0% found this document useful (0 votes)
14 views

Network Fundamentals Notes

A computer network consists of interconnected devices that share resources using communication protocols, with the Internet being the largest example. Key concepts include nodes/hosts, the client-server model, IP addressing, and various protocols like HTTP and FTP. Tools like Cisco Packet Tracer facilitate learning and practicing networking skills, while modules on network traffic capture provide insights into real-world applications of networking principles.

Uploaded by

Alex Guerrero
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Network Fundamentals Notes

A computer network consists of interconnected devices that share resources using communication protocols, with the Internet being the largest example. Key concepts include nodes/hosts, the client-server model, IP addressing, and various protocols like HTTP and FTP. Tools like Cisco Packet Tracer facilitate learning and practicing networking skills, while modules on network traffic capture provide insights into real-world applications of networking principles.

Uploaded by

Alex Guerrero
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

1. What is a Computer Network?

●​ A computer network is a collection of computers and devices that share resources


such as files, videos, images, or any other data over a set of common communication
protocols. These resources are shared through different network nodes or end
devices (also called hosts), which can include computers, laptops, smartphones,
servers, routers, and switches.​

●​ These interconnections are made using various technologies like fiber optics,
Ethernet cables, or wireless connections (Wi-Fi). The Internet is the largest and
most complex network, but simpler networks can consist of just two devices
connected by cables or wirelessly.​

●​ The fundamental purpose of a network is to share resources, which could include


anything from simple files to complex media like videos or software. A device like
your laptop or phone can both request and provide resources depending on whether
it is acting as a client or a server.​

2. Key Networking Terms and Devices:

●​ Node/Host: A node (or host) refers to any device that is connected to the network,
like a computer, laptop, server, smartphone, or even a network device like a router. In
simpler terms, a host can be a PC, phone, or server that either provides or accesses
shared resources on the network.​

●​ Client-Server Model: This model is central to how modern networks operate. A


server provides resources (like a file, web page, or video) to a client (another device
accessing the resource). The server typically has more computational power, while
the client is often a more lightweight device, like a smartphone or laptop. However,
the roles of client and server can switch depending on the situation (e.g., a laptop
acting as a server when running software like Plex Media Server).​

3. Types of Network Connections:

●​ Networks are built using different physical and wireless connections. Common
methods include:​

○​ Ethernet cables (copper wires) for wired connections.​

○​ Fiber optics for high-speed, long-distance connections.​

○​ Wi-Fi for wireless connections within homes or offices.​


○​ Bluetooth and AirDrop are examples of very simple networks where devices
share data like images or files.​

●​ For example, if you’re connecting two laptops, you could use a physical Ethernet
cable, or if you're connecting two phones, you could use Wi-Fi or Bluetooth (e.g.,
for file sharing via AirDrop).​

4. IP Addressing and Communication:

●​ IP Address: Every device on a network is assigned a unique identifier called an IP


address. This is how devices can locate and communicate with one another across
the network.​

●​ These IP addresses are typically assigned automatically through DHCP (Dynamic


Host Configuration Protocol) when a device connects to the network.​

●​ The internet is accessed via IP addresses, but humans tend to remember domain
names like google.com. These domain names are translated into IP addresses by a
system called DNS (Domain Name System).​

●​ IPv4 is the most common IP version used today, though IPv6 is becoming more
prevalent due to the exhaustion of available IPv4 addresses.​

5. Ports and Protocols:

●​ Ports are used to define specific services running on a network device. When
devices communicate, they use ports to listen for requests and responses.​

○​ For example, HTTP traffic (used for standard web browsing) typically uses
port 80, while HTTPS (secure web traffic) uses port 443.​

●​ A protocol is essentially a language or set of rules for communication between


devices. The most widely used protocols include:​

○​ IP (Internet Protocol) for addressing and routing.​

○​ HTTP/HTTPS for web communication.​

○​ FTP for file transfers.​

○​ DNS for domain name resolution.​

○​ TCP (Transmission Control Protocol) to ensure reliable data transmission.​

●​ Devices that connect to a server often do so by specifying both the IP address and
the port number where the service is running. If a device tries to connect to the
wrong port, it will not reach the intended service.​

6. Network Interface Cards (NIC):

●​ A NIC (Network Interface Card) is a hardware component that allows a device to


connect to a network. Devices like computers, laptops, phones, or even servers all
use NICs to access networks, whether through Ethernet (wired) or Wi-Fi (wireless).​

●​ MAC addresses are unique hardware addresses associated with NICs, ensuring
devices can be identified on a network. These addresses are hardcoded into the
device by the manufacturer.​

●​ Modern NICs can support high speeds (e.g., 1Gbps or 25Gbps), and the type of
connection may vary depending on whether the network is copper (Ethernet) or
fiber-optic.​

7. Client-Server Interaction:

●​ The client-server model demonstrates how devices interact over a network:​

○​ A server is a machine or device that provides resources or services to clients.


For instance, a Plex Media Server on a laptop shares videos with a client
device like a phone or tablet.​

○​ A client is any device that requests and receives resources from a server. In
this case, the phone acts as the client, requesting a video from the laptop (the
server).​

●​ Even though a laptop or phone may act as both client and server at different times,
their roles are determined by whether they are requesting or providing resources.​

8. Evolution of Data Sharing:

●​ Before networks, data had to be physically transported between devices using


floppy disks, CD-ROMs, or USB drives. The process was slow and cumbersome,
especially for large data transfers.​

●​ Modern networks allow instantaneous sharing of resources, including massive files


or streaming media, without physical transport. A simple example of this is using
AirDrop to share a photo between two phones, which communicate wirelessly using
Wi-Fi and Bluetooth.
●​ Networking allows devices to share resources, whether locally within a home or
office network or across the world via the internet.​

●​ Devices communicate using protocols, such as IP, HTTP, and HTTPS, which define
how data is exchanged.​

●​ IP addresses are used to identify devices on a network, while ports help direct the
traffic to the correct service on the device.​

●​ A Network Interface Card (NIC) allows devices to connect to a network, and each
device has a unique MAC address for identification.

