CCNA Certification Networking Tutorial - Introduction & Basics
CCNA Certification Networking Tutorial - Introduction & Basics
Home
Testing
Back
Agile Testing
BugZilla
Cucumber
Database Testing
ETL Testing
Jmeter
JIRA
Back
JUnit
LoadRunner
Manual Testing
Mobile Testing
Mantis
Postman
QTP
Back
Quality Center (ALM)
RPA
SAP Testing
Selenium
SoapUI
Test Management
TestLink
SAP
Back
ABAP
APO
Beginner
Basis
BODS
BI
BPC
CO
Back
CRM
Crystal Reports
FICO
HANA
HR
MM
QM
Payroll
Back
PI/PO
PP
SD
SAPUI5
Security
Solution Manager
Successfactors
SAP Tutorials
Web
Back
https://www.guru99.com/introduction-ccna.html 1/25
7/27/2020 CCNA Certification Tutorial: Introduction & Basics
Apache
Android
AngularJS
ASP.Net
C
C#
C++
CodeIgniter
DBMS
Back
Java
JavaScript
JSP
Kotlin
Linux
MariaDB
MS Access
MYSQL
Node.js
Back
Perl
PHP
PL/SQL
PostgreSQL
Python
ReactJS
Ruby & Rails
Scala
SQL
Back
SQL Server
SQLite
UML
VB.Net
VBScript
Web Services
WPF
Must Learn!
Back
Accounting
Algorithms
Blockchain
Business Analyst
Build Website
CCNA
Cloud Computing
COBOL
Compiler Design
Embedded Systems
Back
Ethical Hacking
Excel Tutorials
Go Programming
IoT
ITIL
Jenkins
MIS
Networking
Operating System
https://www.guru99.com/introduction-ccna.html 2/25
7/27/2020 CCNA Certification Tutorial: Introduction & Basics
Prep
Back
PMP
Photoshop
Project Management
Reviews
Salesforce
SEO
Software Engineering
VBA
Big Data
Back
AWS
BigData
Cassandra
Cognos
Data Warehousing
DevOps
HBase
Back
Hive
Informatica
MicroStrategy
MongoDB
NiFi
OBIEE
Pentaho
Back
Power BI
Qlikview
Tableau
Talend
ZooKeeper
Live Projects
Back
Live Agile Testing
Live HP ALM
Live Java Project
Live Mobile Testing
Live Payment Gateway
Live PHP Project
Live Projects Hub
Live Python Project
Back
Live Selenium Project
Live Selenium 2
Live Security Testing
Live Testing Project
Live Testing 2
Live Telecom
Live UFT/QTP Testing
AI
Back
Artificial Intelligence
Data Science
Keras
NLTK
Back
NumPy
https://www.guru99.com/introduction-ccna.html 3/25
7/27/2020 CCNA Certification Tutorial: Introduction & Basics
PyTorch
R Programming
TensorFlow
Blog
What is CCNA?
CCNA is a popular certification among computer network engineers. Full Form of
CCNA is Cisco Certified Network Associate. It is a certification program valid for
all type of engineers. It includes entry-level network engineers, Network
Administrators, Network Support Engineers and Network Specialists.
It is estimated that more than 1 million CCNA certificates have been awarded
since it was first launched in 1998.
OSI models
IP addressing
WLAN and VLAN
Network security and management (ACL included)
Routers / routing protocols ( EIGRP, OSPF, and RIP)
IP Routing
Network Device Security
Troubleshooting
Note: Cisco certification is valid only for 3 years. Once the certification expires the certificate holder has to take CCNA
certification exam again.
FEATURED VIDEOS
10 Sec
What is CCNA?
Why to acquire a CCNA certification?
Types of CCNA certification
What does the CCNA course consist of
Understanding the Need for Networking
Internetworking Devices used on a network
Understanding TCP/ IP layers
Network Segmentation
Packet Delivery Process
What is WLAN or Wireless Local Area Networks
Major difference between WLAN and LANs
WLAN Important Components
WLAN Security
Implementing WLAN
Troubleshooting
Introduction to Router
Binary Digit Basic
Important element for network addressing scheme
Router Security
As we discussed earlier the validity for any CCNA certificate last for three years.
