Shopping cart

Subtotal:

$0.00

JN0-105 Networking Fundamentals

Networking Fundamentals

Detailed list of JN0-105 knowledge points

Networking Fundamentals Detailed Explanation

Basic Networking Concepts

Data Communication Basics

Data communication is how information is transmitted between devices over a network. The process involves:

  1. Data Encapsulation:

    • When a device sends data, it’s broken down into smaller chunks for transmission.
    • Each chunk is wrapped (or "encapsulated") with additional information (like addresses and error-checking codes) at each layer of the OSI model.
    • For example, sending an email involves breaking the email into packets, adding headers (like the destination address), and sending it piece by piece.
  2. Packets and Frames:

    • Packets: Units of data at the Network Layer (Layer 3). Packets include the sender's and receiver's IP addresses.
    • Frames: Units of data at the Data Link Layer (Layer 2). Frames include the sender's and receiver's MAC addresses and error-checking codes.
  3. MAC Addresses vs. IP Addresses:

    • MAC Address: A unique identifier for a network interface card (NIC), used for communication within a local network. It’s like the “serial number” of your network device.
    • IP Address: A logical address assigned to a device, used for communication between networks. It’s like the “postal address” for your device.

Example:

When you send a message from your computer to another, the data is sent in packets. Locally, devices use MAC addresses to find each other. Over the internet, devices use IP addresses.

Collision and Broadcast Domains

Collision Domain

  • A collision occurs when two devices in the same network segment send data simultaneously, causing interference.
  • Collision Domain: A network segment where devices share the same communication medium (e.g., a cable). Only one device can send data at a time.
  • Impact of Collisions: When collisions happen, devices must retransmit data, slowing down the network.
  • Devices Affecting Collision Domains:
    • Hubs: Extend collision domains because all connected devices share the same bandwidth.
    • Switches: Isolate collision domains for each connected device, improving efficiency.

Broadcast Domain

  • Broadcast Messages: These are messages sent to all devices in a network (e.g., ARP requests).
  • Broadcast Domain: A network segment where all devices receive the same broadcast messages.
  • Devices Affecting Broadcast Domains:
    • Routers: Break broadcast domains, ensuring broadcasts don’t flood the entire network.
    • Switches: Do not break broadcast domains; they forward broadcasts to all devices in the same local network.

Example:

  • A small office with 10 devices connected to a hub shares one collision domain and one broadcast domain.
  • If connected through switches and routers, each device has its own collision domain, and broadcasts are limited to the local subnet.

OSI and TCP/IP Models

OSI Model (7 Layers)

The Open Systems Interconnection (OSI) model is a framework to understand how data moves through a network. Each layer has a specific role:

  1. Physical Layer: Handles raw data transmission using cables, wireless signals, etc.
  2. Data Link Layer: Organizes data into frames and provides error detection.
  3. Network Layer: Routes data using IP addresses (e.g., 192.168.1.1).
  4. Transport Layer: Ensures reliable data delivery using protocols like TCP and UDP.
  5. Session Layer: Manages the start, maintenance, and termination of sessions between devices.
  6. Presentation Layer: Formats data for applications (e.g., encryption and compression).
  7. Application Layer: Provides interfaces for user applications like web browsers and email clients.

TCP/IP Model (4 Layers)

The TCP/IP model simplifies networking into 4 layers:

  1. Network Interface Layer: Combines the Physical and Data Link layers.
  2. Internet Layer: Corresponds to the Network layer; handles IP routing.
  3. Transport Layer: Uses TCP for reliability or UDP for speed.
  4. Application Layer: Handles user-level protocols like HTTP, FTP, and DNS.

Comparison:

The OSI model is theoretical, while the TCP/IP model is practical and widely used in the internet.

Routers vs. Switches

Routers

  • Operate at Layer 3 (Network Layer).
  • Forward data between different networks (e.g., your home network and the internet).
  • Use a routing table to determine the best path for data.
  • Example: A router connects your home devices to your Internet Service Provider (ISP).

