Computer networks
All about communications between networked computing devices
A CISCO-based course on computers networks
Begin preparing for a networking career with this introduction to how networks operate. Networking is at the heart of the digital transformation. Although often unseen, it enables us to stay connected as we move around freely using our laptop or smartphone. You’ll even get the chance to build simple local area networks (LANs) yourself. Also you’ll have a working knowledge of IP addressing schemes.
Topic outline
- General
- Topic 1
Introduction
Part 1 - Team and learning context
This course teaches the basic networking concepts and the skills that you can put to use right away. This course is part of the CCNA networking courses.Course team
Vice-Rector/Lector, Technical University of Moldova/CISCO Instructor
Lector, Technical University of Moldova/CISCO Instructor
This course is part of the CCNA networking courses.
- Topic 2
Introduction
Part 2 - Unit Objectives
This course teaches the basic networking concepts and the skills that you can put to use right away. This course is part of the CCNA networking courses.You'll learn these core skills
Build simple LANs, perform basic configurations for routers and switches, and implement IPv4 and IPv6 addressing schemes.Develop critical thinking and problem-solving skills using real equipment and Cisco Packet Tracer.Explain how to support available and reliable networks using dynamic addressing.Introduction
- Topic 3
Instructions
Part 1 - NetAcad
This course uses Cisco Networking Academy as learning platform. This section will provide all necessary information about course access and learning path related to study program.Coursework
Coursework may take place in NetAcad online learning environment, in the classroom—or both. Once you enroll, you'll be asked to create an account, then taken to your learning dashboard. Course materials and tests may be accessed from there.Once enrolled, you have access to student forums where you can ask questions and interact with instructors and peers. Also use our Facebook community, which has more than a million members available for support.
- Topic 4
Instructions
Part 2 - Cisco Packet Tracer
This course uses Cisco Packet Tracer - a powerful network simulation tool built by Cisco.Discover and troubleshoot using powerful networking simulation tool.
Enroll, download and start learning valuable tips and best practices for using our innovative, virtual simulation tool, Cisco Packet Tracer. This self-paced course is designed for beginners with no prior networking knowledge. It teaches basic operations of the tool with multiple hands-on activities helping you to visualize a network using everyday examples, including Internet of Things (IoT). This Introductory course is extremely helpful for anyone who plans to take one of the Networking Academy courses which utilizes the powerful simulation tool.- Enroll, download and start learning valuable tips and best practices for using our innovative, virtual simulation tool, Cisco Packet Tracer. This self-paced course is designed for beginners with no prior networking knowledge. It teaches basic operations of the tool with multiple hands-on activities helping you to visualize a network using everyday examples, including Internet of Things (IoT). This Introductory course is extremely helpful for anyone who plans to take one of the Networking Academy courses which utilizes the powerful simulation tool.
- Topic 5
Evaluation sessions
Evaluation 1, Computer networks, according to the established schedule
22.10.2020 11:30 am start
This course usesPlease choose the version of Packet Tracer you have installed on your device.
Test proposed on the elearning platform netacad.com
- Topic 6
Evaluation sessions
Evaluation 2, Computer networks, according to the established schedule
03.12.2020 11.30
This course usesPlease choose the version of Packet Tracer you have installed on your device.
- Topic 7
Feedback, Computer networks, according to the established schedule
09.12.2020 8:00 AM up to 15:00 PM
This course usesPlease choose the version of Packet Tracer you have installed on your device.
- Topic 8
Final Exam
Final Exam, Computer networks, according to the established schedule
22.12.2020 9:00 AM
This course usesPlease choose the version of Packet Tracer you have installed on your device.
- Networking Today
Chapters
Chapter 1 - Networking Today
Congratulations! This module starts you on your path to a successful career in Information Technology by giving you a foundational understanding of the creation, operation, and maintenance of networks. As a bonus, you get to dive into networking simulations using Packet Tracer. We promise you will really enjoy it!Topic Title Topic Objective Networks Affect our Lives Explain how networks affect our daily lives Network Components Explain how host and network devices are used. Network Representations and Topologies Explain network representations and how they are used in network topologies Common Types of Networks Compare the characteristics of common types of networks. Internet Connections Explain how LANs and WANs interconnect to the internet. Reliable Networks Describe the four basic requirements of a reliable network. Network Trends Explain how trends such as BYOD, online collaboration, video, and cloud computing are changing the way we interact. Network Security Identify some basic security threats and solution for all networks. The IT Professional Explain employment opportunities in the networking field. Please submit here your laboratories from the link above. You have one week at your disposal. The files must be in a zip format.
