Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Cisco Networking Basics

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 311

https://skillsforall.com/launch?

id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=0feda870-2a76-5569-a63d-72ef5f151bec
Check your Skills
Networking Basics
Before you start the course, answer questions to check how much you already know.

Instructions

 My Knowledge Check uses advanced Artificial Intelligence (AI) to assess your knowledge and skill on every topic in
the course. Your results can help you decide how to navigate through the course. You may choose to spend more
time in areas where you need additional focus or speed through areas where you already have a strong
understanding.
 My Knowledge Check is completely optional. You can come back to My Knowledge Check anytime to review your
history and take it again to see your learning progress.
 Click the My Knowledge Check button to begin. Read each question, select your answer, and submit. If you do not
know an answer, that's ok! To get accurate results, try not to guess. Simply choose 'I don't know the answer' and
there is no penalty. At the end of the My Knowledge Check, you can review all your answers and make changes
before submitting.
 Cisco Packet Tracer may be referenced in My Knowledge Check. If you are unfamiliar with Cisco

 Packet
Tracer and curious to learn more, check out
First Time in this Course
The Networking Basics course teaches the fundamentals of networking by covering the basic
concepts and skills needed to set up and manage your small office or home office (SOHO)
network. The learner is presented with an engaging and exploratory view of networks, the devices
that comprise them, how they work, and basic troubleshooting tools and techniques. The goal of
this course is to provide the learner with an engaging, exploratory view of networks, including the
internet. Upon completion of the Networking Basics course, students will be able to perform the
following tasks:

 Explain important concepts in network communication.


 Explain network types, components, and connections.
 Configure mobile devices for wireless access.
 Configure an integrated wireless router and wireless client to connect securely to the
internet.
 Explain the importance of standards and protocols in network communications.
 Describe common network media.
 Explain how communication occurs on Ethernet networks.
 Explain the features of an IP address.
 Explain how IPv4 addresses are used in network communication and segmentation.
 Explain features of IPv6 addressing.
 Configure a DHCP server.
 Explain how routers connect networks together.
 Explain how ARP enables communication on a network.
 Create a fully connected LAN.
 Explain how clients access internet services.
 Explain the function of common application layer services.
 Use various tools to test and troubleshoot network connectivity.
Student Resources
There are a number of tools and resources that are available to you that will help you in your
journey as you develop your networking skills and prepare for job opportunities.

Packet Tracer
Packet Tracer simulates the internal workings of a network and is used in this course.

If you are new to Packet Tracer, take this FREE, short, online course now: Getting Started with
Cisco Packet Tracer.

You can use your smartphone, tablet, or desktop to access your course; however, Packet Tracer
activities, as well as some other activities, quizzes, and exams are best experienced using a PC.

Lab Environment
No equipment is necessary

Resources Available to You


Skills for All frequently asked questions can be found at https://skillsforall.com/help, or by clicking
Help in the top navigation bar. For Packet Tracer downloading help,
visit https://skillsforall.com/resources/lab-downloads and scroll down to Learning Resources.

You can find additional FAQs by visiting our virtual assistant, Morgan. Click the chat icon in the top
right corner to choose from a list of topics or enter your question. Morgan’s help includes
information about Packet Tracer, certificates, and badging.

Download Cisco Packet Tracer


To obtain and install your copy of Cisco Packet Tracer, please follow the instructions from the link
below: https://skillsforall.com/resources/lab-downloads

Module 1: Communication in a
Connected World
1.0 Introduction

1.0.1 Webster - Why Should I Take this Module?


Welcome to Communications in a Connected World! Hi, I'm Webster! I'll be accompanying you as you
move through this course. Let me introduce you to my friend Kishori! Kishori has been a nurse in a hospital
in Karnataka, India for about 20 years. When Kishori went to nursing school, she had no idea how much
networking technology she would be using everyday. At home, she only has a laptop, a smartphone, and a
tablet. At work she uses a laptop, a desktop, a printer, and network-connected hospital equipment.
Sometimes these devices do not always communicate. When equipment does not work properly in a
hospital, lives can be at risk! Kishori would like to better understand how it all works. Would you?

1.0.2 What Will I Learn in this Module?


Module Title: Communications in a Connected World

Module Objective: Explain important concepts in network communication.

1.1.2 Everything is Online


“Hey Shad, are you online?” “Of course, I am!” How many of us still think about whether or not we
are “online”? We expect our devices, cell phones, tablets, laptops and desktop computers to
always be connected to the global internet. We use this network to interact with our friends, shop,
share pictures and experiences, and learn. The internet has become such a part of everyday life
that we almost take it for granted.

Normally, when people use the term internet, they are not referring to the physical connections in
the real world. Rather, they tend to think of it as a formless collection of connections. It is the
“place” people go to find or share information.

1.1.3 Who Owns “The Internet”?


The internet is not owned by any individual or group. The internet is a worldwide collection of
interconnected networks (internetwork or internet for short), cooperating with each other to
exchange information using common standards. Through telephone wires, fiber-optic cables,
wireless transmissions, and satellite links, internet users can exchange information in a variety of
forms, as shown in the figure.

Everything that you access online is located somewhere on the global internet. Social media sites,
multiplayer games, messaging centers that provide email, online courses — all of these internet
destinations are connected to local networks that send and receive information through the
internet.

Think about all of the interactions that you have during the day which require you to be online.
1.1.4 Local Networks
A tabbed content container. Content can be text, graphic or both.

Local networks come in all sizes. They can range from simple networks consisting of two
computers, to networks connecting hundreds of thousands of devices. Networks installed in small
offices, or homes and home offices, are referred to as small office/home office (SOHO) networks.
SOHO networks let you share resources such as printers, documents, pictures, and music,
between a few local users.

In business, large networks can be used to advertise and sell products, order supplies, and
communicate with customers. Communication over a network is usually more efficient and less
expensive than traditional forms of communication, such as regular mail or long distance phone
calls. Networks allow for rapid communication such as email and instant messaging, and provide
consolidation and access to information stored on network servers.

Business and SOHO networks usually provide a shared connection to the internet. The internet is
considered a "network of networks" because it is literally made up of thousands of local networks
that are connected to each other.

 Small Home Networks


Small home networks connect a few computers to each other and to the internet.

 Small Office and Home Office Networks


The SOHO network allows computers in a home office or a remote office to connect to a
corporate network, or access centralized, shared resources.

 Medium to Large Networks


Medium to large networks, such as those used by corporations and schools, can have
many locations with hundreds or thousands of interconnected hosts.

 World Wide Networks


The internet is a network of networks that connects hundreds of millions of computers
world-wide.

1.1.5 Mobile Devices


A tabbed content container. Content can be text, graphic or both.

The internet connects more computing devices than just desktop and laptop computers. There are
devices all around that you may interact with on a daily basis that are also connected to the
internet. These include mobile devices, home devices, and a variety of other connected devices.

 Smartphone
Smartphones are able to connect to the internet from almost anywhere. Smartphones
combine the functions of many different products together, such as a telephone, camera,
GPS receiver, media player, and touch screen computer.

 Tablet
Tablets, like smartphones, also have the functionality of multiple devices. With the
additional screen size, they are ideal for watching videos and reading magazines or books.
With on-screen keyboards, users are able to do many of the things they used to do on their
laptop computer, such as composing emails or browsing the web.

 Smartwatch
A smartwatch can connect to a smartphone to provide the user with alerts and messages.
Additional functions, such as heart rate monitoring and counting steps, like a pedometer,
can help people who are wearing the device to track their health.

 Smart Glasses
A wearable computer in the form of glasses, such as Google Glass, contains a tiny screen
that displays information to the wearer in a similar fashion to the Head-Up Display (HUD) of
a fighter pilot. A small touch pad on the side allows the user to navigate menus while still
being able to see through the smart glasses.

1.1.6 Connected Home Devices


 Security System
Many of the items in a home, such as security systems, lighting, and climate controls, can
be monitored and configured remotely using a mobile device.

 Appliances
Household appliances such as refrigerators, ovens, and dishwashers can be connected to
the internet. This allows the homeowner to power them on or off, monitor the status of the
appliance, and also be alerted to preset conditions, such as when the temperature in the
refrigerator rises above an acceptable level.

 Smart TV
A smart TV can be connected to the internet to access content without the need for TV
service provider equipment. Also, a smart TV can allow a user to browse the web, compose
email, or display video, audio, or photos stored on a computer.
 Gaming Console
Gaming consoles can connect to the internet to download games and play with friends
online.

1.1.7 Other Connected Devices


A tabbed content container. Content can be text, graphic or both.

There are also many connected devices found in the world outside your home that provide
convenience and useful, or even vital, information.

Smart Cars
Many modern cars can connect to the internet to access maps, audio and video content, or
information about a destination. They can even send a text message or email if there is an
attempted theft or call for assistance in case of an accident. These cars can also connect to
smartphones and tablets to display information about the different engine systems, provide
maintenance alerts, or display the status of the security system.

RFID Tags
Radio frequency identification (RFIDs) tags can be placed in or on objects to track them or monitor
sensors for many conditions.

Sensors and Actuators


Connected sensors can provide temperature, humidity, wind speed, barometric pressure, and soil
moisture data. Actuators can then be automatically triggered based on current conditions. For
example, a smart sensor can periodically send soil moisture data to a monitoring station. The
monitoring station can then send a signal to an actuator to begin watering. The sensor will
continue to send soil moisture data allowing the monitoring station to determine when to
deactivate the actuator.

Medical Devices
Medical devices such as pacemakers, insulin pumps, and hospital monitors provide users or
medical professionals with direct feedback or alerts when vital signs are at specific levels.

1.1.8 Check Your Understanding - Network


Types
1.1 Data Transmission
1.2 The Bit
Did you know that computers and networks only work with binary digits, zeros and ones? It can be
difficult to imagine that all of our data is stored and transmitted as a series of bits. Each bit can
only have one of two possible values, 0 or 1. The term bit is an abbreviation of “binary digit” and
represents the smallest piece of data. Humans interpret words and pictures, computers interpret
only patterns of bits.

A bit is stored and transmitted as one of two possible discrete states. This can include two
directions of magnetization, two distinct voltage or current levels, two distinct levels of light
intensity, or any other physical system of two discrete states. For example, a light switch can be
either On or Off; in binary representation, these states would correspond to 1 and 0 respectively.

Every input device (mouse, keyboard, voice-activated receiver) will translate human interaction
into binary code for the CPU to process and store. Every output device (printer, speakers,
monitors, etc.) will take binary data and translate it back into human recognizable form. Within the
computer itself, all data is processed and stored as binary.

Computers use binary codes to represent and interpret letters, numbers and special characters
with bits. A commonly used code is the American Standard Code for Information Interchange
(ASCII). With ASCII, each character is represented by eight bits. For example:

 Capital letter: A = 01000001


 Number: 9 = 00111001
 Special character: # = 00100011

Each group of eight bits, such as the representations of letters and numbers, is known as a byte.

Codes can be used to represent almost any type of information digitally including computer data,
graphics, photos, voice, video, and music.

In the figure, enter up to five characters in the Characters field, then click the Show Me button to
see the ASCII bit translation. Click Reset to enter a different group of characters.

1.2.3 Common Methods of Data Transmission


After the data is transformed into a series of bits, it must be converted into signals that can be sent
across the network media to its destination. Media refers to the physical medium on which the
signals are transmitted. Examples of media are copper wire, fiber-optic cable, and electromagnetic
waves through the air. A signal consists of electrical or optical patterns that are transmitted from
one connected device to another. These patterns represent the digital bits (i.e. the data) and travel
across the media from source to destination as either a series of pulses of electricity, pulses of
light, or radio waves. Signals may be converted many times before ultimately reaching the
destination, as corresponding media changes between source and destination.

There are three common methods of signal transmission used in networks:

 Electrical signals - Transmission is achieved by representing data as electrical pulses on


copper wire.
 Optical signals - Transmission is achieved by converting the electrical signals into light
pulses.
 Wireless signals - Transmission is achieved by using infrared, microwave, or radio waves
through the air.

Click Play in the figure to see an animation of the three types of signal transmissions.

In most homes and small businesses, network signals are transmitted across copper wires
(cables) or Wi-Fi enabled wireless connections. Larger networks employ fiber-optic cables in order
to reliably carry signals for longer distances.
1.2.4 Check Your Understanding - Data
Transmission
1.3 Bandwidth and Throughput
1.3.1 Bandwidth
Streaming a movie or playing a multiplayer game requires reliable, fast connections. To support
these “high bandwidth” applications, networks have to be capable of transmitting and receiving bits
at a very high rate.

Different physical media support the transfer of bits at different speeds. The rate of data transfer is
usually discussed in terms of bandwidth and throughput.

Bandwidth is the capacity of a medium to carry data. Digital bandwidth measures the amount of
data that can flow from one place to another in a given amount of time. Bandwidth is typically
measured in the number of bits that (theoretically) can be sent across the media in a second.
Common bandwidth measurements are as follows:

 Thousands of bits per second (Kbps)


 Millions of bits per second (Mbps)
 Billions of bits per second (Gbps)
Physical media properties, current technologies, and the laws of physics all play a role in
determining available bandwidth.

The table shows the commonly used units of measure for bandwidth:

1.3.2 Throughput
Like bandwidth, throughput is the measure of the transfer of bits across the media over a given
period of time. However, due to a number of factors, throughput does not usually match the
specified bandwidth. Many factors influence throughput including:

 The amount of data being sent and received over the connection
 The types of data being transmitted
 The latency created by the number of network devices encountered between source and
destination

Latency refers to the amount of time, including delays, for data to travel from one given point to
another.

Throughput measurements do not take into account the validity or usefulness of the bits being
transmitted and received. Many messages received through the network are not destined for
specific user applications. An example would be network control messages that regulate traffic
and correct errors.

In an internetwork or network with multiple segments, throughput cannot be faster than the slowest
link of the path from sending device to the receiving device. Even if all or most of the segments
have high bandwidth, it will only take one segment in the path with lower bandwidth to create a
slowdown of the throughput of the entire network.

There are many online speed tests that can reveal the throughput of an internet connection.

1.3.3 Video – Throughput


See the video
https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=33a2e313-5116-5098-8970-9ee991d5afa5

1.3.4 Check Your Understanding -


Bandwidth and Throughput
Answer
https://quizlet.com/605920947/1-4-quiz-flash-cards/
https://quizlet.com/305090031/network-essentials-flash-cards/
1.4 Communications in a
Connected World Summary
1.4.1 What Did I Learn in this Module?
Network Types

The internet is not owned by any individual or group. The internet is a worldwide collection of
interconnected networks (internetwork or internet for short), cooperating with each other to
exchange information using common standards. Through telephone wires, fiber-optic cables,
wireless transmissions, and satellite links, internet users can exchange information in a variety of
forms.

Small home networks connect a few computers to each other and to the internet. The SOHO
network allows computers in a home office or a remote office to connect to a corporate network, or
access centralized, shared resources. Medium to large networks, such as those used by
corporations and schools, can have many locations with hundreds or thousands of interconnected
hosts. The internet is a network of networks that connects hundreds of millions of computers
world-wide.

There are devices all around that you may interact with on a daily basis that are also connected to
the internet. These include mobile devices such as smartphones, tablets, smartwatches, and
smart glasses. Things in your home can be connected to the internet such as a security system,
appliances, your smart TV, and your gaming console. Outside your home there are smart cars,
RFID tags, sensors and actuators, and even medical devices which can be connected.

Data Transmission

The following categories are used to classify types of personal data:


 Volunteered data - This is created and explicitly shared by individuals, such as social
network profiles. This type of data might include video files, pictures, text, or audio files.
 Observed data - This is captured by recording the actions of individuals, such as location
data when using cell phones.
 Inferred data - This is data such as a credit score, which is based on analysis of
volunteered or observed data.

The term bit is an abbreviation of “binary digit” and represents the smallest piece of data. Each bit
can only have one of two possible values, 0 or 1.

There are three common methods of signal transmission used in networks:

 Electrical signals - Transmission is achieved by representing data as electrical pulses on


copper wire.
 Optical signals - Transmission is achieved by converting the electrical signals into light
pulses.
 Wireless signals - Transmission is achieved by using infrared, microwave, or radio waves
through the air.

Bandwidth and Throughput

Bandwidth is the capacity of a medium to carry data. Digital bandwidth measures the amount of
data that can flow from one place to another in a given amount of time. Bandwidth is typically
measured in the number of bits that (theoretically) can be sent across the media in a second.
Common bandwidth measurements are as follows:

 Thousands of bits per second (Kbps)


 Millions of bits per second (Mbps)
 Billions of bits per second (Gbps)

Throughput does not usually match the specified bandwidth. Many factors influence throughput
including:

 The amount of data being sent and received over the connection
 The latency created by the number of network devices encountered between source and
destination

Latency refers to the amount of time, including delays, for data to travel from one given point to
another.

1.4.2 Webster - Reflection Questions


Maybe you don’t work in a hospital, but if you are here now it’s because, like Kishori, you use computers
and want to know more about networks. Did you know that the internet is a massive network of networks
that are connected, either directly or indirectly, to each other? It’s kind of like this web that I live in. One part
can be broken but my web doesn’t fall apart; I can fix it, and even make it stronger. Would you like to be
able to do that for your network?

1.4.3 Communications in a Connected


World Quiz
Answer
https://itexamanswers.net/question/what-type-of-device-is-able-to-create-physical-movement
https://itexamanswers.net/question/what-are-three-options-for-signal-transmission-on-a-network-choose-
three

https://itexamanswers.net/question/which-type-of-connected-device-is-placed-on-objects-to-track-and-
monitor-them

https://itexamanswers.net/question/which-two-numbers-are-possible-values-of-a-bit-choose-two

https://itexamanswers.net/1-4-3-communications-in-a-connected-world-quiz-answers.html

https://itexamanswers.net/module-1-6-3-physical-layer-quiz-answers.html
Module 2: Network Components,
Types, and Connections
2.0 Introduction
2.0.1 Webster - Why Should I Take this Module?
Kishori does not yet understand network infrastructure device roles in the network, including end
devices, intermediate devices, and network media. When she first started her nursing career, she
was writing patient medical notes in a paper notebook! At home, Kishori only has a laptop, a
smartphone, and a tablet. This makes her most familiar with end devices, or hosts. She
understands that those devices are connected to the internet somehow through that box in the
corner of her living room. At work she uses a laptop, a desktop, a printer, and other network-
connected hospital equipment. She wants to learn more about network components and how they
all connect.

Kishori leaves her patient's room, sets down her laptop, and continues her work on the desktop
computer at the nursing station. She wonders how the electronic notes she just took on the laptop
appear on the patient’s record on the desktop computer. How are they connected? How does the
computer reach the internet in the first place? Kishori has a lot to learn, and you might too! Take
this module to learn more.

2.0.2 What Will I Learn in this Module?


Module Title: Network Components, Types, and Connections

Module Objective: Explain network types, components, and connections.

2.1 Clients and Servers


2.1.1 Video - Clients and Servers
See the video
https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=64a99fcf-92fd-5243-9bca-a64681689ec3

2.1.2 Client and Server Roles


All computers connected to a network that participate directly in network communication are
classified as hosts. Hosts can send and receive messages on the network. In modern networks,
computer hosts can act as a client, a server, or both, as shown in the figure. The software installed
on the computer determines which role the computer plays.
Servers are hosts that have software installed which enable them to provide information, like email
or web pages, to other hosts on the network. Each service requires separate server software. For
example, a host requires web server software in order to provide web services to the network.
Every destination that you visit online is provided to you by a server located somewhere on a
network that is connected to the global internet.

Clients are computer hosts that have software installed that enables the hosts to request and
display the information obtained from the server. An example of client software is a web browser,
such as Internet Explorer, Safari, Mozilla Firefox, or Chrome.

2.1.3 Peer-to-Peer Networks


Client and server software usually run on separate computers, but it is also possible for one
computer to run both client and server software at the same time. In small businesses and homes,
many computers function as the servers and clients on the network. This type of network is called
a peer-to-peer (P2P) network.

The simplest P2P network consists of two directly connected computers using either a wired or
wireless connection. Both computers are then able to use this simple network to exchange data
and services with each other, acting as either a client or a server as necessary.

Multiple PCs can also be connected to create a larger P2P network, but this requires a network
device, such as a switch, to interconnect the computers.

The main disadvantage of a P2P environment is that the performance of a host can be slowed
down if it is acting as both a client and a server at the same time. The figure lists some of the
advantages and disadvantages of peer-to-peer networks.

In larger businesses, because of the potential for high amounts of network traffic, it is often
necessary to have dedicated servers to support the number of service requests.

The advantages and disadvantages of P2P networking are summarized in the figure.
The advantages of peer-to-peer networking:

 Easy to set up
 Less complex
 Lower cost because network devices and dedicated servers may not be required
 Can be used for simple tasks such as transferring files and sharing printers

The disadvantages of peer-to-peer networking:

 No centralized administration
 Not as secure
 Not scalable
 All devices may act as both clients and servers which can slow their performance

2.1.4 Peer-to-Peer Applications


 A P2P application allows a device to act as both a client and a server within the same
communication, as shown in the figure. In this model, every client is a server and every
server is a client. P2P applications require that each end device provide a user interface
and run a background service.
 Some P2P applications use a hybrid system where resource sharing is decentralized, but
the indexes that point to resource locations are stored in a centralized directory. In a hybrid
system, each peer accesses an index server to get the location of a resource stored on
another peer.
Both clients can simultaneously send and receive messages.

2.1.5 Multiple Roles in the Network


A computer with server software can provide services simultaneously to one or many clients, as
shown in the figure.

Additionally, a single computer can run multiple types of server software. In a home or small
business, it may be necessary for one computer to act as a file server, a web server, and an email
server.

A single computer can also run multiple types of client software. There must be client software for
every service required. With multiple clients installed, a host can connect to multiple servers at the
same time. For example, a user can check email and view a web page while instant messaging
and listening to internet radio.

2.1.6 Check Your Understanding - Clients


and Servers
Check your understanding of clients and servers by choosing the correct answer to the following
questions.
Answers
https://quizlet.com/605920947/1-4-quiz-flash-cards/
2.2 Network Components
2.2.1 Video - Network Infrastructure Symbols
See the video
https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=3e460932-0a22-5718-afc4-e4d4af0b28f7

2.2.2 Network Infrastructure


The path that a message takes from its source to destination can be as simple as a single cable
connecting one computer to another, or as complex as a network that literally spans the globe.
This network infrastructure is the platform that supports the network. It provides the stable and
reliable channel over which our communications can occur.

The network infrastructure contains three categories of hardware components, as shown in the
figure:

 End devices
 Intermediate devices
 Network media

Devices and media are the physical elements, or hardware, of the network. Hardware is often the
visible components of the network platform such as a laptop, PC, switch, router, wireless access
point, or the cabling used to connect the devices. Occasionally, some components may not be so
visible. In the case of wireless media, messages are transmitted through the air using invisible
radio frequencies or infrared waves.

Make a list of the network infrastructure components installed in your home network. Include the
cables or wireless access points that provide your network connections.
2.2.3 End Devices
The network devices that people are most familiar with are called end devices, or hosts. These
devices form the interface between users and the underlying communication network.

Some examples of end devices are as follows:

 Computers (workstations, laptops, file servers, web servers)


 Network printers
 Telephones and teleconferencing equipment
 Security cameras
 Mobile devices (such as smart phones, tablets, PDAs, and wireless debit/credit card
readers and barcode scanners)

An end device (or host) is either the source or destination of a message transmitted over the
network, as shown in the animation. In order to uniquely identify hosts, addresses are used. When
a host initiates communication, it uses the address of the destination host to specify where the
message should be sent.

Click Play in the figure to see an animation of data flowing through a network.

2.2.4 Check Your Understanding - Network


Components
Check your understanding of network components by choosing the correct answer to the
following questions.
Answers
https://quizlet.com/686542387/module-1-content-communications-in-a-connected-worldexternal-
tool-flash-cards/
2.3 ISP Connectivity Options
2.3.1 ISP Services
An Internet Service Provider (ISP) provides the link between the home network and the internet.
An ISP can be the local cable provider, a landline telephone service provider, the cellular network
that provides your smartphone service, or an independent provider who leases bandwidth on the
physical network infrastructure of another company.

Many ISPs also offer additional services to their contract subscribers, as shown in the figure.
These services can include email accounts, network storage, and website hosting and automated
backup or security services.

ISPs are critical to communications across the global internet. Each ISP connects to other ISPs to
form a network of links that interconnect users all over the world. ISPs are connected in a
hierarchical manner that ensures that internet traffic generally takes the shortest path from the
source to the destination.

The internet backbone is like an information super highway that provides high-speed data links to
connect the various service provider networks in major metropolitan areas around the world. The
primary medium that connects the internet backbone is fiber-optic cable. This cable is typically
installed underground to connect cities within continents. Fiber-optic cables also run under the sea
to connect continents, countries, and cities.
2.3.2 ISP Connections
The interconnection of ISPs that forms the backbone of the internet is a complex web of fiber-optic
cables with expensive networking switches and routers that direct the flow of information between
source and destination hosts. Average home users are not aware of the infrastructure outside of
their network. For a home user, connecting to the ISP is a fairly uncomplicated process.

The top portion of the figure displays the simplest ISP connection option. It consists of a modem
that provides a direct connection between a computer and the ISP. This option should not be used
though, because your computer is not protected on the internet.

As shown in the bottom portion of the figure, a router is required to securely connect a computer to
an ISP. This is the most common connection option. It consists of using a wireless integrated
router to connect to the ISP. The router includes a switch to connect wired hosts and a wireless
AP to connect wireless hosts. The router also provides client IP addressing information and
security for inside hosts.
2.3.3 Cable and DSL Connections
Most home network users do not connect to their service providers with fiber-optic cables. The
figure illustrates common connection options for small office and home users. The two most
common methods are as follows:

 Cable - Typically offered by cable television service providers, the internet data signal is
carried on the same coaxial cable that delivers cable television. It provides a high
bandwidth, always on, connection to the internet. A special cable modem separates the
internet data signal from the other signals carried on the cable and provides an Ethernet
connection to a host computer or LAN.
 DSL - Digital Subscriber Line provides a high bandwidth, always on, connection to the
internet. It requires a special high-speed modem that separates the DSL signal from the
telephone signal and provides an Ethernet connection to a host computer or LAN. DSL runs
over a telephone line, with the line split into three channels. One channel is used for voice
telephone calls. This channel allows an individual to receive phone calls without
disconnecting from the internet. A second channel is a faster download channel, used to
receive information from the internet. The third channel is used for sending or uploading
information. This channel is usually slightly slower than the download channel. The quality
and speed of the DSL connection depends mainly on the quality of the phone line and the
distance from the central office of your phone company The farther you are from the central
office, the slower the connection.

2.3.4 Additional Connectivity Options


Other ISP connection options for home users include the following:

Cellular

Cellular internet access uses a cell phone network to connect. Wherever you can get a cellular
signal, you can get cellular internet access. Performance will be limited by the capabilities of the
phone and the cell tower to which it is connected. The availability of cellular internet access is a
real benefit for people in areas that would otherwise have no internet connectivity at all, or for
people who are constantly on the move. The downside of cellular connectivity is that the carrier
usually meters the bandwidth usage of the connection and may charge extra for bandwidth that
exceeds the contract data plan.
Satellite

Satellite service is a good option for homes or offices that do not have access to DSL or cable.
Satellite dishes (see figure) require a clear line of sight to the satellite and so might be difficult in
heavily wooded areas or places with other overhead obstructions. Speeds will vary depending on
the contract, though they are generally good. Equipment and installation costs can be high
(although check the provider for special deals), with a moderate monthly fee thereafter. Like
cellular access, the availability of satellite internet access is a real benefit in areas that would
otherwise have no internet connectivity at all.

Dial-up Telephone

An inexpensive option that uses any phone line and a modem. To connect to the ISP, a user calls
the ISP access phone number. The low bandwidth provided by a dial-up modem connection is
usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
A modem dial-up connection should only be considered when higher speed connection options
are not available.

In metropolitan areas, many apartments and small offices are being connected directly with fiber-
optic cables. This enables an internet service provider to provide higher bandwidth speeds and
support more services such as internet, phone, and TV.

The choice of connection varies depending on geographical location and service provider
availability.

Satellite Connection

2.3.5 Check Your Understanding - ISP


Connectivity Options
Check your understanding of ISP connectivity options by choosing the correct answer to
the following questions.
Answers
https://quizlet.com/727676203/module-14-flash-cards/
2.4 Network Components, Types,
and Connections Summary
2.4.1 What Did I Learn in this Module?
Clients and Servers

All computers connected to a network that participate directly in network communication are
classified as hosts. Hosts can send and receive messages on the network. In modern networks,
computer hosts can act as a client, a server, or both. The software installed on the computer
determines which role the computer plays.

Client and server software usually run on separate computers, but it is also possible for one
computer to run both client and server software at the same time. In small businesses and homes,
many computers function as the servers and clients on the network. This type of network is called
a P2P network. In larger businesses, because of the potential for high amounts of network traffic, it
is often necessary to have dedicated servers to support the number of service requests. P2P
networks are easy to set up, less complex, lower in cost, and can be used for simple tasks such as
transferring files and sharing printers. However, there is no centralized administration. They have
less security, are not scalable, and can perform slower.

Network Components
There are symbols that represent various types of networking equipment. The network
infrastructure is the platform that supports the network. It provides the stable and reliable channel
over which our communications can occur. The network infrastructure contains three categories of
hardware components: end devices, intermediate devices, and network media. Hardware is often
the visible components of the network platform such as a laptop, PC, switch, router, wireless
access point, or the cabling used to connect the devices. Components that are not visible include
wireless media.

End devices, or hosts, form the interface between users and the underlying communication
network. Some examples of end devices include:

 Computers (workstations, laptops, file servers, web servers)


 Network printers
 Telephones and teleconferencing equipment
 Security cameras
 Mobile devices (such as smartphones, tablets, PDAs, and wireless debit/credit card readers
and barcode scanners)

ISP Connectivity Options

 An ISP provides the link between the home network and the internet. An ISP can be the
local cable provider, a landline telephone service provider, the cellular network that
provides your smartphone service, or an independent provider who leases bandwidth on
the physical network infrastructure of another company. Each ISP connects to other ISPs to
form a network of links that interconnect users all over the world. ISPs are connected in a
hierarchical manner that ensures that internet traffic generally takes the shortest path from
the source to the destination.
 The interconnection of ISPs that forms the backbone of the internet is a complex web of
fiber-optic cables with expensive networking switches and routers that direct the flow of
information between source and destination hosts.
 For a home user, connecting to the ISP is a fairly uncomplicated process. This is the most
common connection option. It consists of using a wireless integrated router to connect to
the ISP. The router includes a switch to connect wired hosts and a wireless AP to connect
wireless hosts. The router also provides client IP addressing information and security for
inside hosts. The two most common methods are cable and DSL. Other options include
cellular, satellite, and dial-up telephone.