Nodes/Hosts: Devices connected to the network (computers, laptops, servers,


phones, network devices). Hosts are end devices where clients access resources
from servers.

Resources: Files, videos, pictures, services, etc., that are shared over the network.

Client-Server Model: Servers provide resources or services, and clients request and
access them.

IP Addresses: Logical addresses (IPv4, IPv6) assigned to devices for


communication. DHCP automatically assigns these.

DNS (Domain Name System): Translates human-readable names (like google.com)


into IP addresses.

MAC Addresses: Hardware addresses burnt into Network Interface Cards (NICs) for
identification on a local network.

Port Numbers: Allow devices to listen for different services on specific numbers.

Communication Protocols: Languages or rules (like IP, HTTP, HTTPS, DNS, FTP)
that devices use to communicate.

NIC (Network Interface Card): The hardware that allows a device to connect to a
network (Ethernet cards, Wi-Fi adapters).

Physical vs. Logical Topology: Physical is how devices are physically connected;
logical is how data flows.

Bus Topology: An early topology with devices connected to a single cable, prone to
breaks and collisions, requiring terminators.
Star Topology: Devices connect to a central hub. Physically a star, but logically with
hubs, it acts like a bus, leading to collisions and shared bandwidth (single collision
and broadcast domain).

Hubs: Multi-port repeaters that forward all received traffic out of all other ports,
leading to collisions and inefficient bandwidth sharing.

Collision Domain: An area of the network where a collision affects all devices.
Hub-based networks have a single collision domain.

Broadcast Domain: An area of the network where a broadcast message is received


by all devices. Hub-based networks have a single broadcast domain.

Switches and Bridges: Learn MAC addresses and forward traffic only to the
intended destination port, reducing collisions (multiple collision domains, single
broadcast domain). Switches operate in hardware (using ASICs) and have more
ports than bridges (which operate in software).

Managed vs. Unmanaged Switches: Managed switches allow configuration (like


VLANs to segment broadcast domains), while unmanaged switches are
plug-and-play.

Routers: Connect different networks (LAN to WAN/Internet), and each router


interface is a separate broadcast and collision domain.

Firewalls: Protect networks from unauthorized access. Home routers often have
built-in firewalls, but enterprises use dedicated devices.

IDS (Intrusion Detection System) vs. IPS (Intrusion Prevention System): IDS
detects and alerts to malicious activity; IPS detects and prevents it.

Cloud Networking: A growing trend where network services and infrastructure are
hosted in the cloud instead of physical devices.

Why Use Cisco Packet Tracer?

●​ The instructor begins by addressing why Cisco Packet Tracer is such a useful tool
for those pursuing network certifications or learning about networking.​

○​ Free Access: One of the major benefits of Cisco Packet Tracer is that it’s
completely free to download. To access it, all you need is to register for a free
course on the Cisco NetAcad platform. NetAcad is Cisco’s official
educational platform for networking courses.​

○​ Practical Experience for CCNA: Cisco Packet Tracer allows you to practice
configuring and troubleshooting network devices in a controlled virtual
environment. These devices include routers, switches, and other Cisco
equipment that are part of the CCNA exam. By using Packet Tracer, you can
build virtual networks and test your skills without needing to invest in
expensive physical hardware.​

○​ Real-World Application: Not only is it vital for passing the CCNA exam, but
gaining hands-on experience with Packet Tracer also prepares you for
real-world networking tasks. You’ll be able to configure network devices,
troubleshoot network problems, and understand how data packets flow
through networks.​

○​ Simulation Mode: One of the standout features of Packet Tracer is its


Simulation Mode, which allows you to visualize how packets travel across
networks. This helps reinforce theoretical concepts by providing a clear,
interactive demonstration of how data flows through devices, helping users
understand networking at a deeper level.​

○​ Emulator vs. Simulator: The instructor emphasizes that Cisco Packet


Tracer is a simulator, not an emulator. This distinction is important: while it
mimics the behavior of Cisco devices, it doesn't emulate every single detail.
It’s a simulation of network behavior, meaning there are some limitations
compared to real hardware. However, it remains a powerful tool for beginners
and advanced users alike, especially if purchasing physical devices is not an
option.​

○​ Cost-Effectiveness: Since physical devices can be costly, especially for


someone just starting, Packet Tracer serves as an excellent alternative. Many
students and professionals use this free software to practice configuring
networks without the financial burden of buying routers and switches.​

2. Getting Cisco Packet Tracer

●​ The next section of the video guides you through the process of downloading Cisco
Packet Tracer from the NetAcad website.​

○​ Search for the Software: The instructor starts by demonstrating how to


search for Cisco Packet Tracer on Google. By typing “download Cisco
Packet Tracer,” the first result will take you to the NetAcad website.​

○​ Navigating NetAcad: After reaching the NetAcad website, the instructor


explains how to locate the "Getting Started with Cisco Packet Tracer"
course. This course is free and provides all the necessary resources to help
you download and learn how to use Cisco Packet Tracer.​

○​ Registering for the Course: To download the software, you need to create a
NetAcad account. The registration process is straightforward: you’ll need to
enter your name, email, and a password. You will also need to agree to
Cisco’s terms and conditions. Once you complete registration, you can
proceed to download Cisco Packet Tracer.​
3. Installing Cisco Packet Tracer

●​ Once you’ve registered for the course and logged in, you’ll be able to download
Cisco Packet Tracer to your computer. The instructor details the installation steps:​

○​ Download the Correct Version: Depending on your operating system, you’ll


need to select the appropriate version of Packet Tracer. In this case, the
instructor selects the Windows 64-bit version. You can download the
software directly from the NetAcad page after logging in.​

○​ Running the Installer: After downloading, the next step is to run the
installer. The instructor walks through the installation process:​

■​ Accepting the License Agreement: The first screen presents the


license agreement. You need to agree to the terms before
proceeding.​

■​ Choosing Installation Options: You can either accept the default


installation settings or customize the installation directory. In this case,
the instructor opts for the default settings.​

■​ Installing: The installation process is quick, and the software will


require about 560 MB of disk space. Once the installation is
complete, you can create shortcuts for easy access.​

