Introduction to Networking
Introduction to Networking
Welcome to the comprehensive course on Networking Basics. This course is designed to provide you with a solid
foundation in computer networking principles, technologies, and practices. Over the next 10 sections, we'll explore
everything from fundamental concepts to practical skills that are essential for understanding how networks
function in our increasingly connected world. Whether you're pursuing a career in IT, looking to enhance your
technical knowledge, or simply curious about how the internet works, this course will equip you with the
knowledge to understand and work with networks effectively.
by Gloudy Mama
Network Types and Topologies
Networks can be classified into different types based on their geographical scope and scale. The most common
network types include Local Area Networks (LANs), which connect devices within a limited area such as an office
building or campus; Metropolitan Area Networks (MANs), covering a larger geographical area like a city; Wide Area
Networks (WANs), spanning across countries or even globally; and Personal Area Networks (PANs), which connect
devices within an individual's workspace.
Network Scales
Network Topologies
Network topology refers to the arrangement of elements within a network. The physical topology is the actual
layout of the network devices, while the logical topology describes how data flows through the network.
Hybrid topologies combine elements of two or more basic topologies. For example, a star-ring network connects
multiple star networks through a ring backbone. Mesh topologies, where every device connects directly to every
other device, offer maximum reliability but at higher cost and complexity.
The OSI Model and TCP/IP Suite
To standardize network communications, organizations have developed reference models that break down the
complex process of network communication into more manageable layers. The two most important models are
the OSI (Open Systems Interconnection) Reference Model and the TCP/IP (Transmission Control Protocol/Internet
Protocol) Suite.
Developed by the International Organization for Standardization (ISO) in 1984, the OSI model divides network
communication into seven abstraction layers. Each layer serves a specific function in the process of transmitting
data from one device to another.
Layer 7: Application
1 The entry point for user interactions with network services. Protocols operating at this layer include
HTTP, FTP, SMTP, DNS, and Telnet. This layer provides services directly to user applications.
Layer 6: Presentation
Responsible for data translation, encryption, and compression. It ensures that data from the
2
application layer can be understood by the receiving system, handling tasks like character encoding,
data compression, and encryption/decryption.
Layer 5: Session
Establishes, maintains, and terminates connections (sessions) between applications. It handles
3
session checkpointing and recovery, allowing applications to continue where they left off if a session is
interrupted.
Layer 4: Transport
4 Provides reliable data transfer, error recovery, and flow control. Key protocols include TCP (connection-
oriented, reliable) and UDP (connectionless, faster but less reliable).
Layer 3: Network
Handles logical addressing and routing between different networks. The IP protocol operates at this
5
layer, determining the best path for data to travel from source to destination across multiple
networks.
Layer 1: Physical
7 Transmits raw bit stream over the physical medium. It defines hardware specifications like cable types,
signal types, and physical connectors. It converts digital bits into electrical, radio, or optical signals.
The TCP/IP model is a more practical, simplified version of the OSI model and is the foundation of the internet. It
consists of four layers that roughly correspond to the seven layers of the OSI model.
Understanding these models helps network professionals troubleshoot issues by isolating problems to specific
layers, and allows different manufacturers to create products that can interoperate seamlessly by adhering to the
standards defined for each layer.
Network Devices and Hardware
Network infrastructure relies on various hardware components that enable data transmission, traffic management,
and connectivity between devices. Understanding these devices and their functions is crucial for designing,
implementing, and troubleshooting networks.
IPv4 Addressing
IPv4 addresses are 32-bit numbers typically represented in dotted-decimal notation (e.g., 192.168.1.1). Each of the
four numbers (octets) can range from 0 to 255, providing approximately 4.3 billion unique addresses. Due to the
explosive growth of internet-connected devices, the IPv4 address space has been exhausted, leading to the
development of technologies like NAT (Network Address Translation) and the transition to IPv6.
Subnetting
Subnetting divides a large network into smaller, more manageable subnetworks. This improves security, reduces
network congestion, and allows for more efficient use of IP addresses. Subnetting involves borrowing bits from the
host portion of an IP address to create additional network identifiers.