2.4.2 Webster - Reflection Questions


Have you ever ordered a piece of furniture that you had to assemble yourself? The box has all the pieces
and parts that you need along with the assembly instructions. It helps you to look at all these items while
you read through the instructions. Think of your network. Did you know what all the different devices and
connection types were before you took this module? Do you look at these pieces and parts differently now?

2.4.3 Network Components, Types, and


Connections Quiz
Answers
https://quizlet.com/217940063/introduction-to-networks-version-600-itn-chapter-1-flash-cards/
https://itexamanswers.net/question/a-home-user-is-looking-for-an-isp-connection-that-provides-
high-speed-digital-transmission-over-regular-phone-lines-what-isp-connection-type-should-be-used
https://itexamanswers.net/2-4-3-network-components-types-and-questions-quiz-answers.html
Module 3: Wireless and Mobile
Networks
3.0 Introduction
3.0.1 Webster - Why Should I Take this Module?
Kishari has just ended her 10-hour shift at the hospital. As she is walking to her car, her mobile
phone rings. It is her son, Shridhar, calling to remind her to pick up the dinner he ordered. While
they are verifying their plans, Kishari gets into her car and starts the engine. Her conversation then
transfers from her mobile phone to her speakers in her car. She confirms that she will pick up the
food and that she will see him in an hour. Before she drives away, she does an internet search for
the restaurant and clicks the directions link. She listens to the directions coming through her
speakers. “Your destination is on the left.” She purchases the food and drives home. While Kishari
and Shridhar enjoy their dinner, Kishari tells Shridhar how she is starting to think about all of this
technology at home and at work. She knows how to use it but she does not understand how it
works. She gives him the example of mobile phone. Today she answered calls, texted, did an
internet search, and used it for driving directions. How does it do all of this? How does the phone
connect to all of these things? Shridhar is familiar with the different types of networks used by
mobile devices. Shridhar explains the 4G/5G mobile network, GPS, Bluetooth, NFC, and Wi-Fi.

If you do not have a friend or family member like Shridhar to explain this to you, do not worry! In
this module, you will learn about the various ways mobile devices communicate. Ready to learn
more?

3.0.2 What Will I Learn in this Module?


Module Title: Wireless and Mobile Networks
Module Objective: Configure mobile device for wireless access.

3.1 Wireless Networks


3.1.1 Video - Types of Wireless Networks
See the video
https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=30141ca0-f729-52b6-8517-0ed525221edd

3.2 Mobile Device Connectivity


3.2.1 Mobile Devices and Wi-Fi
Mobile devices give us the freedom to work, learn, play, and communicate wherever we want.
People using mobile devices do not need to be tied to a physical location to send and receive
voice, video, and data communications. In addition, wireless facilities, such as internet cafes, are
available in many countries. College campuses use wireless networks to allow students to sign up
for classes, watch lectures, and submit assignments in areas where physical connections to the
network are unavailable. With mobile devices becoming more powerful, many tasks that needed to
be performed on large computers connected to physical networks can now be completed using
mobile devices on wireless networks.

Almost all mobile devices are capable of connecting to Wi-Fi networks. It is advisable to connect to
Wi-Fi networks when possible because data used over Wi-Fi does not count against the cellular
data plan. Also, because Wi-Fi radios use less power than cellular radios, connecting to Wi-Fi
networks conserves battery power. Like other Wi-Fi-enabled devices, it is important to use security
when connecting to Wi-Fi networks. These precautions should be taken to protect Wi-Fi
communications on mobile devices:

 Never send login or password information using unencrypted text (plaintext).


 Use a VPN connection when possible if you are sending sensitive data.
 Enable security on home networks.
 Use WPA2 or higher encryption for security.

3.2.2 Wi-Fi Settings


 Two of the most popular operating systems for mobile devices are Android and Apple iOS.
Each operating system has settings that enable you to configure your device to connect to
wireless networks.
 Click below for an example of how to turn Wi-Fi on and off on Android and iOS
devices.

Android WI-FI Switch


IOS WI-FI Switch

To connect an Android or iOS device when it is within the coverage range of a Wi-Fi network, turn
on Wi-Fi and the device then searches for all available Wi-Fi networks and displays them in a list.
Touch a Wi-Fi network in the list to connect. Enter a password if needed.

When a mobile device is out of the range of the Wi-Fi network, it attempts to connect to another
Wi-Fi network in range. If no Wi-Fi networks are in range, the mobile device connects to the
cellular data network. When Wi-Fi is on, it will automatically connect to any Wi-Fi network that it
has connected to previously. If the network is new, the mobile device either displays a list of
available networks that can be used or asks if it should connect to it.

3.2.3 Configure Mobile Wi-Fi Connectivity


If your mobile device does not prompt to connect to a Wi-Fi network, the network SSID broadcast
may be turned off, or the device may not be set to connect automatically. Manually configure the
Wi-Fi settings on the mobile device. Remember that SSIDs and passphrases must be typed
exactly as entered on the wireless router setup or the device will not connect properly, as shown in
the figure. SSID is the name assigned to a wireless network. Passphrase is what we normally use
as the “wireless password”
To connect to a Wi-Fi network manually on an Android device, follow these steps:
Step 1. Select Settings > Add network.
Step 2. Enter the network SSID.
Step 3. Touch Security and select a security type.
Step 4. Touch Password and enter the password.
Step 5. Touch Save.

Operating systems for mobile devices are updated frequently and may be customized by the
device manufacturer. The commands listed above may not be exactly the same on your device.
There are online manuals for every type of device which are usually accessible from the website of
the manufacturer.

To connect to a Wi-Fi network manually on an iOS device, follow these steps:


Step 1. Select Settings > Wi-Fi > Other.
Step 2. Enter the network SSID.
Step 3. Touch Security and select a security type.
Step 4. Touch Other Network.
Step 5. Touch Password and enter the password.
Step 6. Touch Join.

3.2.4 Configure Cellular Data Settings


Cellular data plans are offered by most cell phone carriers, but the bandwidth limitations and
charges for usage vary widely by carrier, and by plan within carriers. As a result, many mobile
device users only use their cellular data plans when Wi-Fi service is not available.

Click below for an example of how to turn cellular data on and off on Android and iOS
devices.

Android Cellular Data


To turn on or off cellular data on an Android device, as shown in the figure, use the following path:
Settings > touch More under Wireless and Networks > touch Mobile Networks > touch Data
enabled
iOS Cellular Data
To turn on or off cellular data on an iOS device, as shown in the figure, use the following path:
Settings > Cellular Data > turn cellular data on or off

Mobile devices are preprogrammed to use a Wi-Fi network for internet if one is available and the device
can connect to the access point and receive an IP address. If no Wi-Fi network is available, the device uses
the cellular data capability if it is configured. Most of the time, transitions from one network to another are
not obvious to the user. For example, as a mobile device moves from an area of 4G coverage to 3G
coverage, the 4G radio shuts off and turns on the 3G radio. Connections are not lost during this transition.
3.2.5 Video - Bluetooth Configuration on a
Windows Laptop
Press the Play button to watch the video.

https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=b9616852-9557-5faf-b4d0-872e31e1b847

3.2.6 Simple Connectivity with Bluetooth


Mobile devices connect using many different methods. Cellular and Wi-Fi can be difficult to
configure, and require extra equipment such as towers and access points. Cable connections are
not always practical when connecting headsets or speakers. Bluetooth technology provides a
simple way for mobile devices to connect to each other and to wireless accessories. Bluetooth is
wireless, automatic, and uses very little power, which helps conserve battery life. Up to eight
Bluetooth devices can be connected together at any one time.

These are some examples of how devices use Bluetooth:

 Hands-free headset - A small earpiece with a microphone can be used for making and
receiving calls.
 Keyboard or mouse - A keyboard or mouse can be connected to a mobile device to make
input easier.
 Stereo control - A mobile device can connect to a home or car stereo to play music.
 Car speakerphone - A device that contains a speaker and a microphone can be used for
making and receiving calls.
 Tethering - A mobile device can connect to another mobile device or computer to share a
network connection. Tethering can also be performed with a Wi-Fi connection or a cable
connection such as USB.
 Mobile speaker - Portable speakers can connect to mobile devices to provide high-quality
audio without a stereo system.

3.2.7 Bluetooth Pairing


Bluetooth pairing occurs when two Bluetooth devices establish a connection to share resources. In
order for the devices to pair, the Bluetooth radios are turned on, and one device begins searching
for other devices. Other devices must be set to discoverable mode, also called visible, so that they
can be detected. When a Bluetooth device is in discoverable mode, it transmits the following
information when another Bluetooth device requests it:

 Name
 Bluetooth class
 Services that the device can use
 Technical information, such as the features or the Bluetooth specification that it supports

During the pairing process, a personal identification number (PIN) may be requested to
authenticate the pairing process. The PIN is often a number, but can also be a numeric code or
passkey. The PIN is stored using pairing services, so it does not have to be entered the next time
the device tries to connect. This is convenient when using a headset with a smart phone, because
they are paired automatically when the headset is turned on and within range.

To pair a Bluetooth device with an Android device, follow these steps:

Step 1. Follow the instructions for your device to place it in discoverable mode.
Step 2. Check the instructions for your device to find the connection PIN.

Step 3. Select Settings > Wireless and networks.

Step 4. Touch Bluetooth to turn it on.

Step 5. Touch the Bluetooth tab.

Step 6. Touch Scan for devices.

Step 7. Touch the discovered device to select it.

Step 8. Type the PIN.

Step 9. Touch the device name again to connect to it.

To pair a Bluetooth device with an iOS device, follow these steps:

Step 1. Follow the instructions for your device to place it in discoverable mode.

Step 2. Check the instructions for your device to find the connection PIN.

Step 3. Select Settings > Bluetooth.

Step 4. Touch Bluetooth to turn it on.

Step 5. Touch the discovered device to select it.

Step 6. Type the PIN.

Remember that mobile device operating systems are updated frequently. Always refer to the
documentation of the manufacturer for your specific model device for the latest command
reference.

3.2.8 Explore Your Network Settings on Your


Mobile Device
Now that you have reviewed the steps to configure and verify your Wi-Fi, cellular, and Bluetooth
access, explore these settings on your own phone. If you have access to a Bluetooth device, like
headphones or a speaker, connect it to your phone. Notice that you can be using all three of these
wireless services simultaneously, each serving a different role. You could be listening to music
(Bluetooth), researching on the internet (Wi-Fi), and receiving text messages (cellular).

3.3 Wireless and Mobile Networks


Summary
3.3.1 What Did I Learn in this Module?
Click below to learn more about the different ways that smartphones make connections.

Wireless Networks
Mobile phones use radio waves to transmit voice signals to antennas mounted on towers located
in specific geographic areas. When a telephone call is made, the voice signal is relayed from one
tower to another tower until it is delivered to its destination. This type of network is used when you
make a phone call to another mobile phone or to a wired telephone. It is also used to send text
messages directly from the phone. The most common type of cellular telephone network is called
a GSM network. The abbreviations 3G, 4G, 4G-LTE, and 5G are used to describe enhanced cell
phone networks that are optimized for the fast transmission of data. Currently, 4G still dominates
as the current mobile network used by most phones.

In addition to the GSM and 4G/5G transmitters and receivers, smartphones make connections in a
variety of ways.

Wi-Fi transmitters and receivers located within the smartphone enable the phone to connect to
local networks and the internet. Wi-Fi networks are usually privately owned but often provide guest
or public access hotspots. A hotspot is an area where Wi-Fi signals are available.

Bluetooth is wireless technology that allows devices to communicate over short distances. Multiple
devices can be connected at the same time with Bluetooth.

NFC is a wireless communication technology that enables data to be exchanged by devices that
are in very close proximity to each other, usually less than a few centimeters.

Mobile Device Connectivity


Almost all mobile devices are capable of connecting to Wi-Fi networks. These precautions should
be taken to protect Wi-Fi communications on mobile devices:

 Never send login or password information using unencrypted text (plaintext).


 Use a VPN connection when possible if you are sending sensitive data.
 Enable security on home networks.
 Use WPA2 or higher encryption for security.

Two of the most popular operating systems for mobile devices are Android and Apple iOS. Mobile
devices are preprogrammed to use a Wi-Fi network for the internet if one is available, and the
device can connect to the access point and receive an IP address. If no Wi-Fi network is available,
the device uses the cellular data capability if it is configured.

Bluetooth technology provides a simple way for mobile devices to connect to each other and to
wireless accessories. Bluetooth is wireless, automatic, and uses very little power, which helps
conserve battery life. Some examples of devices that use Bluetooth include hands-free headsets,
keyboards, a mouse, stereo controls, car speakerphones, and mobile speakers.

Bluetooth pairing occurs when two Bluetooth devices establish a connection to share resources. In
order for the devices to pair, the Bluetooth radios are turned on, and one device begins searching
for other devices. Other devices must be set to discoverable mode, also called visible, so that they
can be detected.

When a Bluetooth device is in discoverable mode, it transmits the following information when
another Bluetooth device requests it:

 Name
 Bluetooth class
 Services that the device can use
 Technical information, such as the features or the Bluetooth specification that it supports

During the pairing process, a PIN may be requested to authenticate the pairing process.

3.3.2 Webster - Reflection Questions


I find it fascinating that that you can send and receive data without plugging one device into
another using a cable. I am going to get a tablet so I can take this course while I am at the beach!
How many ways does your tablet or smartphone communicate when you are away from your
home network?

3.3.3 Wireless and Mobile Networks Quiz


Answers
https://itexamanswers.net/3-3-3-wireless-and-mobile-networks-quiz-answers.html
Module 4: Build a Home Network
4.0 Introduction
4.0.1 Webster - Why Should I Take this Module?
Kishori and Shridhar are washing the dishes after dinner. Kishori is watching a favorite movie on
her tablet while putting the dishes away. She asks Shridhar if her tablet works exactly as her
mobile phone does. He explains that there are some tablets that do use a mobile network, but that
her tablet is works on Wi-Fi network in her house. She tells him that she knows it must come in
from that box in the corner of the living room. That is all she knows!

Shridhar explains that the box in the corner is a home router. The router is connected to the
internet. Home routers typically have two primary types of ports: ethernet ports and internet ports.
In addition to the wired ports, many home routers include a radio antenna and a built-in wireless
access point. Kishori mostly uses wireless at home. Now Shridhar is worried about his mother’s
wireless security. Since she did not know what the router was, she probably did not change her
default password on the router! Shridhar logs into the router and makes some changes to keep
Kishori’s network and devices safer.

Have you ever set up a router? Have you thought about having secure communications over
wireless devices? This module will give you the knowledge to build a home network and configure
wireless devices for secure communication.

4.0.2 What Will I Learn in this Module?


Module Title: Build a Home Network

Module Objective: Configure an integrated wireless router and wireless client to connect securely
to the internet.
4.1 Home Network Basics
4.1.1 Video - Typical Home Network Setup
4.1.2 Components of a Home Network
In addition to an integrated router, there are many different types of devices that might be
connecting to a home network, as shown in the figure. Here are a few examples:

 Desktop computers
 Gaming systems
 Smart TV systems
 Printers
 Scanners
 Security cameras
 Telephones
 Climate control devices

As the new technologies come on the market, more and more household functions will rely on the
network to provide connectivity and control.

Home Wireless Local Area Network (WLAN)


4.1.3 Typical Home Network Routers
Small business and home routers typically have two primary types of ports:

Ethernet Ports
These ports connect to the internal switch portion of the router. These ports are usually labeled
“Ethernet” or “LAN”, as shown in the figure. All devices connected to the switch ports are on the
same local network.

Internet Port
This port is used to connect the device to another network. The internet port connects the router to
a different network than the Ethernet ports. This port is often used to connect to the cable or DSL
modem in order to access the internet.

4.1.4 Check Your Understanding - Home


Network Basics
Check your understanding of home network basics by choosing the correct answer to the following
questions.

Answer
https://quizlet.com/606147209/13-16-quizzes-and-stuff-netessentials-flash-cards/

4.2 Network Technologies in the


Home
4.2.1 LAN Wireless Frequencies
The wireless technologies most frequently used in home networks are in the unlicensed 2.4 GHz
and 5 GHz frequency ranges.

Bluetooth is a technology that makes use of the 2.4 GHz band. It is limited to low-speed, short-
range communications, but has the advantage of communicating with many devices at the same
time. This one-to-many communication has made Bluetooth technology the preferred method for
connecting computer peripherals such as wireless mice, keyboards and printers. Bluetooth is a
good method for transmitting audio to speakers or headphones.

Other technologies that use the 2.4 GHz and 5 GHz bands are the modern wireless LAN
technologies that conform to the various IEEE 802.11 standards. Unlike Bluetooth technology,
802.11 devices transmit at a much higher power level giving them a great range and improved
throughput. Certain areas of the electromagnetic spectrum can be used without a permit.
The figure shows where wireless technologies exist on the electromagnetic spectrum.

4.2.2 Wired Network Technologies


Although many home network devices support wireless communications, there are still a few
applications where devices benefit from a wired switch connection that is not shared with other
users on the network.

The most commonly implemented wired protocol is the Ethernet protocol. Ethernet uses a suite of
protocols that allow network devices to communicate over a wired LAN connection. An Ethernet
LAN can connect devices using many different types of wiring media.

Directly connected devices use an Ethernet patch cable, usually unshielded twisted pair. These
cables can be purchased with the RJ-45 connectors already installed, and they come in various
lengths. Recently constructed homes may have Ethernet jacks already wired in the walls of the
home. For those homes that do not have UTP wiring, there are other technologies, such as
powerline, that can distribute wired connectivity throughout the premises.

Click each wired technology for more information.


Category 5e is the most common wiring used in a LAN. The cable is made up of 4 pairs of wires that are
twisted to reduce electrical interference.

Coaxial Cable
Coaxial cable has an inner wire surrounded by a tubular insulating layer, that is then surrounded
by a tubular conducting shield. Most coax cables also have an external insulating sheath or jacket.

Fiber-Optic Cable
Fiber-optic cables can be either glass or plastic with a diameter about the same as a human hair
and it can carry digital information at very high speeds over long distances. Fiber-optic cables
have a very high bandwidth, which enables them to carry very large amounts of data.

4.2.3 Check Your Understanding - Network


Technologies in the Home
Check your understanding of network technologies in the home by choosing the correct
answer to the following questions.

4.3 Wireless Standards


4.3.1 Wi-Fi Networks
A number of standards have been developed to ensure that wireless devices can communicate.
They specify the RF spectrum used, data rates, how the information is transmitted, and more. The
main organization responsible for the creation of wireless technical standards is the Institute of
Electrical and Electronics Engineers (IEEE).
The IEEE 802.11 standard governs the WLAN environment. There are amendments to the IEEE
802.11 standard that describe characteristics for different standards of wireless communications.
Wireless standards for LANs use the 2.4 GHz and 5 GHz frequency bands. Collectively these
technologies are referred to as Wi-Fi.

Another organization, known as the Wi-Fi Alliance, is responsible for testing wireless LAN devices
from different manufacturers. The Wi-Fi logo on a device means that this equipment meets
standards and should operate with other devices that use the same standard.

Wireless standards are constantly improving the connectivity and speed of Wi-Fi networks. It is
important to be aware of new standards as they are introduced because manufacturers of wireless
devices will implement these standards quickly in their new products.

Do you have a wireless network in your home? Do you know what standards are supported by
your wireless router?

4.3.2 Wireless Settings


The Packet Tracer Basic Wireless Settings interface is shown in the figure. Wireless routers using
the 802.11 standards have multiple settings that have to be configured. These settings include the
following:

Network mode
Determines the type of technology that must be supported. For
example,802.11b,802.11g,802.11n or Mixed Mode.

Network Name (SSID)


Used to identify the WLAN. All devices that wish to participate in the WLAN must have the same
SSID.

Standard Channel
Specifies the channel over which communication will occur. By default, this is set to Auto to allow
the access point (AP) to determine the optimum channel to use.

SSID Broadcast
Determines if the SSID will be broadcast to all devices within range. By default, set to Enabled.

Note: SSID stands for Service Set Identifier.


Network Mode
The 802.11 protocol can provide increased throughput based on the wireless network
environment. If all wireless devices connect with the same 802.11 standard, maximum speeds can
be obtained for that standard. If the access point is configured to accept only one 802.11 standard,
devices that do not use that standard cannot connect to the access point.

A mixed mode wireless network environment can include devices that use any of the existing Wi-
Fi standards. This environment provides easy access for older devices that need a wireless
connection but do not support the latest standards.

When building a wireless network, it is important that the wireless components connect to the
appropriate WLAN. This is done using the SSID.

The SSID is a case-sensitive, alphanumeric string that contains up to 32 characters. It is sent in


the header of all frames transmitted over the WLAN. The SSID is used to tell wireless devices,
called wireless stations (STAs), which WLAN they belong to and with which other devices they can
communicate.

We use the SSID to identify a specific wireless network. It is essentially the name of the network.
Wireless routers usually broadcast their configured SSIDs by default. The SSID broadcast allows
other devices and wireless clients to automatically discover the name of the wireless network.
When the SSID broadcast is disabled, you must manually enter the SSID on wireless devices.

Disabling SSID broadcasting can make it more difficult for legitimate clients to find the wireless
network. However, simply turning off the SSID broadcast is not sufficient to prevent unauthorized
clients from connecting to the wireless network. All wireless networks should use the strongest
available encryption to restrict unauthorized access.

4.3.3 Check Your Understanding - Wireless


Standards
Check your understanding of wireless standards by choosing the correct answer to the
following questions.

4.4 Set Up a Home Router


Many wireless routers designed for home use have an automatic setup utility that can be used to
configure the basic settings on the router. These utilities usually require a PC or laptop to be
connected to a wired port on the router. If no device is available that has a wired connection, it
may be necessary to configure the wireless client software on the laptop or tablet first.

To connect to the router using a wired connection, plug an Ethernet patch cable into the network
port on the computer. Plug the other end into a LAN port on the router. Do not plug the cable into
the port or interface that is labeled “Internet”. The internet port will connect to the DSL or cable
modem. Some home routers may have a built-in modem for internet connections. If this is the
case, verify that the type of connection is correct for your internet service. A cable modem
connection will have a coaxial terminal to accept a BNC-type connector. A DSL connection will
have a port for a telephone-type cable, usually an RJ-11 connector.

After confirming that the computer is connected to the network router and the link lights on the NIC
indicate a working connection, the computer needs an IP address. Most network routers are set up
so that the computer receives an IP address automatically from a local DHCP server automatically
configured on the wireless router. If the computer does not have an IP address, check the router
documentation and configure the PC or tablet with a unique IP address, subnet mask, default
gateway, and DNS information

4.4.2 Design Considerations


Before entering the configuration utility, or manually configuring the router through a web browser,
you should consider how your network will be used. You do not want to configure the router and
have that configuration limit what you are able to do on the network, nor do you want to leave your
network unprotected.

What should my network be called?


If SSID broadcasting is on, the SSID name will be seen by all wireless clients within your signal
range. Many times the SSID gives away too much information about the network to unknown client
devices. It is not a good practice to include the device model or brand name as part of the SSID.
Wireless devices have default settings that are easy to find on the internet, as well as known
security weaknesses.

What types of devices will attach to my network?


Wireless devices contain radio transmitter/receivers that function within a specific frequency
range. If a device only has the necessary radio for 802.11 b/g, it will not connect if the wireless
router or access point is configured to only accept 802.11n or 802.11ac standards. If all devices
support the same standard, the network will work at its optimum speed. If you have devices that
do not support the n or ac standards, then you will have to enable legacy mode. A legacy mode
wireless network environment varies between router models but can include a combination of
802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac. This environment provides easy access for
legacy devices that need a wireless connection.

How do I add new devices?


The decision regarding who can access your home network should be determined by how you
plan to use the network. On some wireless routers, it is possible to set up guest access. This is a
special SSID coverage area that allows open access but restricts that access to using the internet
only.

The figure shows a wireless setup screen.

Note: Some wireless routers may label legacy mode as mixed mode.
4.5 Build a Home Network
Summary
4.5.1 What Did I Learn in this Module?
Home Network Basics
Most home networks consist of at least two separate networks. The public network coming in from
the service provider. The router is connected to the internet. Most likely, the home router is
equipped with both wired and wireless capabilities. A home network is a small LAN with devices
that usually connect to an integrated router and to each other in order to exchange information.

Wireless technology is fairly easy and inexpensive to install. Advantages of wireless LAN
technology include mobility, scalability, flexibility, cost savings, reduced installation time, and
reliability in harsh environments.

In addition to an integrated router, there are many different types of devices that might be
connecting to a home network, Examples include desktop computers, gaming systems, smart tv
systems, printers, scanners, security cameras, and climate control devices.

Small business and home routers typically have two primary types of ports: ethernet ports and
internet ports. In addition to the wired ports, many home routers include a radio antenna and a
built-in wireless access point.

Home Network Basics


Most home networks consist of at least two separate networks. The public network coming in from
the service provider. The router is connected to the internet. Most likely, the home router is
equipped with both wired and wireless capabilities. A home network is a small LAN with devices
that usually connect to an integrated router and to each other in order to exchange information.
Wireless technology is fairly easy and inexpensive to install. Advantages of wireless LAN
technology include mobility, scalability, flexibility, cost savings, reduced installation time, and
reliability in harsh environments.

In addition to an integrated router, there are many different types of devices that might be
connecting to a home network, Examples include desktop computers, gaming systems, smart tv
systems, printers, scanners, security cameras, and climate control devices.

Small business and home routers typically have two primary types of ports: ethernet ports and
internet ports. In addition to the wired ports, many home routers include a radio antenna and a
built-in wireless access point.

Network Technologies in the Home


Wireless technologies use electromagnetic waves to carry information between devices. The
electromagnetic spectrum includes such things as radio and television broadcast bands, visible
light, x-rays, and gamma-rays. Some types of electromagnetic waves are not suitable for carrying
data. Other parts of the spectrum are regulated by governments and licensed to various
organizations for specific applications.

Certain unlicensed sections of the spectrum are incorporated into consumer products, including
the Wi-Fi routers found in most homes. The wireless technologies most frequently used in home
networks are in the unlicensed 2.4 GHz and 5 GHz frequency ranges. Bluetooth is a technology
that makes use of the 2.4 GHz band. Other technologies that use the 2.4 GHz and 5 GHz bands
are the modern wireless LAN technologies that conform to the various IEEE 802.11 standards.
Unlike Bluetooth technology, 802.11 devices transmit at a much higher power level giving them a
great range and improved throughput.

Although many home network devices support wireless communications, there are still a few
applications where devices benefit from a wired switch connection. The most commonly
implemented wired protocol is the Ethernet protocol. Directly connected devices use an Ethernet
patch cable, usually unshielded twisted pair. Category 5e is the most common wiring used in a
LAN. The cable is made up of 4 pairs of wires that are twisted to reduce electrical interference. For
those homes that do not have UTP wiring, there are other technologies, such as powerline, that
can distribute wired connectivity throughout the premises.

Wireless standards
The IEEE 802.11 standard governs the WLAN environment. Wireless standards for LANs use the
2.4 GHz and 5 GHz frequency bands. Collectively these technologies are referred to as Wi-Fi. The
Wi-Fi Alliance is responsible for testing wireless LAN devices from different manufacturers.

Wireless routers using the 802.11 standards have multiple settings that have to be configured.
These settings include the following:

 Network mode - Determines the type of technology that must be supported. For example,
802.11b, 802.11g, 802.11n or Mixed Mode.
 Network Name (SSID) - Used to identify the WLAN. All devices that wish to participate in
the WLAN must have the same SSID.
 Standard Channel - Specifies the channel over which communication will occur. By
default, this is set to Auto to allow the access point (AP) to determine the optimum channel
to use.
 SSID Broadcast - Determines if the SSID will be broadcast to all devices within range. By
default, set to Enabled.

The 802.11 protocol can provide increased throughput based on the wireless network
environment. If all wireless devices connect with the same 802.11 standard, maximum speeds can
be obtained for that standard. If the access point is configured to accept only one 802.11 standard,
devices that do not use that standard cannot connect to the access point. A mixed mode wireless
network environment can include devices that use any of the existing Wi-Fi standards.
When building a wireless network, it is important that the wireless components connect to the
appropriate WLAN. This is done using the SSID. The SSID is used to tell wireless devices, called
STAs, which WLAN they belong to and with which other devices they can communicate. The SSID
broadcast allows other devices and wireless clients to automatically discover the name of the
wireless network. When the SSID broadcast is disabled, you must manually enter the SSID on
wireless devices.

Set up a Home Router


Many wireless routers designed for home use have an automatic setup utility that can be used to
configure the basic settings on the router. To connect to the router using a wired connection, plug
an Ethernet patch cable into the network port on the computer. Plug the other end into a LAN port
on the router.

After the computer is connected to the network router and the link lights on the NIC indicate a
working connection, the computer needs an IP address. Most network routers are set up so that
the computer receives an IP address automatically from a local DHCP server automatically
configured on the wireless router.

Before entering the configuration utility, or manually configuring the router through a web browser,
you should consider how your network will be used. Consider what you will call your network and
what devices should connect to your network. It is not a good practice to include the device model
or brand name as part of the SSID since internet searches can expose security weaknesses.

The decision regarding who can access your home network should be determined by how you
plan to use the network. Many routers support MAC address filtering. This enables you to
specifically identify who is allowed on the wireless network. This makes the wireless network more
secure, but it also less flexible when connecting new devices. On some wireless routers, it is
possible to set up guest access. This is a special SSID coverage area that allows open access but
restricts that access to using the internet only.

4.5.2 Webster - Reflection Questions


I had such a good time taking this module at the beach, that I think I’m going to set up a wireless
network at home. That way, I can keep up with this course anywhere in my home. Building your
home network to be a wireless network just makes sense. I can work in the west side of my web
and catch the sun setting, then move back to the east side in the morning. It’s so much nicer than
being stuck at my desk all day! Have you set up your own home network? If not, could you do it if
you had to?

