Cisco Networking Basics
Cisco Networking Basics
Cisco Networking Basics
id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=0feda870-2a76-5569-a63d-72ef5f151bec
Check your Skills
Networking Basics
Before you start the course, answer questions to check how much you already know.
Instructions
My Knowledge Check uses advanced Artificial Intelligence (AI) to assess your knowledge and skill on every topic in
the course. Your results can help you decide how to navigate through the course. You may choose to spend more
time in areas where you need additional focus or speed through areas where you already have a strong
understanding.
My Knowledge Check is completely optional. You can come back to My Knowledge Check anytime to review your
history and take it again to see your learning progress.
Click the My Knowledge Check button to begin. Read each question, select your answer, and submit. If you do not
know an answer, that's ok! To get accurate results, try not to guess. Simply choose 'I don't know the answer' and
there is no penalty. At the end of the My Knowledge Check, you can review all your answers and make changes
before submitting.
Cisco Packet Tracer may be referenced in My Knowledge Check. If you are unfamiliar with Cisco
Packet
Tracer and curious to learn more, check out
First Time in this Course
The Networking Basics course teaches the fundamentals of networking by covering the basic
concepts and skills needed to set up and manage your small office or home office (SOHO)
network. The learner is presented with an engaging and exploratory view of networks, the devices
that comprise them, how they work, and basic troubleshooting tools and techniques. The goal of
this course is to provide the learner with an engaging, exploratory view of networks, including the
internet. Upon completion of the Networking Basics course, students will be able to perform the
following tasks:
Packet Tracer
Packet Tracer simulates the internal workings of a network and is used in this course.
If you are new to Packet Tracer, take this FREE, short, online course now: Getting Started with
Cisco Packet Tracer.
You can use your smartphone, tablet, or desktop to access your course; however, Packet Tracer
activities, as well as some other activities, quizzes, and exams are best experienced using a PC.
Lab Environment
No equipment is necessary
You can find additional FAQs by visiting our virtual assistant, Morgan. Click the chat icon in the top
right corner to choose from a list of topics or enter your question. Morgan’s help includes
information about Packet Tracer, certificates, and badging.
Module 1: Communication in a
Connected World
1.0 Introduction
Normally, when people use the term internet, they are not referring to the physical connections in
the real world. Rather, they tend to think of it as a formless collection of connections. It is the
“place” people go to find or share information.
Everything that you access online is located somewhere on the global internet. Social media sites,
multiplayer games, messaging centers that provide email, online courses — all of these internet
destinations are connected to local networks that send and receive information through the
internet.
Think about all of the interactions that you have during the day which require you to be online.
1.1.4 Local Networks
A tabbed content container. Content can be text, graphic or both.
Local networks come in all sizes. They can range from simple networks consisting of two
computers, to networks connecting hundreds of thousands of devices. Networks installed in small
offices, or homes and home offices, are referred to as small office/home office (SOHO) networks.
SOHO networks let you share resources such as printers, documents, pictures, and music,
between a few local users.
In business, large networks can be used to advertise and sell products, order supplies, and
communicate with customers. Communication over a network is usually more efficient and less
expensive than traditional forms of communication, such as regular mail or long distance phone
calls. Networks allow for rapid communication such as email and instant messaging, and provide
consolidation and access to information stored on network servers.
Business and SOHO networks usually provide a shared connection to the internet. The internet is
considered a "network of networks" because it is literally made up of thousands of local networks
that are connected to each other.
The internet connects more computing devices than just desktop and laptop computers. There are
devices all around that you may interact with on a daily basis that are also connected to the
internet. These include mobile devices, home devices, and a variety of other connected devices.
Smartphone
Smartphones are able to connect to the internet from almost anywhere. Smartphones
combine the functions of many different products together, such as a telephone, camera,
GPS receiver, media player, and touch screen computer.
Tablet
Tablets, like smartphones, also have the functionality of multiple devices. With the
additional screen size, they are ideal for watching videos and reading magazines or books.
With on-screen keyboards, users are able to do many of the things they used to do on their
laptop computer, such as composing emails or browsing the web.
Smartwatch
A smartwatch can connect to a smartphone to provide the user with alerts and messages.
Additional functions, such as heart rate monitoring and counting steps, like a pedometer,
can help people who are wearing the device to track their health.
Smart Glasses
A wearable computer in the form of glasses, such as Google Glass, contains a tiny screen
that displays information to the wearer in a similar fashion to the Head-Up Display (HUD) of
a fighter pilot. A small touch pad on the side allows the user to navigate menus while still
being able to see through the smart glasses.
Appliances
Household appliances such as refrigerators, ovens, and dishwashers can be connected to
the internet. This allows the homeowner to power them on or off, monitor the status of the
appliance, and also be alerted to preset conditions, such as when the temperature in the
refrigerator rises above an acceptable level.
Smart TV
A smart TV can be connected to the internet to access content without the need for TV
service provider equipment. Also, a smart TV can allow a user to browse the web, compose
email, or display video, audio, or photos stored on a computer.
Gaming Console
Gaming consoles can connect to the internet to download games and play with friends
online.
There are also many connected devices found in the world outside your home that provide
convenience and useful, or even vital, information.
Smart Cars
Many modern cars can connect to the internet to access maps, audio and video content, or
information about a destination. They can even send a text message or email if there is an
attempted theft or call for assistance in case of an accident. These cars can also connect to
smartphones and tablets to display information about the different engine systems, provide
maintenance alerts, or display the status of the security system.
RFID Tags
Radio frequency identification (RFIDs) tags can be placed in or on objects to track them or monitor
sensors for many conditions.
Medical Devices
Medical devices such as pacemakers, insulin pumps, and hospital monitors provide users or
medical professionals with direct feedback or alerts when vital signs are at specific levels.
A bit is stored and transmitted as one of two possible discrete states. This can include two
directions of magnetization, two distinct voltage or current levels, two distinct levels of light
intensity, or any other physical system of two discrete states. For example, a light switch can be
either On or Off; in binary representation, these states would correspond to 1 and 0 respectively.
Every input device (mouse, keyboard, voice-activated receiver) will translate human interaction
into binary code for the CPU to process and store. Every output device (printer, speakers,
monitors, etc.) will take binary data and translate it back into human recognizable form. Within the
computer itself, all data is processed and stored as binary.
Computers use binary codes to represent and interpret letters, numbers and special characters
with bits. A commonly used code is the American Standard Code for Information Interchange
(ASCII). With ASCII, each character is represented by eight bits. For example:
Each group of eight bits, such as the representations of letters and numbers, is known as a byte.
Codes can be used to represent almost any type of information digitally including computer data,
graphics, photos, voice, video, and music.
In the figure, enter up to five characters in the Characters field, then click the Show Me button to
see the ASCII bit translation. Click Reset to enter a different group of characters.
Click Play in the figure to see an animation of the three types of signal transmissions.
In most homes and small businesses, network signals are transmitted across copper wires
(cables) or Wi-Fi enabled wireless connections. Larger networks employ fiber-optic cables in order
to reliably carry signals for longer distances.
1.2.4 Check Your Understanding - Data
Transmission
1.3 Bandwidth and Throughput
1.3.1 Bandwidth
Streaming a movie or playing a multiplayer game requires reliable, fast connections. To support
these “high bandwidth” applications, networks have to be capable of transmitting and receiving bits
at a very high rate.
Different physical media support the transfer of bits at different speeds. The rate of data transfer is
usually discussed in terms of bandwidth and throughput.
Bandwidth is the capacity of a medium to carry data. Digital bandwidth measures the amount of
data that can flow from one place to another in a given amount of time. Bandwidth is typically
measured in the number of bits that (theoretically) can be sent across the media in a second.
Common bandwidth measurements are as follows:
The table shows the commonly used units of measure for bandwidth:
1.3.2 Throughput
Like bandwidth, throughput is the measure of the transfer of bits across the media over a given
period of time. However, due to a number of factors, throughput does not usually match the
specified bandwidth. Many factors influence throughput including:
The amount of data being sent and received over the connection
The types of data being transmitted
The latency created by the number of network devices encountered between source and
destination
Latency refers to the amount of time, including delays, for data to travel from one given point to
another.
Throughput measurements do not take into account the validity or usefulness of the bits being
transmitted and received. Many messages received through the network are not destined for
specific user applications. An example would be network control messages that regulate traffic
and correct errors.
In an internetwork or network with multiple segments, throughput cannot be faster than the slowest
link of the path from sending device to the receiving device. Even if all or most of the segments
have high bandwidth, it will only take one segment in the path with lower bandwidth to create a
slowdown of the throughput of the entire network.
There are many online speed tests that can reveal the throughput of an internet connection.
The internet is not owned by any individual or group. The internet is a worldwide collection of
interconnected networks (internetwork or internet for short), cooperating with each other to
exchange information using common standards. Through telephone wires, fiber-optic cables,
wireless transmissions, and satellite links, internet users can exchange information in a variety of
forms.
Small home networks connect a few computers to each other and to the internet. The SOHO
network allows computers in a home office or a remote office to connect to a corporate network, or
access centralized, shared resources. Medium to large networks, such as those used by
corporations and schools, can have many locations with hundreds or thousands of interconnected
hosts. The internet is a network of networks that connects hundreds of millions of computers
world-wide.
There are devices all around that you may interact with on a daily basis that are also connected to
the internet. These include mobile devices such as smartphones, tablets, smartwatches, and
smart glasses. Things in your home can be connected to the internet such as a security system,
appliances, your smart TV, and your gaming console. Outside your home there are smart cars,
RFID tags, sensors and actuators, and even medical devices which can be connected.
Data Transmission
The term bit is an abbreviation of “binary digit” and represents the smallest piece of data. Each bit
can only have one of two possible values, 0 or 1.
Bandwidth is the capacity of a medium to carry data. Digital bandwidth measures the amount of
data that can flow from one place to another in a given amount of time. Bandwidth is typically
measured in the number of bits that (theoretically) can be sent across the media in a second.
Common bandwidth measurements are as follows:
Throughput does not usually match the specified bandwidth. Many factors influence throughput
including:
The amount of data being sent and received over the connection
The latency created by the number of network devices encountered between source and
destination
Latency refers to the amount of time, including delays, for data to travel from one given point to
another.
https://itexamanswers.net/question/which-type-of-connected-device-is-placed-on-objects-to-track-and-
monitor-them
https://itexamanswers.net/question/which-two-numbers-are-possible-values-of-a-bit-choose-two
https://itexamanswers.net/1-4-3-communications-in-a-connected-world-quiz-answers.html
https://itexamanswers.net/module-1-6-3-physical-layer-quiz-answers.html
Module 2: Network Components,
Types, and Connections
2.0 Introduction
2.0.1 Webster - Why Should I Take this Module?
Kishori does not yet understand network infrastructure device roles in the network, including end
devices, intermediate devices, and network media. When she first started her nursing career, she
was writing patient medical notes in a paper notebook! At home, Kishori only has a laptop, a
smartphone, and a tablet. This makes her most familiar with end devices, or hosts. She
understands that those devices are connected to the internet somehow through that box in the
corner of her living room. At work she uses a laptop, a desktop, a printer, and other network-
connected hospital equipment. She wants to learn more about network components and how they
all connect.
Kishori leaves her patient's room, sets down her laptop, and continues her work on the desktop
computer at the nursing station. She wonders how the electronic notes she just took on the laptop
appear on the patient’s record on the desktop computer. How are they connected? How does the
computer reach the internet in the first place? Kishori has a lot to learn, and you might too! Take
this module to learn more.
Clients are computer hosts that have software installed that enables the hosts to request and
display the information obtained from the server. An example of client software is a web browser,
such as Internet Explorer, Safari, Mozilla Firefox, or Chrome.
The simplest P2P network consists of two directly connected computers using either a wired or
wireless connection. Both computers are then able to use this simple network to exchange data
and services with each other, acting as either a client or a server as necessary.
Multiple PCs can also be connected to create a larger P2P network, but this requires a network
device, such as a switch, to interconnect the computers.
The main disadvantage of a P2P environment is that the performance of a host can be slowed
down if it is acting as both a client and a server at the same time. The figure lists some of the
advantages and disadvantages of peer-to-peer networks.
In larger businesses, because of the potential for high amounts of network traffic, it is often
necessary to have dedicated servers to support the number of service requests.
The advantages and disadvantages of P2P networking are summarized in the figure.
The advantages of peer-to-peer networking:
Easy to set up
Less complex
Lower cost because network devices and dedicated servers may not be required
Can be used for simple tasks such as transferring files and sharing printers
No centralized administration
Not as secure
Not scalable
All devices may act as both clients and servers which can slow their performance
Additionally, a single computer can run multiple types of server software. In a home or small
business, it may be necessary for one computer to act as a file server, a web server, and an email
server.
A single computer can also run multiple types of client software. There must be client software for
every service required. With multiple clients installed, a host can connect to multiple servers at the
same time. For example, a user can check email and view a web page while instant messaging
and listening to internet radio.
The network infrastructure contains three categories of hardware components, as shown in the
figure:
End devices
Intermediate devices
Network media
Devices and media are the physical elements, or hardware, of the network. Hardware is often the
visible components of the network platform such as a laptop, PC, switch, router, wireless access
point, or the cabling used to connect the devices. Occasionally, some components may not be so
visible. In the case of wireless media, messages are transmitted through the air using invisible
radio frequencies or infrared waves.
Make a list of the network infrastructure components installed in your home network. Include the
cables or wireless access points that provide your network connections.
2.2.3 End Devices
The network devices that people are most familiar with are called end devices, or hosts. These
devices form the interface between users and the underlying communication network.
An end device (or host) is either the source or destination of a message transmitted over the
network, as shown in the animation. In order to uniquely identify hosts, addresses are used. When
a host initiates communication, it uses the address of the destination host to specify where the
message should be sent.
Click Play in the figure to see an animation of data flowing through a network.
Many ISPs also offer additional services to their contract subscribers, as shown in the figure.
These services can include email accounts, network storage, and website hosting and automated
backup or security services.
ISPs are critical to communications across the global internet. Each ISP connects to other ISPs to
form a network of links that interconnect users all over the world. ISPs are connected in a
hierarchical manner that ensures that internet traffic generally takes the shortest path from the
source to the destination.
The internet backbone is like an information super highway that provides high-speed data links to
connect the various service provider networks in major metropolitan areas around the world. The
primary medium that connects the internet backbone is fiber-optic cable. This cable is typically
installed underground to connect cities within continents. Fiber-optic cables also run under the sea
to connect continents, countries, and cities.
2.3.2 ISP Connections
The interconnection of ISPs that forms the backbone of the internet is a complex web of fiber-optic
cables with expensive networking switches and routers that direct the flow of information between
source and destination hosts. Average home users are not aware of the infrastructure outside of
their network. For a home user, connecting to the ISP is a fairly uncomplicated process.
The top portion of the figure displays the simplest ISP connection option. It consists of a modem
that provides a direct connection between a computer and the ISP. This option should not be used
though, because your computer is not protected on the internet.
As shown in the bottom portion of the figure, a router is required to securely connect a computer to
an ISP. This is the most common connection option. It consists of using a wireless integrated
router to connect to the ISP. The router includes a switch to connect wired hosts and a wireless
AP to connect wireless hosts. The router also provides client IP addressing information and
security for inside hosts.
2.3.3 Cable and DSL Connections
Most home network users do not connect to their service providers with fiber-optic cables. The
figure illustrates common connection options for small office and home users. The two most
common methods are as follows:
Cable - Typically offered by cable television service providers, the internet data signal is
carried on the same coaxial cable that delivers cable television. It provides a high
bandwidth, always on, connection to the internet. A special cable modem separates the
internet data signal from the other signals carried on the cable and provides an Ethernet
connection to a host computer or LAN.
DSL - Digital Subscriber Line provides a high bandwidth, always on, connection to the
internet. It requires a special high-speed modem that separates the DSL signal from the
telephone signal and provides an Ethernet connection to a host computer or LAN. DSL runs
over a telephone line, with the line split into three channels. One channel is used for voice
telephone calls. This channel allows an individual to receive phone calls without
disconnecting from the internet. A second channel is a faster download channel, used to
receive information from the internet. The third channel is used for sending or uploading
information. This channel is usually slightly slower than the download channel. The quality
and speed of the DSL connection depends mainly on the quality of the phone line and the
distance from the central office of your phone company The farther you are from the central
office, the slower the connection.
Cellular
Cellular internet access uses a cell phone network to connect. Wherever you can get a cellular
signal, you can get cellular internet access. Performance will be limited by the capabilities of the
phone and the cell tower to which it is connected. The availability of cellular internet access is a
real benefit for people in areas that would otherwise have no internet connectivity at all, or for
people who are constantly on the move. The downside of cellular connectivity is that the carrier
usually meters the bandwidth usage of the connection and may charge extra for bandwidth that
exceeds the contract data plan.
Satellite
Satellite service is a good option for homes or offices that do not have access to DSL or cable.
Satellite dishes (see figure) require a clear line of sight to the satellite and so might be difficult in
heavily wooded areas or places with other overhead obstructions. Speeds will vary depending on
the contract, though they are generally good. Equipment and installation costs can be high
(although check the provider for special deals), with a moderate monthly fee thereafter. Like
cellular access, the availability of satellite internet access is a real benefit in areas that would
otherwise have no internet connectivity at all.
Dial-up Telephone
An inexpensive option that uses any phone line and a modem. To connect to the ISP, a user calls
the ISP access phone number. The low bandwidth provided by a dial-up modem connection is
usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
A modem dial-up connection should only be considered when higher speed connection options
are not available.
In metropolitan areas, many apartments and small offices are being connected directly with fiber-
optic cables. This enables an internet service provider to provide higher bandwidth speeds and
support more services such as internet, phone, and TV.
The choice of connection varies depending on geographical location and service provider
availability.
Satellite Connection
All computers connected to a network that participate directly in network communication are
classified as hosts. Hosts can send and receive messages on the network. In modern networks,
computer hosts can act as a client, a server, or both. The software installed on the computer
determines which role the computer plays.
