D lOMoARcPSD|51300743
UMARU ALI SHINKAFI POLYTECHNIC SOKOTO
1.1 Explain How Networks Affect Our Daily Lives
DEPARTMENT OF COMPUTER SCIENCE
HNDNCC 1
Networks connect people, businesses, and communities, enabling communication,
collaboration, and innovation.
Applications in Daily Life:
o Communication: Social media, emails, video calls (e.g., Zoom, WhatsApp).
o Business: E-commerce, online transactions, and remote work.
o Education: Online learning platforms and resources (e.g., Coursera, Khan
COURSE
Academy). TITLE: NETWORKING ESSENTIALS
Healthcare: Telemedicine, patient databases, and health monitoring devices.
o
COURSE CODE: NCC 311
o Entertainment: Streaming services like Netflix and online gaming platforms.
DEPARTMENT: NETWORKING AND CLOUD COMPUTING
o Smart Devices: IoT (Internet of Things) devices like smart homes and wearable
COURSE LECTURER: MAL. RILWANU YUSUF GIGANE
fitness trackers.
1.2 Outline How Host and Network Devices Are Used
FIRST SEMESTER LECTURE MATERIAL
Host Devices:
o End devices that directly interact with users, such as computers, smartphones,
tablets, printers, and smart TVs.
o Serve as either clients (requesting services) or servers (providing services).
Network Devices:
o Devices that enable communication between hosts and networks:
. Routers: Connect different networks and direct traffic efficiently.
. Switches: Connect multiple devices within the same network.
lOMoARcPSD|51300743
. Access Points (AP): Provide wireless connectivity to devices.
. Firewalls: Enhance network security by filtering traffic.
1.3 Outline Network Representations and How They Are Used in Network
Topologies
Network Representations:
o Use diagrams or schematics to visualize devices and their interconnections.
o Symbols represent components: circles (routers), rectangles (switches), and lines
(connections).
Network Topologies:
o Physical Topology: The physical arrangement of cables and devices.
o Logical Topology: The way data flows within the network.
o Common topologies:
. Star: Devices connected to a central hub or switch.
. Bus: All devices share a single communication line.
. Ring: Devices connected in a circular loop.
. Mesh: Multiple connections for redundancy and reliability.
1.4 List the Characteristics of Common Types of Networks
Personal Area Network (PAN):
o Short range, usually for personal devices like Bluetooth or infrared.
Local Area Network (LAN):
o Limited to a single location (e.g., office, home).
lOMoARcPSD|51300743
o High-speed, low-cost communication.
Wide Area Network (WAN):
o Covers large geographical areas (e.g., the Internet).
o Connects multiple LANs using routers.
Metropolitan Area Network (MAN):
o Spans a city or large campus.
o Combines characteristics of LANs and WANs.
Wireless Networks:
o Use radio signals (Wi-Fi, cellular networks).
1.5 Outline How LANs and WANs Interconnect to the Internet
LAN:
o Devices within the LAN connect via switches or wireless access points.
o Routers connect the LAN to a WAN or the Internet.
WAN:
o Utilizes leased lines, satellite links, or broadband connections to connect LANs
over large distances.
o Service Providers (ISPs) manage WAN links to connect users to the Internet.
1.6 Explain the Four Basic Requirements of a Reliable Network
1. Fault Tolerance:
o Redundancy through backup paths and devices ensures minimal downtime.
2. Scalability:
lOMoARcPSD|51300743
o Ability to expand without degrading performance.
3. Quality of Service (QoS):
o Prioritizes critical traffic, such as voice or video.
4. Security:
o Protects data and devices with encryption, firewalls, and antivirus software.
1.7 Outline How Trends Are Changing the Way We Interact
1. BYOD (Bring Your Own Device):
o Employees use personal devices, increasing flexibility and productivity.
2. Online Collaboration:
o Tools like Google Workspace, Microsoft Teams allow remote teamwork.
3. Video Streaming:
o Platforms like YouTube, Twitch enable content sharing and learning.
4. Cloud Computing:
o Storing and accessing data on remote servers, e.g., Google Drive, AWS.