100-101 Entry-level Network 90 mins exam duration $150 ( for different country price may
ICND1 Technician 50-60 questions vary)
200-101 Experienced Network 75 mins exam duration $150 ( for different country price may
ICND2 Technician 50-60 questions vary)
200-120 Experienced Network 90 mins exam duration $295 ( for different country price may
CCNA Technician 50-60 questions vary)
CCNA Cloud
CCNA Collaboration
CCNA Switching and Routing
CCNA Security
CCNA service provider
CCNA DataCenter
CCNA Industrial
https://www.guru99.com/introduction-ccna.html 6/25
7/27/2020 CCNA Certification Tutorial: Introduction & Basics
CCNA Voice
CCNA Wireless
The candidate to a CCNA certification can also prepare for the exam with the help of the CCNA boot camp.
To complete CCNA exam successfully. These are the topics one must be thorough of TCP/IP and the OSI model,
subnetting, IPv6, NAT (Network Address Translation) and wireless access.
An internet local area network consists of a Computer Network that interconnects computers within a limited area like
office, residence, laboratory, etc. This area network includes WAN, WLAN, LAN, SAN, etc.
Among these WAN, LAN and WLAN are most popular ones. In this study guide, you will learn how the local area
networks can be established using these network system.
A network is defined as a two or more independent devices or computers that are linked to share resources (such as
printers and CDs), exchange files, or allow electronic communications.
For example, the computers on a network may be linked through telephone lines, cables, satellites, radio waves, or infrared
light beams.
From OSI reference model, the layer 3, i.e., Network layer is involved in networking. This layer is responsible for packet
forwarding, routing through intermediate routers, recognizing and forwarding local host domain messages to transport
layer (layer 4), etc.
The network operates by connecting computers and peripherals using two pieces of equipment include routing and
switches. If two devices or computers are connected on the same link, then there is no need for a network layer.
https://www.guru99.com/introduction-ccna.html 7/25
7/27/2020 CCNA Certification Tutorial: Introduction & Basics
NIC: Network Interface Card or NIC are printed circuit boards that are installed in workstations. It represents the
physical connection between the workstation and network cable. Although NIC operates at the physical layer of the
OSI model, it is also considered as a data link layer device. Part of the NIC's is to facilitate information between the
workstation and the network. It also controls the transmission of data onto the wire
Hubs: A hub helps to extend the length of a network cabling system by amplifying the signal and then re-
transmitting it. They are basically multiport repeaters and not concerned about the data at all. The hub connects
workstations and sends a transmission to all the connected workstations.
Bridges: As network grow larger, they often get difficult to handle. To manage these growing network, they are
often divided into smaller LANs. These smaller LANS are connected to each other through bridges. This helps not
only to reduce traffic drain on the network but also monitors packets as they move between segments. It keeps the
track of the MAC address that is associated with various ports.
Switches: Switches are used in the option to bridges. It is becoming the more common way to connect network as
they are simply faster and more intelligent than bridges. It is capable of transmitting information to specific
workstations. Switches enable each workstation to transmit information over the network independent of the other
workstations. It is like a modern phone line, where several private conversation takes place at one time.
Routers: The aim of using a router is to direct data along the most efficient and economical route to the destination
device. They operate at Network layer 3, which means they communicate through IP address and not physical
(MAC) address. Routers connect two or more different networks together, such as an Internet Protocol network.
Routers can link different network types such as Ethernet, FDDI, and Token Ring.
Brouters: It is a combination of both routers and bridge. Brouter act as a filter that enables some data into the local
network and redirects unknown data to the other network.
Modems: It is a device that converts the computer-generated digital signals of a computer into analog signals,
traveling via phone lines.
TCP: It is responsible for breaking data down into small packets before they can be sent on the network. Also, for
assembling the packets again when they arrive.
IP (Internet Protocol): It is responsible for addressing, sending and receiving the data packets over the internet.
Introduction to CCNA
To understand TCP/IP internet layer we take a simple example. When we type something in an address bar, our request
will be processed to the server. The server will respond back to us with the request. This communication on the internet is
possible due to the TCP/IP protocol. The messages are sent and received in small packages.
