Basic Concepts of Networks
Basic Concepts of Networks
The Networking Basics course teaches networking fundamentals and covers the basic concepts and skills
needed to set up and manage your small office or home office (SOHO) network. The student is presented
with an engaging and exploratory view of networks, the devices that comprise them, how they work, and
basic troubleshooting tools and techniques. The objective of this course is to provide the student with an
attractive and exploratory view of networks, including the Internet. Upon completion of the Networking
Basics course, students will be able to perform the following tasks:
Configure an integrated wireless router and wireless clients to securely connect to the Internet.
There are a number of tools and resources available to you that will help you on your journey as you
develop your networking skills and prepare for job opportunities.
Packet
TracerPacket Tracer simulates the inner workings of a network and is used in this course.
If you are new to Packet Tracer, take this FREE short online course: Getting Started with Cisco Packet Tracer.
You may use your smartphone, tablet, or PC to access the course; however, for Packet Tracer activities, as
well as other assignments, quizzes, and exams, you will have a better experience using a computer.
Laboratory
environmentNo equipment needed
Additional FAQs can be found by visiting our virtual assistant, Morgan. Click the chat icon in the top right
corner to choose from a list of topics or enter your question. Morgan's help includes information about
Packet Tracer, certificates, and badges.
To obtain and install your copy of Cisco Packet Tracer, follow the instructions at the following link:
https://skillsforall.com/resources/lab-downloads.
Introduction
1.1.2 Everything is online
“Hey Shad, are you online?” “Of course you are!” How many of us still wonder if we are “online”? We rely on
our devices, cell phones, tablets, laptops and desktop computers to always be connected to the global
Internet network. We use this network to interact with our friends, make purchases, share images and
experiences and learn new things. The Internet has become such an important part of our daily lives that we
almost take it for granted.
Typically, when people use the term Internet, they are not referring to physical connections in the real world.
Instead, they tend to think of it as a set of shapeless connections. It is the “place” where people go to find or
share information
1.1.3 Who Owns the Internet?
The Internet does not belong to one person or one group. The Internet is a worldwide collection of
interconnected networks (Internetwork, or Internet for short) that collaborate to exchange information
based on common standards. Through telephone wires, fiber optic cables, wireless transmissions, and
satellite links, Internet users can exchange information in a variety of ways, as shown in the figure.
Everything you access online is located somewhere on the global Internet. Social media sites, multiplayer
games, messaging centers that provide email — all Internet destinations connect to local networks that send
and receive information over the Internet.
Think about all the interactions you have during the day that require being online.
There are local networks of all sizes. They can range from simple networks consisting of two computers to
networks connecting hundreds of thousands of devices. Networks installed in small offices, homes and home
offices are known as SOHO (Small Office/Home Office) networks. SOHO networks allow you to share
resources, such as printers, documents, pictures, and music, among a few local users.
In business, large networks can be used to advertise and sell products, order supplies, and communicate
with customers. Communicating over a network is usually more efficient and cost-effective than traditional
forms of communication, such as standard mail or long-distance telephone calls. Networks enable rapid
communication, such as through email and instant messaging, and provide consolidation and access to
information stored on network servers.
Enterprise and SOHO networks often provide a shared connection to the Internet. The Internet is considered
the "network of networks" because it is literally made up of thousands of local networks connected to each
other.
1.1.5 Mobile Devices
The Internet connects more computing devices than just desktop and laptop computers. There are devices
around you that you interact with on a daily basis that are also connected to the Internet. These include
mobile devices, home devices, and a variety of other connected devices.
1.1.6 Connected Home Devices
Many of the objects in your home can also be connected to the Internet so that they can be controlled and
configured remotely.
1.1.7 Other Connected Devices
There are also many connected devices in the world outside your home that provide convenience and useful,
even vital, information.
1.1.8 Check Your Understanding - Network Types
Check your understanding of network types by choosing the correct answer to the following questions.
1.2.2 The bit
Did you know that computers and networks work only with binary digits, that is, zeros and ones? It can be
difficult to imagine that all of our data is stored and transmitted as a series of bits. Each bit can only have one
of two possible values: 0 or 1. The term bit is short for “binary digit” and represents the smallest unit of data.
Humans interpret words and images; computers only interpret bit patterns.