○​ Launch Packet Tracer: After the installation, the instructor leaves the box
checked to launch Cisco Packet Tracer immediately and clicks Finish to
complete the setup.​

○​ Multi-User Option: The installation process asks if you want to run Cisco
Packet Tracer in multi-user mode. If you’re using the software alone, select
No.​

4. Logging into Cisco Packet Tracer

●​ After launching the software, the next step is logging in to Cisco Packet Tracer using
your NetAcad account credentials.​

○​ Login Process: The software will ask you to log in with your email address
and password. However, at the time of this recording, the instructor
encounters an issue with the NetAcad login page. The software returns a 404
error.​

○​ Workaround: To resolve this, the instructor demonstrates an alternative


method. Instead of using the default NetAcad login option, he chooses the
Skills for All option, which redirects him to the NetAcad login page via a web
browser. Once logged in through the browser, the software recognizes the
login and grants access.​

○​ Issue Resolution: If you encounter the same issue, the instructor advises
restarting the software and trying the Skills for All option again.​

5. Troubleshooting Common Login Problems

●​ The instructor goes further to explain how to handle potential login issues. Although
NetAcad is the default login option, if the login fails, the Skills for All link serves as a
backup.​

●​ The video emphasizes that while login issues can occasionally arise, they are easy to
resolve by logging in through a web browser, making sure your account is activated,
and following through with the login process.​

6. Cisco Packet Tracer is Ready

●​ Once successfully logged in, Cisco Packet Tracer is ready to use. The instructor
concludes by mentioning that this tutorial only covers the installation and login
process.​

●​ For users eager to start building networks, the instructor teases that future videos will
focus on creating network topologies, configuring devices, and using the software
to simulate network behavior, which is essential for CCNA preparation.​

●​ Practical Application: The instructor encourages viewers to start exploring Packet


Tracer by creating network topologies, configuring network devices (such as routers
and switches), and practicing troubleshooting. He also reassures users that spending
time configuring networks and experimenting with Cisco Packet Tracer is a great way
to prepare for the CCNA exam and to gain real-world networking skills.

Module 4: This module serves as a crucial step in solidifying your understanding of


the TCP/IP model by moving from theoretical concepts to real-world application.
Here, we will dissect network traffic captures of two fundamental internet services:
E-mail and File Transfer Protocol (FTP). By examining the raw communication
between clients and servers, you'll gain invaluable insights into how the different
layers of the TCP/IP model work together to enable these everyday functionalities.

Understanding Network Traffic Captures:

Before diving into specific protocols, we'll likely start with a brief overview of network
traffic capture tools like Wireshark. You'll learn how to initiate a capture, filter for
specific protocols (like SMTP, POP3, IMAP, and FTP), and interpret the basic
structure of a captured packet. This includes identifying the different layers (Ethernet
frame, IP packet, TCP/UDP segment, Application Layer data) and their respective
headers.

E-mail Protocol Analysis (SMTP, POP3, IMAP):

This segment will focus on the protocols that govern the sending and receiving of
emails. We'll analyze captures of typical email client-server interactions to
understand the step-by-step communication process.

●​ SMTP (Simple Mail Transfer Protocol): As the protocol for sending email,
we'll examine a capture of an email being sent from a client (your email
program) to a mail server. We'll dissect the SMTP conversation, observing
commands such as:​

○​ HELO or EHLO: Initiating the connection and identifying the client.


○​ MAIL FROM: Specifying the sender's email address.
○​ RCPT TO: Specifying the recipient's email address(es).
○​ DATA: Signaling the start of the email body.
○​ The actual email content (headers and body).
○​ QUIT: Closing the connection. We'll also look at the server's
responses, indicated by numerical codes, which confirm the success or
failure of each command. You'll see how TCP (typically on port 25)
provides the reliable transport for these commands and the email data
itself.
●​ POP3 (Post Office Protocol version 3): For retrieving emails, we'll analyze a
capture of a client connecting to a POP3 server to download new messages.
The capture will likely showcase commands like:​

○​ USER: Providing the username.


○​ PASS: Providing the password (note that in real-world scenarios, this
might be encrypted with protocols like TLS/SSL).
○​ LIST: Requesting a list of available messages.
○​ RETR <message_number>: Retrieving a specific email.
○​ DELE <message_number>: Marking a message for deletion.
○​ QUIT: Closing the connection. Again, we'll observe TCP (typically on
port 110) ensuring the reliable transfer of these commands and the
email content.
●​ IMAP (Internet Message Access Protocol): A more sophisticated protocol
for managing emails, IMAP allows clients to access and manipulate emails on
the server without necessarily downloading them. We'll examine captures
showing commands like:​
○​ LOGIN: Authenticating the user.
○​ SELECT <mailbox>: Choosing a mailbox (e.g., INBOX).
○​ LIST: Listing available mailboxes.
○​ FETCH <message_set> <data_item(s)>: Retrieving specific parts
of an email (e.g., headers, body).
○​ STORE <message_set> FLAGS <flag(s)>: Marking messages as
read, deleted, etc.
○​ UID FETCH: Fetching based on unique identifiers. You'll see TCP
(typically on port 143, or 993 for IMAPS with SSL/TLS) providing the
underlying reliable transport. The captures will highlight the more
stateful nature of IMAP compared to POP3.

File Transfer Protocol (FTP) Analysis:

The second part of this module will focus on FTP, a standard protocol for transferring
files between a client and a server. We'll analyze captures illustrating both the control
and data connections.

●​ Control Connection (Port 21): You'll see the initial TCP connection
established on port 21 for sending commands and receiving responses. The
capture will likely show commands like:​

○​ USER: Providing the username.


○​ PASS: Providing the password.
○​ PWD: Printing the current working directory.
○​ CWD <directory>: Changing the working directory.
○​ LIST: Requesting a list of files and directories.
○​ PASV or PORT: Initiating the data connection (passive or active mode).
○​ RETR <filename>: Requesting to retrieve a file.
○​ STOR <filename>: Requesting to store a file.
○​ QUIT: Closing the control connection. We'll analyze the server's
responses to these commands, indicating success or failure.
●​ Data Connection (Port 20 or Dynamic Ports): You'll observe how the data
connection is established for the actual file transfer. Depending on whether
passive (PASV) or active (PORT) mode is used, the port numbers for the data
connection will differ. The capture will show the bulk data being transferred
once the connection is established. You'll see how TCP ensures the reliable
transfer of the file contents.

