Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
23 views40 pages

NCC 311

The document discusses the impact of networks on daily life, highlighting their role in communication, business, education, healthcare, and entertainment. It outlines the functions of host and network devices, network representations, common types of networks, and the interconnection of LANs and WANs to the Internet. Additionally, it covers network reliability requirements, security threats, employment opportunities in networking, communication rules, protocols, and the physical layer's characteristics and functions.

Uploaded by

alepikinsamson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views40 pages

NCC 311

The document discusses the impact of networks on daily life, highlighting their role in communication, business, education, healthcare, and entertainment. It outlines the functions of host and network devices, network representations, common types of networks, and the interconnection of LANs and WANs to the Internet. Additionally, it covers network reliability requirements, security threats, employment opportunities in networking, communication rules, protocols, and the physical layer's characteristics and functions.

Uploaded by

alepikinsamson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 40

D lOMoARcPSD|51300743

UMARU ALI SHINKAFI POLYTECHNIC SOKOTO


1.1 Explain How Networks Affect Our Daily Lives
DEPARTMENT OF COMPUTER SCIENCE
HNDNCC 1
 Networks connect people, businesses, and communities, enabling communication,

collaboration, and innovation.

 Applications in Daily Life:

o Communication: Social media, emails, video calls (e.g., Zoom, WhatsApp).

o Business: E-commerce, online transactions, and remote work.

o Education: Online learning platforms and resources (e.g., Coursera, Khan

COURSE
Academy). TITLE: NETWORKING ESSENTIALS
Healthcare: Telemedicine, patient databases, and health monitoring devices.
o
COURSE CODE: NCC 311
o Entertainment: Streaming services like Netflix and online gaming platforms.
DEPARTMENT: NETWORKING AND CLOUD COMPUTING
o Smart Devices: IoT (Internet of Things) devices like smart homes and wearable

COURSE LECTURER: MAL. RILWANU YUSUF GIGANE


fitness trackers.

1.2 Outline How Host and Network Devices Are Used


FIRST SEMESTER LECTURE MATERIAL
 Host Devices:

o End devices that directly interact with users, such as computers, smartphones,

tablets, printers, and smart TVs.

o Serve as either clients (requesting services) or servers (providing services).

 Network Devices:

o Devices that enable communication between hosts and networks:

. Routers: Connect different networks and direct traffic efficiently.

. Switches: Connect multiple devices within the same network.

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

. Access Points (AP): Provide wireless connectivity to devices.

. Firewalls: Enhance network security by filtering traffic.

1.3 Outline Network Representations and How They Are Used in Network

Topologies

 Network Representations:

o Use diagrams or schematics to visualize devices and their interconnections.

o Symbols represent components: circles (routers), rectangles (switches), and lines

(connections).

 Network Topologies:

o Physical Topology: The physical arrangement of cables and devices.

o Logical Topology: The way data flows within the network.

o Common topologies:

. Star: Devices connected to a central hub or switch.

. Bus: All devices share a single communication line.

. Ring: Devices connected in a circular loop.

. Mesh: Multiple connections for redundancy and reliability.

1.4 List the Characteristics of Common Types of Networks

 Personal Area Network (PAN):

o Short range, usually for personal devices like Bluetooth or infrared.

 Local Area Network (LAN):

o Limited to a single location (e.g., office, home).

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

o High-speed, low-cost communication.

 Wide Area Network (WAN):

o Covers large geographical areas (e.g., the Internet).

o Connects multiple LANs using routers.

 Metropolitan Area Network (MAN):

o Spans a city or large campus.

o Combines characteristics of LANs and WANs.

 Wireless Networks:

o Use radio signals (Wi-Fi, cellular networks).

1.5 Outline How LANs and WANs Interconnect to the Internet

 LAN:

o Devices within the LAN connect via switches or wireless access points.

o Routers connect the LAN to a WAN or the Internet.

 WAN:

o Utilizes leased lines, satellite links, or broadband connections to connect LANs

over large distances.

o Service Providers (ISPs) manage WAN links to connect users to the Internet.

1.6 Explain the Four Basic Requirements of a Reliable Network

1. Fault Tolerance:

o Redundancy through backup paths and devices ensures minimal downtime.

