Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Network Access Introduction to Networks.

Similar presentations


Presentation on theme: "© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Network Access Introduction to Networks."— Presentation transcript:

1 © 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Network Access Introduction to Networks

2 Presentation_ID 2 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 4: Objectives Students will be able to:  Explain how physical layer protocols and services support communications across data networks.  Build a simple network using the appropriate.  Explain the role of the data link layer in supporting communications across data networks.  Compare media access control techniques and logical topologies used in networks.

3 Presentation_ID 3 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 4 4.1 Physical Layer Protocols 4.2 Network Media 4.3 Data Link Layer Protocols 4.4 Media Access Control 4.5 Summary

4 Presentation_ID 4 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Getting it Connected Connecting to the Network

5 Presentation_ID 5 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Getting it Connected Connecting to the Network

6 Presentation_ID 6 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Getting it Connected Network Interface Cards Connecting to the Wireless LAN with a Range Extender

7 Presentation_ID 7 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Purpose of the Physical Layer The Physical Layer

8 Presentation_ID 8 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Purpose of the Physical Layer Physical Layer Media

9 Presentation_ID 9 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Purpose of the Physical Layer Physical Layer Standards Standard organization Networking Standards ISO ISO 8877: Officially adopted the RJ connectors (e.g., RJ-11, RJ-45) ISO 11801: Network cabling standard similar to EIA/TIA 568. EIA/TIA TIA-568-C: Telecommunications cabling standards, used by nearly all voice, video and data networks. TIA-569-B: Commercial Building Standards for Telecommunications Pathways and Spaces TIA-598-C: Fiber optic color coding TIA-942: Telecommunications Infrastructure Standard for Data Centers ANSI 568-C: RJ-45 pinouts. Co-developed with EIA/TIA ITU-T G.992: ADSL IEEE 802.3: Ethernet 802.11: Wireless LAN (WLAN) & Mesh (Wi-Fi certification) 802.15: Bluetooth

10 Presentation_ID 10 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Purpose of the Physical Layer Physical Layer Standards  The protocols and operations of the upper OSI layers are performed in software designed by software engineers. For example, the services and protocols in the TCP/IP suite are defined by the Internet Engineering Task Force (IETF) in RFCs  The physical layer consists of electronic circuitry, media, and connectors developed by engineers. Therefore, it is appropriate that the standards governing this hardware are defined by the relevant electrical and communications engineering organizations.

11 Presentation_ID 11 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fundamental Principles of Layer 1 Physical Layer Fundamental Principles Media Physical Components Frame Encoding Technique Signalling Method Copper cable UTP Coaxial Connectors NICs Ports Interfaces Manchester Encoding Non-Return to Zero (NRZ) techniques 4B/5B codes are used with Multi-Level Transition Level 3 (MLT-3) signaling 8B/10B PAM5 Changes in the electromagnetic field Intensity of the electromagnetic field Phase of the electromagnetic wave Fiber Optic cable Single-mode FiberSingle-mode Fiber Multimode FiberMultimode Fiber ConnectorsConnectors NICsNICs InterfacesInterfaces Lasers and LEDsLasers and LEDs PhotoreceptorsPhotoreceptors Pulses of light Wavelength multiplexing using different colors A pulse equals 1. No pulse is 0. Wireless media Access Points NICs Radio Antennae DSSS (direct-sequence spread- spectrum) OFDM (orthogonal frequency division multiplexing) Radio waves transmit and carry The physical components are the electronic hardware devices, media, and other connectors that transmit and carry the signals to represent the bits. converting Encoding or line encoding is a method of converting a stream of data bits into a predefined "code”. generate The physical layer must generate the electrical, optical, or wireless signals that represent the "1" and "0" on the media.

