0% found this document useful (0 votes)
162 views

Notes

The document discusses different types of computer networks: - Small home networks connect a few computers together and to the internet. Small office networks allow remote access to a corporate network. - Medium to large networks, like those used by corporations and schools, can have many locations and hundreds or thousands of interconnected hosts. - The internet is a worldwide network that connects hundreds of millions of computers globally.

Uploaded by

edris
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
162 views

Notes

The document discusses different types of computer networks: - Small home networks connect a few computers together and to the internet. Small office networks allow remote access to a corporate network. - Medium to large networks, like those used by corporations and schools, can have many locations and hundreds or thousands of interconnected hosts. - The internet is a worldwide network that connects hundreds of millions of computers globally.

Uploaded by

edris
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 302

Module 1

Small Home Networks


Small home networks connect a few computers to each other and to
the internet.

Small Office and Home Office Networks


The SOHO network allows computers in a home office or a remote
office to connect to a corporate network, or access centralized, shared
resources.

Medium to Large Networks


Medium to large networks, such as those used by corporations and
schools, can have many locations with hundreds or thousands of
interconnected hosts.

World Wide Networks


The internet is a network of networks that connects hundreds of
millions of computers world-wide.

1.2.2 Types of Personal Data

We hear about data all of the time. Customer data, personal data,
health data, census data, but what exactly is data? Perhaps the
simplest definition of data is that data is a value that represents
something. In the physical world, we represent data as numbers,
formulas, alphabetic characters, and pictures. Think about all of the
data that exists just about you. Some examples include birth records,
baby pictures, school records, and health records.

Most people use networks to transmit their data in order to share with
others, or for long-term storage. Every time you hit “send” or “share” in
an app or computer application, you are telling your device to send
your data to a destination somewhere on the network. Sometimes,
data is being sent by your devices and you may not even be aware
that this is happening. Examples of this are when you set up an
automatic backup utility, or when your device automatically searches
for the router in a Wi-Fi hotspot.

The following categories are used to classify types of personal data:

 Volunteered data - This is created and explicitly shared by


individuals, such as social network profiles. This type of data
might include video files, pictures, text or audio files.
 Observed data - This is captured by recording the actions of
individuals, such as location data when using cell phones.
 Inferred data - This is data such as a credit score, which is
based on analysis of volunteered or observed data.

1.2.4 Common Methods of Data Transmission

After the data is transformed into a series of bits, it must be converted


into signals that can be sent across the network media to its
destination. Media refers to the physical medium on which the signals
are transmitted. Examples of media are copper wire, fiber-optic cable,
and electromagnetic waves through the air. A signal consists of
electrical or optical patterns that are transmitted from one connected
device to another. These patterns represent the digital bits (i.e. the
data) and travel across the media from source to destination as either
a series of pulses of electricity, pulses of light, or radio waves. Signals
may be converted many times before ultimately reaching the
destination, as corresponding media changes between source and
destination.

There are three common methods of signal transmission used in


networks:

 Electrical signals - Transmission is achieved by representing


data as electrical pulses on copper wire.
 Optical signals - Transmission is achieved by converting the
electrical signals into light pulses.
 Wireless signals - Transmission is achieved by using infrared,
microwave, or radio waves through the air.

1.3.1 Bandwidth

Streaming a movie or playing a multiplayer game requires reliable,


fast connections. To support these “high bandwidth” applications,
networks have to be capable of transmitting and receiving bits at a
very high rate.

Different physical media support the transfer of bits at different


speeds. The rate of data transfer is usually discussed in terms of
bandwidth and throughput.

Bandwidth is the capacity of a medium to carry data. Digital bandwidth


measures the amount of data that can flow from one place to another
in a given amount of time. Bandwidth is typically measured in the
number of bits that (theoretically) can be sent across the media in a
second. Common bandwidth measurements are as follows:

 Thousands of bits per second (Kbps)


 Millions of bits per second (Mbps)
 Billions of bits per second (Gbps)

Physical media properties, current technologies, and the laws of


physics all play a role in determining available bandwidth.

The table shows the commonly used units of measure for bandwidth.

1.3.3 Throughput

Like bandwidth, throughput is the measure of the transfer of bits


across the media over a given period of time. However, due to a
number of factors, throughput does not usually match the specified
bandwidth. Many factors influence throughput including:

 The amount of data being sent and received over the connection
 The types of data being transmitted
 The latency created by the number of network devices
encountered between source and destination

Latency refers to the amount of time, including delays, for data to


travel from one given point to another.

Throughput measurements do not take into account the validity or


usefulness of the bits being transmitted and received. Many messages
received through the network are not destined for specific user
applications. An example would be network control messages that
regulate traffic and correct errors.

In an internetwork or network with multiple segments, throughput


cannot be faster than the slowest link of the path from sending device
to the receiving device. Even if all or most of the segments have high
bandwidth, it will only take one segment in the path with lower
bandwidth to create a slowdown of the throughput of the entire
network.

There are many online speed tests that can reveal the throughput of
an internet connection.

Notes

Bandwidth is the capacity of a medium to carry data.


The amount of data, type of data, and latency of the network combine
to cause throughput to not match bandwidth.
Bandwidth is typically measured in the number of bits that can be sent
across the media in a second.
1.4.1 Clients and Server Roles

All computers connected to a network that participate directly in


network communication are classified as hosts. Hosts can send and
receive messages on the network. In modern networks, computer
hosts can act as a client, a server, or both, as shown in the figure. The
software installed on the computer determines which role the
computer plays.

1.4.2 Peer-to-Peer Networks

Client and server software usually run on separate computers, but it is


also possible for one computer to run both client and server software
at the same time. In small businesses and homes, many computers
function as the servers and clients on the network. This type of
network is called a peer-to-peer (P2P) network.

The simplest P2P network consists of two directly connected


computers using either a wired or wireless connection. Both
computers are then able to use this simple network to exchange data
and services with each other, acting as either a client or a server as
necessary.

Multiple PCs can also be connected to create a larger P2P network,


but this requires a network device, such as a switch, to interconnect
the computers.

The main disadvantage of a P2P environment is that the performance


of a host can be slowed down if it is acting as both a client and a
server at the same time. The figure lists some of the advantages and
disadvantages of peer-to-peer networks.
In larger businesses, because of the potential for high amounts of
network traffic, it is often necessary to have dedicated servers to
support the number of service requests.

The advantages and disadvantages of P2P networking are


summarized in the figure.

The advantages of peer-to-peer networking:

 Easy to set up
 Less complex
 Lower cost because network devices and dedicated servers may
not be required
 Can be used for simple tasks such as transferring files and
sharing printers

The disadvantages of peer-to-peer networking:

 No centralized administration
 Not as secure
 All devices may act as both clients and servers which can slow
their performance

1.4.3 Peer-to-Peer Applications

A P2P application allows a device to act as both a client and a server


within the same communication, as shown in the figure. In this model,
every client is a server and every server is a client. P2P applications
require that each end device provide a user interface and run a
background service.

Some P2P applications use a hybrid system where resource sharing


is decentralized, but the indexes that point to resource locations are
stored in a centralized directory. In a hybrid system, each peer
accesses an index server to get the location of a resource stored on
another peer.
1.4.4 Multiple Roles in the Network

A computer with server software can provide services simultaneously


to one or many clients, as shown in the figure.

Additionally, a single computer can run multiple types of server


software. In a home or small business, it may be necessary for one
computer to act as a file server, a web server, and an email server.

A single computer can also run multiple types of client software. There
must be client software for every service required. With multiple clients
installed, a host can connect to multiple servers at the same time. For
example, a user can check email and view a web page while instant
messaging and listening to internet radio.
Question 1

That’s right.

Servers are hosts that have software installed that enable them to
provide information, like email or web pages, to other hosts on the
network
Question 2

That’s right.
Clients are computer hosts that have software installed that enable
them to request and display the information obtained from the server.
Question 3

That’s right.

A peer-to-peer network consists of two directly connected computers


where both computers are able to exchange data and services with
each other, acting as either a client or a server as necessary.

1.5.2 Network Infrastructure

The path that a message takes from its source to destination can be
as simple as a single cable connecting one computer to another, or as
complex as a network that literally spans the globe. This network
infrastructure is the platform that supports the network. It provides the
stable and reliable channel over which our communications can occur.

The network infrastructure contains three categories of hardware


components, as shown in the figure:

 End devices
 Intermediate devices
 Network media
Devices and media are the physical elements, or hardware, of the
network. Hardware is often the visible components of the network
platform such as a laptop, PC, switch, router, wireless access point, or
the cabling used to connect the devices. Occasionally, some
components may not be so visible. In the case of wireless media,
messages are transmitted through the air using invisible radio
frequencies or infrared waves.

Make a list of the network infrastructure components installed in your


home network. Include the cables or wireless access points that
provide your network connections.

1.5.3 End Devices

The network devices that people are most familiar with are called end
devices, or hosts. These devices form the interface between users
and the underlying communication network.
Some examples of end devices are as follows:

 Computers (workstations, laptops, file servers, web servers)


 Network printers
 Telephones and teleconferencing equipment
 Security cameras
 Mobile devices (such as smart phones, tablets, PDAs, and
wireless debit/credit card readers and barcode scanners)

An end device (or host) is either the source or destination of a


message transmitted over the network, as shown in the animation. In
order to uniquely identify hosts, addresses are used. When a host
initiates communication, it uses the address of the destination host to
specify where the message should be sent.

summary

The internet is a worldwide collection of interconnected networks,


cooperating with each other to exchange information using common
standards. Using the internet, we can exchange information through
telephone wires, fiber-optic cables, wireless transmissions, and
satellite links. The internet is considered a "network of networks"
because it is literally made up of thousands of local networks that are
connected to each other. The internet connects more computing
devices than just desktop and laptop computers. There are devices all
around that you may interact with on a daily basis that are also
connected to the internet.

Volunteered data is created and explicitly shared by individuals, such


as social network profiles. Inferred data, such as a credit score, is
based on analysis of volunteered or observed data. Observed data is
captured by recording the actions of individuals, such as location data
when using cell phones. A bit can only have one of two possible
values, 0 or 1. Each group of eight bits, such as the representations of
letters and numbers, is known as a byte. There are three common
methods of signal transmission used in networks: electrical, optical,
and wireless.
The rate of data transfer is usually discussed in terms of bandwidth
and throughput. Bandwidth is typically measured in the number of
bits that (theoretically) can be sent across the media in a second.
Throughput measures the transfer of bits across the media over a
given period of time. Many factors influence throughput including the
amount of data being sent and received over the connection, the types
of data being transmitted, and the latency created by the number of
network devices encountered between source and destination.
Latency is the amount of time, including delays, for data to travel from
one given point to another.

Servers are hosts that have software installed that enable them to
provide information, like email or web pages, to other hosts on the
network. Clients are computer hosts that have software installed that
enable them to request and display the information obtained from the
server. In small businesses and homes, many computers function as
the servers and clients on the network. This type of network is called a
peer-to-peer (P2P) network. The simplest peer-to-peer network
consists of two directly connected computers using either a wired or
wireless connection. A P2P application allows a device to act as both
a client and a server within the same communication. In this model,
every client is a server and every server is a client. In a home or small
business, it may be necessary for one computer to act as a file server,
a web server, and an email server. A single computer can also run
multiple types of client software. There must be client software for
every service used.
The network infrastructure contains three categories of hardware
components: intermediate devices, end devices, and network
media. Devices and media are the physical elements, or hardware, of
the network. Hardware is often the visible components of the network
platform such as a laptop, PC, switch, router, wireless access point, or
the cabling used to connect the devices. The network devices that
people are most familiar with are called end devices, or hosts. These
devices form the interface between users and the underlying
communication network. An end device (or host) is either the source
or destination of a message transmitted over the network.

Module Title: Online Connections

Module Objective: Explain the basic requirements for getting online.


Wireless Networks
2.1.2 Mobile Telephones

A common way that people get online is through their mobile


phones. Did you know that most mobile phones can be connected to
many different types of networks simultaneously? Let’s review some
of the ways that mobile phones, smart phones in particular, interact
with the various network technologies and learn some new
terminology in the process.

Mobile phones use radio waves to transmit voice signals to antennas


mounted on towers located in specific geographic areas. Mobile
phones are often referred to as “cell phones” because the geographic
area in which an individual tower can provide a signal to a phone is
called a cell. When a telephone call is made, the voice signal is
relayed from one tower to another tower until it is delivered to its
destination. This type of network is used when you make a phone call
to another mobile phone or to a wired telephone. It is also used to
send text messages directly from the phone. The most common type
of cellular telephone network is called a GSM network, an abbreviation
of the title “Global System for Mobile Communications”.

2.1.3 Cell Phone Network

The design of the first cell phone radio transmitters did not allow
for the efficient transmission of digital data, so enhancements were
made to improve the way that data is sent across cell phone networks.
The abbreviations 3G, 4G, 4G-LTE, and 5G are used to describe
enhanced cell phone networks that are optimized for the fast
transmission of data. The “G” in these designations represents the
word “generation,” so 5G is the fifth generation of the cell network.
Most mobile phones and smart phones have an indicator that shows
when a 4G or 5G signal is available.

Currently, 4G still dominates as the current mobile network used by


most phones. 4G delivers speeds that are 10 times the previous 3G
networks. Introduced in 2019, 5G is the latest standard. It is more
efficient than previous standards. 5G holds the promise of delivering
100 times faster speeds than 4G and connecting more devices to the
network than ever before.

2.1.5 Other Wireless Networks

In addition to the GSM and 4G/5G transmitters and receivers,


smartphones make connections to different types of networks.

Click below to learn more about other networks that are used by
smartphones.

Global Positioning System

The GPS uses satellites to transmit signals that cover the globe. The
smart phone can receive these signals and calculate the phone’s
location to an accuracy of within 10 meters.
Wi-Fi transmitters and receivers located within the smartphone enable
the phone to connect to local networks and the internet. In order to
receive and send data on a Wi-Fi network, the phone needs to be
within the range of the signal from a wireless network access point.
Wi-Fi networks are usually privately owned but often provide guest or
public access hotspots. A hotspot is an area where Wi-Fi signals are
available. Wi-Fi network connections on the phone are similar to the
network connections on a laptop computer.

Bluetooth is a low-power, shorter range wireless technology that is


intended to replace wired connectivity for accessories such as
speakers, headphones, and microphones. Bluetooth can also be used
to connect a smartwatch to a smartphone. Because Bluetooth
technology can be used to transmit both data and voice, it can be
used to create small local networks. Bluetooth is wireless technology
that allows devices to communicate over short distances. Multiple
devices can be connected at the same time with Bluetooth.

NFC(Near Field communication) is a wireless communication


technology that enables data to be exchanged by devices that are in
very close proximity to each other, usually less than a few
centimeters. For example, NFC can be used to connect a smartphone
and a payment system. NFC uses electromagnetic fields to transmit
data.
Question 1

That’s right.

Bluetooth is a low-power, shorter range wireless technology that is


intended to replace wired connectivity for accessories such as
speakers, headphones, and microphones. Bluetooth can also be used
to connect a smartwatch to a smartphone.

Question 2

That’s right.

Near Field Communications (NFC) is a wireless communication


technology that enables data to be exchanged by devices that are in
very close proximity to each other, usually less than a few
centimeters.

Local Network Connections


Types of Network
Components
2.2.2 LAN Components
In addition to smart phones and mobile devices, there are many
other components that can be part of a local area network. Some
examples of network components are personal computers, servers,
networking devices, and cabling. These components can be grouped
into four main categories:

 Hosts
 Peripherals
 Network devices
 Network media
The network components that you are probably most familiar with are
hosts and shared peripherals. Remember that hosts are any devices
that send and receive messages directly across the network.

Shared peripherals are not directly connected to the network, but


instead are connected to hosts. The host is then responsible for
sharing the peripheral across the network. Hosts have software
configured to enable people on the network to use the attached
peripheral devices.

The network devices, as well as the networking media, are used to


interconnect hosts. Networking devices are sometimes referred to as
“intermediary devices” because they are usually located in the path
that messages take between a source host and a destination host.

The term network media describes the cables and wires used in wired
networks, along with radio frequency waves used in wireless
networks. These wired and wireless networks provide the paths over
which messages travel between the various network components.

Some devices can play more than one role, depending on how they
are connected. For example, a printer that is directly connected to a
host (local printer) is a peripheral. A printer that is directly connected
to a network device and participates directly in network
communications is a host.

Ethernet is technology commonly used in local area networks.


Developed at Xerox PARC, Ethernet was commercially introduced in
1980 by Digital Equipment Corporation (DEC), Intel, and Xerox.
Ethernet was later standardized in 1983 as IEEE 802.3. Devices
access the Ethernet LAN using an Ethernet Network Interface Card
(NIC). Each Ethernet NIC has a unique address permanently
embedded on the card known as a Media Access Control (MAC)
address.

2.2.4 End Device Addressing

To physically connect to a network, an end-user device must


have a network interface card (NIC). The NIC is a piece of hardware
that enables the device to connect to the network medium, either
wired or wireless. It may be integrated into the device motherboard or
may be a separately installed card.

In addition to the physical connection, some configuration of the


operating system is required for the device to participate in the
network. Most networks connect to the internet and use the internet to
exchange information. An end-user device requires an Internet
Protocol (IP) address, as well as other information, to identify it to the
other devices in the network. As shown in the figure, there are three
parts to the IP configuration which must be correct for the device to
send and receive information on the network:

 IP address - This identifies the host on the network.


 Subnet mask - This is used to identify the network on which the
host is connected.
 Default gateway - This identifies the networking device that the
host uses to access the internet or another remote network.

Note: Most network applications use a domain name, such


as www.cisco.com, instead of an IP address when accessing
information on the internet. A DNS server is used to translate the
domain name to its IP address. Without an IP address of a DNS
server, the user will have difficulty accessing the internet.

2.2.6 Manual and Automatic


Address Assignment
An IP address can be configured manually or assigned
automatically by another device, as shown in the figure.
Network Documentation
2.3.1 Device Names and
Address Planning

As a network grows in size and complexity, it becomes


increasingly important that it is well planned, logically organized, and
well documented, as shown in the figure.

Many organizations develop conventions for the naming and


addressing of computers and other end-user devices. These provide
guidelines and rules that can be used by network support personnel
when performing these tasks.

Computer operating systems such as Microsoft Windows allow the


naming of a device such as a computer or a printer. Device names
must be unique and should have a consistent format that conveys
meaningful information. This can help to determine device type,
function, location, and sequence number based on the device name.
IP addresses must also be unique to each device.

The use of logical device naming and addressing conventions that are
well documented can greatly simplify the task of training and network
management and can help as well with troubleshooting when
problems arise.

The figure is a simplified physical topology of the second floor of


building C. The rooms are numbered from 201 through 209 and each
room contains two or four host computers. One of the host computers
in room 209 has a text block which reads My name is C209dash01. I
am in building C, room 209. My I. P. address is 192.168.3.1. They
know where to find me if there is a problem.
2.3.2 Network Topologies and
Representations

In a simple network consisting of a few computers, it is easy for you to


visualize how all of the various components connect. As networks
grow, it becomes more difficult to keep track of the location of each
component, and how each is connected to the network. Wired
networks require lots of cabling and network devices to provide
connectivity for all network hosts. A diagram provides an easy way to
understand how the devices in a large network are connected.
When networks are installed, a physical topology diagram is created
to record where each host is located and how it is connected to the
network. The physical topology diagram also shows where the wiring
is installed and the locations of the networking devices that connect
the hosts. Such a diagram uses symbols or icons to represent the
different devices and connections that make up a network. The figure
illustrates some of the icons used to represent network components
on diagrams.
2.3.4 Logical Network
Information

Documenting the physical connections and devices in your network


will provide you with the information that you need to know when
connecting new devices or finding problems with broken connectivity.
But there is other information that you must have when
troubleshooting network problems. This information cannot be “seen”
from the physical view of the network. The device names, IP
addressing, configuration information, and network designations are
logical pieces of information that may change more frequently than the
physical connectivity.

A diagram called a logical topology illustrates the relevant network


configuration information.

Think about the devices in your home or school that access the
internet. At home, do you have devices that you can control or
manage from your mobile phone or tablet? Draw a physical topology
of the network at your home or in your classroom. Compare your
topology with those created by your classmates.
Question 1

That’s right.

A physical topology diagram records information such as where each


host is located, where network devices are located, and how these
devices are connected to the network.

Question 2
That’s right.

A logical topology diagram records information such as device names,


IP addressing, configuration information, and network designations.

Online Connections Summary


Mobile phones use radio waves to transmit voice signals to antennas.
These antennas are mounted on towers located in specific geographic
areas. The most common type of cellular telephone network is a GSM
network. Most mobile phones and smart phones have an indicator that
shows when a 4G or 5G signal is available. In addition to the GSM
and 3G/4G transmitters and receivers, smart phones make
connections to different types of networks, including: GPS, Wi-Fi,
Bluetooth, and NFC.
Local network connections

You can group network components into four categories: hosts,


peripherals, network devices, and network media. Hosts are any
devices that send and receive messages directly across the network.
Shared peripherals are not directly connected to the network, but
instead are connected to hosts. Networking devices are sometimes
referred to as “intermediary devices” because they are usually located
in the path that messages take between a source host and a
destination host. Network media refers to the cables and wires used in
wired networks, along with radio frequency waves used in wireless
networks.

To physically connect to a network, a host must have a network


interface card (NIC). The NIC is a piece of hardware that enables the
device to connect to the network media, either wired or wirelessly. A
host requires an IP address which also contains a subnet mask and a
default gateway to identify it to the other devices in the network. An IP
address can be configured manually or assigned automatically by a
DHCP server.

Network Documentations
It is important that a network is well planned, logically organized, and
well documented. Device names must be unique and should have a
consistent format that conveys meaningful information. This can help
to determine device type, function, location, and sequence number
based on the device name. IP addresses must also be unique to each
device. When networks are installed, a physical topology diagram is
created to record where each host is located and how it is connected
to the network. The physical topology diagram also shows where the
wiring is installed and the locations of the networking devices that
connect the hosts. There is also other information that you must have
when troubleshooting network problems. This information cannot be
“seen” from the physical view of the network. The device names, IP
addressing, configuration information, and network designations are
logical pieces of information that may change more frequently than the
physical connectivity. A logical topology illustrates the relevant
network configuration information.

Module question
1. What is a characteristic of a SOHO network?

o It consists of multiple LANs with backbone infrastructure connections.


o It is a large network, such as those used by corporations and schools, with hundreds or thousands of
interconnected hosts.
o It is a collection of interconnected private and public networks.
o It is a small network that connects a few computers to each other and to the internet.
Answers Explanation & Hints:
The SOHO network allows computers in a home office or a remote office to connect to a corporate network, or access ce

2. What is the delay in the amount of time for data to travel between two points
on a network?

o bandwidth
o throughput
o latency
o goodput
Answers Explanation & Hints:
Latency is a term used to indicate delay when getting a packet from one point to another. Network connections with smal
called low-latency networks, whereas network connections with long delays are called high-latency networks. High laten
any network communications.

3. What type of network is defined by two computers that can both send and
receive requests for resources?

o client/server
o peer-to-peer
o enterprise
o campus
Answers Explanation & Hints:
The simplest form of peer-to-peer networking consists of two computers that are directly connected to each other through
wireless connection.

4. What is a role of an intermediary device on a network?

o functions as the primary source of information for end devices


o determines the path and directs data along the way to its final destination
o runs applications that support collaboration for business
o forms the interface between the human network and the underlying communication network
Answers Explanation & Hints:
Processes running on the intermediary network devices perform functions like regenerating and re-transmitting data sign
about what pathways exist through the network and internetwork, directing data along alternate pathways when there is a
or denying the flow of data, based on security settings.

5. Which type of technology is used to provide digital data transmissions over


cell phone networks?

o 4G
o Wi-Fi
o NFC
o Bluetooth
Answers Explanation & Hints:
3G, 4G, and 4G-LTE are technologies that are used to provide enhanced cell phone networks that are capable of fast data

6. Which wireless technology is used on smart phones to transmit data to another


device within only very close proximity?

o NFC
o Wi-Fi
o 3G/4G
o Bluetooth
Answers Explanation & Hints:
Near Field Communications (NFC) is a wireless technology that enables data to be exchanged by devices that are in very
other.

7. A traveling sales representative uses a cell phone to interact with the home
office and customers, track samples, make sales calls, log mileage, and
upload/download data while at a hotel. Which internet connectivity method
would be a preferred method to use on the mobile device due to the low cost?

o cellular
o DSL
o cable
o Wi-Fi
Answers Explanation & Hints:
Mobile devices typically use either the cellular network or a Wi-Fi network to connect to the internet. The Wi-Fi connect
uses less battery power and is free in many places.

8. Which IP configuration parameter provides the IP address of a network


device that a computer would use to access the Internet?

o default gateway
o host IP address
o subnet mask
o DNS server
Answers Explanation & Hints:
The types of IP configuration on a host device include these:
IP address – identifies the host on the network.
Subnet mask – identifies the network on which the host is connected.
Default gateway – identifies the networking device that the host uses to access the Internet or another remote network.
DNS server – identifies the server that is used to translate a domain name into an IP address.

9. Refer to the exhibit. A student is working on a Packet Tracer lab that includes
a home wireless router to be used for both wired and wireless devices. The
router and laptop have been placed within the logical workspace. The student
adds a laptop device and wants to replace the wired network card with a
wireless network card. What is the first step the student should do to install
the wireless card?

Modules 1 –
4 Internet Connection Getting Online Pre-Test Exam Answers 02
o Power off the laptop by clicking on the power button.
o Drag the wired network card into the list on the left side.
o Select the Config tab and then the wireless network card checkbox.
o Select the WPC300N option from the left and drag that card to the side of the laptop.
Answers Explanation & Hints:
Any time you are removing or installing devices into a PC or laptop within Packet Tracer, turn the power off. For the Pac
Physical tab and click on the power button to the immediate right of the power cord.

10.Which type of cable connection would be used in Packet Tracer to connect a


FastEthernet port on a PC to a switch port?

o console
o crossover
o fiber
o straight-through
Answers Explanation & Hints:
A FastEthernet straight-through cable is used to connect the FastEthernet0 port on a PC to a switch port.

11.Refer to the exhibit. Which menu item would be used to bring up a web
browser?
Modules 1 – 4
Internet Connection Getting Online Pre-Test Exam Answers 02
o Physical
o Config
o Desktop
o Programming
o Attributes
Answers Explanation & Hints:
The Desktop menu item is used to access common applications and tools used to configure a device such as the IP addres
browser, as well as other apps.

12.Refer to the exhibit. A user is creating a wired and wireless network using
Packet Tracer. The user has added a home wireless router, a PC, and a laptop.
The user configures the home wireless router. Which icon represents the tool
that can be used on the laptop to view the SSID and connect to the wireless
router?

Modules 1
– 4 Internet Connection Getting Online Pre-Test Exam Answers 03
o Command Prompt
o IP Configuration
o Web Browser
o PC Wireless
Answers Explanation & Hints:
The PC Wireless icon represents the tool that can be used to view and connect to a specific wireless SSID that has been c
router.

13.Which type of network cable is commonly used in backbone networks and


telephone companies?

o coaxial cable
o fiber-optic cable
o twisted-pair cable
o shielded twisted-pair cable
Answers Explanation & Hints:
Fiber-optic cables can carry very large amounts of data and are used extensively by telephone companies and in backbon

14.A group of newly hired entry-level network engineers are talking about the
network cabling they are going to have to install as a team. What is a
characteristic of Ethernet straight-through UTP cable?

o It can only use the T568A standard at both ends of the cable.
o It can be used to connect two network hosts.
o It is Cisco proprietary.
o It is susceptible to interferences from EMI and RFI.
Answers Explanation & Hints:
Ethernet straight-through UTP cable is commonly used to interconnect a host to a switch and a switch to a router. It can u
T568B) at both ends. EMI and RFI signals can distort and corrupt the data signals being carried by copper media.

