Networking Devices and Initial Configuration
Networking Devices and Initial Configuration
Configuration
This course teaches intermediate knowledge and skills for networking by covering the
basic concepts and skills needed to build a home office network and a small Cisco
office network. The learner is presented with an engaging and exploratory view of
networks, the devices that comprise them, how they work, and troubleshooting tools
and techniques. It prepares the learner to move into Cybersecurity or DevNet by going
deeper into Ethernet, IP Addressing and the transport layer. It also covers Cisco device
configuration and ends with the ability to configure and troubleshoot a small Cisco
network. The goal of this course is to provide the learner with an intermediate overview
of network design, structure, and operations. Upon completion of the Network Devices
and Initial Configuration course, students will be able to perform the following tasks:
Student Resources
There are a number of tools and resources that are available to you that will help you in
your journey as you develop your networking skills and prepare for job opportunities.
Packet Tracer
Packet Tracer simulates the internal workings of a network and is used in this course.
If you are new to Packet Tracer, take this FREE, short, online course now: Getting
Started with Cisco Packet Tracer.
You can use your smartphone, tablet, or desktop to access your course; however,
Packet Tracer activities, as well as some other activities, quizzes, and exams are best
experienced using a PC.
Lab Environment
No equipment is necessary
You can find additional FAQs by visiting our virtual assistant, Morgan. Click the chat
icon in the top right corner to choose from a list of topics or enter your question.
Morgan’s help includes information about Packet Tracer, certificates, and badging.
https://www.netacad.com/resources/lab-downloads?courseLang=en-US
Let me introduce you to my friend Bob! Bob works in the IT field in Vancouver, Canada
and has some networking experience. He is consulting for his friends, Marcy and
Vincent, who have purchased a furniture store. They want to expand their brick-and-
mortar operations and establish an online store as well. Currently the store’s internal
network handles in-store transactions and inventory. Marcy and Vincent want to add
security cameras, VoIP phones, and also expand it to include ecommerce and shipping.
Bob explains that this will be more expensive than his friends had anticipated. He is
thinking about designing the future network for the furniture store. He explains that he
must consider fault tolerance, scalability, QoS, and security. Also, their network is
currently flat, not hierarchical. Hierarchical networks scale well and will better
accommodate this growing business.
Wow! That is a lot for Marcy and Vincent to understand. They are not familiar with these
networking issues. Are you? Take this module to learn more about reliable networks
and hierarchical network design!
What Will I Learn in this Module?
Module Title: Network Design
RELIABLE NETWORKS
Network Architecture
Have you ever been busy working online, only to have “the internet go down”? As you
know by now, the internet did not go down, you just lost your connection to it. It
is very frustrating. With so many people in the world relying on network access to work
and learn, it is imperative that networks are reliable. In this context, reliability means
more than your connection to the internet. This topic focuses on the four aspects of
network reliability.
The role of the network has changed from a data-only network to a system that enables
the connections of people, devices, and information in a media-rich, converged network
environment. For networks to function efficiently and grow in this type of environment,
the network must be built upon a standard network architecture.
Networks also support a wide range of applications and services. They must
operate over many different types of cables and devices, which make up the physical
infrastructure. The term network architecture, in this context, refers to the
technologies that support the infrastructure and the programmed services and rules, or
protocols, that move data across the network.
As networks evolve, we have learned that there are four basic characteristics that
network architects must address to meet user expectations:
Fault Tolerance
Scalability
Quality of Service (QoS)
Security
Fault Tolerance
A fault tolerant network is one that limits the number of affected devices during a
failure. It is built to allow quick recovery when such a failure occurs. These
networks depend on multiple paths between the source and destination of a
message. If one path fails, the messages are instantly sent over a different link.
Having multiple paths to a destination is known as redundancy.
Imagine you have a phone network for your school. When more students join and want to use
their phones, the network should be able to handle this without slowing down for everyone else.
A scalable network is like that—it can grow quickly to support more users and new apps
without making things slower for the people already using it.
