Networking is the process of connecting two or more devices to share resources, communicate, and exchange data. Think of it as building roads between houses (devices) to allow cars (data) to travel and deliver goods (information).
Networks can be classified based on their size and purpose:
LAN (Local Area Network):
WAN (Wide Area Network):
MAN (Metropolitan Area Network):
PAN (Personal Area Network):
Topology describes how devices are arranged and communicate in a network. There are two main types:
Physical Topologies:
Logical Topologies:
The OSI model helps us understand how data moves from one device to another. It divides networking into 7 layers, each with a specific role:
Physical Layer:
Data Link Layer:
Network Layer:
Transport Layer:
Session Layer:
Presentation Layer:
Application Layer:
The TCP/IP model simplifies the OSI model into 4 layers:
IPv4 is the most common addressing system. It’s a 32-bit address written as four numbers separated by dots (e.g., 192.168.1.1).
Structure:
192.168.0.1 represents a device’s address.Address Classes: IPv4 addresses are divided into classes:
Private vs. Public IPs:
10.0.0.0/8, 192.168.0.0/16.Subnetting divides a larger network into smaller networks.
Why Subnet?:
How to Calculate Subnets:
2^(borrowed bits).2^(remaining host bits) - 2.Example:
192.168.1.0/24./26 (255.255.255.192).192.168.1.0 - 192.168.1.63192.168.1.64 - 192.168.1.127IPv6 is the successor to IPv4, providing a 128-bit address to overcome IPv4’s limitations.
Structure:
2001:0db8:85a3::8a2e:0370:7334).:) separate sections, and :: can replace consecutive zeroes.Address Types:
Benefits:
www.google.com) into IP addresses (e.g., 142.250.190.14) so that computers can communicate.Purpose: Resolves an IP address to a MAC address so data can be delivered on a local network.
Example: If your computer knows the IP address 192.168.1.10 but needs the MAC address to send data, it uses ARP.
How ARP Works:
192.168.1.10?"Command to View ARP Table:
arp -a
ping 8.8.8.8tracert www.google.com (Windows) or traceroute (Linux).Purpose: Automatically assigns IP addresses, subnet masks, gateways, and DNS servers to devices on a network.
How DHCP Works (DORA Process):
DHCP Lease:
DHCP Configuration Example:
ip dhcp pool MY_POOL
network 192.168.1.0 255.255.255.0
default-router 192.168.1.1
dns-server 8.8.8.8
http://example.comhttps://example.comEach protocol serves a unique purpose and is essential for network communication:
| Protocol | Function | Example Usage |
|---|---|---|
| DNS | Resolves domain names to IPs | Visiting www.google.com. |
| ARP | Maps IP to MAC addresses | Local device communication. |
| ICMP | Network diagnostics (Ping) | Testing connectivity. |
| DHCP | Automates IP address assignment | Connecting to Wi-Fi. |
| HTTP | Transfers web data (unencrypted) | Accessing a website. |
| HTTPS | Transfers secure web data | Online banking. |
Routers are responsible for forwarding packets across networks. Configuration is typically done via CLI (Command Line Interface) using console or SSH access.
Static Routing: Manually defines a specific path for traffic.
ip route 192.168.2.0 255.255.255.0 192.168.1.1
Dynamic Routing Protocols: Routers use protocols like RIP, OSPF, or EIGRP to automatically exchange routing information.
RIP: Uses hop count as metric; suitable for small networks.
OSPF: Link-state protocol; uses cost based on bandwidth.
EIGRP: Cisco proprietary; uses a composite metric of delay and bandwidth.
Switches operate at Layer 2 and are configured for performance and security.
VLAN Configuration:
vlan 10
name Sales
interface GigabitEthernet0/1
switchport mode access
switchport access vlan 10
Port Security:
switchport port-security
switchport port-security maximum 1
switchport port-security mac-address sticky
STP (Spanning Tree Protocol): Prevents loops in Layer 2 topologies by selectively blocking redundant paths.
NICs (Network Interface Cards) on PCs or servers can be configured for:
Static IP addressing
DHCP (dynamic assignment)
Duplex/speed settings (auto or manual)
Used between ISPs or large enterprises across the internet. It is a path vector protocol, making decisions based on policies and AS paths.
A link-state routing protocol that scales well with hierarchical design:
Uses areas to reduce overhead (e.g., area 0 as the backbone)
Employs Dijkstra’s algorithm to calculate shortest paths.
Used to monitor and manage devices.
SNMP Agents run on devices.
SNMP Managers collect and analyze data.
MIB (Management Information Base) holds the readable values.
FTP: Uses TCP, supports authentication.
TFTP: Lightweight, uses UDP, often used in boot environments or device backups.
Firewalls filter traffic based on rules (ACLs or security zones). They can operate at various layers (stateful or stateless).
Standard ACLs: Match only source IPs.
Extended ACLs: Match source/destination IPs, ports, and protocols.