Part 2:
Understanding Binary Numbers Computers don't understand letters, numbers, or
images directly. They work with electrical signals that are either ON or OFF. We
represent these two states with the digits 0 (OFF) and 1 (ON). This is the binary
number system.

Decimal vs. Binary:


●​ Decimal (Base-10): The number system we use every day. It has 10 digits
(0-9). Each position in a decimal number represents a power of 10 (e.g., 123
= 1×102+2×101+3×100).
●​ Binary (Base-2): A number system with only two digits (0 and 1). Each
position in a binary number represents a power of 2 (e.g., 101 in binary =
1×22+0×21+1×20=4+0+1=5 in decimal).

Converting Decimal to Binary:

To convert a decimal number to binary, you repeatedly divide the decimal number by
2 and keep track of the remainders. The remainders, read from bottom to top, form
the binary equivalent.

Example: Convert decimal 15 to binary:


1.​ 15÷2=7 remainder 1
2.​ 7÷2=3 remainder 1
3.​ 3÷2=1 remainder 1
4.​ 1÷2=0 remainder 1

Reading the remainders from bottom to top: 1111 (which is often represented as
00001111 in 8-bit systems).

Converting Binary to Decimal:

To convert a binary number to decimal, you multiply each bit by its corresponding
power of 2 and sum the results.

Example: Convert binary 1011 to decimal:


●​ 1×23=1×8=8
●​ 0×22=0×4=0
●​ 1×21=1×2=2
●​ 1×20=1×1=1

Sum: 8+0+2+1=∗∗11∗∗

Why Binary in Networking?


At the fundamental level, network communication relies on electrical or light signals
that can be either on or off, high or low. Binary provides a natural way to represent
this information. IP addresses and other network configurations are often
represented and manipulated in binary by networking devices.

Part 3: Longer and more clear

Okay, let's delve even deeper into each of those points in Section 3, aiming for
maximum clarity and detail, as if you were attending a more extended lecture on
each topic.

Building Your First Network with Packet Tracer: Laying the Foundation

Imagine you're a budding architect, and Cisco Packet Tracer is your virtual sandbox
filled with digital network building blocks. This 23-minute segment isn't just about
clicking and dragging; it's about understanding the fundamental principles of network
construction in a controlled, risk-free environment.

●​ Deconstructing Packet Tracer: We'll begin by thoroughly dissecting the


Packet Tracer interface. Think of it as your network laboratory. We'll explore:
○​ The Menu Bar: Covering options for file management (saving,
opening), editing, viewing different modes (logical vs. physical
topology), extensions, tools (like ping, traceroute simulation), and help
resources.
○​ The Logical Workspace: This is your primary canvas where you'll
design and build your network topologies. We'll discuss how to arrange
devices, add notes, and visually organize your network.
○​ The Device Palette: Located typically at the bottom, this is your
inventory of network components. We'll meticulously examine
categories like:
■​ End Devices: PCs, laptops, servers, IP phones, IoT devices –
the machines that users interact with or that provide services.
■​ Network Devices:
■​ Routers: The intelligent traffic directors that connect
different networks. We'll see various models and their
basic functions.
■​ Switches: The workhorses of local networks, facilitating
communication between devices within the same
network. We'll explore different types of switches.
■​ Hubs (Legacy): While less common now, we might
briefly touch upon hubs to understand their fundamental
(and less efficient) way of connecting devices.
■​ Wireless Devices: Access points, wireless routers.
■​ Security Devices: Firewalls.
■​ Connections: The various types of cables and wireless links
used to connect devices (e.g., copper Ethernet cables of
different types, fiber optic cables, serial cables, console cables,
and the option for automatic connection).
○​ The Realtime and Simulation Modes: Understanding the difference
between seeing events happen immediately (Realtime) and stepping
through network events to analyze them in detail (Simulation). We'll
likely start in Realtime mode for building.
○​ Configuration Windows: How to access the configuration interfaces
of devices to set IP addresses, enable services, and more.
●​ Crafting Your First Simple Network: This isn't just about dragging and
dropping; it's about understanding the "why" behind each connection. We'll go
through a step-by-step build of a basic LAN:
○​ Selecting End Devices: Choosing a couple of PCs to represent users
on the network. Understanding their basic network interface card (NIC).
○​ Introducing the Switch: Explaining the role of a switch in a local
network – providing multiple ports for devices to connect and facilitating
communication based on MAC addresses (which will be covered in
more detail later).
○​ Making the Connections: Learning how to select the appropriate
cable type (likely an Ethernet straight-through cable for connecting PCs
to a switch) and connecting the devices by clicking on their interfaces
in Packet Tracer. We'll discuss the visual cues that indicate a
successful physical connection.
○​ Basic IP Addressing: A foundational introduction to IP addresses
(IPv4). Understanding the concept of a network address and host
address. You'll be guided on how to manually configure IP addresses,
subnet masks, and potentially default gateways on the PCs. We'll
emphasize the importance of having devices on the same logical
network to communicate directly.
○​ The Command Prompt: Accessing the command-line interface (CLI)
within the simulated PCs to use basic networking commands.
●​ Testing the Waters with ping: The ping command is your network's sonar.
We'll learn how to use it to:
○​ Verify basic Layer 3 (IP) connectivity between the PCs.
○​ Understand the concept of echo requests and echo replies.
○​ Interpret the output of the ping command (success rates, round-trip
times).
○​ Use ping as a fundamental troubleshooting tool to identify if a device
is reachable on the network.
●​ Saving Your Blueprint: Learning the importance of saving your Packet
Tracer projects (.pkt files) so you can revisit your network configurations
later. Understanding how to open existing projects.