12 Presentation_ID 12 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fundamental Principles of Layer 1 Physical Layer Fundamental Principles

13 Presentation_ID 13 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fundamental Principles of Layer 1 Bandwidth transfer of bits at different speedsDifferent physical media support the transfer of bits at different speeds. discussed in terms of bandwidth and throughputData transfer is usually discussed in terms of bandwidth and throughput. capacity of a medium to carry dataBandwidth is the capacity of a medium to carry data. Typically measured in kilobits per second (kb/s) or megabits per second (Mb/s) The practical bandwidth of a network is determined by a combination of factors: The properties of the physical media The technologies chosen for signaling and detecting network signals

14 Presentation_ID 14 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fundamental Principles of Layer 1 Throughput Throughput is the measure of the transfer of bits across the media over a given period of time. does not match the specified bandwidth Throughput usually does not match the specified bandwidth in physical layer implementations. Many factors influence throughput including: amount  The amount of traffic type  The type of traffic latency created  The latency created by the number of network devices encountered between source and destination Throughput cannot be faster than the slowest link in the path measure of usable data transferred over a given period of time Note: There is a third measurement to measure the transfer of usable data that is known as goodput. Goodput is the measure of usable data transferred over a given period of time. Goodput is throughput minus traffic overhead for establishing sessions, acknowledgements, and encapsulation. There are many online speed tests that can reveal the throughput of an Internet connection. The figure provides sample results from a speed test.

15 Presentation_ID 15 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fundamental Principles of Layer 1 Types of Physical Media Specifications guarantee that cables and connectors will function as anticipated with different data link layer implementations. As an example, standards for copper media are defined for the:  Type of copper cabling used  Bandwidth of the communication  Type of connectors used  Pinout and color codes of connections to the media  Maximum distance of the media The figure shows different types of interfaces and ports available on a 1941 router.

16 Presentation_ID 16 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Network Media Copper Cabling Copper media is limited by distance and signal interference. The longer the signal travels, the more it deteriorates (signal attenuation). The timing and voltage values of the electrical pulses are also susceptible to interference from two sources: Electromagnetic interference (EMI) or radio frequency interference (RFI) Crosstalk - disturbance caused by the electric or magnetic fields of a signal on one wire to the signal in an adjacent wire

17 Presentation_ID 17 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Copper Cabling Characteristics of Copper Media

18 Presentation_ID 18 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Copper Cabling Copper Media Shielded Twisted Pair (STP) cableUnshielded Twisted Pair (UTP) cable Coaxial cable

19 Presentation_ID 19 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Copper Cabling Unshielded Twisted-Pair (UTP) Cable 4 pairs Color coded 4 pairs Color coded

20 Presentation_ID 20 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Copper Cabling Shielded Twisted-Pair (STP) Cable Foil Shields Braided or Foil Shield The STP cable shown uses four pairs of wires, each wrapped in a foil shield, which are then wrapped in an overall metallic braid or foil. Must be terminated properly

21 Presentation_ID 21 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Copper Cabling: Coaxial Cable As shown in the figure, coaxial cable consists of:  A copper conductor used to transmit the electronic signals  Conductor is surrounded by an insulating layer of flexible plastic insulation.  Insulating material is surrounded in a woven copper braid, that acts as the second wire in the circuit and as a shield for the inner conductor.  Entire cable is covered with a cable jacket; protects it from physical damage.

22 Presentation_ID 22 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Copper Cabling Cooper Media Safety

23 Presentation_ID 23 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential UTP Cabling Properties of UTP Cabling

24 Presentation_ID 24 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential UTP Cabling UTP Cabling Standards

25 Presentation_ID 25 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential UTP Cabling UTP Connectors

26 Presentation_ID 26 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential UTP Cabling Types of UTP Cable

27 Presentation_ID 27 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential UTP Cabling Testing UTP Cables

28 Presentation_ID 28 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fiber Optic Cabling Properties of Fiber Optic Cabling  It permits the transmission of data over longer distances and at higher bandwidths (data rates) than any other networking media.  Flexible but extremely thin transparent strand of very pure glass (silica)  Bits are encoded on the fiber as light impulses.  Cable acts as a waveguide, or “light pipe,” to transmit light between the two ends with minimal loss of signal.