15.A network administrator would like to determine the path a packet takes to
reach the destination 192.168.1.1. What is the best command to determine the
network path?

o tracert 192.168.1.1
o ping 127.0.0.1
o ping 192.168.1.1
o ipconfig 192.168.1.1
Answers Explanation & Hints:
The traceroute (tracert) command is used to verify the path to a destination device. The ping command is used to verify L
ipconfig command is used to display the IP address on a device.

16.What is a purpose of an IP address?

o It identifies the physical location of a data center.


o It identifies a location in memory from which a program runs.
o It identifies a return address for replying to email messages.
o It identifies the source and destination of data packets.
Answers Explanation & Hints:
Packets that are routed across the Internet contain source and destination IP addresses. These addresses are used to determ
be routed from source to destination by intermediate devices.
3.0.2 What Will I Learn in this Module?

This module contains the following:

 4 Videos
 4 Packet Tracer activities
 1 Module Quiz

Module Title: Explore Networks with Packet Tracer

Module Objective: Create a simulated network using Packet Tracer.

3.1.1 Video - Introduction to Cisco Packet Tracer


This is a media player component. Select the play / pause button to
watch or listen.

Cisco Packet Tracer is an innovative network simulation and


visualization tool. This free software helps you to practice your
network configuration and troubleshooting skills via your desktop
computer. Packet Tracer is available for both the Linux Windows and
macOS desktop environments.

With Packet Tracer you can choose to build a network from scratch,
use a pre-built sample network, or complete lab activities. Packet
Tracer allows you to easily explore how data traverses your network.
Packet Tracer provides an easy way to design and build networks of
varying sizes without expensive lab equipment. While this software is
not a replacement for practicing on physical routers, switches,
firewalls, and servers, it provides too many benefits to ignore!

3.3.1 Video - Getting Started in Cisco Packet Tracer


This is a media player component. Select the play / pause button to
watch or listen.

Packet Tracer is a tool that allows you to simulate real networks. It


provides three main menus that you can use for the following:

 Add devices and connect them via cables or wireless


 Select, delete, inspect, label, and group components within your
network
 Manage your network

The network management menu lets you do the following:

 Open an existing/sample network


 Save your current network
 Modify your user profile or your preferences

If you have used any program such as a word processor or


spreadsheet, you are already familiar with the File menu commands
located in the top menu bar. The Open, Save, Save
As, and Exit commands work as they would for any program, but
there are two commands that are special to Packet Tracer:

 The Open Samples command will display a directory of prebuilt


examples of features and configurations of various network and
Internet of Things devices included within Packet Tracer.
 The Exit and Logout command will remove the registration
information for this copy of Packet Tracer and require the next
user of this copy of Packet Tracer to do the login procedure
again.

3.3.2 Locate and Deploy Devices

Because Packet Tracer simulates networks and network traffic, the


physical aspects of these networks also need to be simulated. This
includes actually finding and deploying physical devices, customizing
those devices, and cabling those devices. After the physical
deployment and cabling is done, then it is time for configuration of the
interfaces used to connect the devices.

Finding a device to deploy requires looking in the Device-Type


Selection Box. The Device-Type Selection Box works on the concept
of categories and sub-categories, as shown in the figure.

The top row of icons represents the category list consisting of:
[Networking Devices], [End Devices], [Components], [Connections],
[Miscellaneous], and [Multiuser]. Each category contains at least one
sub-category group.
Packet Tracer - Deploy Devices
Objectives
In this activity, you will deploy multiple devices.

Required Resources
         Latest version of Packet Tracer

Instructions
A list of device labels is visible in the workspace, we will use various methods to deploy the listed
devices.
Note: If you require more help with Packet Tracer, navigate to Help > Contents within Packet Tracer.

Part 1: Deploying the Devices


a.     Locate the 2911 router in the Device-Specific Selection Box.
b.     Using your mouse, drag and drop the 2911 router above the Router0 label in the workspace.
c.     Another way to deploy a device is to click the desired device and then click the desired location on
the workspace. Click the 1941 router in the Device-Specific Selection Box and then click the
space above the label Router1 in the workspace.
d.     Use either of the methods to put a 4331 router on the workspace over the Router2 label.

Part 2: Deploying the Same Type of Devices Multiple Times


If you want to put multiple devices of the same type onto the workspace, the clicking and dragging
can become very tedious. To avoid this, you can hold down the <CTRL> key as you click on the
device in the Device-Specific Selection Box.
a.     Hold down the <CTRL> key and click the 4321 router in the Device-Specific Selection Box.
b.     Now click the space above the labels Router3, Router4, and Router5.
c.     To cancel the operation, click the Cancel icon where the 4321 router was in the Device-Specific
Selection Box.

Part 3: Copying the Devices


The user may also copy devices on the workspace in two ways.
Method #1: Drag your cursor over the devices that you want to copy.
a.     Drag a box over Router3. It should appear faded.
b.     Hold down the <CTRL> key and drag Router3 over the label Copy of Router3.
c.     Repeat this with Router4 and Router5.
Method #2: Hold down the <SHIFT> key and click the devices to be copied.
a.     Select Router1 and Router2 while holding down the <SHIFT> key will again have a faded look.
b.     Hold down the <CTRL> key and drag the devices to the space over the label Copy of
End of document
Router1 and release.

Packet Tracer - Deploy and Cable Devices


Objectives
         Deploy and Cable Network Devices.

Background / Scenario
You will locate, deploy, and cable multiple types of devices.

Instructions
Part 1: Deploy the Devices
a.     Navigate to the Device-Type Selection box at the bottom of the screen.
The top row of icons represents categories of devices and the bottom row represents
subcategories. Point at the top row of icons slowly and look at the Label box between the rows;
the names of the categories will appear. Now point at the lower row icons and you will see their
names appear.
b.     You will deploy switches and PCs. Point at the lower row icons until you see one labeled
Switches. Click the switch icon and you will see the switch devices in the Device-Specific
Selection box change.
c.     Deploy two 2960 switches over the Switch0 and Switch1 labels in the workspace. You can drag
and drop the switch or select the desired switch and click the desired location in the workspace.
d.     Repeat for the end devices. Click the End Devices category in the Device-Type Selection box
and deploy six PCs.
If you are unsure of which device is the PC, just point at the device in the Device-Specific
Selection box and look at the label area below the devices; it should say PC-PT. (Remember
that you do not have to select the PC icon six times to deploy them. There is a shortcut).
Note: If you need more instructions for deploying the devices, you can refer to a previous Packet
Tracer activity or click Help > Contents > select Workspace Basics > Logical
Workspace within Packet Tracer.

Part 2: Cable the Devices.


In this part, you will connect the PCs to the switches.

Step 1: Connect the PCs to the Switches.


a.     Click the category that looks like a lightning bolt labeled Connections. In the Device-Specific
Selection box, there will appear a series of cable types. Select the Copper Straight-
Through cable type.
b.     Click the center of the PC0. You will see a pop-up menu appear showing the cable connection
types. Select FastEthernet0 in the pop-up menu.
c.     With the wire, click Switch0. Select FasEthernet0/1 in the pop-up menu.
The cable will now be connected, and two blinking link lights will appear, one green and one
amber. After a while, the amber light will turn green. You will learn about the color of lights as you
progress through the course.
d.     Repeat the cabling process for the rest of the PC. The connections to be done are listed below:
PC1 FastEthernet0 to Switch0 FastEthernet0/2
PC2 FastEthernet0 to Switch0 FastEthernet0/3
PC3 FastEthernet0 to Switch1 FastEthernet0/1
PC4 FastEthernet0 to Switch1 FastEthernet0/2
PC5 FastEthernet0 to Switch1 FastEthernet0/3

Step 2: Connect the Switches.


You will connect the switches together using a copper cross-over cable.
a.     Select a Copper Cross-Over cable. Click Switch0. Select GigabitEthernet0/1 in the pop-up
menu.
b.      With the wire, click Switch1 and select the same interface from the pop-up menu. The cable will
appear and both link lights will be amber but will eventually turn to green after about a minute.
c.     Save the file as desired.

3.4.2 GUI and CLI Configuration in Packet Tracer


List of expandable sections. Select each button to expand the content.

Packet Tracer also provides a variety of tabs for device configuration


including the following:

 Physical
 Config
 CLI
 Desktop
 Services

The tabs that are shown depend on the device you are currently
configuring.

Note: You may see other tabs on different devices. These additional


tabs are beyond the scope of this course.
3.4.3 Packet Tracer -
Configure End Devices

Packet Tracer - Configure End Devices


Objectives
         Configure various end devices in Packet Tracer.

Background / Scenario
In this activity, you will construct a simple Packet Tracer network and complete basic configuration of
end devices.

Instructions

Part 1: Build the Topology.


Step 1: Create the devices.
Deploy a 2960 switch, two PCs and a server.
If help is required, please refer to previous activities.

Step 2: Connect the devices.


a.     Connect FastEthernet0 on PC0 to FastEthernet0/1 on Switch0 with a Copper Straight-Through
cable.
b.     Connect FastEthernet0 on PC1 to FastEthernet0/2 on Switch0 with a Copper Straight-Through
cable.
c.     Connect FastEthernet0 on Server0 to GigabitEthernet0/1 on Switch0 with a Copper Straight-
Through cable.

Part 2: Configure Static IP addresses.


Step 1: Configure IP address for Server0.
a.     Click Server0.
b.     Click the Desktop tab.
c.     Click the IP Configuration icon.
d.     Verify the bullet Static is selected.
e.     Enter 192.168.1.1 in the IP Address field.
f.      Enter 255.255.255.0 in the Subnet Mask field as needed.
g.     Close the IP Configuration when done.

Step 2: Configure IP address for the PCs.


a.     Click PC0.
b.     Click the Desktop tab.
c.     Click the IP Configuration icon.
d.     Verify the bullet Static is selected.
e.     Enter 192.168.1.2 in the IP Address field.
f.      Enter 255.255.255.0 in the Subnet Mask field as needed.
g.     Close the IP Configuration when done for PC0.
h.     Repeat the same procedure for PC1. Use 192.168.1.3 as the IP address for PC1.

Part 3: Verify Connectivity.


Step 1: Verify connectivity via the Command Prompt.
a.     Verify that all the link lights are green.
b.     Click PC0.
c.     Click the Desktop tab.
d.       Click Command Prompt to open the PC command line interface.
e.       At the prompt, enter ping 192.168.1.1.
C:\> ping 192.168.1.1
If you have done everything correctly, you should see the following output. Your output could
vary, but the reply statements should be there. If the replies are not there, try redoing the device
configuration to this point.
Pinging 192.168.1.1 with 32 bytes of data:
 
Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
Reply from 192.168.1.1: bytes=32 time=1ms TTL=128
 
Ping statistics for 192.168.1.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 1ms, Average = 0ms

f.      You can also ping PC1. Navigate to the Command Prompt for PC1 and enter the command ping
192.168.1.3 at the prompt. The ping should be successful.
g.     Close the command prompt when finished.

Step 2: Verify connectivity via the web browser.


a.     Click PC1.
b.     Click the Desktop tab.
c.     Click the Web Browser to open the web browser application.
d.     Enter 192.168.1.1 in the URL field and click Go. The Cisco Packet Tracer webpage should open.
e.     Close the web browser when finished.
f.      You can also use the web browser application on PC0 to display the Cisco Packet Tracer
webpage. Navigate to PC0. From the Desktop tab, open Web Browser and enter 192.168.1.1 in
the URL field.

Part 4: Basic Switch Configuration


You will perform some basic configuration on a switch using the Config and CLI tabs in Packet
Tracer.

Step 1: The Config tab


a.     Click Switch0.
b.     Click the Config tab.
Note: The Config tab is not always available on physical networking equipment. Some simple
devices only have config tabs. The config tab can be useful for basic learning of commands,
especially for beginners.
The Config tab shows a list of components that can be configured on this device. We are not
going to cover what these components are, as that is learned in a networking course, but we will
show how to navigate and use the interface.
c.     The Global Settings allows a user to change the name of a device that displays in the
workspace. It also allows for changing the internal name shown at the command line prompt as
well as buttons for saving, loading, exporting, and erasing configuration files.
Double-click in the Hostname dialog box to highlight the word Switch. Enter Central to replace
Switch as the hostname. Packet Tracer will display the IOS commands necessary to accomplish
the name change in the Equivalent IOS Commands box. The commands displayed should be
as follows:
Switch> enable
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# hostname Central
Central(config)#
These would be the commands used from the command line interface or CLI to change the
hostname. If you did not know how to do this from the CLI, the Config tab would show the
necessary commands.
d.     Click the FastEthernet0/1 under the Interface heading to configure the FastEthernet0/1 interface.
In the Equivalent IOS Commands, the command interface FastEthernet0/1 is displayed in the
Equivalent IOS Commands box.

Step 2: The CLI tab


a.     Select the CLI tab to switch to the CLI interface. Notice that the same commands that were in
the Equivalent IOS Commands box are listed in the CLI window.
b.     At the prompt, enter shutdown.
Central(config-if)# shutdown
Central(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to
administratively down
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed
state to down
Central(config-if)#
This command just shuts down the interface down from the command line.
c.     Navigate to the Workspace. Notice that the link lights for the connection between PC0 and
Switch0 are red. Because the interface on the switch was shut down, the connection is no longer
active and shows red.
d.     Save and close the activity, then exit Packet Tracer if desired.

3.5.1 Packet Tracer - Create


a Simple Network
In this activity, you will complete the following objectives:

 Part 1: Build a simple network in the logical topology workspace.


 Part 2: Configure the network devices.
 Part 3: Test connectivity between network devices.
 Part 4: Save the file and close Packet Tracer.

Packet Tracer - Create a Simple Network


Addressing Table
Device Interface IP Address Subnet Mask Default Gateway

PC Ethernet0 DHCP 192.168.0.1


Wireless Router LAN 192.168.0.1 255.255.255.0 N/A
Wireless Router N/A

Internet DHCP
cisco.com Server Ethernet0 209.165.200.225 255.255.255.224 N/A
Laptop Wireless0 DHCP 192.168.0.1
 

Objectives
In this activity, you will build a simple network in Packet Tracer.
Part 1: Build a Simple Network
Part 2: Configure the End Devices and Verify Connectivity

Instructions

Part 1: Build a Simple Network


In this part, you will build a simple network by deploying and connecting the network devices.

Step 1: Add network devices to the workspace.


In this step, you will add a PC, laptop, and a cable modem to the Logical Workspace.
Using the device selection box, add the devices to the workspace, add the following devices to the
workspace. The category and sub-category associated with the device are listed below:
         PC: End Devices > End Devices > PC
         Laptop: End Devices > End Devices > Laptop
         Cable Modem: Network Devices > WAN Emulation > Cable Modem

Step 2: Change display names of the nework devices.


a.     To change the display names of the network devices, click the device icon on the Logical
workspace.
b.     Click the Config tab in the device configuration window.
c.     Enter the new name of the newly added device into the Display Name field according to the
Addressing Table.
Step 3: Add the physical cabling between devices on the workspace
Using the device selection box, add the physical cabling between devices on the workspace.
a.     The PC will need a copper straight-through cable to connect to the wireless router. Select the
copper straight-through cable in the device selection box and attach it to
the FastEthernet0 interface of the PC and the GigabitEthernet 1 interface of the wireless router.
b.     The wireless router will need a copper cross-over cable to connect to the cable modem. Select
the copper cross-over cable in the device-selection box and attach it to the Internet interface of
the wireless router and the Port 1 interface of the cable modem.
c.     The cable modem will need a Coaxial cable to connect to the Internet cloud. Select the Coaxial
cable in the device-selection box and attach it to the Port 0 interface of the cable modem and
the Coaxial 7 interface of the Internet cloud.

Part 2: Configure the End Devices and Verify Connectivity


Step 1: Configure the PC.
You will configure the PC for the wired network in this step.
a.     Click the PC. In the Desktop tab, navigate to IP Configuration to verify that DHCP is enabled
and the PC has received an IP address. Close the IP Configuration window when done.
b.     In the Desktop tab, click Command Prompt.
c.     Verify that the PC has received an IPv4 address by issuing the ipconfig /all command from the
prompt. The PC should receive an IPv4 address in the 192.168.0.x range.
d.     Test connectivity to the cisco.pka server from the PC. From the command prompt, issue the
command ping cisco.pka. It may take a few seconds for the ping to return. Four replies should
be received.

Step 2: Configure the Laptop.


In this step, you will configure the laptop to access the wireless network.
a.     Click Laptop, and select the Physical tab.
b.     In the Physical tab, you will need to remove the Ethernet copper module and replace it with the
Wireless WPC300N module.
1)    Power off Laptop by clicking the power button on the side of the laptop.
2)    Remove the currently installed Ethernet copper module by clicking on the module on the side
of the laptop and dragging it to the MODULES pane on the left of the laptop window.
3)    Install the Wireless WPC300N module by clicking it in the MODULES pane and dragging it to
the empty module port on the side of the laptop.
4)    Power on the Laptop by clicking the Laptop power button again.
c.     With the wireless module installed, connect the laptop to the wireless network. Click
the Desktop tab and select the PC Wireless.
d.     Select the Connect tab. The wireless network HomeNetwork should be visible in the list of
wireless networks. Select the HomeNetwork. Click Connect.
e.     Close the PC Wireless. Select Web Browser in the Desktop tab.
f.      In the Web Browser, navigate to cisco.pka.
3.5.2 What Did I Learn in
this Module?
Packet Tracer Network Simulator

Cisco Packet Tracer is a network simulation and visualization tool that


helps you to practice your network configuration and troubleshooting
skills via your computer. Packet Tracer is available for the Linux,
Windows, and macOS environments. With Packet Tracer you can
build a network from scratch, use a prebuilt sample network, or
complete lab activities.
Packet Tracer Installation

To obtain and install your copy of Cisco Packet Tracer, please follow
the instructions from the link below:
https://skillsforall.com/resources/lab-downloads

Packet Tracer User Interface

Packet Tracer provides three main menus that allow you to do the
following:

 Add devices and connect them via cables or wireless


 Select, delete, inspect, label, and group components within your
network
 Manage your network
The network management menu allows you to do the following:

 Open an existing/sample network


 Save your current network
 Modify your user profile or your preferences

The physical aspects of networks are also simulated with Packet


Tracer: finding and deploying physical devices, customizing those
devices, and cabling those devices. To find a device to deploy, look in
the Device-Type Selection Box. The Device-Type Selection Box has
categories and subcategories. The top row of icons represents the
category list: [Networking Devices], [End Devices], [Components],
[Connections], [Miscellaneous], and [Multiuser]. Each category
contains at least one sub category group.

After this, it is time for configuration of the interfaces used to connect


the devices.

Packet Tracer Network Configuration

You can configure the different intermediate and end devices that
make up your network. Click the device that you wish to configure. A
popup window will appear displaying a series of tabs. Different types
of devices have different interfaces.

For intermediate devices such as routers and switches, there are two
methods of configuration available. Devices can be configured or
investigated via a Config tab (a GUI interface) or a command line
interface (CLI). The CLI interface requires knowledge of device
configuration.

For some of the end devices, such as PCs and laptops, Packet Tracer
provides a desktop interface that gives you access to IP configuration,
wireless configuration, a command prompt, a web browser, and much
more.
If you are configuring a server, the server has all of the functions of
the host with the addition of the Services tab. With it, you can
configure a server as a web server, a DHCP server, a DNS server, or
other type of server.

Question 1
Multiple choice question
What is a feature of Packet Tracer?

It allows a functional replacement for real physical network equipment.

It allows building and modeling network configurations.

It can be used to trace a packet from source to destination using real


corporate data.

It can be used to examine network data flows for a corporate network


that connects to the internet.
That’s right!
Topic 3.1.0 - Packet Tracer is a network simulation tool to build wired
and wireless networks as well as modeling device configurations
within a test network environment.
Complete Question 2
Question 2
Multiple choice question

Refer to the exhibit. Which network device is being configured within


Packet Tracer?

home wireless router

laptop

PC

switch
That’s right!
Topic 3.5.0 - The exhibit shows the 2.4 GHz and multiple 5 GHz
wireless networks that can be configured on a home wireless network
within Packet Tracer. Each wireless network can be a unique SSID.
Complete Question 3
Question 3
Multiple choice question
Refer to the exhibit. A user is building a home wireless network within
Packet Tracer. The user adds 2 PCs and 2 laptops. Which device
would be needed to create the network?

the device labeled A

the device labeled B

the device labeled C

the device labeled D


That’s right!
Topic 3.5.0 - A home wireless router is shown with the normal router
icon and two wireless antennas on the back of the circle. Device B is a
router used to connect LANs. Device C is a switch. Device D is a
cloud used to connect to the Internet or between sites.
Complete Question 4
Question 4
Multiple choice question

Refer to the exhibit. Which menu item would be used to bring up a


web browser?
Physical

Config

Desktop

Programming

Attributes
That’s right!
Topic 3.4.0 - The Desktop menu item is used to access common
applications and tools used to configure a device such as the IP
address, command prompt, web browser, as well as other apps.
Complete Question 5
Question 5
Multiple choice question
Which type of cable connection would be used in Packet Tracer to
connect a FastEthernet port on a PC to a switch port?

console

crossover
fiber

straight-through
That’s right!
Topic 3.3.0 - A FastEthernet straight-through cable is used to connect
the FastEthernet0 port on a PC to a switch port.
Complete Question 6
Question 6
Multiple choice question
A student is creating a wired network in Packet Tracer. The student
added six PCs. What other device is needed so that the PCs can
communicate with one another?

cloud

firewall

switch

IoT gateway
That’s right!
Topic 3.3.0 - To create a wired local-area network in Packet Tracer,
host devices such as PCs or laptops can be used in addition to a
switch. Use a straight-through Ethernet cable to connect each end
device to the switch.
Complete Question 7
Question 7
Multiple choice question

Refer to the exhibit. A user is creating a wired and wireless network


using Packet Tracer. The user has added a home wireless router, a
PC, and a laptop. The user configures the home wireless router.
Which icon represents the tool that can be used on the laptop to view
the SSID and connect to the wireless router?

Command Prompt

IP Configuration

Web Browser

PC Wireless
That’s right!
Topic 3.4.0 - The PC Wireless icon represents the tool that can be
used to view and connect to a specific wireless SSID that has been
configured on a wireless router.
Complete Question 8
Question 8
Multiple choice question

Refer to the exhibit. A student is working on a Packet Tracer lab that


includes a home wireless router to be used for both wired and wireless
devices. The router and laptop have been placed within the logical
workspace. The student adds a laptop device and wants to replace
the wired network card with a wireless network card. What is the first
step the student should do to install the wireless card?

Power off the laptop by clicking on the power button.

Drag the wired network card into the list on the left side.

Select the Config tab and then the wireless network card checkbox.

Select the WPC300N option from the left and drag that card to the
side of the laptop.
That’s right!
Topic 3.3.0 - Any time you are removing or installing devices into a PC
or laptop within Packet Tracer, turn the power off. For the Packet
Tracer laptop, use the Physical tab and click on the power button to
the immediate right of the power cord.
Complete Question 9
Question 9
Multiple choice question

A technician selected the GUI interface on a wireless router and


added a DNS address of 208.67.220.220. The technician then
immediately exited the GUI interface. What will occur as a result of
this configuration?

All connected host devices, configured with DHCP, will automatically


be sent the IP address of the DNS server.

Because the technician forgot to save the configuration, the DNS


server address will not be sent to connected devices.

The technician should have used the Config tab to enter the DNS


address

The technician should check the Physical tab to ensure that the
wireless router is powered on.
That’s not right.
Topic 3.4.0 - When working with a wireless device within the Packet
Tracer GUI environment, scroll to the bottom and select the Save
Settings option for each menu item.
Complete Question 10
Question 10
Multiple choice question
Refer to the exhibit. Which Packet Tracer menu option would be used
to change the preferences such as showing port labels in the logical
workspace?

File

Edit

Options

Tools

Extensions
That’s right!
Topic 3.4.0 - The Options menu item allows configuration and viewing
of Packet Tracer preferences, user profile information, algorithm
settings, and command log.

4.0.1 Why Should I Take this Module?

Welcome to Build a Simple Peer-to-Peer Network!


A simple peer-to-peer network usually involves directly hard wiring two
computers together so that they can share files. Hard wiring requires
the correct cables. This module explains the three different types of
cables used in networks, how they are connected, and how you can
be sure that your peer-to-peer network is working properly. It’s a fun
and easy way to get started with networking at your home or school.
Why wait?

4.0.2 What Will I Learn in this Module?

This module contains the following:

 5 Videos
 2 Labs
 4 Check Your Understanding activities
 1 Module Quiz

Module Title: Build a Simple Network

Module Objective: Build a simple home network.


Network Media Types
4.1.2 Three Media Types

Communication transmits across a network on media. The media


provides the channel over which the message travels from source to
destination.

Modern networks primarily use three types of media to interconnect


devices, as shown in the figure:

 Metal wires within cables - Data is encoded into electrical


impulses.
 Glass or plastic fibers within cables (fiber-optic cable) - Data
is encoded into pulses of light.
 Wireless transmission - Data is encoded via modulation of
specific frequencies of electromagnetic waves.

The four main criteria for choosing network media are these:

 What is the maximum distance that the media can successfully


carry a signal?
 What is the environment in which the media will be installed?
 What is the amount of data and at what speed must it be
transmitted?
 What is the cost of the media and installation?

4.1.3 Common Network Cables


List of expandable sections. Select each button to expand the content.
The three most common network cables are twisted-pair, coaxial
cable, and fiber-optic cable.
Question 1

That’s right.
Criteria for choosing a network media include the maximum
transmission distance, the environment, the amount and speed of data
to be transmitted, and the cost of the media and installation.

Question 2

That’s right.

Coaxial cable is the most common type of media used by cable TV


companies.
Question 3

That’s right.

Fiber-optic cable is used to carry digital information at very high


speeds over long distances.
Question 4

That’s right.

Twisted-pair cable is the most common type of wired media to connect


end devices to an Ethernet LAN.

Ethernet Cabling

4.2.1 Twisted-Pair Cables

The networks in most homes and schools are wired with twisted-pair
copper cable. This type of cable is inexpensive compared to other
types of cabling, and it is readily available. The Ethernet patch cables
that you can purchase through the internet or at a retail store are an
example of copper twisted-pair cable

Twisted-pair cables consist of one or more pairs of insulated copper


wires that are twisted together and housed in a protective jacket. Like
all copper cables, twisted-pair uses pulses of electricity to transmit
data.

Data transmission over copper cable is sensitive to electromagnetic


interference (EMI), which can reduce the data throughput rate that a
cable can provide. Common items in a home that can create EMI
include microwave ovens and fluorescent light fixtures.

Another source of interference, known as crosstalk, occurs when


cables are bundled together for long lengths. The electrical impulses
from one cable can cross over to an adjacent cable. This occurs most
frequently when cables are improperly installed and terminated. When
data transmission is corrupted due to interference such as crosstalk,
the data must be retransmitted. This can degrade the data carrying
capacity of the medium.

The figure illustrates how data transmission is affected by


interference.

1. A pure digital signal is transmitted


2. On the medium, there is an interference signal
3. The digital signal is corrputed by the interference signal.
4. The receiving computer reads a changed signal. Notice that a 0
bit is now interpreted as a 1 bit.
There are two commonly installed types of twisted-pair cable:

 Unshielded twisted-pair (UTP) - This is the most commonly


encountered type of network cable in North America and many
other areas.
 Shielded cables (STP) - These are used almost exclusively in
European countries.