Client and server software usually run on separate computers, but it is also possible for one
computer to run both client and server software at the same time. In small businesses and homes,
many computers function as the servers and clients on the network. This type of network is called
a P2P network. In larger businesses, because of the potential for high amounts of network traffic, it
is often necessary to have dedicated servers to support the number of service requests. P2P
networks are easy to set up, less complex, lower in cost, and can be used for simple tasks such as
transferring files and sharing printers. However, there is no centralized administration. They have
less security, are not scalable, and can perform slower.
Network Components
There are symbols that represent various types of networking equipment. The network
infrastructure is the platform that supports the network. It provides the stable and reliable channel
over which our communications can occur. The network infrastructure contains three categories of
hardware components: end devices, intermediate devices, and network media. Hardware is often
the visible components of the network platform such as a laptop, PC, switch, router, wireless
access point, or the cabling used to connect the devices. Components that are not visible include
wireless media.
End devices, or hosts, form the interface between users and the underlying communication
network. Some examples of end devices include:
An ISP provides the link between the home network and the internet. An ISP can be the
local cable provider, a landline telephone service provider, the cellular network that
provides your smartphone service, or an independent provider who leases bandwidth on
the physical network infrastructure of another company. Each ISP connects to other ISPs to
form a network of links that interconnect users all over the world. ISPs are connected in a
hierarchical manner that ensures that internet traffic generally takes the shortest path from
the source to the destination.
The interconnection of ISPs that forms the backbone of the internet is a complex web of
fiber-optic cables with expensive networking switches and routers that direct the flow of
information between source and destination hosts.
For a home user, connecting to the ISP is a fairly uncomplicated process. This is the most
common connection option. It consists of using a wireless integrated router to connect to
the ISP. The router includes a switch to connect wired hosts and a wireless AP to connect
wireless hosts. The router also provides client IP addressing information and security for
inside hosts. The two most common methods are cable and DSL. Other options include
cellular, satellite, and dial-up telephone.
If you do not have a friend or family member like Shridhar to explain this to you, do not worry! In
this module, you will learn about the various ways mobile devices communicate. Ready to learn
more?
Almost all mobile devices are capable of connecting to Wi-Fi networks. It is advisable to connect to
Wi-Fi networks when possible because data used over Wi-Fi does not count against the cellular
data plan. Also, because Wi-Fi radios use less power than cellular radios, connecting to Wi-Fi
networks conserves battery power. Like other Wi-Fi-enabled devices, it is important to use security
when connecting to Wi-Fi networks. These precautions should be taken to protect Wi-Fi
communications on mobile devices:
To connect an Android or iOS device when it is within the coverage range of a Wi-Fi network, turn
on Wi-Fi and the device then searches for all available Wi-Fi networks and displays them in a list.
Touch a Wi-Fi network in the list to connect. Enter a password if needed.
When a mobile device is out of the range of the Wi-Fi network, it attempts to connect to another
Wi-Fi network in range. If no Wi-Fi networks are in range, the mobile device connects to the
cellular data network. When Wi-Fi is on, it will automatically connect to any Wi-Fi network that it
has connected to previously. If the network is new, the mobile device either displays a list of
available networks that can be used or asks if it should connect to it.
Operating systems for mobile devices are updated frequently and may be customized by the
device manufacturer. The commands listed above may not be exactly the same on your device.
There are online manuals for every type of device which are usually accessible from the website of
the manufacturer.
Click below for an example of how to turn cellular data on and off on Android and iOS
devices.
Mobile devices are preprogrammed to use a Wi-Fi network for internet if one is available and the device
can connect to the access point and receive an IP address. If no Wi-Fi network is available, the device uses
the cellular data capability if it is configured. Most of the time, transitions from one network to another are
not obvious to the user. For example, as a mobile device moves from an area of 4G coverage to 3G
coverage, the 4G radio shuts off and turns on the 3G radio. Connections are not lost during this transition.
3.2.5 Video - Bluetooth Configuration on a
Windows Laptop
Press the Play button to watch the video.
https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=b9616852-9557-5faf-b4d0-872e31e1b847
Hands-free headset - A small earpiece with a microphone can be used for making and
receiving calls.
Keyboard or mouse - A keyboard or mouse can be connected to a mobile device to make
input easier.
Stereo control - A mobile device can connect to a home or car stereo to play music.
Car speakerphone - A device that contains a speaker and a microphone can be used for
making and receiving calls.
Tethering - A mobile device can connect to another mobile device or computer to share a
network connection. Tethering can also be performed with a Wi-Fi connection or a cable
connection such as USB.
Mobile speaker - Portable speakers can connect to mobile devices to provide high-quality
audio without a stereo system.
Name
Bluetooth class
Services that the device can use
Technical information, such as the features or the Bluetooth specification that it supports
During the pairing process, a personal identification number (PIN) may be requested to
authenticate the pairing process. The PIN is often a number, but can also be a numeric code or
passkey. The PIN is stored using pairing services, so it does not have to be entered the next time
the device tries to connect. This is convenient when using a headset with a smart phone, because
they are paired automatically when the headset is turned on and within range.
Step 1. Follow the instructions for your device to place it in discoverable mode.
Step 2. Check the instructions for your device to find the connection PIN.
Step 1. Follow the instructions for your device to place it in discoverable mode.
Step 2. Check the instructions for your device to find the connection PIN.
Remember that mobile device operating systems are updated frequently. Always refer to the
documentation of the manufacturer for your specific model device for the latest command
reference.
Wireless Networks
Mobile phones use radio waves to transmit voice signals to antennas mounted on towers located
in specific geographic areas. When a telephone call is made, the voice signal is relayed from one
tower to another tower until it is delivered to its destination. This type of network is used when you
make a phone call to another mobile phone or to a wired telephone. It is also used to send text
messages directly from the phone. The most common type of cellular telephone network is called
a GSM network. The abbreviations 3G, 4G, 4G-LTE, and 5G are used to describe enhanced cell
phone networks that are optimized for the fast transmission of data. Currently, 4G still dominates
as the current mobile network used by most phones.
In addition to the GSM and 4G/5G transmitters and receivers, smartphones make connections in a
variety of ways.
Wi-Fi transmitters and receivers located within the smartphone enable the phone to connect to
local networks and the internet. Wi-Fi networks are usually privately owned but often provide guest
or public access hotspots. A hotspot is an area where Wi-Fi signals are available.
Bluetooth is wireless technology that allows devices to communicate over short distances. Multiple
devices can be connected at the same time with Bluetooth.
NFC is a wireless communication technology that enables data to be exchanged by devices that
are in very close proximity to each other, usually less than a few centimeters.
Two of the most popular operating systems for mobile devices are Android and Apple iOS. Mobile
devices are preprogrammed to use a Wi-Fi network for the internet if one is available, and the
device can connect to the access point and receive an IP address. If no Wi-Fi network is available,
the device uses the cellular data capability if it is configured.
Bluetooth technology provides a simple way for mobile devices to connect to each other and to
wireless accessories. Bluetooth is wireless, automatic, and uses very little power, which helps
conserve battery life. Some examples of devices that use Bluetooth include hands-free headsets,
keyboards, a mouse, stereo controls, car speakerphones, and mobile speakers.
Bluetooth pairing occurs when two Bluetooth devices establish a connection to share resources. In
order for the devices to pair, the Bluetooth radios are turned on, and one device begins searching
for other devices. Other devices must be set to discoverable mode, also called visible, so that they
can be detected.
When a Bluetooth device is in discoverable mode, it transmits the following information when
another Bluetooth device requests it:
Name
Bluetooth class
Services that the device can use
Technical information, such as the features or the Bluetooth specification that it supports
During the pairing process, a PIN may be requested to authenticate the pairing process.
Shridhar explains that the box in the corner is a home router. The router is connected to the
internet. Home routers typically have two primary types of ports: ethernet ports and internet ports.
In addition to the wired ports, many home routers include a radio antenna and a built-in wireless
access point. Kishori mostly uses wireless at home. Now Shridhar is worried about his mother’s
wireless security. Since she did not know what the router was, she probably did not change her
default password on the router! Shridhar logs into the router and makes some changes to keep
Kishori’s network and devices safer.
Have you ever set up a router? Have you thought about having secure communications over
wireless devices? This module will give you the knowledge to build a home network and configure
wireless devices for secure communication.
Module Objective: Configure an integrated wireless router and wireless client to connect securely
to the internet.
4.1 Home Network Basics
4.1.1 Video - Typical Home Network Setup
4.1.2 Components of a Home Network
In addition to an integrated router, there are many different types of devices that might be
connecting to a home network, as shown in the figure. Here are a few examples:
Desktop computers
Gaming systems
Smart TV systems
Printers
Scanners
Security cameras
Telephones
Climate control devices
As the new technologies come on the market, more and more household functions will rely on the
network to provide connectivity and control.
Ethernet Ports
These ports connect to the internal switch portion of the router. These ports are usually labeled
“Ethernet” or “LAN”, as shown in the figure. All devices connected to the switch ports are on the
same local network.
Internet Port
This port is used to connect the device to another network. The internet port connects the router to
a different network than the Ethernet ports. This port is often used to connect to the cable or DSL
modem in order to access the internet.
Answer
https://quizlet.com/606147209/13-16-quizzes-and-stuff-netessentials-flash-cards/
Bluetooth is a technology that makes use of the 2.4 GHz band. It is limited to low-speed, short-
range communications, but has the advantage of communicating with many devices at the same
time. This one-to-many communication has made Bluetooth technology the preferred method for
connecting computer peripherals such as wireless mice, keyboards and printers. Bluetooth is a
good method for transmitting audio to speakers or headphones.
Other technologies that use the 2.4 GHz and 5 GHz bands are the modern wireless LAN
technologies that conform to the various IEEE 802.11 standards. Unlike Bluetooth technology,
802.11 devices transmit at a much higher power level giving them a great range and improved
throughput. Certain areas of the electromagnetic spectrum can be used without a permit.
The figure shows where wireless technologies exist on the electromagnetic spectrum.
The most commonly implemented wired protocol is the Ethernet protocol. Ethernet uses a suite of
protocols that allow network devices to communicate over a wired LAN connection. An Ethernet
LAN can connect devices using many different types of wiring media.
Directly connected devices use an Ethernet patch cable, usually unshielded twisted pair. These
cables can be purchased with the RJ-45 connectors already installed, and they come in various
lengths. Recently constructed homes may have Ethernet jacks already wired in the walls of the
home. For those homes that do not have UTP wiring, there are other technologies, such as
powerline, that can distribute wired connectivity throughout the premises.
Coaxial Cable
Coaxial cable has an inner wire surrounded by a tubular insulating layer, that is then surrounded
by a tubular conducting shield. Most coax cables also have an external insulating sheath or jacket.
Fiber-Optic Cable
Fiber-optic cables can be either glass or plastic with a diameter about the same as a human hair
and it can carry digital information at very high speeds over long distances. Fiber-optic cables
have a very high bandwidth, which enables them to carry very large amounts of data.
Another organization, known as the Wi-Fi Alliance, is responsible for testing wireless LAN devices
from different manufacturers. The Wi-Fi logo on a device means that this equipment meets
standards and should operate with other devices that use the same standard.
Wireless standards are constantly improving the connectivity and speed of Wi-Fi networks. It is
important to be aware of new standards as they are introduced because manufacturers of wireless
devices will implement these standards quickly in their new products.
Do you have a wireless network in your home? Do you know what standards are supported by
your wireless router?
Network mode
Determines the type of technology that must be supported. For
example,802.11b,802.11g,802.11n or Mixed Mode.
Standard Channel
Specifies the channel over which communication will occur. By default, this is set to Auto to allow
the access point (AP) to determine the optimum channel to use.
SSID Broadcast
Determines if the SSID will be broadcast to all devices within range. By default, set to Enabled.
A mixed mode wireless network environment can include devices that use any of the existing Wi-
Fi standards. This environment provides easy access for older devices that need a wireless
connection but do not support the latest standards.
When building a wireless network, it is important that the wireless components connect to the
appropriate WLAN. This is done using the SSID.
We use the SSID to identify a specific wireless network. It is essentially the name of the network.
Wireless routers usually broadcast their configured SSIDs by default. The SSID broadcast allows
other devices and wireless clients to automatically discover the name of the wireless network.
When the SSID broadcast is disabled, you must manually enter the SSID on wireless devices.
Disabling SSID broadcasting can make it more difficult for legitimate clients to find the wireless
network. However, simply turning off the SSID broadcast is not sufficient to prevent unauthorized
clients from connecting to the wireless network. All wireless networks should use the strongest
available encryption to restrict unauthorized access.
To connect to the router using a wired connection, plug an Ethernet patch cable into the network
port on the computer. Plug the other end into a LAN port on the router. Do not plug the cable into
the port or interface that is labeled “Internet”. The internet port will connect to the DSL or cable
modem. Some home routers may have a built-in modem for internet connections. If this is the
case, verify that the type of connection is correct for your internet service. A cable modem
connection will have a coaxial terminal to accept a BNC-type connector. A DSL connection will
have a port for a telephone-type cable, usually an RJ-11 connector.
After confirming that the computer is connected to the network router and the link lights on the NIC
indicate a working connection, the computer needs an IP address. Most network routers are set up
so that the computer receives an IP address automatically from a local DHCP server automatically
configured on the wireless router. If the computer does not have an IP address, check the router
documentation and configure the PC or tablet with a unique IP address, subnet mask, default
gateway, and DNS information
Note: Some wireless routers may label legacy mode as mixed mode.
4.5 Build a Home Network
Summary
4.5.1 What Did I Learn in this Module?
Home Network Basics
Most home networks consist of at least two separate networks. The public network coming in from
the service provider. The router is connected to the internet. Most likely, the home router is
equipped with both wired and wireless capabilities. A home network is a small LAN with devices
that usually connect to an integrated router and to each other in order to exchange information.
Wireless technology is fairly easy and inexpensive to install. Advantages of wireless LAN
technology include mobility, scalability, flexibility, cost savings, reduced installation time, and
reliability in harsh environments.
In addition to an integrated router, there are many different types of devices that might be
connecting to a home network, Examples include desktop computers, gaming systems, smart tv
systems, printers, scanners, security cameras, and climate control devices.
Small business and home routers typically have two primary types of ports: ethernet ports and
internet ports. In addition to the wired ports, many home routers include a radio antenna and a
built-in wireless access point.
In addition to an integrated router, there are many different types of devices that might be
connecting to a home network, Examples include desktop computers, gaming systems, smart tv
systems, printers, scanners, security cameras, and climate control devices.
Small business and home routers typically have two primary types of ports: ethernet ports and
internet ports. In addition to the wired ports, many home routers include a radio antenna and a
built-in wireless access point.
Certain unlicensed sections of the spectrum are incorporated into consumer products, including
the Wi-Fi routers found in most homes. The wireless technologies most frequently used in home
networks are in the unlicensed 2.4 GHz and 5 GHz frequency ranges. Bluetooth is a technology
that makes use of the 2.4 GHz band. Other technologies that use the 2.4 GHz and 5 GHz bands
are the modern wireless LAN technologies that conform to the various IEEE 802.11 standards.
Unlike Bluetooth technology, 802.11 devices transmit at a much higher power level giving them a
great range and improved throughput.
Although many home network devices support wireless communications, there are still a few
applications where devices benefit from a wired switch connection. The most commonly
implemented wired protocol is the Ethernet protocol. Directly connected devices use an Ethernet
patch cable, usually unshielded twisted pair. Category 5e is the most common wiring used in a
LAN. The cable is made up of 4 pairs of wires that are twisted to reduce electrical interference. For
those homes that do not have UTP wiring, there are other technologies, such as powerline, that
can distribute wired connectivity throughout the premises.
Wireless standards
The IEEE 802.11 standard governs the WLAN environment. Wireless standards for LANs use the
2.4 GHz and 5 GHz frequency bands. Collectively these technologies are referred to as Wi-Fi. The
Wi-Fi Alliance is responsible for testing wireless LAN devices from different manufacturers.
Wireless routers using the 802.11 standards have multiple settings that have to be configured.
These settings include the following:
Network mode - Determines the type of technology that must be supported. For example,
802.11b, 802.11g, 802.11n or Mixed Mode.
Network Name (SSID) - Used to identify the WLAN. All devices that wish to participate in
the WLAN must have the same SSID.
Standard Channel - Specifies the channel over which communication will occur. By
default, this is set to Auto to allow the access point (AP) to determine the optimum channel
to use.
SSID Broadcast - Determines if the SSID will be broadcast to all devices within range. By
default, set to Enabled.
The 802.11 protocol can provide increased throughput based on the wireless network
environment. If all wireless devices connect with the same 802.11 standard, maximum speeds can
be obtained for that standard. If the access point is configured to accept only one 802.11 standard,
devices that do not use that standard cannot connect to the access point. A mixed mode wireless
network environment can include devices that use any of the existing Wi-Fi standards.
When building a wireless network, it is important that the wireless components connect to the
appropriate WLAN. This is done using the SSID. The SSID is used to tell wireless devices, called
STAs, which WLAN they belong to and with which other devices they can communicate. The SSID
broadcast allows other devices and wireless clients to automatically discover the name of the
wireless network. When the SSID broadcast is disabled, you must manually enter the SSID on
wireless devices.
After the computer is connected to the network router and the link lights on the NIC indicate a
working connection, the computer needs an IP address. Most network routers are set up so that
the computer receives an IP address automatically from a local DHCP server automatically
configured on the wireless router.
Before entering the configuration utility, or manually configuring the router through a web browser,
you should consider how your network will be used. Consider what you will call your network and
what devices should connect to your network. It is not a good practice to include the device model
or brand name as part of the SSID since internet searches can expose security weaknesses.