4.5.3 Build a Home Network Quiz


Answers
https://itexamanswers.net/networking-essentials-version-2-modules-13-16-home-network-basics-

group-exam.html
https://quizlet.com/606147209/13-16-quizzes-and-stuff-netessentials-flash-cards/
https://itexamanswers.net/4-5-3-build-a-home-network-quiz-answers.html
Checkpoint Exam: Build a Small
Network
Answeres
https://itexamanswers.net/networking-basics-module-1-4-checkpoint-exam-answers.html
Question 20
Module 5: Communication
Principles
5.0.1 Webster - Why Should I Take this Module?
The next day, Kishori has a new patient, Srinivas, who has just been admitted to a room. He is
from Narayanpet and speaks Telugu. Kishori speaks Marathi. These two Indian languages are
very different. Kishori and Srinivas do not speak each other's native language. However, they do
both speak English. Therefore, they decide to communicate using English.

Before beginning to communicate with each other, we establish rules or agreements to govern the
conversation. Just like Kishori and Srinivas, we decide what method of communication we should
use, and what language we should use. We may also need to confirm that our messages are
received. For example, Kishori may have Srinivas sign a document verifying that he has
understood Kishori’s care instructions.
Networks also need rules, or protocols, to ensure successful communication. This module will
cover the communication principles for networks. Let's get started!

5.0.2 What Will I Learn in this Module?


Module Title: Communication Principles

Module Objective: Explain the importance of standards and protocols in network


communications.

5.1 Communication Protocols


5.1.1 Communication Protocols
List of expandable sections. Select each button to expand the content.

Communication in our daily lives takes many forms and occurs in many environments. We have
different expectations depending on whether we are chatting via the internet or participating in a
job interview. Each situation has its corresponding expected behaviors and styles.

Before beginning to communicate with each other, we establish rules or agreements to govern the
conversation. These agreements include the following:

 What method of communication should we use?


 What language should we use?
 Do we need to confirm that our messages are received?

Click below for an example of determining the method, language, and confirmation
strategies.

Method
Language

Confirmation
These rules, or protocols, must be followed in order for the message to be successfully delivered
and understood. Among the protocols that govern successful human communication are these:

 An identified sender and receiver


 Agreed upon method of communicating (face-to-face, telephone, letter, photograph)
 Common language and grammar
 Speed and timing of delivery
 Confirmation or acknowledgment requirements

The techniques that are used in network communications share these fundamentals with human
conversations.

Think about the commonly accepted protocols for sending text messages to your friends.

5.1.2 Why Protocols Matter


Just like humans, computers use rules, or protocols, in order to communicate. Protocols are
required for computers to properly communicate across the network. In both a wired and wireless
environment, a local network is defined as an area where all hosts must "speak the same
language", which, in computer terms means they must "share a common protocol".

If everyone in the same room spoke a different language, they would not be able to communicate.
Likewise, if devices in a local network did not use the same protocols, they would not be able to
communicate.

Networking protocols define many aspects of communication over the local network. As shown in
the table, these include message format, message size, timing, encoding, encapsulation, and
message patterns.

5.1.2 Why Protocols Matter


Just like humans, computers use rules, or protocols, in order to communicate. Protocols are
required for computers to properly communicate across the network. In both a wired and wireless
environment, a local network is defined as an area where all hosts must "speak the same
language", which, in computer terms means they must "share a common protocol".
If everyone in the same room spoke a different language, they would not be able to communicate.
Likewise, if devices in a local network did not use the same protocols, they would not be able to
communicate.

Networking protocols define many aspects of communication over the local network. As shown in
the table, these include message format, message size, timing, encoding, encapsulation, and
message patterns.

5.1.3 Check Your Understanding -


Communication Protocols
Answers
https://quizlet.com/789111506/networking-basics-flash-cards/
5.2 Communication Standards
5.2.1 Video - Devices in a Bubble
5.2.2 The Internet and Standards
With the increasing number of new devices and technologies coming online, how is it possible to
manage all the changes and still reliably deliver services such as email? The answer is internet
standards.

A standard is a set of rules that determines how something must be done. Networking and internet
standards ensure that all devices connecting to the network implement the same set of rules or
protocols in the same manner. Using standards, it is possible for different types of devices to send
information to each other over the internet. For example, the way in which an email is formatted,
forwarded, and received by all devices is done according to a standard. If one person sends an
email via a personal computer, another person can use a mobile phone to receive and read the
email as long as the mobile phone uses the same standards as the personal computer.

5.2.3 Network Standards Organizations


An internet standard is the end result of a comprehensive cycle of discussion, problem solving,
and testing. These different standards are developed, published, and maintained by a variety of
organizations, as shown in the figure. When a new standard is proposed, each stage of the
development and approval process is recorded in a numbered Request for Comments (RFC)
document so that the evolution of the standard is tracked. RFCs for internet standards are
published and managed by the Internet Engineering Task Force (IETF).

Other standards organizations that support the internet are shown in the figure.
5.2.4 Check Your Understanding -
Communications Standards
Answers
https://quizlet.com/731382041/networking-essentials-modules-5-8-flash-cards/
5.3 Network Communication
Models
5.3.1 Video - Network Protocols
5.3.2 Video - The Protocol Stack
https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=fae3b5c3-35ef-5924-a05e-40667a3bfd6d

5.3.3 The TCP/IP Model


Layered models help us visualize how the various protocols work together to enable network
communications. A layered model depicts the operation of the protocols occurring within each
layer, as well as the interaction with the layers above and below it. The layered model has many
benefits:

 Assists in protocol design, because protocols that operate at a specific layer have defined
information that they act upon and a defined interface to the layers above and below.
 Fosters competition because products from different vendors can work together.
 Enables technology changes to occur at one level without affecting the other levels.
 Provides a common language to describe networking functions and capabilities.

The first layered model for internetwork communications was created in the early 1970s and is
referred to as the internet model. It defines four categories of functions that must occur in order for
communications to be successful. The suite of TCP/IP protocols that are used for internet
communications follows the structure of this model, as shown in the table. Because of this, the
internet model is commonly referred to as the TCP/IP model.
5.3.4 The OSI Reference Model
There are two basic types of models that we use to describe the functions that must occur in order
for network communications to be successful: protocol models and reference models.

 Protocol model - This model closely matches the structure of a particular protocol suite. A
protocol suite includes the set of related protocols that typically provide all the functionality
required for people to communicate with the data network. The TCP/IP model is a protocol
model because it describes the functions that occur at each layer of protocols within the
TCP/IP suite.
 Reference model - This type of model describes the functions that must be completed at a
particular layer, but does not specify exactly how a function should be accomplished. A
reference model is not intended to provide a sufficient level of detail to define precisely how
each protocol should work at each layer. The primary purpose of a reference model is to aid
in clearer understanding of the functions and processes necessary for network
communications.

The most widely known internetwork reference model was created by the Open Systems
Interconnection (OSI) project at the International Organization for Standardization (ISO). It is used
for data network design, operation specifications, and troubleshooting. This model is commonly
referred to as the OSI model.

5.3.5 OSI Model and TCP/IP Model Comparison


Because TCP/IP is the protocol suite in use for internet communications, why do we need to learn
the OSI model as well?

The TCP/IP model is a method of visualizing the interactions of the various protocols that make up
the TCP/IP protocol suite. It does not describe general functions that are necessary for all
networking communications. It describes the networking functions specific to those protocols in
use in the TCP/IP protocol suite. For example, at the network access layer, the TCP/IP protocol
suite does not specify which protocols to use when transmitting over a physical medium, nor the
method of encoding the signals for transmission. OSI Layers 1 and 2 discuss the necessary
procedures to access the media and the physical means to send data over a network.

The protocols that make up the TCP/IP protocol suite can be described in terms of the OSI
reference model. The functions that occur at the internet layer in the TCP/IP model are contained
in the network layer of the OSI Model, as shown in the figure. The transport layer functionality is
the same between both models. However, the network access layer and the application layer of
the TCP/IP model are further divided in the OSI model to describe discrete functions that must
occur at these layers.

The key similarities are in the transport and network layers; however, the two models differ in how
they relate to the layers above and below each layer:

 OSI Layer 3, the network layer, maps directly to the TCP/IP internet layer. This layer is
used to describe protocols that address and route messages through an internetwork.
 OSI Layer 4, the transport layer, maps directly to the TCP/IP transport layer. This layer
describes general services and functions that provide ordered and reliable delivery of data
between source and destination hosts.
 The TCP/IP application layer includes several protocols that provide specific functionality to
a variety of end user applications. The OSI model Layers 5, 6, and 7 are used as
references for application software developers and vendors to produce applications that
operate on networks.
 Both the TCP/IP and OSI models are commonly used when referring to protocols at various
layers. Because the OSI model separates the data link layer from the physical layer, it is
commonly used when referring to these lower layers.

5.3.6 Check Your Understanding - Network


Communication Models
Answers
https://itexamanswers.net/5-4-3-communications-principles-quiz-answers.html
5.4 Communication Principles
Summary
5.4.1 What Did I Learn in this Module?
Communication Protocol
Protocols are required for computers to properly communicate across the network. These include
message format, message size, timing, encoding, encapsulation, and message patterns.

 Message format - When a message is sent, it must use a specific format or structure.
 Message size - The rules that govern the size of the pieces communicated across the
network are very strict. They can also be different, depending on the channel used.
 Timing - Timing determines the speed at which the bits are transmitted across the network.
It also affects when an individual host can send data and the total amount of data that can
be sent in any one transmission.
 Encoding - Messages sent across the network are first converted into bits by the sending
host. Each bit is encoded into a pattern of sounds, light waves, or electrical impulses
depending on the network media over which the bits are transmitted.
 Encapsulation - Each message transmitted on a network must include a header that
contains addressing information that identifies the source and destination hosts.
Encapsulation is the process of adding this information to the pieces of data that make up
the message.
 Message pattern - Some messages require an acknowledgment before the next message
can be sent. This type of request/response pattern is a common aspect of many networking
protocols. However, there are other types of messages that may be simply streamed across
the network, without concern as to whether they reach their destination.

Communication Standards
 Topologies allow us to see the networking using representation of end devices and
intermediary devices. How does a device see a network? Think of a device in a bubble. The
only thing a device sees is its own addressing information. How does the device know it is
on the same network as another device? The answer is network protocols. Most network
communications are broken up into smaller data units, or packets.
 A standard is a set of rules that determines how something must be done. Networking and
internet standards ensure that all devices connecting to the network implement the same
set of rules or protocols in the same manner. Using standards, it is possible for different
types of devices to send information to each other over the internet.
 An internet standard is the end result of a comprehensive cycle of discussion, problem
solving, and testing. These different standards are developed, published, and maintained
by a variety of organizations. When a new standard is proposed, each stage of the
development and approval process is recorded in a numbered RFC document so that the
evolution of the standard is tracked. RFCs for internet standards are published and
managed by the IETF.

Network Communication Models


Protocols are the rules that govern communications. Successful communication between hosts
requires interaction between a number of protocols. Protocols include HTTP, TCP, IP, and
Ethernet. These protocols are implemented in software and hardware that are installed on each
host and networking device.

The interaction between the different protocols on a device can be illustrated as a protocol stack.
A stack illustrates the protocols as a layered hierarchy, with each higher-level protocol depending
on the services of the protocols shown in the lower levels. The separation of functions enables
each layer in the stack to operate independently of others.

The suite of TCP/IP protocols that are used for internet communications follows the structure of
this model:

 Application - Represents data to the user, plus encoding and dialog control
 Transport -Supports communication between various devices across diverse networks
 Internet - Determines the best path through the network
 Network Access - The hardware devices and media that make up the network.

A reference model describes the functions that must be completed at a particular layer but does
not specify exactly how a function should be accomplished. The primary purpose of a reference
model is to aid in clearer understanding of the functions and processes necessary for network
communications.

The most widely known internetwork reference model was created by the OSI project at the
International ISO. It is used for data network design, operation specifications, and troubleshooting.
This model is commonly referred to as the OSI model.

OSI Model Layer Description


 7 – Application - The application layer contains protocols used for process-to-process
communications.
 6 – Presentation - The presentation layer provides for common representation of the data
transferred between application layer services.
 5 – Session - The session layer provides services to the presentation layer to organize its
dialogue and to manage data exchange.
 4 – Transport - The transport layer defines services to segment, transfer, and reassemble
the data for individual communications between the end devices.
 3 – Network - The network layer provides services to exchange the individual pieces of
data over the network between identified end devices.
 2 - Data Link - The data link layer protocols describe methods for exchanging data frames
between devices over a common media
 1 – Physical - The physical layer protocols describe the mechanical, electrical, functional,
and procedural means to activate, maintain, and de-activate physical connections for a bit
transmission to and from a network device.

5.4.2 Webster - Reflection Questions


 Recall that Kishori and Srivinas had to determine a common language... Do you have any
friends or relatives whose first language is different than yours? Do you know anyone who
uses sign language? How would you communicate with them if you did not know sign
language? Did you realize that you were using a protocol (using a shared language or
communicating in writing) to interact with family and friends?

5.4.3 Communications Principles Quiz


Answer
https://itexamanswers.net/5-4-3-communications-principles-quiz-answers.html
Module 6: Network Media
6.0 Introduction
6.0.1 Webster - Why Should I Take this Module
Kishori knows that the 15 to 20 devices in a patient’s room wirelessly connect to the network. She
also uses a wireless tablet. While working at the nurses' station, she noticed that the wireless
network on her desktop computer was disabled. However, she still has access to patient records.
How is the desktop connected?

How does communication transmit across a network? The answer is network media. Media
provides a channel over which the message travels from source to destination. In modern
networks, there are primarily three types of media used. Do you know what they are? Take this
module to learn about media types.

6.0.2 What Will I Learn in this Module?


Module Title: Network Media

Module Objective: Describe common network media.


6.1 Network Media Types
6.1.1 Video - Network Media Types
https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=69938ef2-eaf4-5d28-82f0-326c9de0bb2a

6.1.2 Three Media Types


Data is transmitted across a network on media. The media provides the channel over which the
message travels from source to destination.

Modern networks primarily use three types of media to interconnect devices, as shown in the
figure:

 Metal wires within cables - Data is encoded into electrical impulses.


 Glass or plastic fibers within cables (fiber-optic cable) - Data is encoded into pulses of
light.
 Wireless transmission - Data is encoded via modulation of specific frequencies of
electromagnetic waves.

The four main criteria for choosing network media are these:

 What is the maximum distance that the media can successfully carry a signal?
 What is the environment in which the media will be installed?
 What is the amount of data and at what speed must it be transmitted?
 What is the cost of the media and installation?

6.1.3 Common Network Cables


The three most common network cables are twisted-pair, coaxial cable, and fiber-optic
cable.
Click below for more information about each cable type.
Twisted-Pair Cable

Ethernet technology generally uses twisted-pair cables to interconnect devices. Because Ethernet
is the foundation for most local networks, twisted-pair is the most commonly encountered type of
network cabling.

In twisted-pair, wires are grouped in pairs and twisted together to reduce interference. The pairs of
wires are colored so that you can identify the same wire at each end. Typically, in each pair, one
of the wires is a solid color and its partner is the same color striped onto a white background.

Coaxial Cable

Coaxial was one of the earliest types of network cabling developed. Coaxial cable is the kind of
copper cable used by cable TV companies. It is also used for connecting the various components
which make up satellite communication systems. Coaxial cable has a single rigid copper core that
conducts the signal. This core is typically surrounded by a layer of insulation, braided metal
shielding, and a protective jacket. It is used as a high-frequency transmission line to carry high-
frequency or broadband signals.

Fiber-Optic Cable

Fiber-optic cable can be either glass or plastic with a diameter about the same as a human hair
and it can carry digital information at very high speeds over long distances. Because light is used
instead of electricity, electrical interference does not affect the signal. Fiber-optic cables have
many uses as well as communications. They are also used in medical imaging, medical treatment,
and mechanical engineering inspection.

They have a very high bandwidth, which enables them to carry very large amounts of data. Fiber
is used in backbone networks, large enterprise environments, and large data centers. It is also
used extensively by telephone companies.
6.1.4 Check Your Understanding - Network
Media Types
Answers
https://quizlet.com/687005105/module-4-flash-cards/
6.2 Network Media Summary
6.2.1 What Did I Learn in this Module?
Network Media Types
Communication transmits across a network on media. The media provides the channel over which
the message travels from source to destination.

Modern networks primarily use three types of media to interconnect devices are:

 Metal wires within cables - Data is encoded into electrical impulses.


 Glass or plastic fibers within cables (fiber-optic cable) - Data is encoded into pulses of
light.
 Wireless transmission - Data is encoded via modulation of specific frequencies of
electromagnetic waves.

The four main criteria for choosing media are the following:

 What is the maximum distance that the media can successfully carry a signal?
 What is the environment in which the media will be installed?
 What is the amount if data and at what speed must is be transmitted?
 What is the cost of the media installation?

The three most common network cables are twisted-pair, coaxial cable, and fiber-optic cable.
Ethernet technology generally uses twisted-pair cables to interconnect devices. Coaxial cable is
the kind of copper cable used by cable TV companies. It is also used for connecting the various
components which make up satellite communication systems. Fiber-optic cable can be either
glass or plastic with a diameter about the same as a human hair and it can carry digital information
at very high speeds over long distances. Because light is used instead of electricity, electrical
interference does not affect the signal.

6.2.2 Webster - Reflection Questions


I had no idea that a network needed to have different cables for different uses, did you? I thought
all the cables were the same and that they all carried the same type of signal. And electrical
interference? Now I get why my smartphone connection sometimes drops if I stand too close to
my microwave! Do you know about all the cables that are used in your school or office network?

6.2.3 Network Media Quiz


Answers
https://itexamanswers.net/6-2-3-network-media-quiz-answers.html
Module 7: The Access Layer
7.0 Introduction
7.0.1 Webster - Why Should I Take this Module?
During a lunch break, Kishori sees her friend, Rina, and they decide to eat together. Rina works as
an IT support technician at the hospital. Kishori thinks this might be a good opportunity to ask Rina
a question she’s been pondering. Kishori now knows that her desktop computer in the nurses’
station connects to the network using a twisted-pair cable. Most other devices she uses connect to
the network wirelessly. She wonders if there is any difference in the way wired and wireless
devices communicate on the network. Rina knows that Kishori has relatives in the United States.
She explains that the differences between wired and wireless network communication is similar to
the differences in addressing formats used for mailing packages to different countries. The
contents inside might be exactly the same, but the addressing and possibly packaging could be
very different.

How does a message get delivered? When you write a letter and place it in the envelope, you
need to make sure it has the correct address information to be delivered to the recipient. In your
network, the process of placing one message format (the letter) inside another message format
(the envelope) is called encapsulation. Ready to learn more? Take this module!

7.0.2 What Will I Learn in this Module?


Module Title: The Access Layer

Module Objective: Explain how communication occurs on Ethernet networks.

7.1 Encapsulation and the Ethernet


Frame
7.1.1 Video - The Fields of the Ethernet Frame
Ethernet is technology commonly used in local area networks. Devices access the Ethernet LAN
using an Ethernet Network Interface Card (NIC). Each Ethernet NIC has a unique address
permanently embedded on the card known as a Media Access Control (MAC) address. The MAC
address for both the source and destination are fields in an Ethernet frame.

Press the Play button to watch the video.

7.1.2 Encapsulation
When sending a letter, the letter writer uses an accepted format to ensure that the letter is
delivered and understood by the recipient. In the same way, a message that is sent over a
computer network follows specific format rules in order for it to be delivered and processed.

The process of placing one message format (the letter) inside another message format (the
envelope) is called encapsulation. De-encapsulation occurs when the process is reversed by the
recipient and the letter is removed from the envelope. Just as a letter is encapsulated in an
envelope for delivery, so computer messages are encapsulated.

Each computer message is encapsulated in a specific format, called a frame, before it is sent over
the network. A frame acts like an envelope; it provides the address of the intended destination and
the address of the source host. The format and contents of a frame are determined by the type of
message being sent and the channel over which it is communicated. Messages that are not
correctly formatted are not successfully delivered to or processed by the destination host.

Click each button for an analogy and a network example of message formatting and
encapsulation.

Analogy

A common example of requiring the correct format in human communications is when sending a
letter. Click Play in the figure to view an animation of formatting and encapsulating a letter.
An envelope has the address of the sender and receiver, each located at the proper place on the
envelope. If the destination address and formatting are not correct, the letter is not delivered.

The process of placing one message format (the letter) inside another message format (the
envelope) is called encapsulation. De-encapsulation occurs when the process is reversed by the
recipient and the letter is removed from the envelope

Network

Similar to sending a letter, a message that is sent over a computer network follows specific format
rules for it to be delivered and processed.

Internet Protocol (IP) is a protocol with a similar function to the envelope example. In the figure,
the fields of the Internet Protocol version 6 (IPv6) packet identify the source of the packet and its
destination. IP is responsible for sending a message from the message source to destination over
one or more networks.

Note: The fields of the IPv6 packet are discussed in detail in another module.

7.1.3 Check Your Understanding -


Encapsulation and the Ethernet Frame
Answers
https://quizlet.com/605939329/5-8-quiz-flash-cards/
7.2 The Access Layer
7.2.1 Video - Ethernet Switches
7.2.2 Video - MAC Address Tables
https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=fc800ea7-865f-5e0c-a706-6df169ed761c
https://quizlet.com/605939329/5-8-quiz-flash-cards/

7.2.3 Check Your Understanding - The


Access Layer
7.3 The Access Layer Summary
7.3.1 What Did I Learn in this Module?
Encapsulation and the Ethernet Frame
The process of placing one message format inside another message format is called
encapsulation. De-encapsulation occurs when the process is reversed by the recipient and the
letter is removed from the envelope. Just as a letter is encapsulated in an envelope for delivery, so
computer messages are encapsulated. A message that is sent over a computer network follows
specific format rules for it to be delivered and processed.

The Ethernet protocol standards define many aspects of network communication including frame
format, frame size, timing, and encoding. The format for Ethernet frames specifies the location of
the destination and source MAC addresses, and additional information including preamble for
sequencing and timing, start of frame delimiter, length and type of frame, and frame check
sequence to detect transmission errors

The Access Layer


The access layer is the part of the network in which people gain access to other hosts and to
shared files and printers. The access layer provides the first line of networking devices that
connect hosts to the wired Ethernet network. Within an Ethernet network, each host can connect
directly to an access layer networking device using an Ethernet cable. Ethernet hubs contain
multiple ports that are used to connect hosts to the network. Only one message can be sent
through an Ethernet hub at a time. Two or more messages sent at the same time will cause a
collision. Because excessive retransmissions can clog up the network and slow down network
traffic, hubs are now considered obsolete and have been replaced by Ethernet switches.

An Ethernet switch is a device that is used at Layer 2. When a host sends a message to another
host connected to the same switched network, the switch accepts and decodes the frames to read
the MAC address portion of the message. A table on the switch, called a MAC address table,
contains a list of all the active ports and the host MAC addresses that are attached to them. When
a message is sent between hosts, the switch checks to see if the destination MAC address is in
the table. If it is, the switch builds a temporary connection, called a circuit, between the source and
destination ports. Ethernet switches also allow for sending and receiving frames over the same
Ethernet cable simultaneously. This improves the performance of the network by eliminating
collisions.

A switch builds the MAC address table by examining the source MAC address of each frame that
is sent between hosts. When a new host sends a message or responds to a flooded message, the
switch immediately learns its MAC address and the port to which it is connected. The table is
dynamically updated each time a new source MAC address is read by the switch.

7.3.2 Webster - Reflection Questions


There is a lot going on behind the scenes when I send an email to a friend. Way more than I knew
about! Data gets encapsulated when I send an email and then it's de-encapsulated when my
friend opens that email. The access layer of the OSI model is where all of this happens. Now that
you know about encapsulation and the access layer, what else do you do on your computer,
tablet, or smartphone that requires encapsulation and the protocols used at the access layer?

7.3.3 The Access Layer Quiz


Answers
https://itexamanswers.net/7-3-3-the-access-layer-quiz-answers.html
Checkpoint Exam: Network Access
https://itexamanswers.net/networking-basics-module-5-7-checkpoint-exam-answers.html
https://itexamanswers.net/question/a-network-technician-is-researching-the-use-of-fiber-optic-
cabling-in-a-new-technology-center-which-two-issues-should-be-considered-before-implementing-
fiber-optic-media-choose-two
https://itexamanswers.net/networking-basics-course-final-exam-answers.html
https://itexamanswers.net/networking-basics-module-5-7-checkpoint-exam-answers.html
https://itexamanswers.net/7-3-3-the-access-layer-quiz-answers.html
https://itexamanswers.net/question/match-the-protocol-function-to-the-description-while-taking-
into-consideration-that-a-network-client-is-visiting-a-web-site-not-all-options-are-used
Module 8: The Internet Protocol
8.0 Introduction
8.0.1 Webster - Why Should I Take this Module?
Kishori is learning a lot from Rina! She understands that when she sends or receives a package in
the mail, there is a unique address involved. A postal code is critical in the address to route the
package to the correct post office. She asks Rina if computers use something like a zip code to
route the message to the correct place. Rina goes into more detail about the process and explains
that much like Kishori’s home address identifies where she lives, an IPv4 address identifies a host
on the network. A host needs an IPv4 address to participate on the internet and almost all LANs
today. Every packet sent across the internet has a source and destination IPv4 address. This
information is required by networking devices to ensure the information gets to the destination and
any replies are returned to the source.

My friend Kishori never thought she would be so interested in all of this tech information, but she
really wants to learn more! Do you? Take this module to learn about the Internet Protocol and the
structure of IPv4 addresses!

8.0.2 What Will I Learn in this Module?


Module Title: The Internet Protocol

Module Objective: Explain the features of an IP address.

-Formación en educación secundaria, bachillerato, grado medio, grado superior o grado Universitario.
- Experiencia de al menos 2 años en una posición similar.
- Nivel de inglés C1 (se valorará en entrevista)
- Atención de visitas
- Gestión de correo electrónico y llamadas telefónicas
- Reportes de gastos
- Organización de viajes
- Organización de reuniones y reserva de salas
- Soporte administrativo a la organización
- Priorización de tareas
- Otras tareas administrativas derivadas del puesto

8.1 Purpose of an IPv4 Address


8.1.1 The IPv4 Address
A host needs an IPv4 address to participate on the internet and almost all LANs today. The IPv4
address is a logical network address that identifies a particular host. It must be properly configured
and unique within the LAN, for local communication. It must also be properly configured and
unique in the world, for remote communication. This is how a host is able to communicate with
other devices on the internet.

An IPv4 address is assigned to the network interface connection for a host. This connection is
usually a network interface card (NIC) installed in the device. Examples of end-user devices with
network interfaces include workstations, servers, network printers, and IP phones. Some servers
can have more than one NIC and each of these has its own IPv4 address. Router interfaces that
provide connections to an IP network will also have an IPv4 address.

Every packet sent across the internet has a source and destination IPv4 address. This information
is required by networking devices to ensure the information gets to the destination and any replies
are returned to the source.

Click Play in the figure to see how packets travel across the internet.

8.1.2 Octets and Dotted-Decimal Notation


IPv4 addresses are 32 bits in length. Here is an IPv4 address in binary:
11010001101001011100100000000001

Notice how difficult this address is to read. Imagine having to configure devices with a series of 32
bits! For this reason, the 32 bits are grouped into four 8-bit bytes called octets like this:
11010001.10100101.11001000.00000001
That's better, but still difficult to read. That's why we convert each octet into its decimal value,
separated by a decimal point or period. The above binary IPv4 becomes this dotted-decimal
representation:
209.165.200.1

Note: For now, you do not need to know how to convert between binary and decimal number
systems.

8.1.3 Packet Tracer - Connect to a Web Server


In this activity, you will observe how packets are sent across the internet using IP addresses.

8.2 The IPv4 Address Structure


8.2.1 Video - The IPv4 Address Structure
https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=0fde628f-fca3-5768-a7e8-44e826764bd4

8.2.2 Networks and Hosts


The logical 32-bit IPv4 address is hierarchical and is made up of two parts, the network and the
host. In the figure, the network portion is blue, and the host portion is red. Both parts are required
in an IPv4 address. Both networks have the subnet mask 255.255.255.0. The subnet mask is used
to identify the network on which the host is connected.

As an example, there is a host with an IPv4 address 192.168.5.11 with a subnet mask of
255.255.255.0. The first three octets, (192.168.5), identify the network portion of the address, and
the last octet, (11) identifies the host. This is known as hierarchical addressing because the
network portion indicates the network on which each unique host address is located. Routers only
need to know how to reach each network, rather than needing to know the location of each
individual host.

With IPv4 addressing, multiple logical networks can exist on one physical network if the network
portion of the logical network host addresses is different. For example: three hosts on a single,
physical local network have the same network portion of their IPv4 address (192.168.18) and three
other hosts have different network portions of their IPv4 addresses (192.168.5). The hosts with the
same network number in their IPv4 addresses will be able to communicate with each other, but will
not be able to communicate with the other hosts without the use of routing. In this example, there
is one physical network and two logical IPv4 networks.

Another example of a hierarchical network is the telephone system. With a telephone number, the
country code, area code, and exchange represent the network address and the remaining digits
represent a local phone number.
8.2.3 Check Your Understanding - IPv4
Address Structure
Answers
8.3 The Internet Protocol Summary
8.3.1 What Did I Learn in this Module?
Purpose of the IPv4 Address
The IPv4 address is a logical network address that identifies a particular host. It must be properly
configured and unique within the LAN, for local communication. It must also be properly configured
and unique in the world, for remote communication.

An IPv4 address is assigned to the network interface connection for a host. This connection is
usually a NIC installed in the device.
Every packet sent across the internet has a source and destination IPv4 address. This information
is required by networking devices to ensure the information gets to the destination and any replies
are returned to the source.

The IPv4 Address Structure


The logical 32-bit IPv4 address is hierarchical and is made up of two parts, the network, and the
host. As an example, there is a host with an IPv4 address 192.168.5.11 with a subnet mask of
255.255.255.0. The first three octets, (192.168.5), identify the network portion of the address, and
the last octet, (11) identifies the host. This is known as hierarchical addressing because the
network portion indicates the network on which each unique host address is located.

Routers only need to know how to reach each network, rather than needing to know the location of
each individual host. With IPv4 addressing, multiple logical networks can exist on one physical
network if the network portion of the logical network host addresses is different.