1.8 Explain Some Basic Security Threats and Solutions for All Networks
Common Threats:
o Malware (viruses, ransomware), phishing, DDoS attacks, unauthorized access.
Solutions:
o Antivirus software: Detects and removes malicious files.
o Firewalls: Blocks unauthorized traffic.
o Encryption: Secures data during transmission.
lOMoARcPSD|51300743
o User Training: Educates on recognizing phishing and safe practices.
1.9 Outline Employment Opportunities in the Networking Field
Job Roles:
o Network Administrator: Manages daily operations of networks.
o Network Engineer: Designs and implements network solutions.
o Cybersecurity Analyst: Protects networks from security breaches.
o Cloud Architect: Builds cloud-based infrastructures.
o IT Support Specialist: Resolves networking and hardware issues.
Certifications:
o Cisco (CCNA, CCNP), CompTIA (Network+, Security+), AWS Certified
Solutions Architect.
lOMoARcPSD|51300743
2.1 Outline the Types of Rules Necessary to Successfully Communicate
Rules of Communication:
o Message Format: The structure of the message (e.g., email, voice, or data).
o Timing: Defines when to send, receive, or acknowledge information (e.g., turn-
taking in conversations, data transmission timing in networks).
o Encoding: Process of converting information into a format for transmission (e.g.,
digital signals).
o Error Detection and Correction: Ensures accurate message delivery by
identifying and correcting errors.
o Acknowledgment: Confirms that the message has been received successfully.
o Flow Control: Prevents data congestion by controlling the pace of
communication.
2.2 Narrate Why Protocols Are Necessary for Network Communication
Importance of Protocols:
o Establish rules for communication between devices, ensuring compatibility and
interoperability.
o Define how data is formatted, transmitted, received, and processed.
o Ensure reliability and accuracy by addressing issues like error handling, flow
control, and data integrity.
o Examples: TCP (for reliable communication), HTTP (for web browsing), and
SMTP (for email).
lOMoARcPSD|51300743
2.3 Outline the Purpose of Adhering to a Protocol Suite
A protocol suite is a set of protocols that work together to ensure seamless
communication.
Purpose:
o Simplifies network communication by dividing it into layers (e.g., TCP/IP
model).
o Provides a standardized approach, enabling devices from different vendors to
communicate.
o Ensures scalability, reliability, and security in data transmission.
2.4 Outline the Role of Standards Organizations in Establishing Protocols for Network
Interoperability
Standards Organizations:
o Define protocols and guidelines to ensure compatibility between devices and
networks.
o Examples:
. IETF (Internet Engineering Task Force): Develops internet standards
like TCP/IP.
. ISO (International Organization for Standardization): Developed the
OSI model.
. IEEE (Institute of Electrical and Electronics Engineers): Responsible
for Ethernet standards (e.g., IEEE 802.3).
lOMoARcPSD|51300743
. ITU (International Telecommunication Union): Defines
telecommunication protocols.
o Role: Ensure global interoperability, enabling seamless communication across
devices and networks.
2.5 Outline How the TCP/IP Model and OSI Model Facilitate Standardization in the
Communication Process
TCP/IP Model:
o A practical framework with four layers (Application, Transport, Internet, and
Network Access).
o Focuses on the internet and real-world communication protocols.
o Enables end-to-end communication and internet connectivity.
OSI Model:
o A theoretical model with seven layers (Application, Presentation, Session,
Transport, Network, Data Link, and Physical).
o Provides a standardized approach for designing and implementing networks.
Facilitation of Standardization:
o Both models define roles and responsibilities for each layer, ensuring consistent
communication.
o Promote compatibility and interoperability across devices and vendors.
2.6 Outline How Data Encapsulation Allows Data to Be Transported Across the Network
Data Encapsulation Process:
lOMoARcPSD|51300743
o Data is wrapped in protocol headers as it moves through the layers of a network
model (e.g., TCP/IP).
o Encapsulation steps:
1. Application Layer: Data is created.
2. Transport Layer: Adds transport headers (e.g., TCP/UDP).
3. Network Layer: Adds IP headers for addressing.
4. Data Link Layer: Adds MAC headers and trailers for local delivery.
5. Physical Layer: Converts data into signals for transmission.
o At the destination, the process is reversed (decapsulation).
