xxx

1 Introduction to Networks

Overview

Module Overview  

Topics Covered

1.

Networking Overview

2.

OSI Model Concepts

3.

SOHO Networks

4.

Troubleshooting

This module provides a foundational introduction to computer networking. We begin with basic networking concepts and terminology, explore different network types and topologies, and examine the OSI reference model. The module concludes with practical applications in SOHO (Small Office/Home Office) networks and introduces a systematic troubleshooting methodology.

Learning Outcomes  

After completing this module, you will be able to:

Key Terms Preview  

Network Basics

Network Types

OSI & Data

Number Systems

2 Networking Fundamentals

2.1 What is a Network?

A computer network is fundamentally about connectivity and resource sharing. In this section, we explore the basic concepts that define networks and the terminology used by networking professionals.

What is a Network?  

xxSimple Network

The diagram above shows a simple network topology with two desktop PCs, a laptop, and a switch connecting them. This illustrates the basic star topology where all devices connect to a central switch, enabling communication and resource sharing among all connected devices.

Why Networks Matter

Networks enable collaboration, centralized data storage, resource sharing, and communication—the foundation of modern business and daily life.

2.2 Basic Networking Concepts

With the fundamental purpose of networks established, we now examine the terminology used to describe network components and their roles.

Networking Concepts  

Client-Server Example

When you visit a website, your computer (client) sends a request to a web server, which responds by sending the web page back to your browser.

The distinction between clients and servers is foundational to understanding network architecture. While this client-server model dominates modern networking, peer-to-peer architectures offer an alternative approach for certain applications.

2.3 Network Types

Networks are classified by their geographic scope and purpose. Understanding these classifications helps in designing, managing, and troubleshooting networks of different scales.

Network Types  

The Internet

The internet is the largest WAN in existence—a global network of interconnected networks using standardized protocols.

Network Types Comparison  

Type Range Example Typical Speed
PAN <10 meters Bluetooth headset 1–3 Mbps
LAN Building/floor Office network 100 Mbps–10 Gbps
CAN Campus University network 1–10 Gbps
MAN City City library system 100 Mbps–1 Gbps
WAN Global Corporate branches 1 Mbps–1 Gbps

Size Relationship

PAN LAN CAN MAN WAN

Speed vs. Distance

Generally, smaller networks offer faster speeds due to shorter cable runs and fewer devices.

3 Network Topologies

Network topologyâ”the arrangement of devices and connectionsâ”fundamentally impacts network performance, cost, scalability, and reliability. This section explores the most important topologies used in computer networks.

3.1 Understanding Network Topology

Network topology describes how devices are arranged and connected in a network. Understanding topologies is essential for network design, troubleshooting, and optimization.

What is Network Topology?  

Physical vs. Logical Example

A network might be physically wired in a star pattern (all cables to a central switch), but logically function as a bus where all devices receive all transmissions.

3.2 Star Topology

Star Topology  

Advantages

Easy to install, manage, and troubleshoot; simple to add new devices.

xSxxwitch

The star topology diagram above illustrates five devices (three PCs and two laptops) all connected to a central switch. Each device has a dedicated connection to the switch, making this the most common topology in modern LANs. If one cable fails, only that device loses connectivity while others continue operating normally.

3.3 Mesh Topology

Mesh Topology  

Formula: Full Mesh Links

Links needed = n(n−-1)
  2 where n = number of nodes. Example: 5 nodes require 5×4
 2 = 10 links.

12345FullMesh (10 links)

The mesh topology diagram shows five nodes in a full mesh configuration, where each node connects directly to every other node. This creates 10 total links (calculated using n(n-1)/2 where n=5). While expensive to implement, mesh topologies provide maximum redundancy and fault tolerance.

While star and mesh topologies dominate modern networks, understanding legacy topologies helps explain the evolution of networking technology and why certain design decisions were made.

3.4 Legacy Topologies

Legacy Topologies  

Bus Topology

x

Ring Topology

1234

The legacy topology diagrams illustrate bus and ring configurations. In the bus topology (left), all devices tap into a single central cable, like houses on a street. A break anywhere disables the entire network. In the ring topology (right), data flows in one direction around the circle with arrows showing the path. Both topologies are rarely used in modern LANs but may still appear in certain industrial or legacy systems.