2. Scalability:

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

o Ability to expand without degrading performance.

3. Quality of Service (QoS):

o Prioritizes critical traffic, such as voice or video.

4. Security:

o Protects data and devices with encryption, firewalls, and antivirus software.

1.7 Outline How Trends Are Changing the Way We Interact

1. BYOD (Bring Your Own Device):

o Employees use personal devices, increasing flexibility and productivity.

2. Online Collaboration:

o Tools like Google Workspace, Microsoft Teams allow remote teamwork.

3. Video Streaming:

o Platforms like YouTube, Twitch enable content sharing and learning.

4. Cloud Computing:

o Storing and accessing data on remote servers, e.g., Google Drive, AWS.

1.8 Explain Some Basic Security Threats and Solutions for All Networks

 Common Threats:

o Malware (viruses, ransomware), phishing, DDoS attacks, unauthorized access.

 Solutions:

o Antivirus software: Detects and removes malicious files.

o Firewalls: Blocks unauthorized traffic.

o Encryption: Secures data during transmission.

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

o User Training: Educates on recognizing phishing and safe practices.

1.9 Outline Employment Opportunities in the Networking Field

 Job Roles:

o Network Administrator: Manages daily operations of networks.

o Network Engineer: Designs and implements network solutions.

o Cybersecurity Analyst: Protects networks from security breaches.

o Cloud Architect: Builds cloud-based infrastructures.

o IT Support Specialist: Resolves networking and hardware issues.

 Certifications:

o Cisco (CCNA, CCNP), CompTIA (Network+, Security+), AWS Certified

Solutions Architect.

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

2.1 Outline the Types of Rules Necessary to Successfully Communicate

 Rules of Communication:

o Message Format: The structure of the message (e.g., email, voice, or data).

o Timing: Defines when to send, receive, or acknowledge information (e.g., turn-

taking in conversations, data transmission timing in networks).

o Encoding: Process of converting information into a format for transmission (e.g.,

digital signals).

o Error Detection and Correction: Ensures accurate message delivery by

identifying and correcting errors.

o Acknowledgment: Confirms that the message has been received successfully.

o Flow Control: Prevents data congestion by controlling the pace of

communication.

2.2 Narrate Why Protocols Are Necessary for Network Communication

 Importance of Protocols:

o Establish rules for communication between devices, ensuring compatibility and

interoperability.

o Define how data is formatted, transmitted, received, and processed.

o Ensure reliability and accuracy by addressing issues like error handling, flow

control, and data integrity.

o Examples: TCP (for reliable communication), HTTP (for web browsing), and

SMTP (for email).

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

2.3 Outline the Purpose of Adhering to a Protocol Suite

 A protocol suite is a set of protocols that work together to ensure seamless

communication.

 Purpose:

o Simplifies network communication by dividing it into layers (e.g., TCP/IP

model).

o Provides a standardized approach, enabling devices from different vendors to

communicate.

o Ensures scalability, reliability, and security in data transmission.

2.4 Outline the Role of Standards Organizations in Establishing Protocols for Network

Interoperability

 Standards Organizations:

o Define protocols and guidelines to ensure compatibility between devices and

networks.

o Examples:

. IETF (Internet Engineering Task Force): Develops internet standards

like TCP/IP.

. ISO (International Organization for Standardization): Developed the

OSI model.

. IEEE (Institute of Electrical and Electronics Engineers): Responsible

for Ethernet standards (e.g., IEEE 802.3).

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

. ITU (International Telecommunication Union): Defines

telecommunication protocols.

o Role: Ensure global interoperability, enabling seamless communication across

devices and networks.

2.5 Outline How the TCP/IP Model and OSI Model Facilitate Standardization in the

Communication Process

 TCP/IP Model:

o A practical framework with four layers (Application, Transport, Internet, and

Network Access).

o Focuses on the internet and real-world communication protocols.

o Enables end-to-end communication and internet connectivity.

 OSI Model:

o A theoretical model with seven layers (Application, Presentation, Session,

Transport, Network, Data Link, and Physical).

o Provides a standardized approach for designing and implementing networks.

