KEMBAR78
Networking Devices and Initial Configuration | PDF | Computer Network | Cloud Computing
0% found this document useful (0 votes)
281 views59 pages

Networking Devices and Initial Configuration

The Networking Devices and Initial Configuration course provides intermediate knowledge and skills for building home and small Cisco office networks, covering topics such as Ethernet, IP addressing, and Cisco device configuration. Students will learn to design hierarchical networks, ensure network reliability, and utilize troubleshooting tools, preparing them for further studies in Cybersecurity or DevNet. Resources like Packet Tracer and various support tools are available to enhance the learning experience.

Uploaded by

raalfon.uts
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
281 views59 pages

Networking Devices and Initial Configuration

The Networking Devices and Initial Configuration course provides intermediate knowledge and skills for building home and small Cisco office networks, covering topics such as Ethernet, IP addressing, and Cisco device configuration. Students will learn to design hierarchical networks, ensure network reliability, and utilize troubleshooting tools, preparing them for further studies in Cybersecurity or DevNet. Resources like Packet Tracer and various support tools are available to enhance the learning experience.

Uploaded by

raalfon.uts
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 59

Networking Devices and Initial

Configuration

This course teaches intermediate knowledge and skills for networking by covering the
basic concepts and skills needed to build a home office network and a small Cisco
office network. The learner is presented with an engaging and exploratory view of
networks, the devices that comprise them, how they work, and troubleshooting tools
and techniques. It prepares the learner to move into Cybersecurity or DevNet by going
deeper into Ethernet, IP Addressing and the transport layer. It also covers Cisco device
configuration and ends with the ability to configure and troubleshoot a small Cisco
network. The goal of this course is to provide the learner with an intermediate overview
of network design, structure, and operations. Upon completion of the Network Devices
and Initial Configuration course, students will be able to perform the following tasks:

 Explain components of a hierarchical network design.


 Explain the characteristics of virtualization and cloud services.
 Calculate numbers between decimal, binary, and hexadecimal systems.
 Explain how Ethernet operates in a switched network.
 Explain how routers use network layer protocols and services to enable end-to-
end connectivity.
 Calculate an IPv4 subnetting scheme to efficiently segment a network.
 Explain how ARP enables communication on a local area network.
 Explain how DNS and DHCP services operate.
 Compare the operations of transport layer protocols in supporting end-to-end
communication.
 Use the Cisco IOS.
 Build a simple computer network using Cisco devices.
 Use various tools to test network connectivity

Student Resources
There are a number of tools and resources that are available to you that will help you in
your journey as you develop your networking skills and prepare for job opportunities.
Packet Tracer
Packet Tracer simulates the internal workings of a network and is used in this course.

If you are new to Packet Tracer, take this FREE, short, online course now: Getting
Started with Cisco Packet Tracer.

You can use your smartphone, tablet, or desktop to access your course; however,
Packet Tracer activities, as well as some other activities, quizzes, and exams are best
experienced using a PC.

Lab Environment
No equipment is necessary

Resources Available to You


Skills for All frequently asked questions can be found at https://www.netacad.com/help,
or by clicking Help in the top navigation bar. For Packet Tracer downloading help,
visit https://www.netacad.com/resources/lab-downloads and scroll down to Learning
Resources.

You can find additional FAQs by visiting our virtual assistant, Morgan. Click the chat
icon in the top right corner to choose from a list of topics or enter your question.
Morgan’s help includes information about Packet Tracer, certificates, and badging.

https://www.netacad.com/resources/lab-downloads?courseLang=en-US

MODULE 1 – NETWORK DESIGN


Webster - Why Should I Take this Module?

Let me introduce you to my friend Bob! Bob works in the IT field in Vancouver, Canada
and has some networking experience. He is consulting for his friends, Marcy and
Vincent, who have purchased a furniture store. They want to expand their brick-and-
mortar operations and establish an online store as well. Currently the store’s internal
network handles in-store transactions and inventory. Marcy and Vincent want to add
security cameras, VoIP phones, and also expand it to include ecommerce and shipping.
Bob explains that this will be more expensive than his friends had anticipated. He is
thinking about designing the future network for the furniture store. He explains that he
must consider fault tolerance, scalability, QoS, and security. Also, their network is
currently flat, not hierarchical. Hierarchical networks scale well and will better
accommodate this growing business.

Wow! That is a lot for Marcy and Vincent to understand. They are not familiar with these
networking issues. Are you? Take this module to learn more about reliable networks
and hierarchical network design!
What Will I Learn in this Module?
Module Title: Network Design

Module Objective: Explain components of a hierarchical network design.

Topic Title Topic Objective


Reliable Networks Describe the four basic requirements of a reliable network.
Hierarchical Network
Explain the function at each layer of the 3-layer network design model.
Design

RELIABLE NETWORKS
Network Architecture
Have you ever been busy working online, only to have “the internet go down”? As you
know by now, the internet did not go down, you just lost your connection to it. It
is very frustrating. With so many people in the world relying on network access to work
and learn, it is imperative that networks are reliable. In this context, reliability means
more than your connection to the internet. This topic focuses on the four aspects of
network reliability.

The role of the network has changed from a data-only network to a system that enables
the connections of people, devices, and information in a media-rich, converged network
environment. For networks to function efficiently and grow in this type of environment,
the network must be built upon a standard network architecture.

Networks also support a wide range of applications and services. They must
operate over many different types of cables and devices, which make up the physical
infrastructure. The term network architecture, in this context, refers to the
technologies that support the infrastructure and the programmed services and rules, or
protocols, that move data across the network.

As networks evolve, we have learned that there are four basic characteristics that
network architects must address to meet user expectations:

 Fault Tolerance
 Scalability
 Quality of Service (QoS)
 Security
Fault Tolerance
A fault tolerant network is one that limits the number of affected devices during a
failure. It is built to allow quick recovery when such a failure occurs. These
networks depend on multiple paths between the source and destination of a
message. If one path fails, the messages are instantly sent over a different link.
Having multiple paths to a destination is known as redundancy.

Implementing a packet-switched network is one way that reliable networks


provide redundancy. Packet switching splits traffic into packets that are routed
over a shared network. A single message, such as an email or a video stream, is
broken into multiple message blocks, called packets. Each packet has the
necessary addressing information of the source and destination of the message. The
routers within the network switch the packets based on the condition of the network at
that moment. This means that all the packets in a single message could take very
different paths to the same destination. In the figure, the user is unaware and unaffected
by the router that is dynamically changing the route when a link fails.
Scalability
A scalable network expands quickly to support new users and applications. It does
this without degrading the performance of services that are being accessed by
existing users. The figure shows how a new network is easily added to an
existing network. These networks are scalable because the designers follow
accepted standards and protocols. This lets software and hardware vendors
focus on improving products and services without having to design a new set of
rules for operating within the network. (What is a Scalable Network?

Imagine you have a phone network for your school. When more students join and want to use
their phones, the network should be able to handle this without slowing down for everyone else.
A scalable network is like that—it can grow quickly to support more users and new apps
without making things slower for the people already using it.

How Does It Work?

When a new network is added to an existing one, it should fit in seamlessly. Think of it like
adding a new section to a library. If the library is well-organized, you can add more bookshelves
without creating chaos. Similarly, a scalable network allows new parts to be added easily without
disrupting the current users.
Why is This Important?

The reason these networks work well is that the people who design them follow specific rules
and guidelines. These are called standards and protocols. By sticking to these rules, different
companies can create their hardware (like routers and switches) and software (like apps and
programs) that work well together.

