Network Basics 1.0
Network Basics 1.0
Technology
Fundamentals
Introduction to Networking 1
Objectives
Data Format: Protocols define the transmitted data structure and format. This
includes how data is organized, the order of data elements, and how they are
represented (e.g., as text, numbers, or binary values).
Data Transmission: Protocols specify how data is transmitted over the network
medium, including the method of encoding data into signals suitable for transmission.
If the Internet is, a highway and ports are an exit on that highway. Then Protocols are
the car. Is your protocol a Dodge Ram, maybe a Tesla EV truck, or perhaps a VW bug?
Each car is different, but all follow the rules of the road.
The Protocols within a Protocol (TCP)
Transmission Control Protocol (TCP) is one of the core protocols of the Internet’s networking suite, known as
TCP/IP (Transmission Control Protocol/Internet Protocol). TCP provides reliable and ordered data transmission
between devices over a network. It ensures that data packets are delivered accurately and in the correct order,
making it suitable for applications where data integrity and reliability are essential.
Reliable Communication: TCP ensures reliable communication by acknowledging received data packets and
retransmitting any packets lost or corrupted during transmission.
Connection-Oriented: A TCP connection is established between the sender and receiver before data transmission
begins. This connection ensures that both parties are ready to exchange data.
Full Duplex Communication: A TCP connection allows data to be transmitted in both directions simultaneously.
This means that data can be sent and received concurrently.
The Protocols within a Protocol (TCP)
Ordered Delivery: TCP guarantees that data packets arrive at the receiver in the same order they were sent. This
is crucial for applications that require data to be processed in a specific sequence.
Flow Control: TCP uses flow control mechanisms to prevent the receiver from being overwhelmed by a flood of
incoming data. It regulates the rate of data transmission based on the receiver's capacity.
Error Detection and Correction: TCP employs checksums to detect errors in received data packets. If errors are
detected, TCP requests the retransmission of those packets.
Acknowledgments: The receiver sends acknowledgment packets to the sender after receiving data. If the sender
doesn't receive an acknowledgment within a specific time, it retransmits the data.
Connection Termination: When data exchange is complete, a TCP connection is terminated to ensure that all data
is sent and received correctly.
Do you call your mom before you drive to her house? Do you make sure she is home? While TCP is a protocol, it is
used within almost every other protocol.
The Protocols within a Protocol (TCP)
3-way Handshake
Connection Orientated
Synchronize (syn)
Acknowledge (ack)
Connection Established
The Protocols within a Protocol (UDP)
User Datagram Protocol (UDP) is a core protocol within the TCP/IP suite alongside TCP. UDP is a
connectionless and lightweight protocol that provides a faster and simpler method of data transmission
compared to TCP. While TCP focuses on reliable and ordered data delivery, UDP is designed for scenarios
where speed and efficiency are prioritized over data integrity.
Connectionless Communication: Unlike TCP, which establishes a connection before data exchange, UDP does
not establish a formal connection between sender and receiver. This makes UDP faster for initiating data
transmission.
No Order Guarantee: Unlike TCP, UDP does not ensure that data packets arrive in the same order they were
sent. If ordering is critical, the application must handle it independently.
No Error Checking and Correction: UDP does not have the same level of error-checking and correction
mechanisms as TCP. While UDP uses checksums to detect errors, it does not request retransmissions of lost
or corrupted packets.
The Protocols within a Protocol (UDP)
Low Overhead: UDP introduces less overhead than TCP due to its simplicity. This can be advantageous for
applications that prioritize speed and real-time performance.
Broadcast and Multicast: UDP supports broadcast and multicast communication, allowing a single message to be
sent to multiple recipients simultaneously.
Streaming and Real-Time Applications: UDP is commonly used for applications that require real-time data
transmission, such as streaming media, online gaming, and VoIP (Voice over Internet Protocol).
Simple Header: The UDP header is smaller than the TCP header, consisting of source and destination port
numbers and a length field.
If TCP calls your mom before you show up, UDP is dropping by unannounced.
IP Address
Internet Protocol (IP) address is a numerical label assigned to each device connected to a computer network
that uses the Internet Protocol for communication. IP addresses serve as unique identifiers for devices,
allowing them to be located and communicate with each other on a network. IP addresses play a
fundamental role in networking and are essential for routing data packets across the internet and other
computer networks.