 Facilitation of Standardization:

o Both models define roles and responsibilities for each layer, ensuring consistent

communication.

o Promote compatibility and interoperability across devices and vendors.

2.6 Outline How Data Encapsulation Allows Data to Be Transported Across the Network

 Data Encapsulation Process:

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

o Data is wrapped in protocol headers as it moves through the layers of a network

model (e.g., TCP/IP).

o Encapsulation steps:

1. Application Layer: Data is created.

2. Transport Layer: Adds transport headers (e.g., TCP/UDP).

3. Network Layer: Adds IP headers for addressing.

4. Data Link Layer: Adds MAC headers and trailers for local delivery.

5. Physical Layer: Converts data into signals for transmission.

o At the destination, the process is reversed (decapsulation).

2.7 Outline How Local Hosts Access Local Resources on a Network

 Local Resource Access:

o IP Address: Identifies the device within a network.

o DNS (Domain Name System): Resolves human-readable names (e.g.,

www.example.com) into IP addresses.

o Switches: Direct communication within the local network by using MAC

addresses.

o Network Services: File sharing, printing, or accessing shared databases within

the LAN.

2.8 Contrast the Roles of the MAC Address and the IP Address

 MAC Address:

o Hardware address assigned to network interface cards (NICs).

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

o Unique to the device and operates at the Data Link Layer.

o Used for local network communication (e.g., within a LAN).

 IP Address:

o Logical address assigned to a device by the network.

o Operates at the Network Layer and facilitates communication across different

networks.

o Can be dynamic (assigned via DHCP) or static.

2.9 Explain the Purpose of ARP (Address Resolution Protocol)

 Purpose of ARP:

o Resolves IP addresses into MAC addresses for local communication.

o Ensures that devices on the same LAN can communicate by mapping logical

addresses (IP) to physical addresses (MAC).

o Example: A device sends an ARP request asking, "Who has this IP?" The device

with the matching IP responds with its MAC address.

2.10 Explain the Operation of IPv6 Neighbor Discovery

 IPv6 Neighbor Discovery (ND):

o Replaces ARP in IPv6 networks.

o Functions:

. Address Resolution: Maps IPv6 addresses to MAC addresses.

. Neighbor Unreachability Detection: Ensures devices are reachable.

. Router Discovery: Identifies available routers on the network.

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

. Duplicate Address Detection (DAD): Ensures unique IPv6 addresses.

2.11 Outline How ICMP Is Used to Test Network Connectivity

 Internet Control Message Protocol (ICMP):

o Diagnoses and resolves network issues.

o Functions:

. Ping: Tests connectivity between devices by sending echo requests and

waiting for replies.

. Traceroute: Identifies the path data takes across networks.

. Error Reporting: Alerts devices to issues like unreachable destinations.

2.12 Explain the Techniques of Ensuring Successful Communication Between Devices

 Techniques:

o Standardized Protocols: Use of TCP/IP, HTTP, or FTP for consistent

communication.

o Error Detection and Correction: Ensures data integrity during transmission.

o Flow Control: Manages the rate of data transfer to prevent congestion.

o Quality of Service (QoS): Prioritizes critical traffic like video or voice.

o Encryption: Secures data during transmission to prevent unauthorized access.

o Device Configuration: Proper IP addressing, DNS settings, and routing.

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

3.1 Explain the Purpose and Functions of the Physical Layer in the Network

 Purpose:

o The physical layer is responsible for the actual transmission of raw data bits over

a physical medium between devices.

 Functions:

o Defines hardware specifications (cables, connectors, and transmission medium).

o Converts data into electrical, optical, or radio signals.

o Establishes and terminates physical connections.

o Ensures proper synchronization between sender and receiver.

3.2 Explain the Characteristics of the Physical Layer

 Provides a data transmission medium (copper, fiber optic, or wireless).

 Defines the type of signal used (analog or digital).

 Determines data rate, voltage levels, and timing of signal transitions.

 Includes elements such as repeaters, hubs, and cables.

3.3 Explain the Basic Characteristics of Copper Cabling

 Characteristics:

o Twisted Pairs: Reduces electromagnetic interference (EMI).

o Shielding: Protects cables from external noise.

o Bandwidth: Limited compared to fiber optics.

o Cost: Affordable and widely available.