8.3.2 Webster - Reflection Questions


It makes sense that every device on the network has an IP address, and routers use these
addresses to send packets from the source to the destination. When I send a letter through the
mail, I put my address and the address of the recipient on the envelope. But now I see the other
connection to how networks operate. The postal code and city of my recipient is a little bit like the
network portion of the IP address, and the street address is like the host portion of the IP address.
Can you think of any other analogies to network operations and IP addresses?

Module 9:IPv4 and Networks


Segmentation
9.0 Introduction
9.0.1 Webster - Why Should I Take this Module?
Kishori has a new patient, Divya, who was admitted today. Like Srinivas, Divya does not speak the
same language that Kishori speaks. Divya only speaks Telugu and has limited English. Kishori
wants to send an email to the nurses on the next shift to determine whether any of them speak
Telugu. Kishori can send a multicast email message, which is a single email message sent to
specific multiple recipients. You know about the structure of IPv4 addresses. Now it is time to learn
more about them. Have you heard of unicast, broadcast, and multicast IPv4 addresses? What are
public, private, and reserved IPv4 addresses? Dive into this module to get a deeper understanding
of IPv4 addresses!

9.0.2 What Will I Learn in this Module?


Module Title: IPv4 and Network Segmentation

Module Objective: Explain how IPv4 addresses are used in network communication and
segmentation.
9.1 IPv4 Unicast, Broadcast, and
Multicast
9.1.1 Video - IPv4 Unicast
https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=d30191c2-c19f-5e84-bcc4-b73de33295c2

9.1.2 Unicast
In the previous topic you learned about the structure of an IPv4 address; each has a network
portion and a host portion. There are different ways to send a packet from a source device, and
these different transmissions affect the destination IPv4 addresses.

Unicast transmission refers to one device sending a message to one other device in one-to-one
communications.

A unicast packet has a destination IP address that is a unicast address which goes to a single
recipient. A source IP address can only be a unicast address, because the packet can only
originate from a single source. This is regardless of whether the destination IP address is a
unicast, broadcast, or multicast.

Play the animation to see an example of unicast transmission.


Note: In this course, all communication between devices is unicast unless otherwise noted.

IPv4 unicast host addresses are in the address range of 1.1.1.1 to 223.255.255.255. However,
within this range are many addresses that are reserved for special purposes. These special
purpose addresses will be discussed later in this module.

Note: In the animation, notice that the subnet mask for 255.255.255.0 is represented using slash
notion or /24. This indicates that the subnet mask is 24 bits long. The subnet mask 255.255.255.0
in binary is 11111111.11111111.11111111.00000000.

9.1.3 Video - IPv4 Broadcast


Press the Play button to watch the video.

9.1.4 Broadcast
Broadcast transmission refers to a device sending a message to all the devices on a network in
one-to-all communications.

A broadcast packet has a destination IP address with all ones (1s) in the host portion, or 32 one
(1) bits.

Note: IPv4 uses broadcast packets. However, there are no broadcast packets with IPv6.

A broadcast packet must be processed by all devices in the same broadcast domain. A broadcast
domain identifies all hosts on the same network segment. A broadcast may be directed or limited.
A directed broadcast is sent to all hosts on a specific network. For example, a host on the
172.16.4.0/24 network sends a packet to 172.16.4.255. A limited broadcast is sent to
255.255.255.255. By default, routers do not forward broadcasts.

Play the animation to see an example of a limited broadcast transmission.

Broadcast packets use resources on the network and make every receiving host on the network process
the packet. Therefore, broadcast traffic should be limited so that it does not adversely affect the
performance of the network or devices. Because routers separate broadcast domains, subdividing
networks can improve network performance by eliminating excessive broadcast traffic.

9.1.5 Video - IPv4 Multicast


https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=125c7ba2-962e-5bde-b936-b1e908485173

9.1.6 Multicast
Multicast transmission reduces traffic by allowing a host to send a single packet to a selected set
of hosts that subscribe to a multicast group.

A multicast packet is a packet with a destination IP address that is a multicast address. IPv4 has
reserved the 224.0.0.0 to 239.255.255.255 addresses as a multicast range.

Hosts that receive particular multicast packets are called multicast clients. The multicast clients
use services requested by a client program to subscribe to the multicast group.

Each multicast group is represented by a single IPv4 multicast destination address. When an IPv4
host subscribes to a multicast group, the host processes packets addressed to this multicast
address, and packets addressed to its uniquely allocated unicast address.

Routing protocols such as OSPF use multicast transmissions. For example, routers enabled with
OSPF communicate with each other using the reserved OSPF multicast address 224.0.0.5. Only
devices enabled with OSPF will process these packets with 224.0.0.5 as the destination IPv4
address. All other devices will ignore these packets.

The animation demonstrates clients accepting multicast packets.

9.1.7 Activity - Unicast, Broadcast, or Multicast


Instructions:

Click Start to see a destination IP address. Next, click the host or hosts which will receive a packet
based on the address type (unicast, broadcast, or multicast). Click Check to verify your answer.
Click New Problem again to get a new problem.

9.1.7 Activity - Unicast, Broadcast, or Multicast


PENDIENTE HACER
https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=2e013b38-c477-59c1-af9f-37ec0a7617dc

Instructions:
Click Start to see a destination IP address. Next, click the host or hosts which will receive a packet
based on the address type (unicast, broadcast, or multicast). Click Check to verify your answer.
Click New Problem again to get a new problem.

9.2 Types of IPv4 Addresses


9.2.1 Public and Private IPv4 Addresses
Just as there are different ways to transmit an IPv4 packet, there are also different types of IPv4
addresses. Some IPv4 addresses cannot be used to go out to the internet, and others are
specifically allocated for routing to the internet. Some are used to verify a connection and others
are self-assigned. As a network administrator, you will eventually become very familiar with the
types of IPv4 addresses, but for now, you should at least know what they are and when to use
them.

Public IPv4 addresses are addresses which are globally routed between internet service provider
(ISP) routers. However, not all available IPv4 addresses can be used on the internet. There are
blocks of addresses called private addresses that are used by most organizations to assign IPv4
addresses to internal hosts.

In the mid-1990s, with the introduction of the World Wide Web (WWW), private IPv4 addresses
were introduced because of the depletion of IPv4 address space. Private IPv4 addresses are not
unique and can be used internally within any network.

Note: The long-term solution to IPv4 address depletion was IPv6.

Note: Private addresses are defined in RFC 1918 and sometimes referred to as RFC 1918 address space.
9.2.2 Routing to the Internet
Most internal networks, from large enterprises to home networks, use private IPv4 addresses for
addressing all internal devices (intranet) including hosts and routers. However, private addresses
are not globally routable.

In the figure, customer networks 1, 2, and 3 are sending packets outside their internal networks.
These packets have a source IPv4 address that is a private address and a destination IPv4
address that is public (globally routable). Packets with a private address must be filtered
(discarded) or translated to a public address before forwarding the packet to an ISP.

Private IPv4 Addresses and Network Address Translation (NAT)

Before the ISP can forward this packet, it must translate the source IPv4 address, which is a private
address, to a public IPv4 address using Network Address Translation (NAT). NAT is used to translate
between private IPv4 and public IPv4 addresses. This is usually done on the router that connects the
internal network to the ISP network. Private IPv4 addresses in the organization’s intranet will be translated
to public IPv4 addresses before routing to the internet.

9.2.3 Activity - Pass or Block IPv4 Addresses


Instructions:

Decide to Pass or Block each IP address depending on whether it is Public (the internet) or Private

(small local network). Click Start to begin and click on either Pass or Block.

PENDIENTE HACER
https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=2e013b38-c477-59c1-af9f-37ec0a7617dc
9.2.4 Special Use IPv4 Addresses
There are certain addresses, such as the network address and broadcast address, that cannot be
assigned to hosts. There are also special addresses that can be assigned to hosts, but with
restrictions on how those hosts can interact within the network.

Loopback addresses

Loopback addresses (127.0.0.0 /8 or 127.0.0.1 to 127.255.255.254) are more commonly identified


as only 127.0.0.1. These are special addresses used by a host to direct traffic to itself. For
example, the ping command is commonly used to test connections to other hosts. But you can
also use the ping command to test if the IP configuration on your own device, as shown in the
figure.

Note: You will learn more about the ping command later in this course.

Pinging the Loopback Interface


Link-Local addresses

Link-local addresses (169.254.0.0 /16 or 169.254.0.1 to 169.254.255.254) are more commonly


known as the Automatic Private IP Addressing (APIPA) addresses or self-assigned addresses.
They are used by a Windows client to self-configure in the event that the client cannot obtain an IP
addressing through other methods. Link-local addresses can be used in a peer-to-peer connection
but are not commonly used for this purpose.

9.2.5 Legacy Classful Addressing


In 1981, IPv4 addresses were assigned using classful addressing as defined in RFC 790
(https://tools.ietf.org/html/rfc790), Assigned Numbers. Customers were allocated a network address
based on one of three classes, A, B, or C. The RFC divided the unicast ranges into specific
classes as follows:

 Class A (0.0.0.0/8 to 127.0.0.0/8) - Designed to support extremely large networks with


more than 16 million host addresses. Class A used a fixed /8 prefix with the first octet to
indicate the network address and the remaining three octets for host addresses (more than
16 million host addresses per network).
 Class B (128.0.0.0 /16 - 191.255.0.0 /16) - Designed to support the needs of moderate to
large size networks with up to approximately 65,000 host addresses. Class B used a
fixed /16 prefix with the two high-order octets to indicate the network address and the
remaining two octets for host addresses (more than 65,000 host addresses per network).
 Class C (192.0.0.0 /24 - 223.255.255.0 /24) - Designed to support small networks with a
maximum of 254 hosts. Class C used a fixed /24 prefix with the first three octets to indicate
the network and the remaining octet for the host addresses (only 254 host addresses per
network).

Note: There is also a Class D multicast block consisting of 224.0.0.0 to 239.0.0.0 and a Class E
experimental address block consisting of 240.0.0.0 - 255.0.0.0.

At the time, with a limited number of computers using the internet, classful addressing was an
effective means to allocate addresses. As shown in the figure, Class A and B networks have a
very large number of host addresses and Class C has very few. Class A networks accounted for
50% of the IPv4 networks. This caused most of the available IPv4 addresses to go unused.

In the mid-1990s, with the introduction of the World Wide Web (WWW), classful addressing was
deprecated to more efficiently allocate the limited IPv4 address space. Classful address allocation was
replaced with classless addressing, which is used today. Classless addressing ignores the rules of classes
(A, B, C). Public IPv4 network addresses (network addresses and subnet masks) are allocated based on
the number of addresses that can be justified.

9.2.6 Assignment of IP Addresses


Public IPv4 addresses are addresses which are globally routed over the internet. Public IPv4
addresses must be unique.

Both IPv4 and IPv6 addresses are managed by the Internet Assigned Numbers Authority (IANA).
The IANA manages and allocates blocks of IP addresses to the Regional Internet Registries
(RIRs). The five RIRs are shown in the figure.

RIRs are responsible for allocating IP addresses to ISPs who provide IPv4 address blocks to
organizations and smaller ISPs. Organizations can also get their addresses directly from an RIR
(subject to the policies of that RIR).

Regional Internet Registries

 AfriNIC (African Network Information Centre) - Africa Region


 APNIC (Asia Pacific Network Information Centre) - Asia/Pacific Region
 ARIN (American Registry for Internet Numbers) - North America Region
 LACNIC (Regional Latin-American and Caribbean IP Address Registry) - Latin America and
some Caribbean Islands
 RIPE NCC (Réseaux IP Européens Network Coordination Centre) - Europe, the Middle
East, and Central Asia
 9.2.7 Activity - Public or Private IPv4
Address
 Matching. Select from lists and then submit.
 Instructions:
 Click Public or Private below each address to choose the correct network type.
9.2.8 Check Your Understanding - Types of
IPv4 Addresses
Check your understanding of the types of IPv4 addresses by choosing the BEST answer to
the following questions.
Answers
https://itexamanswers.net/11-3-8-check-your-understanding-types-of-ipv4-addresses-
answers.html
9.3 Network Segmentation
9.3.1 Video - Network Segmentation
https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=5733b9f5-9c47-5fc4-9fea-ae2139f56d05

9.3.2 Broadcast Domains and Segmentation


Have you ever received an email that was addressed to every person at your work or school? This
was a broadcast email. Hopefully, it contained information that each of you needed to know. But
often a broadcast is not really pertinent to everyone in the mailing list. Sometimes, only a segment
of the population needs to read that information.

In an Ethernet LAN, devices use broadcasts and the Address Resolution Protocol (ARP) to locate
other devices. ARP sends Layer 2 broadcasts to a known IPv4 address on the local network to
discover the associated MAC address. Devices on Ethernet LANs also locate other devices using
services. A host typically acquires its IPv4 address configuration using the Dynamic Host
Configuration Protocol (DHCP) which sends broadcasts on the local network to locate a DHCP
server.
Switches propagate broadcasts out all interfaces except the interface on which it was received.
For example, if a switch in the figure were to receive a broadcast, it would forward it to the other
switches and other users connected in the network.

Routers Segment Broadcast Domains

Routers do not propagate broadcasts. When a router receives a broadcast, it does not forward it
out other interfaces. For instance, when R1 receives a broadcast on its Gigabit Ethernet 0/0
interface, it does not forward out another interface.

Therefore, each router interface connects to a broadcast domain and broadcasts are only
propagated within that specific broadcast domain.

9.3.3 Problems with Large Broadcast Domains


A large broadcast domain is a network that connects many hosts. A problem with a large
broadcast domain is that these hosts can generate excessive broadcasts and negatively affect the
network. In the figure, LAN 1 connects 400 users that could generate an excess amount of
broadcast traffic. This results in slow network operations due to the significant amount of traffic it
can cause, and slow device operations because a device must accept and process each
broadcast packet.

The solution is to reduce the size of the network to create smaller broadcast domains in a process
called subnetting. These smaller network spaces are called subnets.

In the figure, the 400 users in LAN 1 with network address 172.16.0.0 /16 have been divided into
two subnets of 200 users each: 172.16.0.0 /24 and 172.16.1.0 /24. Broadcasts are only
propagated within the smaller broadcast domains. Therefore, a broadcast in LAN 1 would not
propagate to LAN 2.

Communicating Between Networks


A Large Broadcast Domain

The solution is to reduce the size of the network to create smaller broadcast domains in a process
called subnetting. These smaller network spaces are called subnets.

In the figure, the 400 users in LAN 1 with network address 172.16.0.0 /16 have been divided into
two subnets of 200 users each: 172.16.0.0 /24 and 172.16.1.0 /24. Broadcasts are only
propagated within the smaller broadcast domains. Therefore, a broadcast in LAN 1 would not
propagate to LAN 2.

Communicating Between Networks

Notice how the prefix length has changed from a single /16 network to two /24 networks. This is
the basis of subnetting: using host bits to create additional subnets.

Note: The terms subnet and network are often used interchangeably. Most networks are a subnet
of some larger address block.
9.3.4 Reasons for Segmenting Networks
List of expandable sections. Select each button to expand the content.

Subnetting reduces overall network traffic and improves network performance. It also enables an
administrator to implement security policies such as which subnets are allowed or not allowed to
communicate together. Another reason is that it reduces the number of devices affected by
abnormal broadcast traffic due to misconfigurations, hardware/software problems, or malicious
intent.

There are various ways of using subnets to help manage network devices.

Click each image for an illustration of how network administrators can group devices and
services into subnets.
Network administrators can create subnets using any other division that makes sense for the
network. Notice in each figure, the subnets use longer prefix lengths to identify networks.

Understanding how to subnet networks is a fundamental skill that all network administrators must
develop. Various methods have been created to help understand this process. Although a little
overwhelming at first, pay close attention to the detail and, with practice, subnetting will become
easier.

9.3.5 Check Your Understanding - Network


Segmentation
Answers
https://itexamanswers.net/11-4-4-check-your-understanding-network-segmentation-answers.html
9.4 IPv4 and Network
Segmentation Summary
9.4.1 What Did I Learn in this Module?
IPv4 Unicast, Broadcast, and Multicast
Unicast transmission refers to one device sending a message to one other device in one-to-one
communications. A unicast packet has a destination IP address that is a unicast address which
goes to a single recipient. A source IP address can only be a unicast address because the packet
can only originate from a single source. This is regardless of whether the destination IP address is
a unicast, broadcast or multicast. IPv4 unicast host addresses are in the address range of 1.1.1.1
to 223.255.255.255.

Broadcast transmission refers to a device sending a message to all the devices on a network in
one-to-all communications. A broadcast packet has a destination IP address with all ones (1s) in
the host portion, or 32 one (1) bits. A broadcast packet must be processed by all devices in the
same broadcast domain. A broadcast may be directed or limited. A directed broadcast is sent to all
hosts on a specific network. A limited broadcast is sent to 255.255.255.255. By default, routers do
not forward broadcasts.

Multicast transmission reduces traffic by allowing a host to send a single packet to a selected set
of hosts that subscribe to a multicast group. A multicast packet is a packet with a destination IP
address that is a multicast address. IPv4 has reserved the 224.0.0.0 to 239.255.255.255
addresses as a multicast range. Each multicast group is represented by a single IPv4 multicast
destination address. When an IPv4 host subscribes to a multicast group, the host processes
packets addressed to this multicast address, and packets addressed to its uniquely allocated
unicast address.

Types of IPv4 Addresses


Public IPv4 addresses are addresses which are globally routed between ISP routers. However,
not all available IPv4 addresses can be used on the internet. There are blocks of addresses called
private addresses that are used by most organizations to assign IPv4 addresses to internal hosts.
Most internal networks, from large enterprises to home networks, use private IPv4 addresses for
addressing all internal devices (intranet) including hosts and routers. However, private addresses
are not globally routable. Before the ISP can forward this packet, it must translate the source IPv4
address, which is a private address, to a public IPv4 address using NAT.
Loopback addresses (127.0.0.0 /8 or 127.0.0.1 to 127.255.255.254) are more commonly identified
as only 127.0.0.1, these are special addresses used by a host to direct traffic to itself. Link-local
addresses (169.254.0.0 /16 or 169.254.0.1 to 169.254.255.254) are more commonly known as the
Automatic Private IP Addressing (APIPA) addresses or self-assigned addresses. They are used
by a Windows DHCP client to self-configure in the event that there are no DHCP servers available.

In 1981, IPv4 addresses were assigned using classful addressing as defined in RFC 790
(https://tools.ietf.org/html/rfc790), Assigned Numbers. Customers were allocated a network
address based on one of three classes, A, B, or C. The RFC divided the unicast ranges into
specific classes as follows:

 Class A (0.0.0.0/8 to 127.0.0.0/8) - Designed to support extremely large networks with


more than 16 million host addresses.
 Class B (128.0.0.0 /16 - 191.255.0.0 /16) - Designed to support the needs of moderate to
large size networks with up to approximately 65,000 host addresses.
 Class C (192.0.0.0 /24 - 223.255.255.0 /24) - Designed to support small networks with a
maximum of 254 hosts.

There is also a Class D multicast block consisting of 224.0.0.0 to 239.0.0.0 and a Class E
experimental address block consisting of 240.0.0.0 - 255.0.0.0.

Public IPv4 addresses are addresses which are globally routed over the internet. Public IPv4
addresses must be unique. Both IPv4 and IPv6 addresses are managed by the IANA. The IANA
manages and allocates blocks of IP addresses to the RIRs. RIRs are responsible for allocating IP
addresses to ISPs who provide IPv4 address blocks to organizations and smaller ISPs.
Organizations can also get their addresses directly from an RIR.

Network Segmentation
In an Ethernet LAN, devices use broadcasts and ARP to locate other devices. ARP sends Layer 2
broadcasts to a known IPv4 address on the local network to discover the associated MAC
address. Devices on Ethernet LANs also locate other devices using services. A host typically
acquires its IPv4 address configuration using DHCP which sends broadcasts on the local network
to locate a DHCP server. Switches propagate broadcasts out all interfaces except the interface on
which it was received.

A large broadcast domain is a network that connects many hosts. A problem with a large
broadcast domain is that these hosts can generate excessive broadcasts and negatively affect the
network. The solution is to reduce the size of the network to create smaller broadcast domains in a
process called subnetting. These smaller network spaces are called subnets. The basis of
subnetting is to use host bits to create additional subnets. Subnetting reduces overall network
traffic and improves network performance. It helps administrators to implement security policies
such as which subnets are allowed or not allowed to communicate together. It reduces the number
of devices affected by abnormal broadcast traffic due to misconfigurations, hardware/software
problems, or malicious intent.

9.4.2 Webster - Reflection Questions


I just sent invitations to a party to several of my friends and family. The invitations went to different
addresses, but the card inside is the same for everyone. This is like a multicast email isn’t it? I
didn’t know you could do that, and I also didn’t know you could send a broadcast email to every
person on your network! Can you think of a good reason to send a broadcast email to everyone in
your network? Can you think of a reason why you should be careful before you send a broadcast
email?

9.4.3 IPv4 and Network Segmentation Quiz


Answers
https://itexamanswers.net/9-4-3-ipv4-addressing-quiz-answers.html
Module 10: IPv6 Addressing
Formats and Rules
10.0 Introduction
10.0.1 Webster - Why Should I Take this
Module?
Kishori meets Rina for lunch again. Kishori is excited to tell Rina all that she has learned about IPv4
addresses. Rina congratulates her and asks her if she has heard about IPv6. IPv6? Kishori has no idea
what IPv6 is! Do you? Let me help you out with that. Let's get started with this module!

10.0.2 What Will I Learn in this Module?


Module Title: IPv6 Addressing Formats and Rules

Module Objective: Explain the features of IPv6 addressing.


10.1 IPv4 Issues
10.1.1 The Need for IPv6
You already know that IPv4 is running out of addresses. That is why you need to learn about IPv6.

IPv6 is designed to be the successor to IPv4. IPv6 has a larger 128-bit address space, providing
340 undecillion (i.e., 340 followed by 36 zeroes) possible addresses. However, IPv6 is more than
just larger addresses.

When the IETF began its development of a successor to IPv4, it used this opportunity to fix the
limitations of IPv4 and include enhancements. One example is Internet Control Message Protocol
version 6 (ICMPv6), which includes address resolution and address autoconfiguration not found in
ICMP for IPv4 (ICMPv4).

The depletion of IPv4 address space has been the motivating factor for moving to IPv6. As Africa,
Asia and other areas of the world become more connected to the internet, there are not enough
IPv4 addresses to accommodate this growth. As shown in the figure, four out of the five RIRs have
run out of IPv4 addresses.

RIR IPv4 Exhaustion Dates

IPv4 has a theoretical maximum of 4.3 billion addresses. Private addresses in combination with
Network Address Translation (NAT) have been instrumental in slowing the depletion of IPv4
address space. However, NAT is problematic for many applications, creates latency, and has
limitations that severely impede peer-to-peer communications.

With the ever-increasing number of mobile devices, mobile providers have been leading the way
with the transition to IPv6. The top two mobile providers in the United States report that over 90%
of their traffic is over IPv6.

Most top ISPs and content providers such as YouTube, Facebook, and NetFlix, have also made
the transition. Many companies like Microsoft, Facebook, and LinkedIn are transitioning to IPv6-
only internally. In 2018, broadband ISP Comcast reported a deployment of over 65% and British
Sky Broadcasting over 86%.
Internet of Things

The internet of today is significantly different than the internet of past decades. The internet of
today is more than email, web pages, and file transfers between computers. The evolving internet
is becoming an Internet of Things (IoT). No longer will the only devices accessing the internet be
computers, tablets, and smartphones. The sensor-equipped, internet-ready devices of tomorrow
will include everything from automobiles and biomedical devices, to household appliances and
natural ecosystems.

With an increasing internet population, a limited IPv4 address space, issues with NAT and the IoT,
the time has come to begin the transition to IPv6.

10.1.2 IPv4 and IPv6 Coexistence


List of expandable sections. Select each button to expand the content.

There is no specific date to move to IPv6. Both IPv4 and IPv6 will coexist in the near future and
the transition will take several years. The IETF has created various protocols and tools to help
network administrators migrate their networks to IPv6. The migration techniques can be divided
into three categories:

Click each button for more information.

Dual stack
Dual stack allows IPv4 and IPv6 to coexist on the same network segment. Dual stack devices run
both IPv4 and IPv6 protocol stacks simultaneously. Known as native IPv6, this means the
customer network has an IPv6 connection to their ISP and is able to access content found on the
internet over IPv6.

Tunneling
Tunneling is a method of transporting an IPv6 packet over an IPv4 network. The IPv6 packet is
encapsulated inside an IPv4 packet, similar to other types of data.
Note: Tunneling and translation are for transitioning to native IPv6 and should only be used where needed.
The goal should be native IPv6 communications from source to destination.

Translation
Network Address Translation 64 (NAT64) allows IPv6-enabled devices to communicate with IPv4-
enabled devices using a translation technique similar to NAT for IPv4. An IPv6 packet is translated
to an IPv4 packet and an IPv4 packet is translated to an IPv6 packet.

10.1.3 Check Your Understanding - IPv4


Issues
Asnwers
https://itexamanswers.net/12-1-3-check-your-understanding-ipv4-issues-answers.html
10.2 IPv6 Addressing
10.2.1 Hexadecimal Number System
Before you dive into IPv6 addressing, it's important that you know that IPv6 addresses are
represented using hexadecimal numbers. This base sixteen number system uses the digits 0 to 9
and the letters A to F:

0123456789ABCDEF

In IPv6 addresses, these 16 digits are represented as hextets (discussed next) allowing us to
represent these massive addresses in a much more readable format.

10.2.2 IPv6 Addressing Formats


The first step to learning about IPv6 in networks is to understand the way an IPv6 address is
written and formatted. IPv6 addresses are much larger than IPv4 addresses, which is why we are
unlikely to run out of them.

IPv6 addresses are 128 bits in length and written as a string of hexadecimal values. Every four
bits is represented by a single hexadecimal digit; for a total of 32 hexadecimal values, as shown in
the figure. IPv6 addresses are not case-sensitive and can be written in either lowercase or
uppercase.
16-bit Segments or Hextets

Preferred Format

The previous figure also shows that the preferred format for writing an IPv6 address is
x:x:x:x:x:x:x:x, with each “x” consisting of four hexadecimal values. The term octet refers to the
eight bits of an IPv4 address. In IPv6, a hextet is the unofficial term used to refer to a segment of
16 bits, or four hexadecimal values. Each “x” is a single hextet which is 16 bits or four hexadecimal
digits.

Preferred format means that you write IPv6 address using all 32 hexadecimal digits. It does not
necessarily mean that it is the ideal method for representing the IPv6 address. In this module, you
will see two rules that help to reduce the number of digits needed to represent an IPv6 address.

These are examples of IPv6 addresses in the preferred format.

10.2.3 Video - IPv6 Formatting Rules


This is a media player component. Select the play / pause button to watch or listen.

Press the Play button to watch the video.

https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=73a41b65-b5a6-53b1-aa1f-21906bb82989
10.2.4 Rule 1 – Omit Leading Zeros
The first rule to help reduce the notation of IPv6 addresses is to omit any leading 0s (zeros) in any
hextet. Here are four examples of ways to omit leading zeros:

 01ab can be represented as 1ab


 09f0 can be represented as 9f0
 0a00 can be represented as a00
 00ab can be represented as ab

This rule only applies to leading 0s, NOT to trailing 0s, otherwise the address would be
ambiguous. For example, the hextet “abc” could be either “0abc” or “abc0”, but these do not
represent the same value.

10.2.5 Rule 2- Double Colon


The second rule to help reduce the notation of IPv6 addresses is that a double colon (::) can
replace any single, contiguous string of one or more 16-bit hextets consisting of all zeros. For
example, 2001:db8:cafe:1:0:0:0:1 (leading 0s omitted) could be represented as
2001:db8:cafe:1::1. The double colon (::) is used in place of the three all-0 hextets (0:0:0).

The double colon (::) can only be used once within an address, otherwise there would be more
than one possible resulting address. When used with the omitting leading 0s technique, the
notation of IPv6 address can often be greatly reduced. This is commonly known as the
compressed format.

Here is an example of the incorrect use of the double colon: 2001:db8::abcd::1234.


The double colon is used twice in the example above. Here are the possible expansions of this
incorrect compressed format address:

 2001:db8::abcd:0000:0000:1234
 2001:db8::abcd:0000:0000:0000:1234
 2001:db8:0000:abcd::1234
 2001:db8:0000:0000:abcd::1234

If an address has more than one contiguous string of all-0 hextets, best practice is to use the
double colon (::) on the longest string. If the strings are equal, the first string should use the double
colon (::).

10.2.6 Activity - IPv6 Address Representations


Instructions:

Convert the IPv6 addresses into short (omit the leading zeroes) and compressed forms. Enter
letters in lowercase. Click Next to advance the activity to the next address.

10.3 IPv6 Addressing Formats and


Rules Summary
10.3.1 What Did I Learn in this Module?
IPv4 Issues
The depletion of IPv4 address space has been the motivating factor for moving to IPv6. IPv6 has a
larger 128-bit address space, providing 340 undecillion possible addresses. When the IETF began
its development of a successor to IPv4, it used this opportunity to fix the limitations of IPv4 and
include enhancements. One example is ICMPv6, which includes address resolution and address
autoconfiguration not found in ICMPv4.

Both IPv4 and IPv6 coexist and the transition to only IPv6 will take several years. The IETF has
created various protocols and tools to help network administrators migrate their networks to IPv6.
The migration techniques can be divided into three categories: Dual Stack, Tunneling, and
Translation. Dual stack devices run both IPv4 and IPv6 protocol stacks simultaneously. Tunneling
is a method of transporting an IPv6 packet over an IPv4 network. The IPv6 packet is encapsulated
inside an IPv4 packet, similar to other types of data. NAT64 allows IPv6-enabled devices to
communicate with IPv4-enabled devices using a translation technique similar to NAT for IPv4. An
IPv6 packet is translated to an IPv4 packet and an IPv4 packet is translated to an IPv6 packet.

IPv6 Addressing
IPv6 addresses are 128 bits in length and written as a string of hexadecimal values. Every four
bits is represented by a single hexadecimal digit; for a total of 32 hexadecimal values. IPv6
addresses are not case-sensitive and can be written in either lowercase or uppercase. In IPv6, a
hextet that refers to a segment of 16 bits, or four hexadecimal values. Each “x” is a single hextet,
which is 16 bits or four hexadecimal digits. Preferred format means that you write IPv6 address
using all 32 hexadecimal digits. Here is one example - fe80:0000:0000:0000:0123:4567:89ab:cdef.

There are two rules that help to reduce the number of digits needed to represent an IPv6 address.

