"This course explains concepts in a way where you genuinely don't need experience to understand. Relating the concepts to normal daily scenarios or routines is a great way to teach, and to get some much content done in 2 hours is fantastic." -Adam
"It was very informative, and I enjoyed the instructor's explanations and examples. I will recommend him to friends any day. " -Frank
"This course explains concepts in a way where you genuinely don't need experience to understand. Relating the concepts to normal daily scenarios or routines is a great way to teach, and to get some much content done in 2 hours is fantastic." -Adam
"It was very informative, and I enjoyed the instructor's explanations and examples. I will recommend him to friends any day. " -Frank
Do you need to understand the basics of Computer Networking? Have you found that many training resources use complex technical jargon that makes it difficult to understand the basic concepts? If you need to get a basic understanding of Networking quickly and clearly, this is the course for you.
This course answers the questions:
What is an Ethernet network and how do MAC addresses work?
How is a router used to forward traffic between different networks?
What is the difference between and IPSEC and Layer 2 VPN?
How does DNS work, and why is it important?
What is DHCP, and how does it distribute IP addresses?
What are subnets, network addresses, and broadcast addresses?
What is the difference between a public IP address and a private IP address?
Key Features of this course:
Many downloadable PDF study guides included.
Most lectures in this course are 5 - 10 minutes long.
Ideal starting point for CompTIA Network+ prep.
Quizzes included after each chapter.
Bonus content. If you need to get a basic understanding of IP Addressing quickly and clearly, this is the course for you.
This course addresses the following topics:
What is the purpose of IP addresses?
Private vs. Public IPs
IPv4 vs. IPv6
IP address structure in decimal and binary forms
How to create subnets and design network environments with multiple subnets
Variable Length Subnet Masking and classful addresses
This lesson describes the concepts of an Ethernet and WiFi LANs, Network Interface Cards (NIC), switches, hubs, Layer 2 MAC addresses, and Ethernet frames.
This lesson describes the differences between hubs, switches, and bridges in a Layer 2 Ethernet network. It explains the concepts of MAC tables, broadcast traffic, and Broadcast and Collision domains.
In this video, we explore the OSI model, a framework used to understand networking through its seven layers, focusing on how it simplifies the complexities of network communications. While we briefly touch on the higher layers (application, presentation, and session), the emphasis is on the more relevant lower layers (transport, network, data link, and physical) for networking professionals, using an example of uploading a video to YouTube to demonstrate the OSI model in action.
Understand the different types of BUM Traffic: Broadcast, Unknown Unicast, Multicast, and how they differ from normal unicast traffic. Differentiate between IP and MAC addresses. Learn how addresses are discovered by ARP requests.
Learn how Layer 3 routers connect Layer 2 switches and Ethernet segments (VLANs). Understand the impact of routers on MAC tables, ARP requests, and L2 broadcasts. Learn about route tables and default gateways.
Pick the best answer for each question.
Learn basic concepts of IP addressing, subnets, and NAT (Network Address Translation). Understand IP addresses in binary and dotted decimal format. Understand network addresses, broadcast addresses, subnets, and CIDR notation.
Choose the best answer for each question.
Follow an IP packet as it flows from a computer, through a switch, and through a router. Understand source and destination IPs, and how they are processed by the route table. Learn about Layer 2 and Layer 3 of the OSI model. Understand how the ARP table is used to associate MAC addresses with IP addresses.
Understand how VLANs (Virtual LANs) are used to created multiple Layer 2 logical segments in an Ethernet switch. Learn how VLANs can be used to enhance network security. Understand the difference between trunk and access ports on a switch.
Understand Wide Area Connections (WAN) and how they are used to connect networks over long distances. Work with a newtowk diagram to understand how traffic is routed over a WAN. Understand the basic concepts of static routes vs. Dynamic routing protocols like OSPF and BGP.
This video introduces foundational concepts of network troubleshooting, emphasizing a methodical approach to isolate and identify issues within various network setups. The instructor uses a hypothetical scenario involving server communication problems to demonstrate how using a network diagram and systematically eliminating potential causes can streamline the troubleshooting process, urging a slow yet deliberate strategy to quickly resolve network issues.