Assign Host
Calculate Subnet Addresses
Calculate Subnet Mask Addresses Allocate IP addresses to
Determine The subnet mask Determine the network devices within each
Requirements identifies which portion of address for each subnet. subnet. Valid host
Identify how many the IP address belongs to The first address in each addresses fall between
subnets you need and the network and which subnet is the network the network address and
how many hosts per portion identifies the host. address, and the last broadcast address in each
subnet. This will By extending the network address is the broadcast subnet.
determine how many bits portion (changing host address. Both are
to borrow from the host bits to 1s), you create reserved and cannot be
portion of the address. subnets. assigned to hosts.
CIDR Notation
Classless Inter-Domain Routing (CIDR) notation provides a more flexible way to specify IP address ranges than the
traditional class system. It uses a suffix indicating the number of bits in the network portion of the address, such as
192.168.1.0/24, where "/24" means the first 24 bits specify the network, leaving 8 bits for hosts (allowing for 254
usable host addresses).
IPv6 Addressing
IPv6 was developed to address the IPv4 address exhaustion problem. IPv6 addresses are 128 bits long, providing an
astronomically large number of unique addresses (approximately 3.4 × 10^38). They are represented in hexadecimal
notation, with eight groups of four hexadecimal digits separated by colons (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7334).
Ethernet Evolution
10 Mbps Ethernet
The original Ethernet standard (10Base5, Gigabit Ethernet
10Base2, 10BaseT) offered 10 Mbps 1000BaseT (Gigabit Ethernet) further
speeds. 10Base5 used thick coaxial cable, increased speeds to 1 Gbps (1000 Mbps).
10Base2 used thin coaxial cable, and It requires Category 5e or better cabling
10BaseT used twisted pair cabling with a and has become the standard for most
star topology. modern LANs.
1 2 3 4
An Ethernet frame is the basic unit of data transmission in an Ethernet network. It consists of several fields that
contain addressing information, data, and error-checking mechanisms.
Ethernet Switching
Ethernet switches operate at Layer 2 of the OSI model and forward frames based on MAC addresses. They create a
more efficient network by sending frames only to the intended recipient rather than broadcasting to all connected
devices (as hubs do).
Early Ethernet networks used a shared medium where only one device could transmit at a time. These networks
used CSMA/CD (Carrier Sense Multiple Access with Collision Detection) to manage access to the shared medium.
Router Functions
Routing Tables
A routing table is a data structure stored in a router's memory that contains network destination prefixes and the
appropriate forwarding actions for each prefix. When a packet arrives, the router consults its routing table to
determine where to send the packet next.
Routing Methods
Routing Protocols
Routing protocols enable routers to exchange information about network destinations. They can be classified in
several ways:
Route Redistribution
Administrative Distance The process of importing routes
When a router learns about the from one routing protocol into
same destination from multiple another, allowing different
routing protocols, it uses routing domains to exchange
administrative distance to 2 information.
determine which source to trust. 1
Lower values are preferred. Route Summarization
Combines multiple routes into a
single advertisement to reduce
3 routing table size and minimize
5 processing overhead.
Policy-Based Routing
Makes routing decisions based on 4 Floating Static Routes
factors other than destination Static routes with a higher
address, such as source address, administrative distance than
protocol type, or application. dynamic routes, used as backup
routes when dynamic routing
fails.
Wireless Networking
Wireless networking has revolutionized how we connect devices, providing flexibility and mobility without the
constraints of physical cables. Understanding wireless technologies, standards, security considerations, and best
practices is essential for implementing reliable wireless networks.
Wireless Standards
The IEEE 802.11 family of standards defines the protocols for implementing wireless local area networks (WLANs).
Each standard offers different speeds, ranges, and frequencies.
802.11n (Wi-Fi 4) 2.4/5 GHz 600 Mbps 70m indoor, 250m 2009
outdoor
Wireless networks operate in specific frequency bands, which are divided into channels to minimize interference
between networks. The 2.4 GHz band has 14 channels (though only 1-11 are used in the US), while the 5 GHz band
has many more channels depending on regulatory domain.