- Topic 10
Chapter 2 - Basic Switch and End Device Configuration
Welcome to Basic Switch and End Device Configuration!
As part of your career in networking, you might have to set up a new network or maintain and upgrade an existing one. In either case, you’ll configure switches and end devices so that they are secure and perform effectively based on your requirements. Out of the box, switches and end devices come with some general configuration. But for your particular network, switches and end devices require your specific information and instructions. In this module, you will learn how to access Cisco IOS network devices. You will learn basic configuration commands and use them to configure and verify a Cisco IOS device and an end device with an IP address. Of course, there is much more to network administration, but none of that can happen without first configuring switches and end devices. Let’s get started!
Topic Title Topic Objective Cisco IOS Access Explain how to access a Cisco IOS device for configuration purposes. IOS Navigation Explain how to navigate Cisco IOS to configure network devices. The Command Structures Describe the command structure of Cisco IOS software. Basic Device Configuration Configure a Cisco IOS device using CLI. Save Configurations Use IOS commands to save the running configuration. Ports and Addresses Explain how devices communicate across network media. Configure IP Addressing Configure a host device with an IP address. Verify Connectivity Verify connectivity between two end devices. Please submit here your laboratories from the link above. You have one week at your disposal. The files must be in a zip format.
- Topic 11
Chapter 3 - Protocols and Models
Welcome to Protocols and Models!
You know the basic components of a simple network, as well as initial configuration. But after you have configured and connected these components, how do you know they will work together? Protocols! Protocols are sets of agreed upon rules that have been created by standards organizations. But, because you cannot pick up a rule and look closely at it, how do you truly understand why there is such a rule and what it is supposed to do? Models! Models give you a way to visualize the rules and their place in your network. This module gives you an overview of network protocols and models. You are about to have a much deeper understanding of how networks actually work!
Topic Title Topic Objective The Rules Describe the types of rules that are necessary to successfully communicate. Protocols Explain why protocols are necessary in network communication. Protocol Suites Explain the purpose of adhering to a protocol suite. Standards Organizations Explain the role of standards organizations in establishing protocols for network interoperability. Reference Models Explain how the TCP/IP model and the OSI model are used to facilitate standardization in the communication process. Data Encapsulation Explain how data encapsulation allows data to be transported across the network. Data Access Explain how local hosts access local resources on a network. Please submit here your laboratories from the link above. You have one week at your disposal. The files must be in a zip format.
- Topic 12
Chapter 4 - Physical Layer
Welcome to Physical Layer!
The physical layer of the OSI model sits at the bottom of the stack. It is part of the Network Access layer of the TCP/IP model. Without the physical layer, you would not have a network. This module explains, in detail, the three ways to connect to the physical layer. Packet Tracer activities and labs will give you the confidence you need to cable up your own network! Let’s get busy!
Topic Title Topic Objective Purpose of the Physical Layer Describe the purpose and functions of the physical layer in the network. Physical Layer Characteristics Describe characteristics of the physical layer.. Copper Cabling Identify the basic characteristics of copper cabling. UTP Cabling Explain how UTP cable is used in Ethernet networks. Fiber-Optic Cablings Describe fiber optic cabling and its main advantages over other media. Wireless Media Connect devices using wired and wireless media.
- Topic 13
Chapter 5 - Number Systems
Welcome to Number Systems!
Guess what? This is a 32-bit IPv4 address of a computer in a network: 11000000.10101000.00001010.00001010. It is shown in binary. This is the IPv4 address for the same computer in dotted decimal: 192.168.10.10. Which one would you rather work with? IPv6 addresses are 128 bits! To make these addresses more manageable, IPv6 uses a hexadecimal system of 0-9 and the letters A-F.
As a network administrator you must know how to convert binary addresses into dotted decimal and dotted decimal addresses into binary. You will also need to know how to convert dotted decimal into hexadecimal and vice versa. (Hint: You still need your binary conversion skills to make this work.)
Surprisingly, it is not that hard when you learn a few tricks. This module contains an activity called the Binary Game which will really help you get started. So, why wait?!Topic Title Topic Objective Binary Number System Calculate numbers between decimal and binary systems. Hexadecimal Number System Calculate numbers between decimal and hexadecimal systems.
- Topic 14
Chapter 6 - Data Link Layer
Welcome to Data Link Layer!
Every network has physical components and media connecting the components. Different types of media need different information about the data in order to accept it and move it across the physical network. Think of it this way: A well-hit golf ball moves through the air fast and far. It can also move through water but not as fast or as far unless it is helped by a more forceful hit. This is because the golf ball is traveling through a different medium; water instead of air.