Bits are stored and transmitted as one of two possible discrete states. This may include two directions of
magnetization, two distinct levels of voltage or current, two distinct levels of light intensity, or any other
physical system of two discrete states. For example: a light switch can be on or off; in binary representation,
these states would correspond to 1 and 0 respectively.
Each input device (mouse, keyboard, voice-activated receiver) translates human interaction into binary code
for the CPU to process and store. Each output device (printer, speakers, monitors, etc.) takes the binary data
and translates it back into the human form that we can recognize. Within the computer itself, all data is
processed and stored as binary.
Computers use binary codes to represent and interpret letters, numbers, and special characters using bits. A
widely used code is the American Standard Code for Information Interchange (ASCII). In ASCII, each character
is represented by eight bits. For example:
Uppercase: A = 01000001
Number: 9 = 00111001
Special character: # = 00100011
Each group of eight bits, such as representations of letters and numbers, is known as a byte.
Codes can be used to represent almost any type of information in digital format: computer data, graphics,
photos, voice, video, and music.
In the figure, enter up to five characters in the Characters field, then click the Translate button and you will
see the translation to ASCII bits. Click the Reset button to enter another set of characters.
Check your understanding of data transmission by choosing the correct answer to the following questions.
1.3.1 Bandwidth
Streaming a movie or playing a multiplayer game requires fast and reliable connections. To support these
“high-bandwidth” applications, networks must be able to transmit and receive bits at high speeds.
Different physical media support bit transfer at different rates. Data transfer speed is usually analyzed in
terms of bandwidth and throughput.
Bandwidth is the capacity of a medium to carry data. Digital bandwidth measures the amount of data that
can flow from one location to another in a given period of time. Bandwidth is usually measured by the
number of bits that (theoretically) can be sent over the media in one second. Common bandwidth
measurements are as follows:
The table shows the commonly used units of measurement for bandwidth.
1.3.2 Performance
Like bandwidth, throughput is the measure of bit transfer over the media over a given period. However, due
to various factors, performance usually does not match the specified bandwidth. Many factors influence
performance, including the following:
The amount of data being sent and received over the connection
The types of data being transmitted
The latency created by the number of network devices found between source and destination
The concept of latency refers to the amount of time, including delays, it takes for data to transfer from one
point to another.
Performance measurements do not consider the validity or usefulness of the bits being transmitted and
received. Many messages received over the network are not intended for specific user applications. An
example would be network control messages that regulate traffic and correct errors.
In an internetwork or network with multiple segments, throughput cannot be faster than the slowest link in
the path from the source to the destination device. Even if all or a large portion of segments have high
bandwidth, it only takes one segment in the path with lower bandwidth to decrease the performance of the
entire network.
There are many online speed tests that can reveal the performance of an Internet connection.
1.3.4 Check Your Understanding - Bandwidth and Throughput
Check your understanding of bandwidth and throughput by choosing the correct answer to the following
questions.
1.4.1 What did I learn in this module?
Types of network
The Internet does not belong to one person or one group. The Internet is a worldwide collection of
interconnected networks (Internetwork, or Internet for short) that collaborate to exchange information
based on common standards. Through telephone wires, fiber optic cables, wireless transmissions, and
satellite links, Internet users can exchange information in a variety of ways.
Small home networks connect a few computers to each other and to the Internet. SOHO networking allows
computers in a home or remote office to connect to a corporate network or access centralized shared
resources. Medium to large networks, such as those used in corporations and schools, may have many
locations with hundreds or thousands of interconnected hosts. The Internet is a network of networks that
connects hundreds of millions of computers around the world.
There are devices around you that you interact with on a daily basis that are also connected to the Internet.
These include mobile devices such as smartphones, tablets, smartwatches and smart glasses. Things in your
home can be connected to the Internet, like a security system, appliances, your smart TV, and your gaming
console. Outside your home there are smart cars, RFID tags, sensors and actuators, and even medical devices
that can be connected.
Data transmission
The following categories are used to classify the types of personal data:
Voluntary data – This is created and shared explicitly by individuals, such as social media profiles.
This type of data could include video files, images, text or audio files.
Observed data – is captured by recording people’s actions, such as location data when they use cell
phones.
Inferred data – This is data, such as a credit score, that is based on analysis of voluntary or observed
data.
The term bit is short for “binary digit” and represents the smallest unit of data. Each bit can only have one of
two possible values: 0 or 1.