Example:
access-list 100 permit tcp 192.168.1.0 0.0.0.255 any eq 80
Creates secure encrypted tunnels across public networks.
IPsec: Used for site-to-site connections.
SSL VPN: Often used for remote access.
Allows internal private IPs to share public IPs:
Static NAT: One-to-one mapping.
Dynamic NAT: Pool of public IPs.
PAT: Many-to-one, using ports to distinguish sessions.
ping: Tests connectivity using ICMP Echo.
tracert / traceroute: Displays packet paths and identifies where delays occur.
nslookup: Diagnoses DNS resolution issues.
netstat: Shows active TCP/UDP connections and listening ports.
log analysis: Use show logging on Cisco devices to investigate errors, reboots, and config changes.
Wi-Fi 4 (802.11n): Up to 600 Mbps
Wi-Fi 5 (802.11ac): Up to several Gbps, supports 5 GHz band
Wi-Fi 6 (802.11ax): Higher efficiency and speed in dense environments
WPA2: Uses AES encryption; standard in most networks.
WPA3: Newer, more secure, with improved protection against brute-force attacks.
SSID: Name of the wireless network.
Channel: Avoid interference by selecting non-overlapping channels (e.g., 1, 6, 11 on 2.4 GHz).
Combines star and bus; scalable and suitable for hierarchical enterprise networks.
Combines multiple topologies for flexibility and redundancy.
Bus: Simple but prone to failure.
Ring: Rare today; limited use.
Star: Common in LANs.
Mesh: Most redundant but expensive.
Tree / Hybrid: Best for large-scale, segmented networks.
ip nat inside source static 192.168.1.10 203.0.113.5
ip nat pool MYPOOL 203.0.113.10 203.0.113.20 netmask 255.255.255.0
ip nat inside source list 1 pool MYPOOL
ip nat inside source list 1 interface GigabitEthernet0/0 overload
Static: Manually configured; low overhead.
Dynamic: Automatically learned via protocols (OSPF, EIGRP, RIP).
Forward based on MAC address table.
Learn source MACs on incoming frames.
Broadcast unknown destinations.
Makes Layer 3 decisions based on IP address.
Maintains routing table to find the best path.
Connects different networks and subnets.
Used for diagnostics (e.g., ping, destination unreachable, time exceeded).
Synchronizes time across network devices to ensure logs and events are consistent.
Covered earlier, but also note:
SNMPv1/v2: Basic and insecure.
SNMPv3: Adds encryption and authentication.
A network engineer must choose a transport protocol for an application that requires guaranteed delivery and ordered packets. Which protocol should be used?
TCP should be used.
TCP provides reliable, connection-oriented communication. Before data transmission, it establishes a session using a three-way handshake. TCP tracks sequence numbers, acknowledges received packets, and retransmits lost segments. This ensures ordered delivery and error recovery. UDP does not provide these mechanisms; it sends datagrams without confirmation or retransmission. Applications that require guaranteed delivery—such as file transfers, web transactions, or email protocols—typically use TCP because reliability and data integrity are critical.
Demand Score: 82
Exam Relevance Score: 92
Which IPv6 address type allows a packet to be delivered to the nearest member of a group of interfaces that share the same address?
Anycast address.
An IPv6 anycast address is assigned to multiple interfaces across different devices, but routing ensures that traffic is delivered to the closest interface according to routing metrics. This behavior improves efficiency and redundancy because the network forwards packets to the nearest available node. Unlike multicast, which delivers packets to all members of a group, anycast selects only one destination—the topologically closest node. Common uses include DNS services and distributed services where multiple servers provide the same function.
Demand Score: 71
Exam Relevance Score: 88
A network administrator observes frequent collisions and frame errors on a switched Ethernet link. What configuration mismatch is the most likely cause?
Duplex mismatch between interfaces.
A duplex mismatch occurs when one interface operates in full-duplex while the other operates in half-duplex mode. The half-duplex side expects collision detection, while the full-duplex side transmits simultaneously without monitoring collisions. This inconsistency leads to late collisions, frame errors, and poor throughput. The problem typically appears when one side is manually configured and the other relies on auto-negotiation. Correcting the issue involves configuring both sides with matching duplex and speed settings or enabling auto-negotiation on both devices.
Demand Score: 77
Exam Relevance Score: 90
Which switching method forwards frames only after the entire frame and its FCS value are received and verified?
Store-and-forward switching.
Store-and-forward switching requires the switch to receive the entire Ethernet frame before forwarding it to another interface. After receiving the frame, the switch checks the Frame Check Sequence (FCS) to verify data integrity. If the frame contains errors, it is discarded rather than forwarded. This method increases reliability because corrupted frames are filtered out before they propagate across the network. In contrast, cut-through switching begins forwarding as soon as the destination MAC address is read, which reduces latency but does not verify frame integrity.
Demand Score: 68
Exam Relevance Score: 86