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

o Susceptible to attenuation and crosstalk.

3.4 Explain How UTP Cable is Used in Ethernet Networks

 UTP (Unshielded Twisted Pair):

o Common in Ethernet LANs due to its flexibility and cost-effectiveness.

o Category Standards: Cat5, Cat5e, Cat6, and higher for varying speeds.

o Connection: Terminated with RJ-45 connectors.

o Uses: Transmits data up to 1 Gbps (or higher with advanced categories).

3.5 Explain Fiber Optic Cabling and Its Main Advantages Over Other Media

 Fiber Optic Cabling:

o Transmits data using light signals through glass or plastic fibers.

 Advantages:

o High bandwidth and long-distance capabilities.

o Immunity to EMI and radio frequency interference.

o Greater security since it’s harder to tap into.

o Reduced signal loss compared to copper cables.

3.6 Explain Network Devices Using Wired and Wireless Media

 Wired Media Devices:

o Switches: Connect devices within a LAN.

o Routers: Direct data packets between networks.

o Hubs: Broadcast data to all connected devices.

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

 Wireless Media Devices:

o Access Points (APs): Provide wireless connectivity.

o Wireless Routers: Combine routing and wireless functions.

o Adapters: Enable wireless functionality on devices.

3.7 List the Purpose and Function of the Data Link Layer in Preparing Communication for

Transmission on Specific Media

 Purpose:

o Facilitates communication between devices over a specific medium.

 Functions:

o Encapsulation of data into frames.

o Error detection and correction.

o Media access control to avoid collisions.

3.8 List the Characteristics of Media Access Control Methods on WAN and LAN

Topologies

 WAN Topologies:

o Use protocols like PPP, HDLC, or Frame Relay.

o Allocate bandwidth dynamically.

 LAN Topologies:

o Use CSMA/CD or CSMA/CA for managing collisions.

o Define how devices share the medium (e.g., Ethernet).

3.9 Explain the Characteristics and Functions of the Data Link Frame

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

 Characteristics:

o Divides data into manageable frames for transmission.

o Contains headers and trailers for addressing and error checking.

 Functions:

o Ensures proper delivery through MAC addressing.

o Handles error detection using checksums or CRC.

3.10 Explain How the Network Layer Uses IP Protocols for Reliable Communications

 IP Protocols:

o IPv4 and IPv6: Assign logical addresses for routing data.

o Provides fragmentation and reassembly of packets.

o Enables routing between networks.

3.11 Explain the Role of the Major Header Fields in the IPv4 Packet

 IPv4 Header Fields:

o Source IP Address: Identifies the sender.

o Destination IP Address: Identifies the receiver.

o Time-to-Live (TTL): Limits the lifespan of a packet.

o Checksum: Ensures data integrity.

o Protocol: Specifies the higher-layer protocol (e.g., TCP/UDP).

3.12 Explain the Role of the Major Header Fields in the IPv6 Packet

 IPv6 Header Fields:

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

o Source and Destination Address: Longer (128-bit) addresses for scalability.

o Traffic Class: Defines priority.

o Hop Limit: Replaces TTL in IPv4.

o Payload Length: Indicates data size.

3.13 Explain How Network Devices Use Routing Tables to Direct Packets to a Destination

Network

 Routing Tables:

o Contain information about routes to various networks.

o Used by routers to determine the best path for packet delivery.

o Include fields like destination, next hop, and metric.

3.14 Explain the Functions of Fields in the Routing Table

 Fields:

o Destination Network: Identifies target network.

o Next Hop: Address of the next router or gateway.

o Metric: Indicates the cost of the route.

o Interface: Specifies the outgoing network interface.

3.15 Explain the Purpose of the Transport Layer in Managing the Transportation of Data

in End-to-End Communication

 Ensures reliable delivery of data across networks.

 Segments data for transmission and reassembles it at the destination.

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

 Provides error detection and correction.

3.16 List the Characteristics of TCP

 Reliable and connection-oriented.

 Provides error recovery and flow control.

 Uses acknowledgments to ensure delivery.

3.17 List Characteristics of UDP

 Unreliable and connectionless.

