INFOT 3 Module 1 5 Complete
INFOT 3 Module 1 5 Complete
Imagine a network as a highway system. Cars (devices) travel on roads (network cables) to
reach different destinations (other devices). Traffic lights (routers) direct the flow of cars,
ensuring smooth communication.
Benefits of Networks:
Assignment:
Individually, search for and report on 5 most important historical trivia about networking
that were not discussed in this module. Avoid duplicating information with other students as
this will be presented during recitation. Write it in a 1 whole yellow pad paper.
Example:
Trivia: The first email was sent by Ray Tomlinson in 1971, choosing the '@' symbol to
denote a user's location in a specific machine.
The TCP/IP model, commonly used in the internet, has a four-layer structure:
1. Network Access Layer: Combines the functionalities of the OSI's Physical and Data
Link layers, handling physical transmission and addressing.
2. Internet Layer: Similar to the OSI's Network Layer, it routes data packets across
networks using IP addresses.
3. Transport Layer: Similar to the OSI's Transport Layer, it ensures reliable data delivery
and manages flow control, but uses protocols like TCP and UDP.
4. Application Layer: Similar to the OSI's Application Layer, it provides services to
applications like email, web browsing, and file sharing.
While the OSI model is intricate and conceptual, the TCP/IP model's simplicity has led to its
extensive adoption, making it the standard for modern networking. The choice between them
hinges on specific needs and practical considerations, showcasing the balance between
theoretical understanding and practical implementation.
• Key Features:
o Covers a small geographical area (e.g., office,
school, home)
o Offers high speeds and low latency (delay)
o Enables easy sharing of resources like printers
and files
o Requires separate internet access for each LAN
• Key Features:
o Covers a wide geographical area (e.g., state,
country, globe)
o Connects users and resources geographically dispersed
o Enables remote access to resources
o May have lower speeds and higher latency compared to LANs
o Requires specialized equipment and connections
• Key Features:
• Personal Area Network (PAN): A Personal Area Network (PAN) is a network that connects
personal devices like smartphones, headsets, and fitness trackers within close proximity,
typically using wireless technologies like Bluetooth. PANs enable communication and data
sharing among personal devices.
Connects personal devices like smartphones, headsets, and fitness trackers within close
proximity using technologies like Bluetooth.
• Virtual Private Network (VPN): A Virtual Private Network (VPN) is a secure network that
creates a private and encrypted communication tunnel over a public network, often the
internet. VPNs allow remote devices to connect securely, ensuring the confidentiality and
integrity of data during transmission.
Creates a secure tunnel over a public network like the internet, allowing remote devices to
connect securely.
• Storage Area Network (SAN): A Storage Area Network (SAN) is a high-speed network
dedicated to connecting storage devices for centralized data access. SANs are commonly
used in data centers to provide efficient and reliable storage solutions, facilitating the sharing
and management of large volumes of data.
High-speed network dedicated to connecting storage devices for centralized data access,
typically used in data centers.
1.4.1 Routers:
• Routers are used in homes, businesses, and internet service providers (ISPs).
• Routers analyze the network landscape, considering factors like traffic congestion and
distance, to determine the most efficient route for each packet to reach its intended
destination.
• Routers are essential whenever you need to connect to the internet, manage multiple
networks (like having a separate network for guests), or establish secure connections
between different network segments.
1.4.2 Switches:
• Switches are commonly used in LANs within homes, offices, and data centers.
• Switches forward data only to the specific device it's intended for, reducing network
congestion and enhancing performance.
• Switches are ideal when you have multiple devices within a network that need to
communicate frequently and efficiently, like computers, printers, and servers in an office
setting.
Real-World Scenario: In an office network, a switch connects computers, printers, and other
devices. When one computer sends data to another, the switch ensures that the data reaches
its intended destination directly, improving network speed.
1.4.3 Firewalls:
• Firewalls are crucial in homes, businesses, and data centers to protect against
unauthorized access.
• They inspect and filter data packets, blocking or allowing traffic based on security
policies.
• Firewalls are used continuously to safeguard networks from cyber threats.