Why Legacy?

Bus and ring topologies are rarely used today due to their vulnerability to single points of failure and difficulty in troubleshooting.

3.5 Case Study: Network Topology Selection

Case Study: Mystery Inc. Opens a Detective Agency  

Case Study: Mystery Inc. Network Setup
The Mystery Inc. gang is opening a new detective agency headquarters and needs to set up a computer network for five workstations.

Shaggy suggests: “Like, let’s just connect every computer to every other computer, man. That way if Scooby chews through one cable, we’re still connected!”

Velma responds: “Jinkies! That’s overkill. Let’s connect everything to one central switch instead—it’s much more practical.”

Review Questions

1.

What network topology is Shaggy describing?

2.

What network topology is Velma describing?

3.

Which topology would be more practical for a small office, and why?

4.

How many cables would Shaggy’s design require for 5 computers?

Case Study Solution: Mystery Inc. Network Setup  

Solution: Mystery Inc. Network Setup

1.

Shaggy is describing a full mesh topology, where every device connects directly to every other device.

2.

Velma is describing a star topology, where all devices connect to a central switch.

3.

Star topology is more practical for a small office because:

4.

Shaggy’s full mesh would require 5×4
 2 = 10 cables.

Key Takeaway

While mesh topologies offer excellent redundancy, star topologies are the standard choice for most LANs due to their balance of simplicity, cost, and reliability.

4 The OSI Model

The Open Systems Interconnection (OSI) model is one of the most important concepts in networking. This seven-layer framework provides a systematic way to understand network communication and serves as an essential troubleshooting tool for network professionals.

4.1 Introduction to the OSI Model

The OSI Model  

The Seven Layers (Bottom to Top)

1. Physical 2. Data Link 3. Network 4. Transport 5. Session 6. Presentation 7. Application

Why the OSI Model Matters  

Troubleshooting Example

“The cable is fine (Layer 1), and the switch sees the MAC address (Layer 2), but there’s no IP address (Layer 3).”

This pinpoints the problem to Layer 3—likely a DHCP issue.

4.2 Data Encapsulation and PDUs

As data moves through the OSI layers, each layer adds its own header information in a process called encapsulation. Understanding this process is crucial for comprehending how network communication actually works.

Data Encapsulation and Decapsulation  

DSTPIFMFBLLLLLEaeCaPrACiaaaaantgmPcamCStsyyyyycaekee (eeeeeant1rsrrrrpts 4 3 2 1s a5–::::un7 S P F Blad:earit 0 Dgcatsiosamkmn oteetenan tthe wire)

The encapsulation diagram illustrates how data is wrapped with headers as it moves down the OSI layers. Starting with application data, each layer adds its own control information: Layer 4 adds a TCP/UDP header creating a segment, Layer 3 adds an IP header creating a packet, Layer 2 adds MAC addresses and a Frame Check Sequence creating a frame, and finally Layer 1 transmits everything as bits on the wire.

4.3 The Seven Layers

Each of the seven OSI layers has specific responsibilities. We’ll examine each layer from bottom to top, understanding what each layer does and what devices operate at that layer.

Layer 1: Physical  

PDU: Bits

At Layer 1, data is represented as individual bits transmitted as electrical signals, light pulses, or radio waves.

Layer 1 Devices

Layer 2: Data Link  

MAC Address Format

00:1A:2B:3C:4D:5E — Six pairs of hexadecimal digits (48 bits total).

Layer 2 Devices

PDU: Frame

Frames contain source and destination MAC addresses.

Layers 1 and 2 work together to enable communication between devices on the same local network. Layer 1 moves the bits, while Layer 2 organizes them into frames and provides addressing and error checking.

Layer 3: Network  

IP Address Examples

IPv4: 192.168.1.100 (32 bits) IPv6: 2001:0db8:85a3::8a2e:0370:7334 (128 bits)

Layer 3 Devices

PDU: Packet

Packets contain source and destination IP addresses.