Bandwidth is the capacity of a medium to carry data. Digital bandwidth measures the amount of data that
can flow from one location to another in a given period of time. Bandwidth is usually measured by the
number of bits that (theoretically) can be sent over the media in one second. Common bandwidth
measurements are as follows:
Performance often does not match specified bandwidth. Many factors influence performance, including the
following:
The amount of data being sent and received over the connection
The latency created by the number of network devices found between source and destination
The concept of latency refers to the amount of time, including delays, it takes for data to transfer from one
point to another.
All PCs connected to a network that directly participate in network communications are classified as hosts.
Hosts can send and receive messages over the network. In modern networks, host PCs can act as clients,
servers, or both, as shown in the figure. The software installed on the computer determines what function
the computer performs.
Servers are hosts with software installed that allows them to provide information, such as email or web
pages, to other hosts on the network. Each service requires separate server software. For example, to
provide Web services to the network, a host needs Web server software. Every destination you visit online is
served to you by a server located somewhere on a network that is connected to the global Internet.
Clients are host computers that have software installed that allows them to request information from the
server and display the information obtained. An example of client software is web browsers such as Internet
Explorer, Safari, Mozilla Firefox or Chrome.
2.1.3 Peer-to-peer networks
Server and client software typically run on separate computers, but it is also possible for a single computer to
run both at the same time. In small businesses and homes, many PCs function as servers and clients on the
network. This type of network is called a peer-to-peer (P2P) network.
The simplest P2P network consists of two computers connected directly via a wired or wireless connection.
Both computers can use this simple network to exchange data and services with each other, acting as a client
or server as needed.
Multiple PCs can also be connected to create a larger P2P network, but this requires a network device, such
as a switch, to interconnect the computers.
The main disadvantage of a P2P environment is that a host's performance can suffer if it acts as both a client
and a server. Some of the advantages and disadvantages of peer-to-peer networks are listed in the figure.
In larger companies, where network traffic can be intense, it is often necessary to have dedicated servers to
be able to respond to the large number of service requests.
The advantages and disadvantages of peer-to-peer (P2P) networks are shown in the figure.
Easy to set up
Less complex
Lower cost because dedicated network devices and servers may not be needed.
They can be used for simple tasks such as transferring files and sharing printers.
Some P2P applications use a hybrid system where the sharing of resources is decentralized, but the indexes
pointing to the locations of the resources are stored in a centralized directory. In a hybrid system, each point
accesses an index server to obtain the location of a resource stored at another point.
A computer running server software can provide services simultaneously to one or many clients, as shown in
the figure.
In addition, a single PC can run multiple types of server software. In a home or small business, it may be
necessary for one PC to function as a file server, web server, and email server.
A single PC can also run multiple types of client software. There must be client software for each required
service. If a host has multiple clients installed, it can connect to multiple servers simultaneously. For
example, a user can check email and view a web page while sending instant messages and listening to
Internet radio.
2.1.6 Check Your Understanding - Clients and Servers
Check your understanding of clients and servers by choosing the correct answer to the following questions.
2.2.2 Network infrastructure
The path a message takes from source to destination can be as simple as a single cable connecting one
computer to another or as complex as a network that literally spans the entire planet. This network
infrastructure is the platform that supports the network. It provides the stable and reliable channel through
which communications occur.
The network infrastructure contains three categories of hardware components, as shown in the figure:
End devices
Intermediate devices
Network media
Devices and media are the physical elements or hardware of the network. Hardware typically consists of the
visible components of the network platform, such as a laptop, PC, switch, router, wireless access point, or
the cabling used to connect these devices. Sometimes some components may not be visible. In the case of
wireless media, messages are transmitted through the air using invisible radio frequencies or infrared waves.
Make a list of the network infrastructure components installed on your home network. Include any cables or
wireless access points that provide your network connections.
The network devices that people are most familiar with are called “end devices” or “hosts.” These devices
form the interface between users and the underlying communication network.
An end device (or host) is the source or destination of a message transmitted over the network, as shown in
the animation. To uniquely identify hosts, addresses are used. When a host initiates communication, it uses
the destination host's address to specify where the message should be sent.
Click the Play button in the figure to see an animation of data flowing through a network.
2.3.1 ISP Services
An Internet Service Provider (ISP) is the link between your home network and the Internet. An ISP can be
your local cable provider, a landline telephone service provider, the cellular network that delivers your
smartphone service, or an independent provider that leases bandwidth on another company's physical
network infrastructure.