Real-World Scenario: In a corporate environment, a firewall protects the internal network from
external threats. It examines incoming and outgoing data, preventing unauthorized access and
ensuring the security of sensitive information.
1.4.4 Hubs:
Real-World Scenario: In a small home network, a hub might have been used in the past to
connect a few computers. However, due to their limitations, switches are now preferred for
better performance and security.
• Modems: Convert digital data from a computer into a form suitable for transmission over
telephone or cable lines.
• Access Points: Facilitate wireless communication, allowing devices to connect to a
wired network using Wi-Fi.
• Bridge: Connects two or more network segments and operates at the data link layer,
reducing overall network traffic.
• Repeater: Extends the range of a network by amplifying and retransmitting signals.
Ranking of Devices:
• Smartest Device: Routers are typically considered the smartest among the three. They
make intelligent decisions about the best paths for data, ensuring efficient and secure
communication between networks.
• Intermediate Device: Switches are intermediate devices, facilitating efficient
communication within a single network but without the decision-making complexity of
routers.
• Basic Device: Hubs are considered the most basic among the mentioned devices,
broadcasting data without the ability to make intelligent forwarding decisions. They are
rarely used in modern networks.
This module delves into the world of network media and connectivity, exploring both
wired and wireless technologies that enable devices to communicate and share
information. Understanding these technologies is crucial for anyone involved in setting
up, managing, or troubleshooting networks.
Wired networks transmit data over physical cables, offering reliable and secure
connections. Let's explore some common types:
o Uses thin glass or plastic fibers to transmit light pulses, offering the fastest
speeds and longest distances.
o Immune to electromagnetic interference and ideal for high-bandwidth
applications.
o More expensive than copper cables but becoming increasingly popular.
• Cabling Standards:
Several industry standards define the specifications and performance
characteristics of network cables. Knowing these standards is essential for
ensuring compatibility and reliability. Here are some key standards:
Wireless networks transmit data using radio waves or infrared waves, providing mobility
and flexibility. Here are some key technologies:
• Wi-Fi:
o Most popular wireless networking technology, operating in the 2.4 GHz and 5
GHz bands.
o Offers varying speeds and ranges depending on the standard (802.11n,
802.11ac, etc.).
o Commonly used for home, office, and public Wi-Fi hotspots.
• Bluetooth:
o Short-range wireless technology for connecting devices like smartphones,
headphones, and printers.
o Uses lower power consumption than Wi-Fi and suitable for data transfer and
peripheral connections.
• Cellular Networks:
o Mobile network technology used by smartphones and other devices for internet
access on the go.
o Offers varying speeds and coverage depending on the generation (3G, 4G, 5G).
o Requires a subscription to a mobile service provider.
The choice between wired and wireless depends on several factors, including:
Network Security:
Securing both wired and wireless networks is crucial to protect against unauthorized
access, data breaches, and other threats.
Data doesn't travel through cables or airwaves on its own. Network devices play a
crucial role in connecting devices, managing data flow, and ensuring smooth
communication. Some key devices include:
• Network Interface Cards (NICs): Installed in devices like computers and laptops, NICs
enable them to connect to the network.
• Switches and Routers: Forward data packets between devices and networks, directing
them to the correct destination.
• Access Points (APs): Create wireless networks by broadcasting Wi-Fi signals.
Remember, this module provides a basic overview. As you delve deeper into the world
of networking, you'll discover a vast and exciting field with endless possibilities.
Now that we've explored the different types of network media, let's delve deeper into
how these devices are interconnected. Network topologies describe the physical or
logical arrangement of devices and connections within a network. Understanding these
topologies is crucial for designing, implementing, and troubleshooting efficient network
systems.
Several network topologies exist, each with its own unique characteristics:
• Bus Topology:
o All devices are connected to a single shared cable, similar to a daisy chain.
o Simple to set up and cost-effective for small networks.
o Failure of one device or cable can disrupt the entire network.
o Not suitable for large networks or high-traffic environments.
• Star Topology:
o Each device is connected to a central hub or switch, creating a star-like pattern.
o Easy to manage and troubleshoot, as each device has its own dedicated
connection.
o Failure of the central device can bring down the entire network.
o Requires more cabling than bus topology.
