Network Fundamentals Notes
Network Fundamentals Notes
● These interconnections are made using various technologies like fiber optics,
Ethernet cables, or wireless connections (Wi-Fi). The Internet is the largest and
most complex network, but simpler networks can consist of just two devices
connected by cables or wirelessly.
● Node/Host: A node (or host) refers to any device that is connected to the network,
like a computer, laptop, server, smartphone, or even a network device like a router. In
simpler terms, a host can be a PC, phone, or server that either provides or accesses
shared resources on the network.
● Networks are built using different physical and wireless connections. Common
methods include:
● For example, if you’re connecting two laptops, you could use a physical Ethernet
cable, or if you're connecting two phones, you could use Wi-Fi or Bluetooth (e.g.,
for file sharing via AirDrop).
● The internet is accessed via IP addresses, but humans tend to remember domain
names like google.com. These domain names are translated into IP addresses by a
system called DNS (Domain Name System).
● IPv4 is the most common IP version used today, though IPv6 is becoming more
prevalent due to the exhaustion of available IPv4 addresses.
● Ports are used to define specific services running on a network device. When
devices communicate, they use ports to listen for requests and responses.
○ For example, HTTP traffic (used for standard web browsing) typically uses
port 80, while HTTPS (secure web traffic) uses port 443.
● Devices that connect to a server often do so by specifying both the IP address and
the port number where the service is running. If a device tries to connect to the
wrong port, it will not reach the intended service.
● MAC addresses are unique hardware addresses associated with NICs, ensuring
devices can be identified on a network. These addresses are hardcoded into the
device by the manufacturer.
● Modern NICs can support high speeds (e.g., 1Gbps or 25Gbps), and the type of
connection may vary depending on whether the network is copper (Ethernet) or
fiber-optic.
7. Client-Server Interaction:
○ A client is any device that requests and receives resources from a server. In
this case, the phone acts as the client, requesting a video from the laptop (the
server).
● Even though a laptop or phone may act as both client and server at different times,
their roles are determined by whether they are requesting or providing resources.
● Devices communicate using protocols, such as IP, HTTP, and HTTPS, which define
how data is exchanged.
● IP addresses are used to identify devices on a network, while ports help direct the
traffic to the correct service on the device.
● A Network Interface Card (NIC) allows devices to connect to a network, and each
device has a unique MAC address for identification.
Resources: Files, videos, pictures, services, etc., that are shared over the network.
Client-Server Model: Servers provide resources or services, and clients request and
access them.
MAC Addresses: Hardware addresses burnt into Network Interface Cards (NICs) for
identification on a local network.
Port Numbers: Allow devices to listen for different services on specific numbers.
Communication Protocols: Languages or rules (like IP, HTTP, HTTPS, DNS, FTP)
that devices use to communicate.
NIC (Network Interface Card): The hardware that allows a device to connect to a
network (Ethernet cards, Wi-Fi adapters).
Physical vs. Logical Topology: Physical is how devices are physically connected;
logical is how data flows.
Bus Topology: An early topology with devices connected to a single cable, prone to
breaks and collisions, requiring terminators.
Star Topology: Devices connect to a central hub. Physically a star, but logically with
hubs, it acts like a bus, leading to collisions and shared bandwidth (single collision
and broadcast domain).
Hubs: Multi-port repeaters that forward all received traffic out of all other ports,
leading to collisions and inefficient bandwidth sharing.
Collision Domain: An area of the network where a collision affects all devices.
Hub-based networks have a single collision domain.
Switches and Bridges: Learn MAC addresses and forward traffic only to the
intended destination port, reducing collisions (multiple collision domains, single
broadcast domain). Switches operate in hardware (using ASICs) and have more
ports than bridges (which operate in software).
Firewalls: Protect networks from unauthorized access. Home routers often have
built-in firewalls, but enterprises use dedicated devices.
IDS (Intrusion Detection System) vs. IPS (Intrusion Prevention System): IDS
detects and alerts to malicious activity; IPS detects and prevents it.
Cloud Networking: A growing trend where network services and infrastructure are
hosted in the cloud instead of physical devices.