The Benefit for Companies

Because everyone follows the same standards, companies can focus on making their products
better instead of worrying about creating new rules for how things should connect. This means
better services, faster internet, and more reliable connections for users.

In Summary

A scalable network is flexible and can grow to meet the needs of more users without slowing
down. It does this by following established rules, allowing different technologies to work
together smoothly, which benefits everyone involved.)
Quality of Service
Quality of Service (QoS) is an increasing requirement of networks today. New
applications available to users over networks, such as voice and live video
transmissions, create higher expectations for the quality of the delivered services. Have
you ever tried to watch a video with constant breaks and pauses? As data, voice, and
video content continue to converge onto the same network, QoS becomes a primary
mechanism for managing congestion and ensuring reliable delivery of content to all
users.

Congestion occurs when the demand for bandwidth exceeds the amount
available. Network bandwidth is measured in the number of bits that can be
transmitted in a single second, or bits per second (bps). When simultaneous
communications are attempted across the network, the demand for network bandwidth
can exceed its availability, creating network congestion.

When the volume of traffic is greater than what can be transported across the network,
devices will hold the packets in memory until resources become available to transmit
them. In the figure, one user is requesting a web page, and another is on a phone call.
With a QoS policy in place, the router can manage the flow of data and voice traffic,
giving priority to voice communications if the network experiences congestion. The
focus of QoS is to prioritize time-sensitive traffic. The type of traffic, not the
content of the traffic, is what is important.
(What is QoS?
QoS stands for Quality of Service. Think of it as a set of rules or methods used in networks to
make sure that important information gets through quickly and smoothly.

Why is Prioritization Important?

In a school, imagine if you have a fire alarm going off while students are trying to take a test.
The fire alarm is much more important and needs immediate attention, right? Similarly, in
computer networks, some types of data are more urgent than others.

Time-Sensitive Traffic

When we talk about time-sensitive traffic, we’re referring to types of data that need to be
delivered quickly. For example:

 Video calls (like Zoom or Skype) need to be clear and smooth because if there are delays, it can
be frustrating and hard to communicate.
 Online gaming also requires quick responses; if there’s a lag, it can ruin the whole experience.

The Type of Traffic Matters

Now, when we say that "the type of traffic, not the content of the traffic, is what is important,"
we mean that it doesn’t matter what specific information is being sent. What matters is whether
it’s the kind of data that needs to be prioritized.

For example:

 A video stream (like a movie) is considered time-sensitive because you want it to play smoothly.
 An email, on the other hand, can wait a little. If it arrives a few seconds later, that's okay.

In Summary

QoS is all about making sure that the most important and time-sensitive information gets through
a network quickly, just like how urgent announcements or alarms take priority over less critical
things. It focuses on the type of data rather than what that data actually says. This helps keep
everything running smoothly, especially when many people are using the network at the same
time.) (In the context of networks, traffic refers to the flow of data being transmitted over a
network. You can think of it like cars on a road. Just as cars travel from one place to another,
data packets travel between computers and devices.

Types of Traffic
1. Web Traffic: This includes data from websites you visit, like loading pages or images.
2. Streaming Traffic: This is data from videos or music streaming services, like Netflix or Spotify.
3. Gaming Traffic: This involves data exchanged during online games, where quick responses are
crucial.
4. Email Traffic: This includes all the messages sent and received through email.

Why is Traffic Important?

Understanding traffic is essential because:

 Network Performance: Just like too many cars on a road can cause traffic jams, too much data
can slow down a network. Managing traffic helps keep everything running smoothly.
 Prioritization: Some types of traffic (like video calls) need to be prioritized over others (like file
downloads) to ensure a good experience for users.

In summary, traffic in networking refers to the movement of data, and managing it effectively is
key to maintaining good performance and service quality.)

Network Security
The network infrastructure, services, and the data contained on network-attached
devices are crucial personal and business assets. Network administrators must
address two types of network security concerns: network infrastructure security
and information security.

Securing the network infrastructure includes physically securing devices that


provide network connectivity and preventing unauthorized access to the management
software that resides on them, as shown in the figure.
Network administrators must also protect the information contained within the packets
being transmitted over the network, and the information stored on network attached
devices. In order to achieve the goals of network security, there are three primary
requirements.

 Confidentiality - Data confidentiality means that only the intended and


authorized recipients can access and read data.
 Integrity - Data integrity assures users that the information has not been altered
in transmission, from origin to destination.
 Availability - Data availability assures users of timely and reliable access to data
services for authorized users.

Check Your Understanding - Reliable


Networks
Check your understanding of reliable networks by choosing the correct answer to the
following questions.

Question 1
When designers follow accepted standards and protocols, which of the four basic
characteristics of network architecture is achieved?
Scalability
Scalability happens when designers follow accepted standards and protocols.

Question 2
Confidentiality, integrity, and availability are requirements of which of the four basic
characteristics of network architecture?

Security
Confidentiality, integrity, and availability are requirements of security.

Question 3
With which type of policy, a router can manage the flow of data and voice traffic, giving
priority to voice communications if the network experiences congestion?

QoS
QoS means that a router will manage the flow of data and voice traffic, giving priority to voice
communications.

Question 4
Having multiple paths to a destination is known as redundancy. This is an example of
which characteristic of network architecture?

fault tolerance
Redundancy is an example a fault-tolerant network architecture.

HIERARCHICAL NETWORK DESIGN

Physical and Logical Addresses


A person's name usually does not change. A person's address on the other hand,
relates to where the person lives and can change. On a host, the MAC address does
not change; it is physically assigned to the host NIC and is known as the physical
address. The physical address remains the same regardless of where the host is placed
on the network.
The IP address is similar to the address of a person. It is known as a logical address
because it is assigned logically based on where the host is located. The IP address, or
network address, is assigned to each host by a network administrator based on the
local network.

IP addresses contain two parts. One part identifies the network portion. The network
portion of the IP address will be the same for all hosts connected to the same local
network. The second part of the IP address identifies the individual host on that
network. Within the same local network, the host portion of the IP address is unique to
each host, as shown in the figure.

Both the physical MAC and logical IP addresses are required for a computer to
communicate on a hierarchical network, just like both the name and address of a person
are required to send a letter.

View Wireless and Wired NIC Information


In this lab, you will complete the following objectives:

 Identify and work with PC NICs.


 Identify and use the System Tray network icons.
Lab - View Wireless and Wired NIC Information
Objectives
Part 1: Identify and Work with PC NICs
Part 2: Identify and Use the System Tray Network Icons

Background / Scenario
This lab requires you to determine the availability and status of the network interface cards (NICs) on
the PC. Windows provides a number of ways to view and work with your NICs.
In this lab, you will access the NIC information of the PC and change the status of these cards.

Required Resources
= 1 PC (Windows 10 with two NICs, wired and wireless, and a wireless connection)
= A wireless router

Instructions

Part 1: Identify and Work with PC NICs


In Part 1, you will identify the NIC types in the PC. You will explore different ways to extract
information about these NICs and how to activate and deactivate them.
Note: This lab was performed using a PC running on the Windows 10 operating system. You should
be able to perform the lab with another Windows operating systems version. However, menu
selections and screens may vary.

Step 1: Use Network connections.


You will verify which network connections are available.
a. Right-click Start and select Network Connections.
b. The Network Connections window displays the list of NICs available on this PC. Look for your
Local Area Connection and Wireless Network Connection adapters in this window.
Note: If the Network status page is displayed, click Change adapter options to navigate to the
Network Connections window.
Note: Other types of network adapters, such as Bluetooth Network connection and Virtual Private
Network (VPN) adapter, may also be displayed in this window.