Building a Web Server Network: Serving Up Information

●​ Introducing the Server Device: Understanding the role of a server in a


network – providing services to other devices. Specifically, focusing on a
"Server" device in Packet Tracer that can host various services.
●​ Configuring the Server's Identity: Just like any other device, the web server
needs an IP address. We'll reinforce the concepts of IP addressing, subnet
masks, and potentially the default gateway if the clients are on a different
logical network (though in a simple setup, they might be on the same
network).
●​ Enabling and Configuring the HTTP Service: This is where the server
becomes a "web server." You'll learn how to access the server's configuration
and enable the HTTP service. This might involve:
○​ Turning the HTTP service "On."
○​ Potentially viewing or even briefly customizing the default web page
that the server hosts (you might see basic HTML).
○​ Understanding the concept of port 80 as the standard port for HTTP
traffic.
●​ Adding Client Devices (The Browsers): Including one or more PCs in your
simulated network that will act as clients trying to access the web server.
Ensuring these clients are on the same logical network as the server (or that
proper routing is in place, if touched upon).
●​ Connecting the Web: Using a switch (as learned in the previous section) to
connect the server and the client PCs, forming the local network.
●​ Accessing the Web Server from a Client: The moment of truth – using the
web browser application within the simulated PCs. You'll learn how to:
○​ Open the web browser.
○​ Enter the IP address of the web server in the address bar.
○​ See the basic web page served by your configured server.
○​ Understand the client-server interaction where the browser sends an
HTTP request and the server sends back an HTTP response (the web
page data).
How Does a Switch Learn MAC Addresses? The Brain of the LAN (Extended)

●​ Revisiting MAC Addresses: The Physical Identity: A thorough review of


MAC (Media Access Control) addresses. Understanding:
○​ Their 48-bit hexadecimal format.
○​ Their uniqueness (theoretically) as they are burned into the NIC by the
manufacturer.
○​ Their role as the physical address for devices on a local network
segment.
○​ The concept of source and destination MAC addresses in a frame.
●​ The Switch's Job: Efficient Forwarding: Emphasizing that switches operate
at Layer 2 and make forwarding decisions based on MAC addresses, unlike
routers which operate at Layer 3 and use IP addresses. Highlighting the
efficiency gains compared to older hubs.
●​ The Dynamic Learning Process: Building the Map: A detailed,
step-by-step explanation of how a switch builds its MAC address table:
○​ The Empty Table: When a switch is first powered on, its MAC address
table is empty.
○​ The First Frame Arrives: When a device connected to a switch port
sends a frame, the switch examines the source MAC address in the
frame's header.
○​ Recording the Source: The switch then records this source MAC
address in its MAC address table, associating it with the specific port
on which the frame was received. "Okay, MAC address
00:AA:BB:CC:DD:EE is connected to Port FastEthernet0/1."
○​ Destination Unknown (Flooding): If the destination MAC address
of the incoming frame is not found in the switch's MAC address table,
the switch doesn't know where to send it. In this case, it floods the
frame out of all other ports (except the port it received the frame on).
This ensures the destination device (if on the same LAN) will receive
the frame.
○​ The Reply and Learning Continues: When the destination device
replies, its frame will contain its MAC address as the source MAC
address. The switch learns this MAC address and the port it arrived on,
adding another entry to its table.
○​ Known Destination (Unicast Forwarding): Now, when a frame
arrives with a destination MAC address that is present in the MAC
address table, the switch can intelligently forward the frame only to the
specific port associated with that destination MAC address. This is
called unicast forwarding and is the key to the switch's efficiency.
○​ Broadcast Handling: Understanding how switches handle broadcast
frames (destination MAC address of all Fs). These are typically flooded
out of all ports (except the incoming port) as they are intended for all
devices on the local network.
○​ Multicast Handling (Brief Introduction): A potential brief mention of
how switches handle multicast traffic (intended for a group of devices).
●​ The MAC Address Table (CAM Table): The Switch's Memory: A detailed
look at the structure and contents of the MAC address table (Content
Addressable Memory table):
○​ Columns: Typically includes the MAC address, the associated VLAN (if
VLANs are discussed), the port number, and sometimes a timestamp
indicating when the entry was learned.
○​ Dynamic vs. Static Entries: Discussing how most entries are learned
dynamically but administrators can also manually configure static MAC
address entries.
○​ Aging Mechanism: Explaining how switches have an aging mechanism
to remove inactive MAC address entries from the table after a certain
period. This prevents the table from being filled with outdated
information.

Why is ARP Used in Networks? The Translator Between Layers (Extended)

This 13-minute segment clarifies the essential role of the Address Resolution
Protocol (ARP) in bridging the gap between the logical IP addresses (Layer 3) and
the physical MAC addresses (Layer 2) within a local network.