The decision regarding who can access your home network should be determined by how you
plan to use the network. Many routers support MAC address filtering. This enables you to
specifically identify who is allowed on the wireless network. This makes the wireless network more
secure, but it also less flexible when connecting new devices. On some wireless routers, it is
possible to set up guest access. This is a special SSID coverage area that allows open access but
restricts that access to using the internet only.
group-exam.html
https://quizlet.com/606147209/13-16-quizzes-and-stuff-netessentials-flash-cards/
https://itexamanswers.net/4-5-3-build-a-home-network-quiz-answers.html
Checkpoint Exam: Build a Small
Network
Answeres
https://itexamanswers.net/networking-basics-module-1-4-checkpoint-exam-answers.html
Question 20
Module 5: Communication
Principles
5.0.1 Webster - Why Should I Take this Module?
The next day, Kishori has a new patient, Srinivas, who has just been admitted to a room. He is
from Narayanpet and speaks Telugu. Kishori speaks Marathi. These two Indian languages are
very different. Kishori and Srinivas do not speak each other's native language. However, they do
both speak English. Therefore, they decide to communicate using English.
Before beginning to communicate with each other, we establish rules or agreements to govern the
conversation. Just like Kishori and Srinivas, we decide what method of communication we should
use, and what language we should use. We may also need to confirm that our messages are
received. For example, Kishori may have Srinivas sign a document verifying that he has
understood Kishori’s care instructions.
Networks also need rules, or protocols, to ensure successful communication. This module will
cover the communication principles for networks. Let's get started!
Communication in our daily lives takes many forms and occurs in many environments. We have
different expectations depending on whether we are chatting via the internet or participating in a
job interview. Each situation has its corresponding expected behaviors and styles.
Before beginning to communicate with each other, we establish rules or agreements to govern the
conversation. These agreements include the following:
Click below for an example of determining the method, language, and confirmation
strategies.
Method
Language
Confirmation
These rules, or protocols, must be followed in order for the message to be successfully delivered
and understood. Among the protocols that govern successful human communication are these:
The techniques that are used in network communications share these fundamentals with human
conversations.
Think about the commonly accepted protocols for sending text messages to your friends.
If everyone in the same room spoke a different language, they would not be able to communicate.
Likewise, if devices in a local network did not use the same protocols, they would not be able to
communicate.
Networking protocols define many aspects of communication over the local network. As shown in
the table, these include message format, message size, timing, encoding, encapsulation, and
message patterns.
Networking protocols define many aspects of communication over the local network. As shown in
the table, these include message format, message size, timing, encoding, encapsulation, and
message patterns.
A standard is a set of rules that determines how something must be done. Networking and internet
standards ensure that all devices connecting to the network implement the same set of rules or
protocols in the same manner. Using standards, it is possible for different types of devices to send
information to each other over the internet. For example, the way in which an email is formatted,
forwarded, and received by all devices is done according to a standard. If one person sends an
email via a personal computer, another person can use a mobile phone to receive and read the
email as long as the mobile phone uses the same standards as the personal computer.
Other standards organizations that support the internet are shown in the figure.
5.2.4 Check Your Understanding -
Communications Standards
Answers
https://quizlet.com/731382041/networking-essentials-modules-5-8-flash-cards/
5.3 Network Communication
Models
5.3.1 Video - Network Protocols
5.3.2 Video - The Protocol Stack
https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=fae3b5c3-35ef-5924-a05e-40667a3bfd6d
Assists in protocol design, because protocols that operate at a specific layer have defined
information that they act upon and a defined interface to the layers above and below.
Fosters competition because products from different vendors can work together.
Enables technology changes to occur at one level without affecting the other levels.
Provides a common language to describe networking functions and capabilities.
The first layered model for internetwork communications was created in the early 1970s and is
referred to as the internet model. It defines four categories of functions that must occur in order for
communications to be successful. The suite of TCP/IP protocols that are used for internet
communications follows the structure of this model, as shown in the table. Because of this, the
internet model is commonly referred to as the TCP/IP model.
5.3.4 The OSI Reference Model
There are two basic types of models that we use to describe the functions that must occur in order
for network communications to be successful: protocol models and reference models.
Protocol model - This model closely matches the structure of a particular protocol suite. A
protocol suite includes the set of related protocols that typically provide all the functionality
required for people to communicate with the data network. The TCP/IP model is a protocol
model because it describes the functions that occur at each layer of protocols within the
TCP/IP suite.
Reference model - This type of model describes the functions that must be completed at a
particular layer, but does not specify exactly how a function should be accomplished. A
reference model is not intended to provide a sufficient level of detail to define precisely how
each protocol should work at each layer. The primary purpose of a reference model is to aid
in clearer understanding of the functions and processes necessary for network
communications.
The most widely known internetwork reference model was created by the Open Systems
Interconnection (OSI) project at the International Organization for Standardization (ISO). It is used
for data network design, operation specifications, and troubleshooting. This model is commonly
referred to as the OSI model.
The TCP/IP model is a method of visualizing the interactions of the various protocols that make up
the TCP/IP protocol suite. It does not describe general functions that are necessary for all
networking communications. It describes the networking functions specific to those protocols in
use in the TCP/IP protocol suite. For example, at the network access layer, the TCP/IP protocol
suite does not specify which protocols to use when transmitting over a physical medium, nor the
method of encoding the signals for transmission. OSI Layers 1 and 2 discuss the necessary
procedures to access the media and the physical means to send data over a network.
The protocols that make up the TCP/IP protocol suite can be described in terms of the OSI
reference model. The functions that occur at the internet layer in the TCP/IP model are contained
in the network layer of the OSI Model, as shown in the figure. The transport layer functionality is
the same between both models. However, the network access layer and the application layer of
the TCP/IP model are further divided in the OSI model to describe discrete functions that must
occur at these layers.
The key similarities are in the transport and network layers; however, the two models differ in how
they relate to the layers above and below each layer:
OSI Layer 3, the network layer, maps directly to the TCP/IP internet layer. This layer is
used to describe protocols that address and route messages through an internetwork.
OSI Layer 4, the transport layer, maps directly to the TCP/IP transport layer. This layer
describes general services and functions that provide ordered and reliable delivery of data
between source and destination hosts.
The TCP/IP application layer includes several protocols that provide specific functionality to
a variety of end user applications. The OSI model Layers 5, 6, and 7 are used as
references for application software developers and vendors to produce applications that
operate on networks.
Both the TCP/IP and OSI models are commonly used when referring to protocols at various
layers. Because the OSI model separates the data link layer from the physical layer, it is
commonly used when referring to these lower layers.
Message format - When a message is sent, it must use a specific format or structure.
Message size - The rules that govern the size of the pieces communicated across the
network are very strict. They can also be different, depending on the channel used.
Timing - Timing determines the speed at which the bits are transmitted across the network.
It also affects when an individual host can send data and the total amount of data that can
be sent in any one transmission.
Encoding - Messages sent across the network are first converted into bits by the sending
host. Each bit is encoded into a pattern of sounds, light waves, or electrical impulses
depending on the network media over which the bits are transmitted.
Encapsulation - Each message transmitted on a network must include a header that
contains addressing information that identifies the source and destination hosts.
Encapsulation is the process of adding this information to the pieces of data that make up
the message.
Message pattern - Some messages require an acknowledgment before the next message
can be sent. This type of request/response pattern is a common aspect of many networking
protocols. However, there are other types of messages that may be simply streamed across
the network, without concern as to whether they reach their destination.
Communication Standards
Topologies allow us to see the networking using representation of end devices and
intermediary devices. How does a device see a network? Think of a device in a bubble. The
only thing a device sees is its own addressing information. How does the device know it is
on the same network as another device? The answer is network protocols. Most network
communications are broken up into smaller data units, or packets.
A standard is a set of rules that determines how something must be done. Networking and
internet standards ensure that all devices connecting to the network implement the same
set of rules or protocols in the same manner. Using standards, it is possible for different
types of devices to send information to each other over the internet.
An internet standard is the end result of a comprehensive cycle of discussion, problem
solving, and testing. These different standards are developed, published, and maintained
by a variety of organizations. When a new standard is proposed, each stage of the
development and approval process is recorded in a numbered RFC document so that the
evolution of the standard is tracked. RFCs for internet standards are published and
managed by the IETF.
The interaction between the different protocols on a device can be illustrated as a protocol stack.
A stack illustrates the protocols as a layered hierarchy, with each higher-level protocol depending
on the services of the protocols shown in the lower levels. The separation of functions enables
each layer in the stack to operate independently of others.
The suite of TCP/IP protocols that are used for internet communications follows the structure of
this model:
Application - Represents data to the user, plus encoding and dialog control
Transport -Supports communication between various devices across diverse networks
Internet - Determines the best path through the network
Network Access - The hardware devices and media that make up the network.
A reference model describes the functions that must be completed at a particular layer but does
not specify exactly how a function should be accomplished. The primary purpose of a reference
model is to aid in clearer understanding of the functions and processes necessary for network
communications.
The most widely known internetwork reference model was created by the OSI project at the
International ISO. It is used for data network design, operation specifications, and troubleshooting.
This model is commonly referred to as the OSI model.
How does communication transmit across a network? The answer is network media. Media
provides a channel over which the message travels from source to destination. In modern
networks, there are primarily three types of media used. Do you know what they are? Take this
module to learn about media types.
Modern networks primarily use three types of media to interconnect devices, as shown in the
figure:
The four main criteria for choosing network media are these:
What is the maximum distance that the media can successfully carry a signal?
What is the environment in which the media will be installed?
What is the amount of data and at what speed must it be transmitted?
What is the cost of the media and installation?
Ethernet technology generally uses twisted-pair cables to interconnect devices. Because Ethernet
is the foundation for most local networks, twisted-pair is the most commonly encountered type of
network cabling.
In twisted-pair, wires are grouped in pairs and twisted together to reduce interference. The pairs of
wires are colored so that you can identify the same wire at each end. Typically, in each pair, one
of the wires is a solid color and its partner is the same color striped onto a white background.
Coaxial Cable
Coaxial was one of the earliest types of network cabling developed. Coaxial cable is the kind of
copper cable used by cable TV companies. It is also used for connecting the various components
which make up satellite communication systems. Coaxial cable has a single rigid copper core that
conducts the signal. This core is typically surrounded by a layer of insulation, braided metal
shielding, and a protective jacket. It is used as a high-frequency transmission line to carry high-
frequency or broadband signals.
Fiber-Optic Cable
Fiber-optic cable can be either glass or plastic with a diameter about the same as a human hair
and it can carry digital information at very high speeds over long distances. Because light is used
instead of electricity, electrical interference does not affect the signal. Fiber-optic cables have
many uses as well as communications. They are also used in medical imaging, medical treatment,
and mechanical engineering inspection.
They have a very high bandwidth, which enables them to carry very large amounts of data. Fiber
is used in backbone networks, large enterprise environments, and large data centers. It is also
used extensively by telephone companies.
6.1.4 Check Your Understanding - Network
Media Types
Answers
https://quizlet.com/687005105/module-4-flash-cards/
6.2 Network Media Summary
6.2.1 What Did I Learn in this Module?
Network Media Types
Communication transmits across a network on media. The media provides the channel over which
the message travels from source to destination.
Modern networks primarily use three types of media to interconnect devices are:
The four main criteria for choosing media are the following:
What is the maximum distance that the media can successfully carry a signal?
What is the environment in which the media will be installed?
What is the amount if data and at what speed must is be transmitted?
What is the cost of the media installation?
The three most common network cables are twisted-pair, coaxial cable, and fiber-optic cable.
Ethernet technology generally uses twisted-pair cables to interconnect devices. Coaxial cable is
the kind of copper cable used by cable TV companies. It is also used for connecting the various
components which make up satellite communication systems. Fiber-optic cable can be either
glass or plastic with a diameter about the same as a human hair and it can carry digital information
at very high speeds over long distances. Because light is used instead of electricity, electrical
interference does not affect the signal.
How does a message get delivered? When you write a letter and place it in the envelope, you
need to make sure it has the correct address information to be delivered to the recipient. In your
network, the process of placing one message format (the letter) inside another message format
(the envelope) is called encapsulation. Ready to learn more? Take this module!
7.1.2 Encapsulation
When sending a letter, the letter writer uses an accepted format to ensure that the letter is
delivered and understood by the recipient. In the same way, a message that is sent over a
computer network follows specific format rules in order for it to be delivered and processed.
The process of placing one message format (the letter) inside another message format (the
envelope) is called encapsulation. De-encapsulation occurs when the process is reversed by the
recipient and the letter is removed from the envelope. Just as a letter is encapsulated in an
envelope for delivery, so computer messages are encapsulated.
Each computer message is encapsulated in a specific format, called a frame, before it is sent over
the network. A frame acts like an envelope; it provides the address of the intended destination and
the address of the source host. The format and contents of a frame are determined by the type of
message being sent and the channel over which it is communicated. Messages that are not
correctly formatted are not successfully delivered to or processed by the destination host.
Click each button for an analogy and a network example of message formatting and
encapsulation.
Analogy
A common example of requiring the correct format in human communications is when sending a
letter. Click Play in the figure to view an animation of formatting and encapsulating a letter.
An envelope has the address of the sender and receiver, each located at the proper place on the
envelope. If the destination address and formatting are not correct, the letter is not delivered.
The process of placing one message format (the letter) inside another message format (the
envelope) is called encapsulation. De-encapsulation occurs when the process is reversed by the
recipient and the letter is removed from the envelope
Network
Similar to sending a letter, a message that is sent over a computer network follows specific format
rules for it to be delivered and processed.
Internet Protocol (IP) is a protocol with a similar function to the envelope example. In the figure,
the fields of the Internet Protocol version 6 (IPv6) packet identify the source of the packet and its
destination. IP is responsible for sending a message from the message source to destination over
one or more networks.
Note: The fields of the IPv6 packet are discussed in detail in another module.
The Ethernet protocol standards define many aspects of network communication including frame
format, frame size, timing, and encoding. The format for Ethernet frames specifies the location of
the destination and source MAC addresses, and additional information including preamble for
sequencing and timing, start of frame delimiter, length and type of frame, and frame check
sequence to detect transmission errors
An Ethernet switch is a device that is used at Layer 2. When a host sends a message to another
host connected to the same switched network, the switch accepts and decodes the frames to read
the MAC address portion of the message. A table on the switch, called a MAC address table,
contains a list of all the active ports and the host MAC addresses that are attached to them. When
a message is sent between hosts, the switch checks to see if the destination MAC address is in
the table. If it is, the switch builds a temporary connection, called a circuit, between the source and
destination ports. Ethernet switches also allow for sending and receiving frames over the same
Ethernet cable simultaneously. This improves the performance of the network by eliminating
collisions.
A switch builds the MAC address table by examining the source MAC address of each frame that
is sent between hosts. When a new host sends a message or responds to a flooded message, the
switch immediately learns its MAC address and the port to which it is connected. The table is
dynamically updated each time a new source MAC address is read by the switch.
My friend Kishori never thought she would be so interested in all of this tech information, but she
really wants to learn more! Do you? Take this module to learn about the Internet Protocol and the
structure of IPv4 addresses!
-Formación en educación secundaria, bachillerato, grado medio, grado superior o grado Universitario.
- Experiencia de al menos 2 años en una posición similar.
- Nivel de inglés C1 (se valorará en entrevista)
- Atención de visitas
- Gestión de correo electrónico y llamadas telefónicas
- Reportes de gastos
- Organización de viajes
- Organización de reuniones y reserva de salas
- Soporte administrativo a la organización
- Priorización de tareas
- Otras tareas administrativas derivadas del puesto
An IPv4 address is assigned to the network interface connection for a host. This connection is
usually a network interface card (NIC) installed in the device. Examples of end-user devices with
network interfaces include workstations, servers, network printers, and IP phones. Some servers
can have more than one NIC and each of these has its own IPv4 address. Router interfaces that
provide connections to an IP network will also have an IPv4 address.
Every packet sent across the internet has a source and destination IPv4 address. This information
is required by networking devices to ensure the information gets to the destination and any replies
are returned to the source.
Click Play in the figure to see how packets travel across the internet.
Notice how difficult this address is to read. Imagine having to configure devices with a series of 32
bits! For this reason, the 32 bits are grouped into four 8-bit bytes called octets like this:
11010001.10100101.11001000.00000001
That's better, but still difficult to read. That's why we convert each octet into its decimal value,
separated by a decimal point or period. The above binary IPv4 becomes this dotted-decimal
representation:
209.165.200.1
Note: For now, you do not need to know how to convert between binary and decimal number
systems.
As an example, there is a host with an IPv4 address 192.168.5.11 with a subnet mask of
255.255.255.0. The first three octets, (192.168.5), identify the network portion of the address, and
the last octet, (11) identifies the host. This is known as hierarchical addressing because the
network portion indicates the network on which each unique host address is located. Routers only
need to know how to reach each network, rather than needing to know the location of each
individual host.
With IPv4 addressing, multiple logical networks can exist on one physical network if the network
portion of the logical network host addresses is different. For example: three hosts on a single,
physical local network have the same network portion of their IPv4 address (192.168.18) and three
other hosts have different network portions of their IPv4 addresses (192.168.5). The hosts with the
same network number in their IPv4 addresses will be able to communicate with each other, but will
not be able to communicate with the other hosts without the use of routing. In this example, there
is one physical network and two logical IPv4 networks.
Another example of a hierarchical network is the telephone system. With a telephone number, the
country code, area code, and exchange represent the network address and the remaining digits
represent a local phone number.
8.2.3 Check Your Understanding - IPv4
Address Structure
Answers
8.3 The Internet Protocol Summary
8.3.1 What Did I Learn in this Module?
Purpose of the IPv4 Address
The IPv4 address is a logical network address that identifies a particular host. It must be properly
configured and unique within the LAN, for local communication. It must also be properly configured
and unique in the world, for remote communication.
An IPv4 address is assigned to the network interface connection for a host. This connection is
usually a NIC installed in the device.
Every packet sent across the internet has a source and destination IPv4 address. This information
is required by networking devices to ensure the information gets to the destination and any replies
are returned to the source.