● The instructor begins by addressing why Cisco Packet Tracer is such a useful tool
for those pursuing network certifications or learning about networking.
○ Free Access: One of the major benefits of Cisco Packet Tracer is that it’s
completely free to download. To access it, all you need is to register for a free
course on the Cisco NetAcad platform. NetAcad is Cisco’s official
educational platform for networking courses.
○ Practical Experience for CCNA: Cisco Packet Tracer allows you to practice
configuring and troubleshooting network devices in a controlled virtual
environment. These devices include routers, switches, and other Cisco
equipment that are part of the CCNA exam. By using Packet Tracer, you can
build virtual networks and test your skills without needing to invest in
expensive physical hardware.
○ Real-World Application: Not only is it vital for passing the CCNA exam, but
gaining hands-on experience with Packet Tracer also prepares you for
real-world networking tasks. You’ll be able to configure network devices,
troubleshoot network problems, and understand how data packets flow
through networks.
● The next section of the video guides you through the process of downloading Cisco
Packet Tracer from the NetAcad website.
○ Registering for the Course: To download the software, you need to create a
NetAcad account. The registration process is straightforward: you’ll need to
enter your name, email, and a password. You will also need to agree to
Cisco’s terms and conditions. Once you complete registration, you can
proceed to download Cisco Packet Tracer.
3. Installing Cisco Packet Tracer
● Once you’ve registered for the course and logged in, you’ll be able to download
Cisco Packet Tracer to your computer. The instructor details the installation steps:
○ Running the Installer: After downloading, the next step is to run the
installer. The instructor walks through the installation process:
○ Launch Packet Tracer: After the installation, the instructor leaves the box
checked to launch Cisco Packet Tracer immediately and clicks Finish to
complete the setup.
○ Multi-User Option: The installation process asks if you want to run Cisco
Packet Tracer in multi-user mode. If you’re using the software alone, select
No.
● After launching the software, the next step is logging in to Cisco Packet Tracer using
your NetAcad account credentials.
○ Login Process: The software will ask you to log in with your email address
and password. However, at the time of this recording, the instructor
encounters an issue with the NetAcad login page. The software returns a 404
error.
○ Issue Resolution: If you encounter the same issue, the instructor advises
restarting the software and trying the Skills for All option again.
● The instructor goes further to explain how to handle potential login issues. Although
NetAcad is the default login option, if the login fails, the Skills for All link serves as a
backup.
● The video emphasizes that while login issues can occasionally arise, they are easy to
resolve by logging in through a web browser, making sure your account is activated,
and following through with the login process.
● Once successfully logged in, Cisco Packet Tracer is ready to use. The instructor
concludes by mentioning that this tutorial only covers the installation and login
process.
● For users eager to start building networks, the instructor teases that future videos will
focus on creating network topologies, configuring devices, and using the software
to simulate network behavior, which is essential for CCNA preparation.
Before diving into specific protocols, we'll likely start with a brief overview of network
traffic capture tools like Wireshark. You'll learn how to initiate a capture, filter for
specific protocols (like SMTP, POP3, IMAP, and FTP), and interpret the basic
structure of a captured packet. This includes identifying the different layers (Ethernet
frame, IP packet, TCP/UDP segment, Application Layer data) and their respective
headers.
This segment will focus on the protocols that govern the sending and receiving of
emails. We'll analyze captures of typical email client-server interactions to
understand the step-by-step communication process.
● SMTP (Simple Mail Transfer Protocol): As the protocol for sending email,
we'll examine a capture of an email being sent from a client (your email
program) to a mail server. We'll dissect the SMTP conversation, observing
commands such as:
The second part of this module will focus on FTP, a standard protocol for transferring
files between a client and a server. We'll analyze captures illustrating both the control
and data connections.
● Control Connection (Port 21): You'll see the initial TCP connection
established on port 21 for sending commands and receiving responses. The
capture will likely show commands like:
Part 2:
Understanding Binary Numbers Computers don't understand letters, numbers, or
images directly. They work with electrical signals that are either ON or OFF. We
represent these two states with the digits 0 (OFF) and 1 (ON). This is the binary
number system.