●​ The Layer Divide: Logical vs. Physical: Reinforcing the concept that IP
addresses are used for logical addressing and routing across networks, while
MAC addresses are used for physical addressing and frame delivery within a
local network segment. Highlighting that devices need both types of
addresses to communicate effectively on a LAN that uses IP.
●​ The "Need to Know" Problem: Imagine a PC wants to send an IP packet to
another PC on the same local network. The sending PC knows the IP address
of the destination PC. However, to actually send the data over the Ethernet
cable, it needs to put the destination's MAC address in the Ethernet frame's
header. This is where ARP comes in – it helps the sender find the MAC
address associated with a known IP address on the same LAN.
●​ The ARP Request: The Broadcast Inquiry: A detailed breakdown of the
ARP request process:
○​ Triggering ARP: When a device needs to send an IP packet to
another device on the same LAN but doesn't have the destination's
MAC address in its ARP cache.
○​ Creating the ARP Request Packet: The sending device creates a
special ARP request packet. This packet contains:
■​ The sender's IP address and MAC address.
■​ The target IP address (the IP address of the device it wants to
communicate with).
■​ A broadcast MAC address (FF:FF:FF:FF:FF:FF) as the
destination MAC address of the Ethernet frame. This ensures
that all devices on the local network receive the ARP request.
○​ Broadcasting the Request: The ARP request frame is broadcast over
the local network.
●​ The ARP Reply: The Unicast Answer: Explaining how the target device
responds to the ARP request:
○​ Receiving the Request: Every device on the LAN receives the ARP
request.
○​ Matching IP Address: Only the device whose IP address matches the
target IP address in the ARP request will process it.
○​ Creating the ARP Reply Packet: The target device creates an ARP
reply packet containing:
■​ Its own IP address and MAC address (the answer!).
■​ The original sender's IP address and MAC address.
○​ Unicast Response: The ARP reply is sent as a unicast frame directly
back to the MAC address of the device that sent the ARP request.
●​ The ARP Cache: Remembering for Efficiency: Understanding the
importance of the ARP cache:
○​ Storing Mappings: Once a device receives an ARP reply, it stores the
IP-to-MAC address mapping in its local ARP cache.
○​ Avoiding Redundant Requests:** For subsequent communication with
the same device, the sender can look up the MAC address in its ARP
cache, avoiding the need to send another ARP request. This
significantly reduces network traffic.
○​ ARP Cache Timers: Explaining that ARP cache entries have a limited
lifespan (timers) and will eventually expire, requiring a new ARP
request if communication resumes after a period of inactivity. This
helps to handle changes in network configurations.
●​ ARP in Action: Real-World Examples: Illustrating scenarios where ARP is
crucial:
○​ A PC pinging another PC on the same LAN.
○​ A web browser on a PC trying to access a web server on the same
LAN.
○​ A router needing to forward a packet to the next hop on the local
network.

This practical approach of examining real network captures will bridge the gap
between theoretical knowledge of the TCP/IP model and its tangible implementation
in the internet services you use every day. You'll see "under the hood" how your
emails are sent and received, and how files are transferred across the network.

Part 1: Introduction to Computer Networking

Imagine you have multiple computers and you want them to be able to talk to each
other, share files, or access the internet. That's the basic idea behind computer
networking. To make this communication organized and efficient, we use models that
break down the process into different layers.

The Need for Layers:

Process:
1.​ You write the letter (your application).
2.​ You put it in an envelope with an address (addressing).
3.​ You take it to the post office (transport).
4.​ The post office sorts it and directs it (routing).
5.​ It travels via trucks or planes (physical transport).
6.​ It's delivered to the recipient (physical delivery).
7.​ The recipient opens it (their application).

Networking works similarly, with each layer handling a specific part of the
communication process.

The 5-Layer TCP/IP Model (A Simplified View):

The questions you answered were based on a common 5-layer model used for
teaching, which is a simplified version of the more detailed 7-layer OSI model. Let's
look at each layer:
1.​ Physical Layer (Layer 1):​

○​ What it does: This is the very basic level. It deals with the physical
connection and how raw data (as bits - 0s and 1s) is transmitted over a
physical medium like cables (Ethernet), wireless signals (Wi-Fi), or
fiber optics.
○​ Think of it as: The actual wire or airwaves carrying the electrical or
radio signals.
2.​ Data Link Layer (Layer 2):​
○​ What it does: This layer is responsible for reliable communication
between two devices that are directly connected (on the same local
network). It packages the bits from the Physical Layer into frames and
adds physical addresses (MAC addresses) to identify devices on the
local network. It also handles error detection and correction within that
local link.
○​ Think of it as: Making sure the data gets cleanly from one computer's
network card to another computer's network card on the same floor.
3.​ Network Layer (Layer 3):​

○​ What it does: This layer is all about routing data across different
networks. It uses logical addresses called IP addresses to identify
devices globally. It takes the data from the Transport Layer and
packages it into packets, deciding the best path for these packets to
reach their destination. Routers operate at this layer.
○​ Think of it as: The postal service deciding which route your letter
should take to get to a different city or country.
4.​ Transport Layer (Layer 4):​

○​ What it does: This layer provides end-to-end communication between


applications running on different hosts. Two main protocols operate
here:
■​ TCP (Transmission Control Protocol): Provides reliable, ordered,
and error-checked delivery of data. It breaks data into segments.
Think of it like a guaranteed delivery service with confirmation.
■​ UDP (User Datagram Protocol): Provides faster, but less
reliable, delivery. It also breaks data into segments (often called
datagrams in UDP). Think of it like sending a postcard – quick,
but no guarantee it will arrive or in order.
○​ Think of it as: Managing the flow of information between specific
applications on different computers.
5.​ Application Layer (Layer 5):​

○​ What it does: This is the layer that users directly interact with. It
provides network services to applications. Common protocols at this
layer include:
■​ HTTP (Hypertext Transfer Protocol): Used for web browsing.
■​ FTP (File Transfer Protocol): Used for transferring files.
■​ SMTP (Simple Mail Transfer Protocol): Used for sending
1
emails.
2
■​ DNS (Domain Name System): Translates website names into
IP addresses.
○​ Think of it as: The actual software you use (web browser, email client,
etc.) that needs to communicate over the network.

Protocol Data Units (PDUs):

Specific names:
●​ Application Layer: Data
●​ Transport Layer: Segment (TCP) or Datagram (UDP)
●​ Network Layer: Packet
●​ Data Link Layer: Frame
3
●​ Physical Layer: Bits

If I press Ipconfig on the command it shows me my ip address, subnet mask and my


Deafault Gateway, and when I press ipconfig all I see my subnet mask, Default
Gateway.

nslookup google.com.

https://ccnax.com/binary-decimal-and-hexadecimal-converter/?options=hexadecimal
&tab=reset Link to calculate the decimals.

Okay, let's break down the concepts a bit more for better understanding:

1. Number Systems: Decimal (Base-10) vs. Hexadecimal (Base-16)

●​ Decimal (Base-10): This is the number system we use every day. It has ten
unique digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9. Each position in a decimal number
represents a power of 10. For example, in the number 123:​

○​ The rightmost digit (3) is in the 100 (ones) place.