Step 2: Work with your wireless NIC.


Verify the wireless network connection settings.
a. Right-click a Wireless Network Connection. The first option displays if your wireless NIC is
enabled or disabled. If your wireless NIC is disabled, you will have an option to Enable it.
b. Verify that the wireless network is connected. If not, click Connect/Disconnect to connect to the
desired network. Click Status to open the Wireless Network Connection Status window.
Questions:

What is the Service Set Identifier (SSID) for the wireless router of your connection?
Answer

What is the speed of your wireless connection?


Answer Area

c. Click Details to display the Network Connection Details window.


Question:

What is the MAC address of your wireless NIC?


Ansd. Open a Command Prompt and enter ipconfig /all.
C:\Users\Bob> ipconfig /all
Notice the information displayed is similar to the Network Connection Details window information.
When you have reviewed the details, click Close to return to the Wireless Network Connection
Status window.
e. Return to the Wireless Network Connection Status window. Click Wireless Properties to open
the Wireless Network Properties window of the Home-Net network.
f. You should always use wireless security whenever available. To verify (or configure) the wireless
security options click on the Security tab.
The window displays the type of security and encryption method enabled. You can also enter (or
change) the security key in this window. Close all windows.

Step 3: Work with your wired NIC.


We will now verify the wired network connection settings.
a. Open the Network Connections window by right-clicking Windows Start > Network
Connections.
Note: If the Network status page is displayed, click Change adapter options to navigate to the
Network Connections window.
b. Select and right-click the Local Area Connection option to display the drop-down list. If the NIC
is disabled, enable it.
c. Click the Status option to open the Local Area Connection Status window. This window displays
information about your wired connection to the LAN.
d. Click Details… to view the address information for your LAN connection.
e. Open a Command Prompt and enter ipconfig /all. Find your Local Area Connection information
and compare this with the information displayed in the Network Connection Details window.
f. Close all windows on your desktop.

Part 2: Identify and Use the System Tray Network Icons


In Part 2, you will use the network icons in your system tray to display the networks available on the
network.
a. The bottom right-hand corner of the Windows 10 screen contains the system tray. Move your
mouse to display the system tray.
b. If you hover over the network icon in the system tray, it displays the currently connected networks.
c. Click the wireless network icon, and it displays the wired and wireless network SSIDs that are in
range of your wireless NIC.
d. Right-click the wireless network icon, and it displays a troubleshooting option and to open the
Network and Sharing Center window.
e. Click the Open Network and Sharing Center option.
f. The Network and Sharing Center is a central window that displays information about the active
network or networks, the network type, the type of access.
Reflection
Why would you activate more than one NIC on a PC?
Answers may vary. Multiple NICs can be used if more than one path is needed for the PC.
One example of this would be if the PC is being used as a proxy server.

Hierarchical Analogy
Imagine how difficult communication would be if the only way to send a message
to someone was to use the person's name. If there were no street addresses,
cities, towns, or country boundaries, delivering a message to a specific person
across the world would be nearly impossible.
On an Ethernet network, the host MAC address is similar to a person's name. A
MAC address indicates the individual identity of a specific host, but it does not
indicate where on the network the host is located. If all hosts on the internet
(millions and millions of them) were each identified by their unique MAC address only,
imagine how difficult it would be to locate a single one.

Additionally, Ethernet technology generates a large amount of broadcast traffic in


order for hosts to communicate. Broadcasts are sent to all hosts within a single
network. Broadcasts consume bandwidth and slow network performance. What would
happen if the millions of hosts attached to the internet were all in one Ethernet network
and were using broadcasts?

For these two reasons, large Ethernet networks consisting of many hosts are not
efficient. It is better to divide larger networks into smaller, more manageable
pieces. One way to divide larger networks is to use a hierarchical design model.

Access, Distribution, and Core


IP traffic is managed based on the characteristics and devices associated with each of
the three layers of the hierarchical network design model: Access, Distribution and
Core.
Access Layer

The access layer provides a connection point for end user devices to the network
and allows multiple hosts to connect to other hosts through a network device,
usually a switch, such as the Cisco 2960-XR shown in the figure, or a wireless access
point. Typically, all devices within a single access layer will have the same
network portion of the IP address.

If a message is destined for a local host, based on the network portion of the IP
address, the message remains local. If it is destined for a different network, it is
passed up to the distribution layer. Switches provide the connection to the
distribution layer devices, usually a Layer 3 device such as a router or Layer 3 switch.

Cisco 2960-XR

Distribution Layer

The distribution layer provides a connection point for separate networks and
controls the flow of information between the networks. It typically contains more
powerful switches, such as the Cisco C9300 series shown in the figure, than the access
layer as well as routers for routing between networks. Distribution layer devices
control the type and amount of traffic that flows from the access layer to the core
layer.

Cisco C9300 Series


Core Layer

The core layer is a high-speed backbone layer with redundant (backup)


connections. It is responsible for transporting large amounts of data between
multiple end networks. Core layer devices typically include very powerful, high-
speed switches and routers, such as the Cisco Catalyst 9600 shown in the figure.
The main goal of the core layer is to transport data quickly.

Cisco Catalyst 9600

Check Your Understanding -


Hierarchical Network Design
Question 1
An IP address is considered what type of address:

Logical
An IP address is a logical address.

Question 2
An Ethernet MAC address is considered what type of address:

An Ethernet MAC address is a physical address.


Question 3
Which address does not change when a device is connected to a new network?

Physical

The physical address does not change when the device is connected to a new network.

Question 4
Which portion of an IP address uniquely identifies that device on that network?

Host

Question 5
Which design layer provides connectivity to devices on an Ethernet LAN?

The access layer provides connectivity to devices on an Ethernet LAN

NETWORK DESIGN SUMMARY

What Did I Learn in this Module?


Reliable Networks

As networks evolve, we have learned that there are four basic characteristics that network
architects must address to meet user expectations: Fault Tolerance, scalability, QoS, and security.

A fault tolerant network limits the number of affected devices during a failure. It allows quick
recovery when such a failure occurs. These networks depend on multiple paths between the
source and destination of a message. If one path fails, the messages are instantly sent over a
different link.

A scalable network expands quickly to support new users and applications. It does this without
degrading the performance of services that are being accessed by existing users. Networks can be
scalable because the designers follow accepted standards and protocols.

QoS is an increasing requirement of networks today. As data, voice, and video content continue
to converge onto the same network, QoS becomes a primary mechanism for managing
congestion and ensuring reliable delivery of content to all users. Network bandwidth is measured
in bps. When simultaneous communications are attempted across the network, the demand for
network bandwidth can exceed its availability, creating network congestion. The focus of QoS is
to prioritize time-sensitive traffic. The type of traffic, not the content of the traffic, is what is
important.
Network administrators must address two types of network security concerns: network
infrastructure security and information security. Network administrators must also protect the
information contained within the packets being transmitted over the network, and the
information stored on network attached devices. There are three primary requirements to achieve
the goals of network security: Confidentiality, Integrity, and Availability.

Hierarchical Network Design

IP addresses contain two parts. One part identifies the network portion. The network portion of
the IP address will be the same for all hosts connected to the same local network. The second
part of the IP address identifies the individual host on that network. Both the physical MAC and
logical IP addresses are required for a computer to communicate on a hierarchical network.

The Network and Sharing Center on a PC shows your basic network information and set up
connections, including your active networks and whether you are connected wired or wirelessly
to the internet and within your LAN. You can view the properties of your connections here.