When a new network is added to an existing one, it should fit in seamlessly. Think of it like
adding a new section to a library. If the library is well-organized, you can add more bookshelves
without creating chaos. Similarly, a scalable network allows new parts to be added easily without
disrupting the current users.
Why is This Important?
The reason these networks work well is that the people who design them follow specific rules
and guidelines. These are called standards and protocols. By sticking to these rules, different
companies can create their hardware (like routers and switches) and software (like apps and
programs) that work well together.
Because everyone follows the same standards, companies can focus on making their products
better instead of worrying about creating new rules for how things should connect. This means
better services, faster internet, and more reliable connections for users.
In Summary
A scalable network is flexible and can grow to meet the needs of more users without slowing
down. It does this by following established rules, allowing different technologies to work
together smoothly, which benefits everyone involved.)
Quality of Service
Quality of Service (QoS) is an increasing requirement of networks today. New
applications available to users over networks, such as voice and live video
transmissions, create higher expectations for the quality of the delivered services. Have
you ever tried to watch a video with constant breaks and pauses? As data, voice, and
video content continue to converge onto the same network, QoS becomes a primary
mechanism for managing congestion and ensuring reliable delivery of content to all
users.
Congestion occurs when the demand for bandwidth exceeds the amount
available. Network bandwidth is measured in the number of bits that can be
transmitted in a single second, or bits per second (bps). When simultaneous
communications are attempted across the network, the demand for network bandwidth
can exceed its availability, creating network congestion.
When the volume of traffic is greater than what can be transported across the network,
devices will hold the packets in memory until resources become available to transmit
them. In the figure, one user is requesting a web page, and another is on a phone call.
With a QoS policy in place, the router can manage the flow of data and voice traffic,
giving priority to voice communications if the network experiences congestion. The
focus of QoS is to prioritize time-sensitive traffic. The type of traffic, not the
content of the traffic, is what is important.
(What is QoS?
QoS stands for Quality of Service. Think of it as a set of rules or methods used in networks to
make sure that important information gets through quickly and smoothly.
In a school, imagine if you have a fire alarm going off while students are trying to take a test.
The fire alarm is much more important and needs immediate attention, right? Similarly, in
computer networks, some types of data are more urgent than others.
Time-Sensitive Traffic
When we talk about time-sensitive traffic, we’re referring to types of data that need to be
delivered quickly. For example:
Video calls (like Zoom or Skype) need to be clear and smooth because if there are delays, it can
be frustrating and hard to communicate.
Online gaming also requires quick responses; if there’s a lag, it can ruin the whole experience.
Now, when we say that "the type of traffic, not the content of the traffic, is what is important,"
we mean that it doesn’t matter what specific information is being sent. What matters is whether
it’s the kind of data that needs to be prioritized.
For example:
A video stream (like a movie) is considered time-sensitive because you want it to play smoothly.
An email, on the other hand, can wait a little. If it arrives a few seconds later, that's okay.
In Summary
QoS is all about making sure that the most important and time-sensitive information gets through
a network quickly, just like how urgent announcements or alarms take priority over less critical
things. It focuses on the type of data rather than what that data actually says. This helps keep
everything running smoothly, especially when many people are using the network at the same
time.) (In the context of networks, traffic refers to the flow of data being transmitted over a
network. You can think of it like cars on a road. Just as cars travel from one place to another,
data packets travel between computers and devices.
Types of Traffic
1. Web Traffic: This includes data from websites you visit, like loading pages or images.
2. Streaming Traffic: This is data from videos or music streaming services, like Netflix or Spotify.
3. Gaming Traffic: This involves data exchanged during online games, where quick responses are
crucial.
4. Email Traffic: This includes all the messages sent and received through email.
Network Performance: Just like too many cars on a road can cause traffic jams, too much data
can slow down a network. Managing traffic helps keep everything running smoothly.
Prioritization: Some types of traffic (like video calls) need to be prioritized over others (like file
downloads) to ensure a good experience for users.
In summary, traffic in networking refers to the movement of data, and managing it effectively is
key to maintaining good performance and service quality.)