• Mesh Topology:
o Devices are interconnected with multiple pathways, creating a web-like structure.
o Highly reliable and fault-tolerant, as data can take alternate routes if one path
fails.
o Complex to design and manage due to the numerous connections.
o More expensive to implement than other topologies.
• Tree Topology:
o Combines elements of bus and star topologies, with central hubs or switches
connected in a hierarchical structure.
o Offers scalability and flexibility, allowing for expansion and growth.
o Increased complexity compared to simpler topologies.
• Hybrid Topology:
o Combines multiple topologies to suit
specific network needs.
o Offers flexibility and customization
to address unique requirements.
o Increased complexity in design and
management.
o Requires careful planning and
implementation.
The best topology for your network depends on several factors, including:
• Size and complexity of the network: Larger networks may benefit from more scalable
topologies like tree or mesh.
• Performance requirements: High-traffic environments may require topologies that
minimize congestion, like star or mesh.
Conclusion:
Understanding network topologies is essential for designing and managing efficient and
effective networks. By carefully considering the advantages, disadvantages, and
specific requirements of your network, you can choose the topology that best suits your
needs.
• Ethernet Adapter:
o Most commonly used for wired connections,
utilizing Ethernet cables and ports.
o Offers high speeds and reliable performance
for desktops, laptops, and network devices.
• Wireless Adapter:
o Enables wireless connections to Wi-Fi
networks, using radio waves for data
transmission.
o Provides mobility and flexibility for laptops,
tablets, and smartphones.
• Powerline Adapter:
o Uses existing electrical wiring in a building to
transmit network data.
o Useful for connecting devices in areas with
limited cable access or Wi-Fi coverage.
• Hardware Issues:
o Faulty network adapters, cables, or network devices can cause connection
problems.
o Check for physical damage, loose connections, or outdated drivers.
• Software Issues:
o Incorrect network configurations, outdated drivers, or software conflicts can
interfere with connectivity.
o Verify settings, update drivers, and troubleshoot software conflicts.
• Network Issues:
o Problems with your router, internet service provider (ISP), or network
infrastructure can disrupt connections.
o Contact your ISP or network administrator for assistance.
• Update Drivers:
o Regularly update network adapter drivers to ensure compatibility and security.
• Secure Your Network:
o Use strong passwords, enable encryption, and implement security measures to
protect your network.
• Monitor Performance:
o Regularly check network performance and troubleshoot potential issues
proactively.
• Invest in Quality Hardware:
o Use reliable network adapters, cables, and routers to minimize hardware-related
problems.
• Plan for Expansion:
o Choose network solutions that can adapt to future growth and changing needs.
Conclusion:
Overview of IP Addressing:
Every device connected to a network, whether it's a computer, smartphone, or server, requires
an IP address to communicate with other devices. IP addressing provides a standardized way to
identify each device within a network and across the internet.
2. IPv6 Addressing: IPv6 (Internet Protocol version 6) addresses are 128-bit addresses
represented in hexadecimal notation (e.g.,2001:0db8:85a3:0000:0000:8a2e:0370:7334).
IPv6 was developed to address the limitations of IPv4 and provide an exponentially
larger address space, accommodating the increasing number of devices connected to
the internet.
1. Public IP Addresses:
• Public IP addresses are globally unique and routable on the internet.
• They are assigned to devices directly connected to the internet, such as routers,
servers, and public-facing devices.
• Public IP addresses are allocated by Internet Service Providers (ISPs) and are
registered in public IP address registries.
• Example: When you access a website from your home computer, your computer
uses a public IP address assigned by your ISP to communicate with the
website's server.
2. Private IP Addresses:
• Private IP addresses are used for internal networks, such as home or office
networks.
• They are not routable on the internet and are meant for private use within a local
network.
• Private IP addresses are defined in specific ranges reserved for private networks,
as specified in RFC 1918.