○​ The middle digit (2) is in the 101 (tens) place.
○​ The leftmost digit (1) is in the 102 (hundreds) place. So,
123=(1×102)+(2×101)+(3×100)=100+20+3.
●​ Hexadecimal (Base-16): This system has sixteen unique symbols: 0, 1, 2, 3,
4, 5, 6, 7, 8, 9, A, B, C, D, E, and F. The letters A through F represent the
decimal values 10 through 15, respectively. Each position in a hexadecimal
number represents a power of 16.
2. Converting from Hexadecimal to Decimal

To convert a hexadecimal number to its decimal equivalent, you multiply the decimal
value of each hexadecimal digit by the corresponding power of 16 based on its
position, and then sum the results. Remember to start the powers of 16 from 0 for
the rightmost digit and increase by one for each position to the left.

●​ Example (from Question 1: E1):​

○​ The rightmost digit is '1', which has a decimal value of 1 and is in the
160 place.
○​ The leftmost digit is 'E', which has a decimal value of 14 and is in the
161 place.
○​ So, (E1)16​=(14×161)+(1×160)=(14×16)+(1×1)=224+1=22510​.
●​ Example (from Question 4: E9):​

○​ The rightmost digit is '9', decimal value 9, in the 160 place.


○​ The leftmost digit is 'E', decimal value 14, in the 161 place.
○​ So, (E9)16​=(14×161)+(9×160)=(14×16)+(9×1)=224+9=23310​.
●​ Example (from Question 6: AB):​

○​ The rightmost digit is 'B', decimal value 11, in the 160 place.
○​ The leftmost digit is 'A', decimal value 10, in the 161 place.
○​ So, (AB)16​=(10×161)+(11×160)=(10×16)+(11×1)=160+11=17110​.

3. Converting from Decimal to Hexadecimal

To convert a decimal number to its hexadecimal equivalent, you repeatedly divide


the decimal number by 16 and record the remainders. The hexadecimal number is
formed by writing the remainders in reverse order of their calculation. If a remainder
is 10 or greater, you need to convert it to its corresponding hexadecimal letter (10=A,
11=B, 12=C, 13=D, 14=E, 15=F).

●​ Example (from Question 2: 199):​

○​ 199÷16=12 remainder 7. (Remainder is 7)


○​ 12÷16=0 remainder 12 (which is 'C' in hex). (Remainder is C)
○​ Reading the remainders in reverse order: C7. So, 19910​=(C7)16​.
●​ Example (from Question 3: 229):​

○​ 229÷16=14 remainder 5. (Remainder is 5)


○​ 14÷16=0 remainder 14 (which is 'E' in hex). (Remainder is E)
○​ Reading the remainders in reverse order: E5. So, 22910​=(E5)16​.

4. Converting Decimal-Dotted IP Addresses to Hexadecimal


An IPv4 address like 10.1.12.123 consists of four 8-bit numbers (octets)
separated by dots. To convert it to hexadecimal, you convert each decimal octet
individually into its 2-digit hexadecimal representation.

●​ Example (from Question 5: 10.1.12.123):​

○​ 10: 10÷16=0 remainder 10 ('A'). So, 10 becomes 0A (we often pad with
a leading zero to ensure two digits).
○​ 1: 1÷16=0 remainder 1. So, 1 becomes 01.
○​ 12: 12÷16=0 remainder 12 ('C'). So, 12 becomes 0C.
○​ 123: 123÷16=7 remainder 11 ('B'); 7÷16=0 remainder 7. So, 123
becomes 7B.
○​ Combining these, we get 0A.01.0C.7B.
●​ Example (from Question 7: 12.254.234.133):​

○​ 12: Converts to 0C.


○​ 254: Converts to FE (254÷16=15 R 14 (F.E)).
○​ 234: Converts to EA (234÷16=14 R 10 (E.A)).
○​ 133: Converts to 85 (133÷16=8 R 5).
○​ Combining these, we get 0C.FE.EA.85.

Yahoo is translated by DNS protocol.

DNS: Resolves domain names (e.g., cnn.com) to IP addresses. You can use tools
like ping or nslookup to find these IPs.​

IP Addresses: Every device on the internet has an IP address. For example, your
machine might have an IPv4 address like 10.0.0.6 and an IPv6 address like
2001:20::2.​

IPv4: A connectionless protocol that sends data without establishing a session. It


doesn't guarantee packet delivery (packets may be lost, corrupted, or misdirected),
and higher protocols like TCP handle retransmissions.​

TCP vs IP: TCP is connection-oriented, forming a session with a three-way


handshake (SYN, SYN-ACK, ACK), whereas IP is connectionless. TCP ensures
reliable delivery, while IP does not.​

Routing: Routers use routing protocols like RIP and OSPF to determine the best
path for data. Routing decisions are based on the network portion of the IP address,
not the host portion.​

IPv4 Address Format: An IPv4 address is 32 bits long, written in dotted decimal
notation (e.g., 10.1.1.1), with each segment (octet) representing 8 bits.​

Address Structure: IP addresses have two parts: the network portion and the host
portion, used for routing packets.​

Unicast and Multicast: Unicast packets are routed based on the destination
address, while multicast packets use the source address.

Pv4 Address: An IPv4 address is a 32-bit binary number, divided into four parts
(octets), each consisting of 8 bits or 1 byte. It's typically written in dotted decimal
notation (e.g., 10.1.1.1), but internally it's a 32-bit binary address.​

Octet: An octet is 8 bits or 1 byte, and an IPv4 address is made up of four octets
(X.X.X.X).​

Address Analogy: Just like house numbers can be the same on different streets,
the same host portion (e.g., "1") can appear on different networks. For example, "1"
can be used on both the 10.1.1.0/24 network and the 12.1.1.0/24 network.​

Classful Addressing:​

●​ Class A: Supports about 16 million IP addresses with 8 network bits and 24


host bits, written as /8.​

●​ Class B: Used for medium-sized networks.​

●​ Class C: Used for smaller networks.​

●​ Class D: Used for multicast.​


●​ Class E: Reserved for experimental purposes.​

CIDR (Classless Inter-Domain Routing): Introduced in 1993 to replace classful


addressing. CIDR allows more flexible allocation of IP addresses and helps with the
shortage of IPv4 addresses.​

Historical Context: Classful addressing was used to classify networks into different
sizes, but it became inefficient as the internet grew, leading to the adoption of CIDR.​

CIDR and Classful Addressing: While CIDR replaced the older classful addressing
system, you may still encounter classful address formats in certain commands (e.g.,
RIP routing).