UTP Cable
UTP cable is inexpensive, offers a high bandwidth, and is easy to
install. This type of cable is used to connect workstations, hosts and
network devices. It can come with many different numbers of pairs
inside the jacket, but the most common number of pairs is four. Each
pair is identified by a specific color code.

STP Cable
There are electrical environments in which EMI and RFI are so strong
that shielding is a requirement to make communication possible, such
as in a factory. In this instance, it may be necessary to use a cable
that contains shielding, such as shielded twisted-pair (STP).
Unfortunately, STP cables are very expensive, not as flexible, and
have additional requirements because of the shielding that make them
difficult to work with.
Many different categories of UTP cables have been developed over
time, as shown in the table. Each category of cable was developed to
support a specific technology and most are no longer encountered in
homes or offices. The cable types which are still commonly found
include Categories 3, 5, 5e, and 6.
All categories of data grade UTP cable are traditionally terminated into
an RJ-45 connector. There are still some applications that require the
smaller RJ-11 connector, such as analog phones and some fax
machines. In the figure below, an example of an RJ-11 connector is
on the left. The RJ-45 connector is on the right.

RJ-11 and RJ-45 Connectors


That’s right.

Crosstalk occurs when cables are bundled together for long lengths.
Question 2

That’s right.

Shielded twisted-pair (STP) is used in electrical environments in which


EMI and RFI are so strong that shielding is a requirement to make
communication possible.
Question 3

That’s right.

All categories of data grade UTP cable are traditionally terminated into
an RJ-45 connector.
Coaxial and Fiber-Optic Cabling
4.3.1 Cable TV and Satellite Cables

Like twisted-pair, coaxial cable (or coax) carries data in the form of
electrical signals. It provides improved shielding compared to UTP and
can therefore carry more data. Coaxial cable is usually constructed of
either copper or aluminum. It is used by cable television companies to
provide service and for connecting the various components that make
up satellite communication systems. You are probably familiar with the
coaxial cables used to connect a TV set to the signal source, be it a
cable TV outlet, satellite TV, or conventional antenna in your home.
With the addition of a cable modem, the cable television provider can
offer data and internet service, as well as television signals and
telephone over the same coaxial cable.

Although coax has improved data carrying characteristics, twisted-pair


cabling has replaced coax in local area networking uses. Among the
reasons for the replacement is that compared to UTP, coax is
physically harder to install, more expensive, and harder to
troubleshoot.

4.3.2 Fiber-Optic Cables

Unlike UTP and coax, fiber-optic cables transmit data using pulses of
light. Although not normally found in home or small business
environments, fiber-optic cabling is widely used in enterprise
environments and large data centers.

Fiber-optic cable is constructed of either glass or plastic, neither of


which conducts electricity. This means that it is immune to EMI and
RFI, and is suitable for installation in environments where interference
is a problem. Fiber connections are a good choice to extend networks
from one building to another, both because of distance considerations
and because fiber cables are more resistant to outdoor environmental
conditions than copper cables. Each fiber-optic circuit is actually two
fiber cables. One is used to transmit data; the other is used to receive
data.

The figure shows the structure of a fiber-optic cable.

In the figure above, the parts of a fiber-optic cable are as follows:


 Jacket - Typically a PVC jacket that protects the fiber against
abrasion, moisture, and other contaminants. This outer jacket
composition can vary depending on the cable usage.
 Strengthening Material - Surrounds the buffer, prevents the
fiber cable from being stretched when it is being pulled. The
material used is often the same material used to produce
bulletproof vests.
 Buffer - Used to help shield the core and cladding from damage.
 Cladding - Made from slightly different chemicals than those
used to create the core. It tends to act like a mirror by reflecting
light back into the core of the fiber. This keeps light in the core as
it travels down the fiber.
 Core - The core is actually the light transmission element at the
center of the optical fiber. This core is typically silica or glass.
Light pulses travel through the fiber core.

Fiber-optic cables can reach distances of several miles or kilometers


before the signal needs to be regenerated. Either lasers or light
emitting diodes (LEDs) generate the light pulses that are used to
represent the transmitted data as bits on the media. In addition to its
resistance to EMI, fiber-optic cables support a large amount of
bandwidth, making them ideally suited for high-speed data networks.
Bandwidth on fiber-optic links can reach speeds of 100 Gbps and is
continually increasing as standards are developed and adopted. Fiber-
optic links are found in many corporations and are also used to
connect ISPs on the internet.
Question 1

That’s right.

Coaxial cabling is physically harder to install, more expensive, and


harder to troubleshoot.

Which type of cabling is immune to RFI and EFI?

coaxial
UTP

STP

fiber-optic
ResetShow feedback
Previous
  Home
 

Nex

Question 2

That’s right.

Fiber-optic cable is constructed of either glass or plastic which means


that it is immune to EMI and RFI, and is suitable for installation in
environments where interference is a problem.

Twisted-Pair Operation
4.4.1 Twisted-Pair Wiring Schemes

Have you ever looked closely at the plastic RJ-45 connector at the
end of an Ethernet patch cable? Did you ever wonder why each of the
wires terminating in the connector has a specific color or pattern? The
color coding of the wire pairs in an UTP cable is determined by the
type of standard that is used to make the cable. Different standards
have different purposes and are closely governed by the standards
organizations.

For typical Ethernet installations, there are two standards that are
widely implemented. The TIA/EIA organization defines two different
patterns, or wiring schemes, called T568A and T568B, as shown in
the figure. Each wiring scheme defines the pinout, or order of wire
connections, on the end of the cable.
On a network installation, one of the two wiring schemes (T568A or
T568B) should be chosen and followed. It is important that the same
wiring scheme is used for every termination in that project.

T568A and T568B Standards

4.4.2 Twisted-Pair Transmit and Receive Pairs

Ethernet NICs and the ports on networking devices are designed to


send data over UTP cables. Specific pins on the connector are
associated with a transmit function and a receive function. The
interfaces on each device are designed to transmit and receive data
on designated wires within the cable.

When two devices are directly connected using an UTP Ethernet


cable, it is important that the transmit function and the receive function
on each end of the cable are reversed. One device sends data on a
specific set of wires and the device on the other end of the cable
listens for the data on the same wires.
Two devices that use different wires for transmit and receive are
known as unlike devices. They require a straight-through cable to
exchange data. Straight-through cables have the same color patterns
on both ends of the cable.

Click Play in the figure to view transmission across a straight-through


cable.

Devices that are directly connected and use the same pins for transmit
and receive, are known as like devices. They require the use of a
crossover cable in order to reverse the transmit function and receive
function so that the devices can exchange data.

Question 1

That’s right.

The TIA/EIA organization defines two different patterns, or wiring


schemes, called T568A and T568B. Each wiring scheme defines the
pinout, or order of wire connections, on the end of the cable.
Question 2

That’s right.

Devices that are directly connected and use the same pins for transmit
and receive require the use of a crossover cable in order to reverse
the transmit function and receive function so that the devices can
exchange data.

Question 3

That’s right.

Devices that use different wires for transmit and receive require a
straight-through cable to exchange data. Straight-through cables have
the same color patterns on both ends of the cable.

Verify Connectivity
4.5.2 Using the ping Command

Every device that sends messages across the internet must have an
Internet Protocol (IP) address to identify it to the other devices in the
network. IP addresses are assigned by network administrators. When
a new device is added to a network, or if an existing device is having
problems, it may be necessary to test the network to determine if the
IP address assigned to the device can be reached by other devices on
the network.

The ping utility tests end-to-end connectivity between the IP address


of the source of the message and the IP address of its destination. It
measures the time that it takes test messages to make a round trip
from the source to the destination, and whether the transmission is
successful. However, if the test message does not reach the
destination, or if delays are encountered along the way, there is no
way to determine where the problem is located.

The format of the ping command is universally implemented. Almost


all network attached devices provide a way to perform a ping test. The
format of the ping command is ping x.x.x.x, where x.x.x.x is an IP
address or domain name:

For example, ping 192.168.30.1.


4.5.3 The traceroute Command

The internet is not really a place; it is the interconnection of many


different networks that provide services to the users. We can see this
connectivity by using a network utility call traceroute.

As shown in the figure, the traceroute utility traces the route a


message takes from its source to the destination. Each individual
network through which the message travels is referred to as a hop.
The traceroute command displays each hop along the way and the
time it takes for the message to get to that network and back.

If a problem occurs, use the output of the traceroute utility to help


determine where a message was lost or delayed. The traceroute utility
is called tracert in the Windows environment.
Build a Simple Network Summary
4.6.1 What Did I Learn in this
Module?

Network media types

Modern networks primarily use three types of media to interconnect


devices and to provide the pathway over which data can be
transmitted: copper wires within cables, glass or plastic fibers (fiber-
optic cable), and wireless transmission. The four main criteria for
choosing network media are: the distance the media can successfully
carry a signal, the environment in which the media is to be installed,
the amount of data and the speed at which it must be transmitted, and
the cost of the media and installation.

Twisted-pair is the most common network cable. The wires are


grouped in pairs and twisted together to reduce interference. Coaxial
cable is usually made of copper or aluminum. It has a single rigid core
surrounded by a layer of insulation, braided metal shielding, and a
protective jacket. Glass or plastic fiber-optic cable core has a diameter
similar to a human hair. These cables can carry digital information at
high speeds over long distances.

Ethernet cabling

Twisted-pair cables consist of one or more pairs of insulated copper


wires that are twisted together and housed in a protective jacket. Like
all copper cables, twisted-pair uses pulses of electricity to transmit
data. Data transmission over copper cable is sensitive to EMI, which
can reduce the data throughput rate that a cable can provide.
Common items in a home that can create EMI include microwave
ovens and fluorescent light fixtures. Another source of interference,
known as crosstalk, occurs when cables are bundled together for long
lengths. The electrical impulses from one cable can cross over to an
adjacent cable.

There are two commonly installed types of twisted-pair cable: UTP


(most commonly used type) and STP (used most often in European
countries). UTP cable types which are still commonly found include
Categories 3, 5, 5e and 6. All categories of data grade UTP cable are
traditionally terminated into an RJ-45 connector.

Coaxial and fiber optic cabling

Like twisted-pair, coaxial cable (or coax) carries data in the form of
electrical signals. It provides improved shielding compared to UTP and
can therefore carry more data. Although coax has improved data
carrying characteristics, twisted-pair cabling has replaced coax in
LANs because coax is harder to install, more expensive, and harder to
troubleshoot.

Unlike UTP and coax, fiber-optic cables transmit data using pulses of
light. Fiber-optic cable is constructed of either glass or plastic, neither
of which conducts electricity. This means that it is immune to EMI and
RFI, and is suitable for installation in environments where interference
is a problem. Fiber connections are a good choice to extend networks
from one building to another, both because of distance considerations
and because fiber cables are more resistant to outdoor environmental
conditions than copper cables. Each fiber-optic circuit is actually two
fiber cables. One is used to transmit data; the other is used to receive
data. Either lasers or light emitting diodes (LEDs) generate the light
pulses that are used to represent the transmitted data as bits on the
media. In addition to its resistance to EMI, fiber-optic cables support a
large amount of bandwidth, making them ideally suited for high-speed
data networks.

Twisted pair operation

The color coding of the wire pairs in an UTP cable are determined by
the type of standard that is used to make the cable. Different
standards have different purposes and are closely governed by the
standards organizations.

For typical Ethernet installations, there are two widely implemented


standards. The TIA/EIA organization defines two different patterns, or
wiring schemes, called T568A and T568B. Each wiring scheme
defines the pinout, or order of wire connections, on the end of the
cable. It is important that the same wiring scheme is used for every
termination in an installation.

Ethernet NICs and the ports on networking devices are designed to


send data over UTP cables. Specific pins on the connector are
associated with a transmit function and a receive function. The
interfaces on each device are designed to transmit and receive data
on designated wires within the cable. Two devices that use different
wires for transmit and receive are known as unlike devices. They
require a straight-through cable to exchange data. Straight-through
cables have the same color patterns on both ends of the cable.
Devices that are directly connected and use the same pins for transmit
and receive are known as like devices. They require the use of a
crossover cable in order to reverse the transmit function and receive
function so that the devices can exchange data.

Verify Connectivity

The ping utility tests end-to-end connectivity between the IP address


of the source of the message and the IP address of its destination. It
measures the time that it takes test messages to make a round trip
from the source to the destination and whether the transmission is
successful.

The traceroute utility traces the route a message takes from its source
to the destination. Each individual network through which the message
travels is referred to as a hop. The traceroute command displays each
hop along the way and the time it takes for the message to get to that
network and back. The traceroute utility is called tracert in the
Windows environment.

4.6.2 Build a Simple Network Quiz


Complete Question 1
Question 1
Multiple choice question

Which type of network cable contains multiple copper wires and uses
extra shielding to prevent interference?
STP

UTP

fiber-optic

coax

That’s right!

Topic 4.2.0 - Shielded twisted-pair (STP) cables contain additional


shielding and is commonly used when EMI or RFI interference would
negatively affect the data communication crossing a network cable.

Complete Question 2
Question 2
Multiple choice question

Which type of data cable is used by television companies to carry data


and video signals?

unshielded twisted-pair

coaxial

fiber-optic

shielded twisted-pair

That’s right!

Topic 4.3.0 - Cable television companies and satellite communication


systems both use copper or aluminum coaxial cable for connections
between devices.

Complete Question 3
Question 3
Multiple choice question

Which term describes the interference when electrical impulses from


one cable cross over to an adjacent cable?

crossover

crosstalk

RFI

collision

That’s right!

Topic 4.2.0 - Crosstalk occurs when cables are bundled together for
long lengths and the electrical impulses from one cable cross over to
an adjacent cable

Complete Question 4
Question 4
Multiple choice question

A group of newly hired entry-level network engineers are talking about


the network cabling they are going to have to install as a team. What
is a characteristic of Ethernet straight-through UTP cable?

It can only use the T568A standard at both ends of the cable.

It can be used to connect two network hosts.

It is Cisco proprietary.

It is susceptible to interferences from EMI and RFI.


That’s not right.

Topic 4.2.0 - Ethernet straight-through UTP cable is commonly used


to interconnect a host to a switch and a switch to a router. It can use
one standard (T568A or T568B) at both ends. EMI and RFI signals
can distort and corrupt the data signals being carried by copper
media.

Complete Question 5
Question 5
Multiple choice question

A network specialist has been hired to install a network in a company


that assembles airplane engines. Because of the nature of the
business, the area is highly affected by electromagnetic interference.
Which type of network media should be recommended so that the
data communication will not be affected by EMI?

STP

coaxial

fiber optic

UTP

That’s right!

Topic 4.3.0 - Optical fiber uses light to transmit signals. Therefore,


fiber-optic cable is not affected by EMI or RFI.

Complete Question 6
Question 6
Multiple choice question

Which type of network cable is commonly used in backbone networks


and telephone companies?
coaxial cable

fiber-optic cable

twisted-pair cable

shielded twisted-pair cable

That’s not right.

Topic 4.1.0 - Fiber-optic cables can carry very large amounts of data
and are used extensively by telephone companies and in backbone
networks.

Complete Question 7
Question 7
Multiple choice question

Which type of Ethernet cable should be used to directly connect two


devices that both use the same pins for transmitting and receiving
data?

straight-through twisted-pair cable

fiber-optic cable

coaxial cable

crossover twisted-pair cable

That’s not right.

Topic 4.4.0 - Devices that use the same pins to transmit and receive
data require the use of a crossover cable in order to successfully
exchange data.
Complete Question 8
Question 8
Multiple choice question

Which command can be used to verify connectivity between two host


devices?

ipconfig

ping

netstat

nslookup

That’s right!

Topic 4.5.0 - The ping command can be used to test end-to-end


connectivity between two host devices. It measures the round-trip time
for a message to get from source to destination.

Complete Question 9
Question 9
Multiple choice question

Refer to the exhibit. One end of the cable is terminated as displayed,


and the other end is terminated in accordance with the T568A
standard. What type of cable would be created in this manner?

crossover

rollover

straight-through
fiber-optic

That’s right!

Topic 4.4.0 - A straight-through cable can have either a T568A or


T568B standard termination at one end and the same at the other
end. A crossover cable has a T568A standard termination at one end
and a T568B standard at the other end. A rollover cable can have
either a T568A or T568B standard termination at one end, and at the
other end have the same standard, but with the wires connected in
reverse order. A fiber-optic cable is not terminated using RJ-45
connectors.

Complete Question 10
Question 10
Multiple choice question

What is a purpose of an IP address?

It identifies the physical location of a data center.

It identifies a location in memory from which a program runs.

It identifies a return address for replying to email messages.

It identifies the source and destination of data packets.

That’s right!

Topic 4.5.0 - Packets that are routed across the Internet contain
source and destination IP addresses. These addresses are used to
determine how the packets should be routed from source to
destination by intermediate devices.

Complete Question 11
Question 11
Multiple choice question
A network administrator would like to determine the path a packet
takes to reach the destination 192.168.1.1. What is the best command
to determine the network path?

tracert 192.168.1.1

ping 127.0.0.1

ping 192.168.1.1

ipconfig 192.168.1.1

That’s right!

Topic 4.5.0 - The traceroute (tracert) command is used to verify the


path to a destination device. The ping command is used to verify
Layer 3 connectivity. The ipconfig command is used to display the IP
address on a device.

Modules 1 - 4: Internet Connection:


Getting Online Group Exam

Question 1
Multiple choice question

What terms represent the maximum and actual speed that can be
utilized by a device to transfer data?
bandwidth; throughput

throughput; bandwidth

bandwidth; goodput

throughput; goodput
Bandwidth measures the maximum rate at which a device can transfer
data. However, in practice, the actual speed for data transfer could be
reduced because of numerous factors like network congestion,
overhead etc. This actual rate of transfer is known as throughput.
Complete Question 2
Question 2
Multiple choice question

Which term is used to describe a network device that relies on another


device to obtain information?

web server

console

server

client
A client device has software installed which enables it to request the
required service from a server device. For instance, a user who uses a
web browser is effectively requesting pages from servers all over the
web. In this case the browser is considered the client, whereas the
device that is responsible for answering the request is considered the
server.
Complete Question 3
Question 3
Multiple choice question

How many unique values are possible using a single binary digit?
1

16
A bit is stored and transmitted as one of two possible discrete states.
Each bit can only have one of two possible values, 0 or 1. The term bit
is an abbreviation of “binary digit” and represents the smallest piece of
data.
Complete Question 4
Question 4
Multiple choice question

What is a disadvantage of deploying a peer-to-peer network model?

difficulty of setup

lack of centralized administration

high degree of complexity

high cost
The simplest peer-to-peer network consists of two computers that are
directly connected to each other through the use of a wired or wireless
connection. The primary disadvantages of a peer-to-peer network are
its lack of central administration, minimal security, and its lack of
scalability.
Complete Question 5
Question 5
This question component requires you to select the matching option.
When you have selected your answers select the submit button.
Match the term to the value represented.
Eight bits
Approximately one million bytes
Approximately one trillion bytes
A one or a zero
Approximately one billion bytes
Approximately one thousand bytes
Terabyte
Megabyte
Bit
Byte
Kilobyte
Gigabyte

Options matched to the correct selection.


Eight bits Byte
A one or a zero Bit
Approximately one billion bytes Gigabyte
Approximately one million bytes Megabyte
Approximately one trillion bytes Terabyte
Approximately one thousand bytes Kilobyte
Complete Question 6
Question 6
Multiple choice question

A wireless network was recently installed in a coffee shop and


customer mobile devices are not receiving network configuration
information. What should be done to correct the problem?

Check the connection of the DNS server to the Internet.

Provide peripheral devices to customers.


Make sure the DHCP server is functional.

Ensure that the default gateway device is working properly.


End-user devices can request an address from a pool of addresses
that are maintained by a DHCP server.
Complete Question 7
Question 7
Multiple choice question

If you were drawing a physical topology of your school network, what


type of information would you include?

how devices are connected

the location of devices in the building

the path that data takes to reach destinations

the IP addresses of all devices on the network


A physical topology is a diagram that shows where all the devices are
physically located in the building.
Complete Question 8
Question 8
Multiple choice question

A consumer places a smartphone close to a pay terminal at a store


and the shopping charge is successfully paid. Which type of wireless
technology was used?

Bluetooth

NFC

Wi-Fi
3G
NFC is a wireless technology that allows data to be exchanged
between devices that are in very close proximity to each other.
Complete Question 9
Question 9
Multiple choice question

Which type of network component can be used to share an attached


printer to the network?

personal computer

peripheral

access point

network media
A peripheral is a device that is not directly connected to a network. In
order to be made available on a network, a host is responsible for
sharing the peripheral across the network.
Complete Question 10
Question 10
Multiple choice question

Which network device is used to translate a domain name to the


associated IP address?

router

DNS server

DHCP server

default gateway
A DNS server is a network device that is used to translate a domain
name to its IP address. A user will identify a website using a domain
name, such as www.cisco.com and a DNS server will translate it to an
associated IP address.
Complete Question 11
Question 11
Multiple choice question

Refer to the exhibit. A student has started a Packet Tracer network


that includes a home wireless router to be used for both wired and
wireless devices. The router and laptop have been placed within the
logical workspace. The student clicks on the laptop and the window
that opens is shown in the exhibit. What is the purpose of the modules
on the left?

This is the list of modules currently installed in the laptop.

These are optional modules that can be installed into the module slot
if it is currently empty.

These are modules that can be used by double-clicking on one


module so that it automatically installs into the laptop.

This is a list of modules available from the manufacturer that can be


clicked on and “purchased.”
Modules on the left can be installed into the shown device, in this case
a laptop. Be sure to power the device off before installing any option.
Complete Question 12
Question 12
Multiple choice question

Refer to the exhibit. Which menu item would be used to bring up a


command prompt environment to be able to ping another network
device?
Physical

Config

Desktop

Programming

Attributes
The Desktop menu item is used to access common applications and
windows used to configure a device such as the IP address, command
prompt, web browser, as well as other apps.
Complete Question 13
Question 13
Multiple choice question

Refer to the exhibit. A student is creating a wired and wireless network


in Packet Tracer. After inserting a router, switch, and PC, the student
chooses a straight-through cable to connect the PC to the switch.
Which connection would be the best port for the student to choose on
the PC?

RS 232

USB0

USB1

FastEthernet0
A PC to switch connection is through an Ethernet cable. Connect
FastEthernet0 on the PC to any Ethernet port on the switch.
Complete Question 14
Question 14
Multiple choice question
Refer to the exhibit. An instructor wants to show a few prebuilt Packet
Tracer sample labs in class. Which menu option would the instructor
use to access a sample lab?

File

Edit

Options

View

Tools

Extensions
Use the File > Open Samples menu option to browse for the samples
provided with Packet Tracer.
Complete Question 15
Question 15
Multiple choice question

Refer to the exhibit. A home wireless network is being configured


within Packet Tracer. The user adds a wireless router, a PC, and three
laptops. The user is reviewing the wireless connection on one of the
laptops. What can be determined?

Because the password is not enabled, the laptop cannot connect to


the wireless router.

All three laptops are connected to the wireless network successfully.

The laptop is connected to a wireless network.


The laptop must have a different wireless NIC installed before being
able to connect to the wireless router.
A home wireless router could be configured for a 2.4 GHz and multiple
5 GHz wireless networks, each with a unique SSID such as QuizMe3,
QuizMe2, and QuizMe. The wireless NIC is active and connected to a
wireless network as indicated by the words Adapter is Active. The
wireless router has not been configured with wireless security.
Complete Question 16
Question 16
Multiple choice question

What are two advantages of using fiber-optic cabling to interconnect


devices? (Choose two.)

Fiber-optic cable is immune from EMI and RFI.

Fiber-optic cables can extend several miles.

Fiber-optic cables use extra shielding to protect copper wires.

Fiber-optic cables are easy to install.

Fiber-optic cables are commonly found in both homes and small


businesses.
Fiber-optic cables provide immunity to both EMI and RFI and a single
cable can extend for several miles before regeneration is needed.
Complete Question 17
Question 17
Multiple choice question

What are two sources of electromagnetic interference that can affect


data transmissions? (Choose two.)

LED monitor
microwave oven

infrared remote control

cordless phone

florescent light fixture


Electromagnetic interference or EMI is commonly caused by
equipment such as microwave ovens and fluorescent light fixtures.
Complete Question 18
Question 18
Multiple choice question

Which criterion can be used to select the appropriate type of network


media for a network?

the types of data that need to be prioritized

the cost of the end devices that are used in the network

the number of intermediary devices that are installed in the network

the environment where the selected medium is to be installed


Criteria for choosing a network medium are the distance across which
the selected medium can successfully carry a signal, the environment
in which the selected medium is to be installed, the amount of data
and the speed at which the data must be transmitted, and the cost of
the medium and its installation.
Complete Question 19
Question 19
Multiple choice question

Which type of network cable is commonly used to connect office


computers to the local network?
coaxial cable

twisted-pair cable

glass fiber-optic cable

plastic fiber-optic cable


Twisted-pair is a type of copper cable used to interconnect devices on
a local network.
You've submitted your answers!
Submit

Module 5: Communication Principles

Explain the importance of standards and protocols in network


communications.
Introduction
Welcome to Communication Principles!

When you talk with someone, you are communicating. When you mail
a card to your grandfather, you are communicating. You probably
don’t think much about the rules of communication when you do these
two things. But there are rules, and good communication only
happens when all parties know and follow those rules. It is the same
with devices on a network. This module explains the rules, which are
called protocols, of network communication. When you understand the
various protocols and how they work with other protocols, you will not
only understand how networks and the internet work, you will also be
able to troubleshoot problems in your own network! Interested? Good.
Let’s go!

5.0.2 What Will I Learn in


this Module?

This module contains the following:

 4 Videos
 2 Labs
 2 Check Your Understanding activities
 1 Module Quiz

Module Title: Communication Principles

Module Objective: Explain the importance of standards and protocols


in network communications.
The Rules
5.1.1 The Three Elements

The primary purpose of any network is to provide us with a method to


communicate and share information. From the very earliest primitive
human societies to the most advanced technological societies of
today, sharing information with others has been crucial for human
advancement.

All communication begins with a message, or information, that must


be sent from one individual or device to another. The methods used to
send, receive, and interpret messages change over time as
technology advances.

All communication methods have three elements in common. The first


of these elements is the message source, or sender. Message
sources are people, or electronic devices, that need to communicate a
message to other individuals or devices. The second element of
communication is the destination, or receiver, of the message. The
destination receives the message and interprets it. The third element
is called a transmission medium, or channel. It provides the pathway
over which the message can travel from source to destination.
Analogy

Click Play in the figure to view an animation of two people


communicating face-to-face.

Prior to communicating, they must agree on how to communicate. If


the communication is using voice, they must first agree on the
language. Next, when they have a message to share, they must be
able to format that message in a way that is understandable.

If someone uses the English language, but poor sentence structure,


the message can easily be misunderstood. Each of these tasks
describe protocols that are used to accomplish communication.

Network

Click Play in the figure to view an animation of two devices


communicating
Prior to communicating, the devices must agree on how to
communicate. They must also format the message in a way that is
understandable.

As shown in the animation, this is also true for computer


communication.

5.1.2 Communication Protocols


A tabbed content container. Content can be text, graphic or both.

Communication in our daily lives takes many forms and occurs in


many environments. We have different expectations depending on
whether we are chatting via the internet or participating in a job
interview. Each situation has its corresponding expected behaviors
and styles.

Before beginning to communicate with each other, we establish rules


or agreements to govern the conversation. These agreements include
the following:

 What method of communication should we use?


 What language should we use?
 Do we need to confirm that our messages are received?