Layer 4: Transport  

PDU: Segment (TCP) / Datagram (UDP)

Transport layer PDUs contain source and destination port numbers.

TCP vs. UDP

TCP: Web browsing, email, file transfer—when accuracy matters.

UDP: Video streaming, VoIP, online gaming—when speed matters.

Common Ports

HTTP: 80 HTTPS: 443 SSH: 22 DNS: 53

Upper Layers: Session, Presentation, Application  

Layer 5: Session

Examples: NetBIOS, RPC, SQL sessions

Layer 6: Presentation

Examples: SSL/TLS, JPEG, ASCII, MPEG

Layer 7: Application

Examples: HTTP, FTP, SMTP, DNS, DHCP

Important Note

In practice, the upper layers (5, 6, 7) are often combined in the TCP/IP model as a single “Application” layer, since many protocols span multiple OSI layers.

4.4 OSI Model Summary

OSI Model Summary  

Layer Name PDU Key Devices Protocols/Examples
7 Application Data Hosts, firewalls HTTP, FTP, SMTP, DNS
6 Presentation Data Hosts SSL/TLS, JPEG, MPEG
5 Session Data Hosts NetBIOS, RPC
4 Transport Segment Hosts, firewalls TCP, UDP
3 Network Packet Routers, L3 switches IP, ICMP, ARP
2 Data Link Frame Switches, bridges Ethernet, Wi-Fi (802.11)
1 Physical Bits Hubs, cables, NICs Ethernet (physical), DSL

Lower Layers (1–4)

Handle data transport and delivery—the “plumbing” of the network.

Upper Layers (5–7)

Handle data representation and application services—closer to the user.

OSI Memory Tricks  

Layer 1 Layer 7

Please Do Not Throw Sausage Pizza Away

1.

Physical

2.

Data Link

3.

Network

4.

Transport

5.

Session

6.

Presentation

7.

Application

Layer 7 Layer 1

All People Seem To Need Data Processing

7.

Application

6.

Presentation

5.

Session

4.

Transport

3.

Network

2.

Data Link

1.

Physical

Quick PDU Mnemonic

Don’t Some People Fear Birthdays? — Data, Segment, Packet, Frame, Bits (Layers 71)

4.5 Case Study: OSI Troubleshooting

Case Study: The Haunted Network  

Case Study: The Haunted Network
Daphne reports that she cannot access any websites from her computer at Mystery Inc. headquarters.

Fred runs some diagnostic tests and finds:

Review Questions

1.

Which OSI layers appear to be working correctly based on Fred’s tests?

2.

At which OSI layer is the problem most likely occurring?

3.

What might be causing this issue?

Case Study Solution: The Haunted Network  

Solution: The Haunted Network

1.

Layers 1–3 are working correctly:

2.

The problem is most likely at Layer 7 (Application) or involves DNS resolution.

3.

Possible causes include:

Key Takeaway

The OSI model helps isolate problems layer by layer—if Layer 3 works (ping by IP), check Layers 4–7 next.

5 SOHO Networks

5.1 Introduction to SOHO Networks

Small Office/Home Office (SOHO) networks demonstrate how the networking concepts we’ve learned apply in practice. These networks typically serve fewer than 10 users and use integrated devices that combine multiple networking functions.

What is a SOHO Network?  

Common SOHO Devices

SOHO Examples

Home networks, small retail shops, home-based businesses, small professional offices (law, accounting, medical).

5.2 SOHO Router Functions

The SOHO router is a remarkable device that performs functions across multiple OSI layers. Understanding these functions helps explain how a simple home network connects to the internet and keeps devices secure.

SOHO Router Overview  

xSxxxxInOtHerOnetRouter

The SOHO network diagram shows a central router connecting four devices: two wired connections (PC and laptop on the left) and two wireless connections (phone and tablet on the right). The router serves as the gateway to the internet, demonstrating the star topology commonly used in small office and home networks.

SOHO Router: Physical Layer Functions  

Physical Components

Common Speeds

Fast Ethernet: 100 Mbps Gigabit: 1000 Mbps Wi-Fi 6: up to 9.6 Gbps

SOHO Router: Data Link Layer Functions  

Layer 2 Features

Security Tip

MAC filtering alone is not secure—MAC addresses can be spoofed. Always use encryption!