• Examples of private IP address ranges include:
• 10.0.0.0 to 10.255.255.255 (Class A)
• 172.16.0.0 to 172.31.255.255 (Class B)
• 192.168.0.0 to 192.168.255.255 (Class C)
• Private IP addresses enable devices within a local network to communicate with
each other without directly accessing the internet.
Classful Addressing:
Classful addressing was the original method for assigning IP addresses and dividing the IPv4
address space into distinct classes: A, B, and C. Each class had predefined ranges of IP
addresses and subnet masks:
1. Class A Addresses:
• Class A addresses start with a binary 0 as their first bit.
• They have a default subnet mask of 255.0.0.0 (/8).
• Class A addresses allocate the first octet for network identification and the
remaining three octets for host addresses (N.H.H.H).
• Range: 1.0.0.0 to 127.255.255.255 or 1-127.
2. Class B Addresses:
• Class B addresses start with binary 10 as their first two bits.
• They have a default subnet mask of 255.255.0.0 (/16).
• Class B addresses allocate the first two octets for network identification and the
remaining two octets for host addresses (N.N.H.H).
• Range: 128.0.0.0 to 191.255.255.255 or 128-191
3. Class C Addresses:
• Class C addresses start with binary 110 as their first three bits.
• They have a default subnet mask of 255.255.255.0 (/24).
• Class C addresses allocate the first three octets for network identification and the
remaining octet for host addresses (N.N.N.H).
• Range: 192.0.0.0 to 223.255.255.255 or 192-223
Classful addressing was rigid and led to inefficient use of IP address space, especially for
organizations that required varying numbers of hosts per network. This led to the development
of classless addressing.
In CIDR notation, the subnet mask is represented by a slash followed by the number of bits set
to 1 in the subnet mask. For example:
• /8 represents a subnet mask of 255.0.0.0
• /16 represents a subnet mask of 255.255.0.0
• /24 represents a subnet mask of 255.255.255.0
CIDR allows for the allocation of variable-sized subnets, enabling more efficient use of IP
address space and addressing the limitations of classful addressing.
1. Flexibility:
• Classful addressing has fixed boundaries for network classes (A, B, C), while
classless addressing allows for variable-sized subnets.
2. Efficiency:
• Classless addressing is more efficient in allocating IP addresses, as it eliminates
the need to adhere to fixed class boundaries.
3. CIDR Notation:
• CIDR notation is used in classless addressing to represent subnet masks and
network prefixes, providing a concise way to specify network addresses and their
sizes.
Conclusion:
Understanding the differences between classful and classless addressing is essential for
designing and managing modern IP networks. Classless addressing, with its flexibility and
efficiency, has largely replaced classful addressing in contemporary network implementations.
Key Takeaways:
• Classful addressing divides the IPv4 address space into fixed classes (A, B, C).
• Classless addressing (CIDR) allows for variable-sized subnets and more efficient use of
IP address space.
• CIDR notation represents subnet masks and network prefixes using a slash followed by
the number of bits.
1. Network Portion:
• The network portion of an IP address identifies the network to which the device
belongs.
• It specifies the network address and remains constant for all devices within the
same subnet.
• Subnetting involves dividing the network portion into smaller subnetworks, each
with its own subnet address.
2. Host Portion:
• The host portion of an IP address identifies the specific device within the
network.
• It varies for each device within the same subnet.
• Subnetting allows for efficient allocation of host addresses within each subnet,
reducing IP address wastage and optimizing address utilization.
Conclusion:
Subnetting is a fundamental concept in IP networking, essential for optimizing network
performance, enhancing security, and efficiently managing network resources. Understanding
subnetting basics is crucial for network administrators and engineers in designing and
maintaining robust and scalable networks.
Key Takeaways:
• Subnetting divides a large network into smaller subnetworks, known as subnets.
• IP addresses consist of a network portion and a host portion.
• Subnetting advantages include improved network performance, enhanced security,
efficient resource management, scalability, and departmental segmentation.
• Understanding subnetting basics is essential for network optimization and effective
network management.
Plotting Steps:
1. Write the network address and turn each zero into 8 bits.
2. Write binary values above zeros from right to left, starting with 1 and doubling the
number.