Rule 1 – Omit Leading Zeros. You can only omit leading zeros, not trailing zeros.

 01ab can be represented as 1ab


 09f0 can be represented as 9f0
 0a00 can be represented as a00
 00ab can be represented as ab

Rule 2 – Double Colon. A double colon (::) can replace any single, contiguous string of one or
more 16-bit hextets consisting of all zeros. For example, 2001:db8:cafe:1:0:0:0:1 (leading 0s
omitted) could be represented as 2001:db8:cafe:1::1. The double colon (::) is used in place of the
three all-0 hextets (0:0:0). The double colon (::) can only be used once within an address,
otherwise there would be more than one possible resulting address. If an address has more than
one contiguous string of all-0 hextets, best practice is to use the double colon (::) on the longest
string. If the strings are equal, the first string should use the double colon (::).

10.3.2 Webster - Reflection Questions


Just when I was starting to get the hang of IPv4 addresses, I learned about IPv6 addresses! But since it
looks like most networks use both types of addresses, I’m glad that I know a bit about each type. I guess
it’s like cars on the road. Some are old but they still run. Newer cars have many more features and options
than the older cars. And both older and newer cars are all driving on the same road. What is one obvious
advantage to using IPv6 addresses instead of using IPv4 addresses?

10.3.3 IPv6 Addressing Formats and Rules


Quiz
https://itexamanswers.net/question/what-are-two-methods-that-can-be-used-to-shorten-the-ipv6-
address-notation-choose-two
https://itexamanswers.net/question/a-pc-is-configured-with-both-an-ipv4-and-ipv6-address-on-the-
same-network-adapter-what-ipv4-and-ipv6-coexistence-strategy-is-implemented-on-the-pc
https://itexamanswers.net/question/what-is-an-advantage-of-using-ipv6
https://itexamanswers.net/10-3-3-ipv6-addressing-quiz-answers.html
Module 11: Dynamic Addressing
with DHCP
11.0 Introduction
11.0.1 Webster - Why Should I Take this
Module?
Kishori’s nursing station just received a new laptop from the IT department. The IT specialist,
Madhav, is setting it up on the desk and trying to connect to the network. He asks Kishori to log in
to the computer. She enters her username and password and attempts to access a patient file.
She explains that there must be a connection error. Madhav takes a seat to further investigate.
Madhav checks the cable and it is connected. On his tablet, he pulls up the list of IPv4 addresses
for all of the computers on this floor on this network. He found the issue! There is an error in the
IPv4 address. Madhav explains that the intern in their department may have manually configured
the network information on this host, rather than using Dynamic Host Configuration Protocol
(DHCP). Kishori has not heard about DHCP. She is going to do some reading on this topic.

Are you ready to learn about DHCP? I am here to help! Let's get started with this module!

11.0.2 What Will I Learn in this Module?


Module Title: Dynamic Addressing with DHCP

Module Objective: Configure a DHCP server


11.1 Static and Dynamic
Addressing
11.1.1 Static IPv4 Address Assignment
IPv4 addresses can be assigned either statically or dynamically.

With a static assignment, the network administrator must manually configure the network
information for a host. At a minimum, this includes the following:

 IP address - This identifies the host on the network.


 Subnet mask - This is used to identify the network on which the host is connected.
 Default gateway - This identifies the networking device that the host uses to access the
internet or another remote network.

Static addresses have some advantages. For instance, they are useful for printers, servers, and
other networking devices that need to be accessible to clients on the network. If hosts normally
access a server at a particular IPv4 address, it would not be good if that address changed.

Static assignment of addressing information can provide increased control of network resources,
but it can be time consuming to enter the information on each host. When IPv4 addresses are
entered statically, the host only performs basic error checks on the IPv4 address. Therefore, errors
are more likely to occur.

When using static IPv4 addressing, it is important to maintain an accurate list of which IPv4
addresses are assigned to which devices. Additionally, these are permanent addresses and are
not normally reused.
IPv4 addresses can be assigned either statically or dynamically.

With a static assignment, the network administrator must manually configure the network information for a host. At a
minimum, this includes the following:

 IP address - This identifies the host on the network.


 Subnet mask - This is used to identify the network on which the host is connected.
 Default gateway - This identifies the networking device that the host uses to access the internet or another
remote network.

Static addresses have some advantages. For instance, they are useful for printers, servers, and other networking
devices that need to be accessible to clients on the network. If hosts normally access a server at a particular IPv4
address, it would not be good if that address changed.

Static assignment of addressing information can provide increased control of network resources, but it can be time
consuming to enter the information on each host. When IPv4 addresses are entered statically, the host only performs
basic error checks on the IPv4 address. Therefore, errors are more likely to occur.

When using static IPv4 addressing, it is important to maintain an accurate list of which IPv4 addresses are assigned to
which devices. Additionally, these are permanent addresses and are not normally reused.

11.1.2 Dynamic IPv4 Address Assignment


On local networks it is often the case that the user population changes frequently. New users
arrive with laptops and need a connection. Others have new workstations that need to be
connected. Rather than have the network administrator assign IPv4 addresses for each
workstation, it is easier to have IPv4 addresses assigned automatically. This is done using a
protocol known as Dynamic Host Configuration Protocol (DHCP).

DHCP automatically assigns addressing information such as IPv4 address, subnet mask, default
gateway, and other configuration information, as shown in the figure.

DHCP is generally the preferred method of assigning IPv4 addresses to hosts on large networks
because it reduces the burden on network support staff and virtually eliminates entry errors.

Another benefit of DHCP is that an address is not permanently assigned to a host but is only
leased for a period of time. If the host is powered down or taken off the network, the address is
returned to the pool for reuse. This is especially helpful with mobile users that come and go on a
network.

On local networks it is often the case that the user population changes frequently. New users arrive with laptops and
need a connection. Others have new workstations that need to be connected. Rather than have the network
administrator assign IPv4 addresses for each workstation, it is easier to have IPv4 addresses assigned automatically.
This is done using a protocol known as Dynamic Host Configuration Protocol (DHCP).

DHCP automatically assigns addressing information such as IPv4 address, subnet mask, default gateway, and other
configuration information, as shown in the figure.

DHCP is generally the preferred method of assigning IPv4 addresses to hosts on large networks because it reduces
the burden on network support staff and virtually eliminates entry errors.

Another benefit of DHCP is that an address is not permanently assigned to a host but is only leased for a period of
time. If the host is powered down or taken off the network, the address is returned to the pool for reuse. This is
especially helpful with mobile users that come and go on a network.

11.1.3 DHCP Servers


If you enter an airport or coffee shop with a wireless hotspot, DHCP makes it possible for you to
access the internet. As you enter the area, your laptop DHCP client contacts the local DHCP
server via a wireless connection. The DHCP server assigns an IPv4 address to your laptop.

Various types of devices can be DHCP servers as long as they are running DHCP service
software. With most medium to large networks, the DHCP server is usually a local dedicated PC-
based server.

With home networks, the DHCP server may be located at the ISP and a host on the home network
receives its IPv4 configuration directly from the ISP, as shown in the figure.
If you enter an airport or coffee shop with a wireless hotspot, DHCP makes it possible for you to access the internet.
As you enter the area, your laptop DHCP client contacts the local DHCP server via a wireless connection. The DHCP
server assigns an IPv4 address to your laptop.

Various types of devices can be DHCP servers as long as they are running DHCP service software. With most
medium to large networks, the DHCP server is usually a local dedicated PC-based server.

With home networks, the DHCP server may be located at the ISP and a host on the home network receives its IPv4
configuration directly from the ISP, as shown in the figure.

Many home networks and small businesses use a wireless router and modem. In this case, the
wireless router is both a DHCP client and a server. The wireless router acts as a client to receive
its IPv4 configuration from the ISP and then acts as a DHCP server for internal hosts on the local
network. The router receives the public IPv4 address from the ISP, and in its role as a DHCP
server, it distributes private addresses to internal hosts.

In addition to PC-based servers and wireless routers, other types of networking devices such as
dedicated routers can provide DHCP services to clients, although this is not as common.

11.1.4 Check Your Understanding - Static


and Dynamic Addressing
11.2 DHCPv4 Configuration
11.2.1 Video - DHCPv4 Operation
https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=b615bcd6-054c-5712-9acd-e49868b6ad38

11.2.2 Video - DHCP Service Configuration


11.2.3 Packet Tracer - Configure DHCP on a
Wireless Router
In this activity, you will complete the following objectives:

 Connect 3 PCs to a wireless router.


 Change the DHCP setting to a specific network range.
 Configure the clients to obtain their address via DHCP.
11.3.1 What Did I Learn in this Module?
Static and Dynamic Addressing
With a static assignment, the network administrator must manually configure the network
information for a host. At a minimum, this includes the host IPv4 address, subnet mask, and
default gateway. Static assignment of addressing information can provide increased control of
network resources, but it can be time consuming to enter the information on each host. When
using static IPv4 addressing, it is important to maintain an accurate list of which IPv4 addresses
are assigned to which devices.

IPv4 addresses can be assigned automatically using a protocol known as DHCP. DHCP is
generally the preferred method of assigning IPv4 addresses to hosts on large networks because it
reduces the burden on network support staff and virtually eliminates entry errors. Another benefit
of DHCP is that an address is not permanently assigned to a host but is only leased for a period of
time. If the host is powered down or taken off the network, the address is returned to the pool for
reuse.

As you enter area with a wireless hotspot, your laptop DHCP client contacts the local DHCP
server via a wireless connection. The DHCP server assigns an IPv4 address to your laptop. With
home networks, the DHCP server may be located at the ISP and a host on the home network
receives its IPv4 configuration directly from the ISP. Many home networks and small businesses
use a wireless router and modem. In this case, the wireless router is both a DHCP client and a
server.

DHCPv4 Configuration
The DHCP server is configured with a range, or pool, of IPv4 addresses that can be assigned to
DHCP clients. A client that needs an IPv4 address will send a DHCP Discover message which is a
broadcast with a destination IPv4 address of 255.255.255.255 (32 ones) and a destination MAC
address of FF-FF-FF-FF-FF-FF (48 ones). All hosts on the network will receive this broadcast
DHCP frame, but only a DHCP server will reply. The server will respond with a DHCP Offer,
suggesting an IPv4 address for the client. The host then sends a DHCP Request asking to use the
suggested IPv4 address. The server responds with a DHCP Acknowledgment.

For most home and small business networks, a wireless router provides DHCP services to the
local network clients. To configure a home wireless router, access its graphical web interface by
opening the browser and entering the router default IPv4 address. The IPv4 address of
192.168.0.1 and subnet mask of 255.255.255.0 are the defaults for the internal router interface.
This is the default gateway for all hosts on the local network and also the internal DHCP server
IPv4 address. Most home wireless routers have DHCP Server enabled by default.

11.3.2 Webster - Reflection Questions


Have you manually entered an IPv4 address for all the devices on your home network? These are called
static addresses. I did this for my home network, and I made a mistake when entering the address for my
tablet. I had to redo it. Can you imagine having to do this for a huge corporate network with hundreds, or
even thousands of devices? What other advantages are there to using DHCP for device addressing?

11.3.3 Dynamic Addressing with DHCP Quiz


Question 1
Match each description with an appropriate IP address.
Checkpoint Exam: The Internet
Protocol
Welcome to The Internet Protocol Checkpoint Exam.

There are 20 questions in total.

Items on this exam support the following networking skills:

 Explain how IP addresses enable network communication.

You must achieve 70% to pass this exam. You have unlimited attempts to pass the exam.
Feedback is provided to direct you to areas that may require additional attention.

Cisco Networking Academy content is copyrighted and the unauthorized posting, distribution or
sharing of this exam content is prohibited.

© 2023, Cisco Systems, Inc.


12.0 Introduction
Module 12: Gateways to Other
Networks
12.0.1 Webster - Why Should I Take this
Module?
Kishori receives an email from Rina asking if they can meet in the cafeteria for lunch. Kishori
meets Rina and is eager to ask her a few more networking questions. Rina is always happy to
share her knowledge. When Kishori was speaking with Madhav, she learned that her department
is part of a LAN. Each department within the hospital has its own LAN. Kishori asks Rina how she
is able to send and receive emails that are outside of her network. Rina explains that gateways
and Network Address Translation (NAT) make all of this seamless communication possible. Rina
is impressed with Kishori’s new knowledge and interest in networking! She mentions that there are
several nurses in the hospital that have this knowledge and are paid more because they are able
to troubleshoot the devices in the patient’s room. She recommends that Kishori take some courses
so that she could eventually apply for this promotion. Wow! Who knew that nurses could get
promoted by learning technology!

This module will help Kishori understand gateways and NAT. Are you ready to learn more? Let's
go!

12.0.2 What Will I Learn in this Module?


Module Title: Gateways to Other Networks

Module Objective: Explain how routers connect networks together.

12.1 Network Boundaries


12.1.1 Video - Gateways to Other Networks
12.1.2 Routers as Gateways
The router provides a gateway through which hosts on one network can communicate with hosts
on different networks. Each interface on a router is connected to a separate network.

The IPv4 address assigned to the interface identifies which local network is connected directly to
it.

Every host on a network must use the router as a gateway to other networks. Therefore, each host
must know the IPv4 address of the router interface connected to the network where the host is
attached. This address is known as the default gateway address. It can be either statically
configured on the host or received dynamically by DHCP.

When a wireless router is configured to be a DHCP server for the local network, it automatically
sends the correct interface IPv4 address to the hosts as the default gateway address. In this
manner, all hosts on the network can use that IPv4 address to forward messages to hosts located
at the ISP and get access to hosts on the internet. Wireless routers are usually set to be DHCP
servers by default.

The IPv4 address of that local router interface becomes the default gateway address for the host
configuration. The default gateway is provided, either statically or by DHCP.

When a wireless router is configured as a DHCP server, it provides its own internal IPv4 address
as the default gateway to DHCP clients. It also provides them with their respective IPv4 address
and subnet mask, as shown in the figure.

The router provides a gateway through which hosts on one network can communicate with hosts on different
networks. Each interface on a router is connected to a separate network.

The IPv4 address assigned to the interface identifies which local network is connected directly to it.

Every host on a network must use the router as a gateway to other networks. Therefore, each host must know the
IPv4 address of the router interface connected to the network where the host is attached. This address is known as
the default gateway address. It can be either statically configured on the host or received dynamically by DHCP.

When a wireless router is configured to be a DHCP server for the local network, it automatically sends the correct
interface IPv4 address to the hosts as the default gateway address. In this manner, all hosts on the network can use
that IPv4 address to forward messages to hosts located at the ISP and get access to hosts on the internet. Wireless
routers are usually set to be DHCP servers by default.

The IPv4 address of that local router interface becomes the default gateway address for the host configuration. The
default gateway is provided, either statically or by DHCP.

When a wireless router is configured as a DHCP server, it provides its own internal IPv4 address as the default
gateway to DHCP clients. It also provides them with their respective IPv4 address and subnet mask, as shown in the
figure.

12.1.3 Routers as Boundaries Between


Networks
The wireless router acts as a DHCP server for all local hosts attached to it, either by Ethernet
cable or wirelessly. These local hosts are referred to as being located on an internal, or inside,
network. Most DHCP servers are configured to assign private addresses to the hosts on the
internal network, rather than internet routable public addresses. This ensures that, by default, the
internal network is not directly accessible from the internet.

The default IPv4 address configured on the local wireless router interface is usually the first host
address on that network. Internal hosts must be assigned addresses within the same network as
the wireless router, either statically configured, or through DHCP. When configured as a DHCP
server, the wireless router provides addresses in this range. It also provides the subnet mask
information and its own interface IPv4 address as the default gateway, as shown in the figure.

Many ISPs also use DHCP servers to provide IPv4 addresses to the internet side of the wireless
router installed at their customer sites. The network assigned to the internet side of the wireless
router is referred to as the external, or outside, network.

When a wireless router is connected to the ISP, it acts like a DHCP client to receive the correct
external network IPv4 address for the internet interface. ISPs usually provide an internet-routable
address, which enables hosts connected to the wireless router to have access to the internet.

The wireless router serves as the boundary between the local internal network and the external
internet.

The wireless router acts as a DHCP server for all local hosts attached to it, either by Ethernet cable or wirelessly.
These local hosts are referred to as being located on an internal, or inside, network. Most DHCP servers are
configured to assign private addresses to the hosts on the internal network, rather than internet routable public
addresses. This ensures that, by default, the internal network is not directly accessible from the internet.

The default IPv4 address configured on the local wireless router interface is usually the first host address on that
network. Internal hosts must be assigned addresses within the same network as the wireless router, either statically
configured, or through DHCP. When configured as a DHCP server, the wireless router provides addresses in this
range. It also provides the subnet mask information and its own interface IPv4 address as the default gateway, as
shown in the figure.

Many ISPs also use DHCP servers to provide IPv4 addresses to the internet side of the wireless router installed at
their customer sites. The network assigned to the internet side of the wireless router is referred to as the external, or
outside, network.

When a wireless router is connected to the ISP, it acts like a DHCP client to receive the correct external network IPv4
address for the internet interface. ISPs usually provide an internet-routable address, which enables hosts connected
to the wireless router to have access to the internet.

The wireless router serves as the boundary between the local internal network and the external internet.
12.1.4 Check Your Understanding - Network
Boundaries

12.2 Network Address Translation


12.2.1 Video - Introduction to NAT
https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=b5851fda-6368-5bf3-a7d2-8679f284b97c

12.2.2 Packet Tracer - Examine NAT on a


Wireless Router
In this activity, you will complete the following objectives:

 Examine NAT configuration on a wireless router.


 Set up 4 PCs to connect to a wireless router using DHCP.
 Examine traffic that crosses the network using NAT.

12.3 Gateways to Other Networks


Summary
12.3.1 What Did I Learn in this Module?
Network Boundaries
Every host on a network must use the router as a gateway to other networks. Therefore, each host
must know the IPv4 address of the router interface connected to the network where the host is
attached. This address is known as the default gateway address. It can be either statically
configured on the host or received dynamically by DHCP.

The wireless router acts as a DHCP server for all local hosts attached to it, either by Ethernet
cable or wirelessly. These local hosts are referred to as being located on an internal, or inside,
network. When a wireless router is connected to the ISP, it acts like a DHCP client to receive the
correct external network IPv4 address for the internet interface. ISPs usually provide an internet-
routable address, which enables hosts connected to the wireless router to have access to the
internet. The wireless router serves as the boundary between the local internal network and the
external internet.

NAT Operation
The wireless router receives a public address from the ISP, which allows it to send and receive
packets on the internet. It, in turn, provides private addresses to local network clients.

The process used to convert private addresses to internet-routable addresses is called NAT. With
NAT, a private (local) source IPv4 address is translated to a public (global) address. The process
is reversed for incoming packets. The wireless router is able to translate many internal IPv4
addresses to the same public address, by using NAT.

Only packets destined for other networks need to be translated. These packets must pass through
the gateway, where the wireless router replaces the private IPv4 address of the source host with
its own public IPv4 address.

12.3.2 Webster - Reflection Questions


It turns out that the IPv4 addresses on the devices in my home network are private addresses that
are only used in my LAN. But if I need to venture out beyond my home network, perhaps to go to
the internet, or send an email to someone outside of my network, my device needs to be assigned
a public address. How does your router know if you are trying to get access to a device or a
website that is outside of your LAN? How do you know that your private address has been
translated into a public address?

12.3.3 Gateways to Other Networks Quiz


Module 13: Gateways to Other
Netwroks
13.0 Introduction
13.0.1 Webster - Why Should I Take this Module
Kishori was looking at her phone and noticed that her phone actually has its own IP address. She
went home and noticed that the IP address had changed to a value that is different from the
address that she had at the hospital. She remembered that DHCP provides addresses to devices
automatically, so she thinks that she gets IP addresses from different places depending on where
she is. This makes sense to her because she knows these addresses permit devices to join
different networks. Kishori also notices that her phone has a MAC address. She has checked and
she notices that the MAC address is always the same, no matter which network she is attached to.
It makes sense to Kishori, that her IP address changes when she is connected to different
networks in different locations, but her MAC address is always the same, because her phone is
her phone no matter where she is.

This means that both IP and MAC addresses must be required in order for the phone to receive
data. The IP address tells the sender of data where she is, and once the data gets to her location,
the MAC address of her phone permits the device to receive data that is meant just for her.
Thinking further, Kishori wonders how MAC addresses can be known to the network. DHCP
provides the correct IP addresses for the network, but each device has its own, unique MAC
address.

Kishori is ready to learn more! Are you? Keep reading!

13.0.2 What Will I Learn in this Module?


Module Title: The ARP Process

Module Objective: Explain how ARP enables communication on a network.

13.1 MAC and IP


13.1.1 Destination on Same Network
Sometimes a host must send a message, but it only knows the IP address of the destination
device. The host needs to know the MAC address of that device, but how can it be discovered?
That is where address resolution becomes critical.

There are two primary addresses assigned to a device on an Ethernet LAN:

 Physical address (the MAC address) – Used for NIC-to-NIC communications on the
same Ethernet network.
 Logical address (the IP address) – Used to send the packet from the source device to the
destination device. The destination IP address may be on the same IP network as the
source, or it may be on a remote network.

Layer 2 physical addresses (i.e., Ethernet MAC addresses) are used to deliver the data link frame
with the encapsulated IP packet from one NIC to another NIC that is on the same network. If the
destination IP address is on the same network, the destination MAC address will be that of the
destination device.

Consider the following example using simplified MAC address representations.

Sometimes a host must send a message, but it only knows the IP address of the destination
device. The host needs to know the MAC address of that device, but how can it be discovered?
That is where address resolution becomes critical.

There are two primary addresses assigned to a device on an Ethernet LAN:

 Physical address (the MAC address) – Used for NIC-to-NIC communications on the
same Ethernet network.
 Logical address (the IP address) – Used to send the packet from the source device to the
destination device. The destination IP address may be on the same IP network as the
source, or it may be on a remote network.
Layer 2 physical addresses (i.e., Ethernet MAC addresses) are used to deliver the data link frame
with the encapsulated IP packet from one NIC to another NIC that is on the same network. If the
destination IP address is on the same network, the destination MAC address will be that of the
destination device.

Consider the following example using simplified MAC address representations.

Sometimes a host must send a message, but it only knows the IP address of the destination device. The host needs
to know the MAC address of that device, but how can it be discovered? That is where address resolution becomes
critical.

There are two primary addresses assigned to a device on an Ethernet LAN:

 Physical address (the MAC address) – Used for NIC-to-NIC communications on the same Ethernet
network.
 Logical address (the IP address) – Used to send the packet from the source device to the destination
device. The destination IP address may be on the same IP network as the source, or it may be on a remote
network.

Layer 2 physical addresses (i.e., Ethernet MAC addresses) are used to deliver the data link frame with the
encapsulated IP packet from one NIC to another NIC that is on the same network. If the destination IP address is on
the same network, the destination MAC address will be that of the destination device.

Consider the following example using simplified MAC address representations.

In this example, PC1 wants to send a packet to PC2. The figure displays the Layer 2 destination
and source MAC addresses and the Layer 3 IPv4 addressing that would be included in the packet
sent from PC1.

The Layer 2 Ethernet frame contains the following:

 Destination MAC address – This is the simplified MAC address of PC2, 55-55-55.
 Source MAC address – This is the simplified MAC address of the Ethernet NIC on PC1,
aa-aa-aa.

The Layer 3 IP packet contains the following:

 Source IPv4 address – This is the IPv4 address of PC1, 192.168.10.10.


 Destination IPv4 address – This is the IPv4 address of PC2, 192.168.10.11.

13.1.2 Destination on Remote Network


 When the destination IP address (IPv4 or IPv6) is on a remote network, the destination
MAC address will be the address of the host default gateway (i.e., the router interface).
 Consider the following example using a simplified MAC address representation.
When the destination IP address (IPv4 or IPv6) is on a remote network, the destination MAC address will be the
address of the host default gateway (i.e., the router interface).

Consider the following example using a simplified MAC address representation.

In this example, PC1 wants to send a packet to PC2. PC2 is located on remote network. Because
the destination IPv4 address is not on the same local network as PC1, the destination MAC
address is that of the local default gateway on the router.

Routers examine the destination IPv4 address to determine the best path to forward the IPv4
packet. When the router receives the Ethernet frame, it de-encapsulates the Layer 2 information.
Using the destination IPv4 address, it determines the next-hop device, and then encapsulates the
IPv4 packet in a new data link frame for the outgoing interface.

In our example, R1 would now encapsulate the packet with new Layer 2 address information, as
shown in the figure.

In this example, PC1 wants to send a packet to PC2. PC2 is located on remote network. Because the destination IPv4
address is not on the same local network as PC1, the destination MAC address is that of the local default gateway on
the router.

Routers examine the destination IPv4 address to determine the best path to forward the IPv4 packet. When the router
receives the Ethernet frame, it de-encapsulates the Layer 2 information. Using the destination IPv4 address, it
determines the next-hop device, and then encapsulates the IPv4 packet in a new data link frame for the outgoing
interface.

In our example, R1 would now encapsulate the packet with new Layer 2 address information, as shown in the figure.
The new destination MAC address would be that of the R2 G0/0/1 interface and the new source
MAC address would be that of the R1 G0/0/1 interface.

Along each link in a path, an IP packet is encapsulated in a frame. The frame is specific to the
data link technology that is associated with that link, such as Ethernet. If the next-hop device is the
final destination, the destination MAC address will be that of the device Ethernet NIC, as shown in
the figure.

The new destination MAC address would be that of the R2 G0/0/1 interface and the new source MAC address would
be that of the R1 G0/0/1 interface.

Along each link in a path, an IP packet is encapsulated in a frame. The frame is specific to the data link technology
that is associated with that link, such as Ethernet. If the next-hop device is the final destination, the destination MAC
address will be that of the device Ethernet NIC, as shown in the figure.

How are the IP addresses of the IP packets in a data flow associated with the MAC addresses on each link
along the path to the destination? For IPv4 packets, this is done through a process called Address
Resolution Protocol (ARP). For IPv6 packets, the process is ICMPv6 Neighbor Discovery (ND).

13.1.3 Packet Tracer - Identify MAC and IP


Addresses
In this Packet Tracer activity, you will complete the following objectives:

 Gather PDU Information for Local Network Communication


 Gather PDU Information for Remote Network Communication

This activity is optimized for viewing PDUs. The devices are already configured. You will gather
PDU information in simulation mode and answer a series of questions about the data you collect.

Identify MAC and IP Addresses


Packet Tracer - Identify MAC and IP Addresses
Objectives
Part 1: Gather PDU Information for a Local Network Communication
Part 2: Gather PDU Information for a Remote Network Communication
Background
If you are interested in a career in network administration or network security, it is important to understand normal
network communication processes. In this Packet Tracer activity, you will inspect Ethernet frames and IP packets
at different points in the network as they travel from source to destination. You will focus on the way that the MAC
and IP addresses change depending on the destination (local or remote) and the place where the PDUs are
captured.
Packet Tracer has a simulation mode which will enable you to investigate details about how PDUs travel on
networks. It enables you to check the Layer 2 MAC addressing and Layer 3 IPv4 addressing of the PDUs at
different locations in the network as the PDUs flow from source to destination.
This activity is optimized for viewing PDUs as they travel on local and remote networks. You will gather PDU
information in PT simulation mode and answer a series of questions about the data you collect. No device
configuration is required.

Instructions

Part 1: Gather PDU Information for a Local Network Communication


In this part, you will study how a device on a local network does not need a default gateway to communicate with
another device on the same local network.
Note: Review the Reflection Questions in Part 3 before proceeding with this part. It will give you an idea of the
type of information you will need to gather.
a. Click host 172.16.31.3 and open the Command Prompt.
b. Enter the ping 172.16.31.2 command. This command will issue a series of ICMP echo request packets to the
destination. If the packets reach the destination, it will send echo-reply messages pack to the source of the
ping requests.
c. Click the Simulation mode button to switch to simulation mode. Repeat the ping 172.16.31.2 command. An
envelope icon that represents a PDU appears next to 172.16.31.3.
d. Click the PDU and locate the following information in both the OSI Model and Outbound PDU Details tabs.
The Outbound PDU Details tab shows simplified packet and frame headers for the PDU. You should
observe the following details regarding addressing for the PDU.
 At Device: 172.16.31.3
 Source MAC Address: 0060.7036.2849
 Destination MAC Address: 000C:85CC:1DA7
 Source IP Address: 172.16.31.3
 Destination IP Address: 172.16.31.2
e. Click Capture / Forward (the right arrow followed by a vertical bar) and the PDU moves to the next step in
its journey. Use the OSI model tab to gather the same information from Step 1d. Repeat this process until the
PDU reaches its destination. For each step on the path to delivery, record the information for each PDU into a
spreadsheet that uses a format like the table shown below. The information for the first step is shown in the
table.
Example Spreadsheet Format
f. You will notice that the information for the inbound PDU is unchanged.
Question:

In the PDU information window, click the tab for the outbound PDU. How does the addressing differ, and why?
Record the addressing in your table.
ANSWER
The source and destination address are reversed in both the frame and packet because this PDU will
be sent back to host 172.16.31.3. This message will be a ping echo-reply.

Part 2: Gather PDU Information for a Remote Network Communication


To communicate with remote networks, a gateway device is necessary. The gateway device connects two or more
networks together. In this part, you will study the process that takes place when one device communicates with
another device that is on a remote network. Pay close attention to the MAC addresses used.
Note: Move your mouse over the Router. You will see information about the addressing of the router interfaces.
Refer to these addresses as you observe the PDU flow through the router.
a. Return to the Command Prompt for 172.16.31.3.
b. Enter the ping 10.10.10.2 command. The first couple of pings may time out.
c. Switch to Simulation mode and repeat the ping 10.10.10.2 command. A PDU appears next to 172.16.31.3.
d. Click the PDU and note the following information tab:
 At Device: 172.16.31.3
 Source MAC Address: 0060.7036.2849
 Destination MAC Address: 00D0:BA8E:741A
 Source IP Address: 172.16.31.3
 Destination IP Address: 10.10.10.2
Question:

What device and interface has the destination MAC address that is shown?
ANSWER

The router interface FasteEthernet1/0

e. Click Capture / Forward (the right arrow followed by a vertical bar) to move the PDU to the next device.
Gather the same information from Step 1d. Repeat this process until the PDU reaches its destination. Record the PDU
information you gathered from pinging 172.16.31.5 to 10.10.10.2 into a spreadsheet using a format like the sample
table shown below. Enter details for both the inbound and outbound PDUs at the Router.