29 Presentation_ID 29 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fiber Optic Cabling Fiber Media Cable Design

30 Presentation_ID 30 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fiber Optic Cabling Types of Fiber Media

31 Presentation_ID 31 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fiber Optic Cabling Network Fiber Connectors older bayonet style connector Straight-Tip (ST): An older bayonet style connector used with multimode fiber. square or standard connector Subscriber Connector (SC): Sometimes referred to as square or standard connector, used with multimode and single-mode fiber. Lucent Connector (LC): Sometimes called a little or local connector, used with single-mode, supports multimode. Yellow jacket for single-mode Orange (or aqua) for multimode.

32 Presentation_ID 32 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fiber Optic Cabling Testing Fiber Cables Three common types of fiber-optic termination and splicing errors are:  Misalignment: The fiber-optic media are not precisely aligned to one another when joined.  End gap: The media does not completely touch at the splice or connection.  End finish: The media ends are not well polished or dirt is present at the termination. It is recommended that an optical tester, an Optical Time Domain Reflectometer (OTDR),such as shown in the figure be used to test fiber-optic cables.

33 Presentation_ID 33 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fiber Optic Cabling Fiber versus Copper Implementation issuesCopper mediaFibre-optic Bandwidth supported 10 Mbps – 10 Gbps10 Mbps – 100 Gbps Distance Relatively short (1 – 100 meters) Relatively High (1 – 100,000 meters) Immunity to EMI and RFI Low High (Completely immune) Immunity to electrical hazards Low High (Completely immune) Media and connector costs LowestHighest Installation skills required LowestHighest Safety precautions LowestHighest Optical fiber media implementation issues include: More expensive (usually) than copper media over the same distance (but for a higher capacity) Different skills and equipment required to terminate and splice the cable infrastructure More careful handling than copper media

34 Presentation_ID 34 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Wireless Media Properties of Wireless Media electromagnetic signalsbinary digits of datausingradio or microwave frequencies Wireless media carry electromagnetic signals that represent the binary digits of data communications using radio or microwave frequencies. does have concern However, wireless does have some areas of concern including:  Coverage area: construction materials used in buildings and structures will limit the effective coverage.  Interference: can be disrupted by such common devices as household cordless phones, microwave ovens, and other wireless communications.  Security: network security is a major component of wireless network administration.

35 Presentation_ID 35 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential IEEE 802.11 standards Commonly referred to as Wi-Fi. Uses CSMA/CA Variations include: 802.11a: 54 Mbps, 5 GHz 802.11b: 11 Mbps, 2.4 GHz 802.11g: 54 Mbps, 2.4 GHz 802.11n: 600 Mbps, 2.4 and 5 GHz 802.11ac: 1 Gbps, 5 GHz 802.11ad: 7 Gbps, 2.4 GHz, 5 GHz, and 60 GHz IEEE 802.15 standard Supports speeds up to 3 Mbps Provides device pairing over distances from 1 to 100 meters. IEEE 802.16 standard Provides speeds up to 1 Gbps Uses a point-to-multipoint topology to provide wireless broadband access. Wireless Media Types of Wireless Media

36 Presentation_ID 36 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Wireless Media Wireless LAN The benefits of wireless data communications technologies are:  Savings on costly premises wiring  Convenience of host mobility A common wireless LAN requires the following network devices:  Wireless Access Point (AP): Concentrates the wireless signals from users and connects, usually through a copper cable, to the existing copper-based network infrastructure, such as Ethernet.  Wireless NIC adapters: Provides wireless communication capability to each network host. NIC types: Integrated, card, USB Cisco Linksys EA6500 802.11ac wireless router Home and small business wireless routers integrate the functions of a router, switch, and access point into one device as shown in the figure.

