Networking Basics - 17 Modules

Started on 2nd May 2025, finished 11th July 2025

Upon completion of the Networking Basics course, students will be able to perform the following tasks:

  • Explain important concepts in network communication.

  • Explain network types, components, and connections.

  • Configure mobile devices for wireless access.

  • Configure an integrated wireless router and wireless client to connect securely to the internet.

  • Explain the importance of standards and protocols in network communications.

  • Describe common network media.

  • Explain how communication occurs on Ethernet networks.

  • Explain the features of an IP address.

  • Explain how IPv4 addresses are used in network communication and segmentation.

  • Explain features of IPv6 addressing.

  • Configure a DHCP server.

  • Explain how routers connect networks together.

  • Explain how ARP enables communication on a network.

  • Create a fully connected LAN.

  • Explain how clients access internet services.

  • Explain the function of common application layer services.

  • Use various tools to test and troubleshoot network connectivity.

Knowledge on the subject at the start of the course:

lol ^ . 2 months of studuying I got 3 points less than before on the checkpoint exam.

Notes I keep here I mostly things that were new to me OR I just got it wrong in the quiz

Module 1: Communication in a Connected World

Networks installed in small offices, or homes and home offices, are referred to as small office/home office (SOHO) networks

Connected devices (other than the obvious ones):

Radio frequency identification (RFIDs) tags can be placed in or on objects to track them or monitor sensors for many conditions.

Medical Devices

Medical devices such as pacemakers, insulin pumps, and hospital monitors provide users or medical professionals with direct feedback or alerts when vital signs are at specific levels.

Module 1.2.2

TIL: The term bit is an abbreviation of “binary digit”

1.3.1 Bandwidth

Bandwidth is the theoretical number of bits that can be sent across the media in a second. Measured in bits per second. Kbps, Mbps, Gbps...

1.3.2 - Throughput

Like bandwidth, throughput is the measure of the transfer of bits across the media over a given period of time. However, due to a number of factors, throughput does not usually match the specified bandwidth. Many factors influence throughput including:

  • The amount of data being sent and received over the connection

  • The types of data being transmitted

  • The latency created by the number of network devices encountered between source and destination

Module 2: Network Components, Types, and Connections

2.1.3 Peer-to-Peer Networks (P2P)

P2P is network where computers run both client and server software at the same time

What is P2P VPN? [The Ultimate Guide]arrow-up-right

The advantages of peer-to-peer networking:

  • Easy to set up

  • Less complex

  • Lower cost because network devices and dedicated servers may not be required

  • Can be used for simple tasks such as transferring files and sharing printers

The disadvantages of peer-to-peer networking:

  • No centralized administration

  • Not as secure

  • Not scalable

  • All devices may act as both clients and servers which can slow their performance

Module 3: Wireless and Mobile Networks

Question 2: Which wireless technology uses a device-pairing process to communicate and operates over short distances of 100 meters?

Answer: Wireless networks can be broadly classified as follows:

  • Wireless wide-area network (WWAN) – It operates in the range of miles.

  • Wi-Fi – It operates up to distances of 0.18 miles and provides network access to home and corporate users and can include data, voice and video traffic.

  • Bluetooth – It uses a device-pairing process to communicate over distances of up to 0.05 miles.

  • GPS - It uses satellites to transmit signals that cover the globe.

Question 6: Which technology will allow a mobile device to share an internet connection with other devices via tethering? -

Answer: Tethering is commonly done over Bluetooth or a USB cable. A mobile hotspot is another form of internet sharing and is provided over Wi-Fi.

Module 4: Network Technologies in the Home

Bluetooth is a technology that makes use of the 2.4 GHz band

Q: Certain areas of the electromagnetic spectrum can be used without a permit.

A: TRUE

Module 5: Communications Principles

Q: Bianka, a Polish traveler in Hanoi, Vietnam, stops and asks Nguyệt for directions to the Ngoc Son Temple. They verbally communicate and determine that they both speak English. After receiving directions in English to the temple, Bianka repeats them to Nguyệt. Nguyệt says, "Yes, that is correct." Select the order of the communications protocols used in this scenario?

A: Method, language, confirmation

Q: Rory is studying the fields inside an Ethernet frame for an upcoming test and notices that the destination Media Access Control (MAC) address is listed first before the source MAC address. Which of the following protocol characteristics is Rory investigating?

A: Encapsulation

Cisco Networking Academy
Protocol Characteristic
Description

Message Format

Format or Structure

Message size

Very strict and specific rules regarding size

Timing

Speed at which the bits are transmitted. Also when data can be sent and the total amount

Encoding

Message gets converted into bits, then into pattern of sounds, light waves or electrical impulses depending on how its being transmitted

Encapsulation

Matryoshka style - Every layer add a header with information. See pictures bellow

Message pattern

Some messages require an ACKnowledgment

Module 9 IPv4 and Network segmentation

Unicast

1 source IP -> 1 destination IP

Broadcast

1 source IP -> all on the network (but source) will receive the packet

A broadcast packet has a destination IP address with all ones (1s) in the host portion, or 32 one (1) bits.