Many ISPs also offer additional services to their subscribers, as shown in the illustration. These services may
include email accounts, network storage and website hosting, as well as automated backup or security
services.
ISPs are critical to communications across the global Internet. Each ISP connects to other ISPs to form a
network of links that interconnect users around the world. ISPs are connected in a hierarchical manner that
ensures that Internet traffic generally takes the shortest path from source to destination.
The Internet backbone is like an information superhighway that provides high-speed data links to connect
the various service provider networks in major metropolitan areas around the world. The primary medium
connecting the Internet backbone is fiber optic cable. Typically, this cable is installed underground to connect
cities within a continent. Fiber optic cables are also laid under the sea to connect continents, countries and
cities.
The top part of the figure shows the option of connecting to a simpler ISP. It is a modem that provides a
direct connection between a computer and the ISP. However, this option should not be used because your
computer is not protected on the Internet.
As shown at the bottom of the figure, you need a router to securely connect a computer to an ISP. This is the
most common connection option. It consists of using a wireless integrated router to connect to the ISP. The
router includes a switch for connecting wired hosts and a wireless AP for connecting wireless hosts. The
router also provides client IP addressing and security information for internal hosts.
Most home network users do not connect to their service providers with fiber optic cables. Common
connection options for small offices and residential users are illustrated in the figure. The two most common
methods are as follows:
Cable - Typically a service offered by cable television service providers. The Internet data signal is
transmitted over the same coaxial cable that carries the cable television signal. This option provides
an always-on, high-bandwidth Internet connection. A special cable modem is used to separate the
Internet data signal from the other signals carried by the cable and provide an Ethernet connection
to a host computer or LAN.
DSL - Digital Subscriber Line provides an always-on, high-bandwidth Internet connection. It requires
a special high-speed modem that separates the DSL signal from the telephone signal and provides
an Ethernet connection to a host computer or LAN. The DSL signal is transmitted over a telephone
line, which is divided into three channels. One of the channels is used for voice phone calls. This
channel allows a person to receive phone calls without disconnecting from the Internet. The second
is a faster download channel and is used to receive information from the Internet. The third channel
is used to send or upload information. This channel is usually a bit slower than the download
channel. The quality and speed of your DSL connection depends primarily on the quality of your
telephone line and the distance from your telephone company's central office. The further you are
from the central office, the slower the connection will be.
Other options for connecting to an ISP for home users include the following:
Cellular Network
Cellular Internet access uses a cellular telephone network to connect. Anywhere you have mobile coverage,
you can access the Internet. Performance will be limited by the capabilities of your phone and the cell tower
you connect to. The availability of Internet access via cellular networks is a great advantage for people who
live in areas without access to other types of Internet connectivity, or for people who are always on the go.
The disadvantage of cellular connectivity is that the company providing the service usually measures the
bandwidth usage of the connection and may charge additional fees for bandwidth that exceeds the
contracted data plan.
Satellite
Satellite service is a good option for homes or offices that do not have access to DSL or cable. Satellite dishes
(see figure) require a clear line of sight to the satellite, so they may not be suitable for heavily wooded areas
or locations with other types of overhead obstructions. Speeds vary depending on the contract, but are
generally good. Equipment and installation costs can be high (check with the provider for special offers) and
then there is a small monthly fee. As with cellular access, the availability of satellite Internet access is a great
advantage for areas that do not have access to other types of Internet connectivity.
Dial phone
An economical option that uses any telephone line and a modem. To connect to the ISP, the user calls the
ISP's access telephone number. The low bandwidth provided by a dial-up modem connection is usually not
sufficient for large data transfers, although it is useful for mobile access while traveling. The dial-up modem
connection option should only be considered when there are no faster connection options available.
In metropolitan areas, many apartments and small offices are directly connected by fiber optic cables. This
allows Internet service providers to deliver higher bandwidth speeds and support more services, such as
Internet, telephone and TV.
Satellite Connection
Check your understanding of ISP connectivity options by choosing the correct answer to the following
questions.
2.4.1 What did I learn in this module?
All PCs connected to a network that directly participate in network communications are classified as hosts.
Hosts can send and receive messages over the network. In modern networks, host computers can act as
clients, servers, or both. The software installed on the computer determines what function the computer
performs.