On an Ethernet network, the host MAC address is similar to a person's name. A MAC address
indicates the individual identity of a specific host, but it does not indicate where on the network
the host is located. If all hosts on the internet (millions and millions of them) were each
identified by their unique MAC address only, imagine how difficult it would be to locate a single
one. It is better to divide larger networks into smaller, more manageable pieces. One way to
divide larger networks is to use a hierarchical design model.

Hierarchical networks scale well. The access layer provides a connection point for end user
devices to the network and allows multiple hosts to connect to other hosts through a network
device, usually a switch or a wireless access point. Typically, all devices within a single access
layer will have the same network portion of the IP address. The distribution layer provides a
connection point for separate networks and controls the flow of information between the
networks. Distribution layer devices control the type and amount of traffic that flows from the
access layer to the core layer. The core layer is a high-speed backbone layer with redundant
connections. It is responsible for transporting large amounts of data between multiple end
networks. The main goal of the core layer is to transport data quickly.

Webster - Reflection Questions


Marcy and Vincent are lucky to have Bob consult with them about the network at their store.
Many small businesses have networks that grow over time, but they are not designed to scale
reliably or securely. Marcy and Vincent understand that if they take the time and spend some
money now, they will save themselves a lot of trouble as their network continues to grow.
Knowing what you know now about reliable and scalable networks, is there anything you would
like to do to update your own network at home, school, or work?
Network Design Quiz
Question 1
Which two devices would commonly be found at the access layer of the hierarchical
enterprise LAN design model? (Choose two.)

access point
Layer 2 switch
While some designs do route at the access layer, the two devices that should always be placed
at the access layer of the hierarchical design model are an access point and a Layer 2 switch. A
modular switch is commonly used at the core layer. Routing by a Layer 3 device is commonly
used in the distribution layer. The firewall is a device in the Internet edge network design.

Question 2
What characteristic of a network enables it to quickly grow to support new users and
applications without impacting the performance of the service being delivered to existing
users?

Scalability
Networks must be able to quickly grow to support new users and services, without impacting
existing users and services. This ability to grow is known as scalability.

Question 3
Match the definition to the security goal.

ensuring confidentiality - only the intended recipients can access and read the data

ensuring availability - the assurance of timely and reliable access to data

maintaining integrity - the assurance that the information has not been altered during
transmission

Question 4
A student is streaming a movie to his computer but the movie keeps stopping. What
service would give streaming traffic higher priority and avoid the movie stopping?

quality of service (QoS)


Video data needs to be transmitted in a continuous stream. The QoS can be used to give video
data high priority during the data transmission so that video traffic would be sent first.
Question 5
True or False?
The impact of the failure of an important network device can be limited by a feature
called fault tolerance.

True
A fault tolerant network limits the impact of a failure. Its implementation builds the network in a
way that allows quick recovery if a critical network device fails.

Question 6
Which type of address never changes on a device and is similar to a person's name?

MAC address
A Media Access Control (MAC) address is unique on every device. An Internet Protocol (IP)
address is used to communicate with devices on another LAN or on the Internet. A broadcast
address allows a single device to communicate with all other devices. A multicast address
allows a single device to communicate with a group of devices.

Question 7
What are the three layers of the switch hierarchical design model? (Choose three.)

Access
Core
Distribution
The access layer is the lowest layer and it provides network access to users. The distribution
layer has many functions, but it aggregates data from the access layer, provides filtering, policy
control, and sets Layer 3 routing boundaries. The core layer provides high speed connectivity.

Question 8
Which network feature uses redundancy as a means to limit the number of affected
users in the event of a failure?

fault tolerance
Redundancy in the network design provides fault tolerance to limit the number of affected users
if there is a failure.

Question 9
What characteristic of a network would allow video traffic to have priority over traffic
from an email application?
quality of service
Quality of Service (QoS) is implemented in networks to prioritize traffic. Traffic for real-time
services such as voice and video requires a higher priority than data traffic. This helps to ensure
reliable delivery of voice and video content to users.

Question 10
What is the responsibility of the distribution layer in a hierarchical network design?

It controls the traffic flows between the other layers.

The distribution layer controls the type and amount of traffic that flows from the access layer to
the core layer.

Question 11
Which network design model improves efficiency by dividing the network into smaller
pieces.

Hierarchical
A hierarchical network design divides the network into smaller pieces to improve efficiency. The
Cisco hierarchical design divides the network into three layers, the core, the distribution, and the
access.

Question 12
Match the feature with the description

Scalability - allows the network to grow


Quality of service - prioritizes traffic
Fault tolerance - provides reliability

MODULE 2 – CLOUD AND VIRTUALIZATION

Why Should I Take this Module?


In planning the future network, Bob believes that Marcy and Vincent should take
advantage of cloud services and virtualization. Bob explained that they can lease
services from a cloud provider. Marcy and Vincent wanted to know why they should
consider this. Bob explains that this will use less energy, require less equipment,
and less space. It can also help with disaster recovery. He compares this to
Marcy and Vincent’s pictures on their mobile phones being backed up to a cloud.
Even if the mobile phone gets damaged, the photos can still be retrieved.

Can you think of how you use the cloud? How much do you know about the cloud and
virtualization? Let me help you out with learning more. Take this module!

What Will I Learn in this Module?


Module Title: Cloud and Virtualization

Module Objective: Explain the characteristics of virtualization and cloud services.

Topic Title Topic Objective


Cloud and Cloud Services Explain the characteristics of clouds and cloud services.
Virtualization Explain the purpose and characteristics of virtualization

CLOUD AND CLOUD SERVICES


Types of Clouds
There are four primary cloud models:

 Public clouds - Cloud-based applications and services offered in a public cloud


are made available to the general population. Services may be free or are offered
on a pay-per-use model, such as paying for online storage. The public cloud
uses the internet to provide services.
 Private clouds - Cloud-based applications and services offered in a private
cloud are intended for a specific organization or entity, such as the government.
A private cloud can be set up using the private network of an organization,
though this can be expensive to build and maintain. A private cloud can also be
managed by an outside organization with strict access security.
 Hybrid clouds - A hybrid cloud is made up of two or more clouds (example: part
private, part public), where each part remains a separate object, but both are
connected using a single architecture. Individuals on a hybrid cloud would be
able to have degrees of access to various services based on user access rights.
 Community clouds - A community cloud is created for exclusive use by a
specific community. The differences between public clouds and community
clouds are the functional needs that have been customized for the community.
For example, healthcare organizations must remain compliant with policies and
laws (e.g., HIPAA) that require special authentication and confidentiality.

Cloud Computing and Virtualization


The terms “cloud computing” and “virtualization” are often used interchangeably;
however, they mean different things. Virtualization is the foundation of cloud
computing. Without it, cloud computing, as it is most-widely implemented, would
not be possible.

Over a decade ago, VMware developed a virtualizing technology that enabled a host
OS to support one or more client OSs. Most virtualization technologies are now
based on this technology. The transformation of dedicated servers to virtualized servers
has been embraced and is rapidly being implemented in data center and enterprise
networks.

Virtualization means creating a virtual rather than physical version of something, such
as a computer. An example would be running a "Linux computer" on your Windows PC,
which you will do later in the lab.

To fully appreciate virtualization, it is first necessary to understand some of the history


of server technology. Historically, enterprise servers consisted of a server OS, such as
Windows Server or Linux Server, installed on specific hardware, as shown in the figure.
All server RAM, processing power, and hard drive space were dedicated to the service
provided (e.g., web, email services, etc.).