The Internet layer in the TCP/IP reference model is responsible for transferring data between the source and destination
computers. This layer includes two activities
https://www.guru99.com/introduction-ccna.html 8/25
7/27/2020 CCNA Certification Tutorial: Introduction & Basics
Internet layer packs data into data packets referred as IP datagrams. It consists of source and destination IP address. Beside
this, IP datagram header field consists of information like version, header length, type of service, datagram length, time to
live, and so on.
In network layer, you can observe network protocols like ARP, IP, ICMP, IGMP, etc. The datagram are transported through
network using these protocols. They each resemble some function like.
The Internet Protocol (IP) is responsible for IP addressing, routing, the fragmentation and reassembly of packets. It
determines how to route message on the network.
Likewise, you will have ICMP protocol. It is responsible for diagnostic functions and reporting errors due to the
unsuccessful delivery of IP packets.
For the management of IP multicast groups, IGMP protocol is responsible.
The ARP or Address Resolution Protocol is responsible for the resolution of the Internet layer address to the
Network Interface layer address such as a hardware address.
RARP is used for disk less computers to determine their IP address using the network.
https://www.guru99.com/introduction-ccna.html 9/25
7/27/2020 CCNA Certification Tutorial: Introduction & Basics
The transport layer also referred as Host-to-Host Transport layer. It is responsible for providing the Application layer with
session and datagram communication services.
The main protocols of the Transport layer are User Datagram Protocol (UDP) and the Transmission Control Protocol
(TCP).
TCP is responsible for the sequencing, and acknowledgment of a packet sent. It also does the recovery of packet lost
during transmission. Packet delivery through TCP is more safe and guaranteed. Other protocols that falls in the same
category are FTP, HTTP, SMTP, POP, IMAP, etc.
UDP is used when the amount of data to be transferred is small. It does not guarantee packet delivery. UDP is used
in VoIP, Videoconferencing, Pings, etc.
Network Segmentation
Network segmentation implicates splitting the network into smaller networks. It helps to split the traffic loads and improve
the speed of the Internet.
https://www.guru99.com/introduction-ccna.html 10/25
7/27/2020 CCNA Certification Tutorial: Introduction & Basics
By implementing DMZ (demilitarised zones) and gateways between networks or system with different security
requirements.
By implementing server and domain isolation using Internet Protocol Security (IPsec).
By implementing storage based segmentation and filtering using techniques like LUN (Logical Unit Number)
masking and Encryption.
By implementing DSD evaluated cross-domain solutions where necessary
Improve Security- To protect against malicious cyber attacks that can compromise your network usability. To detect
and respond to an unknown intrusion in the network
Isolate network problem- Provide a quick way to isolate a compromised device from the rest of your network in
case of intrusion.
Reduce Congestion- By segmenting the LAN, the number of hosts per network can be reduced
Extended Network- Routers can be added to extend the network, allowing additional hosts onto the LAN.
VLAN Segmentation:
VLANs enables an administrator to segment networks. Segmentation is done based on the factors such as project team,
function or application, irrespective of the physical location of the user or device. A group of devices connected in a
VLAN act as if they are on their own independent network, even if they share a common infrastructure with other VLANs.
VLAN is used for data-link or internet layer while subnet is used for Network/IP layer. Devices within a VLAN can talk to
each other without a Layer-3 switch or router.
The popular device used for segmenting are a switch, router, bridge, etc.
Subnetting
Subnets are more concerned about IP addresses. Subnetting is primarily a hardware-based, unlike VLAN, which is
software based. A subnet is a group of IP address. It can reach any address without using any routing device if they belong
to the same subnet.
If the receiving and sending devices are connected to the same broadcast domain, data can be exchanged using a switch
and MAC addresses. But if the sending and receiving devices are connected to a different broadcast domain, then the use
of IP addresses and the router is required.
https://www.guru99.com/introduction-ccna.html 11/25
7/27/2020 CCNA Certification Tutorial: Introduction & Basics
Delivering an IP packet within a single LAN segment is simple. Suppose host A wants to send a packet to host B. It first
needs to have an IP address to MAC address mapping for host B. Since at layer 2 packets are sent with MAC address as
the source and destination addresses. If a mapping does not exist, host A will send an ARP Request (broadcast on the LAN
segment) for the MAC address for IP address. Host B will receive the request and respond with an ARP reply indicating
the MAC address.