Network Security
The network infrastructure, services, and the data contained on network-attached
devices are crucial personal and business assets. Network administrators must
address two types of network security concerns: network infrastructure security
and information security.
Question 1
When designers follow accepted standards and protocols, which of the four basic
characteristics of network architecture is achieved?
Scalability
Scalability happens when designers follow accepted standards and protocols.
Question 2
Confidentiality, integrity, and availability are requirements of which of the four basic
characteristics of network architecture?
Security
Confidentiality, integrity, and availability are requirements of security.
Question 3
With which type of policy, a router can manage the flow of data and voice traffic, giving
priority to voice communications if the network experiences congestion?
QoS
QoS means that a router will manage the flow of data and voice traffic, giving priority to voice
communications.
Question 4
Having multiple paths to a destination is known as redundancy. This is an example of
which characteristic of network architecture?
fault tolerance
Redundancy is an example a fault-tolerant network architecture.
IP addresses contain two parts. One part identifies the network portion. The network
portion of the IP address will be the same for all hosts connected to the same local
network. The second part of the IP address identifies the individual host on that
network. Within the same local network, the host portion of the IP address is unique to
each host, as shown in the figure.
Both the physical MAC and logical IP addresses are required for a computer to
communicate on a hierarchical network, just like both the name and address of a person
are required to send a letter.
Background / Scenario
This lab requires you to determine the availability and status of the network interface cards (NICs) on
the PC. Windows provides a number of ways to view and work with your NICs.
In this lab, you will access the NIC information of the PC and change the status of these cards.
Required Resources
= 1 PC (Windows 10 with two NICs, wired and wireless, and a wireless connection)
= A wireless router
Instructions
What is the Service Set Identifier (SSID) for the wireless router of your connection?
Answer
Hierarchical Analogy
Imagine how difficult communication would be if the only way to send a message
to someone was to use the person's name. If there were no street addresses,
cities, towns, or country boundaries, delivering a message to a specific person
across the world would be nearly impossible.
On an Ethernet network, the host MAC address is similar to a person's name. A
MAC address indicates the individual identity of a specific host, but it does not
indicate where on the network the host is located. If all hosts on the internet
(millions and millions of them) were each identified by their unique MAC address only,
imagine how difficult it would be to locate a single one.
For these two reasons, large Ethernet networks consisting of many hosts are not
efficient. It is better to divide larger networks into smaller, more manageable
pieces. One way to divide larger networks is to use a hierarchical design model.
The access layer provides a connection point for end user devices to the network
and allows multiple hosts to connect to other hosts through a network device,
usually a switch, such as the Cisco 2960-XR shown in the figure, or a wireless access
point. Typically, all devices within a single access layer will have the same
network portion of the IP address.
If a message is destined for a local host, based on the network portion of the IP
address, the message remains local. If it is destined for a different network, it is
passed up to the distribution layer. Switches provide the connection to the
distribution layer devices, usually a Layer 3 device such as a router or Layer 3 switch.
Cisco 2960-XR
Distribution Layer
The distribution layer provides a connection point for separate networks and
controls the flow of information between the networks. It typically contains more
powerful switches, such as the Cisco C9300 series shown in the figure, than the access
layer as well as routers for routing between networks. Distribution layer devices
control the type and amount of traffic that flows from the access layer to the core
layer.
Logical
An IP address is a logical address.
Question 2
An Ethernet MAC address is considered what type of address:
Physical
The physical address does not change when the device is connected to a new network.
Question 4
Which portion of an IP address uniquely identifies that device on that network?
Host
Question 5
Which design layer provides connectivity to devices on an Ethernet LAN?
As networks evolve, we have learned that there are four basic characteristics that network
architects must address to meet user expectations: Fault Tolerance, scalability, QoS, and security.
A fault tolerant network limits the number of affected devices during a failure. It allows quick
recovery when such a failure occurs. These networks depend on multiple paths between the
source and destination of a message. If one path fails, the messages are instantly sent over a
different link.