The major problem with this configuration is that when a component fails, the service
that is provided by this server becomes unavailable. This is known as a single point of
failure. Another problem was that dedicated servers were underused. Dedicated servers often
sat idle for long periods of time, waiting until there was a need to deliver the specific service
they provide. These servers wasted energy and took up more space than was warranted
by the amount of service provided. This is known as server sprawl.
Check Your Understanding - Cloud and
Cloud Services
Check your understanding of cloud and cloud services by choosing the correct answer to
the following questions.

Question 1
Which cloud model represents two or more clouds where each part remains a distinctive
object, but both are connected using a single architecture?

hybrid cloud
The hybrid cloud model represents two or more clouds where each part remains a distinctive
object, but both are connected using a single architecture.

Question 2
Which cloud model is used to meet the needs of a specific industry, such as healthcare
or media?

community cloud

The community cloud model is used to meet the needs of a specific industry, such as healthcare
or media.

Question 3
What device uses all the RAM, processing power, and hard drive space devoted to one
service?

dedicated server
A dedicated server uses all the RAM, processing power, and hard drive space devoted to one
service.

VIRTUALIZATION
Advantages of Virtualization
One major advantage of virtualization is overall reduced cost:
 Less equipment is required - Virtualization enables server consolidation, which requires
fewer physical devices and lowers maintenance costs.
 Less energy is consumed - Consolidating servers lowers the monthly power and cooling
costs.
 Less space is required - Server consolidation reduces the amount of required floor
space.

These are additional benefits of virtualization:

 Easier prototyping - Self-contained labs, operating on isolated networks, can be rapidly


created for testing and prototyping network deployments.
 Faster server provisioning - Creating a virtual server is far faster than provisioning a
physical server.
 Increased server uptime - Most server virtualization platforms now offer advanced
redundant fault tolerance features.
 Improved disaster recovery - Most enterprise server virtualization platforms have
software that can help test and automate failover before a disaster happens.
 Legacy support - Virtualization can extend the life of OSs and applications providing
more time for organizations to migrate to newer solutions.

Hypervisors
The hypervisor is a program, firmware, or hardware that adds an abstraction layer on top of the
physical hardware. The abstraction layer is used to create virtual machines which have access to
all the hardware of the physical machine such as CPUs, memory, disk controllers, and NICs.
Each of these virtual machines runs a complete and separate operating system. With
virtualization, it is not uncommon for 100 physical servers to be consolidated as virtual machines
on top of 10 physical servers that are using hypervisors.

Type 1 Hypervisor - “Bare Metal” Approach

Type 1 hypervisors are also called the “bare metal” approach because the hypervisor is installed
directly on the hardware. Type 1 hypervisors are usually used on enterprise servers and data
center networking devices.

With Type 1 hypervisors, the hypervisor is installed directly on the server or networking
hardware. Then, instances of an OS are installed on the hypervisor, as shown in the figure. Type
1 hypervisors have direct access to the hardware resources; therefore, they are more efficient
than hosted architectures. Type 1 hypervisors improve scalability, performance, and robustness.

The figure illustrates a Type 1 hypervisor on a server. Starting from the bottom, the server has
hardware with a hypervisor on top, branching from the hypervisor are 3 operating systems:
Windows OS, Linux OS and Unix OS.
Type 2 Hypervisor - “Hosted” Approach

A Type 2 hypervisor is software that creates and runs VM instances. The computer, on
which a hypervisor is supporting one or more VMs, is a host machine. Type 2
hypervisors are also called hosted hypervisors. This is because the hypervisor is
installed on top of the existing OS, such as macOS, Windows, or Linux. Then, one or
more additional OS instances are installed on top of the hypervisor, as shown in the
figure. A big advantage of Type 2 hypervisors is that management console software is
not required.

Note: It is important to make sure that the host machine is robust enough to install and
run the VMs, so that it does not run out of resources.

Lab - Install Linux in a Virtual Machine and


Explore the GUI
In this lab, you will install a Linux OS in a virtual machine using a desktop virtualization
application, such as VirtualBox. After completing the installation, you will explore the GUI
interface.

Lab - Install Linux in a Virtual Machine and Explore the GUI


Objectives
Part 1: Prepare a Computer for Virtualization
Part 2: Install a Linux OS on the Virtual Machine
Part 3: Explore the GUI

Background / Scenario
Computing power and resources have increased tremendously over the last 10 years. A benefit
of multi-core processors and large amounts of RAM is the ability to install multiple operating
systems through the use of virtualization on a computer.
With virtualization, one or more virtual computers can operate inside one physical
computer. Virtual computers that run within physical computers are called virtual machines.
Virtual machines are often called guests, and physical computers are often called hosts.
Anyone with a modern computer and operating system can run virtual machines.
In this lab, you will install a Linux OS in a virtual machine using a desktop virtualization
application, such as VirtualBox. After completing the installation, you will explore the GUI
interface. You will also explore the command line interface using this virtual machine in a lab later
in this course.

Required Resources
= Computer with a minimum of 2 GB of RAM and 10 GB of free disk space
= High-speed Internet access to download Oracle VirtualBox and Linux OS image, such as Ubuntu
Desktop

Instructions

Part 1: Prepare a Computer for Virtualization


In Part 1, you will download and install desktop virtualization software and a Linux OS image.
Your instructor may provide you with a Linux OS image.

Step 1: Download and install VirtualBox.


VMware Player and Oracle VirtualBox are two virtualization programs that you can download and
install to support the OS image file. In this lab, you will use the VirtualBox application.
a. Navigate to https://www.virtualbox.org/. Click the download link on this page.
b. Choose and download the appropriate installation file based on your operating system.
c. After the VirtualBox installation file is downloaded, run the installer and accept the default
installation settings.

Step 2: Download a Linux Image.


a. Navigate to the Ubuntu website at http://www.ubuntu.com. (https://getmyos.com/ubuntu-24-04-lts-
noble-numbat-april-2024-desktop-64-bit-official-iso-download) Click the Download link on this
page to download and save an Ubuntu Desktop image.

Step 3: Create a New Virtual Machine.


a. Click Start and search for Virtualbox. Click Oracle VM VirtualBox to open the manager. When
the manager opens, click New to start the Ubuntu installation.
b. In the Name and operating system screen, type Ubuntu in the Name field. For the Type field,
select Linux. In the Version field, select the corresponding downloaded version. Click Next to
continue.
c. In the Memory size screen, increase the amount of RAM as long as the amount of RAM for the
virtual machine is in the green area. Going beyond the green area would adversely affect the
performance of the host. Click Next to continue.
d. In the Hard disk screen, click Create to create a virtual hard disk now.
e. In the Hard disk file type screen, use the default file type settings of VDI (VirtualBox Disk
Image). Click Next to continue.
f. In the Storage on physical hard disk screen, use the default storage settings of dynamically
allocated. Click Next to continue.
g. In the File location and size screen, you can adjust the hard drive and change the name and
location of the virtual hard drive. Click Create to use the default settings.
h. When the hard drive creation is done, the new virtual machine is listed in the Oracle VM
VirtualBox Manager window. Select Ubuntu and click Start in the top menu.

Part 2: Install Ubuntu on the virtual machine

Step 1: Mount the Image.


a. In the Oracle VM Virtualbox Manager window. Right-click Ubuntu and select Settings. In
the Ubuntu – Settings window, click Storage in the left pane. Click Empty in the middle pane. In
the right pane, click the CD symbol and select the file location of the Ubuntu image. Click OK to
continue.
b. In the Oracle VM VirtualBox Manager window, click Start in the top menu.