IPv4 (Internet Protocol version 4): This is the most widely used version of IP addresses. An IPv4 address is a
32-bit numerical value written in four groups of numbers separated by periods (e.g., 192.168.0.1). Each
group can range from 0 to 255. IPv4 addresses are used to identify devices on most networks.
IPv6 (Internet Protocol version 6): As the demand for IP addresses grew, IPv6 was introduced to provide a
larger address space. An IPv6 address is a 128-bit numerical value written in groups of hexadecimal digits
separated by colons (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334). IPv6 addresses offer a virtually
unlimited number of unique addresses.
IP Address Exercise
What type of address is a MAC Address?
A. Logical
B. Physical
Terminal C. Home
D. All the above
IP Address
Public IP Address:
A public IP address is a globally unique address assigned to a device by an Internet Service Provider (ISP) or
an organization's network administrator. It is used to identify a device on the public internet. Public IP
addresses are required for devices that communicate directly with the internet, such as web servers, email
servers, and home computers accessing websites.
Private IP Address:
A private IP address is used within a local network (such as a home or business intranet) to identify devices
and enable communication. Private IP addresses are not globally unique and are meant for internal use only.
Devices with Private IP addresses cannot communicate directly with the Internet; instead, they rely on a
router or gateway to facilitate communication with external networks.
Structure: A MAC address is a 48-bit address, usually represented as six pairs of hexadecimal digits (e.g.,
00:1A:2B:3C:4D:5E). The first three pairs often represent the manufacturer (OUI - Organizationally Unique
Identifier), and the last three pairs identify the specific device.
MAC Address Exercise
Terminal
What type of address is a MAC Address?
A. Logical
B. Physical
C. Home
Enter: ifconfig D. All the above
The Protocols: DNS
Think of DNS as the phonebook for the internet. You know who you
want to call, but you need the number.
Exercise
Online nslookup is a web-based DNS client that queries DNS records for a given domain name. It allows
you to view all the DNS records for a website.
Firefox
What is the IP address listed?
Ping: One of the most well-known uses of ICMP is the "ping" command, which sends ICMP Echo Request
messages to a target device. The target device responds with ICMP Echo Reply messages, allowing you to test
network connectivity and measure round-trip time.
Traceroute: ICMP is also used in the "traceroute" command to discover the route packets take from the source
to the destination. It sends ICMP Time Exceeded messages to each router along the route, gradually increasing
the time-to-live (TTL) value to determine the path.
Ping Exercise
1 2 3 4 5 6
The Protocols: NAT
Network Address Translation (NAT) is a technique that modifies IP address information in the headers of IP
packets as they pass through a router or firewall. NAT allows multiple devices within a private network to share
a single public IP address when accessing resources on the internet. NAT allows a single public IP address to
represent multiple devices within a private network. This is especially important in a world where the available
pool of IPv4 addresses is limited.
Static NAT: Also known as one-to-one NAT, static NAT maps a private IP address to a public IP address. It's often
used when a specific internal device, such as a server, needs to be accessible from the internet using a fixed
address.
Dynamic NAT: Dynamic NAT maps a range of private IP addresses to a range of public IP addresses from a pool.
It allows multiple devices to share a limited number of public IP addresses.
The Protocols: NAT
Static NAT
192.168.56.2
192.168.56.12/175.15.21.53 175.15.21.54
192.168.56.3
192.168.56.13/175.15.21.54 175.15.21.54
Dynamic NAT
192.168.56.2
192.168.56.3
192.168.56.1/175.15.21.53 175.15.21.54
192.168.56.4
Network Topology
The physical or logical arrangement of network devices and their interconnections. It defines how devices
are connected within a network and how data flows between them. Network topology helps to determine
the efficiency, scalability, and reliability of a network
Purpose: PANs are used for connecting devices Purpose: LANs connect devices within a local
that belong to an individual user, such as area to facilitate resource sharing,
smartphones, laptops, tablets, and wearable communication, and collaboration. They are
devices. They are often used for communication commonly used in homes, offices, schools, and
and data sharing between devices, such as small businesses.
Bluetooth connections.
Network Types
Network types differ in terms of their size, coverage, and purpose.
Telnet Port: 23
Secure: No
Telnet is considered highly insecure over untrusted networks like
the Internet. For secure remote access, SSH (Secure Shell) is the
recommended protocol, as it encrypts communication and offers
better security features
The Ports and Protocols You Need to Know for the
Security+ Exam
Questions?