37 Presentation_ID 37 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Wireless Media 802.11 Wi-Fi Standards Standard Maximum Speed Frequency Backwards compatible 802.11a 54 Mbps5 GHzNo 802.11b 11 Mbps2.4 GHzNo 802.11g 54 Mbps2.4 GHz802.11b 802.11n 600 Mbps2.4 GHz or 5 GHz802.11b/g 802.11ac 1.3 Gbps (1300 Mbps) 2.4 GHz and 5.5 GHz 802.11b/g/n 802.11ad 7 Gbps (7000 Mbps) 2.4 GHz, 5 GHz and 60 GHz 802.11b/g/n/ac

38 Presentation_ID 38 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Purpose of the Data Link Layer The Data Link Layer The data link layer performs these two basic services:  It accepts Layer 3 packets and packages them into data units called frames.  It controls media access control and performs error detection.  Receives packets from and directs packets to an upper layer protocol, in this case IPv4 or IPv6.

39 Presentation_ID 39 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Purpose of the Data Link Layer Data Link Sublayers Network Data Link LLC Sublayer MAC Sublayer Physical 802.3 Ethernet 802.3 Ethernet 802.11 Wi-Fi 802.11 Wi-Fi 802.15 Bluetooth 802.15 Bluetooth The data link layer is divided into two sublayers: provide services to the network layer Logical Link Control (LLC): Defines the software processes that provide services to the network layer protocols. places information in the frame It places information in the frame that identifies which network layer protocol is being used for the frame. Media Access Control (MAC): Defines the media access processes performed by the hardware. It provides data link layer addressing and delimiting of data according to the physical signaling requirements of the medium and the type of data link layer protocol in use

40 Presentation_ID 40 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Purpose of the Data Link Layer Media Access Control specify the encapsulation of a packet into a frame getting the encapsulated packet on and off each medium. Layer 2 protocols specify the encapsulation of a packet into a frame and the techniques for getting the encapsulated packet on and off each medium. media access control method. The technique used for getting the frame on and off media is called the media access control method. Animation 4.3.1.3 media access control method. The technique used for getting the frame on and off media is called the media access control method. Animation 4.3.1.3

41 Presentation_ID 41 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Purpose of the Data Link Layer Providing Access to Media Animation At each hop along the path, a router: Accepts a frame from a medium De-encapsulates the frame Re-encapsulates the packet into a new frame Forwards the new frame appropriate to the medium of that segment of the physical network At each hop along the path, a router: Accepts a frame from a medium De-encapsulates the frame Re-encapsulates the packet into a new frame Forwards the new frame appropriate to the medium of that segment of the physical network Different media access control methods may be required during the course of a single communication.

42 Presentation_ID 42 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Layer Layer 2 Frame Structure

43 Presentation_ID 43 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Layer 2 Frame Structure Creating a Frame

44 Presentation_ID 44 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Layer Layer 2 Standards - Ethernet

45 Presentation_ID 45 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Layer 2 Standards Data Link Layer Standards Standard organization Networking Standards IEEE (LAN/Wireless) 802.2: Logical Link Control (LLC) 802.3: Ethernet 802.4: Token bus 802.5: Token passing 802.11: Wireless LAN (WLAN) & Mesh (Wi-Fi certification) 802.15: Bluetooth 802.16: WiMax ITU-T (WAN) G.992: ADSL G.8100 - G.8199: MPLS over Transport aspects Q.921: ISDN Q.922: Frame Relay ISO (WAN) HDLC (High Level Data Link Control) ISO 9314: FDDI Media Access Control (MAC) ANSI (WAN) X3T9.5 and X3T12: Fiber Distributed Data Interface (FDDI)

46 Presentation_ID 46 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Topologies Controlling Access to the Media Regulating the placement of data frames onto the media Regulating the placement of data frames onto the media is controlled by the media access control sublayer. rules that regulate Media access control is the equivalent of traffic rules that regulate the entrance of motor vehicles onto a roadway; if no rules, too many accidents different ways to regulate placing frames onto the mediaThe protocols at the data link layer define the rules for access There are different ways to regulate placing frames onto the media. The protocols at the data link layer define the rules for access to different media. The actual media access control method used depends on: Topology: How the connection between the nodes appears to the data link layer. Media sharing: How the nodes share the media. The media sharing can be point- to-point such as in WAN connections or shared such as in LAN networks.

47 Presentation_ID 47 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Physical and Logical Topologies Physical Topology Logical Topology The data link layer "sees" the logical topology of a network when controlling data access to the media. It is the logical topology that influences the type of network framing and media access control used.