Step 2: Install the OS.


a. In the Welcome screen, you are prompted to try or install Ubuntu. The try option does not install
the OS, it runs the OS straight from the image. In this lab, you will install the Ubuntu OS in this
virtual machine. Click Install Ubuntu.
b. Follow the on-screen instructions and provide the necessary information when prompted.
Note: If you are not connected to the Internet, you can continue to install and enable the network
later.
c. Because this Ubuntu installation is in a virtual machine, it is safe to erase the disk and install
Ubuntu without affecting the host computer. Select Erase disk and install Ubuntu. Otherwise
installing Ubuntu on a physical computer would erase all data on the disk and replace the existing
operating system with Ubuntu. Click Install Now to start the installation.
d. Click Continue to erase the disk and install Ubuntu.
e. In the Who are you? screen, provide your name and choose a password. You can use the
username generated or enter a different username. Enter your desired username and password.
If desired, you can change the other settings. Click Continue.
f. The Ubuntu OS is now installing in the virtual machine. This will take several minutes. When
the Installation is complete message displays, return to the Oracle VM Virtualbox
Manager window. Right-click Ubuntu and select Settings. In the Ubuntu – Settings window,
click Storage in the left pane. Click the mounted Ubuntu image in the middle pane. In the right
pane, click the CD symbol and click Remove Disk from Virtual Drive. Click OK to continue.
g. In the Ubuntu VM, click Restart Now.

Part 3: Explore the GUI


In this part, you will install the VirtualBox guest additions and explore the Ubuntu GUI.

Step 1: Install Guest Additions.


a. Log on to your Ubuntu virtual machine using the user credentials created in the previous part.
b. Your Ubuntu Desktop window may be smaller than expected. This is especially true on high-
resolution displays. Click Device > Insert Guest Additions CD image… to install the Guest
Additions. This allows more functions, such as changing the screen resolution in the virtual
machine.

c. Click Run to install the additions. When prompted for a password, use the same password that
you used to log on. Click Authenticate to continue.
d. If the computer was not connected to the Internet during the installation, click Devices > Network
Settings in the Oracle VirtualBox menu. Enable network adapters and configure the proper
setting for network connections as necessary. Click OK.
e. When the installation of the additions is done, restart the virtual machine again. Click the menu in
the upper-right corner and click Shut down. Click Restart to restart Ubuntu.

Step 2: Open a web browser.


a. Log on to Ubuntu again. After you are logged on again, you can resize the virtual machine
window.
b. Open a web browser. Depending on the Linux distribution, you may need to search for a web
browser or there is a link to a web browser already on the Desktop.
c. Locate a terminal emulator to access the command line interface. You will be using a terminal
emulator in later labs.
d. Explore the installed Linux distribution and locate a few applications that you may use.

Reflection Question
What are the advantages and disadvantages of using a virtual machine?

With a virtual machine, you are able to test new applications or operating systems without
affecting your host machine. You are also able to save the current machine state when you
close the virtual machine. If you have any issues, you have the option to revert the virtual
machine to a previously saved state. On the other hand, a virtual machine requires
hardware resources from the host machine, such as hard drive space, RAM, and
processing power.
(https://www.youtube.com/watch?v=rJ9ysibH768) – ubuntu 22.04 in virtualbox – the complete guide

(https://www.youtube.com/watch?v=sAMnXte56yY&t=63s) kali linux in virtualbox

Cloud and Virtualization Summary

What Did I Learn in this Module?


Cloud and Cloud Services

In general, when talking about the cloud, we are talking about data centers, cloud computing, and
virtualization. Data centers are usually large facilities which provide massive amounts of power,
cooling, and bandwidth. Only very large companies can afford their own data centers. Most
smaller organizations lease the services from a cloud provider.
Cloud services include the following:

 SaaS – Software as a service


 PaaS – Platform as a service
 IaaS – Infrastructure as a service
There are four primary cloud models, as shown in the figure.
 Public clouds - Cloud-based applications and services offered in a public cloud are made
available to the general population.
 Private clouds - Cloud-based applications and services offered in a private cloud are
intended for a specific organization or entity, such as the government.
 Hybrid clouds - A hybrid cloud is made up of two or more clouds, where each part
remains a separate object, but both are connected using a single architecture.
 Community clouds - A community cloud is created for exclusive use by a specific
community. The differences between public clouds and community clouds are the
functional needs that have been customized for the community.

Virtualization is the foundation of cloud computing. Without it, cloud computing, as it is most-
widely implemented, would not be possible. Virtualization means creating a virtual rather than
physical version of something, such as a computer. An example would be running a "Linux
computer" on your Windows PC.

Virtualization

One major advantage of virtualization is overall reduced cost:

 Less equipment is required - Virtualization enables server consolidation, which requires


fewer physical devices and lowers maintenance costs.
 Less energy is consumed - Consolidating servers lowers the monthly power and cooling
costs.
 Less space is required - Server consolidation reduces the amount of required floor space.

These are additional benefits of virtualization:

 Easier prototyping - Self-contained labs, operating on isolated networks, can be rapidly


created for testing and prototyping network deployments.
 Faster server provisioning - Creating a virtual server is far faster than provisioning a
physical server.
 Increased server uptime - Most server virtualization platforms now offer advanced
redundant fault tolerance features.
 Improved disaster recovery - Most enterprise server virtualization platforms have
software that can help test and automate failover before a disaster happens.
 Legacy support - Virtualization can extend the life of OSs and applications providing
more time for organizations to migrate to newer solutions.

The hypervisor is a program, firmware, or hardware that adds an abstraction layer on top of the
physical hardware. The abstraction layer is used to create virtual machines which have access to
all the hardware of the physical machine such as CPUs, memory, disk controllers, and NICs.
Each of these virtual machines runs a complete and separate operating system.
Type 1 hypervisors are also called the “bare metal” approach because the hypervisor is installed
directly on the hardware. Type 1 hypervisors are usually used on enterprise servers and data
center networking devices.

A Type 2 hypervisor is software that creates and runs VM instances. The computer, on which a
hypervisor is supporting one or more VMs, is a host machine. Type 2 hypervisors are also called
hosted hypervisors. This is because the hypervisor is installed on top of the existing OS, such as
macOS, Windows, or Linux. Then, one or more additional OS instances are installed on top of
the hypervisor. A big advantage of Type 2 hypervisors is that management console software is
not required.

Webster - Reflection Questions


For now, Bob is suggesting that Marcy and Vincent use the cloud for data storage. They
understand that it is a subscription service, but it will allow them to maintain their data more
securely and it will be less expensive than buying their own data storage and server. As you now
know, there are many other services provided by the cloud. Marcy and Vincent may eventually
desire some of these services as well. Have you ever had your hard drive go down and not be
able to recover all your files? What if this happened to a computer or even a server at your
school or work? Does your school or work network use other cloud services? If so, do you know
what they are and why they were selected? If you were in Marcy and Vincent’s situation, what
cloud services would you consider using, besides data storage?
1. Cloud computing involves computers, software, servers, network devices, and other services
physically held at a remote location. Virtualization is used by the cloud computing vendors so
they can provide multiple servers, networks, applications, operating systems, etc. to clients
without having to buy the equipment for each one. Virtualization of servers, for example, allows
multiple servers to be on one physical server. Each server could be for a different client if
necessary.
MODULE 3 – NUMBER SYSTEMS
Webster - Why Should I Take this Module?
Webster here again! Bob is good at this networking stuff. When he was learning
networking, he had to understand number systems and so do you! You already use the
base 10 decimal system, which uses integers 0-9. Do you know other number systems
too? I've seen base-12, base-60, and others. Do you know about the binary system
computers use? The binary system uses just two integers, 0 and 1. Hosts, servers, and
network devices use binary addressing. There is also something called the
hexadecimal numbering system. It is used in networking to represent IP Version 6
addresses and Ethernet MAC addresses.