SOHO Router: Network Layer Functions  

Layer 3 Features

Private IP Ranges

10.0.0.0/8 172.16.0.0/12 192.168.0.0/16

SOHO Router: Transport, Application, and Security  

Transport Layer (4)

Application Layer (7)

Security Features

5.3 Connecting to the Internet

The Internet  

Public vs. Private IP

Private IPs work only on your LAN; public IPs are routable on the internet. NAT translates between them.

xxSxISxInxW1919POPte22uHerb.1.1blOnS66icReter8.8.:ov1.1. 74uer11.te0112r5.x.x

This diagram illustrates how a home network connects to the internet. The SOHO router assigns private IP addresses (192.168.1.x) to local devices and uses NAT to translate them to a single public IP address when communicating with the ISP. Data flows through the ISP’s network to reach the broader internet and ultimately destination servers.

6 Number Systems for Networking

6.1 Binary and Hexadecimal

Understanding binary and hexadecimal number systems is essential for working with IP addresses, subnet masks, and MAC addresses. These number systems form the foundation of how computers represent and process network information.

Why Binary and Hexadecimal Matter  

The Same Address in Three Formats

Binary: 11000000.10101000.00000001.00001010
Decimal: 192.168.1.10
Hexadecimal: C0.A8.01.0A

Coming Up

Let’s learn how to convert between these number systems.

Binary Number System  

Example: Converting 11010110 to Decimal

128 64 32 16 8 4 2 1
1 1 0 1 0 1 1 0
128 64 16 4 2

128 + 64 + 16 + 4 + 2 = 214

Memorize the Powers of 2

20 = 1, 21 = 2, 22 = 4, 23 = 8, 24 = 16, 25 = 32, 26 = 64, 27 = 128

Hexadecimal Number System  

Binary to Hex

Convert 11010110: Split: 1101 | 0110 Convert: D | 6 Result: 0xD6

4-Bit Reference

Dec Bin Hex
0 0000 0
1 0001 1
2 0010 2
3 0011 3
4 0100 4
5 0101 5
6 0110 6
7 0111 7
8 1000 8
9 1001 9
10 1010 A
11 1011 B
12 1100 C
13 1101 D
14 1110 E
15 1111 F

6.2 Case Study: SOHO Network Troubleshooting

Case Study: Scooby Snacks Café Wi-Fi  

Case Study: Scooby Snacks Café Wi-Fi
Shaggy has opened “Scooby Snacks Café” and set up a SOHO router to provide free Wi-Fi for customers.

A customer connects to the Wi-Fi and receives the IP address 192.168.1.50. They can successfully print to the café’s wireless printer at 192.168.1.25, but they cannot access any websites.

Velma checks the router’s status page and sees the WAN port shows “Disconnected.”

Review Questions

1.

Is 192.168.1.50 a public or private IP address?

2.

Which SOHO router function successfully assigned this IP address?

3.

Why can the customer reach the printer but not websites?

4.

What should Shaggy check to fix the internet connectivity?

Case Study Solution: Scooby Snacks Café Wi-Fi  

Solution: Scooby Snacks Café Wi-Fi

1.

192.168.1.50 is a private IP address (from the 192.168.0.0/16 private range).

2.

The DHCP server function is working correctly—it assigned a valid IP to the customer’s device.

3.

The customer can reach the printer because both devices are on the same local network (Layer 2 switching works). Websites require internet access through the WAN connection, which is down.

4.

Shaggy should check:

Key Takeaway

A SOHO router combines many functions. When troubleshooting, identify which functions work (DHCP, switching) and which don’t (WAN/internet) to isolate the problem.

7 Network Troubleshooting Methodology

7.1 The CompTIA Troubleshooting Approach

Effective troubleshooting requires a systematic approach. CompTIA defines a seven-step methodology that provides structure to the problem-solving process, ensuring issues are resolved efficiently and completely.

Network Troubleshooting Methodology  

The 7 Steps

1.