 No error checking or flow control.

 Faster than TCP, suitable for real-time applications.

3.18 Describe How TCP and UDP Use Port Numbers

 Port numbers identify specific processes or services on a host.

 Examples:

o TCP: HTTP (port 80), HTTPS (port 443).

o UDP: DNS (port 53), VoIP (varied ports).

3.19 Explain How TCP Session Establishment and Termination Processes Facilitate

Reliable Communication

 Establishment: Uses a three-way handshake (SYN, SYN-ACK, ACK).

 Termination: Ensures all data is transmitted before closing the connection.

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

3.20 Explain How TCP Protocol Data Units Are Transmitted and Acknowledged to

Guarantee Delivery

 Divides data into segments and assigns sequence numbers.

 Receiver sends acknowledgments for received data.

 Lost segments are retransmitted.

3.21 Explain the Operations of Transport Layer Protocols in Supporting End-to-End

Communication

 TCP ensures reliable delivery.

 UDP provides fast delivery for time-sensitive applications.

3.22 Explain How the Functions of the Application Layer, Presentation Layer, and Session

Layer Work Together to Provide Network Services

 Application Layer: Interfaces with end-user applications.

 Presentation Layer: Ensures data formatting, encryption, and compression.

 Session Layer: Manages and maintains sessions between devices.

3.23 Explain How End-User Applications Operate in a Peer-to-Peer Network

 Devices communicate directly without a central server.

 Example: File sharing or instant messaging

3.24 Explain How Web and Email Protocols Operate

 Web Protocols: HTTP/HTTPS manage website communication.

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

 Email Protocols: SMTP, IMAP, and POP3 handle email sending and receiving.

3.25 Explain How DNS and DHCP Operate

 DNS: Resolves domain names to IP addresses.

 DHCP: Dynamically assigns IP addresses to devices on a network.

3.26 Explain How File Transfer Protocols Operate

 FTP (File Transfer Protocol): Enables file uploads and downloads between devices.

 Supports authentication and secure data transfer.

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

4.1 Describe How the Ethernet Sublayers Are Related to the Frame Fields

Ethernet operates at Layer 2 (Data Link Layer) of the OSI model and is divided into two

sublayers:

1. Logical Link Control (LLC) Sublayer

 Purpose:

o The LLC sublayer is responsible for providing communication between the upper

layers (network layer) and the lower layers (MAC).

o It identifies network protocols like IPv4, IPv6, ARP, etc., and provides error

checking and flow control.

 Relation to Frame Fields:

o The LLC sublayer defines the Ethernet frame's Type field, which indicates the

protocol being used (e.g., IPv4 or IPv6).

2. Media Access Control (MAC) Sublayer

 Purpose:

o The MAC sublayer controls access to the physical medium and ensures frames are

properly formatted before transmission.

o It determines how devices in the same network share access to the transmission

medium.

 Relation to Frame Fields:

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

o The MAC sublayer manages key frame fields like:

. Source MAC Address: Identifies the sender's MAC address.

. Destination MAC Address: Identifies the recipient's MAC address.

. FCS (Frame Check Sequence): Ensures data integrity by detecting errors

during transmission.

4.2 Describe the Ethernet MAC Address

What Is a MAC Address?

 A Media Access Control (MAC) address is a 48-bit (6-byte) unique identifier assigned

to a network interface card (NIC).

 It is represented in hexadecimal format (e.g., 00:1A:2B:3C:4D:5E).

Structure of a MAC Address:

1. First 24 bits (OUI - Organizationally Unique Identifier):

o Identifies the manufacturer of the NIC.

o Assigned by the IEEE.

2. Last 24 bits (NIC-Specific):

o Uniquely identifies the device within the manufacturer’s range.

Types of MAC Addresses:

 Unicast MAC Address: Specifies a single destination device.

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

 Multicast MAC Address: Used to deliver frames to multiple devices (e.g., for

streaming).

 Broadcast MAC Address: Represents all devices on a local network

(FF:FF:FF:FF:FF:FF).

4.3 Describe How a Switch Builds Its MAC Address Table and Forwards Frames

Building a MAC Address Table:

1. Learning:

o When a frame enters a switch, the switch inspects the frame’s Source MAC

Address.

o If the MAC address is not in the MAC address table, the switch adds it along with

the port number the frame came from.

o The table maps each MAC address to a specific switch port.