For example, a host on the 172.16.4.0/24 network sends a packet to 172.16.4.255. A limited broadcast is sent to 255.255.255.255.

Multicast

1 source IP -> to selected IP destinations

IPv4 has reserved the 224.0.0.0 to 239.255.255.255 addresses as a multicast range.

Routing protocols such as OSPF use multicast transmissions.

A broadcast packet has a destination IP address with all ones (1s) in the host portion, or 32 one (1) bits.

Destination 255.255.255.255

Note: IPv4 uses broadcast packets. However, there are no broadcast packets with IPv6.

Private IP ranges

Private networks can use several IP address ranges assigned by the Internet Assigned Numbers Authority (IANA). These reserved IP address ranges are used by millions of private networks around the world. Private networks should utilize the following address ranges:

  • Class A- 10.0.0.0 to 10.255.255.255

  • Class B- 172.16.0.0 to 172.31.255.255

  • Class C- 192.168.0.0 to 192.168.255.25

Public IP ranges

All addresses outside private IP address ranges are considered public. But all the IP addresses that fall into one of the following predefined public IP address ranges are definitely public IP addresses. Public IP addresses are significantly more common than private IP addresses, and the public IP address ranges are:

  • 1.0.0.0 – 9.255.255.255

  • 11.0.0.0 – 126.255.255.255

  • 129.0.0.0 – 169.253.255.255

  • 169.255.0.0 – 172.15.255.255

  • 172.32.0.0 – 191.0.1.255

  • 192.0.3.0 – 192.88.98.255

  • 192.88.100.0 – 192.167.255.255

  • 192.169.0.0 – 198.17.255.255

  • 198.20.0.0 – 223.255.255.255

Subnetting

Subnetting reduces overall network traffic and improves network performance. It also enables an administrator to implement security policies such as which subnets are allowed or not allowed to communicate together. Another reason is that it reduces the number of devices affected by abnormal broadcast traffic due to misconfigurations, hardware/software problems, or malicious intent.

Subnetting by Location
Subnetting by Group of Function
Subnetting by Device Type

Module 10 IPv6

Dual stack

Dual stack allows both ipv4 and ipv6 to coexist on the same network

Dual Stack

Tunnelling

Tunnelling is a method of transporting an IPv6 packets over IPv4 network. The IPv6 packet is encapsulated inside the IPv4 packet

Tunneling

Translation

Network Address Translation 64 (NAT64) allows IPv4 or IPv6 packets to be translated from one "language" to another

IPv4 -> IPv6.

IPv6 -> IPv4

Translation

Note: Tunnelling and translation are for transitioning to native IPv6 and should only be used where needed. The goal should be native IPv6 communications from source to destination.

Module 11 - DHCP

DHCPDISCOVER (Broadcast)

  • The host (client) sends a DHCPDISCOVER message to 255.255.255.255 to find available DHCP servers.

  • All DHCP servers on the local network receive this broadcast.


2. DHCPOFFER (Unicast or Broadcast)

  • Each DHCP server that receives the DISCOVER responds with a DHCPOFFER, which includes an available IP address and configuration info.

  • These offers are either broadcast back or unicast to the client, depending on the situation.


3. DHCPREQUEST (Broadcast)

  • The client selects one of the offers (typically the first it receives) and sends a DHCPREQUEST message.

  • This request is broadcast so that all DHCP servers know which offer the client accepted.


4. DHCPACK (Unicast or Broadcast)

  • The DHCP server whose offer was accepted replies with a DHCPACK, finalizing the lease.

  • Other DHCP servers, seeing the DHCPREQUEST, withdraw their offers and do not respond.


Summary of Message Flow:

Step
Message
Direction
Purpose

1

DHCPDISCOVER

Client → Broadcast

Find DHCP servers

2

DHCPOFFER

Servers → Client

Offer IP and settings

3

DHCPREQUEST

Client → Broadcast

Accept one offer

4

DHCPACK

Chosen Server → Client

Confirm lease

Module 12: Gateways to Other Networks

From this point onwards, I'll try to make note of at least 1 thing from each module.

NAT (Network Address Translation) saved the world

Q1: A computer has to send a packet to a destination host in the same LAN. How will the packet be sent?

A1: The packet will be sent directly to the destination host.

If the destination host is in the same LAN as the source host, there is no need for a default gateway. A default gateway is needed if a packet needs to be sent outside the LAN.

Q5: If the default gateway is configured incorrectly on a host, what is the impact on communications?

In data communication, the default gateway device is involved only when a host needs to communicate with other hosts on another network. The default gateway address identifies a network device that a host device uses to communicate with devices on other networks. The default gateway device is not used when a host communicates with other hosts on the same network.

Module 13: The ARP Process (Address Resolution Protocol)

IP Address is a logical address

Q:What two protocols are used to determine the MAC address of a known destination device IP address (IPv4 and IPv6)?

A: Address Resolution Protocol (ARP) is used to determine the device MAC address of a known destination device IPv4 address. Neighbor Discovery Protocol(NDP) is used to determine the MAC address of a known destination device IPv6 address.