To convert a decimal number to binary, you repeatedly divide the decimal number by
2 and keep track of the remainders. The remainders, read from bottom to top, form
the binary equivalent.
Reading the remainders from bottom to top: 1111 (which is often represented as
00001111 in 8-bit systems).
To convert a binary number to decimal, you multiply each bit by its corresponding
power of 2 and sum the results.
Sum: 8+0+2+1=∗∗11∗∗
Okay, let's delve even deeper into each of those points in Section 3, aiming for
maximum clarity and detail, as if you were attending a more extended lecture on
each topic.
Building Your First Network with Packet Tracer: Laying the Foundation
Imagine you're a budding architect, and Cisco Packet Tracer is your virtual sandbox
filled with digital network building blocks. This 23-minute segment isn't just about
clicking and dragging; it's about understanding the fundamental principles of network
construction in a controlled, risk-free environment.
This 13-minute segment clarifies the essential role of the Address Resolution
Protocol (ARP) in bridging the gap between the logical IP addresses (Layer 3) and
the physical MAC addresses (Layer 2) within a local network.
● The Layer Divide: Logical vs. Physical: Reinforcing the concept that IP
addresses are used for logical addressing and routing across networks, while
MAC addresses are used for physical addressing and frame delivery within a
local network segment. Highlighting that devices need both types of
addresses to communicate effectively on a LAN that uses IP.
● The "Need to Know" Problem: Imagine a PC wants to send an IP packet to
another PC on the same local network. The sending PC knows the IP address
of the destination PC. However, to actually send the data over the Ethernet
cable, it needs to put the destination's MAC address in the Ethernet frame's
header. This is where ARP comes in – it helps the sender find the MAC
address associated with a known IP address on the same LAN.
● The ARP Request: The Broadcast Inquiry: A detailed breakdown of the
ARP request process:
○ Triggering ARP: When a device needs to send an IP packet to
another device on the same LAN but doesn't have the destination's
MAC address in its ARP cache.
○ Creating the ARP Request Packet: The sending device creates a
special ARP request packet. This packet contains:
■ The sender's IP address and MAC address.
■ The target IP address (the IP address of the device it wants to
communicate with).
■ A broadcast MAC address (FF:FF:FF:FF:FF:FF) as the
destination MAC address of the Ethernet frame. This ensures
that all devices on the local network receive the ARP request.
○ Broadcasting the Request: The ARP request frame is broadcast over
the local network.
● The ARP Reply: The Unicast Answer: Explaining how the target device
responds to the ARP request:
○ Receiving the Request: Every device on the LAN receives the ARP
request.
○ Matching IP Address: Only the device whose IP address matches the
target IP address in the ARP request will process it.
○ Creating the ARP Reply Packet: The target device creates an ARP
reply packet containing:
■ Its own IP address and MAC address (the answer!).
■ The original sender's IP address and MAC address.
○ Unicast Response: The ARP reply is sent as a unicast frame directly
back to the MAC address of the device that sent the ARP request.
● The ARP Cache: Remembering for Efficiency: Understanding the
importance of the ARP cache:
○ Storing Mappings: Once a device receives an ARP reply, it stores the
IP-to-MAC address mapping in its local ARP cache.
○ Avoiding Redundant Requests:** For subsequent communication with
the same device, the sender can look up the MAC address in its ARP
cache, avoiding the need to send another ARP request. This
significantly reduces network traffic.
○ ARP Cache Timers: Explaining that ARP cache entries have a limited
lifespan (timers) and will eventually expire, requiring a new ARP
request if communication resumes after a period of inactivity. This
helps to handle changes in network configurations.
● ARP in Action: Real-World Examples: Illustrating scenarios where ARP is
crucial:
○ A PC pinging another PC on the same LAN.
○ A web browser on a PC trying to access a web server on the same
LAN.
○ A router needing to forward a packet to the next hop on the local
network.
