CCNA
CCNA
1|Page
Networking basics
TCP/IP Model:
The TCP/IP model is a simplified framework used in modern networking, consisting of four
layers. It is closely related to the OSI model but is more practical for real-world
implementation.
1. Application Layer:
• Combines the OSI Application, Presentation, and Session layers.
• Key Protocols: HTTP, FTP, DNS, SMTP.
2. Transport Layer:
• Corresponds to the OSI Transport Layer.
• Key Protocols: TCP (reliable) and UDP (unreliable).
• Key Functions: End-to-end data delivery, flow control, and error correction.
3. Internet Layer:
• Corresponds to the OSI Network Layer.
• Key Protocols: IP, ARP, ICMP.
• Key Functions: Routing, logical addressing, packet forwarding.
4. Network Access Layer:
• Combines the OSI Data Link and Physical layers.
• Key Functions: Physical transmission of data, error detection, and MAC addressing.
Summary:
• OSI Model: 7 layers, each performing specific functions for network
communication.
• TCP/IP Model: 4 layers, more practical for real-world applications, focusing on core
networking functions.
TCP/IP OSI Data name at every layer
Application Layer "Data"
Application Layer Presentation Layer "Data"
Session Layer "Data"
Transport Layer Transport Layer "Segment"
Internet Layer Network Layer "Packet"
Data Link Layer "Frame"
Network Access Layer
Physical Layer "bit"
2|Page
Networking basics
3|Page
Networking basics
Conclusion:
• TCP is used when data integrity and order are critical, providing reliable,
connection-oriented communication.
• UDP is preferred for applications where speed is more important, offering fast but
unreliable, connectionless communication.
4|Page
Networking basics
What is DNS?
The Domain Name System (DNS) is a hierarchical and distributed naming system that
translates human-readable domain names (like hotmail.com) into numerical IP
addresses that computers use to identify each other on the network
This process allows users to access websites using familiar names rather than complex
IP addresses.
What is PING?
PING is a network utility that uses the Internet Control Message Protocol (ICMP) to test
the reachability of a host on an IP network.
It sends an echo request packet to the target host and waits for an echo reply,
measuring the time it takes for the round trip.
This helps determine the latency and availability of the host.
What is Routing?
Routing is the process of determining the best path to forward packets between different
networks that are not locally attached. It involves making decisions on how to forward
packets toward their destination based on routing tables and network topology.
What is a Router?
A router is a Layer 3 (Network Layer) device that forwards data packets between
different logical networks. It enables communication between two or more networks and
determines the best path for data transmission based on the destination IP address.
What is a Protocol?
A protocol is a set of rules and procedures that define how data is transmitted and
received across a network. It governs communication between devices, ensuring proper
data exchange. Examples include TCP, UDP, HTTP, and ICMP.
6|Page
Networking basics
DORA Process:
1. Discover: The client device, when connecting to the network, broadcasts a DHCP
Discover message. This message is sent to all DHCP servers on the network, searching
for available IP addresses.
2. Offer: A DHCP server responds with a DHCP Offer message, offering an available IP
address to client. message is sent directly (unicast) to the client that requested the IP.
3. Request: The client, upon receiving an offer, sends a DHCP Request message to the
server to formally accept the offered IP address.
4. Acknowledge: Finally, the DHCP server responds with a DHCP Acknowledge message,
confirming that the IP address has been assigned to the client. At this point, the client
can start using the assigned IP address to communicate on the network.
7|Page
Networking basics
8|Page
Networking basics
9|Page
Networking basics
What is CRC?
CRC (Cyclic Redundancy Check) is a robust error detection technique based on binary
division. A calculated remainder is appended to the data before transmission. The receiver
performs the same calculation to detect any discrepancies, ensuring the data integrity. If
the calculated value at the receiver matches, the data is deemed error-free.
10 | P a g e
Networking basics
11 | P a g e
Networking basics
5. Tree Topology:
• A combination of star and bus topologies. Smaller star networks are connected
via a central bus.
• Pros: Scalable and easy to manage. Faults in star nodes do not affect the entire
network.
• Cons: If the main bus fails, all connected segments are impacted.
• Use case: Large networks requiring hierarchical structuring, such as in schools
or university campuses.
6. Hybrid Topology:
• Combines multiple topologies (e.g., star-bus or star-ring) to create a more
flexible and scalable network.
• Pros: Can be customized to suit specific network needs, utilizing the strengths
of various topologies while avoiding their weaknesses.
• Cons: Can be complex and expensive to design, implement, and maintain.
• Use case: Large, complex networks that need to meet diverse requirements, like
corporate and industrial networks.
12 | P a g e
Networking basics
13 | P a g e
Networking basics
What is a firewall?
A Firewall is a network security device that filters traffic between trusted (internal) and
untrusted (external) networks. It permits or denies traffic based on predefined security
rules and policies. Firewalls help protect networks from unauthorized access, external
attacks, and malware.
Functions of a Firewall:
1. Traffic Filtering: Only allows legitimate traffic based on configured policies.
2. Network Segmentation: Can isolate certain parts of the network (e.g.,
management network from the user network).
3. Protection: Shields the internal network from external threats.
Example:
A firewall can be configured to block unauthorized access from the internet while allowing
trusted services like web browsing or email.
14 | P a g e
Networking basics
• Tagged and untagged traffic: Supports both tagged VLAN frames and untagged (native
VLAN) frames.
• Inter-switch communication: used to connect switches to other switches or routers.
What is NAT (Network Address Translation)?
NAT (Network Address Translation) is a protocol that allows devices in a private network
to access external networks (e.g., the internet) by converting private IP addresses to public
(real) IP addresses. NAT helps conserve public IP addresses and adds a layer of security by
masking internal IP addresses.
Types of NAT:
1. Static NAT: Maps one private IP address to one public IP address.
2. Dynamic NAT: Maps multiple private IP addresses to a pool of public IP addresses.
3. PAT (Port Address Translation): Maps multiple private IP addresses to a single
public IP address by using different ports (also called NAT overload).
What is PAT (Port Address Translation)?
PAT (Port Address Translation) is a type of NAT that allows multiple devices on a local area
network (LAN) to be mapped to a single public IP address by using unique port numbers.
This enables multiple devices to share one public IP for internet access.
Key points:
• Converts multiple private IPs to one public IP.
• Uses port numbers to differentiate between devices.
• Commonly used in home and office networks to conserve public IP addresses.
What is telnet?
Telnet is a network protocol used to remotely access and manage devices over a TCP/IP
network. It operates on port 23. Telnet allows an administrator to log into a device and
issue commands, but it transmits data in plain text, making it insecure.
Key points:
• Uses TCP on port 23.
• Insecure: Sends data, including credentials, in plain text.
What is SSH?
SSH (Secure Shell) is a protocol used to securely access and manage devices remotely
over a TCP/IP network. SSH encrypts data and protects against attacks like IP spoofing,
DNS spoofing, and IP source routing. It operates on port 22 and is commonly used for
secure remote administration.
Key points:
• Uses TCP on port 22.
• Secure: Provides encrypted communication and protects against various network attacks.
• Replacement for Telnet: SSH is preferred over Telnet due to its encryption and security.
15 | P a g e