2. Aging:

o Entries in the MAC table are removed after a certain period if no traffic is

received from that address.

Forwarding Frames:

1. Unicast:

o The switch checks the Destination MAC Address in the frame and forwards it to

the port associated with the MAC address in its table.

2. Broadcast:

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

o If the Destination MAC Address is a broadcast address, the switch forwards the

frame to all ports except the incoming one.

3. Unknown MAC Address:

o If the Destination MAC Address is not in the table, the switch floods the frame to

all ports except the incoming one.

4.4 Describe Switch Forwarding Methods and Port Settings Available on Layer 2 Switch

Ports

Switch Forwarding Methods:

1. Store-and-Forward:

o The switch receives the entire frame, checks it for errors using the FCS, and then

forwards it.

o Advantages: High reliability, as it ensures only error-free frames are transmitted.

2. Cut-Through:

o The switch begins forwarding the frame as soon as it reads the Destination MAC

Address (before the entire frame is received).

o Advantages: Lower latency.

o Disadvantages: May forward frames with errors.

3. Fragment-Free:

o The switch reads the first 64 bytes of the frame before forwarding.

o Ensures that collisions are detected since most errors occur in the first 64 bytes.

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

Port Settings Available on Layer 2 Switch Ports:

1. Speed and Duplex:

o Speed: Specifies the port speed (10 Mbps, 100 Mbps, 1 Gbps, etc.).

o Duplex: Defines whether communication is half-duplex (one direction at a time)

or full-duplex (both directions simultaneously).

2. Port Security:

o Restricts the devices allowed on a port based on MAC addresses.

o Can prevent unauthorized access by limiting the number of MAC addresses per

port.

3. VLAN Assignment:

o Ports can be assigned to specific Virtual LANs (VLANs) for logical segmentation

of the network.

4. Auto-Negotiation:

o Allows the port to automatically configure speed and duplex settings based on the

connected device.

5. Power over Ethernet (PoE):

o Some switch ports support PoE, supplying power to devices like IP phones and

cameras over Ethernet cables.

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743
MoARcPSD|51300743

5.1 Explain How to Convert Numbers Between Decimal and Binary Systems

Decimal to Binary:

1. Divide the decimal number by 2.

2. Record the remainder (0 or 1).

3. Continue dividing the quotient by 2 until the quotient is 0.

4. Write the remainders in reverse order to get the binary number.

Example:

Convert 13 to binary:

13 ÷ 2 = 6 remainder 1

6 ÷ 2 = 3 remainder 0

3 ÷ 2 = 1 remainder 1

1 ÷ 2 = 0 remainder 1

Binary: 1101

Binary to Decimal:

1. Write down the binary number.

2. Multiply each bit by 2 raised to the power of its position (starting from 0 on the right).

3. Add up the results.

Example:

Convert 1101 to decimal:

(1 × 2³) + (1 × 2²) + (0 × 2¹) + (1 × 2⁰) = 8 + 4 + 0 + 1 = 13

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

5.2 Explain How to Convert Numbers Between Decimal and Hexadecimal Systems

Decimal to Hexadecimal:

1. Divide the decimal number by 16.

2. Record the remainder (0–9 or A–F for values 10–15).

3. Continue dividing the quotient by 16 until the quotient is 0.

4. Write the remainders in reverse order.

Example:

Convert 255 to hexadecimal:

255 ÷ 16 = 15 remainder 15 → F

15 ÷ 16 = 0 remainder 15 → F

Hexadecimal: FF

Hexadecimal to Decimal:

1. Write down the hexadecimal number.

2. Multiply each digit by 16 raised to the power of its position (starting from 0 on the right).

3. Add up the results.

Example:

Convert 1A to decimal:

(1 × 16¹) + (10 × 16⁰) = 16 + 10 = 26

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

5.3 Explain the Structure of an IPv4 Address

An IPv4 address is a 32-bit number divided into four 8-bit segments, written in dotted-decimal

format (e.g., 192.168.1.1). Each segment is a value between 0 and 255.