This practical approach of examining real network captures will bridge the gap
between theoretical knowledge of the TCP/IP model and its tangible implementation
in the internet services you use every day. You'll see "under the hood" how your
emails are sent and received, and how files are transferred across the network.
Imagine you have multiple computers and you want them to be able to talk to each
other, share files, or access the internet. That's the basic idea behind computer
networking. To make this communication organized and efficient, we use models that
break down the process into different layers.
Process:
1. You write the letter (your application).
2. You put it in an envelope with an address (addressing).
3. You take it to the post office (transport).
4. The post office sorts it and directs it (routing).
5. It travels via trucks or planes (physical transport).
6. It's delivered to the recipient (physical delivery).
7. The recipient opens it (their application).
Networking works similarly, with each layer handling a specific part of the
communication process.
The questions you answered were based on a common 5-layer model used for
teaching, which is a simplified version of the more detailed 7-layer OSI model. Let's
look at each layer:
1. Physical Layer (Layer 1):
○ What it does: This is the very basic level. It deals with the physical
connection and how raw data (as bits - 0s and 1s) is transmitted over a
physical medium like cables (Ethernet), wireless signals (Wi-Fi), or
fiber optics.
○ Think of it as: The actual wire or airwaves carrying the electrical or
radio signals.
2. Data Link Layer (Layer 2):
○ What it does: This layer is responsible for reliable communication
between two devices that are directly connected (on the same local
network). It packages the bits from the Physical Layer into frames and
adds physical addresses (MAC addresses) to identify devices on the
local network. It also handles error detection and correction within that
local link.
○ Think of it as: Making sure the data gets cleanly from one computer's
network card to another computer's network card on the same floor.
3. Network Layer (Layer 3):
○ What it does: This layer is all about routing data across different
networks. It uses logical addresses called IP addresses to identify
devices globally. It takes the data from the Transport Layer and
packages it into packets, deciding the best path for these packets to
reach their destination. Routers operate at this layer.
○ Think of it as: The postal service deciding which route your letter
should take to get to a different city or country.
4. Transport Layer (Layer 4):
○ What it does: This is the layer that users directly interact with. It
provides network services to applications. Common protocols at this
layer include:
■ HTTP (Hypertext Transfer Protocol): Used for web browsing.
■ FTP (File Transfer Protocol): Used for transferring files.
■ SMTP (Simple Mail Transfer Protocol): Used for sending
1
emails.
2
■ DNS (Domain Name System): Translates website names into
IP addresses.
○ Think of it as: The actual software you use (web browser, email client,
etc.) that needs to communicate over the network.
Specific names:
● Application Layer: Data
● Transport Layer: Segment (TCP) or Datagram (UDP)
● Network Layer: Packet
● Data Link Layer: Frame
3
● Physical Layer: Bits
nslookup google.com.
https://ccnax.com/binary-decimal-and-hexadecimal-converter/?options=hexadecimal
&tab=reset Link to calculate the decimals.
Okay, let's break down the concepts a bit more for better understanding:
● Decimal (Base-10): This is the number system we use every day. It has ten
unique digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9. Each position in a decimal number
represents a power of 10. For example, in the number 123:
To convert a hexadecimal number to its decimal equivalent, you multiply the decimal
value of each hexadecimal digit by the corresponding power of 16 based on its
position, and then sum the results. Remember to start the powers of 16 from 0 for
the rightmost digit and increase by one for each position to the left.
○ The rightmost digit is '1', which has a decimal value of 1 and is in the
160 place.
○ The leftmost digit is 'E', which has a decimal value of 14 and is in the
161 place.
○ So, (E1)16=(14×161)+(1×160)=(14×16)+(1×1)=224+1=22510.
● Example (from Question 4: E9):
○ The rightmost digit is 'B', decimal value 11, in the 160 place.
○ The leftmost digit is 'A', decimal value 10, in the 161 place.
○ So, (AB)16=(10×161)+(11×160)=(10×16)+(11×1)=160+11=17110.
○ 10: 10÷16=0 remainder 10 ('A'). So, 10 becomes 0A (we often pad with
a leading zero to ensure two digits).
○ 1: 1÷16=0 remainder 1. So, 1 becomes 01.