ARP table is stored in RAM

The destination MAC address for an Ethernet broadcast is FFFF.FFFF.FFFF. The broadcast MAC address is a 48-bit address made up of all ones . Each F in the hexadecimal notation represents four ones in the binary address.

When an Ethernet switch receives a frame that is broadcast, it will forward the frame out all ports except the incoming port.

An ARP request is a broadcast, so all devices on the network will receive it.

A host will send an ARP reply if the IP address in the ARP request matches its own IP address.

An ARP reply will include the IP and MAC address of the host that sent the reply

IPv6 uses a similar method known as Neighbor Discovery.

In order for PC1 to communicate with PC2, PC1 needs to know MAC address of PC2. This where ARP comes in.

23/06/25

Module 14: Routing Between Networks

Devices that are beyond the local network segment are known as remote hosts

Routing is the process of identifying the best path to a destination.

You would divide a network into multiple smaller networks to maintain smaller broadcast domains and increase network security.

Routers divide a network into smaller networks.

The important thing to remember is that all the local networks within a LAN are under one administrative control

There are many ways to divide networks based on different criteria:

  • Broadcast containment - Routers in the distribution layer can limit broadcasts to the local network where they need to be heard.

  • Security requirements - Routers in the distribution layer can separate and protect certain groups of computers where confidential information resides.

  • Physical locations - Routers in the distribution layer can be used to interconnect local networks at various locations of an organization that are geographically separated.

  • Logical grouping - Routers in the distribution layer can be used to logically group users, such as departments within a company, who have common needs or for access to resources.

Took 2 tries to get 75%

Checkpoint Exam

first try:

Routing between networks 14.3% ?! :(
Second try was much better

Module 15: TCP and UDP

Well known ports: 1 to 1023 - For all the services you've definitely heard of

Registered Ports: 1024 to 49151 - specific applications such as IM applications

Private Ports: 49152 to 65535 - usualy source ports. Used by any application

Well-known ports and their associated applications

Socket Pairs

TIL source port of a service is dynamically generated by the host

Together, these two sockets combine to form a socket pair: 192.168.1.5:1099, 192.168.1.7:80

Sockets enable multiple processes, running on a client, to distinguish themselves from each other, and multiple connections to a server process to be distinguished from each other.

Netstat command will show all active connections to a localhost

By default, the netstat command will attempt to resolve IP addresses to domain names and port numbers to well-known applications. The -n option can be used to display IP addresses and port numbers in their numerical form.

ChatGpt's ELI5 breakdown of Segments, Packets, Frames, Fragments and Datagrams

Sure! Here's an ELI5 (Explain Like I'm 5) breakdown of these terms using a fun mail delivery analogy. Imagine you're sending a toy robot to your friend across the country:


🧩 Segment – The Box of Robot Parts

You take your toy robot apart and pack its pieces into boxes. Each box might say “Head,” “Arms,” “Legs.” These boxes are segments — they carry part of the robot and are labeled so your friend knows how to put them back together.

➡️ In computers: A segment comes from the Transport Layer (like TCP). It’s part of the original message your computer wants to send.


✉️ Packet – The Addressed Parcel

Now, you write your friend's name and street address on the boxes so the postal service knows where to send them. This makes each box a packet.

➡️ In computers: A packet is a segment with an IP address — it comes from the Network Layer. It's like, "Hey, deliver this to 192.168.1.12!"


📦 Frame – The Mail Truck Load

The mail truck needs to deliver your box to the right house on the street. It doesn't care about the city or post code, just the local delivery. So the box goes into a mail truck, which reads local delivery info.

➡️ In computers: A frame is a packet with a MAC address added — the Data Link Layer handles it. Think: "Take this to the right device on this street (local network)."


💣 Fragment – Cutting a Big Box into Smaller Boxes

What if your box is too big for the truck? You cut it into smaller boxes labeled “Part 1 of 3,” “Part 2 of 3,” etc. That’s fragmentation.

➡️ In computers: A fragment is a piece of a packet that was too big and had to be broken up for travel across a network.


📮 Datagram – A One-Way Postcard

This is like sending a postcard. You write a quick message, address it, and send it off. You don’t know if it got there, but it’s fast and simple.

➡️ In computers: A datagram is a packet sent using UDP (no delivery confirmation). It’s like, “Hey! Hope you get this!”


TL;DR:

Term
Analogy
Layer
Key Idea

Segment

Box of robot parts

Transport

Part of original message

Packet

Addressed parcel

Network

Segment + IP address

Frame

Mail truck load

Data Link

Packet + MAC address

Fragment

Cut-up big box

Network

A piece of a large packet

Datagram

One-way postcard

Transport (UDP)

Fast, no delivery guarantee

15.3.3 TCP and UDP Quiz on 02/07/2025

Module 16: Application Layer Services

11/07/25

Module 17: Network Testing Abilities

lol ^ . 2 months of studuying I got 3 points less than before on the checkpoint exam.

Last updated