These rules, or protocols, must be followed in order for the message


to be successfully delivered and understood. Among the protocols that
govern successful human communication are these:

 An identified sender and receiver


 Agreed upon method of communicating (face-to-face, telephone,
letter, photograph)
 Common language and grammar
 Speed and timing of delivery
 Confirmation or acknowledgment requirements

The techniques that are used in network communications share these


fundamentals with human conversations.

Think about the commonly accepted protocols for sending text


messages to your friends.

5.1.3 Why Protocols Matter

Just like humans, computers use rules, or protocols, in order to


communicate. Protocols are required for computers to properly
communicate across the network. In both a wired and wireless
environment, a local network is defined as an area where all hosts
must "speak the same language", which, in computer terms means
they must "share a common protocol".

If everyone in the same room spoke a different language, they would


not be able to communicate. Likewise, if devices in a local network did
not use the same protocols, they would not be able to communicate.
Networking protocols define many aspects of communication over the
local network. As shown in the table, these include message format,
message size, timing, encoding, encapsulation, and message
patterns.

Communication Standards
5.2.2 The Internet and Standards

With the increasing number of new devices and technologies coming


online, how is it possible to manage all the changes and still reliably
deliver services such as email? The answer is internet standards.

A standard is a set of rules that determines how something must be


done. Networking and internet standards ensure that all devices
connecting to the network implement the same set of rules or
protocols in the same manner. Using standards, it is possible for
different types of devices to send information to each other over the
internet. For example, the way in which an email is formatted,
forwarded, and received by all devices is done according to a
standard. If one person sends an email via a personal computer,
another person can use a mobile phone to receive and read the email
as long as the mobile phone uses the same standards as the personal
computer.

5.2.3 Network Standards Organizations

An internet standard is the end result of a comprehensive cycle of


discussion, problem solving, and testing. These different standards
are developed, published, and maintained by a variety of
organizations, as shown in the figure. When a new standard is
proposed, each stage of the development and approval process is
recorded in a numbered Request for Comments (RFC) document so
that the evolution of the standard is tracked. RFCs for internet
standards are published and managed by the Internet Engineering
Task Force (IETF).

Other standards organizations that support the internet are shown in


the figure.
Question 1

That’s right.

Protocols are the rules that govern network communications including


the message format, message size, timing and encapsulation.
Question 2

That’s right.

The IETF publishes internet standards known as RFCs.

Network Communication Models

5.3.3 The Protocol Stack


Successful communication between hosts requires interaction
between a number of protocols. These protocols are implemented in
software and hardware that are installed on each host and networking
device.

The interaction between the different protocols on a device can be


illustrated as a protocol stack, as shown in the figure. A stack
illustrates the protocols as a layered hierarchy, with each higher-level
protocol depending on the services of the protocols shown in the lower
levels.

The separation of functions enables each layer in the stack to operate


independently of others. For example, you can use your laptop
computer connected to a cable modem at home to access your
favorite website, or view the same website on your laptop using a
wireless connection at the library. The function of the web browser is
not affected by the change in the physical location, nor the method of
connectivity.
The protocols in the figure are described as follows:

 Hypertext Transfer Protocol (HTTP) - This protocol governs


the way a web server and a web client interact. HTTP defines
the content and formatting of the requests and responses that
are exchanged between the client and server. Both the client and
the web server software implement HTTP as part of the
application. HTTP relies on other protocols to govern how the
messages are transported between the client and server.
 Transmission Control Protocol (TCP) - This protocol manages
the individual conversations. TCP is responsible for guaranteeing
the reliable delivery of the information and managing flow control
between the end devices.
 Internet Protocol (IP) - This protocol is responsible for
delivering messages from the sender to the receiver. IP is used
by routers to forward the messages across multiple networks.
 Ethernet - This protocol is responsible for the delivery of
messages from one NIC to another NIC on the same Ethernet
local area network (LAN).

5.3.4 The TCP/IP Model

Layered models help us visualize how the various protocols work


together to enable network communications. A layered model depicts
the operation of the protocols occurring within each layer, as well as
the interaction with the layers above and below it. The layered model
has many benefits:
 Assists in protocol design, because protocols that operate at a
specific layer have defined information that they act upon and a
defined interface to the layers above and below.
 Fosters competition because products from different vendors can
work together.
 Enables technology changes to occur at one level without
affecting the other levels.
 Provides a common language to describe networking functions
and capabilities.

The first layered model for internetwork communications was created


in the early 1970s and is referred to as the internet model. It defines
four categories of functions that must occur in order for
communications to be successful. The suite of TCP/IP protocols that
are used for internet communications follows the structure of this
model, as shown in the figure. Because of this, the internet model is
commonly referred to as the TCP/IP model.

5.3.5 The OSI Reference Model

There are two basic types of models that we use to describe the
functions that must occur in order for network communications to be
successful: protocol models and reference models.

 Protocol model - This model closely matches the structure of a


particular protocol suite. A protocol suite includes the set of
related protocols that typically provide all the functionality
required for people to communicate with the data network. The
TCP/IP model is a protocol model because it describes the
functions that occur at each layer of protocols within the TCP/IP
suite.
 Reference model - This type of model describes the functions
that must be completed at a particular layer, but does not specify
exactly how a function should be accomplished. A reference
model is not intended to provide a sufficient level of detail to
define precisely how each protocol should work at each layer.
The primary purpose of a reference model is to aid in clearer
understanding of the functions and processes necessary for
network communications.

The most widely known internetwork reference model was created by


the Open Systems Interconnection (OSI) project at the International
Organization for Standardization (ISO). It is used for data network
design, operation specifications, and troubleshooting. This model is
commonly referred to as the OSI model.
5.3.6 Upper and Lower Layers of the OSI Model

Moving data across a network can be visualized using the seven


layers of the OSI model, as shown in the figure. The OSI model
breaks network communications down into multiple processes. Each
process is a small part of the larger task.

For example, in a vehicle manufacturing plant, the entire vehicle is not


assembled by one person. Rather, the vehicle moves from station to
station where specialized teams add specific components. The
complex task of assembling a vehicle is made easier by breaking it
into manageable and logical tasks. This process also makes
troubleshooting easier. When a problem occurs in the manufacturing
process, it is possible to isolate the problem to the specific task where
the defect was introduced, and then fix it.

In a similar manner, the OSI model helps us troubleshoot by focusing


on a specific layer to identify and resolve network problems.
Networking teams often refer to different functions occurring on a
network by the number of the OSI model layer that specifies that
functionality. For example, the process of encoding the data bits for
transmission across the media occurs at Layer 1, the physical layer.
The formatting of data so it can be interpreted by the network
connection in your laptop or phone is described at Layer 2, the data
link layer.
5.3.7 OSI Model and TCP/IP Model Comparison

Because TCP/IP is the protocol suite in use for internet


communications, why do we need to learn the OSI model as well?
The TCP/IP model is a method of visualizing the interactions of the
various protocols that make up the TCP/IP protocol suite. It does not
describe general functions that are necessary for all networking
communications. It describes the networking functions specific to
those protocols in use in the TCP/IP protocol suite. For example, at
the network access layer, the TCP/IP protocol suite does not specify
which protocols to use when transmitting over a physical medium, nor
the method of encoding the signals for transmission. OSI Layers 1 and
2 discuss the necessary procedures to access the media and the
physical means to send data over a network.

The protocols that make up the TCP/IP protocol suite can be


described in terms of the OSI reference model. The functions that
occur at the internet layer in the TCP/IP model are contained in the
network layer of the OSI Model, as shown in the figure. The transport
layer functionality is the same between both models. However, the
network access layer and the application layer of the TCP/IP model
are further divided in the OSI model to describe discrete functions that
must occur at these layers.

OSI Model TCP/IP Model


The key similarities are in the transport and network layers;
however, the two models differ in how they relate to the layers above
and below each layer:

 OSI Layer 3, the network layer, maps directly to the TCP/IP


internet layer. This layer is used to describe protocols that
address and route messages through an internetwork.
 OSI Layer 4, the transport layer, maps directly to the TCP/IP
transport layer. This layer describes general services and
functions that provide ordered and reliable delivery of data
between source and destination hosts.
 The TCP/IP application layer includes several protocols that
provide specific functionality to a variety of end user applications.
The OSI model Layers 5, 6, and 7 are used as references for
application software developers and vendors to produce
applications that operate on networks.
 Both the TCP/IP and OSI models are commonly used when
referring to protocols at various layers. Because the OSI model
separates the data link layer from the physical layer, it is
commonly used when referring to these lower layers.

Question 1

That’s right.

Transport Control Protocol (TCP) is responsible for guaranteeing


reliable delivery.
Question 2

That’s right.

Internet Protocol (IP) is used by routers to forward messages.


Question 3

That’s right.

The OSI model data link and network layers correspond to the
network access layer in the TCP/IP model.

Question 4

That’s right.

IP addressing occurs at the network layer.


Ethernet

5.4.1 The Rise of Ethernet

In the early days of networking, each vendor used its own proprietary
methods of interconnecting network devices and networking protocols.
If you bought equipment from different vendors, there was no
guarantee that the equipment would work together. Equipment from
one vendor might not communicate with equipment from another.

As networks became more widespread, standards were developed


that defined rules by which network equipment from different vendors
operated. Standards are beneficial to networking in many ways:

 Facilitate design
 Simplify product development
 Promote competition
 Provide consistent interconnections
 Facilitate training
 Provide more vendor choices for customers

There is no official local area networking standard protocol, but over


time, one technology, Ethernet, has become more common than the
others. Ethernet protocols define how data is formatted and how it is
transmitted over the wired network. The Ethernet standards specify
protocols that operate at Layer 1 and Layer 2 of the OSI model.
Ethernet has become a de facto standard, which means that it is the
technology used by almost all wired local area networks, as shown in
the figure.
5.4.2 Ethernet Evolution

The Institute of Electrical and Electronic Engineers, or IEEE


(pronounced eye-triple-e), maintains the networking standards,
including Ethernet and wireless standards. IEEE committees are
responsible for approving and maintaining the standards for
connections, media requirements and communications protocols.
Each technology standard is assigned a number that refers to the
committee that is responsible for approving and maintaining the
standard. The committee responsible for the Ethernet standards is
802.3.

Since the creation of Ethernet in 1973, standards have evolved for


specifying faster and more flexible versions of the technology. This
ability for Ethernet to improve over time is one of the main reasons
that it has become so popular. Each version of Ethernet has an
associated standard. For example, 802.3 100BASE-T represents the
100 Megabit Ethernet using twisted-pair cable standards. The
standard notation translates as:
 100 is the speed in Mbps
 BASE stands for baseband transmission
 T stands for the type of cable, in this case, twisted-pair.

Early versions of Ethernet were relatively slow at 10 Mbps. The latest


versions of Ethernet operate at 10 Gigabits per second and more.
Imagine how much faster these new versions are than the original
Ethernet networks.

Drag the slider bar in the figure across the timeline to see how
Ethernet standards have developed over time.

5.4.4 The Ethernet MAC Address

All communication requires a way to identify the source and


destination. The source and destination in human communication are
represented by names.

When your name is called, you listen to the message and respond.
Other people in the room may hear the message, but they ignore it
because it is not addressed to them.

On Ethernet networks, a similar method exists for identifying source


and destination hosts. Each host connected to an Ethernet network is
assigned a physical address which serves to identify the host on the
network.

Every Ethernet network interface has a physical address assigned to it


when it is manufactured. This address is known as the Media Access
Control (MAC) address. The MAC address identifies each source and
destination host on the network.
Communication Principles Summary

The Rules

All communication methods have three elements in common.


The first is the message source, or sender. Message sources are
people, or electronic devices, which need to communicate a message
to other individuals or devices. The second is the destination, or
receiver, of the message. The destination receives the message and
interprets it. The third is the transmission medium, or channel. It
provides the pathway over which the message can travel from source
to destination.

Among the protocols that govern successful human communication


are an identified sender and receiver, an agreed upon method of
communicating, common language and grammar, speed and timing of
delivery, and confirmation or acknowledgment requirements.
Networking protocols define the message format, message size,
timing, encoding, and message patterns over the local network.
Communication Standards
Networking and internet standards ensure that all devices connecting
to the network implement the same set of rules or protocols in the
same manner. Using standards, it is possible for different types of
devices to send information to each other over the internet. These
standards are developed, published, and maintained by a variety of
organizations. When a new standard is proposed, each stage of the
development and approval process is recorded in a numbered RFC
document so that the evolution of the standard is tracked. RFCs for
internet standards are published and managed by the IETF.

Network communication models

A stack illustrates the protocols as a layered hierarchy, with each


higher-level protocol depending on the services of the protocols
shown in the lower levels. The separation of functions enables each
layer in the stack to operate independently of others.

The layered model has many benefits:

 Assists in protocol design, because protocols that operate at a


specific layer have defined information that they act upon and a
defined interface to the layers above and below
 Fosters competition because products from different vendors can
work together
 Enables technology changes to occur at one level without
affecting the other levels
 Provides a common language to describe networking functions
and capabilities
The suite of TCP/IP protocols that is used for internet communications
follows the structure of the stack model. There are two basic types of
models to describe the functions that must occur for network
communications to be successful: protocol models and reference
models. The most widely known internetwork reference model is the
OSI model. The OSI model breaks network communications down into
multiple processes. Each process is a small part of the larger task.

The protocols that make up the TCP/IP protocol suite can be


described in terms of the OSI reference model. The functions that
occur at the internet layer in the TCP/IP model are contained in the
network layer of the OSI Model. The transport layer functionality is the
same between both models. However, the network access layer and
the application layer of the TCP/IP model are further divided in the
OSI model to describe discrete functions that must occur at these
layers.

Ethernet
There is no official LAN standard protocol, but over time, Ethernet, has
become more common than the others. Ethernet protocols define how
data is formatted and how it is transmitted over the wired network. The
Ethernet standards specify protocols that operate at Layer 1 and
Layer 2 of the OSI model. Ethernet standards have evolved for
specifying faster and more flexible versions of the technology. Each
version of Ethernet has an associated standard. Each host connected
to an Ethernet network is assigned a physical address which serves to
identify the host on the network. Every Ethernet network interface has
a physical address assigned to it when it is manufactured. This
address is known as the Media Access Control (MAC) address. The
MAC address identifies each source and destination host on the
network.
5.5.2 Communication Principles Quiz
Complete Question 1
Question 1
Multiple choice question

Which organization publishes and manages the Request for


Comments (RFC) documents?

IEEE

ISO

IETF

TIA/EIA

That’s right!

Topic 5.2.0 - The Internet Engineering Task Force (IETF) organization


publishes and manages the Request for Comments (RFC).

Complete Question 2
Question 2
Multiple choice question

What identifier is used at the data link layer to uniquely identify an


Ethernet device?

IP address

MAC address

sequence number
TCP port number

UDP port number

That’s right!

Topic 5.3.0 - Ethernet frames are identified at the data link layer by
their MAC addresses, which are unique to each NIC. IP addresses are
used at the network layer, and TCP and UDP port numbers are used
at the transport layer. Sequence numbers are fields in TCP headers.

Complete Question 3
Question 3
Multiple choice question

Which three layers of the OSI model are comparable in function to the
application layer of the TCP/IP model? (Choose three.)

application

presentation

session

transport

data link

physical

network

That’s right!

Topic 5.3.0 - The TCP/IP model consists of four layers: application,


transport, internet, and network access. The OSI model consists of
seven layers: application, presentation, session, transport, network,
data link, and physical. The top three layers of the OSI model:
application, presentation, and session map to the application layer of
the TCP/IP model.

Complete Question 4
Question 4
Multiple choice question

Which term refers to the set of rules that define how a network
operates?

standard

protocol

model

domain

That’s not right.

Topic 5.2.0 - Standards ensure that different devices connecting to the


network are able to communicate with each other. In networking there
are many standards that define how the network should operate and
that all components implement the same protocols.

Complete Question 5
Question 5
Multiple choice question

Which standards organization publishes current Ethernet standards?

EIA/TIA

IEEE
ANSI

CCITT

That’s right!

Topic 5.4.0 - The IEEE standards describe current Ethernet features.


The IEEE standard for Ethernet is 802.3.

Complete Question 6
Question 6
Multiple choice question

Which statement describes a MAC address?

It is 128-bits in length.

It contains two portions, the network portion and the host portion.

It is a physical address assigned to an Ethernet NIC by the


manufacturer.

It identifies the source and destination addresses of hosts on the


Internet.

That’s right!

Topic 5.4.0 - The Media Access Control (MAC) address is a physical


address assigned to each Ethernet NIC by manufacturers. It is 48-bits
in length. The MAC address is used to identify the source and
destination on a local Ethernet network. It cannot be routed to remote
networks.

Complete Question 7
Question 7
Multiple choice question
Which three elements do all communication methods have in
common? (Choose three.)

message destination

message type

message source

message data

transmission medium

message priority

That’s right!

Topic 5.1.0 - All communication methods include a message source,


destination, and a transmission medium.

Complete Question 8
Question 8
Multiple choice question

Which two layers of the OSI model specify protocols that are
associated with Ethernet standards? (Choose two.)

physical layer

data link layer

network layer

transport layer

session layer
That’s right!

Topic 5.4.0 - Ethernet standards specify protocols that operate at


Layer 1 (physical layer) and Layer 2 (data link layer) of the OSI model
and it is the technology used by almost all wired local-area networks.

Complete Question 9
Question 9
Multiple choice question

Which layer of the OSI model defines services to segment and


reassemble data for individual communications between end devices?

application

presentation

session

transport

network

That’s right!

Topic 5.3.0 - The OSI model consists of seven layers: application,


presentation, session, transport, network, data link, and physical. The
transport layer defines services to segment, transfer, and reassemble
the data for individual communications between the end devices.

Complete Question 10
Question 10
Multiple choice question
Which statement defines a data communications protocol?

an alliance of network device manufacturers

a set of rules that govern the communication process

a set of product standards for types of network devices

an exchange agreement of network devices among vendors

That’s right!

Topic 5.1.0 - A data communication protocol is a set of rules that


govern the communication process.

Module 6: Network Design and the


Access Layer

Introduction
Module Title: Network Design and Access Layer

Module Objective: Explain how communication occurs on Ethernet


networks.
Encapsulation and the Ethernet Frame

6.1.2 Encapsulation
A tabbed content container. Content can be text, graphic or both.

When sending a letter, the letter writer uses an accepted format to


ensure that the letter is delivered and understood by the recipient. In
the same way, a message that is sent over a computer network
follows specific format rules in order for it to be delivered and
processed.

The process of placing one message format (the letter) inside another
message format (the envelope) is called encapsulation. De-
encapsulation occurs when the process is reversed by the recipient
and the letter is removed from the envelope. Just as a letter is
encapsulated in an envelope for delivery, so computer messages are
encapsulated.

Each computer message is encapsulated in a specific format, called a


frame, before it is sent over the network. A frame acts like an
envelope; it provides the address of the intended destination and the
address of the source host. The format and contents of a frame are
determined by the type of message being sent and the channel over
which it is communicated. Messages that are not correctly formatted
are not successfully delivered to or processed by the destination host.

Analogy

A common example of requiring the correct format in human


communications is when sending a letter. Click Play in the figure to
view an animation of formatting and encapsulating a letter.

An envelope has the address of the sender and receiver, each located
at the proper place on the envelope. If the destination address and
formatting are not correct, the letter is not delivered.

The process of placing one message format (the letter) inside another
message format (the envelope) is called encapsulation. De-
encapsulation occurs when the process is reversed by the recipient
and the letter is removed from the envelope.

Network

Similar to sending a letter, a message that is sent over a computer


network follows specific format rules for it to be delivered and
processed.

Internet Protocol (IP) is a protocol with a similar function to the


envelope example. In the figure, the fields of the Internet Protocol
version 6 (IPv6) packet identify the source of the packet and its
destination. IP is responsible for sending a message from the
message source to destination over one or more networks.

Note: The fields of the IPv6 packet are discussed in detail in another


module.
6.1.3 Ethernet Frame
This is an animations player component.

The Ethernet protocol standards define many aspects of network


communication including frame format, frame size, timing, and
encoding.

When messages are sent between hosts on an Ethernet network, the


hosts format the messages into the frame layout that is specified by
the standards. Frames are also referred to as Layer 2 protocol data
units (PDUs). This is because the protocols that provide the rules for
the creation and format of the frame perform the functions that are
specified at the data link layer (Layer 2) of the OSI model.

The format for Ethernet frames specifies the location of the destination
and source MAC addresses, and additional information including:
 Preamble for sequencing and timing
 Start of frame delimiter
 Length and type of frame
 Frame check sequence to detect transmission errors

The size of Ethernet frames is normally limited to a maximum of 1518


bytes and a minimum size of 64 bytes from the Destination MAC
Address field through the Frame Check Sequence (FCS). The
preamble and the Start of Frame Delimiter (SFD) are used to indicate
the beginning of the frame. They are not used in the calculation of the
frame size. Frames that do not match these limits are not processed
by the receiving hosts. In addition to the frame formats, sizes and
timing, Ethernet standards define how the bits making up the frames
are encoded onto the channel. Bits are transmitted as either electrical
impulses over copper cable or as light impulses over fiber-optic cable.

Question 1

That’s right.

Encapsulation is the process of prepending protocol information with


information from another protocol.
Question 2

That’s right.

When an Ethernet frame is sent out an interface, the Destination MAC


address indicates the MAC address of the device, which is on this
network, that will receive the Ethernet frame.
Question 3

That’s right.

The Preamble and Start Frame Delimiter (SFD) indicate the beginning
of an Ethernet frame.
Question 4

That’s right.

Ethernet operates at layer 2, the data link layer, of the OSI model.

Hierarchical Network Design

6.2.2 Physical and Logical Addresses


This is an animations player component.
A person's name usually does not change. A person's address on the
other hand, relates to where the person lives and can change. On a
host, the MAC address does not change; it is physically assigned to
the host NIC and is known as the physical address. The physical
address remains the same regardless of where the host is placed on
the network.

The IP address is similar to the address of a person. It is known as a


logical address because it is assigned logically based on where the
host is located. The IP address, or network address, is assigned to
each host by a network administrator based on the local network.

IP addresses contain two parts. One part identifies the network


portion. The network portion of the IP address will be the same for all
hosts connected to the same local network. The second part of the IP
address identifies the individual host on that network. Within the same
local network, the host portion of the IP address is unique to each
host, as shown in the figure.

Both the physical MAC and logical IP addresses are required for a
computer to communicate on a hierarchical network, just like both the
name and address of a person are required to send a letter.
Hierarchical Network Design

6.2.2 Physical and Logical Addresses


This is an animations player component.

A person's name usually does not change. A person's address on the


other hand, relates to where the person lives and can change. On a
host, the MAC address does not change; it is physically assigned to
the host NIC and is known as the physical address. The physical
address remains the same regardless of where the host is placed on
the network.
The IP address is similar to the address of a person. It is known as a
logical address because it is assigned logically based on where the
host is located. The IP address, or network address, is assigned to
each host by a network administrator based on the local network.

IP addresses contain two parts. One part identifies the network


portion. The network portion of the IP address will be the same for all
hosts connected to the same local network. The second part of the IP
address identifies the individual host on that network. Within the same
local network, the host portion of the IP address is unique to each
host, as shown in the figure.

Both the physical MAC and logical IP addresses are required for a
computer to communicate on a hierarchical network, just like both the
name and address of a person are required to send a letter.
6.2.5 Hierarchical Analogy

6.2.7 Benefits of a
Hierarchical Design

In networking, hierarchical design is used to group devices into


multiple networks that are organized in a layered approach. This
method of designing networks consists of smaller, more manageable
groups that allow local traffic to remain local. Only traffic that is
destined for other networks is moved to a higher layer.

A hierarchical, layered design provides increased efficiency,


optimization of function, and increased speed. It allows the network to
scale as required because additional local networks can be added
without impacting the performance of the existing ones.

As shown in the figure, the hierarchical design has three basic layers:

 Access Layer - This layer provides connections to hosts in a


local Ethernet network.
 Distribution Layer - This layer interconnects the smaller local
networks.
 Core Layer - This layer provides a high-speed connection
between distribution layer devices.

With a hierarchical design, there is a need for a logical addressing


scheme that can identify the location of a host. The most common
addressing scheme on the internet is Internet Protocol version 4
(IPv4). Internet Protocol version 6 (IPv6) is the network layer protocol
currently being implemented as a replacement for IPv4. IPv4 and IPv6
will coexist for the foreseeable future. From this point on in this
course, the term IP will refer to both IPv4 and IPv6.

6.2.8 Access, Distribution, and Core

IP traffic is managed based on the characteristics and devices


associated with each of the three layers of the hierarchical network
design model: Access, Distribution and Core.
Access Layer

The access layer provides a connection point for end user devices to
the network and allows multiple hosts to connect to other hosts
through a network device, usually a switch, such as the Cisco 2960-
XR shown in the figure, or a wireless access point. Typically, all
devices within a single access layer will have the same network
portion of the IP address.

If a message is destined for a local host, based on the network portion


of the IP address, the message remains local. If it is destined for a
different network, it is passed up to the distribution layer. Switches
provide the connection to the distribution layer devices, usually a
Layer 3 device such as a router or Layer 3 switch.

Distribution Layer
The distribution layer provides a connection point for separate
networks and controls the flow of information between the networks. It
typically contains more powerful switches, such as the Cisco C9300
series shown in the figure, than the access layer as well as routers for
routing between networks. Distribution layer devices control the type
and amount of traffic that flows from the access layer to the core layer.
Core Layer
The core layer is a high-speed backbone layer with redundant
(backup) connections. It is responsible for transporting large amounts
of data between multiple end networks. Core layer devices typically
include very powerful, high-speed switches and routers, such as the
Cisco Catalyst 9600 shown in the figure. The main goal of the core
layer is to transport data quickly.

Question 1

That’s right.

An IP address is a logical address.


Question 2

That’s right.

An Ethernet MAC address is a physical address.


Question 3

That’s right.

The physical address does not change when the device is connected
to a new network.
Question 4

That’s right.

The host portion of an IP address uniquely identifies that device on


that network.
Question 5

That’s right.

The access layer provides connectivity to devices on an Ethernet LAN

The Access Layer

6.3.1 Access Layer Devices


This is an animations player component.

The access layer is the basic level of the network. It is the part of the
network in which people gain access to other hosts and to shared files
and printers. The access layer provides the first line of networking
devices that connect hosts to the wired Ethernet network.

Networking devices enable us to connect many hosts with each other


and also provide those hosts access to services offered over the
network. Unlike the simple network consisting of two hosts connected
by a single cable, in the access layer, each host is connected to a
networking device. This type of connectivity is shown in the figure.

Within an Ethernet network, each host is able to connect directly to an


access layer networking device using an Ethernet cable. These cables
are manufactured to meet specific Ethernet standards. Each cable is
plugged into a host NIC and then into a port on the networking device.
There are several types of networking devices that can be used to
connect hosts at the access layer, including Ethernet switches.

6.3.2 Ethernet Hubs


This is an animations player component.

The original Ethernet networks connected all hosts with a single cable,
similar to how cable TV cables are connected in your home. All users
on the network shared the bandwidth available on the cable. As
Ethernet networks became more popular, connecting everyone on a
single cable was no longer practical, nor even possible. Engineers
developed a different type of network technology that made it easier to
connect and reconnect multiple devices to the network. The first of
these types of networking devices were Ethernet hubs.

Hubs contain multiple ports that are used to connect hosts to the
network. Hubs are simple devices that do not have the necessary
electronics to decode the messages sent between hosts on the
network. Hubs cannot determine which host should get any particular
message. A hub simply accepts electronic signals from one port and
regenerates (or repeats) the same message out all of the other ports.
All hosts attached to the hub share the bandwidth, and will receive the
message. Hosts ignore the messages that are not addressed to them.
Only the host specified in the destination address of the message
processes the message and responds to the sender.

