Networking 101
Networking 101
Network+ Guide
to Networks,
Ninth Edition
Module 1: Introduction to
Networking
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not
be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Icebreaker: Interview Simulation
1. The class will be broken up into pairs of students.
2. Each pair of students will interview each other to discover interesting or
unusual facts.
3. Then each pair will introduce each other to the class.
4. Think about connecting a story from your personal experience to topics that
are relevant to this course.
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Module Objectives
By the end of this module, you should be able to:
3. Describe various networking hardware devices and the most common physical topologies
5. Explain best practices for safety when working with networks and computers
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Models
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Peer-to-Peer Network Model (1 of 2)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Peer-to-Peer Network Model (2 of 2)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Client-Server Network Model (1 of 3)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Client-Server Network Model (2 of 3)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Client-Server Network Model (3 of 3)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Client-Server Applications (1 of 2)
• Network services are the resources a network makes available to its users
• It includes applications and the data provided by these applications
• In client-server applications:
• A client computer requests data or a service from a second computer, called the server
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Client-Server Applications (2 of 2)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Services and Their Protocols (1 of 2)
• Protocols are methods and rules for communication between networked devices
• Two primary network protocols:
• TCP (Transmission Control Protocol)
• IP (Internet Protocol)
• Popular client-server applications include:
• Web service
• Email services
• DNS service
• FTP service
• Database services
• Remote access service
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Services and Their Protocols (2 of 2)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 1-1
Which of these protocols could not be used to access a server in a nearby
building?
a. Telnet
b. RDP
c. TLS
d. SSH
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 1-1: Answer
Which of these protocols could not be used to access a server in a nearby
building?
Answer: c. TLS
TLS (Transport Layer Security) adds encryption to other protocols, such
as HTTP, but does not provide remote access to a computer
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Hardware
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
LANs and Their Hardware (1 of 4)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
LANs and Their Hardware (2 of 4)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
LANs and Their Hardware (3 of 4)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
LANs and Their Hardware (4 of 4)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
MANs and WANs (1 of 2)
• A WAN (wide area network) is a group of LANs that spread over a wide geographical area
• A MAN (metropolitan area network) is a group of connected LANs in the same
geographical area
• Also known as a campus area network (CAN)
• MANs and WANs often use different transmission methods and media than LANs
• PAN (personal area network) is a much smaller network of personal devices
• A network of personal devices such as your smartphone and your computer
• Other network types:
• BAN (body area network)
• SAN (storage area network)
• WLAN (wireless local area network)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
MANs and WANs (2 of 2)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
The Seven-Layer OSI Model (1 of 2)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
The Seven-Layer OSI Model (2 of 2)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Layer 7: Application Layer
• The application layer describes the interface between two applications, on separate
computers
• Application layer protocols are used by programs that fall into two categories:
• Provide services to a user, such as a browser and Web server
• Utility programs that provide services to the system, such as SNMP (Simple Network
Management Protocol) programs that monitor and gather information about network
traffic
• Payload is the data that is passed between applications or utility programs and the OS
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Layer 6: Presentation Layer
• The presentation layer is responsible for reformatting, compressing, and/or encrypting data
in a way that the receiving application can read
• Example:
• An email message can be encrypted at the Presentation layer by the email client or by
the OS
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Layer 5: Session Layer
• The session layer describes how data between applications is synched and recovered if
messages don’t arrive intact at the receiving application
• The application, presentation, and session layers are intertwined
• It is often difficult to distinguish between them
• Most tasks are performed by the OS when an application makes an API call to the OS
• An API (application programming interface) call is the method an application uses when it
makes a request of the OS
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Layer 4: Transport Layer
• The transport layer is responsible for transporting Application layer payloads from one
application to another
• Two main Transport layer protocols are:
• TCP (Transmission Control Protocol) - makes a connection with the end host, checks
whether data was received; called a connection-oriented protocol
• UDP (User Datagram Protocol) - does not guarantee delivery by first connecting and
checking whether data is received; called a connectionless protocol
• Protocols add control information in an area at the beginning of the payload (called header)
• Encapsulation is the process of adding a header to the data inherited from the layer above
• The Transport layer header addresses the receiving application by a number called a port
• If a message is too large, TCP divides it into smaller messages called segments
• In UDP, the message is called a datagram
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Layer 3: Network Layer
• The network layer is responsible for moving messages from one node to another until they
reach the destination host
• The principal protocol used by this layer is IP (Internet Protocol)
• IP adds its own network layer header to the segment or datagram
• The entire network layer message is called a packet
• An IP address is an address assigned to each node on a network
• The network layer uses it to uniquely identify each host
• IP relies on several routing protocols to find the best route for a packet to take to reach
destination
• ICMP and ARP are examples
• Network layer protocol will divide large packets into smaller packets in a process called
fragmentation
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Layer 2: Data Link Layer
• Layers 2 and 1 are responsible for interfacing with physical hardware on the local network
• Protocols at these layers are programmed into firmware of a computer’s NIC and other
hardware
• Type of networking hardware or technology used on a network determine the data link layer
protocol used
• Ethernet and Wi-Fi are examples
• The data link layer puts control information in a data link layer header and at the end of the
packet in a trailer
• The entire data link layer message is called a frame
• A MAC (Media Access Control) address is also called a physical address, hardware
address, or data link layer address
• It is embedded on every network adapter
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Layer 1: Physical Layer
• The physical layer is responsible for sending bits via a wired or wireless transmission
• Bits can be transmitted as:
• Wavelengths in the air
• Voltage on a copper wire
• Light (via fiber-optic cabling)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Protocol Data Unit or PDU
• Protocol data unit (PDU) is the technical name for a group of bits as it moves from one layer
to the next and from one LAN to the next
• Technicians loosely call this group of bits a message or a transmission
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Summary of How the Layers Work Together
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 1-2
Which OSI layer adds both a header and a trailer?
a. Transport layer
b. Network layer
c. Data link layer
d. Physical layer
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 1-2: Answer
Which OSI layer adds both a header and a trailer?
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Safety Procedures and Policies
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Emergency Procedures
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Safety Procedures (1 of 4)
• Electrical and tool safety is generally regulated by OSHA (Occupational Safety and Health
Administration)
• OSHA guidelines when using power tools:
• Wear PPE (personal protective equipment)
• Keep all tools in good condition and properly store tools not in use
• Use the right tool for the job and operate the tool according to the manufacturer’s
instructions
• Watch out for trip hazards, so you and others don’t stumble on a tool or cord
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Safety Procedures (2 of 4)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Safety Procedures (3 of 4)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Safety Procedures (4 of 4)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Troubleshooting Network Problems
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Self-Assessment
What networking hardware devices have you used in the past?
What type of network or computer safety issues have you (or a friend or
another student) experienced? How did you troubleshoot those issues?
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Summary
Now that the lesson has ended, you should be able to:
• Distinguish between peer-to-peer and client-server networks
• Identify types of applications and protocols used on a network
• Describe various networking hardware devices and the most common
physical topologies
• Describe the seven layers of the OSI model
• Explain best practices for safety when working with networks and computers
• Describe the seven-step troubleshooting model for troubleshooting network
problems
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.