A scalable network expands quickly to support new users and applications. It does this without
degrading the performance of services that are being accessed by existing users. Networks can be
scalable because the designers follow accepted standards and protocols.
QoS is an increasing requirement of networks today. As data, voice, and video content continue
to converge onto the same network, QoS becomes a primary mechanism for managing
congestion and ensuring reliable delivery of content to all users. Network bandwidth is measured
in bps. When simultaneous communications are attempted across the network, the demand for
network bandwidth can exceed its availability, creating network congestion. The focus of QoS is
to prioritize time-sensitive traffic. The type of traffic, not the content of the traffic, is what is
important.
Network administrators must address two types of network security concerns: network
infrastructure security and information security. Network administrators must also protect the
information contained within the packets being transmitted over the network, and the
information stored on network attached devices. There are three primary requirements to achieve
the goals of network security: Confidentiality, Integrity, and Availability.
IP addresses contain two parts. One part identifies the network portion. The network portion of
the IP address will be the same for all hosts connected to the same local network. The second
part of the IP address identifies the individual host on that network. Both the physical MAC and
logical IP addresses are required for a computer to communicate on a hierarchical network.
The Network and Sharing Center on a PC shows your basic network information and set up
connections, including your active networks and whether you are connected wired or wirelessly
to the internet and within your LAN. You can view the properties of your connections here.
On an Ethernet network, the host MAC address is similar to a person's name. A MAC address
indicates the individual identity of a specific host, but it does not indicate where on the network
the host is located. If all hosts on the internet (millions and millions of them) were each
identified by their unique MAC address only, imagine how difficult it would be to locate a single
one. It is better to divide larger networks into smaller, more manageable pieces. One way to
divide larger networks is to use a hierarchical design model.
Hierarchical networks scale well. The access layer provides a connection point for end user
devices to the network and allows multiple hosts to connect to other hosts through a network
device, usually a switch or a wireless access point. Typically, all devices within a single access
layer will have the same network portion of the IP address. The distribution layer provides a
connection point for separate networks and controls the flow of information between the
networks. Distribution layer devices control the type and amount of traffic that flows from the
access layer to the core layer. The core layer is a high-speed backbone layer with redundant
connections. It is responsible for transporting large amounts of data between multiple end
networks. The main goal of the core layer is to transport data quickly.
access point
Layer 2 switch
While some designs do route at the access layer, the two devices that should always be placed
at the access layer of the hierarchical design model are an access point and a Layer 2 switch. A
modular switch is commonly used at the core layer. Routing by a Layer 3 device is commonly
used in the distribution layer. The firewall is a device in the Internet edge network design.
Question 2
What characteristic of a network enables it to quickly grow to support new users and
applications without impacting the performance of the service being delivered to existing
users?
Scalability
Networks must be able to quickly grow to support new users and services, without impacting
existing users and services. This ability to grow is known as scalability.
Question 3
Match the definition to the security goal.
ensuring confidentiality - only the intended recipients can access and read the data
maintaining integrity - the assurance that the information has not been altered during
transmission
Question 4
A student is streaming a movie to his computer but the movie keeps stopping. What
service would give streaming traffic higher priority and avoid the movie stopping?
True
A fault tolerant network limits the impact of a failure. Its implementation builds the network in a
way that allows quick recovery if a critical network device fails.
Question 6
Which type of address never changes on a device and is similar to a person's name?
MAC address
A Media Access Control (MAC) address is unique on every device. An Internet Protocol (IP)
address is used to communicate with devices on another LAN or on the Internet. A broadcast
address allows a single device to communicate with all other devices. A multicast address
allows a single device to communicate with a group of devices.
Question 7
What are the three layers of the switch hierarchical design model? (Choose three.)
Access
Core
Distribution
The access layer is the lowest layer and it provides network access to users. The distribution
layer has many functions, but it aggregates data from the access layer, provides filtering, policy
control, and sets Layer 3 routing boundaries. The core layer provides high speed connectivity.