Data must have help to move it across different media. The data link layer provides this help. As you might have guessed, this help differs based on a number of factors. This module gives you an overview of these factors, how they affect data, and the protocols designed to ensure successful delivery. Let’s get started!Topic Title Topic Objective Purpose of the Data Link Layer Describe the purpose and function of the data link layer in preparing communication for transmission on specific media. Topologies Compare the characteristics of media access control methods on WAN and LAN topologies. Data Link Frame Describe the characteristics and functions of the data link frame.
- Topic 15
Chapter 7 - Ethernet Switching
Welcome to Ethernet Switching!
If you are planning to become a network administrator or a network architect, you will definitely need to know about Ethernet and Ethernet switching. The two most prominent LAN technologies in use today are Ethernet and WLAN. Ethernet supports bandwidths of up to 100 Gbps, which explains its popularity. This module contains a lab using Wireshark in which you can look at Ethernet frames and another lab where you view network device MAC addresses. There are also some instructional videos to help you better understand Ethernet. By the time you have finished this module, you too could create a switched network that uses Ethernet!
Topic Title Topic Objective Ethernet Frame Explain how the Ethernet sublayers are related to the frame fields. Ethernet MAC Address Describe the Ethernet MAC address. The MAC Address Table Explain how a switch builds its MAC address table and forwards frames. Switch Speeds and Forwarding Methods Describe switch forwarding methods and port settings available on Layer 2 switch ports.
- Topic 16
Chapter 8 - Network Layer
Welcome to Network Layer!
By now you may have noticed that the modules in this course are progressing from the bottom up through the OSI model layers. At the network layer of the OSI model, we introduce you to communication protocols and routing protocols. Say you want to send an email to a friend who lives in another city, or even another country. This person is not on the same network as you. A simple switched network cannot get your message any further than the end of your own network. You need some help to keep this message moving along the path to your friend’s end device. To send an email (a video, or a file, etc.) to anyone who is not on your local network, you must have access to routers. To access routers, you must use network layer protocols. To help you visualize these processes, this module contains two Wireshark activities. Enjoy!
Topic Title Topic Objective Network Layer Characteristics Explain how the network layer uses IP protocols for reliable communications. IPv4 Packet Explain the role of the major header fields in the IPv4 packet. IPv6 Packet Explain the role of the major header fields in the IPv6 packet. How a Host Routes Explain how network devices use routing tables to direct packets to a destination network. Router Routing Tables Explain the function of fields in the routing table of a router.
- Topic 17
Chapter 9 - Address Resolution
Welcome to Address Resolution!
Hosts and routers both create routing tables to ensure that they can send and receive data across networks. So how does this information get created in a routing table? As a network administrator, you could enter these MAC and IP addresses manually. But that would take a lot of time and the likelihood of making a few mistakes is great. Are you thinking that there must be some way that this could be done automatically, by the hosts and routers themselves? Of course, you are correct! And even though it is automatic, you must still understand how this works, because you may have to troubleshoot a problem, or worse, your network could be attacked by a threat actor. Are you ready to learn about address resolution? This module has several very good videos to help explain the concepts, as well as three Packet Tracer activities to cement your understanding. Why wait?
Topic Title Topic Objective MAC and IP Compare the roles of the MAC address and the IP address. ARP Describe the purpose of ARP. Neighbor Discovery Describe the operation of IPv6 neighbor discovery.
- Topic 18
Chapter 10 - Basic Router Configuration
Welcome to Basic Router Configuration!
Have you ever run a relay? The first person runs the first leg of the race and hands off the baton to the next runner, who continues forward in the second leg of the race and hands off the baton to the third runner, and on it goes. Routing packets is very similar to a relay. But if the first runner does not know where to find the second runner, or drops the baton in the first leg, then that relay team will most certainly lose the race.
Routing packets is very similar to a relay. As you know, routing tables are created and used by routers to forward packets from their local networks on to other networks. But a router cannot create a routing table or forward any packets until it has been configured. If you plan to become a network administrator you definitely must know how to do this. The good news? It is easy! This module has Syntax Checker activities so that you can practice your configuration commands and see the output. There are also some Packet Tracer activities to get you started. Let’s go!Topic Title Topic Objective Configure Initial Router Settings Configure initial settings on an IOS Cisco router. Configure Interfaces Configure two active interfaces on a Cisco IOS router. Configure the Default Gateway Configure devices to use the default gateway.
- Topic 19
Chapter 11 - IPv4 Addressing
Welcome to IPv4 Addressing!