48 Presentation_ID 48 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential WAN Topologies Common Physical WAN Topologies Point-to-Point: This is the simplest topology consists of a permanent link between two endpoints, WAN topology. Hub and Spoke: A WAN version of the star topology, central site interconnects branch sites using point-to- point links. Mesh: Provides high availability, but requires that every end system be interconnected to every other system. Costs can be significant. Partial mesh: Some but not all of end devices are interconnected.

49 Presentation_ID 49 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential WAN Topologies Physical Point-to-Point Topology The two nodes do not have to share the media with other hosts. The logical data link protocols can be very simple, frames on the media can only travel to or from the two nodes. Usually full duplex circuit is used, no chance of a collision

50 Presentation_ID 50 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential WAN Topologies Logical Point-to-Point Topology

51 Presentation_ID 51 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential WAN Topologies Half and Full Duplex Half Duplex: Ethernet has established arbitration rules for resolving conflicts arising from instances when more than one station attempts to transmit at the same time. Full Duplex: Both devices can transmit and receive on the media at the same time. The media is available for transmission for both nodes at any time. Therefore, there is no media arbitration necessary in the data link layer.

52 Presentation_ID 52 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential LAN Topologies Physical LAN Topologies Star: End devices are connected to a central intermediate device. Bus: All end systems are chained to each other and terminated in some form on each end. This is a combination of the other topologies such as star networks interconnected to each other using a bus topology Ring: End systems are connected to their respective neighbor forming a ring.

53 Presentation_ID 53 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential LAN Topologies Logical Topology for Shared Media

54 Presentation_ID 54 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential LAN Topologies Contention-Based Access CharacteristicsContention-Based Technologies Stations can transmit at any time Collision exist There are mechanisms to resolve contention for the media CSMA/CD for 802.3 Ethernet networks CSMA/CA for 802.11 wireless networks

55 Presentation_ID 55 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential LAN Topologies Multi-Access Topology

56 Presentation_ID 56 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential LAN Topologies Controlled Access CharacteristicsControlled Access Technologies Only one station can transmit at a time Devices wishing to transmit must wait their turn No collisions May use a token passing method Token Ring (IEEE 802.5) Fiber Distributed Data Interface (FDDI)

57 Presentation_ID 57 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential LAN Topologies Ring Topology

58 Presentation_ID 58 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Frame The Frame

59 Presentation_ID 59 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Frame The Header The figure displays the Ethernet frame header fields: Start Frame field: Indicates the beginning of the frame. Source and Destination Address fields: Indicates the source and destination nodes on the media. Type field: Indicates the upper layer service contained in the frame (IP). Different data link layer protocols may use different fields from those mentioned. For example other Layer 2 protocol header frame fields could include: Priority/Quality of Service field Logical connection control field Physical link control field Flow control field Congestion control field

60 Presentation_ID 60 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Frame Layer 2 Address

61 Presentation_ID 61 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Frame The Trailer Frame Check Sum: Data link layer protocols add a trailer to the end of each frame. The trailer is used to determine if the frame arrived without error. A transmitting node creates a logical mathematical summary of the contents of the frame. This is known as the cyclic redundancy check (CRC) value This value is placed in the Frame Check Sequence (FCS) field of the frame to represent the contents of the frame. If the CRC value in the FCS differs from the CRC calculated at the receiving node, the frame is discarded

62 Presentation_ID 62 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Frame LAN and WAN Frames Animation Animation E 4.4.4.5

63 Presentation_ID 63 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Frame Ethernet Frame

64 Presentation_ID 64 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Frame Point-to-Point Protocol Frame

65 Presentation_ID 65 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Frame 802.11 Wireless Frame

66 Presentation_ID 66 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Network Access Summary Physical Layer Protocols Network Media Data Link Layer Protocols Media Access Control

67 Presentation_ID 67 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential


Download ppt "© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Network Access Introduction to Networks."

Similar presentations


Ads by Google