Server and client software typically run on separate computers, but it is also possible for a single computer to
run both at the same time. In small businesses and homes, many PCs function as servers and clients on the
network. This type of network is called a P2P (peer-to-peer) network. In larger companies, where network
traffic can be intense, it is often necessary to have dedicated servers to be able to respond to the large
number of service requests. P2P networks are easy to set up, less complex, lower cost, and can be used for
simple tasks like transferring files and sharing printers. However, there is no centralized administration. They
have less security, are not scalable, and can run slower.
Network components
There are symbols that represent various types of network equipment. Network infrastructure is the
platform that supports the network. It provides the stable and reliable channel through which
communications occur. The network infrastructure contains three categories of hardware components: end
devices, intermediate devices, and network media. Hardware typically consists of the visible components of
the network platform, such as a laptop, PC, switch, router, wireless access point, or the cabling used to
connect these devices. Components that are not visible include wireless media.
End devices, or hosts, form the interface between users and the underlying communications network. Some
examples of end devices include:
An Internet Service Provider (ISP) is the link between your home network and the Internet. An ISP can be
your local cable provider, a landline telephone service provider, the cellular network that delivers your
smartphone service, or an independent provider that leases bandwidth on another company's physical
network infrastructure. Each ISP connects to other ISPs to form a network of links that interconnect users
around the world. ISPs are connected in a hierarchical manner that ensures that Internet traffic generally
takes the shortest path from source to destination.
The ISP interconnection that makes up the Internet backbone is a complex network of fiber optic cables with
expensive network switches and routers that direct the flow of information between source and destination
hosts.
For a home user, connecting to the ISP is a fairly simple process. This is the most common connection option.
It consists of using a wireless integrated router to connect to the ISP. The router includes a switch for
connecting wired hosts and a wireless AP for connecting wireless hosts. The router also provides client IP
addressing and security information for internal hosts. The two most common methods are cable and DSL.
Other options include cellular, satellite, and telephone telephony.
2.4.3 Network Components, Types and Connections Questionnaire
3.0.1 Webster - Why Should I Take This Module?
Kishari has just finished her 10-hour shift at the hospital. As he walks to his car, his cell phone rings. It's his
son, Shridhar, who calls to remind him to pick up the dinner he ordered. As they check their plans, Kishari
gets into the car and starts the engine. Your conversation is then transferred from your mobile phone to your
car speakers. She confirms that she will pick up the food and that she will see him in an hour. Before leaving,
you look up the restaurant online and click on the directions link. She listens to the instructions coming
through her speakers. “Your destiny is on the left.” She buys the food and goes home. As Kishari and Shridhar
enjoy dinner, Kishari tells Shridhar how he is starting to think about all this technology at home and at work.
You know how to use it, but you don't understand how it works. She gives him the example of the mobile
phone. Today she answered calls, sent text messages, did an internet search and used it to get there by car.
How does he do all this? How does the phone connect to all these things? Shridhar is familiar with the
different types of networks used by mobile devices. Shridhar explains 4G/5G mobile network, GPS,
Bluetooth, NFC and Wi-Fi.
If you don't have a friend or family member like Shridhar to explain this to you, don't worry! In this module,
you will learn about the different ways mobile devices communicate. Would you like to receive more
information?
3.0.2 What will I learn in this module?
In addition to GSM and 4G/5G transmitters and receivers, smartphones connect in a variety of ways.
3.1.4 Check Your Understanding - Wireless Networks
Check your understanding of wireless networks by choosing the correct answer to the following questions.
3.2.1 Mobile Devices and Wi-Fi
Mobile devices give us the freedom to work, study, play and communicate from wherever we want. People
using mobile devices do not have to be tied to a physical location to send and receive voice, video and data
communications. In addition, wireless facilities such as Internet cafes are available in many countries. College
campuses use wireless networks to allow students to enroll in, attend, and submit classes in areas where
there are no physical network connections. As mobile devices become more capable, many tasks that once
had to be performed on large PCs connected to physical networks can now be performed on mobile devices
connected to wireless networks.
Almost all mobile devices can connect to WiFi networks. It is recommended to connect to Wi-Fi networks
whenever possible, as this will not consume data from your mobile data plan. Additionally, because Wi-Fi
radios use less power than cellular data radios, connecting to Wi-Fi networks saves battery power. As with
other Wi-Fi enabled devices, it is important to be secure when connecting to these types of networks. Below
are precautions to take to protect Wi-Fi communications on mobile devices:
Never send login information or passwords via clear text (plain text).