2.7 Outline How Local Hosts Access Local Resources on a Network
Local Resource Access:
o IP Address: Identifies the device within a network.
o DNS (Domain Name System): Resolves human-readable names (e.g.,
www.example.com) into IP addresses.
o Switches: Direct communication within the local network by using MAC
addresses.
o Network Services: File sharing, printing, or accessing shared databases within
the LAN.
2.8 Contrast the Roles of the MAC Address and the IP Address
MAC Address:
o Hardware address assigned to network interface cards (NICs).
lOMoARcPSD|51300743
o Unique to the device and operates at the Data Link Layer.
o Used for local network communication (e.g., within a LAN).
IP Address:
o Logical address assigned to a device by the network.
o Operates at the Network Layer and facilitates communication across different
networks.
o Can be dynamic (assigned via DHCP) or static.
2.9 Explain the Purpose of ARP (Address Resolution Protocol)
Purpose of ARP:
o Resolves IP addresses into MAC addresses for local communication.
o Ensures that devices on the same LAN can communicate by mapping logical
addresses (IP) to physical addresses (MAC).
o Example: A device sends an ARP request asking, "Who has this IP?" The device
with the matching IP responds with its MAC address.
2.10 Explain the Operation of IPv6 Neighbor Discovery
IPv6 Neighbor Discovery (ND):
o Replaces ARP in IPv6 networks.
o Functions:
. Address Resolution: Maps IPv6 addresses to MAC addresses.
. Neighbor Unreachability Detection: Ensures devices are reachable.
. Router Discovery: Identifies available routers on the network.
lOMoARcPSD|51300743
. Duplicate Address Detection (DAD): Ensures unique IPv6 addresses.
2.11 Outline How ICMP Is Used to Test Network Connectivity
Internet Control Message Protocol (ICMP):
o Diagnoses and resolves network issues.
o Functions:
. Ping: Tests connectivity between devices by sending echo requests and
waiting for replies.
. Traceroute: Identifies the path data takes across networks.
. Error Reporting: Alerts devices to issues like unreachable destinations.
2.12 Explain the Techniques of Ensuring Successful Communication Between Devices
Techniques:
o Standardized Protocols: Use of TCP/IP, HTTP, or FTP for consistent
communication.
o Error Detection and Correction: Ensures data integrity during transmission.
o Flow Control: Manages the rate of data transfer to prevent congestion.
o Quality of Service (QoS): Prioritizes critical traffic like video or voice.
o Encryption: Secures data during transmission to prevent unauthorized access.
o Device Configuration: Proper IP addressing, DNS settings, and routing.
lOMoARcPSD|51300743
3.1 Explain the Purpose and Functions of the Physical Layer in the Network
Purpose:
o The physical layer is responsible for the actual transmission of raw data bits over
a physical medium between devices.
Functions:
o Defines hardware specifications (cables, connectors, and transmission medium).
o Converts data into electrical, optical, or radio signals.
o Establishes and terminates physical connections.
o Ensures proper synchronization between sender and receiver.
3.2 Explain the Characteristics of the Physical Layer
Provides a data transmission medium (copper, fiber optic, or wireless).
Defines the type of signal used (analog or digital).
Determines data rate, voltage levels, and timing of signal transitions.
Includes elements such as repeaters, hubs, and cables.
3.3 Explain the Basic Characteristics of Copper Cabling
Characteristics:
o Twisted Pairs: Reduces electromagnetic interference (EMI).
o Shielding: Protects cables from external noise.
o Bandwidth: Limited compared to fiber optics.
o Cost: Affordable and widely available.
lOMoARcPSD|51300743
o Susceptible to attenuation and crosstalk.
3.4 Explain How UTP Cable is Used in Ethernet Networks
UTP (Unshielded Twisted Pair):
o Common in Ethernet LANs due to its flexibility and cost-effectiveness.
o Category Standards: Cat5, Cat5e, Cat6, and higher for varying speeds.
o Connection: Terminated with RJ-45 connectors.
o Uses: Transmits data up to 1 Gbps (or higher with advanced categories).
