Welcome to the second of five courses in the Cisco Networking Basics Specialization.
Have ever wondered how devices on computer networks truly communicate? There are specific protocols or rules and standards that every device must follow to access the Internet and to communicate over a network. In this course, you will examine the principles of network communication, how networks are designed and what specifically is being sent and received by different devices when we send pictures, text messages, video or any other data across the network. What exactly is sent and how is it sent are the questions that will be answered in this course.
At the end of this course, you will be able to:
1. Explain how protocols and standards benefit a global internetwork.
2. Describe how the Ethernet Protocol transmits data within a LAN.
3. Explain IPv4 addressing and the role subnet masks.
4. Use Cisco Packet Tracer to connect hosts to a wireless router in a LAN.
5. Use a protocol analyzer or "packet sniffer" to open and examine a data packet that has been transmitted across a network.
6. Examine a Windows computer to locate the physical or MAC address used send and receive data.
Have ever wondered how devices on computer networks truly communicate? There are specific protocols or rules and standards that every device must follow to access the Internet and to communicate over a network. In this course, you will examine the principles of network communication, how networks are designed and what specifically is being sent and received by different devices when we send pictures, text messages, video or any other data across the network. What exactly is sent and how is it sent are the questions that will be answered in this course.
At the end of this course, you will be able to:
1. Explain how protocols and standards benefit a global internetwork.
2. Describe how the Ethernet Protocol transmits data within a LAN.
3. Explain IPv4 addressing and the role subnet masks.
4. Use Cisco Packet Tracer to connect hosts to a wireless router in a LAN.
5. Use a protocol analyzer or "packet sniffer" to open and examine a data packet that has been transmitted across a network.
6. Examine a Windows computer to locate the physical or MAC address used send and receive data.