If a packet is destined for a system on the same local network, which means if the destination node are on the same
network segment of the sending node. The sending node addresses the packet in the following way.
The node number of the destination node is placed in the MAC header destination address field.
The node number of the sending node is placed in the MAC header source address field
The full IPX address of the destination node is placed in the IPX header destination address fields.
The full IPX address of the sending node is placed in the IPX header destination address fields.
For instance, if host A wants to send a packet to host B it will send the packet in this ways
Introduction to CCNA
This packet is then broadcast on the local network. The default gateway router receives the ARP request for MAC
address. It responds back with the Mac address of the default router to Host A.
Now Host A knows the MAC address of the router. It can send an IP packet with a destination address of Host B.
The packet destined for Host B sent by Host A to the default router will have the following information,
Information of a source IP
Information of a destination IP
https://www.guru99.com/introduction-ccna.html 12/25
7/27/2020 CCNA Certification Tutorial: Introduction & Basics
In the case where two nodes residing on different network segments, packet routing will take place in the following ways.
In the first packet, in the MAC header place the destination number "20" from the router and its own source field
"01". For IPX header place the destination number "02", source field as "AA" and 01.
While in the second packet, in the MAC header place the destination number as "02" and source as "21" from the
router. For IPX header place the destination number "02" and source field as "AA" and 01.
Wireless technology was first introduced in the 90's. It is used to connect devices to a LAN. Technically it is referred as
802.11 protocol.
Any components that connect to a WLAN is considered as a station and falls into one of two categories.
Access point (AP): AP transmit and receive radio frequency signals with devices able to receive transmitted signals.
Usually, these devices are routers.
Client: It may comprise a variety of devices like workstations, laptops, IP phones, desktop computers, etc. All work-
stations that are able to connect with each other are known as BSS ( Basic Service Sets).
WLAN adapter
Access point (AP)
Station adapter
WLAN switch
https://www.guru99.com/introduction-ccna.html 13/25
7/27/2020 CCNA Certification Tutorial: Introduction & Basics
WLAN router
Security Server
Cable, connectors and so on.
Types of WLAN
Infrastructure
Peer-to-peer
Bridge
Wireless distributed system
Radio frequencies range from the frequencies used by cell phones to the AM radio band. Radio frequencies are radiated
into the air by antennas that create radio waves.
WLAN Standards
To establish WLAN standards and certifications, several organizations have stepped forward. Organization has set
regulatory agencies to control the use of RF bands. Approval is taken from all the regulatory bodies of WLAN services
before any new transmissions, modulations and frequencies are used or implemented.
While to define the standard for these wireless technologies you have another authority. These include,
ITU (International Telecommunication Union) co-ordinate spectrum allocation and regulations among all of the regulatory
bodies in each country.
A license is not needed to operate wireless equipment on the unlicensed frequency bands. For instance, a 2.4 gigahertz
band is used for wireless LANs but also by Bluetooth devices, microwave ovens, and portable phones.
IEEE 802.11 WLAN uses a media access control protocol called CSMA/CA (Carrier Sense Multiple Access with Collision
Avoidance)
A wireless distribution system allows the wireless interconnection of access points in an IEEE 802.11 network.
The IEEE (Institute of Electrical and Electronic Engineers) 802 Standard comprises a family of networking standards that
cover the physical layer specifications of technologies from Ethernet to wireless. The IEEE 802.11 uses the Ethernet
protocol and CSMA/CA for path sharing.
The IEEE have defined a various specification for WLAN services( as shown in table). For instance, 802.11g applies to
wireless LANs. It is used for transmission over short distances at up to 54-Mbps in the 2.4 GHz bands. Similarly, one can
have an extension to 802.11b that applies to wireless LANS and provides 11 Mbps transmission (with a fallback to 5.5, 2
and 1-Mbps) in the 2.4 GHz band. It uses only DSSS ( Direct Sequence Spread Spectrum).