Use a VPN connection whenever possible if you are sending sensitive data.
Enable security on home networks.
Use WPA2 or higher encryption for added security.
3.2.2 Wi-Fi Settings
Two of the most popular operating systems for mobile devices are Android and Apple iOS. Every operating
system has settings that allow you to configure it to connect to wireless networks.
To connect an Android or iOS device when it is within range of a Wi-Fi network, turn on Wi-Fi, then the
device will search for all available Wi-Fi networks and display them in a list. Tap a Wi-Fi network from the list
to connect. Enter the password, if required.
When a mobile device is out of range of a WiFi network, it attempts to connect to another WiFi network
within range. If no Wi-Fi networks are detected within range, the mobile device connects to the mobile data
network. When WiFi is on, the device automatically connects to any WiFi network you've already connected
to. If it is a new network, the mobile device displays a list of available networks that can be used or asks
whether to connect to it.
If your mobile device does not prompt to connect to a Wi-Fi network, the network's SSID broadcast may be
disabled, or the device may not be set to connect automatically. Manually configure the mobile device's WiFi
connection settings. Please note that SSIDs and passphrases must be entered exactly the same as in the
wireless router settings, otherwise the device will not connect properly, as shown in the figure. SSID is the
name assigned to a wireless network. The passphrase is what we normally use as a “wireless password.”
Mobile operating systems are frequently updated and can be customized by the device manufacturer. The
commands listed above may not be exactly the same on your device. There are online manuals for each type
of device, usually on the manufacturer's website.
To connect to a Wi-Fi network manually on an iOS device, follow these steps:
Most cellular carriers offer mobile data plans, but bandwidth limitations and usage charges vary widely by
carrier and plan within carriers. As a result, many mobile users rely only on their cellular data plans when Wi-
Fi service is not available.
Mobile devices are preprogrammed to use a Wi-Fi network for Internet if one is available and the device can
connect to the access point and receive an IP address. If no Wi-Fi network is available, the device uses
cellular data functionality, if configured. Most of the time, transitions from one network to another are not
perceived by the user. For example: when a mobile device moves from a 4G coverage area to a 3G coverage
area, the 4G radio is deactivated and 3G is activated. During this transition, connections are not lost.
Mobile devices connect using many different methods. WiFi and cellular networks can be difficult to set up
and require additional equipment, such as towers and access points. Cable connections are not always
practical when connecting headphones or speakers. Bluetooth technology provides a simple way for mobile
devices to connect to each other and to wireless accessories. Bluetooth is a wireless technology that is
automatic and uses very little power, which helps preserve battery life. Up to eight Bluetooth devices can be
connected to each other at the same time.
Hands-Free Headset - A small headset with microphone can be used to make and receive calls.
Keyboard or mouse - A keyboard or mouse can be connected to a mobile device to make it easier to
operate.
Stereo Control - A mobile device can be connected to a home or vehicle stereo to play music.
Car speakerphone - A device consisting of a speaker and microphone and used to make and receive
calls.
Tethering - A mobile device can connect to another mobile device or computer to share a network
connection. Tethering can also be done using a WiFi connection or a wired connection such as a USB
cable.
Mobile Speaker - Portable speakers can be connected to mobile devices to provide high quality
audio without the need for a stereo system.
Bluetooth pairing occurs when two Bluetooth devices establish a connection to share resources. For devices
to pair, the Bluetooth connection is activated, and one of the devices starts searching for other devices.
Other devices must be in discoverable mode to be detected. When a Bluetooth device is in visible mode, it
transmits the following information when another Bluetooth device requests it:
Name
Bluetooth class
Technical information, for example, the Bluetooth features or specification that it supports
During the pairing process, a personal identification number (PIN) may be requested to authenticate the
pairing process. The PIN is often a number, but it can also be a numeric code or a password. The PIN is saved
by pairing services, so you do not need to enter it again the next time the device tries to connect. This is
convenient when using a headset with a smartphone, as they automatically pair when the headset is turned
on and within range.
Step 1. Follow the instructions for your device to turn on discoverable mode.
Step 2. Please refer to the instructions for your device to find the connection PIN.
Step 1. Follow the instructions for your device to turn on discoverable mode.