Currently, there are still plenty of networks using IPv4 addressing, even as the organizations which use them are making the transition to IPv6. So it is still very important for network administrators to know everything they can about IPv4 addressing. This module covers the fundamental aspects of IPv4 addressing in detail. It includes how to segment a network into subnets and how to create a variable-length subnet mask (VLSM) as part of an overall IPv4 addressing scheme. Subnetting is like cutting a pie into smaller and smaller pieces. Subnetting may seem overwhelming at first, but we show you some tricks to help you along the way. This module includes several videos, activities to help you practice subnetting, Packet Tracers and a lab. Once you get the hang of it, you’ll be on your way to network administration!
Topic Title Topic Objective IPv4 Address Structure Describe the structure of an IPv4 address including the network portion, the host portion, and the subnet mask. IPv4 Unicast, Broadcast, and Multicast Compare the characteristics and uses of the unicast, broadcast and multicast IPv4 addresses. Types of IPv4 Addresses Explain public, private, and reserved IPv4 addresses. Network Segmentation Explain how subnetting segments a network to enable better communication. Subnet an IPv4 Network Calculate IPv4 subnets for a /24 prefix. Subnet a /16 and a /8 Prefix Calculate IPv4 subnets for a /16 and /8 prefix. Subnet To Meet Requirements Given a set of requirements for subnetting, implement an IPv4 addressing scheme. Variable Length Subnet Masking Explain how to create a flexible addressing scheme using variable length subnet masking (VLSM). . Structured Design Implement a VLSM addressing scheme.
- Topic 20
Chapter 12 - IPv6 Addressing
Welcome to IPv6 Addressing!
It is a great time to be (or become) a network administrator! Why? Because in many networks, you will find both IPv4 and IPv6 working together. After the hard work of learning to subnet an IPv4 network, you may find that subnetting an IPv6 network is much easier. You probably didn’t expect that, did you? A Packet Tracer at the end of this module will give you the opportunity to subnet an IPv6 network. Go ahead, jump in!
Topic Title Topic Objective IPv4 Issues DeExplain the need for IPv6 addressing. IPv6 Address Representation Explain how IPv6 addresses are represented. IPv6 Address Types Compare types of IPv6 network addresses. addresses. GUA and LLA Static Configuration Explain how to Configure static global unicast and link-local IPv6 network addresses. Dynamic Addressing for IPv6 GUAs Explain how to configure global unicast addresses dynamically. Dynamic Addressing for IPv6 LLAs Configure link-local addresses dynamically. IPv6 Multicast Addresses Identify IPv6 addresses. Subnet an IPv6 Network Implement a subnetted IPv6 addressing scheme. .
- Topic 21
Chapter 13 - ICMP
Welcome to ICMP!
Imagine that you have an intricate model train set. Your tracks and trains are all connected and powered up and ready to go. You throw the switch. The train goes halfway around the track and stops. You know right away that the problem is most likely located where the train has stopped, so you look there first. It is not as easy to visualize this with a network. Fortunately, there are tools to help you locate problem areas in your network, AND they work with both IPv4 and IPv6 networks! You will be happy to know that this module has a couple Packet Tracer activities to help you practice using these tools, so let’s get testing!
Topic Title Topic Objective ICMP Messages Explain how ICMP is used to test network connectivity. Ping and Traceroute Testing Use ping and traceroute utilities to test network connectivity.
- Topic 22
Chapter 14 - Transport Layer
Welcome to Transport Layer!
The transport layer is where, as the name implies, data is transported from one host to another. This is where your network really gets moving! The transport layer uses two protocols: TCP and UDP. Think of TCP as getting a registered letter in the mail. You have to sign for it before the mail carrier will let you have it. This slows down the process a bit, but the sender knows for certain that you received the letter and when you received it. UDP is more like a regular, stamped letter. It arrives in your mailbox and, if it does, it is probably intended for you, but it might actually be for someone else who does not live there. Also, it may not arrive in your mailbox at all. The sender cannot be sure you received it. Nevertheless, there are times when UDP, like a stamped letter, is the protocol that is needed. This topic dives into how TCP and UDP work in the transport layer. Later in this module there are several videos to help you understand these processes.
Topic Title Topic Objective Transportation of Data Explain the purpose of the transport layer in managing the transportation of data in end-to-end communication. TCP Overview Explain characteristics of TCP. UDP Overview Explain characteristics of UDP. Port Numbers Explain how TCP and UDP use port numbers. TCP Communication Process Explain how TCP session establishment and termination processes facilitate reliable communication. Reliability and Flow Control Explain how TCP protocol data units are transmitted and acknowledged to guarantee delivery. UDP Communication Compare the operations of transport layer protocols in supporting end-to-end communication.
- Topic 23
Course ending
At the end of the course We will ask you to comment on the course so that we can improve it for future students. Thank you!