Routers only need to know how to reach each network, rather than needing to know the location of
each individual host. With IPv4 addressing, multiple logical networks can exist on one physical
network if the network portion of the logical network host addresses is different.
Module Objective: Explain how IPv4 addresses are used in network communication and
segmentation.
9.1 IPv4 Unicast, Broadcast, and
Multicast
9.1.1 Video - IPv4 Unicast
https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=d30191c2-c19f-5e84-bcc4-b73de33295c2
9.1.2 Unicast
In the previous topic you learned about the structure of an IPv4 address; each has a network
portion and a host portion. There are different ways to send a packet from a source device, and
these different transmissions affect the destination IPv4 addresses.
Unicast transmission refers to one device sending a message to one other device in one-to-one
communications.
A unicast packet has a destination IP address that is a unicast address which goes to a single
recipient. A source IP address can only be a unicast address, because the packet can only
originate from a single source. This is regardless of whether the destination IP address is a
unicast, broadcast, or multicast.
IPv4 unicast host addresses are in the address range of 1.1.1.1 to 223.255.255.255. However,
within this range are many addresses that are reserved for special purposes. These special
purpose addresses will be discussed later in this module.
Note: In the animation, notice that the subnet mask for 255.255.255.0 is represented using slash
notion or /24. This indicates that the subnet mask is 24 bits long. The subnet mask 255.255.255.0
in binary is 11111111.11111111.11111111.00000000.
9.1.4 Broadcast
Broadcast transmission refers to a device sending a message to all the devices on a network in
one-to-all communications.
A broadcast packet has a destination IP address with all ones (1s) in the host portion, or 32 one
(1) bits.
Note: IPv4 uses broadcast packets. However, there are no broadcast packets with IPv6.
A broadcast packet must be processed by all devices in the same broadcast domain. A broadcast
domain identifies all hosts on the same network segment. A broadcast may be directed or limited.
A directed broadcast is sent to all hosts on a specific network. For example, a host on the
172.16.4.0/24 network sends a packet to 172.16.4.255. A limited broadcast is sent to
255.255.255.255. By default, routers do not forward broadcasts.
Broadcast packets use resources on the network and make every receiving host on the network process
the packet. Therefore, broadcast traffic should be limited so that it does not adversely affect the
performance of the network or devices. Because routers separate broadcast domains, subdividing
networks can improve network performance by eliminating excessive broadcast traffic.
9.1.6 Multicast
Multicast transmission reduces traffic by allowing a host to send a single packet to a selected set
of hosts that subscribe to a multicast group.
A multicast packet is a packet with a destination IP address that is a multicast address. IPv4 has
reserved the 224.0.0.0 to 239.255.255.255 addresses as a multicast range.
Hosts that receive particular multicast packets are called multicast clients. The multicast clients
use services requested by a client program to subscribe to the multicast group.
Each multicast group is represented by a single IPv4 multicast destination address. When an IPv4
host subscribes to a multicast group, the host processes packets addressed to this multicast
address, and packets addressed to its uniquely allocated unicast address.
Routing protocols such as OSPF use multicast transmissions. For example, routers enabled with
OSPF communicate with each other using the reserved OSPF multicast address 224.0.0.5. Only
devices enabled with OSPF will process these packets with 224.0.0.5 as the destination IPv4
address. All other devices will ignore these packets.
Click Start to see a destination IP address. Next, click the host or hosts which will receive a packet
based on the address type (unicast, broadcast, or multicast). Click Check to verify your answer.
Click New Problem again to get a new problem.
Instructions:
Click Start to see a destination IP address. Next, click the host or hosts which will receive a packet
based on the address type (unicast, broadcast, or multicast). Click Check to verify your answer.
Click New Problem again to get a new problem.
Public IPv4 addresses are addresses which are globally routed between internet service provider
(ISP) routers. However, not all available IPv4 addresses can be used on the internet. There are
blocks of addresses called private addresses that are used by most organizations to assign IPv4
addresses to internal hosts.
In the mid-1990s, with the introduction of the World Wide Web (WWW), private IPv4 addresses
were introduced because of the depletion of IPv4 address space. Private IPv4 addresses are not
unique and can be used internally within any network.
Note: Private addresses are defined in RFC 1918 and sometimes referred to as RFC 1918 address space.
9.2.2 Routing to the Internet
Most internal networks, from large enterprises to home networks, use private IPv4 addresses for
addressing all internal devices (intranet) including hosts and routers. However, private addresses
are not globally routable.
In the figure, customer networks 1, 2, and 3 are sending packets outside their internal networks.
These packets have a source IPv4 address that is a private address and a destination IPv4
address that is public (globally routable). Packets with a private address must be filtered
(discarded) or translated to a public address before forwarding the packet to an ISP.
Before the ISP can forward this packet, it must translate the source IPv4 address, which is a private
address, to a public IPv4 address using Network Address Translation (NAT). NAT is used to translate
between private IPv4 and public IPv4 addresses. This is usually done on the router that connects the
internal network to the ISP network. Private IPv4 addresses in the organization’s intranet will be translated
to public IPv4 addresses before routing to the internet.
Decide to Pass or Block each IP address depending on whether it is Public (the internet) or Private
(small local network). Click Start to begin and click on either Pass or Block.
PENDIENTE HACER
https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=2e013b38-c477-59c1-af9f-37ec0a7617dc
9.2.4 Special Use IPv4 Addresses
There are certain addresses, such as the network address and broadcast address, that cannot be
assigned to hosts. There are also special addresses that can be assigned to hosts, but with
restrictions on how those hosts can interact within the network.
Loopback addresses
Note: You will learn more about the ping command later in this course.
Note: There is also a Class D multicast block consisting of 224.0.0.0 to 239.0.0.0 and a Class E
experimental address block consisting of 240.0.0.0 - 255.0.0.0.
At the time, with a limited number of computers using the internet, classful addressing was an
effective means to allocate addresses. As shown in the figure, Class A and B networks have a
very large number of host addresses and Class C has very few. Class A networks accounted for
50% of the IPv4 networks. This caused most of the available IPv4 addresses to go unused.
In the mid-1990s, with the introduction of the World Wide Web (WWW), classful addressing was
deprecated to more efficiently allocate the limited IPv4 address space. Classful address allocation was
replaced with classless addressing, which is used today. Classless addressing ignores the rules of classes
(A, B, C). Public IPv4 network addresses (network addresses and subnet masks) are allocated based on
the number of addresses that can be justified.
Both IPv4 and IPv6 addresses are managed by the Internet Assigned Numbers Authority (IANA).
The IANA manages and allocates blocks of IP addresses to the Regional Internet Registries
(RIRs). The five RIRs are shown in the figure.
RIRs are responsible for allocating IP addresses to ISPs who provide IPv4 address blocks to
organizations and smaller ISPs. Organizations can also get their addresses directly from an RIR
(subject to the policies of that RIR).
In an Ethernet LAN, devices use broadcasts and the Address Resolution Protocol (ARP) to locate
other devices. ARP sends Layer 2 broadcasts to a known IPv4 address on the local network to
discover the associated MAC address. Devices on Ethernet LANs also locate other devices using
services. A host typically acquires its IPv4 address configuration using the Dynamic Host
Configuration Protocol (DHCP) which sends broadcasts on the local network to locate a DHCP
server.
Switches propagate broadcasts out all interfaces except the interface on which it was received.
For example, if a switch in the figure were to receive a broadcast, it would forward it to the other
switches and other users connected in the network.
Routers do not propagate broadcasts. When a router receives a broadcast, it does not forward it
out other interfaces. For instance, when R1 receives a broadcast on its Gigabit Ethernet 0/0
interface, it does not forward out another interface.
Therefore, each router interface connects to a broadcast domain and broadcasts are only
propagated within that specific broadcast domain.
The solution is to reduce the size of the network to create smaller broadcast domains in a process
called subnetting. These smaller network spaces are called subnets.
In the figure, the 400 users in LAN 1 with network address 172.16.0.0 /16 have been divided into
two subnets of 200 users each: 172.16.0.0 /24 and 172.16.1.0 /24. Broadcasts are only
propagated within the smaller broadcast domains. Therefore, a broadcast in LAN 1 would not
propagate to LAN 2.
The solution is to reduce the size of the network to create smaller broadcast domains in a process
called subnetting. These smaller network spaces are called subnets.
In the figure, the 400 users in LAN 1 with network address 172.16.0.0 /16 have been divided into
two subnets of 200 users each: 172.16.0.0 /24 and 172.16.1.0 /24. Broadcasts are only
propagated within the smaller broadcast domains. Therefore, a broadcast in LAN 1 would not
propagate to LAN 2.
Notice how the prefix length has changed from a single /16 network to two /24 networks. This is
the basis of subnetting: using host bits to create additional subnets.
Note: The terms subnet and network are often used interchangeably. Most networks are a subnet
of some larger address block.
9.3.4 Reasons for Segmenting Networks
List of expandable sections. Select each button to expand the content.
Subnetting reduces overall network traffic and improves network performance. It also enables an
administrator to implement security policies such as which subnets are allowed or not allowed to
communicate together. Another reason is that it reduces the number of devices affected by
abnormal broadcast traffic due to misconfigurations, hardware/software problems, or malicious
intent.
There are various ways of using subnets to help manage network devices.
Click each image for an illustration of how network administrators can group devices and
services into subnets.
Network administrators can create subnets using any other division that makes sense for the
network. Notice in each figure, the subnets use longer prefix lengths to identify networks.
Understanding how to subnet networks is a fundamental skill that all network administrators must
develop. Various methods have been created to help understand this process. Although a little
overwhelming at first, pay close attention to the detail and, with practice, subnetting will become
easier.
Broadcast transmission refers to a device sending a message to all the devices on a network in
one-to-all communications. A broadcast packet has a destination IP address with all ones (1s) in
the host portion, or 32 one (1) bits. A broadcast packet must be processed by all devices in the
same broadcast domain. A broadcast may be directed or limited. A directed broadcast is sent to all
hosts on a specific network. A limited broadcast is sent to 255.255.255.255. By default, routers do
not forward broadcasts.
Multicast transmission reduces traffic by allowing a host to send a single packet to a selected set
of hosts that subscribe to a multicast group. A multicast packet is a packet with a destination IP
address that is a multicast address. IPv4 has reserved the 224.0.0.0 to 239.255.255.255
addresses as a multicast range. Each multicast group is represented by a single IPv4 multicast
destination address. When an IPv4 host subscribes to a multicast group, the host processes
packets addressed to this multicast address, and packets addressed to its uniquely allocated
unicast address.
In 1981, IPv4 addresses were assigned using classful addressing as defined in RFC 790
(https://tools.ietf.org/html/rfc790), Assigned Numbers. Customers were allocated a network
address based on one of three classes, A, B, or C. The RFC divided the unicast ranges into
specific classes as follows:
There is also a Class D multicast block consisting of 224.0.0.0 to 239.0.0.0 and a Class E
experimental address block consisting of 240.0.0.0 - 255.0.0.0.
Public IPv4 addresses are addresses which are globally routed over the internet. Public IPv4
addresses must be unique. Both IPv4 and IPv6 addresses are managed by the IANA. The IANA
manages and allocates blocks of IP addresses to the RIRs. RIRs are responsible for allocating IP
addresses to ISPs who provide IPv4 address blocks to organizations and smaller ISPs.
Organizations can also get their addresses directly from an RIR.
Network Segmentation
In an Ethernet LAN, devices use broadcasts and ARP to locate other devices. ARP sends Layer 2
broadcasts to a known IPv4 address on the local network to discover the associated MAC
address. Devices on Ethernet LANs also locate other devices using services. A host typically
acquires its IPv4 address configuration using DHCP which sends broadcasts on the local network
to locate a DHCP server. Switches propagate broadcasts out all interfaces except the interface on
which it was received.
A large broadcast domain is a network that connects many hosts. A problem with a large
broadcast domain is that these hosts can generate excessive broadcasts and negatively affect the
network. The solution is to reduce the size of the network to create smaller broadcast domains in a
process called subnetting. These smaller network spaces are called subnets. The basis of
subnetting is to use host bits to create additional subnets. Subnetting reduces overall network
traffic and improves network performance. It helps administrators to implement security policies
such as which subnets are allowed or not allowed to communicate together. It reduces the number
of devices affected by abnormal broadcast traffic due to misconfigurations, hardware/software
problems, or malicious intent.
IPv6 is designed to be the successor to IPv4. IPv6 has a larger 128-bit address space, providing
340 undecillion (i.e., 340 followed by 36 zeroes) possible addresses. However, IPv6 is more than
just larger addresses.
When the IETF began its development of a successor to IPv4, it used this opportunity to fix the
limitations of IPv4 and include enhancements. One example is Internet Control Message Protocol
version 6 (ICMPv6), which includes address resolution and address autoconfiguration not found in
ICMP for IPv4 (ICMPv4).
The depletion of IPv4 address space has been the motivating factor for moving to IPv6. As Africa,
Asia and other areas of the world become more connected to the internet, there are not enough
IPv4 addresses to accommodate this growth. As shown in the figure, four out of the five RIRs have
run out of IPv4 addresses.
IPv4 has a theoretical maximum of 4.3 billion addresses. Private addresses in combination with
Network Address Translation (NAT) have been instrumental in slowing the depletion of IPv4
address space. However, NAT is problematic for many applications, creates latency, and has
limitations that severely impede peer-to-peer communications.
With the ever-increasing number of mobile devices, mobile providers have been leading the way
with the transition to IPv6. The top two mobile providers in the United States report that over 90%
of their traffic is over IPv6.
Most top ISPs and content providers such as YouTube, Facebook, and NetFlix, have also made
the transition. Many companies like Microsoft, Facebook, and LinkedIn are transitioning to IPv6-
only internally. In 2018, broadband ISP Comcast reported a deployment of over 65% and British
Sky Broadcasting over 86%.
Internet of Things
The internet of today is significantly different than the internet of past decades. The internet of
today is more than email, web pages, and file transfers between computers. The evolving internet
is becoming an Internet of Things (IoT). No longer will the only devices accessing the internet be
computers, tablets, and smartphones. The sensor-equipped, internet-ready devices of tomorrow
will include everything from automobiles and biomedical devices, to household appliances and
natural ecosystems.
With an increasing internet population, a limited IPv4 address space, issues with NAT and the IoT,
the time has come to begin the transition to IPv6.
There is no specific date to move to IPv6. Both IPv4 and IPv6 will coexist in the near future and
the transition will take several years. The IETF has created various protocols and tools to help
network administrators migrate their networks to IPv6. The migration techniques can be divided
into three categories:
Dual stack
Dual stack allows IPv4 and IPv6 to coexist on the same network segment. Dual stack devices run
both IPv4 and IPv6 protocol stacks simultaneously. Known as native IPv6, this means the
customer network has an IPv6 connection to their ISP and is able to access content found on the
internet over IPv6.
Tunneling
Tunneling is a method of transporting an IPv6 packet over an IPv4 network. The IPv6 packet is
encapsulated inside an IPv4 packet, similar to other types of data.
Note: Tunneling and translation are for transitioning to native IPv6 and should only be used where needed.
The goal should be native IPv6 communications from source to destination.
Translation
Network Address Translation 64 (NAT64) allows IPv6-enabled devices to communicate with IPv4-
enabled devices using a translation technique similar to NAT for IPv4. An IPv6 packet is translated
to an IPv4 packet and an IPv4 packet is translated to an IPv6 packet.
0123456789ABCDEF
In IPv6 addresses, these 16 digits are represented as hextets (discussed next) allowing us to
represent these massive addresses in a much more readable format.
IPv6 addresses are 128 bits in length and written as a string of hexadecimal values. Every four
bits is represented by a single hexadecimal digit; for a total of 32 hexadecimal values, as shown in
the figure. IPv6 addresses are not case-sensitive and can be written in either lowercase or
uppercase.
16-bit Segments or Hextets
Preferred Format
The previous figure also shows that the preferred format for writing an IPv6 address is
x:x:x:x:x:x:x:x, with each “x” consisting of four hexadecimal values. The term octet refers to the
eight bits of an IPv4 address. In IPv6, a hextet is the unofficial term used to refer to a segment of
16 bits, or four hexadecimal values. Each “x” is a single hextet which is 16 bits or four hexadecimal
digits.
Preferred format means that you write IPv6 address using all 32 hexadecimal digits. It does not
necessarily mean that it is the ideal method for representing the IPv6 address. In this module, you
will see two rules that help to reduce the number of digits needed to represent an IPv6 address.
https://skillsforall.com/launch?id=f393c38f-b410-4d2b-8275-
70e144273519&tab=curriculum&view=73a41b65-b5a6-53b1-aa1f-21906bb82989
10.2.4 Rule 1 – Omit Leading Zeros
The first rule to help reduce the notation of IPv6 addresses is to omit any leading 0s (zeros) in any
hextet. Here are four examples of ways to omit leading zeros:
This rule only applies to leading 0s, NOT to trailing 0s, otherwise the address would be
ambiguous. For example, the hextet “abc” could be either “0abc” or “abc0”, but these do not
represent the same value.
The double colon (::) can only be used once within an address, otherwise there would be more
than one possible resulting address. When used with the omitting leading 0s technique, the
notation of IPv6 address can often be greatly reduced. This is commonly known as the
compressed format.
2001:db8::abcd:0000:0000:1234
2001:db8::abcd:0000:0000:0000:1234
2001:db8:0000:abcd::1234
2001:db8:0000:0000:abcd::1234
If an address has more than one contiguous string of all-0 hextets, best practice is to use the
double colon (::) on the longest string. If the strings are equal, the first string should use the double
colon (::).
Convert the IPv6 addresses into short (omit the leading zeroes) and compressed forms. Enter
letters in lowercase. Click Next to advance the activity to the next address.
Both IPv4 and IPv6 coexist and the transition to only IPv6 will take several years. The IETF has
created various protocols and tools to help network administrators migrate their networks to IPv6.