3.5 Explain Fiber Optic Cabling and Its Main Advantages Over Other Media
Fiber Optic Cabling:
o Transmits data using light signals through glass or plastic fibers.
Advantages:
o High bandwidth and long-distance capabilities.
o Immunity to EMI and radio frequency interference.
o Greater security since it’s harder to tap into.
o Reduced signal loss compared to copper cables.
3.6 Explain Network Devices Using Wired and Wireless Media
Wired Media Devices:
o Switches: Connect devices within a LAN.
o Routers: Direct data packets between networks.
o Hubs: Broadcast data to all connected devices.
lOMoARcPSD|51300743
Wireless Media Devices:
o Access Points (APs): Provide wireless connectivity.
o Wireless Routers: Combine routing and wireless functions.
o Adapters: Enable wireless functionality on devices.
3.7 List the Purpose and Function of the Data Link Layer in Preparing Communication for
Transmission on Specific Media
Purpose:
o Facilitates communication between devices over a specific medium.
Functions:
o Encapsulation of data into frames.
o Error detection and correction.
o Media access control to avoid collisions.
3.8 List the Characteristics of Media Access Control Methods on WAN and LAN
Topologies
WAN Topologies:
o Use protocols like PPP, HDLC, or Frame Relay.
o Allocate bandwidth dynamically.
LAN Topologies:
o Use CSMA/CD or CSMA/CA for managing collisions.
o Define how devices share the medium (e.g., Ethernet).
3.9 Explain the Characteristics and Functions of the Data Link Frame
lOMoARcPSD|51300743
Characteristics:
o Divides data into manageable frames for transmission.
o Contains headers and trailers for addressing and error checking.
Functions:
o Ensures proper delivery through MAC addressing.
o Handles error detection using checksums or CRC.
3.10 Explain How the Network Layer Uses IP Protocols for Reliable Communications
IP Protocols:
o IPv4 and IPv6: Assign logical addresses for routing data.
o Provides fragmentation and reassembly of packets.
o Enables routing between networks.
3.11 Explain the Role of the Major Header Fields in the IPv4 Packet
IPv4 Header Fields:
o Source IP Address: Identifies the sender.
o Destination IP Address: Identifies the receiver.
o Time-to-Live (TTL): Limits the lifespan of a packet.
o Checksum: Ensures data integrity.
o Protocol: Specifies the higher-layer protocol (e.g., TCP/UDP).
3.12 Explain the Role of the Major Header Fields in the IPv6 Packet
IPv6 Header Fields:
lOMoARcPSD|51300743
o Source and Destination Address: Longer (128-bit) addresses for scalability.
o Traffic Class: Defines priority.
o Hop Limit: Replaces TTL in IPv4.
o Payload Length: Indicates data size.
3.13 Explain How Network Devices Use Routing Tables to Direct Packets to a Destination
Network
Routing Tables:
o Contain information about routes to various networks.
o Used by routers to determine the best path for packet delivery.
o Include fields like destination, next hop, and metric.
3.14 Explain the Functions of Fields in the Routing Table
Fields:
o Destination Network: Identifies target network.
o Next Hop: Address of the next router or gateway.
o Metric: Indicates the cost of the route.
o Interface: Specifies the outgoing network interface.
3.15 Explain the Purpose of the Transport Layer in Managing the Transportation of Data
in End-to-End Communication
Ensures reliable delivery of data across networks.
Segments data for transmission and reassembles it at the destination.
lOMoARcPSD|51300743
Provides error detection and correction.
3.16 List the Characteristics of TCP
Reliable and connection-oriented.
Provides error recovery and flow control.
Uses acknowledgments to ensure delivery.
3.17 List Characteristics of UDP
Unreliable and connectionless.
No error checking or flow control.
Faster than TCP, suitable for real-time applications.
3.18 Describe How TCP and UDP Use Port Numbers
Port numbers identify specific processes or services on a host.
Examples:
o TCP: HTTP (port 80), HTTPS (port 443).
o UDP: DNS (port 53), VoIP (varied ports).
3.19 Explain How TCP Session Establishment and Termination Processes Facilitate
Reliable Communication
Establishment: Uses a three-way handshake (SYN, SYN-ACK, ACK).