Identify the problem

2.

Establish a theory

3.

Test the theory

4.

Establish a plan

5.

Implement the solution

6.

Verify functionality

7.

Document findings

7.2 Steps 1–3: Problem Identification and Theory

Step 1: Identify the Problem  

Key Questions to Ask

Step 2: Establish a Theory of Probable Cause  

Common Causes

Occam’s Razor

“The simplest explanation is usually correct.” Check the obvious things first—is it plugged in? Is it turned on?

Step 3: Test the Theory to Determine the Cause  

Theory Confirmed

Theory: Cable is bad. Test: Swap cable. Result: Connection works! Proceed to Step 4.

Theory Not Confirmed

Theory: Cable is bad. Test: Swap cable. Result: Still doesn’t work. Return to Step 2.

7.3 Steps 4–7: Implementation and Verification

Once the problem is identified and confirmed, the focus shifts to implementing a solution, verifying it works, and documenting the resolution for future reference.

Steps 4 & 5: Establish a Plan and Implement the Solution  

Step 4: Establish a Plan of Action

Step 5: Implement the Solution

Steps 6 & 7: Verify Functionality and Document Findings  

Step 6: Verify Full Functionality

Step 7: Document Findings

Why Document?

Good documentation helps you solve similar problems faster, trains other staff, provides evidence for management, and builds an organizational knowledge base.

7.4 Troubleshooting Summary

Troubleshooting Methodology Summary  

Step Name Key Actions
1 Identify the problem Question users, identify symptoms, determine scope
2 Establish a theory Consider probable causes, use OSI model, Occam’s Razor
3 Test the theory Confirm or eliminate; if wrong, return to Step 2
4 Establish a plan Plan the fix, consider impact, get approvals
5 Implement solution Execute plan, escalate if needed
6 Verify functionality Confirm fix works, check for side effects
7 Document findings Record problem, cause, actions, and outcome

Memory Tip

I Eat Tacos Every Instant Very Deliciously (Identify, Establish, Test, Establish, Implement, Verify, Document)

7.5 Case Study: Applying the Methodology

Case Study: The Mystery Machine Won’t Connect  

Case Study: The Mystery Machine Won’t Connect
The gang is on a stakeout in the Mystery Machine. Velma’s laptop suddenly cannot connect to Fred’s mobile hotspot, but Daphne’s tablet connects without any problems.

Velma has already tried rebooting her laptop, but it still won’t connect. She sees the hotspot name in her Wi-Fi list, but gets an “Unable to connect” error when she tries to join.

Review Questions (Apply the 7-Step Methodology)

1.

Step 1: Based on the information given, what is the scope of this problem?

2.

Step 2: Using Occam’s Razor, list two simple theories for the probable cause.

3.

Step 3: What test could Velma perform to confirm or eliminate one of your theories?

Case Study Solution: The Mystery Machine Won’t Connect  

Solution: The Mystery Machine Won’t Connect

1.

Step 1 (Scope): The problem affects only Velma’s laptop. Daphne’s tablet works fine, and the hotspot itself is functioning—this points to an issue with Velma’s device specifically.

2.

Step 2 (Theories): Simple explanations include:

3.

Step 3 (Test): Velma could “forget” the saved network and re-enter the password. If that works, the theory is confirmed. If not, try connecting to a different Wi-Fi network to test if her adapter works at all.

Key Takeaway

Determining the scope (one device vs. many) quickly narrows down where the problem lies. Start with simple tests before assuming hardware failure.

Module Summary

Module 1.0 Summary  

Networking Fundamentals

OSI Model

SOHO Networks

Troubleshooting (7 Steps)

Next Steps

Review the key terms, practice binary/hex conversions, and memorize the OSI layers and troubleshooting steps for the exam!

Conclusion

This module has provided a comprehensive introduction to networking fundamentals. You’ve learned about different network types and topologies, explored the seven-layer OSI model, examined practical SOHO networking, and studied a systematic troubleshooting methodology. These concepts form the foundation for all subsequent networking topics. In the next module, we’ll dive deeper into the Physical layer and explore cabling and infrastructure.