The migration techniques can be divided into three categories: Dual Stack, Tunneling, and
Translation. Dual stack devices run both IPv4 and IPv6 protocol stacks simultaneously. Tunneling
is a method of transporting an IPv6 packet over an IPv4 network. The IPv6 packet is encapsulated
inside an IPv4 packet, similar to other types of data. NAT64 allows IPv6-enabled devices to
communicate with IPv4-enabled devices using a translation technique similar to NAT for IPv4. An
IPv6 packet is translated to an IPv4 packet and an IPv4 packet is translated to an IPv6 packet.
IPv6 Addressing
IPv6 addresses are 128 bits in length and written as a string of hexadecimal values. Every four
bits is represented by a single hexadecimal digit; for a total of 32 hexadecimal values. IPv6
addresses are not case-sensitive and can be written in either lowercase or uppercase. In IPv6, a
hextet that refers to a segment of 16 bits, or four hexadecimal values. Each “x” is a single hextet,
which is 16 bits or four hexadecimal digits. Preferred format means that you write IPv6 address
using all 32 hexadecimal digits. Here is one example - fe80:0000:0000:0000:0123:4567:89ab:cdef.
There are two rules that help to reduce the number of digits needed to represent an IPv6 address.
Rule 1 – Omit Leading Zeros. You can only omit leading zeros, not trailing zeros.
Rule 2 – Double Colon. A double colon (::) can replace any single, contiguous string of one or
more 16-bit hextets consisting of all zeros. For example, 2001:db8:cafe:1:0:0:0:1 (leading 0s
omitted) could be represented as 2001:db8:cafe:1::1. The double colon (::) is used in place of the
three all-0 hextets (0:0:0). The double colon (::) can only be used once within an address,
otherwise there would be more than one possible resulting address. If an address has more than
one contiguous string of all-0 hextets, best practice is to use the double colon (::) on the longest
string. If the strings are equal, the first string should use the double colon (::).
Are you ready to learn about DHCP? I am here to help! Let's get started with this module!
With a static assignment, the network administrator must manually configure the network
information for a host. At a minimum, this includes the following:
Static addresses have some advantages. For instance, they are useful for printers, servers, and
other networking devices that need to be accessible to clients on the network. If hosts normally
access a server at a particular IPv4 address, it would not be good if that address changed.
Static assignment of addressing information can provide increased control of network resources,
but it can be time consuming to enter the information on each host. When IPv4 addresses are
entered statically, the host only performs basic error checks on the IPv4 address. Therefore, errors
are more likely to occur.
When using static IPv4 addressing, it is important to maintain an accurate list of which IPv4
addresses are assigned to which devices. Additionally, these are permanent addresses and are
not normally reused.
IPv4 addresses can be assigned either statically or dynamically.
With a static assignment, the network administrator must manually configure the network information for a host. At a
minimum, this includes the following:
Static addresses have some advantages. For instance, they are useful for printers, servers, and other networking
devices that need to be accessible to clients on the network. If hosts normally access a server at a particular IPv4
address, it would not be good if that address changed.
Static assignment of addressing information can provide increased control of network resources, but it can be time
consuming to enter the information on each host. When IPv4 addresses are entered statically, the host only performs
basic error checks on the IPv4 address. Therefore, errors are more likely to occur.
When using static IPv4 addressing, it is important to maintain an accurate list of which IPv4 addresses are assigned to
which devices. Additionally, these are permanent addresses and are not normally reused.
DHCP automatically assigns addressing information such as IPv4 address, subnet mask, default
gateway, and other configuration information, as shown in the figure.
DHCP is generally the preferred method of assigning IPv4 addresses to hosts on large networks
because it reduces the burden on network support staff and virtually eliminates entry errors.
Another benefit of DHCP is that an address is not permanently assigned to a host but is only
leased for a period of time. If the host is powered down or taken off the network, the address is
returned to the pool for reuse. This is especially helpful with mobile users that come and go on a
network.
On local networks it is often the case that the user population changes frequently. New users arrive with laptops and
need a connection. Others have new workstations that need to be connected. Rather than have the network
administrator assign IPv4 addresses for each workstation, it is easier to have IPv4 addresses assigned automatically.
This is done using a protocol known as Dynamic Host Configuration Protocol (DHCP).
DHCP automatically assigns addressing information such as IPv4 address, subnet mask, default gateway, and other
configuration information, as shown in the figure.
DHCP is generally the preferred method of assigning IPv4 addresses to hosts on large networks because it reduces
the burden on network support staff and virtually eliminates entry errors.
Another benefit of DHCP is that an address is not permanently assigned to a host but is only leased for a period of
time. If the host is powered down or taken off the network, the address is returned to the pool for reuse. This is
especially helpful with mobile users that come and go on a network.
Various types of devices can be DHCP servers as long as they are running DHCP service
software. With most medium to large networks, the DHCP server is usually a local dedicated PC-
based server.
With home networks, the DHCP server may be located at the ISP and a host on the home network
receives its IPv4 configuration directly from the ISP, as shown in the figure.
If you enter an airport or coffee shop with a wireless hotspot, DHCP makes it possible for you to access the internet.
As you enter the area, your laptop DHCP client contacts the local DHCP server via a wireless connection. The DHCP
server assigns an IPv4 address to your laptop.
Various types of devices can be DHCP servers as long as they are running DHCP service software. With most
medium to large networks, the DHCP server is usually a local dedicated PC-based server.
With home networks, the DHCP server may be located at the ISP and a host on the home network receives its IPv4
configuration directly from the ISP, as shown in the figure.
Many home networks and small businesses use a wireless router and modem. In this case, the
wireless router is both a DHCP client and a server. The wireless router acts as a client to receive
its IPv4 configuration from the ISP and then acts as a DHCP server for internal hosts on the local
network. The router receives the public IPv4 address from the ISP, and in its role as a DHCP
server, it distributes private addresses to internal hosts.
In addition to PC-based servers and wireless routers, other types of networking devices such as
dedicated routers can provide DHCP services to clients, although this is not as common.
IPv4 addresses can be assigned automatically using a protocol known as DHCP. DHCP is
generally the preferred method of assigning IPv4 addresses to hosts on large networks because it
reduces the burden on network support staff and virtually eliminates entry errors. Another benefit
of DHCP is that an address is not permanently assigned to a host but is only leased for a period of
time. If the host is powered down or taken off the network, the address is returned to the pool for
reuse.
As you enter area with a wireless hotspot, your laptop DHCP client contacts the local DHCP
server via a wireless connection. The DHCP server assigns an IPv4 address to your laptop. With
home networks, the DHCP server may be located at the ISP and a host on the home network
receives its IPv4 configuration directly from the ISP. Many home networks and small businesses
use a wireless router and modem. In this case, the wireless router is both a DHCP client and a
server.
DHCPv4 Configuration
The DHCP server is configured with a range, or pool, of IPv4 addresses that can be assigned to
DHCP clients. A client that needs an IPv4 address will send a DHCP Discover message which is a
broadcast with a destination IPv4 address of 255.255.255.255 (32 ones) and a destination MAC
address of FF-FF-FF-FF-FF-FF (48 ones). All hosts on the network will receive this broadcast
DHCP frame, but only a DHCP server will reply. The server will respond with a DHCP Offer,
suggesting an IPv4 address for the client. The host then sends a DHCP Request asking to use the
suggested IPv4 address. The server responds with a DHCP Acknowledgment.
For most home and small business networks, a wireless router provides DHCP services to the
local network clients. To configure a home wireless router, access its graphical web interface by
opening the browser and entering the router default IPv4 address. The IPv4 address of
192.168.0.1 and subnet mask of 255.255.255.0 are the defaults for the internal router interface.
This is the default gateway for all hosts on the local network and also the internal DHCP server
IPv4 address. Most home wireless routers have DHCP Server enabled by default.
You must achieve 70% to pass this exam. You have unlimited attempts to pass the exam.
Feedback is provided to direct you to areas that may require additional attention.
Cisco Networking Academy content is copyrighted and the unauthorized posting, distribution or
sharing of this exam content is prohibited.
This module will help Kishori understand gateways and NAT. Are you ready to learn more? Let's
go!
The IPv4 address assigned to the interface identifies which local network is connected directly to
it.
Every host on a network must use the router as a gateway to other networks. Therefore, each host
must know the IPv4 address of the router interface connected to the network where the host is
attached. This address is known as the default gateway address. It can be either statically
configured on the host or received dynamically by DHCP.
When a wireless router is configured to be a DHCP server for the local network, it automatically
sends the correct interface IPv4 address to the hosts as the default gateway address. In this
manner, all hosts on the network can use that IPv4 address to forward messages to hosts located
at the ISP and get access to hosts on the internet. Wireless routers are usually set to be DHCP
servers by default.
The IPv4 address of that local router interface becomes the default gateway address for the host
configuration. The default gateway is provided, either statically or by DHCP.
When a wireless router is configured as a DHCP server, it provides its own internal IPv4 address
as the default gateway to DHCP clients. It also provides them with their respective IPv4 address
and subnet mask, as shown in the figure.
The router provides a gateway through which hosts on one network can communicate with hosts on different
networks. Each interface on a router is connected to a separate network.
The IPv4 address assigned to the interface identifies which local network is connected directly to it.
Every host on a network must use the router as a gateway to other networks. Therefore, each host must know the
IPv4 address of the router interface connected to the network where the host is attached. This address is known as
the default gateway address. It can be either statically configured on the host or received dynamically by DHCP.
When a wireless router is configured to be a DHCP server for the local network, it automatically sends the correct
interface IPv4 address to the hosts as the default gateway address. In this manner, all hosts on the network can use
that IPv4 address to forward messages to hosts located at the ISP and get access to hosts on the internet. Wireless
routers are usually set to be DHCP servers by default.
The IPv4 address of that local router interface becomes the default gateway address for the host configuration. The
default gateway is provided, either statically or by DHCP.
When a wireless router is configured as a DHCP server, it provides its own internal IPv4 address as the default
gateway to DHCP clients. It also provides them with their respective IPv4 address and subnet mask, as shown in the
figure.
The default IPv4 address configured on the local wireless router interface is usually the first host
address on that network. Internal hosts must be assigned addresses within the same network as
the wireless router, either statically configured, or through DHCP. When configured as a DHCP
server, the wireless router provides addresses in this range. It also provides the subnet mask
information and its own interface IPv4 address as the default gateway, as shown in the figure.
Many ISPs also use DHCP servers to provide IPv4 addresses to the internet side of the wireless
router installed at their customer sites. The network assigned to the internet side of the wireless
router is referred to as the external, or outside, network.
When a wireless router is connected to the ISP, it acts like a DHCP client to receive the correct
external network IPv4 address for the internet interface. ISPs usually provide an internet-routable
address, which enables hosts connected to the wireless router to have access to the internet.
The wireless router serves as the boundary between the local internal network and the external
internet.
The wireless router acts as a DHCP server for all local hosts attached to it, either by Ethernet cable or wirelessly.
These local hosts are referred to as being located on an internal, or inside, network. Most DHCP servers are
configured to assign private addresses to the hosts on the internal network, rather than internet routable public
addresses. This ensures that, by default, the internal network is not directly accessible from the internet.
The default IPv4 address configured on the local wireless router interface is usually the first host address on that
network. Internal hosts must be assigned addresses within the same network as the wireless router, either statically
configured, or through DHCP. When configured as a DHCP server, the wireless router provides addresses in this
range. It also provides the subnet mask information and its own interface IPv4 address as the default gateway, as
shown in the figure.
Many ISPs also use DHCP servers to provide IPv4 addresses to the internet side of the wireless router installed at
their customer sites. The network assigned to the internet side of the wireless router is referred to as the external, or
outside, network.
When a wireless router is connected to the ISP, it acts like a DHCP client to receive the correct external network IPv4
address for the internet interface. ISPs usually provide an internet-routable address, which enables hosts connected
to the wireless router to have access to the internet.
The wireless router serves as the boundary between the local internal network and the external internet.
12.1.4 Check Your Understanding - Network
Boundaries
The wireless router acts as a DHCP server for all local hosts attached to it, either by Ethernet
cable or wirelessly. These local hosts are referred to as being located on an internal, or inside,
network. When a wireless router is connected to the ISP, it acts like a DHCP client to receive the
correct external network IPv4 address for the internet interface. ISPs usually provide an internet-
routable address, which enables hosts connected to the wireless router to have access to the
internet. The wireless router serves as the boundary between the local internal network and the
external internet.
NAT Operation
The wireless router receives a public address from the ISP, which allows it to send and receive
packets on the internet. It, in turn, provides private addresses to local network clients.
The process used to convert private addresses to internet-routable addresses is called NAT. With
NAT, a private (local) source IPv4 address is translated to a public (global) address. The process
is reversed for incoming packets. The wireless router is able to translate many internal IPv4
addresses to the same public address, by using NAT.
Only packets destined for other networks need to be translated. These packets must pass through
the gateway, where the wireless router replaces the private IPv4 address of the source host with
its own public IPv4 address.
This means that both IP and MAC addresses must be required in order for the phone to receive
data. The IP address tells the sender of data where she is, and once the data gets to her location,
the MAC address of her phone permits the device to receive data that is meant just for her.
Thinking further, Kishori wonders how MAC addresses can be known to the network. DHCP
provides the correct IP addresses for the network, but each device has its own, unique MAC
address.
Physical address (the MAC address) – Used for NIC-to-NIC communications on the
same Ethernet network.
Logical address (the IP address) – Used to send the packet from the source device to the
destination device. The destination IP address may be on the same IP network as the
source, or it may be on a remote network.
Layer 2 physical addresses (i.e., Ethernet MAC addresses) are used to deliver the data link frame
with the encapsulated IP packet from one NIC to another NIC that is on the same network. If the
destination IP address is on the same network, the destination MAC address will be that of the
destination device.
Sometimes a host must send a message, but it only knows the IP address of the destination
device. The host needs to know the MAC address of that device, but how can it be discovered?
That is where address resolution becomes critical.
Physical address (the MAC address) – Used for NIC-to-NIC communications on the
same Ethernet network.
Logical address (the IP address) – Used to send the packet from the source device to the
destination device. The destination IP address may be on the same IP network as the
source, or it may be on a remote network.
Layer 2 physical addresses (i.e., Ethernet MAC addresses) are used to deliver the data link frame
with the encapsulated IP packet from one NIC to another NIC that is on the same network. If the
destination IP address is on the same network, the destination MAC address will be that of the
destination device.
Sometimes a host must send a message, but it only knows the IP address of the destination device. The host needs
to know the MAC address of that device, but how can it be discovered? That is where address resolution becomes
critical.
Physical address (the MAC address) – Used for NIC-to-NIC communications on the same Ethernet
network.
Logical address (the IP address) – Used to send the packet from the source device to the destination
device. The destination IP address may be on the same IP network as the source, or it may be on a remote
network.
Layer 2 physical addresses (i.e., Ethernet MAC addresses) are used to deliver the data link frame with the
encapsulated IP packet from one NIC to another NIC that is on the same network. If the destination IP address is on
the same network, the destination MAC address will be that of the destination device.
In this example, PC1 wants to send a packet to PC2. The figure displays the Layer 2 destination
and source MAC addresses and the Layer 3 IPv4 addressing that would be included in the packet
sent from PC1.
Destination MAC address – This is the simplified MAC address of PC2, 55-55-55.
Source MAC address – This is the simplified MAC address of the Ethernet NIC on PC1,
aa-aa-aa.
In this example, PC1 wants to send a packet to PC2. PC2 is located on remote network. Because
the destination IPv4 address is not on the same local network as PC1, the destination MAC
address is that of the local default gateway on the router.
Routers examine the destination IPv4 address to determine the best path to forward the IPv4
packet. When the router receives the Ethernet frame, it de-encapsulates the Layer 2 information.
Using the destination IPv4 address, it determines the next-hop device, and then encapsulates the
IPv4 packet in a new data link frame for the outgoing interface.
In our example, R1 would now encapsulate the packet with new Layer 2 address information, as
shown in the figure.
In this example, PC1 wants to send a packet to PC2. PC2 is located on remote network. Because the destination IPv4
address is not on the same local network as PC1, the destination MAC address is that of the local default gateway on
the router.
Routers examine the destination IPv4 address to determine the best path to forward the IPv4 packet. When the router
receives the Ethernet frame, it de-encapsulates the Layer 2 information. Using the destination IPv4 address, it
determines the next-hop device, and then encapsulates the IPv4 packet in a new data link frame for the outgoing
interface.
In our example, R1 would now encapsulate the packet with new Layer 2 address information, as shown in the figure.
The new destination MAC address would be that of the R2 G0/0/1 interface and the new source
MAC address would be that of the R1 G0/0/1 interface.
Along each link in a path, an IP packet is encapsulated in a frame. The frame is specific to the
data link technology that is associated with that link, such as Ethernet. If the next-hop device is the
final destination, the destination MAC address will be that of the device Ethernet NIC, as shown in
the figure.
The new destination MAC address would be that of the R2 G0/0/1 interface and the new source MAC address would
be that of the R1 G0/0/1 interface.
Along each link in a path, an IP packet is encapsulated in a frame. The frame is specific to the data link technology
that is associated with that link, such as Ethernet. If the next-hop device is the final destination, the destination MAC
address will be that of the device Ethernet NIC, as shown in the figure.
How are the IP addresses of the IP packets in a data flow associated with the MAC addresses on each link
along the path to the destination? For IPv4 packets, this is done through a process called Address
Resolution Protocol (ARP). For IPv6 packets, the process is ICMPv6 Neighbor Discovery (ND).
This activity is optimized for viewing PDUs. The devices are already configured. You will gather
PDU information in simulation mode and answer a series of questions about the data you collect.
Instructions
In the PDU information window, click the tab for the outbound PDU. How does the addressing differ, and why?
Record the addressing in your table.