Termination: Ensures all data is transmitted before closing the connection.
lOMoARcPSD|51300743
3.20 Explain How TCP Protocol Data Units Are Transmitted and Acknowledged to
Guarantee Delivery
Divides data into segments and assigns sequence numbers.
Receiver sends acknowledgments for received data.
Lost segments are retransmitted.
3.21 Explain the Operations of Transport Layer Protocols in Supporting End-to-End
Communication
TCP ensures reliable delivery.
UDP provides fast delivery for time-sensitive applications.
3.22 Explain How the Functions of the Application Layer, Presentation Layer, and Session
Layer Work Together to Provide Network Services
Application Layer: Interfaces with end-user applications.
Presentation Layer: Ensures data formatting, encryption, and compression.
Session Layer: Manages and maintains sessions between devices.
3.23 Explain How End-User Applications Operate in a Peer-to-Peer Network
Devices communicate directly without a central server.
Example: File sharing or instant messaging
3.24 Explain How Web and Email Protocols Operate
Web Protocols: HTTP/HTTPS manage website communication.
lOMoARcPSD|51300743
Email Protocols: SMTP, IMAP, and POP3 handle email sending and receiving.
3.25 Explain How DNS and DHCP Operate
DNS: Resolves domain names to IP addresses.
DHCP: Dynamically assigns IP addresses to devices on a network.
3.26 Explain How File Transfer Protocols Operate
FTP (File Transfer Protocol): Enables file uploads and downloads between devices.
Supports authentication and secure data transfer.
lOMoARcPSD|51300743
4.1 Describe How the Ethernet Sublayers Are Related to the Frame Fields
Ethernet operates at Layer 2 (Data Link Layer) of the OSI model and is divided into two
sublayers:
1. Logical Link Control (LLC) Sublayer
Purpose:
o The LLC sublayer is responsible for providing communication between the upper
layers (network layer) and the lower layers (MAC).
o It identifies network protocols like IPv4, IPv6, ARP, etc., and provides error
checking and flow control.
Relation to Frame Fields:
o The LLC sublayer defines the Ethernet frame's Type field, which indicates the
protocol being used (e.g., IPv4 or IPv6).
2. Media Access Control (MAC) Sublayer
Purpose:
o The MAC sublayer controls access to the physical medium and ensures frames are
properly formatted before transmission.
o It determines how devices in the same network share access to the transmission
medium.
Relation to Frame Fields:
lOMoARcPSD|51300743
o The MAC sublayer manages key frame fields like:
. Source MAC Address: Identifies the sender's MAC address.
. Destination MAC Address: Identifies the recipient's MAC address.
. FCS (Frame Check Sequence): Ensures data integrity by detecting errors
during transmission.
4.2 Describe the Ethernet MAC Address
What Is a MAC Address?
A Media Access Control (MAC) address is a 48-bit (6-byte) unique identifier assigned
to a network interface card (NIC).
It is represented in hexadecimal format (e.g., 00:1A:2B:3C:4D:5E).
Structure of a MAC Address:
1. First 24 bits (OUI - Organizationally Unique Identifier):
o Identifies the manufacturer of the NIC.
o Assigned by the IEEE.
2. Last 24 bits (NIC-Specific):
o Uniquely identifies the device within the manufacturer’s range.
Types of MAC Addresses:
Unicast MAC Address: Specifies a single destination device.
lOMoARcPSD|51300743
Multicast MAC Address: Used to deliver frames to multiple devices (e.g., for
streaming).
Broadcast MAC Address: Represents all devices on a local network
(FF:FF:FF:FF:FF:FF).
4.3 Describe How a Switch Builds Its MAC Address Table and Forwards Frames
Building a MAC Address Table:
1. Learning:
o When a frame enters a switch, the switch inspects the frame’s Source MAC
Address.
o If the MAC address is not in the MAC address table, the switch adds it along with
the port number the frame came from.
o The table maps each MAC address to a specific switch port.
2. Aging:
o Entries in the MAC table are removed after a certain period if no traffic is
received from that address.
Forwarding Frames:
1. Unicast:
o The switch checks the Destination MAC Address in the frame and forwards it to
the port associated with the MAC address in its table.