Question 8
Which network feature uses redundancy as a means to limit the number of affected
users in the event of a failure?
fault tolerance
Redundancy in the network design provides fault tolerance to limit the number of affected users
if there is a failure.
Question 9
What characteristic of a network would allow video traffic to have priority over traffic
from an email application?
quality of service
Quality of Service (QoS) is implemented in networks to prioritize traffic. Traffic for real-time
services such as voice and video requires a higher priority than data traffic. This helps to ensure
reliable delivery of voice and video content to users.
Question 10
What is the responsibility of the distribution layer in a hierarchical network design?
The distribution layer controls the type and amount of traffic that flows from the access layer to
the core layer.
Question 11
Which network design model improves efficiency by dividing the network into smaller
pieces.
Hierarchical
A hierarchical network design divides the network into smaller pieces to improve efficiency. The
Cisco hierarchical design divides the network into three layers, the core, the distribution, and the
access.
Question 12
Match the feature with the description
Can you think of how you use the cloud? How much do you know about the cloud and
virtualization? Let me help you out with learning more. Take this module!
Over a decade ago, VMware developed a virtualizing technology that enabled a host
OS to support one or more client OSs. Most virtualization technologies are now
based on this technology. The transformation of dedicated servers to virtualized servers
has been embraced and is rapidly being implemented in data center and enterprise
networks.
Virtualization means creating a virtual rather than physical version of something, such
as a computer. An example would be running a "Linux computer" on your Windows PC,
which you will do later in the lab.
The major problem with this configuration is that when a component fails, the service
that is provided by this server becomes unavailable. This is known as a single point of
failure. Another problem was that dedicated servers were underused. Dedicated servers often
sat idle for long periods of time, waiting until there was a need to deliver the specific service
they provide. These servers wasted energy and took up more space than was warranted
by the amount of service provided. This is known as server sprawl.
Check Your Understanding - Cloud and
Cloud Services
Check your understanding of cloud and cloud services by choosing the correct answer to
the following questions.
Question 1
Which cloud model represents two or more clouds where each part remains a distinctive
object, but both are connected using a single architecture?
hybrid cloud
The hybrid cloud model represents two or more clouds where each part remains a distinctive
object, but both are connected using a single architecture.
Question 2
Which cloud model is used to meet the needs of a specific industry, such as healthcare
or media?
community cloud
The community cloud model is used to meet the needs of a specific industry, such as healthcare
or media.
Question 3
What device uses all the RAM, processing power, and hard drive space devoted to one
service?
dedicated server
A dedicated server uses all the RAM, processing power, and hard drive space devoted to one
service.
VIRTUALIZATION
Advantages of Virtualization
One major advantage of virtualization is overall reduced cost:
Less equipment is required - Virtualization enables server consolidation, which requires
fewer physical devices and lowers maintenance costs.
Less energy is consumed - Consolidating servers lowers the monthly power and cooling
costs.
Less space is required - Server consolidation reduces the amount of required floor
space.
Hypervisors
The hypervisor is a program, firmware, or hardware that adds an abstraction layer on top of the
physical hardware. The abstraction layer is used to create virtual machines which have access to
all the hardware of the physical machine such as CPUs, memory, disk controllers, and NICs.
Each of these virtual machines runs a complete and separate operating system. With
virtualization, it is not uncommon for 100 physical servers to be consolidated as virtual machines
on top of 10 physical servers that are using hypervisors.
Type 1 hypervisors are also called the “bare metal” approach because the hypervisor is installed
directly on the hardware. Type 1 hypervisors are usually used on enterprise servers and data
center networking devices.
With Type 1 hypervisors, the hypervisor is installed directly on the server or networking
hardware. Then, instances of an OS are installed on the hypervisor, as shown in the figure. Type
1 hypervisors have direct access to the hardware resources; therefore, they are more efficient
than hosted architectures. Type 1 hypervisors improve scalability, performance, and robustness.
The figure illustrates a Type 1 hypervisor on a server. Starting from the bottom, the server has
hardware with a hypervisor on top, branching from the hypervisor are 3 operating systems:
Windows OS, Linux OS and Unix OS.