ANSWER
The source and destination address are reversed in both the frame and packet because this PDU will
be sent back to host 172.16.31.3. This message will be a ping echo-reply.
What device and interface has the destination MAC address that is shown?
ANSWER
e. Click Capture / Forward (the right arrow followed by a vertical bar) to move the PDU to the next device.
Gather the same information from Step 1d. Repeat this process until the PDU reaches its destination. Record the PDU
information you gathered from pinging 172.16.31.5 to 10.10.10.2 into a spreadsheet using a format like the sample
table shown below. Enter details for both the inbound and outbound PDUs at the Router.
ANSWER
f. Repeat the process for the echo-reply message that originates from host 10.10.10.2. Complete the table for each
step.
ANSWER
Reflection Questions
Answer the following questions regarding the captured data:
1. What different types of cables/media were used to connect devices?
ANSWER
2. Did the cables change the handling of the PDU in any way?
ANSWER
No
3. Did the wireless Access Point do anything to the PDUs that it received?
ANSWER
ANSWER
No
5. What was the highest OSI layer that the Access Point used?
ANSWER
Layer 1
6. At what Layer of the OSI model do cables and access points operate?
ANSWER
Layer 1
7. When examining the PDU Details tab, which MAC address appeared first, the source or the destination?
ANSWER
Destination
8. Sometimes PDUs were marked with red Xs while others had green check marks. What is the significance of these
markings?
ANSWER
The PDUs that are marked with Xs were not accepted by a device because the destination address did not
match the device’s MAC address.
9. Every time that the PDU was sent between the 10 network and the 172 network, there was a point where the MAC
addresses suddenly changed. Where did that occur?
ANSWER
10. Which device uses MAC addresses that start with 00D0:BA?
ANSWER
The router
11. What devices did the other MAC addresses belong to?
ANSWER
12. Did the sending and receiving IPv4 addresses change in any of the PDUs?
ANSWER
No
13. When you follow the reply to a ping, sometimes called a pong, what happens to the source and destination
addresses?
ANSWER
14. Why do you think the interfaces of the router are part of two different IP networks?
ANSWER
The function of a router is to interconnect different IP networks. It must be a member of both networks to do
this.
ANSWER
If too many hosts are connected to the same broadcast domain, broadcast traffic can become
excessive. The number of hosts and the amount of network traffic that can be supported on the
local network is limited by the capabilities of the switches used to connect them. As the network
grows and more hosts are added, network traffic, including broadcast traffic, increases. To
improve performance, it is often necessary to divide one local network into multiple networks, or
broadcast domains, as shown in the figure. Routers are used to divide the network into multiple
broadcast domains.
When a host receives a message addressed to the broadcast address, it accepts and processes the message as
though the message was addressed directly to it. When a host sends a broadcast message, switches forward the
message to every connected host within the same local network. For this reason, a local area network, a network with
one or more Ethernet switches, is also referred to as a broadcast domain.
If too many hosts are connected to the same broadcast domain, broadcast traffic can become excessive. The number
of hosts and the amount of network traffic that can be supported on the local network is limited by the capabilities of
the switches used to connect them. As the network grows and more hosts are added, network traffic, including
broadcast traffic, increases. To improve performance, it is often necessary to divide one local network into multiple
networks, or broadcast domains, as shown in the figure. Routers are used to divide the network into multiple
broadcast domains.
Most network applications, however, rely on the logical destination IP address to identify the
location of the servers and clients. The figure illustrates the problem that arises if a sending host
only has the logical IP address of the destination host. How does the sending host determine what
destination MAC address to place within the frame?
The sending host can use an IPv4 protocol called address resolution protocol (ARP) to discover
the MAC address of any host on the same local network. IPv6 uses a similar method known as
Neighbor Discovery.
On a local Ethernet network, a NIC only accepts a frame if the destination address is either the broadcast MAC
address, or else corresponds to the MAC address of the NIC.
Most network applications, however, rely on the logical destination IP address to identify the location of the servers
and clients. The figure illustrates the problem that arises if a sending host only has the logical IP address of the
destination host. How does the sending host determine what destination MAC address to place within the frame?
The sending host can use an IPv4 protocol called address resolution protocol (ARP) to discover the MAC address of
any host on the same local network. IPv6 uses a similar method known as Neighbor Discovery.
1. The sending host creates and sends a frame addressed to a broadcast MAC address.
Contained in the frame is a message with the IPv4 address of the intended destination host.
2. Each host on the network receives the broadcast frame and compares the IPv4 address
inside the message with its configured IPv4 address. The host with the matching IPv4
address sends its MAC address back to the original sending host.
3. The sending host receives the message and stores the MAC address and IPv4 address
information in a table called an ARP table.
When the sending host has the MAC address of the destination host in its ARP table, it can send
frames directly to the destination without doing an ARP request. Because ARP messages rely on
broadcast frames to deliver the requests, all hosts in the local IPv4 network must be in the same
broadcast domain.
1. The sending host creates and sends a frame addressed to a broadcast MAC address. Contained in the frame
is a message with the IPv4 address of the intended destination host.
2. Each host on the network receives the broadcast frame and compares the IPv4 address inside the message
with its configured IPv4 address. The host with the matching IPv4 address sends its MAC address back to the
original sending host.
3. The sending host receives the message and stores the MAC address and IPv4 address information in a table
called an ARP table.
When the sending host has the MAC address of the destination host in its ARP table, it can send frames directly to the
destination without doing an ARP request. Because ARP messages rely on broadcast frames to deliver the requests,
all hosts in the local IPv4 network must be in the same broadcast domain.
Physical address (the MAC address) – Used for NIC-to-NIC communications on the
same Ethernet network.
Logical address (the IP address) – Used to send the packet from the source device to the
destination device. The destination IP address may be on the same IP network as the
source, or it may be on a remote network.
When the destination IP address (IPv4 or IPv6) is on a remote network, the destination MAC
address will be the address of the host default gateway (i.e., the router interface). Routers
examine the destination IPv4 address to determine the best path to forward the IPv4 packet.
When the router receives the Ethernet frame, it de-encapsulates the Layer 2 information. Using
the destination IPv4 address, it determines the next-hop device, and then encapsulates the IPv4
packet in a new data link frame for the outgoing interface. Along each link in a path, an IP packet
is encapsulated in a frame. The frame is specific to the data link technology that is associated with
that link, such as Ethernet. If the next-hop device is the final destination, the destination MAC
address will be that of the device Ethernet NIC
Broadcast Containment
A message can only contain one destination MAC address. Address resolution lets a host send a
broadcast message to a unique MAC address that is recognized by all hosts. The broadcast MAC
address is a 48-bit address made up of all ones. MAC addresses are usually represented in
hexadecimal notation. The broadcast MAC address in hexadecimal notation is FFFF.FFFF.FFFF.
Each F in the hexadecimal notation represents four ones in the binary address.
When a host sends a broadcast message, switches forward the message to every connected host
within the same local network. For this reason, a local area network, a network with one or more
Ethernet switches, is also referred to as a broadcast domain.
If too many hosts are connected to the same broadcast domain, broadcast traffic can become
excessive. The number of hosts and the amount of network traffic that can be supported on the
local network is limited by the capabilities of the switches used to connect them. To improve
performance, you may need to divide one local network into multiple networks, or broadcast
domains. Routers are used to divide the network into multiple broadcast domains.
On a local Ethernet network, a NIC only accepts a frame if the destination address is either the
broadcast MAC address, or else corresponds to the MAC address of the NIC. Most network
applications rely on the logical destination IP address to identify the location of the servers and
clients. How does the sending host determine what destination MAC address to place within the
frame? The sending host can ARP to discover the MAC address of any host on the same local
network.
ARP uses a three-step process to discover and store the MAC address of a host on the local
network when only the IPv4 address of the host is known:
1. The sending host creates and sends a frame addressed to a broadcast MAC address.
Contained in the frame is a message with the IPv4 address of the intended destination host.
2. Each host on the network receives the broadcast frame and compares the IPv4 address
inside the message with its configured IPv4 address. The host with the matching IPv4
address sends its MAC address back to the original sending host.
3. The sending host receives the message and stores the MAC address and IPv4 address
information in a table called an ARP table.
Great question Kishori! Networks can also have this issue of congestion slowing down its
performance. In a network, the router can determine the best path. How does a network become
congested? What can you do to limit that congestion? You and Kishori will find out in this module!
A router is a networking device that connects multiple Layer 3, IP networks. At the distribution
layer of the network, routers direct traffic and perform other functions critical to efficient network
operation. Routers, like switches, are able to decode and read the messages that are sent to
them. Unlike switches, which make their forwarding decision based on the Layer 2 MAC address,
routers make their forwarding decision based on the Layer 3 IP address.
The packet format contains the IP addresses of the destination and source hosts, as well as the
message data being sent between them. The router reads the network portion of the destination IP
address and uses it to find which one of the attached networks is the best way to forward the
message to the destination.
Anytime the network portion of the IP addresses of the source and destination hosts do not match,
a router must be used to forward the message. If a host located on network 1.1.1.0 needs to send
a message to a host on network 5.5.5.0, the host will forward the message to the router. The
router receives the message, de-encapsulates the Ethernet frame, and then reads the destination
IP address in the IP packet. It then determines where to forward the message. It re-encapsulates
the packet back into a new frame, and forwards the frame on to its destination.
Click Play to see how the MAC and IP addresses are used.
IP Packet Encapsulated in an Ethernet Frame
In most situations we want our devices to be able to connect beyond our local network: out to other homes,
businesses, and the internet. Devices that are beyond the local network segment are known as remote hosts. When a
source device sends a packet to a remote destination device, then the help of routers and routing is needed. Routing
is the process of identifying the best path to a destination.
A router is a networking device that connects multiple Layer 3, IP networks. At the distribution layer of the network,
routers direct traffic and perform other functions critical to efficient network operation. Routers, like switches, are able
to decode and read the messages that are sent to them. Unlike switches, which make their forwarding decision based
on the Layer 2 MAC address, routers make their forwarding decision based on the Layer 3 IP address.
The packet format contains the IP addresses of the destination and source hosts, as well as the message data being
sent between them. The router reads the network portion of the destination IP address and uses it to find which one of
the attached networks is the best way to forward the message to the destination.
Anytime the network portion of the IP addresses of the source and destination hosts do not match, a router must be
used to forward the message. If a host located on network 1.1.1.0 needs to send a message to a host on network
5.5.5.0, the host will forward the message to the router. The router receives the message, de-encapsulates the
Ethernet frame, and then reads the destination IP address in the IP packet. It then determines where to forward the
message. It re-encapsulates the packet back into a new frame, and forwards the frame on to its destination.
Click Play to see how the MAC and IP addresses are used.
If the router cannot determine where to forward a message, it will drop it. Network administrators
configure a static default route that is placed into the routing table so that a packet will not be
dropped due to the destination network not being in the routing table. A default route is the
interface through which the router forwards a packet containing an unknown destination IP
network address. This default route usually connects to another router that can forward the packet
towards its final destination network.
Routers move information between local and remote networks. To do this, routers must use routing tables to store
information. Routing tables are not concerned with the addresses of individual hosts. Routing tables contain the
addresses of networks, and the best path to reach those networks. Entries can be made to the routing table in two
ways: dynamically updated by information received from other routers in the network, or manually entered by a
network administrator. Routers use the routing tables to determine which interface to use to forward a message to its
intended destination.
If the router cannot determine where to forward a message, it will drop it. Network administrators configure a static
default route that is placed into the routing table so that a packet will not be dropped due to the destination network
not being in the routing table. A default route is the interface through which the router forwards a packet containing an
unknown destination IP network address. This default route usually connects to another router that can forward the
packet towards its final destination network.
The method that a host uses to send messages to a destination on a remote network differs from the way a host
sends messages on the same local network. When a host needs to send a message to another host located on the
same network, it will forward the message directly. A host will use ARP to discover the MAC address of the destination
host. The IPv4 packet contains the destination IPv4 address and encapsulates the packet into a frame containing the
MAC address of the destination and forwards it out.
When a host needs to send a message to a remote network, it must use the router. The host includes the IP address
of the destination host within the packet just like before. However, when it encapsulates the packet into a frame, it
uses the MAC address of the router as the destination for the frame. In this way, the router will receive and accept the
frame based on the MAC address.
How does the source host determine the MAC address of the router? A host is given the IPv4 address of the router
through the default gateway address configured in its TCP/IP settings. The default gateway address is the address of
the router interface connected to the same local network as the source host. All hosts on the local network use the
default gateway address to send messages to the router. When the host knows the default gateway IPv4 address, it
can use ARP to determine the MAC address. The MAC address of the router is then placed in the frame, destined for
another network.
It is important that the correct default gateway be configured on each host on the local network. If no default gateway
is configured in the host TCP/IP settings, or if the wrong default gateway is specified, messages addressed to hosts
on remote networks cannot be delivered.
14.2.6 Check Your Understanding -
Select the Default Gateway
14.2.7 Check Your Understanding - The
Routing Table
14.3 Create a LAN
14.3.1 Local Area Networks
The term local area network (LAN) refers to a local network, or a group of interconnected local
networks that are under the same administrative control. In the early days of networking, LANs
were defined as small networks that existed in a single physical location. Although LANs can be a
single local network installed in a home or small office, the definition of LAN has evolved to include
interconnected local networks consisting of many hundreds of hosts, installed in multiple buildings
and locations.
The important thing to remember is that all the local networks within a LAN are under one
administrative control. Other common characteristics of LANs are that they typically use Ethernet
or wireless protocols, and they support high data rates.
The term intranet is often used to refer to a private LAN that belongs to an organization, and is
designed to be accessible only by the members of the organization, employees, or others with
authorization.
The term local area network (LAN) refers to a local network, or a group of interconnected local networks that are
under the same administrative control. In the early days of networking, LANs were defined as small networks that
existed in a single physical location. Although LANs can be a single local network installed in a home or small office,
the definition of LAN has evolved to include interconnected local networks consisting of many hundreds of hosts,
installed in multiple buildings and locations.
The important thing to remember is that all the local networks within a LAN are under one administrative control. Other
common characteristics of LANs are that they typically use Ethernet or wireless protocols, and they support high data
rates.
The term intranet is often used to refer to a private LAN that belongs to an organization, and is designed to be
accessible only by the members of the organization, employees, or others with authorization.
Click below to learn more about local and remote network segments.
In a simple network design, it may be beneficial to keep all hosts within a single local network.
However, as networks grow in size, increased traffic will decrease network performance and
speed. In this case, it may be beneficial to move some hosts onto a remote network.
Advantages:
Disadvantages:
Background / Scenario
The company that you work for has been asked to propose a new network design for XYZ LLC. XYZ is a startup
company that has recently experienced success with their product offerings. They will be expanding, and their
network will need to grow with them. Currently, the network is configured with a single IP network for hosts in all
departments. This design has become inefficient and network delays are becoming increasingly noticeable. You
have been asked to help prepare the proposal with the sales team. The sales team will propose a solution in
which network efficiency is enhanced by implementing routing between separate department networks. You are
working on a demonstration of how having multiple routed networks in a business can improve network efficiency.
Follow the instructions to go through the demonstration to help propose a new network to XYZ LLC.
Instructions
What are the source and destination MAC and IP addresses for the frame and packet?
ANSWER
The frame source MAC address is the MAC address of Sales 1. The destination MAC address is the
MAC broadcast address of FFFF.FFFF.FFFF. The packet source IP address is the IP address of Sales
1. The destination IP address is the destination of Sales 2.
Because the host ARP cache is empty, the host must first issue an ARP request to obtain the destination
MAC address so that the frame can be addressed to the Sales 1.
d. Advance the PDUs through the network until a new PDU (different color) is created at Sales 2.
Questions:
Which hosts and other types of devices needed to process the ARP request packets?
What is the impact of this on efficient operation of the network as it is currently configured?
ANSWER
Even though the destination for the ping requests may be adjacent to the requesting source, if the host has
an empty ARP cache, an ARP request is sent that must be processed by every host on the network. ARP
cache entries are removed after a preset period of time. With many hosts on a network, ARP broadcasts will
be issued more frequently. This requires network resources to be taken away for the work-related traffic.
e. A new PDU with a different color has appeared at Sales 2. Click the new PDU and inspect its contents. Look
at the outbound PDU details.
Question:
It is the first ICMP echo-request packet that is issued by ping from host Sales 2.
192.168.2.0/24
ANSWER
192.168.3.0/24
Only Sales 1 and the router interface that is connected to the Sales department network process the PDU.
What is the benefit of using multiple IPv4 networks, or subnetworks, within an enterprise?
ANSWER
A major benefit of using multiple IP networks is the containment of traffic within relevant parts of the network
without unnecessarily impacting performance on irrelevant parts of the network.
Create a LAN
Packet Tracer - Create a LAN
Addressing Table
Objectives
Connect Network Devices and Hosts
Configure Devices with IPv4 Addressing
Verify the End Device Configuration and Connectivity
Use Networking Commands to View Host Information
Background / Scenario
A new branch office is opening, and you have been asked to set up the LAN. The network devices are already set
up, but you need to connect them and the hosts together. You also need to configure IPv4 addressing on the end
devices and verify that they can reach local and remote resources.
Instructions
Note: In the table above, interfaces designated with G are GigabitEthernet interfaces. Interfaces that are
designated with F are FastEthernet interfaces.
a. Connect the networking devices according to the information in the Connections Table using Ethernet copper
straight-through cables. For the internet to Office Router connection, select the device and port from the
dropdown menus that appear when you click the cloud with connections tool selected.
b. Connect the two PCs and the printer to the office switch according to the information in the connections table.
Use copper straight-through cables.
c. You should see green link lights on all connections after a brief delay.
Why do you think the IPv4 addresses are different, but the subnet masks and default gateways are the same?
ANSWER
Answers will vary. Each device on the network must have a unique identifier. The IPv4 address is one way of
uniquely identifying each network host or device. The default gateway represents the way of communicating
with devices that are NOT on the local network.