2. Broadcast:
lOMoARcPSD|51300743
o If the Destination MAC Address is a broadcast address, the switch forwards the
frame to all ports except the incoming one.
3. Unknown MAC Address:
o If the Destination MAC Address is not in the table, the switch floods the frame to
all ports except the incoming one.
4.4 Describe Switch Forwarding Methods and Port Settings Available on Layer 2 Switch
Ports
Switch Forwarding Methods:
1. Store-and-Forward:
o The switch receives the entire frame, checks it for errors using the FCS, and then
forwards it.
o Advantages: High reliability, as it ensures only error-free frames are transmitted.
2. Cut-Through:
o The switch begins forwarding the frame as soon as it reads the Destination MAC
Address (before the entire frame is received).
o Advantages: Lower latency.
o Disadvantages: May forward frames with errors.
3. Fragment-Free:
o The switch reads the first 64 bytes of the frame before forwarding.
o Ensures that collisions are detected since most errors occur in the first 64 bytes.
lOMoARcPSD|51300743
Port Settings Available on Layer 2 Switch Ports:
1. Speed and Duplex:
o Speed: Specifies the port speed (10 Mbps, 100 Mbps, 1 Gbps, etc.).
o Duplex: Defines whether communication is half-duplex (one direction at a time)
or full-duplex (both directions simultaneously).
2. Port Security:
o Restricts the devices allowed on a port based on MAC addresses.
o Can prevent unauthorized access by limiting the number of MAC addresses per
port.
3. VLAN Assignment:
o Ports can be assigned to specific Virtual LANs (VLANs) for logical segmentation
of the network.
4. Auto-Negotiation:
o Allows the port to automatically configure speed and duplex settings based on the
connected device.
5. Power over Ethernet (PoE):
o Some switch ports support PoE, supplying power to devices like IP phones and
cameras over Ethernet cables.
lOMoARcPSD|51300743
MoARcPSD|51300743
5.1 Explain How to Convert Numbers Between Decimal and Binary Systems
Decimal to Binary:
1. Divide the decimal number by 2.
2. Record the remainder (0 or 1).
3. Continue dividing the quotient by 2 until the quotient is 0.
4. Write the remainders in reverse order to get the binary number.
Example:
Convert 13 to binary:
13 ÷ 2 = 6 remainder 1
6 ÷ 2 = 3 remainder 0
3 ÷ 2 = 1 remainder 1
1 ÷ 2 = 0 remainder 1
Binary: 1101
Binary to Decimal:
1. Write down the binary number.
2. Multiply each bit by 2 raised to the power of its position (starting from 0 on the right).
3. Add up the results.
Example:
Convert 1101 to decimal:
(1 × 2³) + (1 × 2²) + (0 × 2¹) + (1 × 2⁰) = 8 + 4 + 0 + 1 = 13
lOMoARcPSD|51300743
5.2 Explain How to Convert Numbers Between Decimal and Hexadecimal Systems
Decimal to Hexadecimal:
1. Divide the decimal number by 16.
2. Record the remainder (0–9 or A–F for values 10–15).
3. Continue dividing the quotient by 16 until the quotient is 0.
4. Write the remainders in reverse order.
Example:
Convert 255 to hexadecimal:
255 ÷ 16 = 15 remainder 15 → F
15 ÷ 16 = 0 remainder 15 → F
Hexadecimal: FF
Hexadecimal to Decimal:
1. Write down the hexadecimal number.
2. Multiply each digit by 16 raised to the power of its position (starting from 0 on the right).
3. Add up the results.
Example:
Convert 1A to decimal:
(1 × 16¹) + (10 × 16⁰) = 16 + 10 = 26
lOMoARcPSD|51300743
5.3 Explain the Structure of an IPv4 Address
An IPv4 address is a 32-bit number divided into four 8-bit segments, written in dotted-decimal
format (e.g., 192.168.1.1). Each segment is a value between 0 and 255.
Components:
1. Network Portion:
o Identifies the network to which the device belongs.
o Determined by the subnet mask.
2. Host Portion:
o Identifies a specific device within the network.