Take this module to learn more about these number systems and how to convert them!

What Will I Learn in this Module?


Module Title: Number Systems

Module Objective: Calculate numbers between decimal, binary, and hexadecimal systems.

Topic Title Topic Objective


Binary Number System Calculate numbers between decimal and binary systems.
Hexadecimal Number System Calculate numbers between decimal and hexadecimal systems.
Binary and IPv4 Addresses
IPv4 addresses begin as binary, a series of only 1s and 0s. These are difficult to
manage, so network administrators must convert them to decimal. This topic shows you
a few ways to do this.

Binary is a numbering system that consists of the digits 0 and 1 called bits. In contrast,
the decimal numbering system consists of 10 digits which includes 0 through 9.

Binary is important for us to understand because hosts, servers, and network devices
use binary addressing. Specifically, they use binary IPv4 addresses, as shown in the
figure, to identify each other.

Each address consists of a string of 32 bits, divided into four sections called octets.
Each octet contains 8 bits (or 1 byte) separated with a dot. For example, PC1 in the
figure is assigned IPv4 address 11000000.10101000.00001010.00001010. Its default
gateway address would be that of R1 Gigabit Ethernet
interface 11000000.10101000.00001010.00000001.
Binary works well with hosts and network devices. However, it is very challenging for
humans to work with.

For ease of use by people, IPv4 addresses are commonly expressed in dotted decimal
notation. PC1 is assigned the IPv4 address 192.168.10.10, and its default gateway
address is 192.168.10.1, as shown in the figure.

For a solid understanding of network addressing, it is necessary to know binary addressing and
gain practical skills converting between binary and dotted decimal IPv4 addresses. This section
will cover how to convert between base two (binary) and base 10 (decimal) numbering systems.

Video - Converting Between Binary and


Decimal Numbering Systems
Activity - Binary Game

This is a fun way to learn binary numbers for networking.

Game Link: https://learningnetwork.cisco.com/docs/DOC-1803

You will need to log in to cisco.com to use this link. It will be necessary to create an
account if you do not already have one.

There are also a variety of free mobile binary games. Search for "Binary Game" in your
app store.
Hexadecimal and IPv6 Addresses

Now you know how to convert binary to decimal and decimal to binary. You need that
skill to understand IPv4 addressing in your network. But you are just as likely to be
using IPv6 addresses in your network. To understand IPv6 addresses, you must be able
to convert hexadecimal to decimal and vice versa.

Just as decimal is a base ten number system, hexadecimal is a base sixteen system.
The base sixteen number system uses the digits 0 to 9 and the letters A to F. The figure
shows the equivalent decimal and hexadecimal values for binary 0000 to 1111.

Binary and hexadecimal work well together because it is easier to express a value as a
single hexadecimal digit than as four binary bits.

The hexadecimal numbering system is used in networking to represent IP Version 6


addresses and Ethernet MAC addresses.

IPv6 addresses are 128 bits in length and every 4 bits is represented by a single
hexadecimal digit; for a total of 32 hexadecimal values. IPv6 addresses are not case-
sensitive and can be written in either lowercase or uppercase.

As shown in the figure, the preferred format for writing an IPv6 address is x:x:x:x:x:x:x:x,
with each “x” consisting of four hexadecimal values. When referring to 8 bits of an IPv4
address we use the term octet. In IPv6, a hextet is the unofficial term used to refer to a
segment of 16 bits or four hexadecimal values. Each “x” is a single hextet, 16 bits, or
four hexadecimal digits.
The sample topology in the figure displays IPv6 hexadecimal addresses.

Video - Converting Between Hexadecimal


and Decimal Numbering Systems
What Did I Learn in this Module?

Binary Number Systems

Binary is a numbering system that consists of the digits 0 and 1 called bits. In contrast,
the decimal numbering system consists of 10 digits consisting of the digits 0 – 9. Hosts,
servers, and network devices use binary addressing. Specifically, they use binary IPv4
addresses. For ease of use by people, IPv4 addresses are commonly expressed in
dotted decimal notation.

This decimal system uses the powers of ten, or base 10. For example, the number
2,146 has a 2 in the thousands place, or two thousand. 2,146 has a 1 in the hundreds
place, or one hundred. It has a 4 in the tens place, or forty. It has a 6 in the ones place,
or six.

The binary system is a base 2 number system. Each place value can have a 0 or a 1. A
useful tool is the binary positional value table. It is common to use a table with eight
placeholders. 8 bits equal a byte.

Hexadecimal Number System

The hexadecimal numbering system is used in networking to represent IP Version 6


addresses and Ethernet MAC addresses. This base sixteen number system uses the
digits 0 to 9 and the letters A to F. Binary and hexadecimal work well together because
it is easier to express a value as a single hexadecimal digit than as four binary bits.

IPv6 addresses are 128 bits in length and every 4 bits is represented by a single
hexadecimal digit; for a total of 32 hexadecimal values. IPv6 addresses are not case-
sensitive and can be written in either lowercase or uppercase.

Webster - Reflection Questions

I wasn’t expecting to do math in the middle of my networking course, but I was surprised
by how much fun it is to convert decimal numbers into their binary and hexadecimal
equivalents. I have a better understanding of why IP addresses are represented the way
that we see them. Before you took this module, what did you know about binary and
hexadecimal numbering systems? Take a look at the MAC Address on your computer’s
NIC. What do you recognize about this address that you may not have before?

QUIZ
decimal 173 = 128 + 0 + 32 + 0 + 8 + 4 + 0 + 1
An IPv4 address consists of a string of 32 bits divided into four sections called octets. Each
octet contains 8 bits (or 1 byte) separated with a dot.
0x refers to the item as hexadecimal. Convert each character into its corresponding nibble.
Then combine the nibbles together and calculate the resulting decimal equivalent. C has a value
of 12. 12 x 16 = 192. 192 + 9 = 201.
When converted, CA in hex is equivalent to 11011010 in binary. One way to do the conversion
is one nibble at a time, C = 1100 and A = 1010. Combine the two nibbles gives 11001010.
A hextet is a term used to refer to a segment of 16 bits or four hexadecimal values. A single
hexadecimal number is made up with 4 bits, thus the range of a hexadecimal number is from 0
to f. A hextet contains 4 hexadecimal numbers and ranges from 0000 to ffff.
Each 4 binary digits equates to 1 hexadecimal digit.
1001 = 9
1101 = 13 (decimal) = D (hexadecimal)
An IPv4 address is comprised of 4 octets of binary digits, each containing 8 bits, resulting in a
32-bit address.
Binary is a numbering system that consists of the digits 0 and 1 called bits.
Decimal 139 in binary is 10001011. 128+8+2+1 = 139.
Each 4 binary digits equates to 1 hexadecimal digit.
1000 = 8
1011 = 11 (decimal) = B (hexadecimal)
The hexadecimal numbers are 0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f.. The hexadecimal number 0
represents 0 in decimal and is represented as 0000 in binary. The hexadecimal number f
represents 15 in decimal.
232 in binary is 11101000. 128+64+32+8 = 232
The binary number 11101100 00010001 00001100 00001010 translates to 236.17.12.10.