ANSWER
f. Repeat the process for the echo-reply message that originates from host 10.10.10.2. Complete the table for each
step.

ANSWER

Reflection Questions
Answer the following questions regarding the captured data:
1. What different types of cables/media were used to connect devices?
ANSWER

copper, fiber, and Wireless

2. Did the cables change the handling of the PDU in any way?

ANSWER
No

3. Did the wireless Access Point do anything to the PDUs that it received?

ANSWER

Yes. It repackaged them as wireless 802.11 frames.

4. Was PDU addressing changed by the access point?

ANSWER

No

5. What was the highest OSI layer that the Access Point used?

ANSWER

Layer 1

6. At what Layer of the OSI model do cables and access points operate?

ANSWER

Layer 1

7. When examining the PDU Details tab, which MAC address appeared first, the source or the destination?

ANSWER

Destination

8. Sometimes PDUs were marked with red Xs while others had green check marks. What is the significance of these
markings?

ANSWER

The PDUs that are marked with Xs were not accepted by a device because the destination address did not
match the device’s MAC address.

9. Every time that the PDU was sent between the 10 network and the 172 network, there was a point where the MAC
addresses suddenly changed. Where did that occur?

ANSWER

It occurred at the router

10. Which device uses MAC addresses that start with 00D0:BA?

ANSWER

The router

11. What devices did the other MAC addresses belong to?

ANSWER

To the sending device and receiving device

12. Did the sending and receiving IPv4 addresses change in any of the PDUs?

ANSWER
No

13. When you follow the reply to a ping, sometimes called a pong, what happens to the source and destination
addresses?

ANSWER

They switch because the receiving device is now the source

14. Why do you think the interfaces of the router are part of two different IP networks?

ANSWER

The function of a router is to interconnect different IP networks. It must be a member of both networks to do
this.

15. Which IP networks are connected by the router?

ANSWER

The 10.10.10.0/24 and 172.16.31.0/24 networks.

13.1.4 Check Your Understanding - MAC


and IP
13.2 Broadcast Containment
13.2.1 Video - The Ethernet Broadcast
https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=3e7d6f29-51e8-5816-a45e-fde11669faa7

13.2.2 Broadcast Domains


When a host receives a message addressed to the broadcast address, it accepts and processes
the message as though the message was addressed directly to it. When a host sends a broadcast
message, switches forward the message to every connected host within the same local network.
For this reason, a local area network, a network with one or more Ethernet switches, is also
referred to as a broadcast domain.

If too many hosts are connected to the same broadcast domain, broadcast traffic can become
excessive. The number of hosts and the amount of network traffic that can be supported on the
local network is limited by the capabilities of the switches used to connect them. As the network
grows and more hosts are added, network traffic, including broadcast traffic, increases. To
improve performance, it is often necessary to divide one local network into multiple networks, or
broadcast domains, as shown in the figure. Routers are used to divide the network into multiple
broadcast domains.
When a host receives a message addressed to the broadcast address, it accepts and processes the message as
though the message was addressed directly to it. When a host sends a broadcast message, switches forward the
message to every connected host within the same local network. For this reason, a local area network, a network with
one or more Ethernet switches, is also referred to as a broadcast domain.

If too many hosts are connected to the same broadcast domain, broadcast traffic can become excessive. The number
of hosts and the amount of network traffic that can be supported on the local network is limited by the capabilities of
the switches used to connect them. As the network grows and more hosts are added, network traffic, including
broadcast traffic, increases. To improve performance, it is often necessary to divide one local network into multiple
networks, or broadcast domains, as shown in the figure. Routers are used to divide the network into multiple
broadcast domains.

13.2.3 Access Layer Communication


On a local Ethernet network, a NIC only accepts a frame if the destination address is either the
broadcast MAC address, or else corresponds to the MAC address of the NIC.

Most network applications, however, rely on the logical destination IP address to identify the
location of the servers and clients. The figure illustrates the problem that arises if a sending host
only has the logical IP address of the destination host. How does the sending host determine what
destination MAC address to place within the frame?

The sending host can use an IPv4 protocol called address resolution protocol (ARP) to discover
the MAC address of any host on the same local network. IPv6 uses a similar method known as
Neighbor Discovery.
On a local Ethernet network, a NIC only accepts a frame if the destination address is either the broadcast MAC
address, or else corresponds to the MAC address of the NIC.

Most network applications, however, rely on the logical destination IP address to identify the location of the servers
and clients. The figure illustrates the problem that arises if a sending host only has the logical IP address of the
destination host. How does the sending host determine what destination MAC address to place within the frame?

The sending host can use an IPv4 protocol called address resolution protocol (ARP) to discover the MAC address of
any host on the same local network. IPv6 uses a similar method known as Neighbor Discovery.

13.2.4 Video - Address Resolution Protocol


13.2.5 ARP
ARP uses a three step process to discover and store the MAC address of a host on the local
network when only the IPv4 address of the host is known:

1. The sending host creates and sends a frame addressed to a broadcast MAC address.
Contained in the frame is a message with the IPv4 address of the intended destination host.
2. Each host on the network receives the broadcast frame and compares the IPv4 address
inside the message with its configured IPv4 address. The host with the matching IPv4
address sends its MAC address back to the original sending host.
3. The sending host receives the message and stores the MAC address and IPv4 address
information in a table called an ARP table.

When the sending host has the MAC address of the destination host in its ARP table, it can send
frames directly to the destination without doing an ARP request. Because ARP messages rely on
broadcast frames to deliver the requests, all hosts in the local IPv4 network must be in the same
broadcast domain.

Click Play in the figure to see an animation of the ARP process.


ARP uses a three step process to discover and store the MAC address of a host on the local network when only the
IPv4 address of the host is known:

1. The sending host creates and sends a frame addressed to a broadcast MAC address. Contained in the frame
is a message with the IPv4 address of the intended destination host.
2. Each host on the network receives the broadcast frame and compares the IPv4 address inside the message
with its configured IPv4 address. The host with the matching IPv4 address sends its MAC address back to the
original sending host.
3. The sending host receives the message and stores the MAC address and IPv4 address information in a table
called an ARP table.

When the sending host has the MAC address of the destination host in its ARP table, it can send frames directly to the
destination without doing an ARP request. Because ARP messages rely on broadcast frames to deliver the requests,
all hosts in the local IPv4 network must be in the same broadcast domain.

Click Play in the figure to see an animation of the ARP process.

13.2.6 Check Your Understanding -


Broadcast Containment
13.3 The ARP Process Summary
13.3.1 What Did I Learn in this Module?
MAC and IP
Sometimes a host must send a message, but it only knows the IP address of the destination
device. The host needs to know the MAC address of that device. The MAC address can be
discovered using address resolution. There are two primary addresses assigned to a device on an
Ethernet LAN:

 Physical address (the MAC address) – Used for NIC-to-NIC communications on the
same Ethernet network.
 Logical address (the IP address) – Used to send the packet from the source device to the
destination device. The destination IP address may be on the same IP network as the
source, or it may be on a remote network.

When the destination IP address (IPv4 or IPv6) is on a remote network, the destination MAC
address will be the address of the host default gateway (i.e., the router interface). Routers
examine the destination IPv4 address to determine the best path to forward the IPv4 packet.
When the router receives the Ethernet frame, it de-encapsulates the Layer 2 information. Using
the destination IPv4 address, it determines the next-hop device, and then encapsulates the IPv4
packet in a new data link frame for the outgoing interface. Along each link in a path, an IP packet
is encapsulated in a frame. The frame is specific to the data link technology that is associated with
that link, such as Ethernet. If the next-hop device is the final destination, the destination MAC
address will be that of the device Ethernet NIC

Broadcast Containment
A message can only contain one destination MAC address. Address resolution lets a host send a
broadcast message to a unique MAC address that is recognized by all hosts. The broadcast MAC
address is a 48-bit address made up of all ones. MAC addresses are usually represented in
hexadecimal notation. The broadcast MAC address in hexadecimal notation is FFFF.FFFF.FFFF.
Each F in the hexadecimal notation represents four ones in the binary address.

When a host sends a broadcast message, switches forward the message to every connected host
within the same local network. For this reason, a local area network, a network with one or more
Ethernet switches, is also referred to as a broadcast domain.

If too many hosts are connected to the same broadcast domain, broadcast traffic can become
excessive. The number of hosts and the amount of network traffic that can be supported on the
local network is limited by the capabilities of the switches used to connect them. To improve
performance, you may need to divide one local network into multiple networks, or broadcast
domains. Routers are used to divide the network into multiple broadcast domains.

On a local Ethernet network, a NIC only accepts a frame if the destination address is either the
broadcast MAC address, or else corresponds to the MAC address of the NIC. Most network
applications rely on the logical destination IP address to identify the location of the servers and
clients. How does the sending host determine what destination MAC address to place within the
frame? The sending host can ARP to discover the MAC address of any host on the same local
network.

ARP uses a three-step process to discover and store the MAC address of a host on the local
network when only the IPv4 address of the host is known:

1. The sending host creates and sends a frame addressed to a broadcast MAC address.
Contained in the frame is a message with the IPv4 address of the intended destination host.
2. Each host on the network receives the broadcast frame and compares the IPv4 address
inside the message with its configured IPv4 address. The host with the matching IPv4
address sends its MAC address back to the original sending host.
3. The sending host receives the message and stores the MAC address and IPv4 address
information in a table called an ARP table.

IPv6 uses a similar method known as Neighbor Discovery.

13.3.2 Webster - Reflection Questions


All of my devices (and all of your devices) have an IP address, and a MAC address. When
someone wants to send a message to my phone, my IP address tells their router where my device
is. My MAC address is how my phone knows to let me see the message. That router also needs to
know my MAC address and uses ARP to find it. Do you know how to look up the MAC address of
each of your connected devices?

13.3.2 Webster - Reflection Questions


All of my devices (and all of your devices) have an IP address, and a MAC address. When
someone wants to send a message to my phone, my IP address tells their router where my device
is. My MAC address is how my phone knows to let me see the message. That router also needs to
know my MAC address and uses ARP to find it. Do you know how to look up the MAC address of
each of your connected devices?
Module 14: Routing Between
Networks
14.0 Introduction
14.0.1 Webster - Why Should I Take this
Module?
Kishori leaves work for the day and begins her drive home. Her friend has called her to warn her
that there is a lot of congestion on her usual route home. She used the GPS on her phone to
reroute to a less congested road. Kishori wonders if networks can get congested. Do they find a
faster route?

Great question Kishori! Networks can also have this issue of congestion slowing down its
performance. In a network, the router can determine the best path. How does a network become
congested? What can you do to limit that congestion? You and Kishori will find out in this module!

14.0.2 What Will I Learn in this Modules?


Module Title: Routing Between Networks

Module Objective: Create a fully connected LAN.


14.1 The Need for Routing
14.1.1 Video - Dividing the Local Network
https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=07b2c14c-da4a-57de-acac-b6f3be8f1d6d

14.1.2 Now We Need Routing


In most situations we want our devices to be able to connect beyond our local network: out to
other homes, businesses, and the internet. Devices that are beyond the local network segment are
known as remote hosts. When a source device sends a packet to a remote destination device,
then the help of routers and routing is needed. Routing is the process of identifying the best path
to a destination.

A router is a networking device that connects multiple Layer 3, IP networks. At the distribution
layer of the network, routers direct traffic and perform other functions critical to efficient network
operation. Routers, like switches, are able to decode and read the messages that are sent to
them. Unlike switches, which make their forwarding decision based on the Layer 2 MAC address,
routers make their forwarding decision based on the Layer 3 IP address.

The packet format contains the IP addresses of the destination and source hosts, as well as the
message data being sent between them. The router reads the network portion of the destination IP
address and uses it to find which one of the attached networks is the best way to forward the
message to the destination.

Anytime the network portion of the IP addresses of the source and destination hosts do not match,
a router must be used to forward the message. If a host located on network 1.1.1.0 needs to send
a message to a host on network 5.5.5.0, the host will forward the message to the router. The
router receives the message, de-encapsulates the Ethernet frame, and then reads the destination
IP address in the IP packet. It then determines where to forward the message. It re-encapsulates
the packet back into a new frame, and forwards the frame on to its destination.

Click Play to see how the MAC and IP addresses are used.
IP Packet Encapsulated in an Ethernet Frame

In most situations we want our devices to be able to connect beyond our local network: out to other homes,
businesses, and the internet. Devices that are beyond the local network segment are known as remote hosts. When a
source device sends a packet to a remote destination device, then the help of routers and routing is needed. Routing
is the process of identifying the best path to a destination.

A router is a networking device that connects multiple Layer 3, IP networks. At the distribution layer of the network,
routers direct traffic and perform other functions critical to efficient network operation. Routers, like switches, are able
to decode and read the messages that are sent to them. Unlike switches, which make their forwarding decision based
on the Layer 2 MAC address, routers make their forwarding decision based on the Layer 3 IP address.

The packet format contains the IP addresses of the destination and source hosts, as well as the message data being
sent between them. The router reads the network portion of the destination IP address and uses it to find which one of
the attached networks is the best way to forward the message to the destination.

Anytime the network portion of the IP addresses of the source and destination hosts do not match, a router must be
used to forward the message. If a host located on network 1.1.1.0 needs to send a message to a host on network
5.5.5.0, the host will forward the message to the router. The router receives the message, de-encapsulates the
Ethernet frame, and then reads the destination IP address in the IP packet. It then determines where to forward the
message. It re-encapsulates the packet back into a new frame, and forwards the frame on to its destination.

Click Play to see how the MAC and IP addresses are used.

IP Packet Encapsulated in an Ethernet Frame

14.1.3 Check Your Understanding - The


Need for Routing
14.2 The Routing Table

14.2.1 Video - Router Packet Forwarding


https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=b2ac7030-edad-5df4-af6c-ead5b8ee4b0b

14.2.2 Video - Messages Within and Between


Networks - Part 1
14.2.3 Video - Messages Within and Between
Networks - Part 2
14.2.4 Routing Table Entries
Routers move information between local and remote networks. To do this, routers must use
routing tables to store information. Routing tables are not concerned with the addresses of
individual hosts. Routing tables contain the addresses of networks, and the best path to reach
those networks. Entries can be made to the routing table in two ways: dynamically updated by
information received from other routers in the network, or manually entered by a network
administrator. Routers use the routing tables to determine which interface to use to forward a
message to its intended destination.

If the router cannot determine where to forward a message, it will drop it. Network administrators
configure a static default route that is placed into the routing table so that a packet will not be
dropped due to the destination network not being in the routing table. A default route is the
interface through which the router forwards a packet containing an unknown destination IP
network address. This default route usually connects to another router that can forward the packet
towards its final destination network.

Routers move information between local and remote networks. To do this, routers must use routing tables to store
information. Routing tables are not concerned with the addresses of individual hosts. Routing tables contain the
addresses of networks, and the best path to reach those networks. Entries can be made to the routing table in two
ways: dynamically updated by information received from other routers in the network, or manually entered by a
network administrator. Routers use the routing tables to determine which interface to use to forward a message to its
intended destination.

If the router cannot determine where to forward a message, it will drop it. Network administrators configure a static
default route that is placed into the routing table so that a packet will not be dropped due to the destination network
not being in the routing table. A default route is the interface through which the router forwards a packet containing an
unknown destination IP network address. This default route usually connects to another router that can forward the
packet towards its final destination network.

 Type - The connection type. C stands for directly connected.


 Network - The network address.
 Port - The interface used to forward packets to the network.

14.2.5 The Default Gateway


The method that a host uses to send messages to a destination on a remote network differs
from the way a host sends messages on the same local network. When a host needs to
send a message to another host located on the same network, it will forward the message
directly. A host will use ARP to discover the MAC address of the destination host. The IPv4
packet contains the destination IPv4 address and encapsulates the packet into a frame
containing the MAC address of the destination and forwards it out.
When a host needs to send a message to a remote network, it must use the router. The
host includes the IP address of the destination host within the packet just like before.
However, when it encapsulates the packet into a frame, it uses the MAC address of the
router as the destination for the frame. In this way, the router will receive and accept the
frame based on the MAC address.
How does the source host determine the MAC address of the router? A host is given the
IPv4 address of the router through the default gateway address configured in its TCP/IP
settings. The default gateway address is the address of the router interface connected to
the same local network as the source host. All hosts on the local network use the default
gateway address to send messages to the router. When the host knows the default
gateway IPv4 address, it can use ARP to determine the MAC address. The MAC address of
the router is then placed in the frame, destined for another network.
It is important that the correct default gateway be configured on each host on the local
network. If no default gateway is configured in the host TCP/IP settings, or if the wrong
default gateway is specified, messages addressed to hosts on remote networks cannot be
delivered.

The method that a host uses to send messages to a destination on a remote network differs from the way a host
sends messages on the same local network. When a host needs to send a message to another host located on the
same network, it will forward the message directly. A host will use ARP to discover the MAC address of the destination
host. The IPv4 packet contains the destination IPv4 address and encapsulates the packet into a frame containing the
MAC address of the destination and forwards it out.

When a host needs to send a message to a remote network, it must use the router. The host includes the IP address
of the destination host within the packet just like before. However, when it encapsulates the packet into a frame, it
uses the MAC address of the router as the destination for the frame. In this way, the router will receive and accept the
frame based on the MAC address.

How does the source host determine the MAC address of the router? A host is given the IPv4 address of the router
through the default gateway address configured in its TCP/IP settings. The default gateway address is the address of
the router interface connected to the same local network as the source host. All hosts on the local network use the
default gateway address to send messages to the router. When the host knows the default gateway IPv4 address, it
can use ARP to determine the MAC address. The MAC address of the router is then placed in the frame, destined for
another network.

It is important that the correct default gateway be configured on each host on the local network. If no default gateway
is configured in the host TCP/IP settings, or if the wrong default gateway is specified, messages addressed to hosts
on remote networks cannot be delivered.
14.2.6 Check Your Understanding -
Select the Default Gateway
14.2.7 Check Your Understanding - The
Routing Table
14.3 Create a LAN
14.3.1 Local Area Networks
The term local area network (LAN) refers to a local network, or a group of interconnected local
networks that are under the same administrative control. In the early days of networking, LANs
were defined as small networks that existed in a single physical location. Although LANs can be a
single local network installed in a home or small office, the definition of LAN has evolved to include
interconnected local networks consisting of many hundreds of hosts, installed in multiple buildings
and locations.

The important thing to remember is that all the local networks within a LAN are under one
administrative control. Other common characteristics of LANs are that they typically use Ethernet
or wireless protocols, and they support high data rates.

The term intranet is often used to refer to a private LAN that belongs to an organization, and is
designed to be accessible only by the members of the organization, employees, or others with
authorization.
The term local area network (LAN) refers to a local network, or a group of interconnected local networks that are
under the same administrative control. In the early days of networking, LANs were defined as small networks that
existed in a single physical location. Although LANs can be a single local network installed in a home or small office,
the definition of LAN has evolved to include interconnected local networks consisting of many hundreds of hosts,
installed in multiple buildings and locations.

The important thing to remember is that all the local networks within a LAN are under one administrative control. Other
common characteristics of LANs are that they typically use Ethernet or wireless protocols, and they support high data
rates.

The term intranet is often used to refer to a private LAN that belongs to an organization, and is designed to be
accessible only by the members of the organization, employees, or others with authorization.

14.3.2 Local and Remote Network Segments


Within a LAN, it is possible to place all hosts on a single local network or divide them up between
multiple networks connected by a distribution layer device. How this placement is determined
depends on desired results.

Click below to learn more about local and remote network segments.

All Hosts in One Local Segment


Placing all hosts on a single local network allows them to be seen by all other hosts. This is
because there is one broadcast domain and hosts use ARP to find each other.

In a simple network design, it may be beneficial to keep all hosts within a single local network.
However, as networks grow in size, increased traffic will decrease network performance and
speed. In this case, it may be beneficial to move some hosts onto a remote network.

Advantages of a single local segment:

 Appropriate for simpler networks


 Less complexity and lower network cost
 Allows devices to be "seen" by other devices
 Faster data transfer - more direct communication
 Ease of device access

Disadvantages of a single local segment:


 All hosts are in one broadcast domain which causes more traffic on the segment and may
slow network performance
 Harder to implement QoS
 Harder to implement security

Hosts on a Remote Segment


Placing additional hosts on a remote network will decrease the impact of traffic demands.
However, hosts on one network will not be able to communicate with hosts on the other network
without the use of routing. Routers increase the complexity of the network configuration and can
introduce latency, or time delay, on packets sent from one local network to the other.

Advantages:

 More appropriate for larger, more complex networks


 Splits up broadcast domains and decreases traffic
 Can improve performance on each segment
 Makes the machines invisible to those on other local network segments
 Can provide increased security
 Can improve network organization

Disadvantages:

 Requires the use of routing (distribution layer)


 Router can slow traffic between segments
 More complexity and expense (requires a router)

14.3.3 Packet Tracer - Observe Traffic Flow in a


Routed Network
In this Packet Tracer activity, you will complete the following objectives:

 Part 1: Observe Traffic Flow in an Unrouted LAN


 Part 2: Reconfigure the Network to Route Between LANs
 Part 3: Observe Traffic Flow in the Routed Network

Observe Traffic Flow in a Routed Network


Packet Tracer - Observe Traffic Flow in a Routed Network
Objectives
Part 1: Observe Traffic Flow in an Unrouted LAN
Part 2: Reconfigure the Network to Route Between LANs
Part 3: Observe Traffic Flow in the Routed Network

Background / Scenario
The company that you work for has been asked to propose a new network design for XYZ LLC. XYZ is a startup
company that has recently experienced success with their product offerings. They will be expanding, and their
network will need to grow with them. Currently, the network is configured with a single IP network for hosts in all
departments. This design has become inefficient and network delays are becoming increasingly noticeable. You
have been asked to help prepare the proposal with the sales team. The sales team will propose a solution in
which network efficiency is enhanced by implementing routing between separate department networks. You are
working on a demonstration of how having multiple routed networks in a business can improve network efficiency.
Follow the instructions to go through the demonstration to help propose a new network to XYZ LLC.

Instructions

Part 1: Observe Traffic Flow in an Unrouted LAN


The XYZ network consists of about 150 devices that are connected to a LAN. The LAN is configured on a single
IPv4 network. Hosts in different departments are connect to switches which are then connected to
the Edge router. The router only routes traffic between the LAN and the internet, represented by the ISP cloud.
Because only one IP network is used in the LAN, all departments are on the same network.
The Packet Tracer topology is simplified. It only shows some of the departments and hosts. Assume that the
behavior that you will demonstrate is happening at far greater scale than what is shown in the PT network.
In this part, you will use Packet Tracer simulation mode to observe how traffic flows through an unrouted LANs.

Step 1: Clear the ARP cache on host Sales 1.


Hover your mouse over the Sales 1 host to see its IP address. Make note of it.
a. Click Sales 1 > Desktop tab > Command Prompt, and then enter the arp -a command. There should be no
MAC addresses in the ARP cache. If there are entries in the ARP cache, use the arp -d command to delete
them.

Step 2: Observe traffic flow in the network.


a. Click the Simulation mode button in the lower right-hand corner of the PT window to switch
from Realtime to Simulation mode.
b. Open the Command Prompt for Sales 2, and then enter the ping command followed by the IP address
of Sales 1.
c. Use the Capture then Forward button (the triangle pointing to the right with a vertical bar attached) in
the Play Controls of the Simulation Panel to begin to execute the ping command. You will see a colored
envelope icon appear next to Sales 2. This represents a PDU. Click the Capture then Forward button to
move the PDU to the first device on its path to the destination device. Click the PDU envelope to inspect the
contents.
Questions:

What are the source and destination MAC and IP addresses for the frame and packet?
ANSWER
The frame source MAC address is the MAC address of Sales 1. The destination MAC address is the
MAC broadcast address of FFFF.FFFF.FFFF. The packet source IP address is the IP address of Sales
1. The destination IP address is the destination of Sales 2.

Why is the destination MAC address the broadcast address?


ANSWER

Because the host ARP cache is empty, the host must first issue an ARP request to obtain the destination
MAC address so that the frame can be addressed to the Sales 1.

d. Advance the PDUs through the network until a new PDU (different color) is created at Sales 2.
Questions:

Which hosts and other types of devices needed to process the ARP request packets?

All hosts and the router interface

What is the impact of this on efficient operation of the network as it is currently configured?

ANSWER

Even though the destination for the ping requests may be adjacent to the requesting source, if the host has
an empty ARP cache, an ARP request is sent that must be processed by every host on the network. ARP
cache entries are removed after a preset period of time. With many hosts on a network, ARP broadcasts will
be issued more frequently. This requires network resources to be taken away for the work-related traffic.

e. A new PDU with a different color has appeared at Sales 2. Click the new PDU and inspect its contents. Look
at the outbound PDU details.
Question:

What type of PDU is this?


ANSWER

It is the first ICMP echo-request packet that is issued by ping from host Sales 2.

f. Return to Realtime mode.

Part 2: Reconfigure the Network to Route Between LANs.


In this part, you will demonstrate the benefits of routing between department networks. First, you will cable each
network switch to connect directly to a router interface. Then, you will reconfigure the hosts to receive addresses
on two new IPv4 networks that are created by the router.

Step 1: Change device connections.


The three switches are connected to each other with copper straight through cables.
a. For the cable that connects the Accounting switch with Finance switch, click the green triangle on
the Accounting switch side of the link.
b. Drag that end of the cable to the Edge router and connect the cable to port GigabitEthernet 1/0.
c. Repeat this step for the link between Finance and Sales. Connect to the available GigabitEthernet port.

Step 2: Configure the hosts with addresses on the new LANs.


Each interface of the Edge router was previously configured to put each department on its own IPv4 network. The
hosts will receive their new IP addresses from the router. However, it will take time for the hosts on
the Finance and Sales networks to receive their new IP addresses. (The hosts on the Accounting network will
remain on 192.168.1.0/24.)
a. To speed up the process of getting new IP addresses, open a Command Prompt on each of the four devices
in the Finance and Sales networks.
b. Enter the ipconfig /renew command. This will force the host to request a new IP address from the DHCP
server that is running on the Edge router. You should see confirmation of new IP addressing.
What IPv4 network is assigned to the Finance network?
ANSWER

192.168.2.0/24

What IPv4 network is assigned to the Sales network?

ANSWER
192.168.3.0/24

Part 3: Observe Traffic Flow in the Routed Network.


In this part, you will observe how traffic now flows through a routed network.

Step 1: Ping Sales 1 from Sales 2.


a. Return to the Command Prompt for Sales 2 and verify that its ARP cache is empty. If it is not, delete any
entries.
b. Switch to Simulation mode.
c. Ping Sales 1 from Sales 2.
d. Use the Capture then Forward button to step the PDUs through the network. Observe how the ARP request
message flows through the network this time.
Question:

Which devices receive the ARP broadcasts this time?


ANSWER

Only Sales 1 and the router interface that is connected to the Sales department network process the PDU.

Step 2: Ping other hosts.


Repeat this demo by pinging other hosts and the internet server. Observe the flow of the ARP request PDUs.
Question:

What is the benefit of using multiple IPv4 networks, or subnetworks, within an enterprise?
ANSWER
A major benefit of using multiple IP networks is the containment of traffic within relevant parts of the network
without unnecessarily impacting performance on irrelevant parts of the network.

14.3.4 Packet Tracer - Create a LAN


In this Packet Tracer activity, you will complete the following objectives:

 Connect Network Devices and Hosts


 Configure Devices with IPv4 Addressing
 Verify the End Device Configuration and Connectivity
 Use Networking Commands to View Host Information

Create a LAN
Packet Tracer - Create a LAN
Addressing Table

Objectives
 Connect Network Devices and Hosts
 Configure Devices with IPv4 Addressing
 Verify the End Device Configuration and Connectivity
 Use Networking Commands to View Host Information
Background / Scenario
A new branch office is opening, and you have been asked to set up the LAN. The network devices are already set
up, but you need to connect them and the hosts together. You also need to configure IPv4 addressing on the end
devices and verify that they can reach local and remote resources.

Instructions

Part 1: Connect Network Devices and Hosts

Step 1: Power on the end devices and Office Router.


a. Click each device and open its Physical Tab. Note: There is no power switch on the switch model used in this
activity.
b. Locate the power switch for each device in the Physical Device View window.
c. Click the power switch to turn the device on. You should see a green light near the power switch to indicate
that the device is powered on.

Step 2: Connect the end devices.


Use the table and instructions to connect the network devices and hosts to create the physical network.
Connections Table

Note: In the table above, interfaces designated with G are GigabitEthernet interfaces. Interfaces that are
designated with F are FastEthernet interfaces.
a. Connect the networking devices according to the information in the Connections Table using Ethernet copper
straight-through cables. For the internet to Office Router connection, select the device and port from the
dropdown menus that appear when you click the cloud with connections tool selected.
b. Connect the two PCs and the printer to the office switch according to the information in the connections table.
Use copper straight-through cables.
c. You should see green link lights on all connections after a brief delay.

Part 2: Configure Devices with IPv4 Addressing

Step 1: Configure the hosts with addressing information.


a. The Admin and Manager PCs should receive their IP addressing information from DHCP. The Office Router
has been configured to supply IP addresses to hosts on the branch office LAN. Click the PCs and go to the
Desktop tabs on each PC. Open the IP Configuration application and configure the PCs to receive their IP
addresses dynamically.
b. Printers and servers are often manually configured with addressing because other devices on the network are
configured to access them using IP addresses. Manual configuration with a static address will ensure that the
IP addresses of these devices do not change.
1) Click the printer and open the Config tab.
2) Click the FastEthernet0 interface in the left-hand pane.
3) Enter the addressing information from the Addressing Table.
c. Because the two computers are on the same network, their IPv4 addresses will be similar, their subnet masks
and default gateways will be identical.
Questions:

Why do you think the IPv4 addresses are different, but the subnet masks and default gateways are the same?
ANSWER
Answers will vary. Each device on the network must have a unique identifier. The IPv4 address is one way of
uniquely identifying each network host or device. The default gateway represents the way of communicating
with devices that are NOT on the local network.

The printer does not require a default gateway because it will only be accessed by hosts on the local network.
However, if you need to configure it with a default gateway, which value will the printer use? How can you determine
this from the other devices in the network?

ANSWER

You can determine the default gateway value to use by looking at the values that PCs have been configured
with by DHCP, or by determining the IP address of the Office Router Ethernet interface that is connected to
the branch office LAN.