Only one message can be sent through an Ethernet hub at a time. It is


possible for two or more hosts connected to a hub to attempt to send
a message at the same time. If this happens, the electronic signals
that make up the messages collide with each other at the hub. This is
known as a collision. The message is unreadable by hosts and must
be retransmitted. The area of the network where a host can receive a
garbled message resulting from a collision is known as a collision
domain.

Because excessive retransmissions can clog up the network and slow


down network traffic, hubs are now considered obsolete and have
been replaced by Ethernet switches.

6.3.4 Ethernet Switches


This is an animations player component.

An Ethernet switch is a device that is used at the access layer. When


a host sends a message to another host connected to the same
switched network, the switch accepts and decodes the frames to read
the physical (MAC) address portion of the message.

A table on the switch, called a MAC address table, contains a list of all
of the active ports and the host MAC addresses that are attached to
them. When a message is sent between hosts, the switch checks to
see if the destination MAC address is in the table. If it is, the switch
builds a temporary connection, called a circuit, between the source
and destination ports. This new circuit provides a dedicated channel
over which the two hosts can communicate. Other hosts attached to
the switch do not share bandwidth on this channel and do not receive
messages that are not addressed to them. A new circuit is built for
every new conversation between hosts. These separate circuits allow
many conversations to take place at the same time, without collisions
occurring. Ethernet switches also allow for the sending and receiving
of frames over the same Ethernet cable simultaneously. This improves
the performance of the network by eliminating collisions.
6.3.6 The MAC Address Table
This is an animations player component.

What happens when the switch receives a frame addressed to a new


host that is not yet in the MAC address table? If the destination MAC
address is not in the table, the switch does not have the necessary
information to create an individual circuit. When the switch cannot
determine where the destination host is located, it uses a process
called flooding to forward the message out to all attached hosts except
for the sending host. Each host compares the destination MAC
address in the message to its own MAC address, but only the host
with the correct destination address processes the message and
responds to the sender.

How does the MAC address of a new host get into the MAC address
table? A switch builds the MAC address table by examining the source
MAC address of each frame that is sent between hosts. When a new
host sends a message or responds to a flooded message, the switch
immediately learns its MAC address and the port to which it is
connected. The table is dynamically updated each time a new source
MAC address is read by the switch. In this way, a switch quickly learns
the MAC addresses of all attached hosts.

Question 1

That’s right.

Ethernet switches make their forwarding decision based on


destination MAC address.
Question 2

That’s right.

Ethernet switches add entries to their MAC address table based on


the dource MAC address.
Question 3

That’s right.

When a switch receives an Ethernet frame and the destination MAC


address of that frame is not in its MAC address table, the switch will
forward the frame out all ports except in the incoming port.
Question 4

That’s right.

Ethernet hubs are considered obsolete.

Broadcast Containment

6.4.2 Ethernet Broadcasts in the Local Network


This is an animations player component.

Within the local network it is often necessary for one host to be able to
send messages to all the other hosts at the same time. This can be
done using a message known as a broadcast. Broadcasts are useful
when a host needs to find information without knowing exactly what
other host can supply it, or when a host wants to provide information
to all other hosts in the same network in a timely manner.

A message can only contain one destination MAC address. So, how is
it possible for a host to contact every other host on the local network
without sending out a separate message to each individual MAC?

To solve this problem, broadcast messages are sent to a unique MAC


address that is recognized by all hosts. The broadcast MAC address
is actually a 48-bit address made up of all ones. Because of their
length, MAC addresses are usually represented in hexadecimal
notation. The broadcast MAC address in hexadecimal notation is
FFFF.FFFF.FFFF. Each F in the hexadecimal notation represents four
ones in the binary address.

6.4.3 Broadcast Domains


This is an animations player component.

When a host receives a message addressed to the broadcast


address, it accepts and processes the message as though the
message was addressed directly to it. When a host sends a broadcast
message, switches forward the message to every connected host
within the same local network. For this reason, a local area network, a
network with one or more Ethernet switches, is also referred to as a
broadcast domain.
If too many hosts are connected to the same broadcast domain,
broadcast traffic can become excessive. The number of hosts and the
amount of network traffic that can be supported on the local network is
limited by the capabilities of the switches used to connect them. As
the network grows and more hosts are added, network traffic,
including broadcast traffic, increases. To improve performance, it is
often necessary to divide one local network into multiple networks, or
broadcast domains, as shown in the figure. Routers are used to divide
the network into multiple broadcast domains.

6.4.4 Access Layer Communication


This is an animations player component.
On a local Ethernet network, a NIC only accepts a frame if the
destination address is either the broadcast MAC address, or else
corresponds to the MAC address of the NIC.

Most network applications, however, rely on the logical destination IP


address to identify the location of the servers and clients. The figure
illustrates the problem that arises if a sending host only has the logical
IP address of the destination host. How does the sending host
determine what destination MAC address to place within the frame?

The sending host can use an IPv4 protocol called address resolution
protocol (ARP) to discover the MAC address of any host on the same
local network. IPv6 uses a similar method known as Neighbor
Discovery.

6.4.6 ARP
This is an animations player component.

ARP uses a three step process to discover and store the MAC
address of a host on the local network when only the IPv4 address of
the host is known:

1. The sending host creates and sends a frame addressed to a


broadcast MAC address. Contained in the frame is a message
with the IPv4 address of the intended destination host.
2. Each host on the network receives the broadcast frame and
compares the IPv4 address inside the message with its
configured IPv4 address. The host with the matching IPv4
address sends its MAC address back to the original sending
host.
3. The sending host receives the message and stores the MAC
address and IPv4 address information in a table called an ARP
table.

When the sending host has the MAC address of the destination host
in its ARP table, it can send frames directly to the destination without
doing an ARP request. Because ARP messages rely on broadcast
frames to deliver the requests, all hosts in the local IPv4 network must
be in the same broadcast domain.

Question 1

That’s right.

The destination MAC address for an Ethernet broadcast is


FFFF.FFFF.FFFF.
Question 2

That’s right.

When an Ethernet switch receives a frame that is broadcast, it will


forward the frame out all ports except the incoming port.
Question 3

That’s right.

A host will send an ARP request to determine the MAC address of


another device.

Question 4

That’s right.

An ARP request is a broadcast, so all devices on the network will


receive it.
Question 5

That’s right.

A host will send an ARP reply if the IP address in the ARP request
matches its own IP address.
Question 6

That’s right.

An ARP reply will include the IP and MAC address of the host that
sent the reply
6.5.2 Network Design and Access Layer Quiz
Complete Question 1
Question 1
Multiple choice question

Which destination address is used in an ARP request frame?

0.0.0.0

255.255.255.255

FFFF.FFFF.FFFF

AAAA.AAAA.AAAA

That’s right!

Topic 6.4.0 - The purpose of an ARP request is to find the MAC


address of the destination host on an Ethernet LAN. The ARP process
sends a Layer 2 broadcast to all devices on the Ethernet LAN. The
frame contains the IP address of the destination and the broadcast
MAC address, FFFF.FFFF.FFFF. The host with the IP address that
matches the IP address in the ARP request will reply with a unicast
frame that includes the MAC address of the host. Thus the original
sending host will obtain the destination IP and MAC address pair to
continue the encapsulation process for data transmission.

Complete Question 2
Question 2
Multiple choice question

Which network device can serve as a boundary to divide a Layer 2


broadcast domain?

router

Ethernet bridge

Ethernet hub

access point

That’s right!

Topic 6.4.0 - Layer 1 and 2 devices (LAN switch and Ethernet hub)
and access point devices do not filter MAC broadcast frames. Only a
Layer 3 device, such as a router, can divide a Layer 2 broadcast
domain.

Complete Question 3
Question 3
Multiple choice question

Which term refers to the process of placing one message format


inside another message format?

encoding
encapsulation

manipulation

segmenting

That’s right!

Topic 6.1.0 - Encapsulation is the process of placing one type of


message format into another. On computer networks this process is
known as encapsulation. Once a message is encapsulated, it is called
a frame.

Complete Question 4
Question 4
Multiple choice question

What is the purpose of the core layer in the Cisco hierarchical network
design model?

network access to end devices

high-speed backbone switching

aggregation point for smaller networks

flow control between networks

That’s right!

Topic 6.2.0 - In the three layer hierarchy, the access layer provides
host connectivity to the network. The distribution layer interconnects
smaller networks, and the core layer provides high-speed connections
at the top of the hierarchy.

Complete Question 5
Question 5
Multiple choice question

Which network device has the primary function to send data to a


specific destination based on the information found in the MAC
address table?

hub

router

switch

modem

That’s right!

Topic 6.3.0 - If a MAC address is found in the MAC address table,


then data is sent to the associated switch port. If the MAC address is
not found in the MAC address table, the data is sent to all switch ports
that have devices attached to the same network.

Complete Question 6
Question 6
Multiple choice question

Refer to the exhibit. How is a frame sent from PCA forwarded to PCC
if the MAC address table on switch SW1 is empty?

SW1 floods the frame on all ports on the switch, excluding the
interconnected port to switch SW2 and the port through which the
frame entered the switch.

SW1 floods the frame on all ports on SW1, excluding the port through
which the frame entered the switch.
SW1 forwards the frame directly to SW2. SW2 floods the frame to all
ports connected to SW2, excluding the port through which the frame
entered the switch.

SW1 drops the frame because it does not know the destination MAC
address.

That’s right!

Topic 6.4.0 - When a switch powers on, the MAC address table is
empty. The switch builds the MAC address table by examining the
source MAC address of incoming frames. The switch forwards based
on the destination MAC address found in the frame header. If a switch
has no entries in the MAC address table or if the destination MAC
address is not in the switch table, the switch will forward the frame out
all ports except the port that brought the frame into the switch.

Complete Question 7
Question 7
Multiple choice question

What information does an Ethernet switch examine and use to build its
address table?

source IP address

source MAC address

destination IP address

destination MAC address

That’s right!

Topic 6.3.0 - An Ethernet switch examines the source MAC address of


an incoming frame. If the source MAC address is not in the MAC
address table, the switch will add it to the table with the associated
ingress Ethernet port.

Complete Question 8
Question 8
Multiple choice question

Which three fields are found in an 802.3 Ethernet frame? (Choose


three.)

source physical address

source logical address

media type identifier

frame check sequence

destination physical address

destination logical address

That’s not right.

Complete Question 9
Question 9
Multiple choice question

Which two devices would commonly be found at the access layer of


the hierarchical enterprise LAN design model? (Choose two.)

access point

firewall

Layer 2 switch
Layer 3 device

modular switch

That’s right!

Topic 6.3.0 - While some designs do route at the access layer, the two
devices that should always be placed at the access layer of the
hierarchical design model are an access point and a Layer 2 switch. A
modular switch is commonly used at the core layer. Routing by a
Layer 3 device is commonly used in the distribution layer. The firewall
is a device in the Internet edge network design.

Complete Question 10
Question 10
Multiple choice question

Which statement is true about broadcast and collision domains?

Adding a router to a network will increase the size of the collision


domain.

The size of the collision domain can be reduced by adding hubs to a


network.

The more interfaces a router has the larger the resulting broadcast
domain.

Adding a switch to a network will increase the size of the broadcast


domain.

That’s right!

Topic 6.4.0 - A switch that receives a broadcast frame will forward the
frame out all other interfaces, including interfaces that connect to other
switches. These switches will also perform the same forwarding
action. By adding more switches to the network, the size of the
broadcast domain increases.

Complete Question 11
Question 11
Multiple choice question

How much data can be encapsulated into a normal sized Ethernet


frame before it is sent over the network?

0 to 1024 bytes

32 to 1500 bytes

46 to 1500 bytes

64 to 1518 bytes

That’s right!

Topic 6.1.0 - According to the Ethernet standards, each Ethernet


frame can carry 46 to 1500 bytes of user data. During the
encapsulation process, other fields are added, such as destination
MAC address, source MAC address, and FCS. The size of Ethernet
frames is normally limited to a maximum of 1518 bytes and a
minimum of 64 bytes.

Complete Question 12
Question 12
Multiple choice question

What is the purpose of ARP in an IPv4 network?

to forward data onward based on the destination IP address

to obtain a specific MAC address when an IP address is known


to forward data onward based on the destination MAC address.

to build the MAC address table in a switch from the information that is
gathered

That’s right!

Topic 6.4.0 - ARP performs two functions:

 To obtain a specific MAC address when an IP address is known,


by broadcasting an ARP request message to all devices on a
particular Ethernet network
 To use the gathered information to create a viewable table of IP
address to MAC address mappings
Local Network
A tabbed content container. Content can be text, graphic or both.

As networks grow, it is often necessary to divide one access layer


network into multiple access layer networks. There are many ways to
divide networks based on different criteria:

 Broadcast containment
 Security requirements
 Physical locations
 Logical grouping

The distribution layer connects these independent local networks and


controls the traffic flowing between them. It is responsible for ensuring
that traffic between hosts on the local network stays local. Only traffic
that is destined for other networks is passed on. The distribution layer
can also filter incoming and outgoing traffic for security and traffic
management.

Networking devices that make up the distribution layer are designed to


interconnect networks, not individual hosts. Individual hosts are
connected to the network via access layer devices, such as switches.
The access layer devices are connected to each other via the
distribution layer device, such as a router.
7.1.3 Now We Need Routing
This is an animations player component.

In most situations we want our devices to be able to connect beyond


our local network: out to other homes, businesses, and the internet.
Devices that are beyond the local network segment are known as
remote hosts. When a source device sends a packet to a remote
destination device, then the help of routers and routing is needed.
Routing is the process of identifying the best path to a destination.

A router is a networking device that connects multiple Layer 3, IP


networks. At the distribution layer of the network, routers direct traffic
and perform other functions critical to efficient network operation.
Routers, like switches, are able to decode and read the messages that
are sent to them. Unlike switches, which make their forwarding
decision based on the Layer 2 MAC address, routers make their
forwarding decision based on the Layer 3 IP address.

The packet format contains the IP addresses of the destination and


source hosts, as well as the message data being sent between them.
The router reads the network portion of the destination IP address and
uses it to find which one of the attached networks is the best way to
forward the message to the destination.

Anytime the network portion of the IP addresses of the source and


destination hosts do not match, a router must be used to forward the
message. If a host located on network 1.1.1.0 needs to send a
message to a host on network 5.5.5.0, the host will forward the
message to the router. The router receives the message, de-
encapsulates the Ethernet frame, and then reads the destination IP
address in the IP packet. It then determines where to forward the
message. It re-encapsulates the packet back into a new frame, and
forwards the frame on to its destination.
7.1.4 Lab - IPv4 Addresses and Network Communication
In this lab, you will complete the following objectives:

Build a simple peer-to-peer network and verify physical connectivity.


Assign various IP addresses to hosts and observe the effects on
network communication.

IPv4 Addresses and Network Communication

Lab - IPv4 Addresses and Network Communication


Topology

Objectives
Build a simple peer-to-peer network and verify physical connectivity.
Assign various IPv4 addresses to hosts and observe the effects on
network communication
Background / Scenario
In this lab, you will build a simple peer-to-peer network using two PCs
and an Ethernet crossover cable. You will assign various IPv4
addresses to the hosts and determine the effects on their ability to
communicate.

Required Resources
2 PCs (Windows 10 with at least one wired Ethernet NIC on each PC)
1 Ethernet cross-over cable to connect the PCs (provided by
instructor)
Instructions
Part 1: Create a Peer-to-Peer Network

Step 1: Connect the PCs to create a peer-to-peer network.


Obtain an Ethernet crossover cable provided by the instructor to
connect the two PCs.
Note: (optional lab setup) The PCs may be connected to a switch
using two straight-through cables. The following instructions assume
you are using a crossover cable.
Plug one end of the cable into the Ethernet NIC of PC-A. Plug the
other end of the cable into the Ethernet NIC of PC-B. As you insert the
cable, you should hear a click which indicates that the cable connector
is properly inserted into the port.
Step 2: Verify physical connectivity.
After the Ethernet crossover cable is connected to both PCs, take a
close look at each Ethernet port. A link light (usually green or amber)
indicates that physical connectivity has been established between the
two NICs. Try unplugging the cable from one PC then reconnecting it
to verify that the light goes off then back on.
On PC-B, right-click Start and select Network Connections.
If there was a problem connecting the network cable, Ethernet0 will
read Network cable unplugged and will have a red X in the icon. If so,
troubleshoot by repeating Steps 1 and 2. You may also want to ask
your instructor to confirm that you are using an Ethernet crossover
cable.
Step 3: Configure IPv4 Settings on PC-A and PC-B.
Configure manual IPv4 addressing on PC-A and PC-B so that they
can communicate using TCP/IP. On PC-A, right click the Ethernet0
and click Properties.
In the Ethernet0 Properties window select Internet Protocol Version 4
(TCP/IPv4) and click the Properties button.
Select the Use the following IPv4 address and enter the IPv4 address
192.168.1.1 and subnet mask 255.255.255.0. Click OK > Close to exit
the Ethernet0 Properties window.
Repeat steps 3a – 3c for PC-B using an IPv4 address 192.168.1.2
and a subnet mask 255.255.255.0.
Step 4: Verify IPv4 connectivity between the two PCs.
Note: To test TCP/IP connectivity between the PCs, Windows Firewall
must be disabled temporarily on both PCs. Windows Firewall should
be re-enabled after the tests have been completed. To access
Windows Firewall, click Settings > Network & Internet > Ethernet >
Windows Firewall > Turn Windows Firewall on or off.

Now that the two PCs are physically connected and configured
correctly with IPv4 addresses, we need to make sure they can
communicate with each other. The ping command is a simple way to
accomplish this task.
Navigate to the Command Prompt on PC-A. In a Command Prompt on
PC-A, ping 192.168.1.2. A successful ping will verify network
connectivity and PC-A can communicate with PC-B.
C:\Users\Student> ping 192.168.1.2
Pinging 192.168.1.2 with 32 bytes of data:

Reply from 192.168.1.2: bytes=32 time=4ms TTL=64

Reply from 192.168.1.2: bytes=32 time=1ms TTL=64

Reply from 192.168.1.2: bytes=32 time=1ms TTL=64

Reply from 192.168.1.2: bytes=32 time<1ms TTL=64

Ping statistics for 192.168.1.2:

Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),


Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 4ms, Average = 1ms

Repeat this procedure and ping 192.168.1.1 from PC-B.


Close the command prompt on both PCs.
Part 2: Modify IPv4 Addresses
Step 1: Change IPv4 address for PC-B.

On PC-B, right-click on Start and select Network Connections, and


right-click the Ethernet0 icon. Choose Properties from the pull-down
menu.
Select Internet Protocol Version 4 (TCP/IPv4). Click Properties.
Change the logical IPv4 address for PC-B from 192.168.1.2 to
192.168.2.2 and leave the subnet mask set to 255.255.255.0.
Click OK which will close the Internet Protocol Version 4 (TCP/IPv4)
window. Click the Close button to exit the Ethernet0 Properties
window.
Step 2: Test network connectivity between the 2 PCs.

From PC-B, right-click Start, and select Command Prompt.


At the command prompt, type ping 192.168.2.2 and press Enter.
Was it successful? Explain.

Answer Area
Type your answer here.

The ping was unsuccessful because PC-A and PC-B are no longer in
the same subnet. Without a router, these PCs cannot communicate
with each other.
Hide Answer
What type of networking device would allow the PCs to communicate
even though they are on different networks?

Answer Area
Type your answer here.

A router is needed to allow the PCs to communicate.


Hide Answer
Step 3: Change IPv4 address for PC-A.
On PC-A, right-click Start and select Network Connections, and right-
click the Ethernet0 icon. Choose Properties from the pull-down menu.
Select Internet Protocol Version 4 (TCP/IP). Click Properties.
Change the logical IPv4 address for PC-A from 192.168.1.1 to
192.168.2.99 and leave the subnet mask set to 255.255.255.0. Click
OK, to close the Internet Protocol Version 4 (TCP/IP) window. Click
Close to exit the Ethernet0 Properties window.
The two PCs are still on the same physical Ethernet network.

Are they on the same logical IPv4 network now?

Answer Area
Type your answer here.

Yes, they are in the same physical and logical network.


Hide Answer
Step 4: Test network connectivity between the 2 PCs.
On PC-B, repeat step 4b to access the Windows command prompt.
At the command prompt, ping 192.168.2.99.
Was it successful? Explain.

Answer Area
Type your answer here.

The ping was successful because PC-A and PC-B are in the same
subnet.
Hide Answer
Step 5: (Optional – Use only if the Firewall was originally ENABLED)
Re-enable the firewall.
To ensure that the PC is protected from unauthorized access, re-
enable the Windows Firewall.

To access Windows Firewall, click Settings > Network & Internet >
Ethernet > Windows Firewall > Turn Windows Firewall on or off.

7.2.2 Path Selection


This is an animations player component.
How does the router determine which interface to use to send the
message on a path to get to the destination network?
Each port, or interface, on a router connects to a different local
network. Every router contains a table of all locally connected
networks and the interfaces that connect to them. These routing tables
can also contain information about the routes, or paths, that the router
uses to reach other remote networks that are not locally attached.

When a router receives a frame, it decodes the frame to get to the


packet containing the destination IP address. It matches the network
portion of the destination IP address to the networks that are listed in
the routing table. If the destination network address is in the table, the
router encapsulates the packet in a new frame in order to send it out.
(Note that it will insert a new destination MAC address as well, and
recalculate the FCS field, in the new frame). It forwards the new frame
out of the interface associated with the path, to the destination
network. The process of forwarding the packets toward their
destination network is called routing.

Router interfaces do not forward messages that are addressed to the


local network broadcast IP address. As a result, local network
broadcasts are not sent across routers to other local networks.

Click Play in the figure to see the router forward packets and block
broadcasts.
7.2.2 Path Selection
This is an animations player component.

How does the router determine which interface to use to send the
message on a path to get to the destination network?
Each port, or interface, on a router connects to a different local
network. Every router contains a table of all locally connected
networks and the interfaces that connect to them. These routing tables
can also contain information about the routes, or paths, that the router
uses to reach other remote networks that are not locally attached.

When a router receives a frame, it decodes the frame to get to the


packet containing the destination IP address. It matches the network
portion of the destination IP address to the networks that are listed in
the routing table. If the destination network address is in the table, the
router encapsulates the packet in a new frame in order to send it out.
(Note that it will insert a new destination MAC address as well, and
recalculate the FCS field, in the new frame). It forwards the new frame
out of the interface associated with the path, to the destination
network. The process of forwarding the packets toward their
destination network is called routing.

Router interfaces do not forward messages that are addressed to the


local network broadcast IP address. As a result, local network
broadcasts are not sent across routers to other local networks.

Click Play in the figure to see the router forward packets and block
broadcasts.

7.2.5 Packet Forwarding


This is an animations player component.

A router forwards a packet to one of two places: a directly connected


network containing the actual destination host, or to another router on
the path to reach the destination host. When a router encapsulates the
frame to forward it out an Ethernet interface, it must include a
destination MAC address.

This is the MAC address of the actual destination host, if the


destination host is part of a network that is locally connected to the
router. If the router must forward the packet to another router through
an Ethernet interface, it will use the MAC address of the connected
router. Routers obtain these MAC addresses from ARP tables.

Each router interface is part of the local network to which it is attached


and maintains its own ARP table for that network. The ARP tables
contain the MAC addresses and IPv4 addresses of all the individual
hosts on that network.

7.2.7 Routing Table Entries


This is an animations player component.

Routers move information between local and remote networks. To do


this, routers must use routing tables to store information. Routing
tables are not concerned with the addresses of individual hosts.
Routing tables contain the addresses of networks, and the best path
to reach those networks. Entries can be made to the routing table in
two ways: dynamically updated by information received from other
routers in the network, or manually entered by a network
administrator. Routers use the routing tables to determine which
interface to use to forward a message to its intended destination.

If the router cannot determine where to forward a message, it will drop


it. Network administrators configure a static default route that is placed
into the routing table so that a packet will not be dropped due to the
destination network not being in the routing table. A default route is
the interface through which the router forwards a packet containing an
unknown destination IP network address. This default route usually
connects to another router that can forward the packet towards its final
destination network.
7.2.8 The Default Gateway
This is an animations player component.

The method that a host uses to send messages to a destination on a


remote network differs from the way a host sends messages on the
same local network. When a host needs to send a message to
another host located on the same network, it will forward the message
directly. A host will use ARP to discover the MAC address of the
destination host. The IPv4 packet contains the destination IPv4
address and encapsulates the packet into a frame containing the MAC
address of the destination and forwards it out.

When a host needs to send a message to a remote network, it must


use the router. The host includes the IP address of the destination
host within the packet just like before. However, when it encapsulates
the packet into a frame, it uses the MAC address of the router as the
destination for the frame. In this way, the router will receive and
accept the frame based on the MAC address.

How does the source host determine the MAC address of the router?
A host is given the IPv4 address of the router through the default
gateway address configured in its TCP/IP settings. The default
gateway address is the address of the router interface connected to
the same local network as the source host. All hosts on the local
network use the default gateway address to send messages to the
router. When the host knows the default gateway IPv4 address, it can
use ARP to determine the MAC address. The MAC address of the
router is then placed in the frame, destined for another network.

It is important that the correct default gateway be configured on each


host on the local network. If no default gateway is configured in the
host TCP/IP settings, or if the wrong default gateway is specified,
messages addressed to hosts on remote networks cannot be
delivered.

Create a LAN
7.3.1 Local Area Networks
This is an animations player component.

The term local area network (LAN) refers to a local network, or a


group of interconnected local networks that are under the same
administrative control. In the early days of networking, LANs were
defined as small networks that existed in a single physical location.
Although LANs can be a single local network installed in a home or
small office, the definition of LAN has evolved to include
interconnected local networks consisting of many hundreds of hosts,
installed in multiple buildings and locations.

The important thing to remember is that all the local networks within a
LAN are under one administrative control. Other common
characteristics of LANs are that they typically use Ethernet or wireless
protocols, and they support high data rates.

The term intranet is often used to refer to a private LAN that belongs
to an organization, and is designed to be accessible only by the
members of the organization , employees, or others with authorization.

7.3.2 Local and Remote Network Segments


A tabbed content container. Content can be text, graphic or both.
Within a LAN, it is possible to place all hosts on a single local network
or divide them up between multiple networks connected by a
distribution layer device. How this placement is determined depends
on desired results.
All Hosts in One Local Segment

Placing all hosts on a single local network allows them to be seen by


all other hosts. This is because there is one broadcast domain and
hosts use ARP to find each other.

In a simple network design, it may be beneficial to keep all hosts


within a single local network. However, as networks grow in size,
increased traffic will decrease network performance and speed. In this
case, it may be beneficial to move some hosts onto a remote network.

Advantages of a single local segment:

 Appropriate for simpler networks


 Less complexity and lower network cost
 Allows devices to be "seen" by other devices
 Faster data transfer - more direct communication
 Ease of device access

Disadvantages of a single local segment:

 All hosts are in one broadcast domain which causes more traffic
on the segment and may slow network performance
 Harder to implement QoS
 Harder to implement security
7.3.3 Packet Tracer - Observe Data Flow in a LAN

In this activity, you will complete the following objectives:

 Develop an understanding of the basic functions of Packet


Tracer.
 Create/model a simple Ethernet network using 3 hosts and a
switch.
 Observe traffic behavior on the network.
 Observe data flow of ARP broadcasts and pings.

Packet Tracer - Observe Data Flow in a LAN


Objectives
         Develop an understanding of the basic functions of Packet Tracer.
         Create/model a simple Ethernet network using 3 hosts and a switch.
         Observe traffic behavior on the network.
         Observer data flow of ARP broadcasts and pings.