3. Subnet Mask:
o Defines how many bits are used for the network portion versus the host portion.
o Example: 255.255.255.0 or /24.
5.4 Analyse the Characteristics and Uses of Unicast, Broadcast, and Multicast IPv4
Addresses
Unicast:
Used for one-to-one communication between devices.
Example: Sending data to a specific device on the network.
Broadcast:
lOMoARcPSD|51300743
Sends data to all devices on a network.
Example: IPv4 address 255.255.255.255.
Multicast:
Sends data to multiple specific devices in a group.
Example: 224.0.0.0 to 239.255.255.255.
5.5 Describe Public, Private, and Reserved IPv4 Addresses
Public IPv4 Addresses:
Globally unique addresses used on the internet.
Example: 8.8.8.8 (Google DNS).
Private IPv4 Addresses:
Used within private networks and not routable on the internet.
Examples:
o 10.0.0.0 – 10.255.255.255
o 172.16.0.0 – 172.31.255.255
o 192.168.0.0 – 192.168.255.255
Reserved IPv4 Addresses:
Set aside for special purposes (e.g., testing, loopback).
Examples:
o Loopback: 127.0.0.1
lOMoARcPSD|51300743
o APIPA: 169.254.0.0
5.6 Describe How Subnetting Segments a Network to Enable Better Communication
Subnetting divides a larger network into smaller sub-networks to improve efficiency and
security.
Reduces broadcast domains, improving network performance.
Enables better organization of IP addresses.
5.7 Compute IPv4 Subnets for a /24 Prefix
Example:
Given: /24 subnet mask = 255.255.255.0.
Subnetting into 4 subnets:
o Increment: 256 ÷ 4 = 64.
o Subnets:
. 192.168.1.0 – 192.168.1.63
. 192.168.1.64 – 192.168.1.127
. 192.168.1.128 – 192.168.1.191
. 192.168.1.192 – 192.168.1.255
5.8 Describe the Need for IPv6 Addressing
IPv4 addresses are running out due to the growth of internet-connected devices.
IPv6 offers a vastly larger address space (128 bits).
lOMoARcPSD|51300743
5.9 Describe How IPv6 Addresses Are Represented
IPv6 addresses are written in hexadecimal and separated by colons (:).
Example: 2001:0db8:85a3:0000:0000:8a2e:0370:7334
Can be abbreviated by omitting leading zeros or replacing consecutive zero fields with ::.
5.10 Contrast Types of IPv6 Network Addresses
1. Global Unicast:
o Publicly routable addresses similar to IPv4 public addresses.
o Example: 2001:db8::/32.
2. Link-Local:
o Used for communication within a local link.
o Automatically assigned.
o Example: FE80::/10.
3. Multicast:
o Sends packets to a group of devices.
o Example: FF00::/8.
4. Anycast:
o Delivers packets to the nearest node in a group.
lOMoARcPSD|51300743
5.11 Describe How to Configure Static Global Unicast and Link-Local IPv6 Network
Addresses
Static Global Unicast:
Manually assign an address using a specific prefix.
Example configuration:
ipv6 address 2001:db8:1::1/64
Link-Local:
Assigned using the FE80:: prefix.
Example configuration:
ipv6 address fe80::1 link-local
5.12 Describe How to Configure Global Unicast Addresses Dynamically
Dynamic Assignment uses DHCPv6 or Stateless Address Autoconfiguration (SLAAC).
SLAAC enables devices to generate their own addresses based on the network prefix
advertised by a router.
lOMoARcPSD|51300743
6.1 Explain How to Access IOS or VRP Device for Configuration Purposes
Access Methods:
1. Console Port:
o Direct physical connection to the device using a console cable.
o Requires terminal emulation software (e.g., PuTTY or Tera Term).
2. Secure Shell (SSH):
o Remote access using encrypted communication.
o Recommended for secure configurations.
3. Telnet:
o Remote access using unencrypted communication.
o Not recommended due to security risks.
4. Auxiliary Port:
o Used for out-of-band management over a modem connection.
5. Web Interface (if available):
o Access through a web browser for devices with GUI options.