Understand how IPSEC VPNs (Virtual Private Networks) are used to securely connect networks using encryption over an untrusted network like the Internet. Learn how public IP addresses are used to enable an IPSEC VPN.
Learn how L2 (Layer 2) VPNs (Virtual Private Networks) are used to extend a network segment over long distances, and how they use encryption to secure traffic. Understand the impact of a L2 VPN on the IP addressing scheme. Understand how Layer 2 VPNs can be used to help with DR (Disaster Recovery) and also achieve VM (Virtual Machine) mobility.
The lesson covers the importance of network redundancy in maintaining continuous network operations despite component failures. It explains how to identify single points of failure, implement redundancy strategies such as installing redundant components and using protocols like HSRP or VRRP, and ensure automated failover through dynamic routing protocols.
This DHCP lesson introduces students to the fundamental concepts of Dynamic Host Configuration Protocol. In this lesson, learners will discover how DHCP simplifies network management by automatically assigning IP addresses and network configurations (Including DNS servers) to devices. Differentiate between static and dynamic IP addresses.
This lesson on DNS basics provides an essential understanding of the Domain Name System. Students will learn how DNS translates user-friendly domain names into IP addresses, enabling seamless internet navigation. They will also delve into the hierarchical structure of DNS and the role of authoritative name servers. We will also learn about handy DNS commands including nslookup.
This lesson introduces NetFlow and IPFIX, protocols essential for analyzing and monitoring network traffic to troubleshoot problems and identify intermittent network issues. It highlights the differences between NetFlow, a Cisco-specific protocol, and IPFIX, an industry standard, and their roles in capturing traffic data for comprehensive network visibility and security.
This lesson covers the fundamentals of the Network Time Protocol (NTP), highlighting its critical role in synchronizing time across all network devices to ensure accurate log interpretation, event management, and the validity of digital certificates. It explains the process of selecting an authoritative NTP source and configuring network devices to maintain consistent timing, emphasizing the importance of using reliable time sources like the Naval Observatory or NIST.
In a foundational lesson on Public IP addresses, private IP addresses, and Network Address Translation (NAT), students will grasp the core principles of IP addressing. They'll learn that public IP addresses are unique identifiers assigned to devices on the open internet, while private IP addresses are used within local networks to conserve public addresses and enhance security. The lesson will also explain how NAT serves as a bridge between private and public addresses, enabling multiple devices in a local network to share a single public IP for internet access, making it an integral component of modern network setups.
This lesson introduces the concept of firewall zones, with a focus on the Demilitarized Zone (DMZ) and its real-life analogy in the context of network security. The DMZ is explained as an intermediate area between trusted internal networks and untrusted external networks, emphasizing the need for strict control of traffic to and from the DMZ. The lesson highlights the importance of firewalls in controlling and securing the flow of traffic between these different zones to protect sensitive data and systems while allowing controlled accessibility from external sources.
This lesson on the basic concepts of Wi-Fi introduces students to wireless networking technology. Learners will discover how Wi-Fi enables devices to connect to the internet or local networks without physical cables. They will explore key elements such as Wi-Fi routers, access points, and SSIDs.
In this IP addressing Crash Course, we'll cover fundamental networking concepts, ensuring clarity even for those with limited networking knowledge. The course focuses on essential IP addressing elements with hands-on exercises, providing a concise and practical foundation without unnecessary details, and by the end of the two-hour journey, you'll have a robust understanding of IP addressing.
In this video, we delve into the significance of IP addresses in the context of the vast network of interconnected devices on the Internet. Drawing an analogy to physical addresses, IP addresses serve as unique identifiers, allowing efficient routing and delivery of data, contrasting them with local MAC addresses. The video also introduces the concept of DNS queries, illustrating how computers translate user-friendly domain names like Google.com into the numerical IP addresses essential for global communication on the Internet.
This lesson explores the distinctions between public and private IP addresses, drawing parallels to phone extensions within an organization. Public IP addresses are globally routable and used on the internet, similar to unique phone numbers. They must be assigned by internet service providers or cloud service providers and are often employed for routers and firewalls facing the internet. Private IP addresses, on the other hand, are used within local networks and can have the same addresses as other private IPs in different networks because they are not globally routable, akin to local phone extensions that work only within their respective office buildings. The lesson also introduces the concept of Network Address Translation (NAT), which allows devices with private IP addresses to access the internet by translating their private IPs to a single public IP.