3. Write the number of subnets from left to right, starting with 2 doubling the
number.
4. Write the number of hosts from right to left, starting with 2 and doubling the
number.
5. Identify the partition line based on needed subnets or hosts.
6. Sum the binary values within the partition line to get the custom subnet mask.
Step 10: Find the Subnet Broadcast Address for the nth Subnet
The last IP address in the range is the subnet broadcast address. For example, if the
nth subnet is the 1st, the broadcast address is 192.10.10.15.
Step 11: Find the Assignable/Usable Addresses for the nth Subnet
Remove the subnet number and broadcast address from the range to find the
assignable addresses. For instance, if the nth subnet is the 1st, the assignable
addresses range from 192.10.10.1 to 192.10.10.14.
The TCP/IP protocol suite is a collection of interconnected protocols that define how
data is formatted, addressed, transmitted, and received across internetworks. It
operates in a layered approach, ensuring clear division of responsibilities for efficient
data transfer.
The TCP/IP model, also known as the OSI model (Open Systems Interconnection
model) with a different naming convention, visualizes the layered approach of the
TCP/IP protocol suite. Each layer performs specific tasks, working together to ensure
successful data transmission.
Takeaway: The TCP/IP model provides a clear understanding of how data travels
through different stages of network communication.
• Application Layer: This layer interacts directly with applications like web
browsers, email clients, and video conferencing tools. It focuses on user
experience and provides services like file transfer and remote access.
• Transport Layer: Here, data is segmented into manageable packets and
protocols like TCP (Transmission Control Protocol) and UDP (User Datagram
Protocol) ensure reliable or connectionless data delivery, respectively.
• Internet Layer: Routing protocols operate at this layer, determining the most
efficient path for data packets to reach their destination across networks. The
internet protocol (IP) plays a crucial role in addressing and routing data packets.
• Link Layer: This layer manages physical data transmission on the network
media (cables or wireless signals). It ensures error-free transmission between
devices on the same network segment.
Takeaway: Each layer of the TCP/IP model plays a specific role in ensuring data
reaches its destination efficiently and reliably.
Here's a table summarizing the key functions and responsibilities of each layer:
Provides network
Defines protocols for file transfer, email, web
Application services to
browsing, etc.
applications
Segments data, manages error checking and
Ensures reliable data
Transport flow control (TCP), provides connectionless data
delivery
transfer (UDP)
Routes data packets Assigns IP addresses, determines the best path
Internet
across networks for data packets
Network Manages physical Ensures error-free transmission on the network
Access data transmission media (cables or wireless)
Real-World Scenario:
Imagine you're browsing the web. When you enter a website address, it triggers a series
of actions across the TCP/IP layers:
The web server responds with data packets following the same process in reverse
order, allowing you to see the requested webpage.
Takeaway: Understanding the TCP/IP protocol suite helps visualize the complex
process of data communication happening behind the scenes whenever you use the
internet.
Imagine you're in video conferencing with a colleague. Here's how different protocols
work together:
These protocols work in concert, enabling real-time communication and data exchange
during your video conference.
Takeaway: By understanding how protocols interact, you gain a deeper appreciation for
the intricate collaboration that underpins various network applications.
Here, we'll delve into some common network services categorized by their function.
Configuring and managing network services involve setting up and maintaining these
services to function optimally. This might include:
Real-World Scenario:
Imagine working on a team project with colleagues. You might utilize various network
services:
• A cloud storage service that leverages file sharing protocols (e.g., SMB or NFS)
allows team members to collaboratively access and edit project files.
• Web browsing protocols (HTTP/HTTPS) enable communication and information
gathering through online resources.
• Email protocols (SMTP, IMAP) facilitate communication and exchange of project
updates among team members.
Real-World Scenario:
Takeaway: DoS attacks can cause significant downtime and financial losses.
Implementing robust network security measures can help mitigate these risks.
While malware and phishing attacks are prevalent, a cunning cybercriminal has a vast
arsenal at their disposal. Here's a closer look at some other network threats you should
be aware of:
Network infrastructure components can have vulnerabilities that attackers can exploit.