Type 2 Hypervisor - “Hosted” Approach
A Type 2 hypervisor is software that creates and runs VM instances. The computer, on
which a hypervisor is supporting one or more VMs, is a host machine. Type 2
hypervisors are also called hosted hypervisors. This is because the hypervisor is
installed on top of the existing OS, such as macOS, Windows, or Linux. Then, one or
more additional OS instances are installed on top of the hypervisor, as shown in the
figure. A big advantage of Type 2 hypervisors is that management console software is
not required.
Note: It is important to make sure that the host machine is robust enough to install and
run the VMs, so that it does not run out of resources.
Background / Scenario
Computing power and resources have increased tremendously over the last 10 years. A benefit
of multi-core processors and large amounts of RAM is the ability to install multiple operating
systems through the use of virtualization on a computer.
With virtualization, one or more virtual computers can operate inside one physical
computer. Virtual computers that run within physical computers are called virtual machines.
Virtual machines are often called guests, and physical computers are often called hosts.
Anyone with a modern computer and operating system can run virtual machines.
In this lab, you will install a Linux OS in a virtual machine using a desktop virtualization
application, such as VirtualBox. After completing the installation, you will explore the GUI
interface. You will also explore the command line interface using this virtual machine in a lab later
in this course.
Required Resources
= Computer with a minimum of 2 GB of RAM and 10 GB of free disk space
= High-speed Internet access to download Oracle VirtualBox and Linux OS image, such as Ubuntu
Desktop
Instructions
c. Click Run to install the additions. When prompted for a password, use the same password that
you used to log on. Click Authenticate to continue.
d. If the computer was not connected to the Internet during the installation, click Devices > Network
Settings in the Oracle VirtualBox menu. Enable network adapters and configure the proper
setting for network connections as necessary. Click OK.
e. When the installation of the additions is done, restart the virtual machine again. Click the menu in
the upper-right corner and click Shut down. Click Restart to restart Ubuntu.
Reflection Question
What are the advantages and disadvantages of using a virtual machine?
With a virtual machine, you are able to test new applications or operating systems without
affecting your host machine. You are also able to save the current machine state when you
close the virtual machine. If you have any issues, you have the option to revert the virtual
machine to a previously saved state. On the other hand, a virtual machine requires
hardware resources from the host machine, such as hard drive space, RAM, and
processing power.
(https://www.youtube.com/watch?v=rJ9ysibH768) – ubuntu 22.04 in virtualbox – the complete guide
In general, when talking about the cloud, we are talking about data centers, cloud computing, and
virtualization. Data centers are usually large facilities which provide massive amounts of power,
cooling, and bandwidth. Only very large companies can afford their own data centers. Most
smaller organizations lease the services from a cloud provider.
Cloud services include the following:
Virtualization is the foundation of cloud computing. Without it, cloud computing, as it is most-
widely implemented, would not be possible. Virtualization means creating a virtual rather than
physical version of something, such as a computer. An example would be running a "Linux
computer" on your Windows PC.
Virtualization
The hypervisor is a program, firmware, or hardware that adds an abstraction layer on top of the
physical hardware. The abstraction layer is used to create virtual machines which have access to
all the hardware of the physical machine such as CPUs, memory, disk controllers, and NICs.
Each of these virtual machines runs a complete and separate operating system.
Type 1 hypervisors are also called the “bare metal” approach because the hypervisor is installed
directly on the hardware. Type 1 hypervisors are usually used on enterprise servers and data
center networking devices.
A Type 2 hypervisor is software that creates and runs VM instances. The computer, on which a
hypervisor is supporting one or more VMs, is a host machine. Type 2 hypervisors are also called
hosted hypervisors. This is because the hypervisor is installed on top of the existing OS, such as
macOS, Windows, or Linux. Then, one or more additional OS instances are installed on top of
the hypervisor. A big advantage of Type 2 hypervisors is that management console software is
not required.
Take this module to learn more about these number systems and how to convert them!