The printer does not require a default gateway because it will only be accessed by hosts on the local network.
However, if you need to configure it with a default gateway, which value will the printer use? How can you determine
this from the other devices in the network?
ANSWER
You can determine the default gateway value to use by looking at the values that PCs have been configured
with by DHCP, or by determining the IP address of the Office Router Ethernet interface that is connected to
the branch office LAN.
If you can connect by the IP address, but not by the URL, what do you think is the cause of this problem?
ANSWER
Because DNS is used to resolve URLs to IP addresses, you can safely guess that the DNS server is not
reachable. This could be because of a network connectivity issue, or it could be because the DNS server
address that is configured on the hosts is missing or incorrect.
Open a command prompt on one of the PCs and enter the ipconfig command and make note of the information
that is returned. Now enter the ipconfig /all command. What additional information is displayed?
ANSWER
The ipconfig /all displays information about the physical (MAC) address of the NIC. It also displays the DHCP
and DNS server addresses. In Windows, many additional details are displayed. Type ipconfig /all from the
command prompt of a PC to view all the information that Windows displays with this command.
How many routers are passed on the way to the destination? How are those routers identified?
ANSWER
Two. They are identified by the IP addresses of the incoming interfaces on the routers.
Where is the second router located?
ANSWER
Reflection
Consider a small office that has a LAN similar to the one you have created here. What is the biggest facilities
challenge in setting up the network in a new location?
ANSWER
The physical cabling infrastructure. The office needs to be wired and have communication outlets for all
devices. Moreover, the outlets need to be in convenient locations. Further, the outlets must be wired to some
central location where the switch and router are located. Physical cabling can present many problems when
created a new office location.
Broadcast containment - Routers in the distribution layer can limit broadcasts to the local
network where they need to be heard.
Security requirements - Routers in the distribution layer can separate and protect certain
groups of computers where confidential information resides.
Physical locations - Routers in the distribution layer can be used to interconnect local
networks at various locations of an organization that are geographically separated.
Logical grouping - Routers in the distribution layer can be used to logically group users,
such as departments within a company, who have common needs or for access to
resources.
The distribution layer connects these independent local networks and controls the traffic flowing
between them. It is responsible for ensuring that traffic between hosts on the local network stays
local.
A router is a networking device that connects multiple Layer 3, IP networks. At the distribution
layer of the network, routers direct traffic and perform other functions critical to efficient network
operation. Routers, like switches, are able to decode and read the messages that are sent to
them. Unlike switches, which make their forwarding decision based on the Layer 2 MAC address,
routers make their forwarding decision based on the Layer 3 IP address.
Anytime the network portion of the IP addresses of the source and destination hosts do not match,
a router must be used to forward the message.
A router forwards a packet to one of two places: a directly connected network containing the actual
destination host, or to another router on the path to reach the destination host. When a router
encapsulates the frame to forward it out a routed interface, it must include a destination MAC
address. If the router must forward the packet to another router through a routed interface, it will
use the MAC address of the connected router. Routers obtain these MAC addresses from ARP
tables.
A host is given the IPv4 address of the router through the default gateway address configured in
its TCP/IP settings. The default gateway address is the address of the router interface connected
to the same local network as the source host. All hosts on the local network use the default
gateway address to send messages to the router.
Routing tables contain the addresses of networks, and the best path to reach those networks.
Entries can be made to the routing table in two ways: dynamically updated by information received
from other routers in the network, or manually entered by a network administrator.
Create a LAN
LAN refers to a local network, or a group of interconnected local networks that are under the same
administrative control. All the local networks within a LAN are under one administrative control.
Other common characteristics of LANs are that they typically use Ethernet or wireless protocols,
and they support high data rates.
Within a LAN, it is possible to place all hosts on a single local network or divide them up between
multiple networks connected by a distribution layer device.
Placing all hosts on a single local network allows them to be seen by all other hosts. This is
because there is one broadcast domain and hosts use ARP to find each other.
Placing additional hosts on a remote network will decrease the impact of traffic demands.
However, hosts on one network will not be able to communicate with hosts on the other network
without the use of routing. Routers increase the complexity of the network configuration and can
introduce latency, or time delay, on packets sent from one local network to the other.
You must achieve 70% to pass this exam. You have unlimited attempts to pass the exam.
Feedback is provided to direct you to areas that may require additional attention.
Cisco Networking Academy content is copyrighted and the unauthorized posting, distribution or
sharing of this exam content is prohibited.
Immediately after the call, she sends an email to Madhav in the IT department. Madhav comes to
Kishori’s desk. She is confused because all of the devices do seem to be connected. Madhav
explains that UDP and TCP are transport layer protocols that operate a little differently. He tells
her that UDP is a 'best effort' delivery system that does not require acknowledgment of receipt.
UDP is preferable with applications such as streaming audio and VoIP. UDP is used for video
conference calls.
Kishori had not heard of this before. Have you? In this module you will compare these protocols.
Keep reading!
When a message is delivered using either TCP or UDP, the protocols and services requested are
identified by a port number, as shown in the figure. A port is a numeric identifier within each
segment that is used to keep track of specific conversations between a client and server. Every
message that a host sends contains both a source and destination port.
There are many services that we access through the internet in the course of a day. DNS, web, email, FTP, IM and
VoIP are just some of these services that are provided by client/server systems around the world. These services may
be provided by a single server or by several servers in large data centers.
When a message is delivered using either TCP or UDP, the protocols and services requested are identified by a port
number, as shown in the figure. A port is a numeric identifier within each segment that is used to keep track of specific
conversations between a client and server. Every message that a host sends contains both a source and destination
port.
When a message is received by a server, it is necessary for the server to be able to determine
which service is being requested by the client. Clients are preconfigured to use a destination port
that is registered on the internet for each service. An example of this is web browser clients which
are preconfigured to send requests to web servers using port 80, the well-known port for HTTP
web services.
Ports are assigned and managed by an organization known as the Internet Corporation for
Assigned Names and Numbers (ICANN). Ports are broken into three categories and range in
number from 1 to 65,535:
Well-Known Ports - Destination ports that are associated with common network
applications are identified as well-known ports. These ports are in the range of 1 to 1023.
Registered Ports - Ports 1024 through 49151 can be used as either source or destination
ports. These can be used by organizations to register specific applications such as IM
applications.
Private Ports - Ports 49152 through 65535 are often used as source ports. These ports
can be used by any application.
The table displays some common well-known port numbers and their associated applications.
Some applications may use both TCP and UDP. For example, DNS uses UDP when clients send
requests to a DNS server. However, communication between two DNS servers always uses TCP.
Search the IANA website for port registry to view the full list of port numbers and associated
applications.
In the example in the figure, the PC is simultaneously requesting FTP and web services from the
destination server.
The source and destination ports are placed within the segment. The segments are then encapsulated within an IP
packet. The IP packet contains the IP address of the source and destination. The combination of the source IP
address and source port number, or the destination IP address and destination port number is known as a socket.
In the example in the figure, the PC is simultaneously requesting FTP and web services from the destination server.
In the example, the FTP request generated by the PC includes the Layer 2 MAC addresses and
the Layer 3 IP addresses. The request also identifies the source port number 1305 (dynamically
generated by the host) and destination port, identifying the FTP services on port 21. The host also
has requested a web page from the server using the same Layer 2 and Layer 3 addresses.
However, it is using the source port number 1099 (dynamically generated by the host) and
destination port identifying the web service on port 80.
The socket is used to identify the server and service being requested by the client. A client socket
might look like this, with 1099 representing the source port number: 192.168.1.5:1099
Together, these two sockets combine to form a socket pair: 192.168.1.5:1099, 192.168.1.7:80
Sockets enable multiple processes, running on a client, to distinguish themselves from each other,
and multiple connections to a server process to be distinguished from each other.
The source port number acts as a return address for the requesting application. The transport
layer keeps track of this port and the application that initiated the request so that when a response
is returned, it can be forwarded to the correct application.
TCP packets take a path from the source to the destination. However, each of the packets has a
sequence number. TCP breaks up a message into small pieces known as segments. The
segments are numbered in sequence and passed to the IP process for assembly into packets.
TCP keeps track of the number of segments that have been sent to a specific host from a specific
application. If the sender does not receive an acknowledgment within a certain period of time, it
assumes that the segments were lost and retransmits them. Only the portion of the message that
is lost is resent, not the entire message.
Port Numbers
When a message is delivered using either TCP or UDP, the protocols and services requested are
identified by a port number. A port is a numeric identifier within each segment that is used to keep
track of specific conversations between a client and server. Every message that a host sends
contains both a source and destination port.
When a message is received by a server, it is necessary for the server to be able to determine
which service is being requested by the client. Clients are preconfigured to use a destination port
that is registered on the internet for each service.
Ports are assigned and managed by an organization known as the ICANN. Ports are broken into
three categories and range in number from 1 to 65,535:
Well-Known Ports - Destination ports that are associated with common network
applications are identified as well-known ports. These ports are in the range of 1 to 1023.
Registered Ports - Ports 1024 through 49151 can be used as either source or destination
ports. These can be used by organizations to register specific applications such as IM
applications.
Private Ports - Ports 49152 through 65535 are often used as source ports. These ports
can be used by any application.
The source port number is dynamically generated by the sending device to identify a conversation
between two devices. This process allows multiple conversations to occur simultaneously. It is
common for a device to send multiple HTTP service requests to a web server at the same time.
Each separate HTTP conversation is tracked based on the source ports.
The client places a destination port number in the segment to tell the destination server what
service is being requested. A server can offer more than one service simultaneously, such as web
services on port 80 at the same time that it offers FTP connection establishment on port 21.
Unexplained TCP connections can pose a major security threat. They can indicate that something
or someone is connected to the local host. Sometimes it is necessary to know which active TCP
connections are open and running on a networked host. Netstat is an important network utility that
can be used to verify those connections. The command netstat is used to list the protocols in use,
the local address and port numbers, the foreign address and port numbers, and the connection
state.
There is still a need for UDP in networking. I would not enjoy streaming a movie where it stops for
minutes at a time waiting for the network to send the next scene. Can you think of a good analogy
for UDP?
Kishori has more to learn before she applies for that position that Rina mentioned. There are many
services that work at the application layer including some you’re familiar with such as FTP, DHCP,
and DNS. Just about any time you want to retrieve something that is not already located on your
computer, you will be the client requesting that the appropriate server send you that item. And of
course, by now you know that there will be protocols involved. Read on!
The term server refers to a host running a software application that provides information or
services to other hosts that are connected to the network. A well-known example of an application
is a web server. There are millions of servers connected to the internet, providing services such as
web sites, email, financial transactions, music downloads, etc. A crucial factor to enable these
complex interactions to function is that they all use agreed upon standards and protocols.
Every day, we use the services available over networks and the internet to communicate with others and to perform
routine tasks. We rarely think of the servers, clients, and networking devices that are necessary in order for us to
receive an email, update our status on social media, or shop for the best bargains in an online store. Most of the
commonly used internet applications rely on complicated interactions between various servers and clients.
The term server refers to a host running a software application that provides information or services to other hosts that
are connected to the network. A well-known example of an application is a web server. There are millions of servers
connected to the internet, providing services such as web sites, email, financial transactions, music downloads, etc. A
crucial factor to enable these complex interactions to function is that they all use agreed upon standards and
protocols.
An example of client software is a web browser, like Chrome or Firefox. A single computer can
also run multiple types of client software. For example, a user can check email and view a web
page while instant messaging and listening to an audio stream. The table lists three common
types of server software.
Uniform Resource Name (URN) - This identifies only the namespace of the resource (web page,
document, image, etc.) without reference to the protocol.
Uniform Resource Locator (URL) - This defines the network location of a specific resource on the
network. HTTP or HTTPS URLs are typically used with web browsers. Other protocols such as FTP,
SFTP, SSH, and others can be used as a URL. A URL using SFTP might look like:
sftp://sftp.example.com.
Protocol/scheme - HTTPS or other protocols such as FTP, SFTP, mailto, and NNTP
Hostname - www.example.com
Path and file name - /author/book.html
Fragment - #page155
Parts of a URI
Web resources and web services such as RESTful APIs are identified using a Uniform Resource Identifier (URI). A
URI is a string of characters that identifies a specific network resource. As shown in the figure, a URI has two
specializations:
Uniform Resource Name (URN) - This identifies only the namespace of the resource (web page, document,
image, etc.) without reference to the protocol.
Uniform Resource Locator (URL) - This defines the network location of a specific resource on the network.
HTTP or HTTPS URLs are typically used with web browsers. Other protocols such as FTP, SFTP, SSH, and
others can be used as a URL. A URL using SFTP might look like: sftp://sftp.example.com.
Protocol/scheme - HTTPS or other protocols such as FTP, SFTP, mailto, and NNTP
Hostname - www.example.com
Path and file name - /author/book.html
Fragment - #page155
Parts of a URI
Background / Scenario
Clients, such as desktop PCs, request services from servers. The lab environment, using physical PCs and
servers, supports a full range of services. In a simulated environment, the number of services is limited. Packet
Tracer allows the addition of simulated network servers that support DHCP, DNS, HTTP, and TFTP. Packet
Tracer also supports the addition of simulated PCs that can request these services. This activity uses a simple
network consisting of a PC connected directly to a server configured to supply DNS services as well as hosting a
web page through an HTTP server. This activity will track the flow of traffic that happens when a web page is
requested, how the IP address of the web page is resolved, and the web page is delivered.
Instructions
Some of the most common servers that provide these services are shown in the figure. A brief
description of each service is shown in the table.
What are the most common internet services that you use on a regular basis? For most people, the list includes
services such as internet searches, social media sites, video and audio streaming, on-line shopping sites, email, and
messaging. Each of these services relies on protocols from the TCP/IP protocol suite to reliably communicate the
information between the clients and the servers.
Some of the most common servers that provide these services are shown in the figure. A brief description of each
service is shown in the table.
You can use the command nslookup to discover the IP addresses for any domain name. In this
Syntax Checker activity, practice entering the nslookup command in both Windows and Linux.
When you manually configure a device for network connectivity, recall that you also include a DNS server address.
For home networks, this configuration is typically handled by DHCP running on the home router. Your ISP provides
the DNS server address to your home router, and then your home router uses DHCP to send the configuration to all
the devices connected to its network. When you type the name for a website, such as www.cisco.com, the DNS client
running on your device first asks the DNS server for the IP address, such as 172.230.155.162, before sending out
your HTTP request.
You can use the command nslookup to discover the IP addresses for any domain name. In this Syntax Checker
activity, practice entering the nslookup command in both Windows and Linux.
When the server receives a port 80 request, the server responds to the client request and sends
the web page to the client. The information content of a web page is encoded using specialized
'mark-up' languages. The HyperText Markup Language (HTML) coding tells the browser how to
format the web page and what graphics and fonts to use. HTML is the most commonly used
language.
Click Play in the figure to view a client request for a web page.
When a web client receives the IP address of a web server, the client browser uses that IP address and port 80 to
request web services. This request is sent to the server using the Hypertext Transfer Protocol (HTTP).
When the server receives a port 80 request, the server responds to the client request and sends the web page to the
client. The information content of a web page is encoded using specialized 'mark-up' languages. The HyperText
Markup Language (HTML) coding tells the browser how to format the web page and what graphics and fonts to use.
HTML is the most commonly used language.
Click Play in the figure to view a client request for a web page.
The HTTP protocol is not a secure protocol; information could easily be intercepted by other users
as data is sent over the network. In order to provide security for the data, HTTP can be used with
secure transport protocols. Requests for secure HTTP are sent to port 443. These requests
use https in the site address in the browser, rather than http.
There are many different web servers and web clients available. The HTTP protocol and HTML
standards make it possible for these servers and clients from many different manufacturers to
work together seamlessly.
Instructions
Part 4: Observe traffic between the client and the web server.
a. Enter Simulation mode by clicking the Simulation tab in the lower right-hand corner.
b. Double click the Simulation Panel to unlock it from the PT window. This allows you to move the Simulation
Panel to view the entire network topology.
c. View traffic by creating a Complex PDU in Simulation mode.
1) From the Simulation Panel, select Edit Filters.
2) Click the Misc tab to verify that only the boxes for TCP and HTTP are selected.
3) Add a Complex PDU by clicking the open envelope located above the Simulation mode icon.
4) Click the External Client to specify it as the source. The Create Complex PDU window will appear.
d. Specify the Create Complex PDU settings by changing the following within the Complex PDU window:
1) Under PDU Settings, Select Application should be set to HTTP.
2) Click the ciscolearn.web.com server to specify it as the destination device. Notice the IP address of the
web server will appear in the destination box within the complex PDU window
3) For the Starting Source Port, enter 1000.
4) Under Simulation Settings, select Periodic Interval and type 120 seconds.
e. Create the PDU by clicking the box Create PDU in the Create Complex PDU window.
1) Observe the traffic flow by clicking Play in the Simulation Panel. Speed up the animation by using the play
control slider.
When the Buffer Full window appears, click View Previous Events to close the window.
2) Scroll through the Event List. Notice the number of packets that traveled from source to destination. HTTP
is a TCP protocol, which requires connection establishment and acknowledgement of receipt of packets,
considerably increasing the amount of traffic overhead.
The FTP server enables a client to exchange files between devices. It also enables clients to
manage files remotely by sending file management commands such as delete or rename. To
accomplish this, the FTP service uses two different ports to communicate between client and
server.
The example in the figure illustrates how FTP operates. To begin an FTP session, control
connection requests are sent to the server using destination TCP port 21. When the session is
opened, the server uses TCP port 20 to transfer the data files.
FTP client software is built into computer operating systems and into most web browsers. Stand-
alone FTP clients offer many options in an easy-to-use GUI-based interface.
In addition to web services, another common service used across the internet is one that allows users to transfer files.
The File Transfer Protocol (FTP) provides an easy method to transfer files from one computer to another. A host
running FTP client software can access an FTP server to perform various file management functions including file
uploads and downloads.