The below table shows different wi-fi protocols and data rates.
Introduction to CCNA
Wi-Fi Alliance
Wi-Fi alliance ensures interoperability among 802.11 products offered by various vendors by providing certification. The
certification includes all three IEEE 802.11 RF technologies, as well as an early adoption of pending IEEE drafts, such as
the one that addresses security.
WLAN Security
Network security remains an important issue in WLANs. As a precaution, random wireless clients must usually be
prohibited from joining the WLAN.
Unauthorized access
MAC and IP spoofing
Eavesdropping
Session Hijacking
DOS ( denial of service) attack
WEP (Wired Equivalent Privacy): To counter security threats WEP is used. It delivers security to WLAN, by
encrypting the message transmitted over the air. Such that only the receivers having the correct encryption key can
decrypt the information. But it is considered as a weak security standard, and WPA is a better option compared to
this.
WPA/WPA2 ( WI-FI Protected Access): By introducing TKIP ( Temporal Key Integrity Protocol) on wi-fi,
security standard is enhanced further. TKIP is renewed on a regular basis, making it impossible to steal. Also, data
integrity is enhanced through the use of a more robust hashing mechanism.
Wireless Intrusion Prevention Systems / Intrusion Detection Systems: It is a device that monitors the radio
spectrum for the presence of unauthorized access points.
https://www.guru99.com/introduction-ccna.html 15/25
7/27/2020 CCNA Certification Tutorial: Introduction & Basics
AP (Access Points) performs WIPS functions part of the time, by alternating them with its regular network
connectivity functions
The AP (Access Points) has dedicated WIPS functionality built into it. So it can perform WIPS functions and
network connectivity functions all the time
WIPS deployed through dedicated sensors instead of the APs
Implementing WLAN
While implementing a WLAN, access point placement can have more effect on throughput than standards. The efficiency
of a WLAN can be affected by three factors,
Topology
Distance
Access point location.
1. Ad-hoc mode: In this mode, the access point is not required and can be connected directly. This setup is preferable
for a small office (or home office). The only drawback is that the security is weak in such mode.
2. Infrastructure mode: In this mode, the client can be connected through the access point. Infrastructure mode is
categorized in two modes:
Basic Service Set (BSS): BSS provides the basic building block of an 802.11 wireless LAN. A BSS comprises of a
group of computers and one AP (Access Point), which links to a wired LAN. There are two types of BSS,
independent BSS, and Infrastructure BSS. Every BSS has an id called the BSSID.( it is the Mac address of the
access point servicing the BSS).
Extended Service Set (ESS): It is a set of connected BSS. ESS allows users especially mobile users to roam
anywhere within the area covered by multiple AP's (Access Points). Each ESS has an ID known as SSID.
WLAN Topologies
BSA: It is referred to as the physical area of RF (Radio Frequency) coverage provided by an access point in a BSS.
It is dependent on the RF created with variation caused by access point power output, antenna type, and physical
surroundings affecting the RF. Remote devices cannot communicate directly, they can communicate only through
the access point. An AP start transmitting beacons that advertise the characteristics of the BSS, such as modulation
scheme, channel, and protocols supported.
ESA: If a single cell fails in giving enough coverage, any number of cells can be added to extend the coverage. This
is known as ESA.
For remote users to roam without losing RF connections 10 to 15 percent overlap is recommend
For wireless voice network, an overlap of 15 to 20 percent is recommended.
Data Rates: Data rates is how quickly information can be transmitted across electronic devices. It is measured in
Mbps. Data rates shifting can happen on a transmission-by-transmission basis.
Access Point Configuration: Wireless access points can be configured through a command-line-interface or
through a browser GUI. The features of access point usually allow the adjustment of parameters like which radio to
enable, frequencies to offer, and which IEEE standard to use on that RF.
Step 1) Validate pre-existing network and Internet access for the wired hosts, before implementing any wireless network.