Instructions

Part 1: Create a logical network diagram with 3 PCs and a switch.


During an activity, to ensure that the instructions always remain visible, click the "top" check box in
the instruction box window.
The bottom left hand corner of the Packet tracer screen displays the icons that represent device
categories or groups, such as Routers, Switches, or End Devices.
Moving the cursor over the device categories will show the name of the category in the box. To select
a device, first select the device category. When the device category is selected, the options within
that category appear in the box next to the category listings. Select the device option that is required.
a.     Select End Devices from the options in the bottom left-hand corner. Drag and drop 3 generic PCs
onto your design area.
b.     Select Switch from the options in the bottom left-hand corner. Add a 2960 switch to your
prototype network by dragging it onto your design area.
c.     Select Connections from the bottom left-hand corner. Choose a copper straight-through cable
type. Click the first host (PC0) and assign the cable to the FastEthernet0 connector. Click the
switch (Switch0) and select a connection FastEthernet0/1 for PC0.
d.     Repeat step c for PC1 and PC2. Select FastEthernet0/2 on the Switch0 for PC1 and
FastEthernet0/3 for PC2.
There should be green dots at both ends of each cable connection after the network has converged.
If not, double check the cable type selected.

Part 2: Configure host names and IP addresses on the PCs.


a.     Click PC0. Select the Config tab. Change the PC Display Name to PC-A.
Select FastEthernet tab on the left and add 192.168.1.1 as the IP address and 255.255.255.0 as
the subnet mask. Close PC-A when done.
b.     Click PC1. Select the Config tab. Change the PC Display Name to PC-B.
Select FastEthernet tab on the left and add 192.168.1.2 as the IP address and 255.255.255.0 as
the subnet mask. Close PC-B when done.
c.     Click PC2. Select the Config tab. Change the PC Display Name to PC-C.
Select FastEthernet tab on the left and add 192.168.1.3 as the IP address and 255.255.255.0 as
the subnet mask. Close PC-C when done.

Part 3: Observe the flow of data from PC-A to PC-C by creating network traffic.
a.     Switch to Simulation Mode in the bottom right-hand corner.
b.     Click Edit Filter in the Edit List Filter area. In the event list filter, click All/None to deselect every
filter. Click Edit Filter. Select ARP and ICMP filters under IPv4 tab.
c.     Select a Simple PDU by clicking the closed envelope in the upper toolbar. With the envelop icon,
click PC-A to establish the source. Click PC-C to establish the destination.
Note: Notice that two envelopes are now positioned beside PC-A. One envelop is ICMP, while
the other is ARP. The Event List in the Simulation Panel will identify exactly which envelop
represents ICMP and which represents ARP.
d.     Select Play from the Play Controls in the Simulation Panel. You can speed up the simulation
using the Play Speed Slider. The Play Speed Slider is located below Play inside the Simulation
Panel. Dragging the button to the right will speed up the simulation, while dragging is to the left
will slow down the simulation.
e.     Observe the path ICMP and ARP envelope. Click View Previous Event to continue when the
buffer is full.
f.      Click Reset Simulation in the Simulation Panel. Notice that the ARP envelop is no longer
present. This has reset the simulation but has not cleared any configuration changes or dynamic
table entries, such as ARP table entries. The ARP request is not necessary to complete the ping
because PC-A already has the MAC address in the ARP table.
g.     Click Capture then Forward inside the Simulation Panel. The ICMP envelop will moved from the
source to the switch and stop. The Capture then Forward allows you to move the simulation one
step at a time. Continue selecting the Capture then Forward until you complete the event.
h.     Click the Power Cycle Device on the bottom left, above the device icons.
i.      An error message will appear asking you to confirm reset. Click Yes. Now both the ICMP and
ARP envelops are present again. The power cycle will clear any configuration changes not saved
and will clear all dynamic table entries, such as the ARP and MAC table entries.
j.      Exit the simulation mode by clicking Realtime a allow the network to converge.
k.     After the network has converged, enter the simulation mode.

Part 4: View ARP Tables on each PC.


a.     Click Play to repopulate the ARP table on the PCs. Click View Previous Event when the buffer is
full.
b.     Click Inspect (magnifying glass) in the upper tool bar.
c.     With the magnifying glass, click PC-A. Select ARP Table in the pop-up menu. Notice that PC-A
has an ARP entry for PC-C. View the ARP tables for PC-B and PC-C as well. Close all ARP table
windows.
d.     Click Select in the upper tool bar.
e.     Click PC-A and select the Desktop tab.
f.      Select the Command Prompt and enter the command arp -a to view the ARP table from the
desktop view. Close the PC-A configuration window.
C:\> arp -a
Internet Address        Physical Address      Type
192.168.1.3             0003.e406.e430        dynamic

g.     Examine the ARP tables for PC-B and PC-C. Close the Command Prompt window when
finished.

7.3.4 Lab - Connect to a


Wireless Router

In this lab, you will complete the following objectives:

 Connect a PC to a wireless router using Ethernet cable.


 Configure the PC with an appropriate IP address.
 Verify the PC configuration using a command prompt.
Lab - Connect to a Wireless Router
Topology

Addressing Table
Device Interface IP Address Subnet Mask Default Gateway
PC-A NIC 192.168.10.2 255.255.255.0 192.168.10.1
PC-B NIC 192.168.10.3 255.255.255.0 192.168.10.1

Objectives

 Connect a PC to a wireless router using Ethernet cable


 Configure the PC with an appropriate IPv4 address
 Verify the PC configuration using a Command Prompt

Background / Scenario

For a PC to communicate in the local network and the Internet, it must be connected to a
network device.

Required Resources

 2 PCs (Windows 10 with wired Ethernet NIC on each PC)


 1 wireless router
 2 straight-through Ethernet cables

Instructions

Part 1: Connecting to the Network

Step 1: Connect the end devices.

a. Power on the end devices and wireless router as needed.


b. Connect two PCs to the wireless router using Ethernet cables.

Step 2: Configure the PCs with addressing information.

a. In PC-A, right-click Start button > select Network Connections. If the Network status


window opens, click Change adapter options to navigate to Network Connections.
b. Select the wired network connection. Right-click the desired wired network connection
and select Properties.
c. Open the Internet Protocol Version 4 (TCP/IPv4) option to open the TCP/IP properties
window.
d. You will enter an IPv4 address configuration consisting of an IPv4 address, a subnet
mask, and default gateway address. To enter the address information, click the Use the
following IP address button.
e. In the IPv4 address field, enter 192.168.10.2. In the subnet mask field,
enter 255.255.255.0. In the default gateway field, enter 192.168.10.1. The DNS server
information is not necessary at this time.
f. When finished, click OK to return to the Internet Protocol (TCP/IPv4) Properties window.
Click OK to apply the changes.
After the changes are applied, you will be returned to the Network Connections window.
g. Because the two computers are on the same network, their IPv4 addresses will be
similar, their subnet masks and default gateways will be identical. Perform the same
procedures on PC-B to assign an IPv4 address, subnet mask, and default gateway using
the following information:

Why do you think the IPv4 addresses are different, but the subnet masks and default gateways
are the same?

Answer Area

Student’s own opinion on this. Each device on the network must have a unique identifier.
The IPv4 address is one way of uniquely identifying each network host or device. The
default gateway represents the way of communicating with devices that are NOT on your
own network.
Hide Answer

Step 3: Verify connectivity between the two PCs.


a. In a Command Prompt window, enter ipconfig /all to verify the configured IPv4
address and the default gateway from the previous step for both PCs.
b. From the command prompt on PC-A, test connectivity with the PC-B by entering ping
192.168.10.3.
c. The pings should be successful. If the pings are not successful, perform the appropriate
troubleshooting steps, such as checking the cabling and checking your IPv4 address,
subnet mask, and default gateway assignments.

Part 2: Capture and Analyze Local ARP Data in Wireshark

In Part 2 of this lab, you will ping another PC on the LAN and capture ARP requests and replies
in Wireshark. You will also look inside the frames captured for specific information. This analysis
should help to clarify how packet headers are used to transport data to their destination.

Step 1: The hostname command

Besides the ipconfig /all command, you can print the name of the current host using
the hostname command.

At a command prompt, enter hostname.

C:\Users\Student> hostname

DESKTOP-3FR7RKA

Step 2: The getmac command

Sometimes you just need to quickly list all the MAC addresses for the NIC on the PC.
The getmac command could be quite useful.

At a command prompt, enter getmac.

C:\Users\Student> getmac
Physical Address Transport Name
00-50-56-B3-E8-C1 \Device\Tcpip_{B0D0B9B3-8A23-4B59-B930-323792047552}
02-00-4C-4F-4F-50 \Device\Tcpip_{31C9748F-BCD8-4C76-8AEB-D4BC482341B8}

Step 3: The route command

The route command allows you to manipulate the network routing table. For this example, you
will print out the routes.

C:\Users\Student> route print

======================================================================
=====
Interface List

6...00 50 56 b3 e8 c1 ......Intel(R) 82574L Gigabit Network Connection

3...02 00 4c 4f 4f 50 ......Microsoft KM-TEST Loopback Adapter

1...........................Software Loopback Interface 1

7...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter

5...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #2

======================================================================
=====

IPv4 Route Table

======================================================================
=====

Active Routes:

Network Destination Netmask Gateway Interface Metric


0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.11 10
127.0.0.0 255.0.0.0 On-link 127.0.0.1 306
127.0.0.1 255.255.255.255 On-link 127.0.0.1 306
127.255.255.255 255.255.255.255 On-link 127.0.0.1 306
169.254.0.0 255.255.0.0 On-link 169.254.5.92 266
169.254.5.92 255.255.255.255 On-link 169.254.5.92 266
169.254.255.255 255.255.255.255 On-link 169.254.5.92 266
192.168.1.0 255.255.255.0 On-link 192.168.1.11 266
192.168.1.11 255.255.255.255 On-link 192.168.1.11 266
192.168.1.255 255.255.255.255 On-link 192.168.1.11 266
224.0.0.0 240.0.0.0 On-link 127.0.0.1 306
224.0.0.0 240.0.0.0 On-link 192.168.1.11 266
224.0.0.0 240.0.0.0 On-link 169.254.5.92 266
255.255.255.255 255.255.255.255 On-link 127.0.0.1 306
255.255.255.255 255.255.255.255 On-link 192.168.1.11 266
255.255.255.255 255.255.255.255 On-link 169.254.5.92 266

======================================================================
=====

Persistent Routes:

None
IPv6 Route Table

======================================================================
=====

Active Routes:

If Metric Network Destination Gateway

1 306 ::1/128 On-link

6 266 fe80::/64 On-link

3 266 fe80::/64 On-link

3 266 fe80::8050:173e:a32b:55c/128
On-link
6 266 fe80::ac29:44a8:6409:c30e/128
On-link
1 306 ff00::/8 On-link
6 266 ff00::/8 On-link
3 266 ff00::/8 On-link

======================================================================
=====

Persistent Routes:

Routing Between Networks Summary

Page progress. Use this to listen to the list of regions in this topic and
whether they're completed. You can jump directly to any that are
incomplete or which sound particularly interesting. 6%
The health gauge reflects your performance during the course You
now have 85.71428571428571% health

Routing Between Networks Summary


Scroll to begin  

Incomplete 7.4.1 What Did I Learn in this Module?


7.4.1 What Did I Learn in this Module?
The Need for Routing

As networks grow, you may need to divide one access layer network
into multiple access layer networks. The distribution layer connects
these independent local networks and controls the traffic flowing
between them. It is responsible for ensuring that traffic between hosts
on the local network stays local. Networking devices that make up the
distribution layer are designed to interconnect networks, not individual
hosts.

Devices that are beyond the local network segment are known as
remote hosts. When a source device sends a packet to a remote
destination device, then routing is needed. Routing is the process of
identifying the path to a destination. A router is a networking device
that connects multiple Layer 3, IP networks. At the distribution layer of
the network, routers direct traffic and perform other functions critical to
efficient network operation. Routers, like switches, are able to decode
and read the messages that are sent to them. Unlike switches, which
make their forwarding decision based on the Layer 2 MAC address,
routers make their forwarding decision based on the destination Layer
3 IP address.

The Routing Table

Each port, or interface, on a router connects to a different local


network. Every router contains a table of all locally connected
networks and the interfaces that connect to them. These routing tables
can also contain information about the routes that the router uses to
reach other remote networks. A router forwards a packet to one of two
places: a directly connected network containing the actual destination
host, or to another router on the path to reach the destination host.
When a router encapsulates the frame to forward it out of an Ethernet
interface, it must include a destination MAC address. This is the MAC
address of the actual destination host, if the destination host is part of
a network locally connected to the router. If the router must forward
the packet to another router through an Ethernet interface, it will use
the MAC address of the connected router. Routers obtain these MAC
addresses from ARP tables.

Routing tables contain the addresses of networks and the path to


reach those networks. Entries can be made to the routing table in two
ways: dynamically updated by information received from other routers
in the network, or manually entered by a network administrator.

How does the source host determine the MAC address of the router?
A host is given the IPv4 address of the router through the default
gateway address configured in its TCP/IP settings. The default
gateway address is the address of the router interface connected to
the same local network as the source host.

Create a LAN

The term local area network (LAN) refers to a local network, or a


group of interconnected local networks that are under the same
administrative control. Other common characteristics of LANs are that
they typically use Ethernet or wireless protocols, and they support
high data rates.

In a simple network design it may be beneficial to keep all hosts within


a single local network. Placing some hosts on a remote network will
decrease the impact of traffic demands. However, hosts on one
network will not be able to communicate with hosts on the other
without the use of routing.

Questions samples

7.4.2 Routing Between Networks Quiz


Complete Question 1
Question 1
Multiple choice question

Which information is used by routers to forward a data packet toward


its destination?

source IP address

destination IP address

source data-link address

destination data-link address

That’s right!

Topic 7.2.0 - The destination IP address is the IP address for the


receiving device. This IP address is used by routers to forward the
packet to its destination.

Question 2
Multiple choice question
A router receives a packet from the Gigabit 0/0 interface and
determines that the packet needs to be forwarded out the Gigabit 0/1
interface. What will the router do next?

route the packet out the Gigabit 0/1 interface

create a new Layer 2 Ethernet frame to be sent to the destination

look into the ARP cache to determine the destination IP address

look into the routing table to determine if the destination network is in


the routing table

That’s not right.

Topic 7.2.0 - The destination IP address is the IP address for the


receiving device. This IP address is used by routers to forward the
packet to its destination.

Question 3
Question 4
Multiple choice question
During the process of forwarding traffic, what will the router do
immediately after matching the destination IP address to a network on
a directly connected routing table entry?

discard the traffic after consulting the route table

look up the next-hop address for the packet

switch the packet to the directly connected interface

analyze the destination IP address

That’s right!

Topic 7.2.0 - A router receives a packet on an interface and looks at


the destination IP address. It consults its routing table and matches
the destination IP address to a routing table entry. The router then
discovers that it has to send the packet to the next-hop address or out
to a directly connected interface. When the destination address is on a
directly connected interface, the packet is switched over to that
interface.

Question 5
Multiple choice question

What will a router do if it cannot determine where to forward an


incoming packet?

The router will drop it.

The router will forward it out all interfaces.


The router will send an incident message to the network administrator.

The router will save it in the sending queue and try to forward it again
later.

That’s not right.

Topic 7.2.0 - A router contains a routing table of all locally connected


networks and the interfaces that connect to them. The routing tables
can also contain the routes that the router uses to reach remote
networks. Entries can be made to the routing table in two ways: the
table can be dynamically updated by information received from other
routers in the network by using a routing protocol, or entries can be
manually entered by a network administrator. If the router cannot
determine where to forward a packet, it will drop it.

Question 6
Multiple choice question

In implementing a LAN in a corporation, what are three advantages of


dividing hosts between multiple networks connected by a distribution
layer? (Choose three.)

It provides increased security.

Only LAN switches are needed.

It splits up broadcast domains and decreases traffic.


It reduces complexity and expense by using LAN switch devices.

It makes the hosts invisible to those on other local network segments.

It increases traffic bandwidth between segments through distribution


layer devices.

That’s not right.

Topic 7.2.0 - A router contains a routing table of all locally connected


networks and the interfaces that connect to them. The routing tables
can also contain the routes that the router uses to reach remote
networks. Entries can be made to the routing table in two ways: the
table can be dynamically updated by information received from other
routers in the network by using a routing protocol, or entries can be
manually entered by a network administrator. If the router cannot
determine where to forward a packet, it will drop it.

Question 7
Multiple choice question

What type of route is indicated by the code C in an IPv4 routing table


on a Cisco router?

static route

default route

directly connected route

dynamic route that is learned through EIGRP

That’s right!
Topic 7.2.0 - Some of the IPv4 routing table codes include the
following:

 C – directly connected
 S – static
 D – EIGRP
 * - candidate default

Question 8
Multiple choice question

Which portion of the network layer address does a router use to


forward packets?

host portion

broadcast address

network portion

gateway address

That’s right!

Topic 7.2.0 - There are two parts to an a network layer address, the
network and host portions. Routers are not concerned about delivering
packets to hosts. Routers are concerned with delivering packets to the
network that a destination host is a member of.

Question 9
Multiple choice question
What role does a router play on a network?

forwarding Layer 2 broadcasts

forwarding frames based on a MAC address

selecting the path to destination networks

connecting smaller networks into a single broadcast domain

That’s right!

Topic 7.1.0 - When a computer sends a packet onto the network, the
packet includes a source and destination IP address. Routers use the
destination IP address in a packet to forward the packet to the correct
destination network.

Question 10
Multiple choice question

A router receives an incoming packet and determines that the


destination host is located on a LAN directly attached to one of the
router interfaces. Which destination address will the router use to
encapsulate the Ethernet frame when forwarding the packet?

MAC address of the destination host

MAC address of the SVI on the switch

MAC address of the interface of the connected router

MAC address of the default gateway of the LAN


Topic 7.2.0 - When a router encapsulates the frame to forward a
packet out an Ethernet interface, it includes a destination MAC
address. When the destination host is on the same local network as
the router interface, the router will use the MAC address of the host as
the destination MAC address of the Ethernet frame.

Question 11
Multiple choice question

Which address should be configured as the default gateway address


of a client device?

the Layer 2 address of the switch management interface

the Layer 2 address of the switch port that is connected to the


workstation

the IPv4 address of the router interface that is connected to the same
LAN

the IPv4 address of the router interface that is connected to the


internet

That’s right!

Topic 7.2.0 - The default gateway is used when a host needs to send
messages to destinations that are located in remote networks. The
default gateway address is configured on the host with the IPv4
address of the router interface that is connected to the same local
network as the host.
The Internet Protocol

8.0.1 Why Should I Take this


Module?

Welcome to The Internet Protocol!

Now you know that you need a router to get outside of your local
network. But routers alone can’t do the job. You need a proper IP
address for both the source and the destination address. There is a lot
to know about IP addresses, including that each one has a network
portion and a host portion. But, of course, there is more to IP
addresses than that. This module explains the Internet Protocol, the
structure of an IPv4 address, as well as how and when it is used.

But wait! There’s more! You will learn how to convert a binary IPv4
address to decimal and vice versa. Believe me, it’s more fun than it
sounds AND knowing how to do this will put you ahead of the pack!

Module Title: The Internet Protocol

Module Objective: Explain the features of an IP address.


Purpose of the IPv4 Address

8.1.1 The IPv4 Address


This is an animations player component.

A host needs an IPv4 address to participate on the internet and almost


all LANs today. The IPv4 address is a logical network address that
identifies a particular host. It must be properly configured and unique
within the LAN, for local communication. It must also be properly
configured and unique in the world, for remote communication. This is
how a host is able to communicate with other devices on the internet.
An IPv4 address is assigned to the network interface connection for a
host. This connection is usually a network interface card (NIC)
installed in the device. Examples of end-user devices with network
interfaces include workstations, servers, network printers, and IP
phones. Some servers can have more than one NIC and each of
these has its own IPv4 address. Router interfaces that provide
connections to an IP network will also have an IPv4 address.

Every packet sent across the internet has a source and destination
IPv4 address. This information is required by networking devices to
ensure the information gets to the destination and any replies are
returned to the source.

Click Play in the figure to see how packets travel across the internet.

8.1.2 Packet Tracer - Connect to a Web Server

In this activity, you will observe how packets are sent across the
internet using IP addresses.
Connect to a Web Server

Packet Tracer - Connect to a Web Server


Objectives

Observe how packets are sent across the Internet using IP addresses.

Instructions

Part 1: Verify connectivity to the web server

1. Open the source host command prompt window. Select PC0.


2. Select the Desktop Tab > Command Prompt.
3. Verify connectivity to the web server. At the command prompt, ping the IP address of the
web server by entering ping 172.33.100.50.
PC> ping 172.33.100.50
Pinging 172.33.100.50 with 32 bytes of data:

Reply from 172.33.100.50: bytes=32 time=0ms TTL=127

Reply from 172.33.100.50: bytes=32 time=0ms TTL=127

Reply from 172.33.100.50: bytes=32 time=0ms TTL=127

Reply from 172.33.100.50: bytes=32 time=0ms TTL=127

Ping statistics for 172.33.100.50:

Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

A reply verifies connectivity from the client to the destination web server. The reply may time out
initially while devices load and ARP is performed.

d. Close the command prompt window only, by selecting the x within the command prompt
window. Be sure to leave the PC0 configuration window open.

Part 2: Connect to the Web Server via the web client

a. In the Desktop tab on PC0, select Web Browser.


b. Enter 172.33.100.50 into the URL and click Go. The web client will connect to the web
server via the IP address, and open the web page.

What messages did you see after the web page has finished loading?
Answer Area

Welcome to the Learn IP Web Site


You were able to reach this website because you had the IP address of the web server.
The connecting PC also had a web client running on the device.

Binary Conversion of an IPv4 Address

8.2.1 IPv4 Addressing

An IPv4 address is simply a series of 32 binary bits (ones and zeros).


There are over 4 billion possible IPv4 addresses using a 32-bit
addressing scheme.

It is very difficult for humans to read a binary IPv4 address. For this
reason, the 32 bits are grouped into four 8-bit bytes called octets. An
IPv4 address in this format is hard for humans to read, write, and
remember. To make the IPv4 address easier to understand, each
octet is presented as its decimal value, separated by a decimal point
or period. This is referred to as dotted-decimal notation.

When a host is configured with an IPv4 address, it is entered as a


dotted decimal number such as 192.168.1.5, as shown in the figure.
The 32-bit binary equivalent is
11000000101010000000000100000101. If you mistyped just one bit,
the address would be different, and the host may not be able to
communicate on the network.
8.2.3 Binary to Decimal
This is an animations player component.

When a host receives an IPv4 address, it looks at all 32 bits as they


are received by the NIC. Humans, on the other hand, need to convert
those 32 bits into their four octet decimal equivalent. Each octet is
made up of 8 bits and each bit has a value. The four groups of 8 bits
have the same set of values. The rightmost bit in an octet has a value
of 1 and the values of the remaining bits, from right to left, are 2, 4, 8,
16, 32, 64, and 128.

As shown in the figure, you can determine the value of the octet by
adding the values of positions wherever there is a binary 1 present:

 If there is a 0 in a position, do not add the value.


 If all 8 bits are 0s, 00000000 the value of the octet is 0.
 If all 8 bits are 1s, 11111111 the value of the octet is 255
(128+64+32+16+8+4+2+1).
 If the 8 bits are mixed, such as the example 00100111, the value
of the octet is 39 (32+4+2+1).

So the value of each of the four octets can range from 0 to a


maximum of 255.

8.2.4 Activity - Binary to Decimal Conversions

Instructions

This activity allows you to practice 8-bit binary to decimal conversion


as much as necessary. We recommend that you work with this tool
until you are able to do the conversion without error. Convert the
binary number shown in the octet to its decimal value.
8.2.6 Activity - Binary Game

The Binary Game presents problems which you must solve in order to
gain points. When presented with a number on the right, click the
appropriate squares to the left to represent that number. Yellow
squares are counted, while red squares are not. Sometimes there will
be yellow squares that are incorrect. Click them to turn them to red.
When there is no number present to the right, click the empty box to
bring up a number pad. Click the numbers to enter in the correct
answer represented by the yellow squares to the left. Click the Enter
arrow at the bottom-right corner to enter the answer.

The first two problems have unlimited time. After they have been
solved, the problems will get harder and appear faster. When the
screen fills up with unsolved problems, the game is over.

Game Link: https://learningnetwork.cisco.com/docs/DOC-1803

You will need to log in to cisco.com to use this link. It will be necessary
to create an account if you do not already have one.

There are also a variety of free mobile binary games. Search for
"Binary Game" in your app store.

8.2.7 Lab - Use a Calculator for Binary Conversions

In this lab, you will complete the following objectives:

 Switch between Windows Calculator modes.


 Use Windows Calculator to convert between decimal and binary.
 Use Windows Calculator to determine the number of hosts in a
network with powers of 2.
Lab - Use a Calculator for Binary Conversions
Objectives

 Switch among Windows Calculator modes.


 Use Windows Calculator to convert between decimal and binary.
 Use Windows Calculator to determine the number of hosts in a network with powers of
2.

Background / Scenario

When working with networking devices, a network technician should understand binary and
decimal numbers. In this lab, you will use the Windows Calculator application to convert
between these numbering systems. You will also use the “powers” function to determine the
number of hosts that can be addressed based on the number of bits available.

Required Resources

 PC (Windows 10)

Instructions

Part 1: Using Windows Calculator

Step 1: Access Windows Calculator and determine mode of operation.

a. Open the Windows Calculator application. Click Start, type Calculator. Select Calculator
in the results.

What mode is the Calculator in?

Answer Area

Answers can vary. It can be in the Standard, Scientific, Programmer, Date calculator or
Converter.

Hide Answer

b. Click the Open Navigation icon (≡) located in the upper left-hand corner. The Windows
calculator supports different mode of calculations.

List the five modes for the calculator.


Answer Area

The five calculator modes are Basic, Scientific, Programmer, Date calculation, and
Converter.

Hide Answer

Step 2: Switch between modes.

a. To switch between calculator modes, click the Open Navigation icon (≡) and select
desired mode.
b. Practice switching between calculator modes to see which options they provide.

Briefly explain the function of each mode.

Answer Area

The standard mode is for basic math. The Scientific mode is for more advanced
calculations. The Programmer mode supports different number systems, such as binary,
hexadecimal, octal, and decimal. The Data calculation is for working with date. The
Converter is for converting between different units of measurements.

Hide Answer

Part 2: Binary System

Step 1: Convert between number systems.

a. Select the Programmer mode calculator.


b. The Programmer calculator supports four numbering systems — HEX (Hexadecimal),
DEC (Decimal), OCT (Octal), and BIN (Binary).

Which number system is currently active?

Answer Area
DEC

Hide Answer

Which numbers on the number pad are active in Decimal mode?

Answer Area

0 thru 9

Hide Answer

c. Click BIN.

Which numbers on the number pad are now active?

Answer Area

0 and 1

Hide Answer

Why do you think the other numbers are grayed out?

Answer Area

Because the only digits used in binary (Base 2) are 0 and 1

Hide Answer

d. Click DEC. Using your mouse, click on the number 1 followed by the number 5 on the
number pad. The decimal number 15 has now been entered.
e. Now click BIN.

What happened to the number 15 listed in the textbox at the top of the window?

Answer Area

It converted into the decimal number 15 to four binary 1 digits (1111)

Hide Answer

e. Enter the number 220 and select BIN.

What is the binary equivalent of 220?

Answer Area

11011100

Hide Answer

f. Clear the binary value representing 220 in the window. From Binary mode, type in the
following binary number: 11001100. Select the DEC.

What is the decimal equivalent to the binary number of 11001100?