○ 12: 12÷16=0 remainder 12 ('C'). So, 12 becomes 0C.
○ 123: 123÷16=7 remainder 11 ('B'); 7÷16=0 remainder 7. So, 123
becomes 7B.
○ Combining these, we get 0A.01.0C.7B.
● Example (from Question 7: 12.254.234.133):
DNS: Resolves domain names (e.g., cnn.com) to IP addresses. You can use tools
like ping or nslookup to find these IPs.
IP Addresses: Every device on the internet has an IP address. For example, your
machine might have an IPv4 address like 10.0.0.6 and an IPv6 address like
2001:20::2.
Routing: Routers use routing protocols like RIP and OSPF to determine the best
path for data. Routing decisions are based on the network portion of the IP address,
not the host portion.
IPv4 Address Format: An IPv4 address is 32 bits long, written in dotted decimal
notation (e.g., 10.1.1.1), with each segment (octet) representing 8 bits.
Address Structure: IP addresses have two parts: the network portion and the host
portion, used for routing packets.
Unicast and Multicast: Unicast packets are routed based on the destination
address, while multicast packets use the source address.
Pv4 Address: An IPv4 address is a 32-bit binary number, divided into four parts
(octets), each consisting of 8 bits or 1 byte. It's typically written in dotted decimal
notation (e.g., 10.1.1.1), but internally it's a 32-bit binary address.
Octet: An octet is 8 bits or 1 byte, and an IPv4 address is made up of four octets
(X.X.X.X).
Address Analogy: Just like house numbers can be the same on different streets,
the same host portion (e.g., "1") can appear on different networks. For example, "1"
can be used on both the 10.1.1.0/24 network and the 12.1.1.0/24 network.
Classful Addressing:
Historical Context: Classful addressing was used to classify networks into different
sizes, but it became inefficient as the internet grew, leading to the adoption of CIDR.
CIDR and Classful Addressing: While CIDR replaced the older classful addressing
system, you may still encounter classful address formats in certain commands (e.g.,
RIP routing).
Class A Addresses:
● First Octet: Starts with a binary 0 in the first bit, so the decimal range for
Class A addresses is from 0.0.0.0 to 127.255.255.255.
● Network and Host: In Class A, the first 8 bits are for the network portion and
the remaining 24 bits are for the host portion (e.g., 10.1.1.1).
Class B Addresses:
● First Octet: Starts with binary 10 in the first two bits. The decimal range for
Class B addresses is from 128.0.0.0 to 191.255.255.255.
● Network and Host: In Class B, the first 16 bits are for the network portion
(first 2 octets), and the last 16 bits are for the host portion (last 2 octets). For
example, 172.16.1.1 means 172.16 is the network portion, and 1.1 is the host
portion.
○ Can be used for Denial of Service (DoS) attacks like Smurf attacks.
○ This results in the target device being flooded with traffic, causing a
denial of service.
Security Recommendations:
○ For example, two PCs connected directly can use link-local addresses
to communicate without requiring manual IP configuration or a DHCP
server.
○ These addresses are not routable beyond the local network. They are
only valid for communication on the local segment.
○ They are non-routable. While devices on the same local link can
communicate with each other, they cannot reach external devices or
the internet.
○ The /24 subnet mask means the first 24 bits are for the network, and
the remaining bits are for the host.
○ First Host Address: Set all host bits to 0 except the last one to 1. For
192.168.1.18/24, it’s 192.168.1.1.
○ Last Host Address: Set all host bits to 1 except the last one to 0. For
192.168.1.18/24, it’s 192.168.1.254.
When dealing with a /20 subnet mask (like 172.16.35.123/20), the split between
the network and host portion occurs in the third octet.
○ The /20 subnet mask gives 20 network bits, and the remaining 12 bits
are for the host.
○ Subnet Address: Fill the host bits with 0s, which gives 172.16.32.0.
○ First Host Address: Set the last bit of the host portion to 1, which
gives 172.16.32.1.
○ Last Host Address: Set all host bits to 1s except the last one, which
gives 172.16.47.254.