Here are some common examples:
Network protocols can also have vulnerabilities. Here are some common examples:
• Design flaws: Some protocols may have inherent design flaws that can be
exploited by attackers.
• Implementation bugs: Bugs in the implementation of a protocol can create
vulnerabilities.
• Man-in-the-middle attacks: These attacks exploit weaknesses in protocols to
intercept data transmissions.
In 2014, a major retail chain suffered a massive data breach that exposed the personal
information of millions of customers. Attackers were able to exploit vulnerabilities in the
retailer's point-of-sale systems to gain access to customer credit card data. This breach
highlights the importance of securing network infrastructure and protocols.
Takeaways
• Network infrastructure and protocols can have vulnerabilities that attackers can
exploit.
• It is important to keep network devices up-to-date with the latest firmware
patches.
• Strong physical security measures are essential to protect network devices from
unauthorized access.
Conclusion
Additional Tips
By following these tips, you can help to keep your networks safe and secure.
Real-World Scenario:
A small business has a network with customer data, financial information, and
intellectual property. Without a firewall, hackers could easily exploit vulnerabilities in the
network and steal this sensitive data. A properly configured firewall can significantly
reduce this risk by blocking unauthorized access attempts and preventing malware from
entering the network.
Takeaways:
There are three main types of firewalls, each with its own strengths and weaknesses:
Real-World Scenario:
Takeaways:
• The type of firewall you choose depends on your specific security needs and
network complexity.
• Packet-filtering firewalls offer basic protection.
• Stateful inspection firewalls provide more advanced security by analyzing the
state of network connections.
• ALGs allow for granular control over application-specific traffic.
Access Control Lists (ACLs) are sets of rules that define which traffic is allowed or
denied access to a network resource. They are typically used in conjunction with
firewalls to specify which devices, users, or applications can access certain network
resources (e.g., servers, databases).
ACLs are implemented by firewalls and other network devices, and they typically
include rules that specify:
A network administrator wants to restrict access to a web server that contains sensitive
financial data. They can configure an ACL on the firewall that only allows access from
authorized IP addresses within the company network. Additionally, they might restrict
access to specific ports used by the web server.
Takeaways:
Strong passwords are essential for protecting your online accounts because
they:
Real-World Scenario:
Let's say you use the same weak password for your email, bank account, and social
media profiles. If a hacker manages to crack that password, they could gain access to
all of your accounts, potentially leading to financial loss, identity theft, and other serious
consequences. By using strong, unique passwords for each account, you significantly
reduce this risk.
Takeaways:
• Strong passwords are the first line of defense in protecting your online accounts.
• Taking the time to create strong passwords can save you a lot of trouble down
the road.
• Length: Aim for passwords that are at least 12 characters long. The longer, the
better.
• Complexity: Use a combination of uppercase and lowercase letters, numbers,
and symbols.
• Uniqueness: Avoid using the same password for multiple accounts.
• Avoid personal information: Don't use your name, birthday, pet's name, or
other easily guessable information in your passwords.
• Regularly change passwords: Consider changing your passwords every few
months, especially for critical accounts.
• Use a password manager: A password manager can securely store and
generate strong, unique passwords for all your accounts.
Following these best practices, along with any password policies set by your
organization, will significantly strengthen your online security posture.
Real-World Scenario:
A company requires all employees to use passwords that are at least 10 characters
long and contain a combination of uppercase and lowercase letters, numbers, and
symbols. This policy helps to ensure that all employees are using strong passwords to
protect sensitive company data.
Takeaways:
• Symmetric Encryption: Uses the same secret key for both encryption and
decryption. This is efficient but requires secure key exchange.
Real-World Scenario:
When you log in to your bank account online, the communication between your browser
and the bank's website is likely encrypted using HTTPS. This encryption helps to protect
your login credentials and other sensitive financial information from being intercepted by
hackers.
Takeaways:
Remember:
• Security is an ongoing process. Stay informed about the latest threats and best
practices to keep your passwords and data secure.
• There are many resources available to help you learn more about password
security and encryption. Don't hesitate to seek out additional information to
ensure you're taking the necessary steps to protect yourself online.