Step 2) Implement wireless with a single access point and a single client, without wireless security
Step 3) Verify that the wireless client has received a DHCP IP address. It can connect to the local wired default router and
browse to the external internet.
https://www.guru99.com/introduction-ccna.html 16/25
7/27/2020 CCNA Certification Tutorial: Introduction & Basics
Troubleshooting
WLAN may encounter few configuration problems like
Following are the few troubleshooting steps that may help counter above issues,
A local area network is confined to a smaller area. Using LAN you can inter-connect network-enabled printer, Network
attached storage, Wi-Fi devices with each other.
For connecting network across the different geographical area, you can use WAN (Wide Area Network).
Here we will see how a computer on the different network communicates with each other.
Introduction to Router
A router is an electronic device used to connect network on LAN. It connects at least two networks and forwards packets
among them. According to the information in the packet headers and routing tables, the router connects the network.
It is a primary device required for the operation of the Internet and other complex networks.
Static: Administrator manually set up and configure the routing table to specify each route.
Dynamic: It is capable of discovering routes automatically. They examine information from other routers. Based on
that it makes a packet-by-packet decision on how to send the data across the network.
Binary numbers include numbers 1,1,0,0,1,1. But how this number is used in routing and communicate between networks.
Let start with some basic binary lesson.
In binary arithmetic, every binary value consists of 8 bits, either 1 or 0. If a bit is 1, it is considered "active" and if it is 0, it
is "not active."
You will be familiar with decimals positions like 10, 100, 1000, 10,000 and so on. Which is nothing but just power to 10.
Binary values work in a similar way but instead of base 10, it will use the base to 2. For instance 20 , 21, 22, 23, ….26. The
values for the bits ascends from left to right. For this, you will get values like 1,2,4,….64.
https://www.guru99.com/introduction-ccna.html 17/25
7/27/2020 CCNA Certification Tutorial: Introduction & Basics
Introduction to CCNA
Now since you are familiar with the value of each bit in a byte. The next step is to understand how these numbers are
converted to binary like 01101110 and so on. Each digit "1" in a binary number represents a power of two, and each "0"
represents zero.
Introduction to CCNA
In the table above, you can see that the bits with the value 64, 32, 8, 4 and 2 are turned on and represented as binary 1. So
for the binary values in the table 01101110, we add the numbers
For constructing a network, first, we need to understand how IP address works. An IP address is an Internet protocol. It is
primarily responsible for routing packets across a packet switched network. The IP address is made up of 32 binary bits
that are divisible to a network portion and host portion. The 32 binary bits are broken into four octets (1 octet = 8 bits).
Each octet is converted to decimal and separated by a period (dot).
Network ID- The network ID identifies the network where the computer resides
Host ID- The portion that identifies the computer on that network
Introduction to CCNA
These 32 bits are broken into four octets (1 octet = 8 bits). The value in each octet ranges from 0 to 255 decimal. The right
most bit of octet holds a value of 20 and gradually increases till 27 as shown below.
Introduction to CCNA
For example, we have an IP address 10.10.16.1, then first the address will be broken down into the following octet.
.10
.10
.16
.1
The value in each octet ranges from 0 to 255 decimal. Now, if you convert them into a binary form. It will look something
like this, 00001010.00001010.00010000.00000001.
IP address classes
To communicate over the internet, private ranges of IP addresses are as per below.
Class Categories
For any organization, you might require a small network of several dozen standalone machines. For that, one must require
setting up a network with more than 1000 hosts in several buildings. This arrangement can be made by dividing the
network into subdivision known as Subnets.
Performance can be adversely affected under heavy traffic loads, due to collisions and the resulting retransmissions. For
that subnet masking can be a useful strategy. Applying the subnet mask to an IP address, split IP address into two parts
extended network address and host address.
Subnet mask helps you to pinpoint where the end points on the subnet are if you are provided within that subnet.
Class A- 255.0.0.0
Class B- 255.255.0.0
Class C- 255.255.255.0
Router Security
Secure your router from unauthorized access, tampering, and eavesdropping. For this use technologies like,
https://www.guru99.com/introduction-ccna.html 19/25
7/27/2020 CCNA Certification Tutorial: Introduction & Basics
Route guest user traffic: Route guests user traffic directly to the Internet and backhauling corporate traffic to
headquarters. This way guest traffic won't pose a threat to your corporate environment.
Access to the Public Cloud: Only selected types of traffic can use the local internet path. Various security software
like firewall can give you protection against unauthorized network access.