6.2 Explain How to Navigate IOS or VRP to Configure Network Devices
Command Modes:
1. User EXEC Mode (>):
lOMoARcPSD|51300743
o Basic access with limited commands (e.g., show commands).
o Entered immediately upon login.
2. Privileged EXEC Mode (#):
o Access to all device commands, including configuration and debugging.
o Accessed using the enable command.
3. Global Configuration Mode:
o Used to configure the device.
o Accessed from privileged EXEC mode with the configure terminal command.
4. Subconfiguration Modes:
o Interface Mode: For configuring interfaces.
o Line Mode: For configuring lines (e.g., console, vty).
o Router Mode: For routing protocol configurations.
6.3 Explain the Command Structure of IOS or VRP Software
Command Syntax:
1. Command Keywords:
o Words or phrases representing specific functions (e.g., show, configure).
2. Arguments:
o User-defined values (e.g., IP addresses, interface names).
3. Subcommands:
lOMoARcPSD|51300743
o Commands nested under specific configuration contexts.
Example:
interface gigabitethernet 0/0
ip address 192.168.1.1 255.255.255.0
no shutdown
6.4 Explain IOS or VRP Device Using CLI
CLI (Command-Line Interface):
A text-based interface used to input commands directly into the device.
Features:
o Tab Completion: Auto-completes commands.
o Context-Sensitive Help: Use ? to view available commands or syntax.
o Command History: View past commands with the show history command.
6.5 Explain IOS or VRP Commands to Save the Running Configuration
1. View Running Configuration:
bash
Copy code
show running-config
2. Save Configuration to Startup Config:
o Saves the current configuration to non-volatile memory to persist after a reboot.
lOMoARcPSD|51300743
bash
Copy code
copy running-config startup-config
3. Verify Saved Configuration:
show startup-config
6.6 Explain How Devices Communicate Across Network Media
Communication Process:
1. Devices use network media such as cables (Ethernet, fiber optic) or wireless signals to
transmit data.
2. Data is encapsulated into frames and transmitted at the data link layer.
3. Physical layer protocols handle the actual transmission.
Key Points:
Devices must share the same protocol (e.g., Ethernet, Wi-Fi).
Media must support the speed and type of communication required.
6.7 Explain a Host Device with an IP Address
IP Address:
A unique identifier assigned to a host for communication within a network.
IPv4 example: 192.168.1.10
IPv6 example: 2001:db8::1
lOMoARcPSD|51300743
Components of an IP Address:
1. Network Portion: Identifies the network.
2. Host Portion: Identifies the specific device.
IP Address Assignment:
Static: Manually configured.
Dynamic: Assigned by a DHCP server.
6.8 Explain Connectivity Between Two End Devices
1. Devices on the Same Network:
o Communicate directly using their IP and MAC addresses.
o Use ARP (Address Resolution Protocol) to find MAC addresses.
2. Devices on Different Networks:
o Communication passes through a router.
o Devices use the default gateway to send packets to external networks.
6.9 Explain Initial Settings on an IOS or VRP Router
1. Access the Router:
o Use the console port for initial configuration.
2. Basic Commands:
lOMoARcPSD|51300743
o Set hostname:
hostname Router1
o Configure a password for privileged EXEC mode:
enable secret cisco
o Set line console password:
line console 0
password cisco
login
o Disable DNS lookup:
no ip domain-lookup
6.10 Explain Two Active Interfaces on IOS or VRP Router
1. Interface Configuration:
o Assign IP Addresses:
bash
Copy code
interface gigabitethernet 0/0
ip address 192.168.1.1 255.255.255.0
no shutdown
lOMoARcPSD|51300743
o Enable Routing:
Use ip routing to allow the router to forward packets between interfaces.
2. Verify Active Interfaces:
show ip interface brief
6.11 Explain How Devices Use the Default Gateway
Default Gateway:
The IP address of a router interface that a host uses to send packets to devices outside its
local network.
How It Works:
1. A device sends packets to the default gateway if the destination IP address is not in its
local subnet.
2. The router (default gateway) forwards the packets to the next hop or destination.
Configuration on a Host:
Set the default gateway address manually or via DHCP.
Example in CLI (Windows):
ipconfig /all
lOMoARcPSD|51300743