Switches

  • Operate at Layer 2 (Data Link Layer).
  • Enable communication between devices in the same network.
  • Use MAC addresses to forward data to the correct device.
  • Example: A switch connects your computer, printer, and other devices in your home network.

IP Addressing and Subnetting

IPv4 Addressing

  • Composed of 32 bits, divided into 4 octets (e.g., 192.168.1.1).
  • Divided into two parts:
    • Network Portion: Identifies the network (e.g., 192.168.1).
    • Host Portion: Identifies a specific device (e.g., .1).
  • Subnet masks (e.g., 255.255.255.0) determine which part is network and which is host.

IPv6 Addressing

  • Uses 128 bits, written in hexadecimal format (e.g., 2001:0db8:85a3::8a2e:0370:7334).
  • Designed to address IPv4 exhaustion.
  • Supports:
    • Unicast: One-to-one communication.
    • Multicast: One-to-many communication.
    • Anycast: Data is sent to the nearest available node.

Subnetting

  • CIDR Notation: Defines subnet sizes (e.g., 192.168.1.0/24).
    • /24 means the first 24 bits are the network portion, leaving 8 bits for hosts.
  • Purpose: Optimizes IP address allocation by dividing a network into smaller subnets.
  • Example: A company with 200 devices can divide a large network into smaller subnets to improve management and reduce congestion.

Putting It All Together

Understanding these concepts helps you grasp how data flows in networks. As a beginner:

  • Think of MAC addresses as local identifiers and IP addresses as global ones.
  • Visualize the OSI model as a layered cake, where each layer adds or removes information.
  • Remember that routers connect networks, while switches manage traffic within a network.

Networking Fundamentals (Additional Content)

1. Network Devices – More Details

Hubs vs. Switches

While we have mentioned that hubs extend the collision domain and switches isolate it, it's important to delve deeper into the limitations and capabilities of these devices:

  • Hubs:

    • Functionality: A hub operates at the physical layer (Layer 1) of the OSI model. It simply transmits data packets to all connected devices without examining the contents, and doesn't consider the MAC addresses of the devices connected to it. This can result in bandwidth waste because every device on the network gets the same data, even if it’s not intended for them. Additionally, hubs create significant network congestion in high-traffic networks.
    • Limitations: Since hubs do not filter data based on MAC addresses, they cannot intelligently forward traffic to specific devices. This inefficiency can lead to unnecessary collisions and increased network overhead.
  • Switches:

    • Functionality: A switch operates at the data link layer (Layer 2) of the OSI model. Unlike a hub, it learns MAC addresses and forwards data only to the relevant device. This reduces collisions and bandwidth usage significantly.
    • Advanced Features:
      • VLAN (Virtual Local Area Network): Switches can create VLANs, which allow devices on the same physical network to be logically segmented into smaller, isolated networks, improving network security and reducing broadcast traffic.
      • Link Aggregation: Switches also support link aggregation, which enables multiple physical links to be combined into a single logical link to increase bandwidth and provide redundancy.

Advanced Switch Features

  • VLANs: Virtual LANs allow for logical segmentation of a network, enabling better management of broadcast traffic and improved security. For example, sensitive financial systems might be isolated in their own VLAN, preventing unnecessary traffic and increasing data protection.
  • Link Aggregation: Link aggregation combines multiple physical connections to create a single logical link, which increases the available bandwidth between switches and provides redundancy. This is especially useful in high-traffic networks where a single link may not be sufficient.

2. Network Security Basics

Basic Network Security Concepts

  • Firewall: A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks, such as the internet. Firewalls can be implemented as hardware, software, or a combination of both.

  • Intrusion Detection System (IDS): An IDS monitors network traffic for suspicious activity and known threats. If an attack is detected, the system can alert administrators. However, it does not block the attack, unlike an Intrusion Prevention System (IPS).

  • Virtual Private Network (VPN): A VPN is a secure connection between two networks over the internet, allowing remote users to access the network as if they were directly connected to it. VPNs use encryption to protect data and often rely on tunneling protocols like IPsec or SSL.