Part 3: Verify the End Device Configuration and Connectivity

Step 1: Verify connectivity between the two PCs.


a. Go to the desktops of the PCs and check the IP addressing configuration. You should see that the PCs have
dynamically received IP addresses on the 192.168.1.0 255.255.255.0 network. You should also see that they
have received addresses for the Default Gateway and DNS server settings.
b. From the command prompt on Admin PC, ping the IP address of the Printer. Repeat this process for the
Manager PC. You should see successful pings for each. This verifies that the PCs and the printer are
powered on, and correctly connected and addressed.

Step 2: Verify connectivity to the internet.


From the desktop of the PCs, open the Web Browser. Enter the IP address of the internet server to display the
webpage. Repeat the process but connect using the URL of the server.
Question:

If you can connect by the IP address, but not by the URL, what do you think is the cause of this problem?
ANSWER

Because DNS is used to resolve URLs to IP addresses, you can safely guess that the DNS server is not
reachable. This could be because of a network connectivity issue, or it could be because the DNS server
address that is configured on the hosts is missing or incorrect.

Part 4: Use Networking Commands to View Host Information


The networking commands that are available from command prompt on PCs are very similar to those that are
available in Windows. In this part of the activity, you will use ipconfig and tracert to learn more about the LAN.

Step 1: Use the ipconfig command.


The ipconfig command displays details about the addressing that is configured on a host.
Question:

Open a command prompt on one of the PCs and enter the ipconfig command and make note of the information
that is returned. Now enter the ipconfig /all command. What additional information is displayed?
ANSWER

The ipconfig /all displays information about the physical (MAC) address of the NIC. It also displays the DHCP
and DNS server addresses. In Windows, many additional details are displayed. Type ipconfig /all from the
command prompt of a PC to view all the information that Windows displays with this command.

Step 2: Use the tracert command.


The tracert command uses ICMP to return information about the routers that are passed as packets go from the
source PC to the destination.
Trace to a remote destination by going to one of the PCs and entering tracert followed by the URL of the web
server.
Questions:

How many routers are passed on the way to the destination? How are those routers identified?
ANSWER

Two. They are identified by the IP addresses of the incoming interfaces on the routers.
Where is the second router located?

ANSWER

It is in the internet cloud.

Reflection
Consider a small office that has a LAN similar to the one you have created here. What is the biggest facilities
challenge in setting up the network in a new location?
ANSWER

The physical cabling infrastructure. The office needs to be wired and have communication outlets for all
devices. Moreover, the outlets need to be in convenient locations. Further, the outlets must be wired to some
central location where the switch and router are located. Physical cabling can present many problems when
created a new office location.

14.4 Routing Between Networks


Summary
14.4.1 What Did I Learn in this Module?
The Need for Routing
As networks grow, it is often necessary to divide one access layer network into multiple access
layer networks. There are many ways to divide networks based on different criteria:

 Broadcast containment - Routers in the distribution layer can limit broadcasts to the local
network where they need to be heard.
 Security requirements - Routers in the distribution layer can separate and protect certain
groups of computers where confidential information resides.
 Physical locations - Routers in the distribution layer can be used to interconnect local
networks at various locations of an organization that are geographically separated.
 Logical grouping - Routers in the distribution layer can be used to logically group users,
such as departments within a company, who have common needs or for access to
resources.

The distribution layer connects these independent local networks and controls the traffic flowing
between them. It is responsible for ensuring that traffic between hosts on the local network stays
local.

A router is a networking device that connects multiple Layer 3, IP networks. At the distribution
layer of the network, routers direct traffic and perform other functions critical to efficient network
operation. Routers, like switches, are able to decode and read the messages that are sent to
them. Unlike switches, which make their forwarding decision based on the Layer 2 MAC address,
routers make their forwarding decision based on the Layer 3 IP address.

Anytime the network portion of the IP addresses of the source and destination hosts do not match,
a router must be used to forward the message.

The Routing Table


Each port, or interface, on a router connects to a different local network. Every router contains a
table of all locally connected networks and the interfaces that connect to them.
When a router receives a frame, it decodes the frame to get to the packet containing the
destination IP address. It matches the network portion of the destination IP address to the
networks that are listed in the routing table. If the destination network address is in the table, the
router encapsulates the packet in a new frame in order to send it out. It forwards the new frame
out of the interface associated with the path, to the destination network. The process of forwarding
the packets toward their destination network is called routing.

A router forwards a packet to one of two places: a directly connected network containing the actual
destination host, or to another router on the path to reach the destination host. When a router
encapsulates the frame to forward it out a routed interface, it must include a destination MAC
address. If the router must forward the packet to another router through a routed interface, it will
use the MAC address of the connected router. Routers obtain these MAC addresses from ARP
tables.

A host is given the IPv4 address of the router through the default gateway address configured in
its TCP/IP settings. The default gateway address is the address of the router interface connected
to the same local network as the source host. All hosts on the local network use the default
gateway address to send messages to the router.

Routing tables contain the addresses of networks, and the best path to reach those networks.
Entries can be made to the routing table in two ways: dynamically updated by information received
from other routers in the network, or manually entered by a network administrator.

Create a LAN
LAN refers to a local network, or a group of interconnected local networks that are under the same
administrative control. All the local networks within a LAN are under one administrative control.
Other common characteristics of LANs are that they typically use Ethernet or wireless protocols,
and they support high data rates.

Within a LAN, it is possible to place all hosts on a single local network or divide them up between
multiple networks connected by a distribution layer device.

Placing all hosts on a single local network allows them to be seen by all other hosts. This is
because there is one broadcast domain and hosts use ARP to find each other.

Placing additional hosts on a remote network will decrease the impact of traffic demands.
However, hosts on one network will not be able to communicate with hosts on the other network
without the use of routing. Routers increase the complexity of the network configuration and can
introduce latency, or time delay, on packets sent from one local network to the other.

14.4.2 Webster - Reflection Questions


On my home network (LAN), I do not usually have enough network traffic to experience
congestion, although it can happen when all my children are streaming different movies and I am
trying to upload a document to my work. Can you think of a way that I could divide my LAN into
multiple networks?

14.4.3 Routing Between Networks Quiz


Checkpoint Exam: Communication
Between Networks
Welcome to the Communication Between Networks Checkpoint Exam.

There are 20 questions in total.

Items on this exam support the following networking skills:

 Create a simple LAN.

You must achieve 70% to pass this exam. You have unlimited attempts to pass the exam.
Feedback is provided to direct you to areas that may require additional attention.

Cisco Networking Academy content is copyrighted and the unauthorized posting, distribution or
sharing of this exam content is prohibited.

© 2023, Cisco Systems, Inc.


Module 15: TCP and UDP
15.0 Introduction
15.0.1 Webster - Why Should I Take this
Module?
Kishori arrives at work early to get on a video conference call on the desktop computer at her
nursing station. She logs into the session about mask protocol at the hospital. As she intently
listens to the presenter, she notices a few dropped words. She wonders if it is a problem with the
network. Is this similar to her tablet losing the connection for a moment? But then she remembers
that she is using a computer that is hardwired to the network.

Immediately after the call, she sends an email to Madhav in the IT department. Madhav comes to
Kishori’s desk. She is confused because all of the devices do seem to be connected. Madhav
explains that UDP and TCP are transport layer protocols that operate a little differently. He tells
her that UDP is a 'best effort' delivery system that does not require acknowledgment of receipt.
UDP is preferable with applications such as streaming audio and VoIP. UDP is used for video
conference calls.

Kishori had not heard of this before. Have you? In this module you will compare these protocols.
Keep reading!

15.0.2 What Will I Learn in this Module?


Module Title: TCP and UDP

Module Objective: Explain how clients access internet services.

15.1 TCP and UDP


15.1.1 Video - TCP and UDP Operation
15.1.2 Check Your Understanding - TCP and
UDP
15.2 Port Numbers

15.2.1 Video - Transport Layer Port Numbers


15.2.2 TCP and UDP Port Numbers
There are many services that we access through the internet in the course of a day. DNS, web,
email, FTP, IM and VoIP are just some of these services that are provided by client/server
systems around the world. These services may be provided by a single server or by several
servers in large data centers.

When a message is delivered using either TCP or UDP, the protocols and services requested are
identified by a port number, as shown in the figure. A port is a numeric identifier within each
segment that is used to keep track of specific conversations between a client and server. Every
message that a host sends contains both a source and destination port.
There are many services that we access through the internet in the course of a day. DNS, web, email, FTP, IM and
VoIP are just some of these services that are provided by client/server systems around the world. These services may
be provided by a single server or by several servers in large data centers.

When a message is delivered using either TCP or UDP, the protocols and services requested are identified by a port
number, as shown in the figure. A port is a numeric identifier within each segment that is used to keep track of specific
conversations between a client and server. Every message that a host sends contains both a source and destination
port.

When a message is received by a server, it is necessary for the server to be able to determine
which service is being requested by the client. Clients are preconfigured to use a destination port
that is registered on the internet for each service. An example of this is web browser clients which
are preconfigured to send requests to web servers using port 80, the well-known port for HTTP
web services.

Ports are assigned and managed by an organization known as the Internet Corporation for
Assigned Names and Numbers (ICANN). Ports are broken into three categories and range in
number from 1 to 65,535:

 Well-Known Ports - Destination ports that are associated with common network
applications are identified as well-known ports. These ports are in the range of 1 to 1023.
 Registered Ports - Ports 1024 through 49151 can be used as either source or destination
ports. These can be used by organizations to register specific applications such as IM
applications.
 Private Ports - Ports 49152 through 65535 are often used as source ports. These ports
can be used by any application.

The table displays some common well-known port numbers and their associated applications.
Some applications may use both TCP and UDP. For example, DNS uses UDP when clients send
requests to a DNS server. However, communication between two DNS servers always uses TCP.

Search the IANA website for port registry to view the full list of port numbers and associated
applications.

15.2.3 Socket Pairs


The source and destination ports are placed within the segment. The segments are then
encapsulated within an IP packet. The IP packet contains the IP address of the source and
destination. The combination of the source IP address and source port number, or the destination
IP address and destination port number is known as a socket.

In the example in the figure, the PC is simultaneously requesting FTP and web services from the
destination server.
The source and destination ports are placed within the segment. The segments are then encapsulated within an IP
packet. The IP packet contains the IP address of the source and destination. The combination of the source IP
address and source port number, or the destination IP address and destination port number is known as a socket.

In the example in the figure, the PC is simultaneously requesting FTP and web services from the destination server.

In the example, the FTP request generated by the PC includes the Layer 2 MAC addresses and
the Layer 3 IP addresses. The request also identifies the source port number 1305 (dynamically
generated by the host) and destination port, identifying the FTP services on port 21. The host also
has requested a web page from the server using the same Layer 2 and Layer 3 addresses.
However, it is using the source port number 1099 (dynamically generated by the host) and
destination port identifying the web service on port 80.

The socket is used to identify the server and service being requested by the client. A client socket
might look like this, with 1099 representing the source port number: 192.168.1.5:1099

The socket on a web server might be 192.168.1.7:80

Together, these two sockets combine to form a socket pair: 192.168.1.5:1099, 192.168.1.7:80

Sockets enable multiple processes, running on a client, to distinguish themselves from each other,
and multiple connections to a server process to be distinguished from each other.

The source port number acts as a return address for the requesting application. The transport
layer keeps track of this port and the application that initiated the request so that when a response
is returned, it can be forwarded to the correct application.

15.2.4 The netstat Command


Unexplained TCP connections can pose a major security threat. They can indicate that something
or someone is connected to the local host. Sometimes it is necessary to know which active TCP
connections are open and running on a networked host. Netstat is an important network utility that
can be used to verify those connections. As shown below, enter the command netstat to list the
protocols in use, the local address and port numbers, the foreign address and port numbers, and
the connection state.

15.2.5 Check Your Understanding - Port


Numbers
15.3 TCP and UDP Summary
15.3.1 What Did I Learn in this Module?
TCP and UDP
UDP is a 'best effort' delivery system that does not require acknowledgment of receipt. UDP is
preferable with applications such as streaming audio and VoIP. Acknowledgments would slow
down delivery and retransmissions are undesirable. Packets take a path from the source to a
destination. A few packets may be lost but it is usually not noticeable.

TCP packets take a path from the source to the destination. However, each of the packets has a
sequence number. TCP breaks up a message into small pieces known as segments. The
segments are numbered in sequence and passed to the IP process for assembly into packets.
TCP keeps track of the number of segments that have been sent to a specific host from a specific
application. If the sender does not receive an acknowledgment within a certain period of time, it
assumes that the segments were lost and retransmits them. Only the portion of the message that
is lost is resent, not the entire message.

Port Numbers
When a message is delivered using either TCP or UDP, the protocols and services requested are
identified by a port number. A port is a numeric identifier within each segment that is used to keep
track of specific conversations between a client and server. Every message that a host sends
contains both a source and destination port.

When a message is received by a server, it is necessary for the server to be able to determine
which service is being requested by the client. Clients are preconfigured to use a destination port
that is registered on the internet for each service.

Ports are assigned and managed by an organization known as the ICANN. Ports are broken into
three categories and range in number from 1 to 65,535:

 Well-Known Ports - Destination ports that are associated with common network
applications are identified as well-known ports. These ports are in the range of 1 to 1023.
 Registered Ports - Ports 1024 through 49151 can be used as either source or destination
ports. These can be used by organizations to register specific applications such as IM
applications.
 Private Ports - Ports 49152 through 65535 are often used as source ports. These ports
can be used by any application.
The source port number is dynamically generated by the sending device to identify a conversation
between two devices. This process allows multiple conversations to occur simultaneously. It is
common for a device to send multiple HTTP service requests to a web server at the same time.
Each separate HTTP conversation is tracked based on the source ports.

The client places a destination port number in the segment to tell the destination server what
service is being requested. A server can offer more than one service simultaneously, such as web
services on port 80 at the same time that it offers FTP connection establishment on port 21.

Unexplained TCP connections can pose a major security threat. They can indicate that something
or someone is connected to the local host. Sometimes it is necessary to know which active TCP
connections are open and running on a networked host. Netstat is an important network utility that
can be used to verify those connections. The command netstat is used to list the protocols in use,
the local address and port numbers, the foreign address and port numbers, and the connection
state.

15.3.2 Webster - Reflection Questions


I once ordered some furniture from one of those online stores. It was sent to me in three different
boxes, over the span of two weeks. I was not worried that anything was missing because I
received email updates that detailed the location of each box along its route from the store to my
home. That example is like TCP. All along the route, there are built-in checks to ensure that what
needs to be delivered gets delivered, and in the right order.

There is still a need for UDP in networking. I would not enjoy streaming a movie where it stops for
minutes at a time waiting for the network to send the next scene. Can you think of a good analogy
for UDP?

15.3.3 TCP and UDP Quiz


Module 16: Application Layer
Service
16.0.1 Webster - Why Should I Take this
Module?
Kishori needs to get access to a patient file. She has done this many times, but it is only now that
she is wondering how this process actually happens in a network. Where does this electronic
document come from? How is she able to access the hospital’s intranet? How is she able to
access the internet at all? All of this is possible because of application layer services.

Kishori has more to learn before she applies for that position that Rina mentioned. There are many
services that work at the application layer including some you’re familiar with such as FTP, DHCP,
and DNS. Just about any time you want to retrieve something that is not already located on your
computer, you will be the client requesting that the appropriate server send you that item. And of
course, by now you know that there will be protocols involved. Read on!

16.0.2 What Will I Learn in this Module?


Module Title: Application Layer Services

Module Objective: Explain the function of common application layer services.

16.1 The Client Server Relationship


16.1.1 Client and Server Interaction
Every day, we use the services available over networks and the internet to communicate with
others and to perform routine tasks. We rarely think of the servers, clients, and networking devices
that are necessary in order for us to receive an email, update our status on social media, or shop
for the best bargains in an online store. Most of the commonly used internet applications rely on
complicated interactions between various servers and clients.

The term server refers to a host running a software application that provides information or
services to other hosts that are connected to the network. A well-known example of an application
is a web server. There are millions of servers connected to the internet, providing services such as
web sites, email, financial transactions, music downloads, etc. A crucial factor to enable these
complex interactions to function is that they all use agreed upon standards and protocols.

Every day, we use the services available over networks and the internet to communicate with others and to perform
routine tasks. We rarely think of the servers, clients, and networking devices that are necessary in order for us to
receive an email, update our status on social media, or shop for the best bargains in an online store. Most of the
commonly used internet applications rely on complicated interactions between various servers and clients.
The term server refers to a host running a software application that provides information or services to other hosts that
are connected to the network. A well-known example of an application is a web server. There are millions of servers
connected to the internet, providing services such as web sites, email, financial transactions, music downloads, etc. A
crucial factor to enable these complex interactions to function is that they all use agreed upon standards and
protocols.

An example of client software is a web browser, like Chrome or Firefox. A single computer can
also run multiple types of client software. For example, a user can check email and view a web
page while instant messaging and listening to an audio stream. The table lists three common
types of server software.

16.1.2 Video - Web Server and Client IP


Interactions
16.1.3 URI, URN, and URL
Web resources and web services such as RESTful APIs are identified using a Uniform Resource
Identifier (URI). A URI is a string of characters that identifies a specific network resource. As
shown in the figure, a URI has two specializations:

 Uniform Resource Name (URN) - This identifies only the namespace of the resource (web page,
document, image, etc.) without reference to the protocol.
 Uniform Resource Locator (URL) - This defines the network location of a specific resource on the
network. HTTP or HTTPS URLs are typically used with web browsers. Other protocols such as FTP,
SFTP, SSH, and others can be used as a URL. A URL using SFTP might look like:
sftp://sftp.example.com.

These are the parts of a URI, as shown in the figure:

 Protocol/scheme - HTTPS or other protocols such as FTP, SFTP, mailto, and NNTP
 Hostname - www.example.com
 Path and file name - /author/book.html
 Fragment - #page155
Parts of a URI

Web resources and web services such as RESTful APIs are identified using a Uniform Resource Identifier (URI). A
URI is a string of characters that identifies a specific network resource. As shown in the figure, a URI has two
specializations:

 Uniform Resource Name (URN) - This identifies only the namespace of the resource (web page, document,
image, etc.) without reference to the protocol.
 Uniform Resource Locator (URL) - This defines the network location of a specific resource on the network.
HTTP or HTTPS URLs are typically used with web browsers. Other protocols such as FTP, SFTP, SSH, and
others can be used as a URL. A URL using SFTP might look like: sftp://sftp.example.com.

These are the parts of a URI, as shown in the figure:

 Protocol/scheme - HTTPS or other protocols such as FTP, SFTP, mailto, and NNTP
 Hostname - www.example.com
 Path and file name - /author/book.html
 Fragment - #page155

Parts of a URI

16.1.4 Video - Web Traffic in Packet Tracer


https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=86dc4c44-fbf1-57cd-ae84-301f3e3d7a08

16.1.5 Packet Tracer - The Client Interaction


In this activity, you will observe the client interaction between the server and PC.

The Client Interaction


Packet Tracer - The Client Interaction
Objectives
Observe the client interaction between the server and PC.

Background / Scenario
Clients, such as desktop PCs, request services from servers. The lab environment, using physical PCs and
servers, supports a full range of services. In a simulated environment, the number of services is limited. Packet
Tracer allows the addition of simulated network servers that support DHCP, DNS, HTTP, and TFTP. Packet
Tracer also supports the addition of simulated PCs that can request these services. This activity uses a simple
network consisting of a PC connected directly to a server configured to supply DNS services as well as hosting a
web page through an HTTP server. This activity will track the flow of traffic that happens when a web page is
requested, how the IP address of the web page is resolved, and the web page is delivered.

Instructions

Part 1: Enter simulation mode.


When Packet Tracer starts, it presents a logical view of the network in realtime mode.
Click the Simulation Mode to enter simulation mode. The simulation mode icon is located in the bottom right-
hand of the logical workplace.

Part 2: Set Event List Filters.


In simulation mode, the default is to capture all events. You will use filters to only capture DNS and HTTP events.
a. In the Event List Filters section, click Show All/None to clear all the checks.
b. Click Edit Filters. Under the IPv4 tab, select DNS. Under the Misc tab, select HTTP. Close the window when
done. The Event List Filters shows DNS and HTTP as the only visible events.

Part 3: Request a web page from the PC.


You will open a simulated web browser on the PC and request a web page from the server.
a. Click PC. Click Desktop tab and click Web Browser.
b. A simulated web browser opens. Type www.example.com into the URL box and click Go button to the right.
Minimize the PC window.

Part 4: Run the simulation.


a. In the Play Controls section of the Simulation Panel, click Play. The exchange between the PC and the
server is animated and the events are added to the Event List.
These events represent the PC’s request to resolve the URL to an IP address, the server’s providing of the IP
address, the PC's request for the web page, the server’s sending the web page in two segments, and the
PC’s acknowledging the web page.
b. Click View Previous Event to continue when the buffer is full.

Part 5: Access a specific PDU.


a. Restore the simulated PC window. Notice there is a web page displayed in the Web Browser. Minimize the
simulated browser window.
b. In the Simulation Panel Event List section, the last column contains a colored box that provides access to
detailed information about an event. Click the colored box in the first row for the first event. The PDU
Information window opens.

Part 6: Examine the contents of the PDU Information Window.


The first tab in the PDU Information window contains information about the inbound and/or outbound PDU as it
relates to the OSI model. Click Next Layer >> repeatedly to cycle through the inbound and outbound layers and
read the description in the box below the layers to get an overview of how the exchange works.
Examine the PDU information for the other events to get an overview of the entire exchange process.

16.2 Network Application Services


16.2.1 Common Network Application Services
What are the most common internet services that you use on a regular basis? For most people,
the list includes services such as internet searches, social media sites, video and audio streaming,
on-line shopping sites, email, and messaging. Each of these services relies on protocols from the
TCP/IP protocol suite to reliably communicate the information between the clients and the servers.

Some of the most common servers that provide these services are shown in the figure. A brief
description of each service is shown in the table.
What are the most common internet services that you use on a regular basis? For most people, the list includes
services such as internet searches, social media sites, video and audio streaming, on-line shopping sites, email, and
messaging. Each of these services relies on protocols from the TCP/IP protocol suite to reliably communicate the
information between the clients and the servers.

Some of the most common servers that provide these services are shown in the figure. A brief description of each
service is shown in the table.

16.2.2 Check Your Understanding -


Common Network Applications
16.3 Domain Name System
16.3.1 Video - DNS Servers
https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=b63878df-c0b8-5a39-813f-eba4d70c892c

16.3.2 A Note About Syntax Checker Activities


When you are learning how to modify device configurations, you might want to start in a safe, non-
production environment before trying it on real equipment. There are different simulation tools to
help build your configuration and troubleshooting skills. Because these are simulation tools, they
typically do not have all the functionality of real equipment. One such tool is the Syntax Checker.
In each Syntax Checker, you are given a set of instructions to enter a specific set of commands.
You cannot progress in Syntax Checker unless the exact and full command is entered as
specified. More advanced simulation tools, such as Packet Tracer, let you enter abbreviated
commands, much as you would do on real equipment.

16.3.3 Syntax Checker - The nslookup


Command
When you manually configure a device for network connectivity, recall that you also include a DNS
server address. For home networks, this configuration is typically handled by DHCP running on
the home router. Your ISP provides the DNS server address to your home router, and then your
home router uses DHCP to send the configuration to all the devices connected to its network.
When you type the name for a website, such as www.cisco.com, the DNS client running on your
device first asks the DNS server for the IP address, such as 172.230.155.162, before sending out
your HTTP request.

You can use the command nslookup to discover the IP addresses for any domain name. In this
Syntax Checker activity, practice entering the nslookup command in both Windows and Linux.
When you manually configure a device for network connectivity, recall that you also include a DNS server address.
For home networks, this configuration is typically handled by DHCP running on the home router. Your ISP provides
the DNS server address to your home router, and then your home router uses DHCP to send the configuration to all
the devices connected to its network. When you type the name for a website, such as www.cisco.com, the DNS client
running on your device first asks the DNS server for the IP address, such as 172.230.155.162, before sending out
your HTTP request.

You can use the command nslookup to discover the IP addresses for any domain name. In this Syntax Checker
activity, practice entering the nslookup command in both Windows and Linux.

16.4 Web Clients and Servers


16.4.1 Video - HTTP and HTML
https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=e2efef4a-94ef-5fcb-8360-4c86b873b696

16.4.2 HTTP and HTML


When a web client receives the IP address of a web server, the client browser uses that IP
address and port 80 to request web services. This request is sent to the server using the
Hypertext Transfer Protocol (HTTP).

When the server receives a port 80 request, the server responds to the client request and sends
the web page to the client. The information content of a web page is encoded using specialized
'mark-up' languages. The HyperText Markup Language (HTML) coding tells the browser how to
format the web page and what graphics and fonts to use. HTML is the most commonly used
language.

Click Play in the figure to view a client request for a web page.
When a web client receives the IP address of a web server, the client browser uses that IP address and port 80 to
request web services. This request is sent to the server using the Hypertext Transfer Protocol (HTTP).

When the server receives a port 80 request, the server responds to the client request and sends the web page to the
client. The information content of a web page is encoded using specialized 'mark-up' languages. The HyperText
Markup Language (HTML) coding tells the browser how to format the web page and what graphics and fonts to use.
HTML is the most commonly used language.

Click Play in the figure to view a client request for a web page.

The HTTP protocol is not a secure protocol; information could easily be intercepted by other users
as data is sent over the network. In order to provide security for the data, HTTP can be used with
secure transport protocols. Requests for secure HTTP are sent to port 443. These requests
use https in the site address in the browser, rather than http.

There are many different web servers and web clients available. The HTTP protocol and HTML
standards make it possible for these servers and clients from many different manufacturers to
work together seamlessly.

16.4.3 Packet Tracer - Observe Web Requests


Observe Web Requests
Packet Tracer - Observe Web Request
Objectives
View the client/server traffic sent from a PC to a web server when requesting web services.

Instructions

Part 1: Verify connectivity to the web server.


a. Click External Client and access the Command Prompt from the Desktop tab.
b. Use the ping command to reach the URL ciscolearn.web.com.
PC> ping ciscolearn.web.com
Notice the IP address included in the ping output. This address is obtained from the DNS server and resolves
to the domain name ciscolearn.web.com. All traffic forwarded across a network uses source and destination
IP address information.
c. Close the Command Prompt window but leave the External Client desktop window open.

Part 2: Connect to the web server.


a. From the Desktop window, access the Web Browser.
b. In the URL block, type ciscolearn.web.com.
*Be sure to read the web page that is displayed. Leave this page open.
c. Minimize the External Client window but do not close it.

Part 3: View the HTML code.


a. From the Logical topology, click ciscolearn.web.com server.
b. Click the Services tab > HTTP tab. Then next to the index.html file click (edit).
c. Compare the HTML markup code on the server that creates the Web Browser display page on the External
Client. This may require that you re-maximize the External Client window if it shrunk when you opened the
server window.
d. Close both the External Client and web server windows.

Part 4: Observe traffic between the client and the web server.
a. Enter Simulation mode by clicking the Simulation tab in the lower right-hand corner.
b. Double click the Simulation Panel to unlock it from the PT window. This allows you to move the Simulation
Panel to view the entire network topology.
c. View traffic by creating a Complex PDU in Simulation mode.
1) From the Simulation Panel, select Edit Filters.
2) Click the Misc tab to verify that only the boxes for TCP and HTTP are selected.
3) Add a Complex PDU by clicking the open envelope located above the Simulation mode icon.
4) Click the External Client to specify it as the source. The Create Complex PDU window will appear.
d. Specify the Create Complex PDU settings by changing the following within the Complex PDU window:
1) Under PDU Settings, Select Application should be set to HTTP.
2) Click the ciscolearn.web.com server to specify it as the destination device. Notice the IP address of the
web server will appear in the destination box within the complex PDU window
3) For the Starting Source Port, enter 1000.
4) Under Simulation Settings, select Periodic Interval and type 120 seconds.
e. Create the PDU by clicking the box Create PDU in the Create Complex PDU window.
1) Observe the traffic flow by clicking Play in the Simulation Panel. Speed up the animation by using the play
control slider.
When the Buffer Full window appears, click View Previous Events to close the window.
2) Scroll through the Event List. Notice the number of packets that traveled from source to destination. HTTP
is a TCP protocol, which requires connection establishment and acknowledgement of receipt of packets,
considerably increasing the amount of traffic overhead.

16.5 FTP Clients and Servers


16.5.1 File Transfer Protocol
In addition to web services, another common service used across the internet is one that allows
users to transfer files.
The File Transfer Protocol (FTP) provides an easy method to transfer files from one computer to
another. A host running FTP client software can access an FTP server to perform various file
management functions including file uploads and downloads.

The FTP server enables a client to exchange files between devices. It also enables clients to
manage files remotely by sending file management commands such as delete or rename. To
accomplish this, the FTP service uses two different ports to communicate between client and
server.

The example in the figure illustrates how FTP operates. To begin an FTP session, control
connection requests are sent to the server using destination TCP port 21. When the session is
opened, the server uses TCP port 20 to transfer the data files.

FTP client software is built into computer operating systems and into most web browsers. Stand-
alone FTP clients offer many options in an easy-to-use GUI-based interface.

In addition to web services, another common service used across the internet is one that allows users to transfer files.

The File Transfer Protocol (FTP) provides an easy method to transfer files from one computer to another. A host
running FTP client software can access an FTP server to perform various file management functions including file
uploads and downloads.

The FTP server enables a client to exchange files between devices. It also enables clients to manage files remotely by
sending file management commands such as delete or rename. To accomplish this, the FTP service uses two
different ports to communicate between client and server.

The example in the figure illustrates how FTP operates. To begin an FTP session, control connection requests are
sent to the server using destination TCP port 21. When the session is opened, the server uses TCP port 20 to transfer
the data files.

FTP client software is built into computer operating systems and into most web browsers. Stand-alone FTP clients
offer many options in an easy-to-use GUI-based interface.

Based on commands sent across the control connection, data can be downloaded from the server
or uploaded from the client.

16.5.2 Video - FTP Client Software


https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-70e144273519&tab=curriculum&view=8e0222ff-adab-
5b37-8a75-bf3377aac4b7
16.5.3 Packet Tracer - Use FTP Services
Packet Tracer - Use FTP Services
Addressing Table
Device Interface IP Address Subnet Mask

FTP Server (ftp.pka) NIC 209.165.200.226 255.255.255.224

Objectives
 Upload a file to an FTP server

 Download a file from an FTP server.