Module Objective: Calculate numbers between decimal, binary, and hexadecimal systems.
Binary is a numbering system that consists of the digits 0 and 1 called bits. In contrast,
the decimal numbering system consists of 10 digits which includes 0 through 9.
Binary is important for us to understand because hosts, servers, and network devices
use binary addressing. Specifically, they use binary IPv4 addresses, as shown in the
figure, to identify each other.
Each address consists of a string of 32 bits, divided into four sections called octets.
Each octet contains 8 bits (or 1 byte) separated with a dot. For example, PC1 in the
figure is assigned IPv4 address 11000000.10101000.00001010.00001010. Its default
gateway address would be that of R1 Gigabit Ethernet
interface 11000000.10101000.00001010.00000001.
Binary works well with hosts and network devices. However, it is very challenging for
humans to work with.
For ease of use by people, IPv4 addresses are commonly expressed in dotted decimal
notation. PC1 is assigned the IPv4 address 192.168.10.10, and its default gateway
address is 192.168.10.1, as shown in the figure.
For a solid understanding of network addressing, it is necessary to know binary addressing and
gain practical skills converting between binary and dotted decimal IPv4 addresses. This section
will cover how to convert between base two (binary) and base 10 (decimal) numbering systems.
You will need to log in to cisco.com to use this link. It will be necessary to create an
account if you do not already have one.
There are also a variety of free mobile binary games. Search for "Binary Game" in your
app store.
Hexadecimal and IPv6 Addresses
Now you know how to convert binary to decimal and decimal to binary. You need that
skill to understand IPv4 addressing in your network. But you are just as likely to be
using IPv6 addresses in your network. To understand IPv6 addresses, you must be able
to convert hexadecimal to decimal and vice versa.
Just as decimal is a base ten number system, hexadecimal is a base sixteen system.
The base sixteen number system uses the digits 0 to 9 and the letters A to F. The figure
shows the equivalent decimal and hexadecimal values for binary 0000 to 1111.
Binary and hexadecimal work well together because it is easier to express a value as a
single hexadecimal digit than as four binary bits.
IPv6 addresses are 128 bits in length and every 4 bits is represented by a single
hexadecimal digit; for a total of 32 hexadecimal values. IPv6 addresses are not case-
sensitive and can be written in either lowercase or uppercase.
As shown in the figure, the preferred format for writing an IPv6 address is x:x:x:x:x:x:x:x,
with each “x” consisting of four hexadecimal values. When referring to 8 bits of an IPv4
address we use the term octet. In IPv6, a hextet is the unofficial term used to refer to a
segment of 16 bits or four hexadecimal values. Each “x” is a single hextet, 16 bits, or
four hexadecimal digits.
The sample topology in the figure displays IPv6 hexadecimal addresses.
Binary is a numbering system that consists of the digits 0 and 1 called bits. In contrast,
the decimal numbering system consists of 10 digits consisting of the digits 0 – 9. Hosts,
servers, and network devices use binary addressing. Specifically, they use binary IPv4
addresses. For ease of use by people, IPv4 addresses are commonly expressed in
dotted decimal notation.
This decimal system uses the powers of ten, or base 10. For example, the number
2,146 has a 2 in the thousands place, or two thousand. 2,146 has a 1 in the hundreds
place, or one hundred. It has a 4 in the tens place, or forty. It has a 6 in the ones place,
or six.
The binary system is a base 2 number system. Each place value can have a 0 or a 1. A
useful tool is the binary positional value table. It is common to use a table with eight
placeholders. 8 bits equal a byte.
IPv6 addresses are 128 bits in length and every 4 bits is represented by a single
hexadecimal digit; for a total of 32 hexadecimal values. IPv6 addresses are not case-
sensitive and can be written in either lowercase or uppercase.
I wasn’t expecting to do math in the middle of my networking course, but I was surprised
by how much fun it is to convert decimal numbers into their binary and hexadecimal
equivalents. I have a better understanding of why IP addresses are represented the way
that we see them. Before you took this module, what did you know about binary and
hexadecimal numbering systems? Take a look at the MAC Address on your computer’s
NIC. What do you recognize about this address that you may not have before?