Full Direct Internet Access: All traffic is routed to the Internet using the local path. It ensures that enterprise-class
is protected from enterprise-class threats.
VPN Solution
VPN solution protects various types of WAN design (public, private, wired, wireless, etc.) and the data they carry. Data
can be divided into two categories
Data at rest
Data at transit
Summary:
Internet local area network is a computer network that interconnects computers within a limited area.
WAN, LAN, and WLAN are the most popular Internet local area networks
As per the OSI reference model, the layer 3, i.e., the Network layer is involved in networking
Layer 3 is responsible for packet forwarding, routing through intermediate routers, recognizing and forwarding local
host domain messages to transport layer (layer 4), etc.
Some of the common devices used for establishing network includes,
NIC
Hubs
Bridges
Switches
Routers
TCP is responsible for breaking data down into small packets before they can be sent on the network.
TCP/IP reference model in the internet layer does two things,
Transmitting data to the Network Interface layers
Routing the data to the correct destinations
Packet delivery through TCP is more safe and guaranteed
UDP is used when the amount of data to be transferred is small. It does not guarantee packet delivery.
Network segmentation implicates splitting the network into smaller networks
VLAN Segmentation
Subnetting
A packet can be delivered in two ways,
A packet destined for a remote system on a different network
A packet destined for a system on the same local network
WLAN is a wireless network communication over short distances using radio or infrared signals
Any components that connect to a WLAN is considered as a station and falls into one of two categories.
Access point (AP)
Client
WLAN use CSMA/CA technology
Technologies used to Secure WLAN
WEP (Wired Equivalent Privacy)
WPA/WPA2 ( WI-FI Protected Access)
Wireless Intrusion Prevention Systems /Intrusion Detection Systems
WLAN can be implemented in two ways
Ad-hoc mode
A router connects at least two networks and forwards packets among them
Routers are categorized into two,
https://www.guru99.com/introduction-ccna.html 20/25
7/27/2020 CCNA Certification Tutorial: Introduction & Basics
Static
Dynamic
An IP address is an Internet protocol primary responsible for routing packets across a packet switched network.
An IP address consists of two segment
Network ID
Host ID
To communicate over an internet private ranges of IP addresses are classified
Secure router from unauthorized access and eavesdropping by using
Branch Threat Defense
VPN with highly secure connectivity
Next
Ethical Hacking
Wireshark is a widely used network monitoring and WiFi troubleshooting tool. However, with...
Read more
Ethical Hacking
Following is a handpicked list of Top Vulnerability Scanning Tools , with its popular features and...
Read more
Ethical Hacking
What is Cybercrime? Cybercrime is defined as an unlawful action against any person using a...
Read more
Ethical Hacking
DoS (Denial of Service) is an attack used to deny legitimate user's access to a resource such as...
https://www.guru99.com/introduction-ccna.html 21/25
7/27/2020 CCNA Certification Tutorial: Introduction & Basics
Read more
Ethical Hacking
Below is a curated list of Bounty Programs by reputable companies 1) Intel Intel's bounty program...
Read more
Ethical Hacking
Mobile Spy Apps or Spyware Apps are smartphone surveillance software. These types of apps help you to...
Read more
CCNA Tutorial
https://www.guru99.com/introduction-ccna.html 22/25
7/27/2020 CCNA Certification Tutorial: Introduction & Basics
Scholarships for
all students
Top Tutorials
About
About Us
Advertise with Us
Write For Us
Contact Us
Career Suggestion
SAP Career Suggestion Tool
Software Testing as a Career
TestProject
https://www.guru99.com/introduction-ccna.html 23/25
7/27/2020 CCNA Certification Tutorial: Introduction & Basics
Testing
Hacking
Interesting
eBook
Blog
Quiz
SAP eBook
SAP
Java
Python
Execute online
Execute Java Online
Execute Javascript
Execute HTML
Execute Python
https://www.guru99.com/introduction-ccna.html 24/25
7/27/2020 CCNA Certification Tutorial: Introduction & Basics
Jmeter
Informatica
JIRA
https://www.guru99.com/introduction-ccna.html 25/25