Background / Scenario

File Transfer Protocol (FTP) is a commonly used application to transfer files between clients and servers on
the network. The server is configured to run the service where clients connect, login, and transfer files. FTP
uses port 21 as the server command port to create the connection. FTP then uses port 20 for data transfer.

In this activity, you will upload a file to an FTP server. You will also download a file from an FTP server.

Instructions

Part 1: Upload a file to an FTP server.

In this part, you will locate the file sampleFile.txt and upload it to an FTP server.

Step 1: Locate the file.

a. Click PC-A.
b. Click Desktop.
c. Click Command Prompt.
d. At the prompt, click ? to list the available commands.
e. Enter dir to see the files on the PC. Notice that there is a sampleFile.txt file in the C:\ directory.

C: > dir
Volume in drive C has no label.
Volume Serial Number is 5E12-4AF3
Directory of C:\
12/31/1969 17:0 PM 26 sampleFile.txt
26 bytes 1 File(s)

Step 2: Connect to the FTP server

a. FTP to the FTP server at 209.165.200.226 or ftp.pka.

C:\> ftp 209.165.200.226


Trying to connect...209.165.200.226
Connected to 209.165.200.226

b. Enter the username student and password class to gain access.

220- Welcome to PT Ftp server


Username:student
331- Username ok, need password
Password:
230- Logged in
(passive mode On)
Step 3: Upload a file to an FTP server

a. Enter ? to see the commands available in the ftp client.

ftp> ?
?
cd
delete
dir
get
help
passive
put
pwd
quit
rename
ftp>

b. Enter dir to see the files available on the server.

ftp> dir
Listing /ftp directory from 192.168.1.3:
0 : asa842-k8.bin 5571584
1 : asa923-k8.bin 30468096
2 : c1841-advipservicesk9-mz.124-15.T1.bin 33591768
3 : c1841-ipbase-mz.123-14.T7.bin 13832032

c. Enter put sampleFile.txt to send the file to the server.

ftp> put sampleFile.txt


Writing file sampleFile.txt to 209.165.200.226:
File transfer in progress..
[Transfer complete - 26 bytes]
26 bytes copied in 0.08 secs (325 bytes/sec)
ftp>

d. Use the dir command again to list the contents of the FTP server to verify that the file has been
uploaded to the FTP server.

Part 2: Download a file from an FTP server.

You can also download a file from an FTP server. In this part, you will rename the file sampleFile.txt and
download it from the FTP server.

Step 1: Rename the file on an FTP server.

a. At the ftp> prompt, rename the file sampleFile.txt to sampleFile_FTP.txt.

ftp> rename sampleFile.txt sampleFile_FTP.txt


Renaming sampleFile.txt
ftp>
[OK Renamed file successfully from sampleFile.txt to sampleFile_FTP.txt]
ftp>

b. At the ftp> prompt, enter dir to verify the file has been renamed.

Step 2: Download the file from the FTP server.

a. Enter the command get sampleFile_FTP.txt to retrieve the file from the server.

ftp> get sampleFile_FTP.txt


Reading file sampleFile_FTP.txt from 209.165.200.226:
File transfer in progress...
[Transfer complete - 26 bytes]
26 bytes copied in 0.013 secs (2000 bytes/sec)
ftp>

b. Enter quit to exit the FTP client when finished.


c. Display the contents of the directory on the PC again to see the image file from the FTP server

Step 3: Delete the file from the FTP server.

a. Log into the FTP server again to delete the file sampleFile_FTP.txt.
b. Enter the command to delete the file sampleFile_FTP.txt from the server.

What command did you use to remove the file from the FTP server?

ANSWER:

ftp> delete sampleFile_FTP.txt

16.6 Virtual Terminals


16.6.1 Video - Remote Access with Telnet or
SSH
https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=e506e813-6c49-5126-984b-1035076b909d

16.6.2 Telnet
Long before desktop computers with sophisticated graphical interfaces existed, people used text-
based systems which were often just display terminals physically attached to a central computer.
After networks became available, people needed a way to remotely access the computer systems
in the same manner that they did with the directly-attached terminals.

Telnet was developed to meet that need. Telnet dates back to the early 1970s and is among the
oldest of the application layer protocols and services in the TCP/IP suite. Telnet provides a
standard method of emulating text-based terminal devices over the data network. Both the
protocol itself and the client software that implements the protocol are commonly referred to as
Telnet. Telnet servers listen for client requests on TCP port 23.

Appropriately enough, a connection using Telnet is called a virtual terminal (vty) session, or
connection. Rather than using a physical device to connect to the server, Telnet uses software to
create a virtual device that provides the same features of a terminal session with access to the
server’s command line interface (CLI).

In the figure, the client has remotely connected to the server via Telnet. The client is now able to
execute commands as if it were locally connected to the server.

Note: Telnet is not considered to be a secure protocol. SSH should be used in most environments
instead of Telnet. Telnet is used in several examples in this course for simplicity of configuration.
Long before desktop computers with sophisticated graphical interfaces existed, people used text-based systems
which were often just display terminals physically attached to a central computer. After networks became available,
people needed a way to remotely access the computer systems in the same manner that they did with the directly-
attached terminals.

Telnet was developed to meet that need. Telnet dates back to the early 1970s and is among the oldest of the
application layer protocols and services in the TCP/IP suite. Telnet provides a standard method of emulating text-
based terminal devices over the data network. Both the protocol itself and the client software that implements the
protocol are commonly referred to as Telnet. Telnet servers listen for client requests on TCP port 23.

Appropriately enough, a connection using Telnet is called a virtual terminal (vty) session, or connection. Rather than
using a physical device to connect to the server, Telnet uses software to create a virtual device that provides the same
features of a terminal session with access to the server’s command line interface (CLI).

In the figure, the client has remotely connected to the server via Telnet. The client is now able to execute commands
as if it were locally connected to the server.

Note: Telnet is not considered to be a secure protocol. SSH should be used in most environments instead of Telnet.
Telnet is used in several examples in this course for simplicity of configuration.

16.6.3 Security Issues with Telnet


After a Telnet connection is established, users can perform any authorized function on the server,
just as if they were using a command line session on the server itself. If authorized, they can start
and stop processes, configure the device, and even shut down the system.

Although the Telnet protocol can require a user to login, it does not support transporting encrypted
data. All data exchanged during Telnet sessions is transported as plaintext across the network.
This means that the data can be easily intercepted and understood.

The Secure Shell (SSH) protocol offers an alternate and secure method for server access. SSH
provides the structure for secure remote login and other secure network services. It also provides
stronger authentication than Telnet and supports transporting session data using encryption. As a
best practice, network professionals should always use SSH in place of Telnet, whenever
possible.
The figure illustrates how SSH is more secure than Telnet. Notice how the data captured by the
hacker when Telnet is used is clearly readable while the data captured when SSH is used is
encrypted and therefore more secure.

After a Telnet connection is established, users can perform any authorized function on the server, just as if they were
using a command line session on the server itself. If authorized, they can start and stop processes, configure the
device, and even shut down the system.

Although the Telnet protocol can require a user to login, it does not support transporting encrypted data. All data
exchanged during Telnet sessions is transported as plaintext across the network. This means that the data can be
easily intercepted and understood.

The Secure Shell (SSH) protocol offers an alternate and secure method for server access. SSH provides the structure
for secure remote login and other secure network services. It also provides stronger authentication than Telnet and
supports transporting session data using encryption. As a best practice, network professionals should always use
SSH in place of Telnet, whenever possible.

The figure illustrates how SSH is more secure than Telnet. Notice how the data captured by the hacker when Telnet is
used is clearly readable while the data captured when SSH is used is encrypted and therefore more secure.

16.6.4 Packet Tracer - Use Telnet and SSH


In this activity, you will establish remote session to a router using Telnet and SSH.

Packet Tracer - Use Telnet and SSH


Addressing Table
Device Interface IP Address Subnet Mask

HQ G0/0/1 64.100.1.1 255.255.255.0

PC0 NIC DHCP

PC1 NIC DHCP


Objectives

In this activity, you will establish a remote connection to a router using Telnet and SSH.

 Verify connectivity.

 Access a remote device.

Instructions

Part 1: Verify Connectivity

In this part, you will verify that the PC has IP addressing and can ping the remote router.

Step 1: Verify IP address on a PC.

a. From a PC, click Desktop. Click Command Prompt.


b. At the prompt, verify that the PC has an IP address from DHCP.

What command did you use to verify the IP address from DHCP?

Answer

ftp> ipconfig

Step 2: Verify connectivity to HQ.

Verify that you can ping the router HQ using the IP address listed in the Addressing Table.

Part 2: Access a Remote Device

In this part, you will attempt to establish a remote connection using Telnet and SSH.

Step 1: Telnet to HQ.

At the prompt, enter the command telnet 64.100.1.1

Were you successful? What was the output?

Answer

No.

C:\> telnet 64.100.1.1

Trying 64.100.1.1 ...Open

[Connection to 64.100.1.1 closed by foreign host]

Step 2: SSH to HQ.

The router is properly configured to not allow insecure Telnet access. You must use SSH.

At the prompt, enter the command ssh -l admin 64.100.1.1. Enter the password class when prompted

C:\> ssh -l admin 64.100.1.1


Password:
What is prompt after accessing the router successfully via SSH?

Answer

HQ#

16.7 Email and Messaging


16.7.1 Email Clients and Servers
Email is one of the most popular client/server applications on the internet. Email servers run server
software that enables them to interact with clients and with other email servers over the network.

Each mail server receives and stores mail for users who have mailboxes configured on the mail
server. Each user with a mailbox must then use an email client to access the mail server and read
these messages. Many internet messaging systems use a web-based client to access email.
Examples of this type of client include Microsoft 365, Yahoo, and Gmail.

Mailboxes are identified by the format: user@company.domain

Various application protocols used in processing email include SMTP, POP3, and IMAP4.

Email is one of the most popular client/server applications on the internet. Email servers run server software that
enables them to interact with clients and with other email servers over the network.

Each mail server receives and stores mail for users who have mailboxes configured on the mail server. Each user with
a mailbox must then use an email client to access the mail server and read these messages. Many internet
messaging systems use a web-based client to access email. Examples of this type of client include Microsoft 365,
Yahoo, and Gmail.

Mailboxes are identified by the format: user@company.domain

Various application protocols used in processing email include SMTP, POP3, and IMAP4.

16.7.2 Email Protocols


Simple Mail Transfer Protocol (SMTP)
SMTP is used by an email client to send messages to its local email server. The local server then
decides if the message is destined for a local mailbox or if the message is addressed to a mailbox
on another server.

If the server has to send the message to a different server, SMTP is used between those two
servers as well. SMTP requests are sent to port 25.

Click Play in the figure to see how SMTP is used to send email.

Simple Mail Transfer Protocol (SMTP)

SMTP is used by an email client to send messages to its local email server. The local server then decides if the
message is destined for a local mailbox or if the message is addressed to a mailbox on another server.

If the server has to send the message to a different server, SMTP is used between those two servers as well. SMTP
requests are sent to port 25.

Click Play in the figure to see how SMTP is used to send email.

Post Office Protocol (POP3)

A server that supports POP clients receives and stores messages addressed to its users. When
the client connects to the email server, the messages are downloaded to the client. By default,
messages are not kept on the server after they have been accessed by the client. Clients contact
POP3 servers on port 110.

Internet Message Access Protocol (IMAP4)

A server that supports IMAP clients also receives and stores messages addressed to its users.
However, unlike POP, IMAP keeps the messages in the mailboxes on the server, unless they are
deleted by the user. The most current version of IMAP is IMAP4 which listens for client requests
on port 143.

Many different email servers exist for the various network operating system platforms.

16.7.3 Text Messaging


Text messaging, shown in the figure, is one of the most popular communication tools in use today.
In addition, text messaging software is built into many online applications, smartphone apps, and
social media sites.

Text messaging, shown in the figure, is one of the most popular communication tools in use today. In addition, text
messaging software is built into many online applications, smartphone apps, and social media sites.

Both clients can simultaneously send and receive messages.

Text messages may also be called instant messages, direct messages, private messages, and
chat messages. Text messaging enables users to communicate or chat over the internet in real-
time. Text messaging services on a computer are usually accessed through a web-based client
that is integrated into a social media or information sharing site. These clients usually only connect
to other users of the same site.

There are also a number of standalone text message clients such as Cisco Webex Teams,
Microsoft Teams, WhatsApp, Facebook Messenger, and many others. These applications are
available for a wide variety of operating systems and devices. A mobile version is typically offered.
In addition to text messages, these clients support the transfer of documents, video, music, and
audio files.

16.7.4 Internet Phone Calls


Making telephone calls over the internet is becoming increasingly popular. An internet telephony
client uses peer-to-peer technology similar to that used by instant messaging, as shown in the
figure. IP telephony makes use of Voice over IP (VoIP) technology, which converts analog voice
signals into digital data. The voice data is encapsulated into IP packets which carry the phone call
through the network.

When the IP phone software has been installed, the user selects a unique name. This is so that
calls can be received from other users. Speakers and a microphone, built-in or separate, are
required. A headset is frequently plugged into the computer to serve as a phone.

Calls are made to other users of the same service on the internet, by selecting the username from
a list. A call to a regular telephone (landline or cell phone) requires using a gateway to access the
Public Switched Telephone Network (PSTN). Depending on the service, there may be charges
associated with this type of call. The protocols and destination ports used by internet telephony
applications can vary based on the software.
Making telephone calls over the internet is becoming increasingly popular. An internet telephony client uses peer-to-
peer technology similar to that used by instant messaging, as shown in the figure. IP telephony makes use of Voice
over IP (VoIP) technology, which converts analog voice signals into digital data. The voice data is encapsulated into IP
packets which carry the phone call through the network.

When the IP phone software has been installed, the user selects a unique name. This is so that calls can be received
from other users. Speakers and a microphone, built-in or separate, are required. A headset is frequently plugged into
the computer to serve as a phone.

Calls are made to other users of the same service on the internet, by selecting the username from a list. A call to a
regular telephone (landline or cell phone) requires using a gateway to access the Public Switched Telephone Network
(PSTN). Depending on the service, there may be charges associated with this type of call. The protocols and
destination ports used by internet telephony applications can vary based on the software.

16.7.5 Check Your Understanding - Email


and Messaging
16.8 Application Layer Services
Summary
16.8.1 What Did I Learn in this Module?
The Client Server Relationship
The term server refers to a host running a software application that provides information or
services to other hosts that are connected to the network, such as a web server. An example of
client software is a web browser, like Chrome or Firefox. A single computer can also run multiple
types of client software. A crucial factor to enable these complex interactions to function is that
they all use agreed upon standards and protocols.

The key characteristic of client/server systems is that the client sends a request to a server, and
the server responds by carrying out a function, such as sending the requested document back to
the client. The combination of a web browser and a web server is perhaps the most commonly
used instance of a client/server system.

A URI is a string of characters that identifies a specific network resource. The parts of a URI are
protocol/scheme, hostname, path and file name, and fragment. A URI has two specializations:

 URN - This identifies only the namespace of the resource without reference to the protocol.
 URL - This defines the network location of a specific resource on the network. HTTP or
HTTPS URLs are typically used with web browsers. Other protocols such as FTP, SFTP,
SSH, and others can be used as a URL.

Domain Name System


 The DNS provides a way for hosts to request the IP address of a specific server. DNS
names are registered and organized on the internet within specific high-level groups, or
domains. Some of the most common high-level domains on the internet are .com, .edu, and
.net.
 When the DNS server receives the request from a host, it checks its table to determine the
IP address associated with that web server. If the local DNS server does not have an entry
for the requested name, it queries another DNS server within the domain. When the DNS
server learns the IP address, that information is sent back to the host.

Web Clients and Servers


 When a web client receives the IP address of a web server, the client browser uses that IP
address and port 80 to request web services. This request is sent to the server using HTTP.
The HTTP protocol is not a secure protocol; information could easily be intercepted by other
users as data is sent over the network. To provide security for the data, HTTP can be used
with secure transport protocols. Requests for secure HTTP are sent to port 443. These
requests use https in the site address in the browser, rather than http.
 When the server receives a port 80 request, the server responds to the client request and
sends the web page to the client. The information content of a web page is encoded using
HTML. HTML coding tells the browser how to format the web page and what graphics and
fonts to use.
 There are many different web servers and web clients. The HTTP protocol and HTML
standards make it possible for these servers and clients from many different manufacturers
to work together seamlessly.

FTP Clients and Servers


 FTP provides an easy method to transfer files from one computer to another. A host
running FTP client software can access an FTP server to perform various file management
functions including file uploads and downloads. The FTP server enables a client to
exchange files between devices. It also enables clients to manage files remotely by sending
file management commands such as delete or rename. To accomplish this, the FTP service
uses two different ports to communicate between client and server. To begin an FTP
session, control connection requests are sent to the server using destination TCP port 21.
When the session is opened, the server uses TCP port 20 to transfer the data files.
 Most client operating systems such as Windows, Mac OS, and Linux include a command-
line interface for FTP. There is also GUI-based FTP client software that provides a simple
drag-and-drop interface for FTP.

Virtual Terminals
 Telnet provides a standard method of emulating text-based terminal devices over the data
network. Both the protocol itself and the client software that implements the protocol are
commonly referred to as Telnet. Telnet servers listen for client requests on TCP port 23. A
connection using Telnet is called a vty session, or connection. Rather than using a physical
device to connect to the server, Telnet uses software to create a virtual device that provides
the same features of a terminal session with access to the server’s CLI.
 Telnet is not considered to be a secure protocol. Although the Telnet protocol can require a
user to login, it does not support transporting encrypted data. All data exchanged during
Telnet sessions is transported as plaintext across the network. This means that the data
can be easily intercepted and understood.
 SSH provides the structure for secure remote login and other secure network services. It
also provides stronger authentication than Telnet and supports transporting session data
using encryption. Network professionals should always use SSH in place of Telnet,
whenever possible.

Email and Messaging


 Each mail server receives and stores mail for users who have mailboxes configured on the
mail server. Each user with a mailbox must then use an email client to access the mail
server and read these messages. Many internet messaging systems use a web-based
client to access email including Microsoft 365, Yahoo, and Gmail. Application protocols
used in processing email include SMTP, POP3, and IMAP4.
 SMTP is used by an email client to send messages to its local email server. The local
server then decides if the message is destined for a local mailbox or if the message is
addressed to a mailbox on another server. If the server must send the message to a
different server, SMTP is used between those two servers. SMTP requests are sent to port
25. A server that supports POP clients receives and stores messages addressed to its
users. When the client connects to the email server, the messages are downloaded to the
client. By default, messages are not kept on the server after they have been accessed by
the client. Clients contact POP3 servers on port 110.
 A server that supports IMAP clients also receives and stores messages addressed to its
users. However, unlike POP, IMAP keeps the messages in the mailboxes on the server,
unless they are deleted by the user. The most current version of IMAP is IMAP4 which
listens for client requests on port 143.
 Text messages may be called instant messages, direct messages, private messages, and
chat messages. Text messaging enables users to chat over the internet in real-time. Text
messaging services on a computer are usually accessed through a web-based client that is
integrated into a social media or information sharing site. These clients usually only connect
to other users of the same site.
 An internet telephony client uses peer-to-peer technology similar to that used by instant
messaging. IP telephony uses VoIP, which converts analog voice signals into digital data.
The voice data is encapsulated into IP packets which carry the phone call through the
network.

16.8.2 Webster - Reflection Questions


 As you now know, when you want to access a file or a website that is not located on your
computer, your computer becomes the ‘client’ sending a request to a ‘server’. Maybe you
are only looking at the file. What if you need to download a copy of it to your computer?
Perhaps you are just visiting a website. All of this occurs at the application layer of the
network. What else can you do online because of the protocols and services found in the
application layer?

16.8.3 Application Layer Services Quiz


Module 17: Network Testing
Utilities
17.0 Introduction
17.0.1 Webster - Why Should I Take this
Module?
Kishori tries to reach a website using her desktop computer at her nursing station. She gets an
error message when trying to reach the site. She checks the wired connection, and it is fine. She
uses her laptop to try to reach that same website with no success. On the desktop, she goes to
the command prompt and pings a different website on the internet. Now she realizes she has no
connection. She calls the IT department. Madhav comes to the station to further investigate the
issue. Madhav pings a website. Kishori explains that she tried that already. Then he pings the
default gateway and receives a reply. The router is working. It is the ISP that is down. Madhav is
impressed that Kishori has learned so much over the past few months. He tells her that she should
apply for that promotion and that she can use him as a reference!

Are you ready to learn some troubleshooting commands? Keep reading!

17.0.2 What Will I Learn in this Module?


Module Title: Network Testing Utilities

Module Objective: Use various tools to test and troubleshoot network connectivity.

17.1 Troubleshooting Commands


17.1.1 Overview of Troubleshooting Commands
A number of software utility programs are available that can help identify network problems. Most
of these utilities are provided by the operating system as command line interface (CLI) commands.
The syntax for the commands may vary between operating systems.

Some of the available utilities include:

 ipconfig - Displays IP configuration information.


 ping - Tests connections to other IP hosts.
 netstat - Displays network connections.
 tracert - Displays the route taken to the destination.
 nslookup - Directly queries the name server for information on a destination domain.
17.1.2 The ipconfig Command
 When a device does not get an IP address, or has an incorrect IP configuration, it cannot
communicate on the network or access the internet. On Windows devices, you can view the
IP configuration information with the ipconfig command at the command prompt.
The ipconfig command has several options that are helpful including /all, /release,
and /renew.
 Click below for examples of the ipconfig command.

ipconfig
The ipconfig command is used to display the current IP configuration information for a host.
Issuing this command from the command prompt will display the basic configuration information
including IP address, subnet mask, and default gateway.

ipconfig /all
The command ipconfig /all displays additional information including the MAC address, IP
addresses of the default gateway, and the DNS servers. It also indicates if DHCP is enabled, the
DHCP server address, and lease information.

How can this utility assist in the troubleshooting process? Without an appropriate IP configuration,
a host cannot participate in communications on a network. If the host does not know the location
of the DNS servers, it cannot translate names into IP addresses.
ipconfig /release and ipconfig /renew
If IP addressing information is assigned dynamically, the command ipconfig /release will release
the current DHCP bindings. ipconfig /renew will request fresh configuration information from the
DHCP server. A host may contain faulty or outdated IP configuration information and a simple
renewal of this information is all that is required to regain connectivity.

If, after releasing the IP configuration, the host is unable to obtain fresh information from the
DHCP server, it could be that there is no network connectivity. Verify that the NIC has an
illuminated link light, indicating that it has a physical connection to the network. If this does not
solve the problem, it may be an issue with the DHCP server or network connections to the DCHP
server.
17.1.3 Packet Tracer - Use the ipconfig
Command
Use the ipconfig Command
Packet Tracer - Use the ipconfig Command
Objectives
 Use the ipconfig command to identify incorrect configuration on a PC.

Background / Scenario
A small business owner cannot connect to the internet with one of the four PCs in the office. All the PCs are
configured with static IP addressing using 192.168.1.0 /24 network. The PCs should be able to
access www.cisco.pka webserver. Use the ipconfig /all command to identify which PC is incorrectly configured.

Instructions

Part 1: Verify Configurations


a. Access the Command Prompt on each PC and type the command ipconfig /all at the prompt.
b. Examine the IP address, subnet mask, and default gateway configuration for each PC. Be sure to record this
IP configuration for each PC to help identify any PCs that are incorrectly configured.

Part 2: Correct Any Misconfigurations


a. Select the PC that is incorrectly configured.
b. Click the Desktop tab > IP Configuration tab to correct the misconfiguration.
End of document

17.1.4 The ping Command


Probably the most commonly used network utility is ping. Most IP enabled devices support some
form of the ping command in order to test whether or not network devices are reachable through
the IP network.

If the IP configuration appears to be correctly configured on the local host, next, test network
connectivity by using ping. The ping command can be followed by either an IP address or the
name of a destination host. In the example, the user pings the default gateway at 10.10.10.1 and
then pings www.cisco.com.

When a ping is sent to an IP address, a packet known as an echo request is sent across the
network to the IP address specified. If the destination host receives the echo request, it responds
with a packet known as an echo reply. If the source receives the echo reply, connectivity is verified
by the reply from the specific IP address. The ping is not successful if a message such as request
timed out or general failure appears.

If a ping command is sent to a name, such as www.cisco.com, a packet is first sent to a DNS
server to resolve the name to an IP address. After the IP address is obtained, the echo request is
forwarded to the IP address and the process proceeds. If a ping to the IP address succeeds, but a
ping to the name does not, there is most likely a problem with DNS.

17.1.5 Ping Results


If ping commands to both the name and IP address are successful, but the user is still unable to
access the application, then the problem most likely resides in the application on the destination
host. For example, it may be that the requested service is not running.

If neither ping is successful, then network connectivity along the path to the destination is most
likely the problem. If this occurs, it is common practice to ping the default gateway. If the ping to
the default gateway is successful, the problem is not local. If the ping to the default gateway fails,
the problem resides on the local network.

In some cases, the ping may fail but network connectivity is not the problem. A ping may fail due
to the firewall on the sending or receiving device, or a router along the path that is blocking the
pings.

The basic ping command usually issues four echoes and waits for the replies to each one. It can,
however, be modified to increase its usefulness. The options listed in the figure display additional
features available.

17.1.6 Packet Tracer - Use the ping Command


Packet Tracer - Use the ping Command
Objectives

Use the ping command to identify an incorrect configuration on a PC.

Background / Scenario

A small business owner learns that some users are unable to access a website. All PCs are configured with
static IP addressing. Use the ping command to identify the issue.
Instructions

Part 1: Verify connectivity.

Access the Desktop tab > Web Browser of each PC and enter the URL www.cisco.pka. Identify any PCs
that are not connecting to the web server.

Note: All the devices require time to complete the boot process. Please allow up to one minute before
receiving a web response.

Which PCs are unable to connect to the web server?

Answer
PC2

Part 2: Ping the web server from PC with connectivity issues.

a. On the PC, access the Command Prompt from the Desktop tab.
b. At the prompt, enter ping www.cisco.pka.

Did the ping return a reply? What is the IP address displayed in the reply, if any?

Answer
Reply was returned with 192.15.2.10 as the IP address for www.cisco.pka.

Part 3: Ping the web server from correctly configured PCs.

a. On the PC, access the Command Prompt from the Desktop tab.
b. At the prompt, enter ping www.cisco.pka.

Did the ping return a reply? What is the IP address returned, if any?

Answer
Answers will vary. The default gateway is 192.168.1.1 in this example. For a home network using a
wireless router, the default gateway address can be the same IP address as the wireless router.

Part 4: Ping the IP address of the web server from PCs with connectivity issues.

a. On the PC, access the Command Prompt from the Desktop tab.
b. Attempt to reach the IP address of the web server with the ping command.

Did the ping return a reply? If so, then the PC can reach the web server via IP address, but not domain
name. This could indicate a problem with the DNS server configuration on the PC.

Part 5: Compare the DNS server information on the PCs.

a. Access the Command Prompt of the PCs without any issues.


b. Using the command ipconfig /all, examine the DNS server configuration on the PCs without any
issues.
c. Access the Command Prompt of the PCs with connectivity issues.
d. Using the command ipconfig /all, examine the DNS server configuration on the PCs with
misconfigurations. Do the two configurations match?
Part 6: Make any necessary configuration changes on the PCs.

a. Navigate to the Desktop tab of the PCs with issues, make any necessary configuration changes
in IP Configuration.
b. Using the Web Browser within the Desktop tab, connect to www.cisco.pka to verify that the
configuration changes resolved the problem.

17.2 Network Testing Utilities


Summary
17.2.1 What Did I Learn in this Module?
Troubleshooting Commands
A number of software utility programs are available that can help identify network problems. Most
of these utilities are provided by the operating system as CLI commands.

Some of the available utilities include:

 ipconfig - Displays IP configuration information.


 ping - Tests connections to other IP hosts.
 netstat - Displays network connections.
 tracert - Displays the route taken to the destination.
 nslookup - Directly queries the name server for information on a destination domain.

The ipconfig command is used to display the current IP configuration information for a host.
Issuing this command from the command prompt will display the basic configuration information
including IP address, subnet mask, and default gateway.

The command ipconfig /all displays additional information including the MAC address, IP
addresses of the default gateway, and the DNS servers. It also indicates if DHCP is enabled, the
DHCP server address, and lease information.

If IP addressing information is assigned dynamically, the command ipconfig /release will release
the current DHCP bindings. ipconfig /renew will request fresh configuration information from the
DHCP server. A host may contain faulty or outdated IP configuration information and a simple
renewal of this information is all that is required to regain connectivity.

Probably the most commonly used network utility is ping. Most IP enabled devices support some
form of the ping command in order to test whether or not network devices are reachable through
the IP network. When a ping is sent to an IP address, a packet known as an echo request is sent
across the network to the IP address specified. If the destination host receives the echo request, it
responds with a packet known as an echo reply. If the source receives the echo reply, connectivity
is verified by the reply from the specific IP address.

17.2.2 Webster - Reflection Questions


Congratulations! You’ve made it all the way through this course! Way back in the first module of
this course, I mentioned that I can troubleshoot and fix my web. In fact, I can even make it
stronger and more secure. Being able to do that is very satisfying. You have learned about the
many commands that you can use to troubleshoot and fix your own network. You can use these
commands to investigate your network, even if it is performing as it should. Which command(s)
would you start with?
17.2.3 Network Testing Utilities Quiz
Checkpoint Exam: Protocols for
Specific Tasks
Welcome to the Protocols for Specific Tasks Checkpoint Exam.

There are 20 questions in total.

Items on this exam support the following networking skills:

 Use application layer services to accomplish real-world tasks.


You must achieve 70% to pass this exam. You have unlimited attempts to pass the exam.
Feedback is provided to direct you to areas that may require additional attention.

Cisco Networking Academy content is copyrighted and the unauthorized posting, distribution or
sharing of this exam content is prohibited.

© 2023, Cisco Systems, Inc.


Course Final Exam
Welcome to the Networking Basics Course Final Exam.

This assessment covers the core concepts and skills presented in Modules 1 - 17 of
the Networking Basics course.

There are 50 questions in total and you need to score at least 70% to pass and achieve
your Cisco badge.

You have unlimited attempts to pass the exam. Feedback is provided to direct you to areas that
may require additional attention.

Cisco Networking Academy content is copyrighted and the unauthorized posting, distribution or
sharing of this exam content is prohibited.

© 2022, Cisco Systems, Inc.

You might also like