In this lesson, the instructor uses an example IP address from their computer's configuration to break down the structure of an IP address. They discuss the format of IP addresses with four octets separated by periods (dotted decimal format) and explain the distinction between network and host addresses, with a brief mention of the default gateway as the route for traffic leaving the local network. The lesson serves as an introductory exploration of IP address components and sets the stage for more in-depth coverage of related concepts in subsequent lessons.
In this lesson, the instructor explains the difference between classful and classless addressing in the context of IP addresses. They discuss the historical development of class A, class B, and class C address ranges and how these classes had limitations in terms of address allocation. The lesson introduces the concept of variable length subnet masking (VLSM) as a more flexible approach to address allocation, enabling organizations to receive IP address ranges that better match their actual needs and avoiding the waste of address space.
In this lesson, the instructor demonstrates how to convert between binary and decimal numbers, a fundamental skill in understanding IP addresses and subnet masks. The lesson provides a step-by-step guide to converting a decimal number to binary, starting with the largest binary value and progressively subtracting to find the binary digits. It also shows how to convert an entire IP address from decimal to binary format. The process is illustrated with examples for better comprehension, emphasizing the importance of these skills when working with IP addresses and subnet masks in networking.
This lesson explains why the maximum value for an octet in an IP address is 255. It demonstrates how to calculate the maximum value by setting all binary digits to 1, resulting in 255 when summed. Understanding this concept is crucial for comprehending IP addresses and subnet masks, as it highlights the fundamental binary structure that underlies IP addressing.
In this lesson, learners are guided through the process of converting IP addresses to binary format. The instructor presents a practice exercise where students are asked to convert the IP address "192.168.1.10" to binary. A downloadable PDF file with exercises is also available for further practice.
This video simplifies the concept of subnetting, illustrating how dividing a larger network into smaller segments improves efficiency, security, and IP address management. Using a class B network example, the instructor explains how subnetting allows for departmental traffic segregation within an organization, enhancing security and reducing IP address wastage by allocating just the necessary amount of address space to each subnet.
In this lesson, learners are introduced to the concepts of subnetting with a focus on understanding subnet masks, CIDR notation, and identifying network and host portions of IP addresses. The instructor explains the principles of subnetting by providing examples, demonstrating how to determine network and broadcast addresses, and using CIDR notation to represent subnets of different sizes. The lesson also emphasizes the importance of understanding subnetting for customizing network sizes and optimizing address allocation.
In this video, the instructor explains how to calculate the number of hosts in a subnet using subnet masks. The lesson starts with a simple subnet mask (255.255.255.0) and then progresses to more complex subnet masks (e.g., 255.255.252.0, 255.255.248.0) to illustrate the concept of host bits. Learners are guided through the process of identifying host bits in binary representations and determining the number of usable host IP addresses. The lesson emphasizes the importance of understanding these calculations to master subnetting effectively.
In this video, the instructor presents additional exercises related to CIDR notation and understanding subnet masks. Learners are tasked with converting subnet masks to CIDR notation and determining the range of IP addresses in a given subnet. The video covers how to calculate network addresses, broadcast addresses, and the number of usable addresses in a subnet, emphasizing the importance of understanding these concepts and using a subnet calculator to validate the answers. The exercises provide practical examples for learners to practice and reinforce their subnetting skills.
In this video, the instructor demonstrates how to take a large network and divide it into multiple smaller subnets. The example starts with a /16 network and the goal is to create four subnets, two supporting 1000 devices each and two supporting 400 devices each while keeping the subnets as small as possible. The instructor explains how to calculate the required CIDR notation for each subnet and provides a step-by-step breakdown of the process, highlighting the importance of designing efficient subnets. The video also emphasizes the value of practice to gain proficiency in subnetting.
In this video, the focus is on understanding the special addresses within an IP network, particularly in the context of a subnet with the example of 10.1.1.0/24. The instructor explains the roles of the network address (10.1.1.0), the first usable address (10.1.1.1), and the broadcast address (10.1.1.255) within the subnet. These addresses have specific purposes and are reserved, while the range from 10.1.1.2 to 10.1.1.254 is available for assigning to devices in the network.
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.