The FTP server enables a client to exchange files between devices. It also enables clients to manage files remotely by
sending file management commands such as delete or rename. To accomplish this, the FTP service uses two
different ports to communicate between client and server.
The example in the figure illustrates how FTP operates. To begin an FTP session, control connection requests are
sent to the server using destination TCP port 21. When the session is opened, the server uses TCP port 20 to transfer
the data files.
FTP client software is built into computer operating systems and into most web browsers. Stand-alone FTP clients
offer many options in an easy-to-use GUI-based interface.
Based on commands sent across the control connection, data can be downloaded from the server
or uploaded from the client.
Objectives
Upload a file to an FTP server
Background / Scenario
File Transfer Protocol (FTP) is a commonly used application to transfer files between clients and servers on
the network. The server is configured to run the service where clients connect, login, and transfer files. FTP
uses port 21 as the server command port to create the connection. FTP then uses port 20 for data transfer.
In this activity, you will upload a file to an FTP server. You will also download a file from an FTP server.
Instructions
In this part, you will locate the file sampleFile.txt and upload it to an FTP server.
a. Click PC-A.
b. Click Desktop.
c. Click Command Prompt.
d. At the prompt, click ? to list the available commands.
e. Enter dir to see the files on the PC. Notice that there is a sampleFile.txt file in the C:\ directory.
C: > dir
Volume in drive C has no label.
Volume Serial Number is 5E12-4AF3
Directory of C:\
12/31/1969 17:0 PM 26 sampleFile.txt
26 bytes 1 File(s)
ftp> ?
?
cd
delete
dir
get
help
passive
put
pwd
quit
rename
ftp>
ftp> dir
Listing /ftp directory from 192.168.1.3:
0 : asa842-k8.bin 5571584
1 : asa923-k8.bin 30468096
2 : c1841-advipservicesk9-mz.124-15.T1.bin 33591768
3 : c1841-ipbase-mz.123-14.T7.bin 13832032
d. Use the dir command again to list the contents of the FTP server to verify that the file has been
uploaded to the FTP server.
You can also download a file from an FTP server. In this part, you will rename the file sampleFile.txt and
download it from the FTP server.
b. At the ftp> prompt, enter dir to verify the file has been renamed.
a. Enter the command get sampleFile_FTP.txt to retrieve the file from the server.
a. Log into the FTP server again to delete the file sampleFile_FTP.txt.
b. Enter the command to delete the file sampleFile_FTP.txt from the server.
What command did you use to remove the file from the FTP server?
ANSWER:
16.6.2 Telnet
Long before desktop computers with sophisticated graphical interfaces existed, people used text-
based systems which were often just display terminals physically attached to a central computer.
After networks became available, people needed a way to remotely access the computer systems
in the same manner that they did with the directly-attached terminals.
Telnet was developed to meet that need. Telnet dates back to the early 1970s and is among the
oldest of the application layer protocols and services in the TCP/IP suite. Telnet provides a
standard method of emulating text-based terminal devices over the data network. Both the
protocol itself and the client software that implements the protocol are commonly referred to as
Telnet. Telnet servers listen for client requests on TCP port 23.
Appropriately enough, a connection using Telnet is called a virtual terminal (vty) session, or
connection. Rather than using a physical device to connect to the server, Telnet uses software to
create a virtual device that provides the same features of a terminal session with access to the
server’s command line interface (CLI).
In the figure, the client has remotely connected to the server via Telnet. The client is now able to
execute commands as if it were locally connected to the server.
Note: Telnet is not considered to be a secure protocol. SSH should be used in most environments
instead of Telnet. Telnet is used in several examples in this course for simplicity of configuration.
Long before desktop computers with sophisticated graphical interfaces existed, people used text-based systems
which were often just display terminals physically attached to a central computer. After networks became available,
people needed a way to remotely access the computer systems in the same manner that they did with the directly-
attached terminals.
Telnet was developed to meet that need. Telnet dates back to the early 1970s and is among the oldest of the
application layer protocols and services in the TCP/IP suite. Telnet provides a standard method of emulating text-
based terminal devices over the data network. Both the protocol itself and the client software that implements the
protocol are commonly referred to as Telnet. Telnet servers listen for client requests on TCP port 23.
Appropriately enough, a connection using Telnet is called a virtual terminal (vty) session, or connection. Rather than
using a physical device to connect to the server, Telnet uses software to create a virtual device that provides the same
features of a terminal session with access to the server’s command line interface (CLI).
In the figure, the client has remotely connected to the server via Telnet. The client is now able to execute commands
as if it were locally connected to the server.
Note: Telnet is not considered to be a secure protocol. SSH should be used in most environments instead of Telnet.
Telnet is used in several examples in this course for simplicity of configuration.
Although the Telnet protocol can require a user to login, it does not support transporting encrypted
data. All data exchanged during Telnet sessions is transported as plaintext across the network.
This means that the data can be easily intercepted and understood.
The Secure Shell (SSH) protocol offers an alternate and secure method for server access. SSH
provides the structure for secure remote login and other secure network services. It also provides
stronger authentication than Telnet and supports transporting session data using encryption. As a
best practice, network professionals should always use SSH in place of Telnet, whenever
possible.
The figure illustrates how SSH is more secure than Telnet. Notice how the data captured by the
hacker when Telnet is used is clearly readable while the data captured when SSH is used is
encrypted and therefore more secure.
After a Telnet connection is established, users can perform any authorized function on the server, just as if they were
using a command line session on the server itself. If authorized, they can start and stop processes, configure the
device, and even shut down the system.
Although the Telnet protocol can require a user to login, it does not support transporting encrypted data. All data
exchanged during Telnet sessions is transported as plaintext across the network. This means that the data can be
easily intercepted and understood.
The Secure Shell (SSH) protocol offers an alternate and secure method for server access. SSH provides the structure
for secure remote login and other secure network services. It also provides stronger authentication than Telnet and
supports transporting session data using encryption. As a best practice, network professionals should always use
SSH in place of Telnet, whenever possible.
The figure illustrates how SSH is more secure than Telnet. Notice how the data captured by the hacker when Telnet is
used is clearly readable while the data captured when SSH is used is encrypted and therefore more secure.
In this activity, you will establish a remote connection to a router using Telnet and SSH.
Verify connectivity.
Instructions
In this part, you will verify that the PC has IP addressing and can ping the remote router.
What command did you use to verify the IP address from DHCP?
Answer
ftp> ipconfig
Verify that you can ping the router HQ using the IP address listed in the Addressing Table.
In this part, you will attempt to establish a remote connection using Telnet and SSH.
Answer
No.
The router is properly configured to not allow insecure Telnet access. You must use SSH.
At the prompt, enter the command ssh -l admin 64.100.1.1. Enter the password class when prompted
Answer
HQ#
Each mail server receives and stores mail for users who have mailboxes configured on the mail
server. Each user with a mailbox must then use an email client to access the mail server and read
these messages. Many internet messaging systems use a web-based client to access email.
Examples of this type of client include Microsoft 365, Yahoo, and Gmail.
Various application protocols used in processing email include SMTP, POP3, and IMAP4.
Email is one of the most popular client/server applications on the internet. Email servers run server software that
enables them to interact with clients and with other email servers over the network.
Each mail server receives and stores mail for users who have mailboxes configured on the mail server. Each user with
a mailbox must then use an email client to access the mail server and read these messages. Many internet
messaging systems use a web-based client to access email. Examples of this type of client include Microsoft 365,
Yahoo, and Gmail.
Various application protocols used in processing email include SMTP, POP3, and IMAP4.
If the server has to send the message to a different server, SMTP is used between those two
servers as well. SMTP requests are sent to port 25.
Click Play in the figure to see how SMTP is used to send email.
SMTP is used by an email client to send messages to its local email server. The local server then decides if the
message is destined for a local mailbox or if the message is addressed to a mailbox on another server.
If the server has to send the message to a different server, SMTP is used between those two servers as well. SMTP
requests are sent to port 25.
Click Play in the figure to see how SMTP is used to send email.
A server that supports POP clients receives and stores messages addressed to its users. When
the client connects to the email server, the messages are downloaded to the client. By default,
messages are not kept on the server after they have been accessed by the client. Clients contact
POP3 servers on port 110.
A server that supports IMAP clients also receives and stores messages addressed to its users.
However, unlike POP, IMAP keeps the messages in the mailboxes on the server, unless they are
deleted by the user. The most current version of IMAP is IMAP4 which listens for client requests
on port 143.
Many different email servers exist for the various network operating system platforms.
Text messaging, shown in the figure, is one of the most popular communication tools in use today. In addition, text
messaging software is built into many online applications, smartphone apps, and social media sites.
Text messages may also be called instant messages, direct messages, private messages, and
chat messages. Text messaging enables users to communicate or chat over the internet in real-
time. Text messaging services on a computer are usually accessed through a web-based client
that is integrated into a social media or information sharing site. These clients usually only connect
to other users of the same site.
There are also a number of standalone text message clients such as Cisco Webex Teams,
Microsoft Teams, WhatsApp, Facebook Messenger, and many others. These applications are
available for a wide variety of operating systems and devices. A mobile version is typically offered.
In addition to text messages, these clients support the transfer of documents, video, music, and
audio files.
When the IP phone software has been installed, the user selects a unique name. This is so that
calls can be received from other users. Speakers and a microphone, built-in or separate, are
required. A headset is frequently plugged into the computer to serve as a phone.
Calls are made to other users of the same service on the internet, by selecting the username from
a list. A call to a regular telephone (landline or cell phone) requires using a gateway to access the
Public Switched Telephone Network (PSTN). Depending on the service, there may be charges
associated with this type of call. The protocols and destination ports used by internet telephony
applications can vary based on the software.
Making telephone calls over the internet is becoming increasingly popular. An internet telephony client uses peer-to-
peer technology similar to that used by instant messaging, as shown in the figure. IP telephony makes use of Voice
over IP (VoIP) technology, which converts analog voice signals into digital data. The voice data is encapsulated into IP
packets which carry the phone call through the network.
When the IP phone software has been installed, the user selects a unique name. This is so that calls can be received
from other users. Speakers and a microphone, built-in or separate, are required. A headset is frequently plugged into
the computer to serve as a phone.
Calls are made to other users of the same service on the internet, by selecting the username from a list. A call to a
regular telephone (landline or cell phone) requires using a gateway to access the Public Switched Telephone Network
(PSTN). Depending on the service, there may be charges associated with this type of call. The protocols and
destination ports used by internet telephony applications can vary based on the software.
The key characteristic of client/server systems is that the client sends a request to a server, and
the server responds by carrying out a function, such as sending the requested document back to
the client. The combination of a web browser and a web server is perhaps the most commonly
used instance of a client/server system.
A URI is a string of characters that identifies a specific network resource. The parts of a URI are
protocol/scheme, hostname, path and file name, and fragment. A URI has two specializations:
URN - This identifies only the namespace of the resource without reference to the protocol.
URL - This defines the network location of a specific resource on the network. HTTP or
HTTPS URLs are typically used with web browsers. Other protocols such as FTP, SFTP,
SSH, and others can be used as a URL.
Virtual Terminals
Telnet provides a standard method of emulating text-based terminal devices over the data
network. Both the protocol itself and the client software that implements the protocol are
commonly referred to as Telnet. Telnet servers listen for client requests on TCP port 23. A
connection using Telnet is called a vty session, or connection. Rather than using a physical
device to connect to the server, Telnet uses software to create a virtual device that provides
the same features of a terminal session with access to the server’s CLI.
Telnet is not considered to be a secure protocol. Although the Telnet protocol can require a
user to login, it does not support transporting encrypted data. All data exchanged during
Telnet sessions is transported as plaintext across the network. This means that the data
can be easily intercepted and understood.
SSH provides the structure for secure remote login and other secure network services. It
also provides stronger authentication than Telnet and supports transporting session data
using encryption. Network professionals should always use SSH in place of Telnet,
whenever possible.
Module Objective: Use various tools to test and troubleshoot network connectivity.
ipconfig
The ipconfig command is used to display the current IP configuration information for a host.
Issuing this command from the command prompt will display the basic configuration information
including IP address, subnet mask, and default gateway.
ipconfig /all
The command ipconfig /all displays additional information including the MAC address, IP
addresses of the default gateway, and the DNS servers. It also indicates if DHCP is enabled, the
DHCP server address, and lease information.
How can this utility assist in the troubleshooting process? Without an appropriate IP configuration,
a host cannot participate in communications on a network. If the host does not know the location
of the DNS servers, it cannot translate names into IP addresses.
ipconfig /release and ipconfig /renew
If IP addressing information is assigned dynamically, the command ipconfig /release will release
the current DHCP bindings. ipconfig /renew will request fresh configuration information from the
DHCP server. A host may contain faulty or outdated IP configuration information and a simple
renewal of this information is all that is required to regain connectivity.
If, after releasing the IP configuration, the host is unable to obtain fresh information from the
DHCP server, it could be that there is no network connectivity. Verify that the NIC has an
illuminated link light, indicating that it has a physical connection to the network. If this does not
solve the problem, it may be an issue with the DHCP server or network connections to the DCHP
server.
17.1.3 Packet Tracer - Use the ipconfig
Command
Use the ipconfig Command
Packet Tracer - Use the ipconfig Command
Objectives
Use the ipconfig command to identify incorrect configuration on a PC.
Background / Scenario
A small business owner cannot connect to the internet with one of the four PCs in the office. All the PCs are
configured with static IP addressing using 192.168.1.0 /24 network. The PCs should be able to
access www.cisco.pka webserver. Use the ipconfig /all command to identify which PC is incorrectly configured.
Instructions
If the IP configuration appears to be correctly configured on the local host, next, test network
connectivity by using ping. The ping command can be followed by either an IP address or the
name of a destination host. In the example, the user pings the default gateway at 10.10.10.1 and
then pings www.cisco.com.
When a ping is sent to an IP address, a packet known as an echo request is sent across the
network to the IP address specified. If the destination host receives the echo request, it responds
with a packet known as an echo reply. If the source receives the echo reply, connectivity is verified
by the reply from the specific IP address. The ping is not successful if a message such as request
timed out or general failure appears.
If a ping command is sent to a name, such as www.cisco.com, a packet is first sent to a DNS
server to resolve the name to an IP address. After the IP address is obtained, the echo request is
forwarded to the IP address and the process proceeds. If a ping to the IP address succeeds, but a
ping to the name does not, there is most likely a problem with DNS.
If neither ping is successful, then network connectivity along the path to the destination is most
likely the problem. If this occurs, it is common practice to ping the default gateway. If the ping to
the default gateway is successful, the problem is not local. If the ping to the default gateway fails,
the problem resides on the local network.
In some cases, the ping may fail but network connectivity is not the problem. A ping may fail due
to the firewall on the sending or receiving device, or a router along the path that is blocking the
pings.
The basic ping command usually issues four echoes and waits for the replies to each one. It can,
however, be modified to increase its usefulness. The options listed in the figure display additional
features available.
Background / Scenario
A small business owner learns that some users are unable to access a website. All PCs are configured with
static IP addressing. Use the ping command to identify the issue.
Instructions
Access the Desktop tab > Web Browser of each PC and enter the URL www.cisco.pka. Identify any PCs
that are not connecting to the web server.
Note: All the devices require time to complete the boot process. Please allow up to one minute before
receiving a web response.
Answer
PC2
a. On the PC, access the Command Prompt from the Desktop tab.
b. At the prompt, enter ping www.cisco.pka.
Did the ping return a reply? What is the IP address displayed in the reply, if any?
Answer
Reply was returned with 192.15.2.10 as the IP address for www.cisco.pka.
a. On the PC, access the Command Prompt from the Desktop tab.
b. At the prompt, enter ping www.cisco.pka.
Did the ping return a reply? What is the IP address returned, if any?
Answer
Answers will vary. The default gateway is 192.168.1.1 in this example. For a home network using a
wireless router, the default gateway address can be the same IP address as the wireless router.
Part 4: Ping the IP address of the web server from PCs with connectivity issues.
a. On the PC, access the Command Prompt from the Desktop tab.
b. Attempt to reach the IP address of the web server with the ping command.
Did the ping return a reply? If so, then the PC can reach the web server via IP address, but not domain
name. This could indicate a problem with the DNS server configuration on the PC.
a. Navigate to the Desktop tab of the PCs with issues, make any necessary configuration changes
in IP Configuration.
b. Using the Web Browser within the Desktop tab, connect to www.cisco.pka to verify that the
configuration changes resolved the problem.
The ipconfig command is used to display the current IP configuration information for a host.
Issuing this command from the command prompt will display the basic configuration information
including IP address, subnet mask, and default gateway.
The command ipconfig /all displays additional information including the MAC address, IP
addresses of the default gateway, and the DNS servers. It also indicates if DHCP is enabled, the
DHCP server address, and lease information.
If IP addressing information is assigned dynamically, the command ipconfig /release will release
the current DHCP bindings. ipconfig /renew will request fresh configuration information from the
DHCP server. A host may contain faulty or outdated IP configuration information and a simple
renewal of this information is all that is required to regain connectivity.
Probably the most commonly used network utility is ping. Most IP enabled devices support some
form of the ping command in order to test whether or not network devices are reachable through
the IP network. When a ping is sent to an IP address, a packet known as an echo request is sent
across the network to the IP address specified. If the destination host receives the echo request, it
responds with a packet known as an echo reply. If the source receives the echo reply, connectivity
is verified by the reply from the specific IP address.
Cisco Networking Academy content is copyrighted and the unauthorized posting, distribution or
sharing of this exam content is prohibited.
This assessment covers the core concepts and skills presented in Modules 1 - 17 of
the Networking Basics course.
There are 50 questions in total and you need to score at least 70% to pass and achieve
your Cisco badge.
You have unlimited attempts to pass the exam. Feedback is provided to direct you to areas that
may require additional attention.
Cisco Networking Academy content is copyrighted and the unauthorized posting, distribution or
sharing of this exam content is prohibited.