Wireless Security
Wireless networks are inherently more vulnerable than wired networks because the transmission medium (air) is
accessible to anyone within range. Several security mechanisms have been developed to protect wireless
communications:
The CIA triad4Confidentiality, Integrity, and Availability4forms the foundation of information security principles.
Integrity
Maintaining the accuracy,
consistency, and trustworthiness
of data throughout its lifecycle.
Confidentiality 2 Hash functions, digital signatures,
Ensuring that sensitive
and checksums help verify that
information is accessible only to
authorized individuals.
1 data hasn't been altered.
Defense in Depth 1
Implement multiple layers of security controls
throughout the network. This strategy ensures
that if one security measure fails, others are in 2 Principle of Least Privilege
place to protect assets. Layers should include Grant users and systems only the minimum
physical security, perimeter security, network permissions necessary to perform their
security, endpoint security, application security, functions. Regularly audit and review access
and data security. rights, especially for privileged accounts, and
immediately revoke access when no longer
needed.
Regular Updates and Patch Management 3
Maintain a systematic approach to applying
security patches and updates to operating
systems, applications, firmware, and network
devices. Unpatched vulnerabilities are among
4 Security Awareness Training
the most common attack vectors.
Educate users about security risks, safe
computing practices, and how to recognize
and report suspicious activities. Human error
Incident Response Planning 5 remains one of the biggest security
Develop and regularly test procedures for vulnerabilities in most organizations.
responding to security incidents. An effective
incident response plan includes steps for
identification, containment, eradication, 6 Regular Security Assessments
recovery, and lessons learned. Conduct vulnerability assessments and
penetration testing to identify and address
security weaknesses before they can be
exploited. Both internal and external testing
should be performed on a regular schedule.
Regulatory Compliance
Organizations must often comply with various regulatory requirements related to network security and data
protection. Some major regulations include:
GDPR (General Data Protection Regulation): European Union regulation on data protection and privacy
HIPAA (Health Insurance Portability and Accountability Act): US regulation protecting health information
PCI DSS (Payment Card Industry Data Security Standard): Security standard for organizations handling credit
card data
SOX (Sarbanes-Oxley Act): US law requiring specific financial record-keeping and reporting for public
companies
NIST Cybersecurity Framework: Voluntary framework of standards and best practices to manage cybersecurity
risk
Troubleshooting and Network Management
Effective network troubleshooting and management are essential skills for maintaining reliable network
infrastructure. This section explores systematic approaches to problem-solving, essential tools and techniques,
network monitoring, and management practices that help ensure optimal network performance and availability.
A structured approach to troubleshooting helps resolve network issues efficiently and effectively. Following a
systematic methodology reduces downtime and prevents the introduction of new problems during the
troubleshooting process.
Complete network outage Hardware failure, power issues, Check physical connections,
ISP problems, configuration power, ISP status; review recent
errors configuration changes
Intermittent connectivity Loose cables, interference, Monitor for patterns, check cable
overloaded network, hardware connections, look for sources of
issues interference
Slow network performance Bandwidth saturation, broadcast Use monitoring tools to identify
storms, hardware limitations, bottlenecks, check for unusual
misconfiguration traffic patterns
DNS resolution failures DNS server issues, Verify DNS settings, test DNS
misconfiguration, connectivity server functionality, check for
problems connectivity to DNS servers
Specific application issues Application bugs, compatibility Isolate the application, verify
problems, resource constraints requirements, check application
logs
Proactive network monitoring and management help identify and address potential issues before they cause
significant problems. Effective network management encompasses several key areas:
Network Documentation
Comprehensive network documentation is essential for effective troubleshooting, management, and planning.
Documentation should be kept up-to-date and easily accessible to relevant personnel.
Effective network troubleshooting and management require a combination of technical knowledge, structured
methodologies, appropriate tools, and documented processes. By adopting these practices, organizations can
maintain reliable network infrastructure, minimize downtime, and quickly resolve issues when they do occur.