Class A Addresses:​

●​ First Octet: Starts with a binary 0 in the first bit, so the decimal range for
Class A addresses is from 0.0.0.0 to 127.255.255.255.​

●​ Valid Range: Class A addresses actually range from 1.0.0.0 to


126.255.255.255. The addresses starting with 127 are reserved for Loopback
Addresses (e.g., 127.0.0.1), and 0 is reserved for the default network.​

●​ Network and Host: In Class A, the first 8 bits are for the network portion and
the remaining 24 bits are for the host portion (e.g., 10.1.1.1).​

Class B Addresses:​

●​ First Octet: Starts with binary 10 in the first two bits. The decimal range for
Class B addresses is from 128.0.0.0 to 191.255.255.255.​

●​ Network and Host: In Class B, the first 16 bits are for the network portion
(first 2 octets), and the last 16 bits are for the host portion (last 2 octets). For
example, 172.16.1.1 means 172.16 is the network portion, and 1.1 is the host
portion.

Special IPv4 Addresses:

1.​ Directed Broadcast Address:​


○​ Used to send data to all devices on a specific subnet or network.​

○​ The host portion of the address is filled with binary ones.​

○​ Example: If the network is 172.31.0.0, the directed broadcast address


is 172.31.255.255.​

■​ This happens because the network portion (172.31) is fixed, and


the host portion is filled with binary ones (255 in decimal =
11111111 in binary).​

○​ Directed broadcasts are not routed by default between networks or


VLANs for security reasons.​

○​ Can be used for Denial of Service (DoS) attacks like Smurf attacks.​

2.​ Security Implications of Directed Broadcasts:​

○​ Routers and switches typically block or drop directed broadcast traffic


to avoid abuse (such as DoS attacks).​

○​ Smurf attacks are an example where attackers use directed


broadcasts to cause traffic overload on a target device.​

3.​ Smurf Attack Example:​

○​ In a Smurf attack, a hacker sends a broadcast to a subnet (e.g.,


172.31.255.255), and all devices on that subnet respond to the
attacker’s spoofed source IP address.​

○​ This results in the target device being flooded with traffic, causing a
denial of service.​

Security Recommendations:

●​ Modern routers and switches disable the forwarding of directed broadcasts by


default to prevent such attacks.​

●​ Always ensure that directed broadcast forwarding is disabled for security.

Special IPv4 Address Ranges:


1.​ RFC 1918 – Private IP Addresses:​

○​ These IP addresses are not routable on the internet.​

○​ There are three blocks:​

■​ Class A: 10.0.0.0 to 10.255.255.255​

■​ Class B: 172.16.0.0 to 172.31.255.255​

■​ Class C: 192.168.0.0 to 192.168.255.255​

○​ Network Address Translation (NAT) is used to translate private IP


addresses to public IP addresses when communicating with external
networks (like the internet). This allows private addresses (e.g.,
10.0.0.6) to access public websites (like google.com) by translating to a
public IP (e.g., 15.1.1.1).​

2.​ Link-Local Addresses (RFC 3927):​

○​ Link-local addresses are used when a DHCP server is not available.​

○​ The range for these addresses is 169.254.0.0 to 169.254.255.255.​

○​ Hosts generate random addresses within this range to allow local


communication when DHCP is unavailable.​

○​ For example, two PCs connected directly can use link-local addresses
to communicate without requiring manual IP configuration or a DHCP
server.​

○​ These addresses are not routable beyond the local network. They are
only valid for communication on the local segment.​

3.​ How Link-Local Addresses Work:​

○​ If no DHCP server is found, a device will automatically assign itself an


address in the 169.254.x.x range.​

○​ For instance, a PC with 169.254.1.1 can communicate with another PC


at 169.254.1.2, but neither can communicate with devices outside the
local network.​
○​ The subnet mask for these addresses is typically 255.255.0.0,
meaning the first two octets denote the network portion.​

4.​ Limitations of Link-Local Addresses:​

○​ They are non-routable. While devices on the same local link can
communicate with each other, they cannot reach external devices or
the internet.

Key Steps for the Binary Method:

1.​ Understanding the Subnet Mask:​

○​ The /24 subnet mask means the first 24 bits are for the network, and
the remaining bits are for the host.​

○​ For example, with the IP 192.168.1.18/24, the first three octets


(192.168.1) represent the network portion, and the last octet (18) is for
the host.​

2.​ Working Out Key Addresses:​

○​ Subnet Address: Set all host bits to 0. For 192.168.1.18/24, it


becomes 192.168.1.0.​

○​ First Host Address: Set all host bits to 0 except the last one to 1. For
192.168.1.18/24, it’s 192.168.1.1.​

○​ Last Host Address: Set all host bits to 1 except the last one to 0. For
192.168.1.18/24, it’s 192.168.1.254.​

○​ Broadcast Address: Set all host bits to 1. For 192.168.1.18/24,


it’s 192.168.1.255.​

For More Complex Subnets (like /20):

When dealing with a /20 subnet mask (like 172.16.35.123/20), the split between
the network and host portion occurs in the third octet.

1.​ Converting to Binary:​


○​ Convert the relevant octets into binary to see where the split happens.​

○​ The /20 subnet mask gives 20 network bits, and the remaining 12 bits
are for the host.​

2.​ Calculating Key Addresses for /20:​

○​ Subnet Address: Fill the host bits with 0s, which gives 172.16.32.0.​

○​ First Host Address: Set the last bit of the host portion to 1, which
gives 172.16.32.1.​

○​ Last Host Address: Set all host bits to 1s except the last one, which
gives 172.16.47.254.​

○​ Broadcast Address: Set all host bits to 1s, which gives


172.16.47.255.​

●​ Subnet Address: 172.16.32.0​

●​ First Host Address: 172.16.32.1​

●​ Last Host Address: 172.16.47.254​

●​ Broadcast Address: 172.16.47.255

You might also like