devices



  • data that is send to one to all devices on the network. Stations view broadcast frames as public service announcements.



  • Protocol is set of rules used to define communication between two devices.



  • Authentication, Authorization, Accounting

  • Authentication is a process of validating the username and password submitted by user during login. If the authentication is successful, the server returns the userís security rights. If unsuccessful the user is denied access.

  • Authorization determines what the user or device is allowed to do. It has more to do with rights in a network

  • Accounting records information about access attempts, including inappropriate request



  • All stations on an Ethernet segment are connected to the same media. Therefore, all devices receive all signals. When devices send signals at the same time, a collision occurs. A scheme is needed to detect and compensate for collisions. Ethernet uses a method called CSMA/CD, Carrier Sense Multiple Access / Collision Detect to detect collisions.

  • It is a media access mechanism in which device ready to transmit data first check the channel for a carrier. If no carrier is sensed for a specific period of time, a device can transmit. If two devices transmit at same time, a collision occurs and is detected by all colliding devices. This collision subsequently delays retransmission from those devices for some time.



  • An Octet, is made up of 8 Bits. It is just ordinary 8 bit Binary number.

  • This IP address is reserved for loopback test. It is designated for local node and allows the node to send a test packet to itself without generating network traffic.



  • Open Systems Interconnection Model, developed and adopted in 1977. it defines how hardware and software should be developed to support specific functions for communication between devices.



  • International Organization for Standardization, is a organization dedicated to defining global communication and standards.



  • is the process of shrinking large piece of data. This allows data to be transferred more quickly across the network.



  • The process of converting data into a random set of characters that is unrecognizable to everyone except the intended recipient.


Pr.Pg border                                              Next Pg