Access Control and Security Policies

  • Access Control Lists (ACLs): ACLs are used to filter network traffic based on IP addresses, protocols, and ports. They define which users or devices can access resources on a network. ACLs can be applied to both routers and firewalls to either allow or deny traffic.

  • Firewall Rules: Firewalls use rules to determine which traffic is permitted or denied. A simple firewall rule could allow only HTTP (port 80) traffic and deny everything else.

3. Network Topology

Different Types of Network Topologies

  • Star Topology: In a star topology, all devices are connected to a central node (typically a switch or hub). This topology is easy to manage and extend but has a single point of failure (the central node).

  • Bus Topology: Bus topology connects all devices to a single central cable (the "bus"). It is cost-effective but can be prone to network failure if the central cable is damaged.

  • Ring Topology: In a ring topology, devices are connected in a circular fashion. Data travels in one direction, passing through each device until it reaches its destination. It's more fault-tolerant than bus topology but is still susceptible to disruptions if a device fails.

  • Mesh Topology: Mesh topology provides a direct point-to-point connection between every device in the network. While it provides excellent fault tolerance and redundancy, it is expensive and complex to manage.

Virtual Networks and SDN (Software Defined Networking)

  • SDN: Software-Defined Networking separates the control plane (where routing decisions are made) from the data plane (where data is forwarded). SDN enables dynamic network configuration, improving efficiency and agility. It's widely used in data centers and cloud computing to enhance resource management and scalability.

  • Virtual Networks: Virtualization allows the creation of virtual networks within a physical network, enabling multiple logical networks to operate independently on the same physical infrastructure. This is particularly useful in cloud environments, where resources need to be dynamically allocated.

4. In-Depth Understanding of TCP/IP Protocol

TCP vs. UDP

  • TCP (Transmission Control Protocol): TCP is a connection-oriented protocol that ensures reliable delivery of data. It performs handshaking to establish a connection between the sender and receiver, confirming that data is received properly. If any data is lost, it is retransmitted.

    • Connection Setup and Teardown: The connection is established through a three-way handshake (SYN, SYN-ACK, ACK). The connection teardown occurs via a four-way handshake (FIN, ACK).
    • Use Cases: TCP is used in applications where data reliability is critical, such as web browsing (HTTP/HTTPS), email (SMTP), and file transfer (FTP).
  • UDP (User Datagram Protocol): UDP is a connectionless protocol that does not guarantee delivery. It sends packets without establishing a connection or ensuring the recipient has received them. This makes it faster but less reliable than TCP.

    • Use Cases: UDP is ideal for applications where speed is more critical than reliability, such as real-time streaming (video/audio), DNS queries, and online gaming.

Port Numbers

  • Port Numbers: Port numbers are used by TCP/IP to distinguish different services on a device. For example:
    • HTTP (80): The port used for web traffic.
    • HTTPS (443): The port used for secure web traffic.
    • FTP (21): The port used for file transfers.
    • DNS (53): The port used for domain name resolution.

5. Network Diagnostic Tools

Ping and Traceroute

  • Ping: Ping is used to test the availability of a network device. It sends ICMP echo request packets and waits for an echo reply. It helps to check basic connectivity between devices.

  • Traceroute: Traceroute traces the path that packets take to reach a destination. It helps diagnose network issues by identifying where packets are being delayed or dropped.

Other Diagnostic Commands

  • Netstat: Netstat is used to display network connections, routing tables, and network interface statistics. It is helpful for diagnosing network traffic and port issues.
  • nslookup: Nslookup is used to query DNS records, helping to resolve domain names to IP addresses.
  • ipconfig/ifconfig: ipconfig (Windows) and ifconfig (Linux/Unix) display network configuration details, including IP address, subnet mask, and gateway information.

6. Evolution and Development of Networks

History of the Internet

  • ARPANET: The ARPANET was the precursor to the modern internet, developed in the late 1960s by the U.S. Department of Defense. It used packet switching to send data across a network of computers.

  • Transition to IPv6: As the internet grew, IPv4 (which uses 32-bit addresses) became insufficient to handle the increasing number of devices. IPv6 was introduced to provide a much larger address space (128-bit addresses), ensuring that we can continue to connect devices globally.