Components:

1. Network Portion:

o Identifies the network to which the device belongs.

o Determined by the subnet mask.

2. Host Portion:

o Identifies a specific device within the network.

3. Subnet Mask:

o Defines how many bits are used for the network portion versus the host portion.

o Example: 255.255.255.0 or /24.

5.4 Analyse the Characteristics and Uses of Unicast, Broadcast, and Multicast IPv4

Addresses

Unicast:

 Used for one-to-one communication between devices.

 Example: Sending data to a specific device on the network.

Broadcast:

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

 Sends data to all devices on a network.

 Example: IPv4 address 255.255.255.255.

Multicast:

 Sends data to multiple specific devices in a group.

 Example: 224.0.0.0 to 239.255.255.255.

5.5 Describe Public, Private, and Reserved IPv4 Addresses

Public IPv4 Addresses:

 Globally unique addresses used on the internet.

 Example: 8.8.8.8 (Google DNS).

Private IPv4 Addresses:

 Used within private networks and not routable on the internet.

 Examples:

o 10.0.0.0 – 10.255.255.255

o 172.16.0.0 – 172.31.255.255

o 192.168.0.0 – 192.168.255.255

Reserved IPv4 Addresses:

 Set aside for special purposes (e.g., testing, loopback).

 Examples:

o Loopback: 127.0.0.1

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

o APIPA: 169.254.0.0

5.6 Describe How Subnetting Segments a Network to Enable Better Communication

 Subnetting divides a larger network into smaller sub-networks to improve efficiency and

security.

 Reduces broadcast domains, improving network performance.

 Enables better organization of IP addresses.

5.7 Compute IPv4 Subnets for a /24 Prefix

Example:

 Given: /24 subnet mask = 255.255.255.0.

 Subnetting into 4 subnets:

o Increment: 256 ÷ 4 = 64.

o Subnets:

. 192.168.1.0 – 192.168.1.63

. 192.168.1.64 – 192.168.1.127

. 192.168.1.128 – 192.168.1.191

. 192.168.1.192 – 192.168.1.255

5.8 Describe the Need for IPv6 Addressing

 IPv4 addresses are running out due to the growth of internet-connected devices.

 IPv6 offers a vastly larger address space (128 bits).

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

5.9 Describe How IPv6 Addresses Are Represented

 IPv6 addresses are written in hexadecimal and separated by colons (:).

 Example: 2001:0db8:85a3:0000:0000:8a2e:0370:7334

 Can be abbreviated by omitting leading zeros or replacing consecutive zero fields with ::.

5.10 Contrast Types of IPv6 Network Addresses

1. Global Unicast:

o Publicly routable addresses similar to IPv4 public addresses.

o Example: 2001:db8::/32.

2. Link-Local:

o Used for communication within a local link.

o Automatically assigned.

o Example: FE80::/10.

3. Multicast:

o Sends packets to a group of devices.

o Example: FF00::/8.

4. Anycast:

o Delivers packets to the nearest node in a group.

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

5.11 Describe How to Configure Static Global Unicast and Link-Local IPv6 Network

Addresses

Static Global Unicast:

 Manually assign an address using a specific prefix.

 Example configuration:

ipv6 address 2001:db8:1::1/64

Link-Local:

 Assigned using the FE80:: prefix.

 Example configuration:

ipv6 address fe80::1 link-local

5.12 Describe How to Configure Global Unicast Addresses Dynamically

 Dynamic Assignment uses DHCPv6 or Stateless Address Autoconfiguration (SLAAC).

 SLAAC enables devices to generate their own addresses based on the network prefix

advertised by a router.

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

6.1 Explain How to Access IOS or VRP Device for Configuration Purposes

Access Methods:

1. Console Port:

o Direct physical connection to the device using a console cable.

o Requires terminal emulation software (e.g., PuTTY or Tera Term).

2. Secure Shell (SSH):

o Remote access using encrypted communication.

o Recommended for secure configurations.

3. Telnet:

o Remote access using unencrypted communication.

o Not recommended due to security risks.

4. Auxiliary Port:

o Used for out-of-band management over a modem connection.

5. Web Interface (if available):

o Access through a web browser for devices with GUI options.