CHECKPOINT EXAM: CHARACTERISTICS OF NETWORK DESIGN


Type 2 hypervisors are hosted on an underlaying operating system and are best suited for
consumer applications and those experimenting with virtualization. Unlike Type 1 hypervisors,
Type 2 hypervisors do not require a management console and do not have direct access to
hardware.
Scalability refers to the ability of a network to expand to support new users, services, and
applications. In this example, scalability allows the administrator to expand the ability of the
network to support voice and video.
When the demand on the network resources exceeds the available capacity, the network
becomes congested. A converged network is designed to deliver multiple communication types,
such as data, video and voice services, using the same network infrastructure.
The access layer in the hierarchical network design provides a connection point for end user
devices to the network and allows multiple hosts to connect to other hosts through a network
device.
A MAC address is physically assigned to the host NIC and is known as the physical address.
The physical address remains the same regardless of where the host is placed on the network.
The IP address is known as a logical address because it is assigned logically based on where
the host is located. IP addresses contain two parts, network address and host address.
Quality of Service (QoS) is implemented in networks to prioritize traffic. Traffic for real-time
services such as voice and video requires a higher priority than data traffic to ensure reliable
delivery of voice and video content to users.
Fault tolerance is the characteristic of a network which allows it to quickly respond to failures of
network devices, media, or services. Quality of service refers to the measures taken to ensure
that network traffic requiring higher throughput receives the required network resources.
Scalability refers to the ability of the network to grow to accommodate new requirements.
Security refers to protecting networks and data from theft, alteration, or destruction. Integrity
refers to the completeness of something and is generally not used as a characteristic of
networks in the same way as the other terms.
Virtualization is the ability to run many instances of an OS simultaneously on the same
hardware platform. This reduces the amount of equipment that is required, thus resulting in less
power consumption and improved disaster recovery.
Software as a service (SaaS) refers to on demand software that is leased from the provider.
Platform as a service (PaaS) is when the provider provides the platform for a developer.
Infrastructure as a service (IaaS) is when key network devices such as routers and firewalls are
leased from a provider. Wireless as a service (WaaS) is when a provider provides wireless
connectivity at a fixed monthly cost.
A hypervisor is a software process that abstracts the hardware layer from the operating systems
allowing multiple virtual machines to run simultaneously.
access layer - provides host connectivity to the network
distribution layer - rovides interconnections for smaller local access networks
core layer - provides a high-speed connection for the backbone network
Infrastructure as a service (IaaS) provides an environment where users have an on-demand
infrastructure that they can install any platform as needed.
Type 2 hypervisors run as a software layer atop a host operating system. These hypervisors are
often found on PCs and not high-end servers.
Platform as a service (PaaS) provides a collaborative environment where multiple developers
can create software and host an application through a Cloud provider.
Decimal 165 in binary is 10100101. 128+32+4+1 = 165.
Each 4 binary digits equates to 1 hexadecimal digit.
1010 = 10 (decimal) = A (hexadecimal)
0101 = 5 (decimal) = 5 (hexadecimal)
Computing devices use the binary system for data processing and storage. Binary numbers are
based on powers of 2 and decimal numbers are based on powers of 10.
For ease of use by people, binary patterns are represented as dotted decimal. Computer
systems were created to understand binary addressing.
Binary is a numbering system that consists of the digits 0 and 1 called bits. A binary number is a
series of only 1s and 0s.
In order to convert a hexadecimal number to decimal, consider that the digit to the far right
represents the 1s column where values 0 through F can appear. A hexadecimal value of A
equals the decimal number 10. B equals 11, and so on through F equaling 15. The value of F in
the number F equals 15. Next consider the value of 3 in the hexadecimal number of 3F. That
place holder is the 16s column. Multiple the number 3 times 16 for a total of 48. Add 48 to 15 for
the grand total of 63. Hexadecimal 3F equals a decimal value of 63.
A hextet consists of 4 hexadecimal characters. Each hexadecimal character is represented by
four bits, giving a total of 16 bits.
Each 4 binary digits equates to 1 hexadecimal digit.
1011 = 11 (decimal) = B (hexadecimal)
1010 = 10 (decimal) = A (hexadecimal)

MODULE 4 – ETHERNET SWITCHING


Webster - Why Should I Take this Module?
Hey! It’s Webster again! Marcy and Vincent are beginning to see the value of Bob’s
advice. But they can’t afford a lot of downtime and they need to operate with the existing
network until Bob can make the upgrades. They will not add the VoIP, security cameras,
or online ordering system until then. Bob needs to evaluate their existing network prior
to the upgrade to better understand what will need to be done.

The furniture store’s network is an Ethernet network. Ethernet protocols define how data
is formatted and how it is transmitted over the wired network and specifies protocols
that operate at Layer 1 and Layer 2 of the OSI model.

Are you familiar with Ethernet? Why are the hexadecimal and binary number systems
important in an Ethernet network? I think you should take this module to learn more
about Ethernet, Ethernet frames, and Ethernet MAC addresses! Let’s get started!

What Will I Learn in this Module?


Module Title: Ethernet Switching

Module Objective: Explain how Ethernet operates in a switched network.


Topic Title Topic Objective
Ethernet Explain the OSI model Layer 1 and Layer 2 functions in an Ethernet network.
Ethernet Frames Explain how the Ethernet sublayers are related to the frame fields.
Ethernet MAC Address Explain the types of Ethernet MAC addresses.
The MAC Address Table Explain how a switch builds its MAC address table and forwards frames.

The Rise of Ethernet


In the early days of networking, each vendor used its own proprietary methods of
interconnecting network devices and networking protocols. If you bought equipment
from different vendors, there was no guarantee that the equipment would work together.
Equipment from one vendor might not communicate with equipment from another.

As networks became more widespread, standards were developed that defined rules by
which network equipment from different vendors operated. Standards are beneficial to
networking in many ways:

 Facilitate design
 Simplify product development
 Promote competition
 Provide consistent interconnections
 Facilitate training
 Provide more vendor choices for customers

There is no official local area networking standard protocol, but over time, one
technology, Ethernet, has become more common than the others. Ethernet protocols
define how data is formatted and how it is transmitted over the wired network. The
Ethernet standards specify protocols that operate at Layer 1 and Layer 2 of the OSI
model. Ethernet has become a de facto standard, which means that it is the technology
used by almost all wired local area networks, as shown in the figure.
Ethernet Evolution
"The Institute of Electrical and Electronics Engineers, or IEEE ", maintains the
networking standards, including Ethernet and wireless standards. IEEE committees are
responsible for approving and maintaining the standards for connections, media
requirements and communications protocols. Each technology standard is assigned a
number that refers to the committee that is responsible for approving and maintaining
the standard. The committee responsible for the Ethernet standards is 802.3.

Since the creation of Ethernet in 1973, standards have evolved for specifying faster and
more flexible versions of the technology. This ability for Ethernet to improve over time is
one of the main reasons that it has become so popular. Each version of Ethernet has an
associated standard. For example, 802.3 100BASE-T represents the 100 Megabit
Ethernet using twisted-pair cable standards. The standard notation translates as:

 100 is the speed in Mbps


 BASE stands for baseband transmission
 T stands for the type of cable, in this case, twisted-pair.

Early versions of Ethernet were relatively slow at 10 Mbps. The latest versions of
Ethernet operate at 10 Gigabits per second and more. Imagine how much faster these
new versions are than the original Ethernet networks.
Drag the slider bar in the figure across the timeline to see how Ethernet standards have
developed over time.

You might also like