Modern Network Trends

  • IoT (Internet of Things): The Internet of Things refers to the connection of everyday devices (e.g., appliances, vehicles, wearables) to the internet, enabling smart devices to communicate and share data.
  • 5G Networks: 5G is the next generation of wireless technology, offering significantly faster speeds and lower latency than 4G, which will enable the growth of IoT and autonomous systems.
  • Network Virtualization: Network virtualization allows for the creation of virtual networks that are abstracted from the underlying physical network, improving flexibility and resource utilization.

7. Real-World Case Studies

Enterprise Network Deployment

  • A large organization might deploy VLANs to segment traffic between departments. For example, the HR department could be isolated in its own VLAN for security reasons, while the Finance department might have its own VLAN for sensitive data. This reduces broadcast traffic and enhances security.

Network Design and Troubleshooting Scenarios

  • In a case where an office network is slow, ping and traceroute can be used to identify if the issue is within the local network or an external service. If packets are dropped, it might be a sign of a routing issue or network congestion. A network engineer would need to diagnose the issue using these tools and then take action, such as optimizing routing policies or fixing faulty equipment.

Conclusion:

The additional points focus on deeper aspects of network devices, network security, network topologies, and protocols, which are crucial for students and network engineers to understand. Understanding the evolution of networking technologies and having hands-on experience with diagnostic tools will provide practical insights and better prepare students for exams and real-world networking tasks.

Frequently Asked Questions

Which OSI layer is responsible for routing packets between networks?

Answer:

Layer 3 – Network Layer

Explanation:

The Network Layer (Layer 3) of the OSI model is responsible for logical addressing and routing. It determines how packets travel between different networks and selects the best path to reach a destination.

Protocols such as IP (Internet Protocol) operate at this layer. Routers examine the destination IP address of a packet and forward it toward the appropriate next hop based on routing tables.

Understanding this layer is fundamental because routing protocols and IP addressing concepts are core topics in networking certifications including JN0-105.

Demand Score: 86

Exam Relevance Score: 92

What type of traffic is sent from one source to all devices on a network segment?

Answer:

Broadcast traffic

Explanation:

Broadcast traffic is transmitted from a single device to every device on the same network segment. In IPv4 networks, the broadcast address is typically the highest address in the subnet (for example 192.168.1.255 in a /24 network).

Broadcast communication is commonly used for discovery protocols such as ARP. However, because broadcasts are received by all hosts in a network, excessive broadcast traffic can reduce network performance.

Routers normally do not forward broadcast packets, which helps contain broadcast domains within a local network segment.

Demand Score: 83

Exam Relevance Score: 90

What is the primary purpose of using VLANs in a switched network?

Answer:

To logically segment a network into separate broadcast domains.

Explanation:

A Virtual LAN (VLAN) allows administrators to divide a physical network into multiple logical networks. Devices within the same VLAN can communicate with each other as if they were connected to the same physical network, even if they are connected to different switches.

VLANs improve network design by reducing broadcast traffic, improving security, and simplifying network management. For example, different departments within an organization can be placed into separate VLANs even though they share the same switching infrastructure.

Because each VLAN represents a separate broadcast domain, communication between VLANs typically requires a Layer 3 device such as a router or Layer 3 switch.

Demand Score: 80

Exam Relevance Score: 91

What is the main difference between unicast and multicast traffic?

Answer:

Unicast sends traffic to a single destination, while multicast sends traffic to a specific group of devices.

Explanation:

In unicast communication, a packet is sent from one sender to exactly one receiver. This is the most common type of network communication and is used for most Internet traffic.

In multicast communication, packets are delivered to a selected group of receivers that have joined a multicast group. This method is efficient for applications that need to distribute the same data to multiple receivers simultaneously, such as video streaming or real-time data feeds.

Unlike broadcast traffic, multicast does not send packets to every device on the network—only to those that have subscribed to the multicast group.

Demand Score: 82

Exam Relevance Score: 89

JN0-105 Training Course