6.2 Explain How to Navigate IOS or VRP to Configure Network Devices

Command Modes:

1. User EXEC Mode (>):

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

o Basic access with limited commands (e.g., show commands).

o Entered immediately upon login.

2. Privileged EXEC Mode (#):

o Access to all device commands, including configuration and debugging.

o Accessed using the enable command.

3. Global Configuration Mode:

o Used to configure the device.

o Accessed from privileged EXEC mode with the configure terminal command.

4. Subconfiguration Modes:

o Interface Mode: For configuring interfaces.

o Line Mode: For configuring lines (e.g., console, vty).

o Router Mode: For routing protocol configurations.

6.3 Explain the Command Structure of IOS or VRP Software

Command Syntax:

1. Command Keywords:

o Words or phrases representing specific functions (e.g., show, configure).

2. Arguments:

o User-defined values (e.g., IP addresses, interface names).

3. Subcommands:

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

o Commands nested under specific configuration contexts.

Example:

interface gigabitethernet 0/0

ip address 192.168.1.1 255.255.255.0

no shutdown

6.4 Explain IOS or VRP Device Using CLI

CLI (Command-Line Interface):

 A text-based interface used to input commands directly into the device.

 Features:

o Tab Completion: Auto-completes commands.

o Context-Sensitive Help: Use ? to view available commands or syntax.

o Command History: View past commands with the show history command.

6.5 Explain IOS or VRP Commands to Save the Running Configuration

1. View Running Configuration:

bash

Copy code

show running-config

2. Save Configuration to Startup Config:

o Saves the current configuration to non-volatile memory to persist after a reboot.

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

bash

Copy code

copy running-config startup-config

3. Verify Saved Configuration:

show startup-config

6.6 Explain How Devices Communicate Across Network Media

Communication Process:

1. Devices use network media such as cables (Ethernet, fiber optic) or wireless signals to

transmit data.

2. Data is encapsulated into frames and transmitted at the data link layer.

3. Physical layer protocols handle the actual transmission.

Key Points:

 Devices must share the same protocol (e.g., Ethernet, Wi-Fi).

 Media must support the speed and type of communication required.

6.7 Explain a Host Device with an IP Address

IP Address:

 A unique identifier assigned to a host for communication within a network.

 IPv4 example: 192.168.1.10

 IPv6 example: 2001:db8::1

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

Components of an IP Address:

1. Network Portion: Identifies the network.

2. Host Portion: Identifies the specific device.

IP Address Assignment:

 Static: Manually configured.

 Dynamic: Assigned by a DHCP server.

6.8 Explain Connectivity Between Two End Devices

1. Devices on the Same Network:

o Communicate directly using their IP and MAC addresses.

o Use ARP (Address Resolution Protocol) to find MAC addresses.

2. Devices on Different Networks:

o Communication passes through a router.

o Devices use the default gateway to send packets to external networks.

6.9 Explain Initial Settings on an IOS or VRP Router

1. Access the Router:

o Use the console port for initial configuration.

2. Basic Commands:

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

o Set hostname:

hostname Router1

o Configure a password for privileged EXEC mode:

enable secret cisco

o Set line console password:

line console 0

password cisco

login

o Disable DNS lookup:

no ip domain-lookup

6.10 Explain Two Active Interfaces on IOS or VRP Router

1. Interface Configuration:

o Assign IP Addresses:

bash

Copy code

interface gigabitethernet 0/0

ip address 192.168.1.1 255.255.255.0

no shutdown

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

o Enable Routing:

Use ip routing to allow the router to forward packets between interfaces.

2. Verify Active Interfaces:

show ip interface brief

6.11 Explain How Devices Use the Default Gateway

Default Gateway:

 The IP address of a router interface that a host uses to send packets to devices outside its

local network.

How It Works:

1. A device sends packets to the default gateway if the destination IP address is not in its

local subnet.

2. The router (default gateway) forwards the packets to the next hop or destination.

Configuration on a Host:

 Set the default gateway address manually or via DHCP.

Example in CLI (Windows):

ipconfig /all

Downloaded by Ale pikin Samson ([email protected])


lOMoARcPSD|51300743

You might also like