QUIZ
decimal 173 = 128 + 0 + 32 + 0 + 8 + 4 + 0 + 1
An IPv4 address consists of a string of 32 bits divided into four sections called octets. Each
octet contains 8 bits (or 1 byte) separated with a dot.
0x refers to the item as hexadecimal. Convert each character into its corresponding nibble.
Then combine the nibbles together and calculate the resulting decimal equivalent. C has a value
of 12. 12 x 16 = 192. 192 + 9 = 201.
When converted, CA in hex is equivalent to 11011010 in binary. One way to do the conversion
is one nibble at a time, C = 1100 and A = 1010. Combine the two nibbles gives 11001010.
A hextet is a term used to refer to a segment of 16 bits or four hexadecimal values. A single
hexadecimal number is made up with 4 bits, thus the range of a hexadecimal number is from 0
to f. A hextet contains 4 hexadecimal numbers and ranges from 0000 to ffff.
Each 4 binary digits equates to 1 hexadecimal digit.
1001 = 9
1101 = 13 (decimal) = D (hexadecimal)
An IPv4 address is comprised of 4 octets of binary digits, each containing 8 bits, resulting in a
32-bit address.
Binary is a numbering system that consists of the digits 0 and 1 called bits.
Decimal 139 in binary is 10001011. 128+8+2+1 = 139.
Each 4 binary digits equates to 1 hexadecimal digit.
1000 = 8
1011 = 11 (decimal) = B (hexadecimal)
The hexadecimal numbers are 0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f.. The hexadecimal number 0
represents 0 in decimal and is represented as 0000 in binary. The hexadecimal number f
represents 15 in decimal.
232 in binary is 11101000. 128+64+32+8 = 232
The binary number 11101100 00010001 00001100 00001010 translates to 236.17.12.10.
The furniture store’s network is an Ethernet network. Ethernet protocols define how data
is formatted and how it is transmitted over the wired network and specifies protocols
that operate at Layer 1 and Layer 2 of the OSI model.
Are you familiar with Ethernet? Why are the hexadecimal and binary number systems
important in an Ethernet network? I think you should take this module to learn more
about Ethernet, Ethernet frames, and Ethernet MAC addresses! Let’s get started!
As networks became more widespread, standards were developed that defined rules by
which network equipment from different vendors operated. Standards are beneficial to
networking in many ways:
Facilitate design
Simplify product development
Promote competition
Provide consistent interconnections
Facilitate training
Provide more vendor choices for customers
There is no official local area networking standard protocol, but over time, one
technology, Ethernet, has become more common than the others. Ethernet protocols
define how data is formatted and how it is transmitted over the wired network. The
Ethernet standards specify protocols that operate at Layer 1 and Layer 2 of the OSI
model. Ethernet has become a de facto standard, which means that it is the technology
used by almost all wired local area networks, as shown in the figure.
Ethernet Evolution
"The Institute of Electrical and Electronics Engineers, or IEEE ", maintains the
networking standards, including Ethernet and wireless standards. IEEE committees are
responsible for approving and maintaining the standards for connections, media
requirements and communications protocols. Each technology standard is assigned a
number that refers to the committee that is responsible for approving and maintaining
the standard. The committee responsible for the Ethernet standards is 802.3.
Since the creation of Ethernet in 1973, standards have evolved for specifying faster and
more flexible versions of the technology. This ability for Ethernet to improve over time is
one of the main reasons that it has become so popular. Each version of Ethernet has an
associated standard. For example, 802.3 100BASE-T represents the 100 Megabit
Ethernet using twisted-pair cable standards. The standard notation translates as:
Early versions of Ethernet were relatively slow at 10 Mbps. The latest versions of
Ethernet operate at 10 Gigabits per second and more. Imagine how much faster these
new versions are than the original Ethernet networks.
Drag the slider bar in the figure across the timeline to see how Ethernet standards have
developed over time.