Answer Area

204

Hide Answer

Step 2: Practice the conversion between binary and decimal numbering system.

Convert the following decimal numbers to binary.


Decimal Binary

86
Answer Area

175
Answer Area

204
Answer Area

19
Answer Area

Decimal Binary

86 01010110

175 10101111

204 11001100

19 00010011

Hide Answer

Convert the following binary numbers to decimal.

Binary Decimal

1100 0011
Answer Area

0010 1010
Answer Area

0011 1000
Answer Area
Binary Decimal

1001 0011
Answer Area

Binary Decimal

1100 0011 195

0010 1010 42

0011 1000 56

1001 0011 147

Hide Answer

Part 3: Network Addresses

Step 1: Convert host IP addresses.

a. Computer hosts usually have two addresses, an Internet Protocol (IP) address and an
Ethernet Media Access Control (MAC) address. For the benefit of humans, the IP
address is normally represented as a dotted decimal notation, such as 192.168.10.2.
Each of the decimal octets in the address or a mask can be converted to 8 binary bits.
Remember that the computer only understands binary bits.

If all 4 octets were converted to binary, how many bits would there be?

Answer Area

IP address is 32 bits, 4x8

Hide Answer

b. IP addresses are normally shown with four decimal numbers ranging from 0 to 255 and
separated by a period.

Convert the 4 parts of the IP address 192.168.10.2 to binary.


Decimal Binary

192
Answer Area

168
Answer Area

10
Answer Area

2
Answer Area

Decimal Binary

192 11000000

168 10101000

10 1010

2 10

Hide Answer

Step 2: Convert host IP subnet masks.

Subnet masks, such as 255.255.255.0, are also represented as dotted decimal. A subnet mask
will always consist of four 8-bit octets, each one represented as a decimal number. With the
exception of decimal 0 (all 8 binary zeros) and decimal 255 (all 8 binary ones), each octet will
have some number of ones on the left and some number of zeros on the right.

Convert the 8 possible decimal subnet octet values to binary.

Decimal Binary

0
Answer Area
Decimal Binary

128
Answer Area

192
Answer Area

224
Answer Area

240
Answer Area

248
Answer Area

252
Answer Area

254
Answer Area

255
Answer Area

Decimal Binary

0 00000000

128 10000000

192 11000000

224 11100000

240 11110000

248 11111000

252 11111100
Decimal Binary

254 11111110

255 11111111

Hide Answer

Convert the four parts of the subnet mask 255.255.255.0 to binary.

Decimal Binary

255
Answer Area

255
Answer Area

255
Answer Area

0
Answer Area

Decimal Binary

255 11111111

255 11111111

255 11111111

0 00000000

Hide Answer

Step 3: Manipulate powers of 2 to determine the number of hosts on a network

1. Binary numbers use two digits, 0 and 1. When you calculate how many hosts can be on
a subnetwork, you use powers of two because binary is being used. As an example, we
have a subnet mask that leaves six bits in the host portion of the IP address. In this
case, the number of hosts on that network is 2 to the 6th power minus 2 (because you
need a number to represent the network and a number that can be used to reach all the
hosts—the broadcast address). The number 2 is always used because we are working
in binary. The number 6 is the number of bits that are used for the host bits.
2. Change the calculator view to Scientific mode. Input the number 2. Select the xy key on
the calculator, the key which raises a number to a power. Input the number 6. To
compete the operation, click on the = key, press Enter on the keyboard, or press the =
key on the keyboard. The number 64 appears in the output. To subtract two, click on the
minus (-) key and then the 2 key followed by the = key. The number 62 appears in the
output. This means 62 hosts could be utilized.

Using the previously described process, determine the number of hosts if the following number
of bits are used for host bits.

No. of Bits Used for Hosts No. of Hosts

5
Answer Area

14
Answer Area

24
Answer Area

10
Answer Area

No. of Bits Used for Hosts No. of Hosts

5 30

14 16382

24 16777214

10 1022

Hide Answer

Using a similar technique as learned previously, determine what 10 to the 4th power equals.
Answer Area

10000

Hide Answer

c. Close the Windows Calculator application.

Reflection

List one other thing for which you might use the Windows Calculator scientific mode. It does not
have to be related to networking.

Answer Area

True or False: The User Datagram Protocol (UDP) does not use acknowledgments to
track the receipt of segments.

The IPv4 Address Structure


8.3.2 Networks and Hosts
This is an animations player component.

The logical 32-bit IPv4 address is hierarchical and is made up of two


parts, the network and the host. In the figure, the network portion is
blue, and the host portion is red. Both parts are required in an IPv4
address. Both networks have the subnet mask 255.255.255.0.

As an example, there is a host with an IPv4 address 192.168.5.11 with


a subnet mask of 255.255.255.0. The first three octets, (192.168.5),
identify the network portion of the address, and the last octet, (11)
identifies the host. This is known as hierarchical addressing because
the network portion indicates the network on which each unique host
address is located. Routers only need to know how to reach each
network, rather than needing to know the location of each individual
host.

With IPv4 addressing, multiple logical networks can exist on one


physical network, if the network portion of the logical network host
addresses is different. For example: three hosts on a single, physical
local network have the same network portion of their IPv4 address
(192.168.18) and three other hosts have different network portions of
their IPv4 addresses (192.168.5). The hosts with the same network
number in their IPv4 addresses will be able to communicate with each
other, but will not be able to communicate with the other hosts without
the use of routing. In this example, there is one physical network and
two logical IPv4 networks.

Another example of a hierarchical network is the telephone system.


With a telephone number, the country code, area code and exchange
represent the network address and the remaining digits represent a
local phone number.
8.3.5 Logical AND
This is an animations player component.

A logical AND is one of three basic binary operations used in digital


logic. The other two are OR and NOT. Although all three are used in
data networks, only AND is used in determining the network address.
Therefore, our discussion here will be limited to the logical AND
operation.

Logical AND is the comparison of two bits that produce the results
shown in the following. Note how only a 1 AND 1 produce a 1.

 1 AND 1 = 1
 0 AND 1 = 0
 1 AND 0 = 0
 0 AND 0 = 0

To identify the network address of an IPv4 host, the IPv4 address is


logically ANDed, bit by bit, with the subnet mask. ANDing between the
address and the subnet mask yields the network address.
To illustrate how AND is used to discover a network address, consider
a host with IPv4 address 192.168.10.10 and subnet mask of
255.255.255.0. The following figure displays the host IPv4 address
and converted binary address. The host subnet mask binary address
is ANDed.

8.3.6 Calculate Whether the Destination is Local or Remote


This is an animations player component.

How do hosts know which portion of an IPv4 address is the network


and which is the host? This is the job of the subnet mask.

When an IPv4 host is configured, a subnet mask is assigned along


with an IPv4 address. Like the IPv4 address, the subnet mask is 32
bits long. The subnet mask signifies which part of the IPv4 address is
network and which part is host.

The subnet mask is compared to the IPv4 address from left to right, bit
for bit. The 1s in the subnet mask represent the network portion; the
0s represent the host portion. In the example shown, the first three
octets are network, and the last octet represents the host.
When a host sends a packet, it compares its subnet mask to its own
IPv4 address and the destination IPv4 address. If the network bits
match, both the source and destination host are on the same network
and the packet can be delivered locally. If they do not match, the
sending host forwards the packet to the local router interface to be
sent on to the other network.

Click Play in the figure to see how H1 uses its subnet mask to
determine if H2 is on the same network.

8.3.7 Calculate the Number of Hosts


This is an animations player component.

The subnet masks we see most often with home and small business
networking are: 255.0.0.0 (8-bits), 255.255.0.0 (16 bits) and
255.255.255.0 (24 bits). A subnet mask of 255.255.255.0 (decimal) or
11111111.11111111.1111111.00000000 (binary) uses 24 bits to
identify the network number which leaves 8 bits to number the hosts
on that network, as shown in the figure.

To calculate the number of hosts that can be on that network, take the
number 2 to the power of the number of host bits (2 ^ 8 = 256). From
this number, we must subtract 2 (256-2). The reason we subtract 2 is
that all 1s within the host portion of an IPv4 address is a broadcast
address for that network and cannot be assigned to a specific host. All
0s within the host portion indicate the network ID and again, cannot be
assigned to a specific host. Powers of 2 can be calculated easily with
the calculator that comes with any Windows operating system.

Another way to determine the number of hosts available is to add up


the values of the available host bits (128+64+32+16+8+4+2+1 = 255).
From this number, subtract 1 (255-1 = 254), because the host bits
cannot be all 1s. It is not necessary to subtract 2 because the value of
all 0s is 0 and is not included in the addition.

With a 16-bit mask, there are 16 bits (two octets) for host addresses
and a host address could have all 1s (255) in one of the octets. This
might appear to be a broadcast but as long as the other octet is not all
1s, it is a valid host address. Remember that the host looks at all host
bits together, not at octet values.
8.3.9 Activity - ANDing to
Determine the Network
Address
Instructions:

Use the ANDing process to determine the network address (in binary
and decimal formats).
Question 1
This is a multiple choice question. Once you have selected an option,
select the submit button below

Host-A has the IPv4 address and subnet mask 10.5.4.100


255.255.255.0. What is the network address of Host-A?

10.0.0.0

10.5.0.0

10.5.4.0

10.5.4.100

Question 2
This is a multiple choice question. Once you have selected an option,
select the submit button below

Host-A has the IPv4 address and subnet mask 172.16.4.100


255.255.0.0. What is the network address of Host-A?

172.0.0.0

172.16.0.0

172.16.4.0

172.16.4.100

Question 3
This is a multiple choice question. Once you have selected an option,
select the submit button below
Host-A has the IPv4 address and subnet mask 10.5.4.100
255.255.255.0. Which of the following IPv4 addresses would be on the
same network as Host-A? (Choose all that apply)

10.5.4.1

10.5.0.1

10.5.4.99

10.0.0.98

10.5.100.4

Question 4
This is a multiple choice question. Once you have selected an option,
select the submit button below

Host-A has the IPv4 address and subnet mask 172.16.4.100


255.255.0.0. Which of the following IPv4 addresses would be on the
same network as Host-A? (Choose all that apply)

172.16.4.99

172.16.0.1

172.17.4.99

172.17.4.1

172.18.4.1
Question 5
This is a multiple choice question. Once you have selected an option,
select the submit button below

Host-A has the IPv4 address and subnet mask 192.168.1.50


255.255.255.0. Which of the following IPv4 addresses would be on the
same network as Host-A? (Choose all that apply)

192.168.0.1

192.168.0.100

192.168.1.1

192.168.1.100

192.168.2.1

Classful IPv4 Addressing

8.4.1 Classful and Classless


Addressing
In 1981, internet IPv4 addresses were assigned using classful
addressing. Customers were allocated a network address based on
one of three classes, A, B, or C. The addresses were divided into the
following ranges or classes:

 Class A (0.0.0.0/8 to 127.0.0.0/8) - Designed to support


extremely large networks with more than 16 million host
addresses. It used a fixed /8 prefix (255.0.0.0) with the first octet
to indicate the network address and the remaining three octets
for host addresses.
 Class B (128.0.0.0 /16 - 191.255.0.0 /16) - Designed to support
the needs of moderate to large size networks with up to
approximately 65,000 host addresses. It used a fixed /16 prefix
(255.255.0.0) with the two high-order octets to indicate the
network address and the remaining two octets for host
addresses.
 Class C (192.0.0.0 /24 - 223.255.255.0 /24) - Designed to
support small networks with a maximum of 254 hosts. It used a
fixed /24 prefix (255.255.255.0) with the first three octets to
indicate the network and the remaining octet for the host
addresses.

Note: There is also a Class D multicast block consisting of 224.0.0.0


to 239.0.0.0 and a Class E experimental address block consisting of
240.0.0.0 - 255.0.0.0.

As shown in the figure, the classful system allocated 50% of the


available IPv4 addresses to 128 Class A networks, 25% of the
addresses to Class B and then Class C shared the remaining 25%
with Class D and E. Although appropriate at the time, as the internet
grew it was obvious that this method was wasting addresses and
depleting the number of available IPv4 network addresses.

Classful addressing was abandoned in the late 1990s for the newer
and current classless addressing system.

The system in use today is referred to as classless addressing. The


formal name is Classless Inter-Domain Routing (CIDR, pronounced
“cider”). With classless addressing, customers receive an IPv4
network address and any size subnet mask, appropriate to the
number of hosts required. The subnet mask can be any length and is
not limited to the three subnet masks used in classful addressing.

Public and Private IPv4 Addresses

8.5.1 Private IPv4 Addressing


This is an animations player component.

Public IPv4 addresses are addresses which are globally routed


between ISP (internet service provider) routers. However, not all
available IPv4 addresses can be used on the internet. There are
blocks of addresses called private addresses that are used by most
organizations to assign IPv4 addresses to internal hosts.

In the mid-1990s private IPv4 addresses were introduced because of


the depletion of IPv4 address space. Private IPv4 addresses are not
unique and can be used by an internal network.

Specifically, the private address blocks are:

 10.0.0.0 /8 or 10.0.0.0 to 10.255.255.255
 172.16.0.0 /12 or 172.16.0.0 to 172.31.255.255
 192.168.0.0 /16 or 192.168.0.0 to 192.168.255.255

It is important to know that addresses within these address blocks are


not allowed on the internet and must be filtered (discarded) by internet
routers. For example, in the figure, users in networks 1, 2, or 3 are
sending packets to remote destinations. The ISP routers would see
that the source IPv4 addresses in the packets are from private
addresses and would, therefore, discard the packets.

Note: Private addresses are defined in RFC 1918.

Most organizations use private IPv4 addresses for their internal hosts.
However, these RFC 1918 addresses are not routable in the internet
and must be translated to a public IPv4 address. Network Address
Translation (NAT) is used to translate between private IPv4 and public
IPv4 addresses. This is usually done on the router that connects the
internal network to the ISP's network.

Home routers provide the same capability. For instance, most home
routers assign IPv4 addresses to their wired and wireless hosts from
the private address of 192.168.1.0 /24. The home router interface that
connects to the internet service provider (ISP) network is assigned a
public IPv4 address.
8.5.2 Assignment of IPv4 Addresses
This is an animations player component.

For a company or organization to support network hosts, such as web


servers that are accessible from the internet, that organization must
have a block of public addresses assigned. Remember that public
addresses must be unique, and use of these public addresses is
regulated and allocated to each organization separately. This is true
for IPv4 and IPv6 addresses.

Both IPv4 and IPv6 addresses are managed by the Internet Assigned
Numbers Authority (IANA) (http://www.iana.org). The IANA manages
and allocates blocks of IP addresses to the Regional Internet
Registries (RIRs).

RIRs are responsible for allocating IP addresses to ISPs who in turn


provide IPv4 address blocks to organizations and smaller ISPs.
Organizations can get their addresses directly from an RIR subject to
the policies of that RIR.

 AfriNIC (African Network Information Centre) - Africa Region


 APNIC (Asia Pacific Network Information Centre) - Asia/Pacific
Region
 ARIN (American Registry for Internet Numbers) - North America
Region
 LACNIC (Regional Latin-American and Caribbean IP Address
Registry) - Latin America and some Caribbean Islands
 RIPE NCC (Réseaux IP Européens Network Coordination
Centre) - Europe, the Middle East, and Central Asia
8.5.3 Activity - Public or Private IPv4 Address
Incomplete Question 1
Question 1
Matching. Select from lists and then submit.

Instructions:

Click Public or Private below each address to choose the correct


network type.

Choose the correct network type: “Public” or “Private” for each


address
172.16.35.2
Private
192.168.3.5
Private
192.0.3.15
Public
64.104.0.22
Public
209.165.201.30
Public
192.168.11.5
Private
172.16.30.30
Private
10.55.3.168
Private

Unicast, Broadcast and Multicast


Addresses
8.6.2 Unicast Transmission
This is an animations player component.

Unicast communication is used for normal host-to-host communication


in both a client/server and a peer-to-peer network. Unicast packets
use the address of the destination device as the destination address
and can be routed through an internetwork.

Click Play in the figure to see an animation of a unicast transmission.

In an IPv4 network, the unicast address applied to an end device is


referred to as the host address. For unicast communication, the
addresses assigned to the two end devices are used as the source
and destination IPv4 addresses. During the encapsulation process,
the source host uses its IPv4 address as the source address and the
IPv4 address of the destination host as the destination address.
Regardless of whether the destination specified a packet as a unicast,
broadcast or multicast; the source address of any packet is always the
unicast address of the originating host.

Note: In this course, all communication between devices is unicast


unless otherwise noted.

IPv4 unicast host addresses are in the address range of 0.0.0.0 to


223.255.255.255. However, within this range are many addresses that
are reserved for special purposes.
8.6.4 Broadcast Transmission
This is an animations player component.

Broadcast packets are sent to all hosts in the network using a


broadcast address. With a broadcast, the packet contains a
destination IPv4 address with all ones (1s) in the host portion. This
means that all hosts on that local network (broadcast domain) will
receive and look at the packet. Many network protocols, such as
DHCP, use broadcasts. When a host receives a packet sent to the
network broadcast address, the host processes the packet as it would
a packet addressed to its unicast address.

Broadcast may be directed or limited. A directed broadcast is sent to


all hosts on a specific network. For example, a host on the
172.16.4.0/24 network sends a packet to 172.16.4.255. A limited
broadcast is sent to 255.255.255.255. By default, routers do not
forward broadcasts.

Click Play in the figure to see an animation of a limited broadcast


transmission.

When a packet is broadcast, it uses resources on the network and


causes every receiving host on the network to process the packet.
Therefore, broadcast traffic should be limited so that it does not
adversely affect the performance of the network or devices. Because
routers separate broadcast domains, subdividing networks can
improve network performance by eliminating excessive broadcast
traffic.

8.6.6 Multicast Transmission


This is an animations player component.

Multicast transmission reduces traffic by allowing a host to send a


single packet to a selected set of hosts that subscribe to a multicast
group.

IPv4 has reserved the 224.0.0.0 to 239.255.255.255 addresses as a


multicast range. The IPv4 multicast addresses 224.0.0.0 to
224.0.0.255 are reserved for multicasting on the local network only.
These addresses are to be used for multicast groups on a local
network. A router connected to the local network recognizes that these
packets are addressed to a local network multicast group and never
forwards them further. A typical use of reserved local network
multicast address is in routing protocols using multicast transmission
to exchange routing information. For instance, 224.0.0.9 is the
multicast address used by Routing Information Protocol (RIP) version
2 to communicate with other RIPv2 routers.

Hosts that receive particular multicast data are called multicast clients.
The multicast clients use services requested by a client program to
subscribe to the multicast group.

Each multicast group is represented by a single IPv4 multicast


destination address. When an IPv4 host subscribes to a multicast
group, the host processes packets addressed to this multicast
address, and packets addressed to its uniquely allocated unicast
address.

Click Play in the figure to see an animation of clients accepting


multicast packets.
The Internet Protocol Summary
Purpose of an IPv4 Address

The IPv4 address is a logical network address that identifies a


particular host. An IPv4 address is assigned to the network interface
connection for a host. This connection is usually a network interface
card (NIC) installed in the device. Every packet sent across the
internet has a source and destination IPv4 address.
Binary Conversion of an IPv4 Address

An IPv4 address is simply a series of 32 binary bits (ones and zeros).


The 32 bits are grouped into four 8-bit bytes called octets. Each octet
is presented as its decimal value, separated by a decimal point or
period, called dotted-decimal notation. Each octet is made up of 8 bits
and each bit has a value. The value of each of the four octets can
range from 0 to a maximum of 255. Determine the value of the octet
by adding the values of positions wherever there is a binary 1 present:

 If there is a 0 in a position, do not add the value.


 If all 8 bits are 0s, 00000000 the value of the octet is 0.
 If all 8 bits are 1s, 11111111 the value of the octet is 255
(128+64+32+16+8+4+2+1).
 If the 8 bits are mixed, such as the example 00100111, the value
of the octet is 39 (32+4+2+1).

The IPv4 Address Structure

The logical 32-bit IPv4 address is hierarchical and is made up of two


parts. The first part identifies the network and the second part
identifies a host on that network. In hierarchical addressing the
network portion indicates the network on which each unique host
address is located.

Logical AND is the comparison of two bits that produce results of


either 0 or 1. In digital logic, 1 represents True and 0 represents False.
When using an AND operation, both input values must be True (1) for
the result to be True (1). Only a 1 AND 1 produce a 1. All other AND
combinations produce a 0. To identify the network address of an IPv4
host, the IPv4 address is logically ANDed, bit by bit, with the subnet
mask. ANDing between the address and the subnet mask yields the
network address. The subnet mask is compared to the IPv4 address
from left to right, bit for bit. The 1s in the subnet mask represent the
network portion; the 0s represent the host portion. A subnet mask of
255.255.255.0 (decimal) or 11111111.11111111.1111111.00000000
(binary) uses 24 bits to identify the network number which leaves 8
bits to number the hosts on that network.
Classful IPv4 Addressing

In 1981, internet IPv4 addresses were assigned using classful


addressing, based on one of three classes, A, B, or C:

 Class A (0.0.0.0/8 to 127.0.0.0/8) - Designed to support


extremely large networks with more than 16 million host
addresses.
 Class B (128.0.0.0 /16 - 191.255.0.0 /16) - Designed to support
the needs of moderate to large size networks with up to
approximately 65,000 host addresses.
 Class C (192.0.0.0 /24 - 223.255.255.0 /24) - Designed to
support small networks with a maximum of 254 hosts.

Classful addressing was abandoned in the late 1990s for the newer
and current classless addressing system.

Public and Private IPv4 Addresses

Most internal networks, from large enterprises to home networks, use


private IPv4 addresses for addressing all internal devices (intranet)
including hosts and routers. However, private addresses are not
globally routable. Specifically, the private address blocks are:

 10.0.0.0 /8 or 10.0.0.0 to 10.255.255.255


 172.16.0.0 /12 or 172.16.0.0 to 172.31.255.255
 192.168.0.0 /16 or 192.168.0.0 to 192.168.255.255

These addresses are not routable in the internet. Before an ISP can
forward a packet with a private address out to the internet, the
address must be translated to a public IPv4 address using NAT.

Public addresses (both IPv4 and IPv6) must be unique, and use of
them is regulated and allocated to each organization separately.
Public addresses are managed by the IANA. The IANA manages and
allocates blocks of IP addresses to the RIRs. RIRs are responsible for
allocating IP addresses to ISPs who, in turn, provide IPv4 address
blocks to organizations and smaller ISPs.

Unicast, Broadcast, and Multicast Addresses

For unicast communication, the addresses assigned to the two end


devices are used as the source and destination IPv4 addresses. IPv4
unicast host addresses are in the address range of 0.0.0.0 to
223.255.255.255.

Broadcast traffic is used to send packets to all hosts in the network


using the broadcast address for the network. With a broadcast, the
packet contains a destination IPv4 address with all ones (1s) in the
host portion. This means that all hosts on that local network
(broadcast domain) will receive and look at the packet. Because
routers separate broadcast domains, subdividing networks can
improve network performance by eliminating excessive broadcast
traffic.

Multicast transmission reduces traffic by allowing a host to send a


single packet to a selected set of hosts that subscribe to a multicast
group. The IPv4 multicast addresses 224.0.0.0 to 224.0.0.255 are
reserved for multicasting on the local network only. Each multicast
group is represented by a single IPv4 multicast destination address.
When an IPv4 host subscribes to a multicast group, the host
processes packets addressed to this multicast address, and packets
addressed to its uniquely allocated unicast address.
8.7.2 The Internet Protocol Quiz
Complete Question 1
Question 1
Multiple choice question

A network design engineer has been asked to design the IP


addressing scheme for a customer network. The network will use IP
addresses from the 192.168.30.0/24 network. The engineer allocates
254 IP addresses for the hosts on the network but excludes
192.168.30.0/24 and 192.168.30.255/24 IP addresses. Why must the
engineer exclude these two IP addresses?

192.168.30.0/24 and 192.168.30.255/24 IP addresses are reserved


for the email and DNS servers.

192.168.30.0/24 and 192.168.30.255/24 IP addresses are reserved


for outside Internet connectivity.

192.168.30.0/24 is the network IP address and 192.168.30.255/24 is


the IP broadcast address.

192.168.30.0/24 is the IP address reserved for the default gateway,


and 192.168.30.255/24 is the IP address reserved for the DHCP
server.

That’s right!

Topic 8.3.0 - The IPv4 addressing system is a hierarchical addressing


system. An IPv4 address is made up of two parts, the network
address and the host address. When the host portion is all "0s" in
binary, it is designated as a network address. When the host portion is
all "1s" in binary, it is designated as a broadcast address. These two
addresses cannot be assigned to individual hosts.
Question 2
Multiple choice question

What are three private IPv4 address? (Choose three.)

172.16.4.4

172.32.5.2

192.167.10.10

10.1.1.1

192.168.5.5

224.6.6.6

That’s right!

Topic 8.5.0 - Private IP addresses are reserved to be exclusively used


for internal networks and they cannot be used on the Internet. IPv4
addresses in the networks, 10.0.0.0/8, 172.16.0.0/16-172.31.0.0/16,
and 192.168.0.0/24-192.168.255.0/24, are designated as private IPv4
addresses.

Question 3
Multiple choice question

Which address prefix range is reserved for IPv4 multicast?

240.0.0.0 - 254.255.255.255

224.0.0.0 - 239.255.255.255
169.254.0.0 - 169.254.255.255

127.0.0.0 - 127.255.255.255

That’s right!

Topic 8.6.0 - Multicast IPv4 addresses use the reserved class D


address range of 224.0.0.0 to 239.255.255.255.

Question 4
Multiple choice question

Why does a Layer 3 device perform the ANDing process on a


destination IP address and subnet mask?

to identify the broadcast address of the destination network

to identify the host address of the destination host

to identify faulty frames

to identify the network address of the destination network

That’s right!

Topic 8.3.0 - ANDing allows us to identify the network address from


the IP address and the network mask.

Question 5
Multiple choice question
What are three characteristics of a multicast transmission? (Choose
three.)

The source address of a multicast transmission is in the range of


224.0.0.0 to 224.0.0.255.

A single packet can be sent to a group of hosts.

Multicast transmissions can be used by routers to exchange routing


information.

Routers will not forward multicast addresses in the range of 224.0.0.0


to 224.0.0.255.

Computers use multicast transmission to request IPv4 addresses.

Multicast messages map lower layer addresses to upper layer


addresses.

Question 6
Multiple choice question

When IPv4 is configured for a computer on a network, what does the


subnet mask identify?

the dynamic subnetwork configuration

the part of the IP address that identifies the network

the pool of addresses assigned within the network

the device that the computer uses to access another network


That’s right!

Topic 8.3.0 - The IP addressing system is a hierarchical addressing


system. An IP address is made up of two parts: the network address
and the host address. For IPv4, the subnet mask is used to identify
which portion of an IPv4 address is the network address and which
portion is the host address.

Question 7
Multiple choice question

Which network does a host with IP address 172.32.65.13 reside on if it


is using a default subnet mask?

172.32.65.0

172.32.65.32

172.32.0.0

172.32.32.0

That’s right!

Topic 8.4.0 - In classful IPv4 addressing, a network with the first octet
of 172 is a Class B network with the default subnet mask 255.255.0.0.
Thus the network address is 172.32.0.0.

Question 8
Multiple choice question
A technician is setting up equipment on a network. Which three
devices will need IP addresses? (Choose three.)

a printer with an integrated NIC

a web camera that is attached directly to a host

a server with two NICs

an IP phone

a wireless mouse

a PDA that is attached to a networked workstation

Topic 8.1.0 - A device needs an IP address in order to connect to a


network. A device that is attached to a networked device can use the
established connection to access the network.

Question 9
Multiple choice question

Which IP address type is intended for a specific host?

broadcast

multicast

simulcast

unicast

That’s right!

Topic 8.6.0 - A communication that has a single source going to a


single destination is a unicast. A communication from a single source
to a group of destinations is a multicast. A communication from a
single source to all destinations on the same local network is a
broadcast.

Question 9
Multiple choice question

Which IP address type is intended for a specific host?

broadcast

multicast

simulcast

unicast

That’s right!

Topic 8.6.0 - A communication that has a single source going to a


single destination is a unicast. A communication from a single source
to a group of destinations is a multicast. A communication from a
single source to all destinations on the same local network is a
broadcast.

Complete Question 10
Question 10
Multiple choice question

What is the equivalent decimal value given a binary number of


11001010?

196
202

212

240

That’s right!

Topic 8.2.0 - The equivalent decimal value for a binary number of


11001010 can be determined by 12^7+12^6+12^3+12^1.

Question 11
Multiple choice question

How many usable hosts are available given a Class C IP address with
the default subnet mask?

252

254

255

256

That’s right!

Topic 8.3.0 - The default subnet mask for a Class C network is


255.255.255.0. Thus there are 8 bits available for assigning host
addresses. Eight bits in binary is equivalent to 256 in decimal (2^8 =
256). These numbers are from 0 to 255. However, host portion 0 is
reserved for the network address, and the host address with all 1s (in
this case 255) is reserved for the broadcast address. Therefore,
usable host addresses are 256-2=254.

Question 12
Multiple choice question

What are two differences between binary and decimal numbers?


(Choose two.)

Decimal numbers are based on powers of 1.

Binary numbers are based on powers of 2.

Decimal numbers include 0 through 9.

Numbers typed on a keyboard are entered as binary and converted to


decimal by the computer.

Binary numbers consist of three states: on, off, null. Decimal numbers
do not have states.

That’s right!

Topic 8.3.0 - The default subnet mask for a Class C network is


255.255.255.0. Thus there are 8 bits available for assigning host
addresses. Eight bits in binary is equivalent to 256 in decimal (2^8 =
256). These numbers are from 0 to 255. However, host portion 0 is
reserved for the network address, and the host address with all 1s (in
this case 255) is reserved for the broadcast address. Therefore,
usable host addresses are 256-2=254.

Modules 5 - 8: Network Protocols and


Architecture Group Exam

Welcome to the Networking Essentials Modules 5 - 8 exam.

You will be tested on the core concepts presented across Modules 5 -


8. There are 20 questions in total and you need to score at least 70%
to pass and unlock the associated Achievement.

You have unlimited attempts to pass the exam so please go back and
review any of the module content if you need to. Good luck!

Cisco Networking Academy content is copyrighted and the


unauthorized posting, distribution or sharing of this exam content is
prohibited.

©2022 Cisco Systems, Inc.

Question 1
Multiple choice question

Which three layers of the OSI model map to the application layer of
the TCP/IP model? (Choose three.)

network
application

transport

session

presentation

data link
The application layer of the TCP/IP model maps to the top three layers
of the OSI model, which are the application, presentation, and session
layers.

Question 2
Multiple choice question

Which statement is true about MAC addresses?

The first three bytes are used by the vendor assigned OUI.

MAC addresses are implemented by software.

A NIC only needs a MAC address if connected to a WAN.

The ISO is responsible for MAC addresses regulations.


A MAC address is composed of 6 bytes. The first 3 bytes are used for
vendor identification and the last 3 bytes must be assigned a unique
value within the same OUI. MAC addresses are implemented in
hardware. A NIC needs a MAC address to communicate over the
LAN. The IEEE regulates the MAC addresses.

Question 3
Multiple choice question
What is indicated by the 100 in the 100BASE-T standard?

meters

twists per meter

feet

megabits per second


100BASE-T is an Ethernet standard that translates to 100 megabits
per second, baseband transmission, and twisted pair cable.

Question 4
Multiple choice question

Which two OSI model layers have the same functionality as two layers
of the TCP/IP model?  (Choose two.)

data link

physical

network

session

transport
The OSI transport layer is functionally equivalent to the TCP/IP
transport layer, and the OSI network layer is equivalent to the TCP/IP
internet layer. The OSI data link and physical layers together are
equivalent to the TCP/IP network access layer. The OSI session layer
(with the presentation layer) is included within the TCP/IP application
layer.
Question 5
Multiple choice question

The Institute of Electrical and Electronics Engineers is responsible for


standards in which two areas? (Choose two.)

TCP/IP technologies

Ethernet media access control

wireless LANs

IP address allocation and management

the OSI reference model

peer-to-peer application compliance


Among the many standards for which the IEEE is responsible, the two
major standards are IEEE 802.3 and IEEE 802.11. The IEEE 802.3
standard defines media access control (MAC) for wired Ethernet. The
802.11 standard defines a group of standards for implementing
wireless local area networks (WLANs). The other options are
standards that are developed and maintained by other standards
organizations.

Question 6
Multiple choice question

What addressing information is recorded by a switch to build its MAC


address table?

the source Layer 2 address of incoming frames


the destination Layer 2 address of outgoing frames

the source Layer 3 address of outgoing packets

the destination Layer 3 address of incoming packets


A switch builds a MAC address table by inspecting incoming Layer 2
frames and recording the source MAC address found in the frame
header. The discovered and recorded MAC address is then
associated with the port used to receive the frame.

Question 7
Multiple choice question

What process is used to place one message inside another message


for transfer from the source to the destination?

decoding

flow control

access control

encapsulation
Encapsulation is the process of placing one message format into
another message format. An example is how a packet is placed in its
entirety into the data field as it is encapsulated into a frame.

Question 8
Multiple choice question
Which logical address is used for delivery of data to a remote
network?

destination port number

source MAC address

destination IP address

source IP address

destination MAC address


The destination IP address is used for end-to-end delivery of data to a
remote network. The destination MAC address is used for delivery on
a local network. The destination port number identifies the application
that should process the data at the destination. Source addresses
identify the sender of the data.

Question 9
Multiple choice question

What will a Cisco LAN switch do if it receives an incoming frame and


the destination MAC address is not listed in the MAC address table?

Use ARP to resolve the port that is related to the frame.

Send the frame to the default gateway address.

Forward the frame out all ports except the port where the frame is
received.

Drop the frame.


A LAN switch populates the MAC address table based on source MAC
addresses. When a switch receives an incoming frame with a
destination MAC address that is not listed in the MAC address table,
the switch forwards the frame out all ports except for the ingress port
of the frame. When the destination device responds, the switch adds
the source MAC address and the port on which it was received to the
MAC address table.

Question 10
Multiple choice question

A small publishing company has a network design such that when a


broadcast is sent on the LAN, 200 devices receive the transmitted
broadcast. How can the network administrator reduce the number of
devices that receive broadcast traffic?

Add more switches so that fewer devices are on a particular switch.

Replace the switches with switches that have more ports per switch.
This will allow more devices on a particular switch.

Segment the LAN into smaller LANs and route between them.

Replace at least half of the switches with hubs to reduce the size of
the broadcast domain.
By dividing the one big network into two smaller network, the network
administrator has created two smaller broadcast domains. When a
broadcast is sent on the network now, the broadcast will only be sent
to the devices on the same Ethernet LAN. The other LAN will not
receive the broadcast.
Question 11
Multiple choice question

Which two functions are primary functions of a router? (Choose two.)

packet forwarding

microsegmentation

domain name resolution

path selection

flow control
A router accepts a packet and accesses its routing table to determine
the appropriate exit interface based on the destination address. The
router then forwards the packet out of that interface.
Complete Question 12
Question 12
Multiple choice question

A computer can access devices on the same network but cannot


access devices on other networks. What is the probable cause of this
problem?

The cable is not connected properly to the NIC.

The computer has an invalid IP address.

The computer has an incorrect subnet mask.

The computer has an invalid default gateway address.

The default gateway is the address of the device a host uses to


access the Internet or another network. If the default gateway is
missing or incorrect, that host will not be able to communicate outside
the local network. Because the host can access other hosts on the
local network, the network cable and the other parts of the IP
configuration are working.

Question 13

Refer to the exhibit. Consider the IP address configuration shown from


PC1. What is a description of the default gateway address?

It is the IP address of the Router1 interface that connects the


company to the Internet.
It is the IP address of the Router1 interface that connects the PC1
LAN to Router1.

It is the IP address of Switch1 that connects PC1 to other devices on


the same LAN.

It is the IP address of the ISP network device located in the cloud.


The default gateway is used to route packets destined for remote
networks. The default gateway IP address is the address of the first
Layer 3 device (the router interface) that connects to the same
network.

Question 14
Multiple choice question

A router receives an incoming packet and determines that the packet


should be forwarded to a remote destination host. What will the router
do to forward the packet?

It encapsulates the frame with a source IP address by using the


specific IP address of the destination host.

It encapsulates the frame with a destination MAC address by using


the specific MAC address of the destination host device.

It encapsulates the frame with the destination IP address by using the


specific IP address configured on the interface of the next hop router.

It encapsulates the frame with the destination MAC address by using


the MAC address of the interface of the next-hop router.
A router contains a routing table of all locally connected networks and
the interfaces that connect to them. The routing tables can also
contain the routes that the router uses to reach remote networks.
When a router determines that an incoming packet contains the
destination host on a remote network, it encapsulates the frame to
forward it towards to the next hop router. It uses the MAC address of
the interface on the next hop router as the destination MAC address.
The MAC address is obtained through ARP.

Question 15
Multiple choice question

A router is receiving a stream of incoming packets and does not


contain a route to the remote destination network. What configuration
can a network administrator issue in order to successfully forward the
incoming packets?

Add a default route.

Enable a dynamic routing protocol.

Share the routing table with the hosts on the local network.

Change the IP address of the ingress interface to match the targeted


destination network.
A router contains a routing table of all locally connected networks and
the interfaces that connect to them. The routing tables can also
contain the routes that the router uses to reach remote networks.
Entries can be made to the routing table in two ways. The first is that
the router via the use of a routing protocol can be dynamically updated
by information received from other routers in the network. The second
is that the entries can be manually entered by a network administrator.
If the router cannot determine where to forward a packet, it will drop it.
Network administrators can configure a default route to keep a packet
from being dropped because the path to the destination network is not
in the routing table. A default route is the interface through which the
router forwards a packet containing an unknown destination IP
network address.

Question 16
Multiple choice question

When a host sends a packet, how does it determine if the destination


of the packet is on the same local network or on a remote network?

It checks to see if the default gateway is configured.

It compares the source and destination MAC addresses.

It queries the DNS server with the destination IP address.

It uses the subnet mask to compare the source and destination IP


address.
When a host sends a packet, it uses the subnet mask to compare the
source IPv4 address and the destination IPv4 address. If the network
bits match, both the source and destination host are on the same local
network. Otherwise, the destination host is on a remote network.

Question 17
Multiple choice question

Which two parts are components of an IPv4 address? (Choose two.)

subnet portion

network portion

logical portion
host portion

physical portion

broadcast portion
An IPv4 address is divided into two parts: a network portion - to
identify the specific network on which a host resides, and a host
portion - to identify specific hosts on a network. A subnet mask is used
to identify the length of each portion.

Question 18
Multiple choice question

What type of message is sent to a specific group of hosts?

unicast

dynamic

multicast

broadcast
A communication that has a single source going to a single destination
is a unicast. A communication from a single source to a group of
destinations is a multicast. A communication from a single source to
all destinations on the same local network is a broadcast.
Question 19
Multiple choice question

Which IP address is a unicast address if a default subnet mask is


used?

201.34.45.0

192.16.43.67

226.34.15.78

195.124.45.255
The IP addresses 201.34.45.0, 192.16.43.67, and 195.124.45.255 are
Class C addresses. With the default subnet mask of 255.255.255.0,
192.16.43.67 is a unicast address or host address, 195.124.45.255 is
a broadcast address, and 201.34.45.0 is a network address. IP
address 226.34.15.78 is a Class D multicast address.
Complete Question 20
Question 20
Multiple choice question

Which three IP addresses are private? (Choose three.)

10.1.1.1

172.32.5.2

192.167.10.10

172.16.4.4

192.168.5.5

224.6.6.6
The private IP addresses are within these three ranges:
10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255

Build a Home Network

Introduction

13.0.1 Why Should I Take this Module?

Welcome to Build a Home Network!

By now, you have built a simple peer-to-peer network. You’ve also


learned a lot about more complex networks. It’s time put some of the
knowledge and skills that you have acquired to use.

If you have already built a home network, then this module is a good
refresher for you, because there is a lot of technology to choose from
in home networks. If you’ve not set up such a network, this module will
teach you everything you need know.

Module Title: Build a Home Network

Module Objective: Configure an integrated wireless router and


wireless client to connect securely to the internet.
Home Network Basics
13.1.1 Connecting Home Devices
This is an animations player component.

Not long ago, home networks consisted of a desktop PC, a modem for
internet, and perhaps a printer. In the homes of today, there are
dozens of devices that rely on network connectivity. We can watch our
security cameras from apps on our smart phones, make a telephone
call from our PCs, and stream live video content from anywhere in the
world.

A home network is a small LAN with devices that usually connect to


an integrated router and to each other in order to exchange
information. The router is connected to the internet, as shown in the
figure. Most likely, the home router is equipped with both wired and
wireless capabilities. Wireless technology offers many advantages
compared to traditional wired networks.

One of the main advantages of wireless is the ability to provide


anytime, anywhere connectivity. Within a home LAN, items such as
smart phones and tablets are mobile. Televisions and other
audio/video devices may be mounted in more permanent locations
and may benefit from wired connectivity.

Wireless technology is fairly easy and inexpensive to install. The cost


of home and business wireless devices continues to decrease. Yet,
despite the decrease in cost, the data rate and capabilities of these
devices have increased, allowing faster, more reliable wireless
connections.

Wireless technology enables networks to be easily expanded, without


the limitations of cabled connections. New and visiting users can join
the network quickly and easily.

13.1.2 Components of a Home Network


This is an animations player component.

In addition to an integrated router, there are many different types of


devices that might be connecting to a home network, as shown in the
figure. Here are a few examples:

 Desktop computers
 Gaming systems
 Smart TV systems
 Printers
 Scanners
 Security cameras
 Telephones
 Climate control devices

As the new technologies come on the market, more and more


household functions will rely on the network to provide connectivity
and control.

Home Wireless Local Area Network (WLAN)

13.1.3 Typical Home Network Routers


This is an animations player component.

Small business and home routers typically have two primary types of
ports:

 Ethernet Ports - These ports connect to the internal switch


portion of the router. These ports are usually labeled “Ethernet”
or “LAN”, as shown in the figure. All devices connected to the
switch ports are on the same local network.
 Internet Port - This port is used to connect the device to another
network. The Internet port connects the router to a different
network than the Ethernet ports. This port is often used to
connect to the cable or DSL modem in order to access the
internet.

In addition to the wired ports, many home routers include a radio


antenna and a built-in wireless access point. By default, the wireless
devices are on the same local network as the devices that are
physically plugged into the LAN switch ports. The Internet port is the
only port that is on a different network in the default configuration.

Question 1
This is a multiple choice question. Once you have selected an option,
select the submit button below
True or False? A home router typically only provides wired access to
the network. You have to buy a separate device for wireless access.

false
true

Network Technologies in the Home

13.2.1 The Electromagnetic Spectrum


This is an animations player component.

What would we do without wireless? Because of the ever-increasing


number of things that have the capability of connecting to the internet
using wireless technologies, most home networks include some type
of wireless network functionality.

Wireless technologies use electromagnetic waves to carry information


between devices. The electromagnetic spectrum includes such things
as radio and television broadcast bands, visible light, x-rays and
gamma-rays. Each of these has a specific range of wavelengths and
associated energies, as shown in the figure.

Some types of electromagnetic waves are not suitable for carrying


data. Other parts of the spectrum are regulated by governments and
licensed to various organizations for specific applications. Certain
areas of the spectrum have been set aside to allow public use without
the restriction of having to apply for special permits. These unlicensed
sections of the spectrum are incorporated into consumer products,
including the Wi-Fi routers found in most homes.
Category 5e Cable
Category 5e is the most common wiring used in a LAN. The cable is
made up of 4 pairs of wires that are twisted to reduce electrical
interference.

Coaxial Cable
Coaxial cable has an inner wire surrounded by a tubular insulating
layer, that is then surrounded by a tubular conducting shield. Most
coax cables also have an external insulating sheath or jacket.

Ethernet over Powerline


Existing power lines in a house can be used to connect devices to an
Ethernet LAN.
Question 3

That’s right.

Coaxial cable has an inner wire surrounded by a tubular insulating


layer, that is then surrounded by a tubular conducting shield.

Wireless Standards
13.3.1 Wi-Fi Networks

A number of standards have been developed to ensure that wireless devices can communicate.
They specify the RF spectrum used, data rates, how the information is transmitted, and more.
The main organization responsible for the creation of wireless technical standards is the IEEE.

The IEEE 802.11 standard governs the WLAN environment. There are amendments to the IEEE
802.11 standard that describe characteristics for different standards of wireless communications.
Wireless standards for LANs use the 2.4 GHz and 5 GHz frequency bands. Collectively these
technologies are referred to as Wi-Fi.

Another organization, known as the Wi-Fi Alliance, is responsible for testing wireless LAN
devices from different manufacturers. The Wi-Fi logo on a device means that this equipment
meets standards and should operate with other devices that use the same standard.

Wireless standards are constantly improving the connectivity and speed of Wi-Fi networks. It is
important to be aware of new standards as they are introduced because manufacturers of wireless
devices will implement these standards quickly in their new products.

Do you have a wireless network in your home? Do you know what standards are supported by
your wireless router?

Complete 13.3.2 Wireless


Settings
13.3.2 Wireless Settings

The Packet Tracer Basic Wireless Settings interface is shown in the


figure. Wireless routers using the 802.11 standards have multiple
settings that have to be configured. These settings include the
following:

 Network mode - Determines the type of technology that must be


supported. For example, 802.11b, 802.11g, 802.11n or Mixed
Mode.
 Network Name (SSID) - Used to identify the WLAN. All devices
that wish to participate in the WLAN must have the same SSID.
 Standard Channel - Specifies the channel over which
communication will occur. By default, this is set to Auto to allow
the AP to determine the optimum channel to use.
 SSID Broadcast - Determines if the SSID will be broadcast to all
devices within range. By default, set to Enabled.

Note: SSID stands for Service Set Identifier.

Network Mode

The 802.11 protocol can provide increased throughput based on the


wireless network environment. If all wireless devices connect with the
same 802.11 standard, maximum speeds can be obtained for that
standard. If the access point is configured to accept only one 802.11
standard, devices that do not use that standard cannot connect to the
access point.
A mixed mode wireless network environment can include devices that
use any of the existing Wi-Fi standards. This environment provides
easy access for older devices that need a wireless connection but do
not support the latest standards.

When building a wireless network, it is important that the wireless


components connect to the appropriate WLAN. This is done using the
SSID.

The SSID is a case-sensitive, alphanumeric string that contains up to


32 characters. It is sent in the header of all frames transmitted over
the WLAN. The SSID is used to tell wireless devices, called wireless
stations (STAs), which WLAN they belong to and with which other
devices they can communicate.

We use the SSID to identify a specific wireless network. It is


essentially the name of the network. Wireless routers usually
broadcast their configured SSIDs by default. The SSID broadcast
allows other devices and wireless clients to automatically discover the
name of the wireless network. When the SSID broadcast is disabled,
you must manually enter the SSID on wireless devices.

Disabling SSID broadcasting can make it more difficult for legitimate


clients to find the wireless network. However, simply turning off the
SSID broadcast is not sufficient to prevent unauthorized clients from
connecting to the wireless network. All wireless networks should use
the strongest available encryption to restrict unauthorized access.

Question 1

That’s right.

The Wi-Fi Alliance is responsible for testing wireless LAN devices


from different manufacturers.

Question 2
That’s right.

The SSID is used to identify a specific wireless network. It is


essentially the name of the network.

What is used to identify a specific wireless network?

the Service Set Identifier (SSID)

the network address

the network mode

the IP address of the router

Question 3

That’s right.

The SSID is used to identify a specific wireless network. It is


essentially the name of the network.

Question 1
Multiple choice question

What wireless router configuration would stop outsiders from using


your home network?

network name

router location
encryption

IP address
Encryption configured on the wireless router can provide secure
communications and stop outsiders from using your home network.
Complete Question 2
Question 2
Multiple choice question

What two IEEE 802.11 wireless standards operate only in the 5 GHz
range? (Choose two.)

802.11g

802.11a

802.11n

802.11b

802.11ad

802.11ac
The 802.11a and 802.11ac standards operate only in the 5 GHZ
range. The 802.11b and 802.11g standards operate only in the 2.4
GHz range. The 802.11n standard operates in both the 2.4 and 5 GHz
ranges. The 802.11ad standard operates in the 2.4, 5, and 60 GHz
ranges.
Complete Question 3
Question 3
Multiple choice question

Which feature is characteristic of MAC filtering in wireless networks?


It restricts computer access to a wireless network.

It encrypts data that is transmitted on a wireless network.

It allows only authorized users to detect the network.

It is configured on the computer rather than on the router.


MAC address filtering uses the MAC address to identify which devices
are allowed to connect to the wireless network.
Complete Question 4
Question 4
Multiple choice question

Which wireless RF band do IEEE 802.11b/g devices use?

900 MHz

5 GHz

60 GHz

2.4 GHz
900 MHz is an FCC wireless technology that was used before
development of the 802.11 standards. 900 MHz devices have a larger
coverage range than the higher frequencies have and do not require
line of sight between devices. 802.11b/g/n/ad devices all operate at
2.4 GHz. 802.11a/n/ac/ad devices operate at 5 GHz, and 802.11ad
devices operate at 60 GHz.
Complete Question 5
Question 5
Multiple choice question

What are three advantages of wireless over wired LAN technology?


(Choose three.)
longer transmission distance

ease of expansion

ease of installation

higher level of security

lower on-going costs


Wireless technology can provide anytime, anywhere connectivity and
allows devices to stay connected as their location may change.
Wireless technology is fairly easy and inexpensive to install and
enables networks to be easily expanded, without the limitations of
cabled connections.
Complete Question 6
Question 6
Multiple choice question

What technology allows users to access data anywhere and at any


time?

micromarketing

virtualization

data analytics

Cloud computing
Cloud computing allows organizations to eliminate the need for on-site
IT equipment, maintenance, and management. Cloud computing
allows organizations to expand their services or capabilities while
avoiding the increased costs of energy and space.
Complete Question 7
Question 7
Multiple choice question
Which three steps must be completed to manually connect an Android
or IOS device to a secured wireless network? (Choose three.)

Change the MAC address.

Choose the correct security type.

Activate the Bluetooth antenna.

Set the IP address.

Input the authentication password.

Enter the network SSID.


In order to connect an Android or IOS device to a Wi-Fi network
manually, perform these steps:

 Enter the network SSID of the wireless network.


 Choose the security type used by the wireless network.
 Input the password to authenticate successfully.

Complete Question 8
Question 8
Multiple choice question

What are two types of wired high-speed Internet connections?


(Choose two.)

satellite

dial-up

cable

cellular
DSL
Cable and DSL Internet technologies both use physical cabling to
provide an Internet connection to a residence or a small business.
Although dial-up is a wired technology, it does not provide a high-
speed Internet connection. Satellite and cellular connections provide a
wireless Internet connection.
Complete Question 9
Question 9
Multiple choice question

Which cloud computing opportunity would provide the use of network


hardware such as routers and switches for a particular company?

browser as a service (BaaS)

infrastructure as a service (IaaS)

wireless as a service (WaaS)

software as a service (SaaS)


This item is based on information contained in the presentation.
Routers, switches, and firewalls are infrastructure devices that can be
provided in the cloud.
Complete Question 10
Question 10
Multiple choice question

Which type of device provides an Internet connection through the use


of a phone jack?

DSL modem

cable modem
satellite modem

Wi-Fi AP
DSL technology uses the existing telephone network. For that reason,
a DSL modem commonly has an RJ-11 phone port.
Complete Question 11
Question 11
Multiple choice question

Which statement accurately characterizes the evolution of threats to


network security?

Internal threats can cause even greater damage than external threats.

Internet architects planned for network security from the beginning.

Threats have become less sophisticated while the technical


knowledge needed by an attacker has grown.

Early Internet users often engaged in activities that would harm other
users.
Internal threats can be intentional or accidental and cause greater
damage than external threats because the internal user has direct
access to the internal corporate network and corporate data.
Complete Question 12
Question 12
Multiple choice question

Which three attacks exploit human behavior? (Choose three.)

pretexting

vishing
malware

phishing

zombies

brute force
Attacks aimed at exploiting human behavior such as pretexting,
phishing, and vishing are commonly used by hackers to obtain
information directly from authorized users.
Complete Question 13
Question 13
Multiple choice question

Which type of attack exploits human behavior to gain confidential


information?

spyware

social engineering

denial of service

virus
Social engineering attacks deceive users into revealing private
information or performing specific actions.
Complete Question 14
Question 14
Multiple choice question

Which type of attack involves an attacker using a powerful computer


to try a large number of possible passwords in rapid succession to
gain access to a system?

phishing
brute force

pretexting

DDoS
In a brute force attack an attacker will try to gain access to a system
by guessing passwords as fast as possible.
Complete Question 15
Question 15
Multiple choice question

What is a characteristic of a computer worm?

tricks users into running the infected software

a set of computer instructions that lies dormant until triggered by a


specific event

exploits vulnerabilities with the intent of propagating itself across a


network

malicious software that copies itself into other executable programs


A worm is similar to a virus. However, a worm is self-spreading and
can send copies of itself to connected hosts over the network.
Complete Question 16
Question 16
Multiple choice question

What specialized network device is responsible for permitting or


blocking traffic between networks?

switch

firewall
access point

bridge
Firewalls are used to permit or block traffic between networks
according to access control policies.
Complete Question 17
Question 17
Multiple choice question

An administrator wants to configure a router so that users on the


outside network can only establish HTTP connections to the internal
web site. Which feature would the administrator configure to
accomplish this?

NAT overload

port forwarding

static NAT

PAT
Port forwarding allows connections to one port on the external
interface to be redirected to a specific device and a specific port on
the inside interface. In this way specific inside services can be
accessible from the outside network without permitting all traffic to the
inside device.
Complete Question 18
Question 18
Multiple choice question

What happens when a wireless access point is configured to stop


broadcasting the SSID?

The identity of the network is freely broadcast.


Computer access to the wireless access point is restricted.

The network is invisible to those who are unaware of the SSID.

Signals are prevented from transmission outside the boundaries of the


local network.
By default, wireless routers and access points broadcast SSIDs to all
computers within the wireless range. This allows any wireless client to
detect the network and to connect to it. The SSID broadcast feature
can be turned off. When it is turned off, the network is no longer made
public. It becomes invisible to clients that are not manually configured
with the SSID.
Complete Question 19
Question 19
Multiple choice question

Why should WEP not be used in wireless networks today?

its use of clear text passwords

easily crackable

its lack of encryption

its lack of support

its age
Despite improvements, WEP is still vulnerable to various security
issues including the ability to be cracked.
Complete Question 20
Question 20
Multiple choice question

What is the purpose of a DMZ?


It allows external hosts to access specific company servers while
maintaining the security restrictions for the internal network.

It analyzes traffic for intrusion attempts and sends reports to


management stations.

It creates an encrypted and authenticated tunnel for remote hosts to


access the internal network.

It provides secure connectivity for clients that connect to the internal


network through a wireless LAN.
The DMZ is an area of the network that is accessible to both internal
and external users. It is more secure than the external network but not
as secure as the internal network. It allows external hosts to access
internal servers.

You might also like