Step 2. Please refer to the instructions for your device to find the connection PIN.
Please note that mobile operating systems are updated frequently. Always refer to the manufacturer's
documentation for your specific device model for the most recent command reference.
Now that you've reviewed the steps to set up and verify Wi-Fi, cellular, and Bluetooth access, explore these
settings on your own phone. If you have access to a Bluetooth device, such as headphones or a speaker,
connect it to your phone. Please note that you can use these three wireless services simultaneously, each
with a different role. You could be listening to music (Bluetooth), searching the Internet (Wi-Fi), and receiving
text messages (cellular).
Wireless Networks
Mobile phones use radio waves to transmit voice signals to antennas mounted on towers located in specific
geographic areas. When a phone call is made, the voice signal is transmitted from one tower to another until
it reaches its destination. This type of network is used when you make a phone call to another mobile phone
or to a landline phone. It is also used to send text messages directly from the phone. The most common type
of cellular telephone network is called GSM network. The abbreviations 3G, 4G, 4G-LTE, and 5G are used to
describe enhanced cellular networks that are optimized for fast data transmission. Currently, 4G still
dominates as the current mobile network used by most phones.
In addition to GSM and 4G/5G transmitters and receivers, smartphones connect in a variety of ways.
Wi-Fi transmitters and receivers located inside the smartphone allow the phone to connect to local networks
and the Internet. Wi-Fi networks are usually private but often offer hotspots for public access or temporary
users. A coverage area is an area where Wi-Fi signals are available.
Bluetooth is a wireless technology that allows devices to communicate over short distances. Multiple devices
can be connected at the same time with Bluetooth.
Near Field Communication (NFC) is a wireless communication technology that allows data to be exchanged
between devices that are very close to each other, usually less than a few centimeters.
Almost all mobile devices can connect to WiFi networks. Below are precautions to take to protect Wi-Fi
communications on mobile devices:
Never send login information or passwords via clear text (plain text).
Use a VPN connection whenever possible if you are sending sensitive data.
Enable security on home networks.
Use WPA2 or higher encryption for added security.
Two of the most popular operating systems for mobile devices are Android and Apple iOS. Mobile devices
are preprogrammed to use a Wi-Fi network for Internet, if one is available, and the device can connect to the
access point and receive an IP address. If no Wi-Fi network is available, the device uses cellular data
functionality, if configured.
Bluetooth technology provides a simple way for mobile devices to connect to each other and to wireless
accessories. Bluetooth is a wireless technology that is automatic and uses very little power, which helps
preserve battery life. Some examples of devices that use Bluetooth include hands-free headsets, keyboards,
mice, stereo controls, car speakers, and mobile speakers.
Bluetooth pairing occurs when two Bluetooth devices establish a connection to share resources. For devices
to pair, the Bluetooth connection is activated, and one of the devices starts searching for other devices.
Other devices must be in discoverable mode to be detected.
When a Bluetooth device is in visible mode, it transmits the following information when another Bluetooth
device requests it:
Name
Bluetooth class
Services that the device can use
Technical information, for example, the Bluetooth features or specification that it supports
During the pairing process, a PIN may be requested to authenticate the pairing process.
Kishori and Shridhar are washing the dishes after dinner. Kishori is watching a favorite movie on her tablet
while putting away the dishes. He asks Shridhar if his tablet works exactly the same as his mobile phone. He
explains that there are some tablets that use a cellular network, but his tablet works on his home Wi-Fi
network. She tells him that she knows it must come from that box in the corner of the living room. That's all
he knows!
Shridhar explains that the box in the corner is a home router. The router is connected to the Internet. Home
routers typically have two main types of ports: Ethernet ports and Internet ports. In addition to wired ports,
many home routers include a radio antenna and a built-in wireless access point. Kishori primarily uses
wireless technology at home. Now Shridhar is worried about his mother's wireless security. Since you didn't
know what the router was, you probably didn't change your default password on the router. Shridhar logs
into the router and makes some changes to keep Kishori's network and devices more secure.
Have you ever configured a router? Have you thought about having secure communications through wireless
devices? This module will give you the knowledge to build a home network and configure wireless devices
for secure communication.
4.0.2 What will I learn in this module?
Module Objective: Configure an integrated wireless router and wireless client to securely connect to the
Internet.
4.1.1 Video - Typical Home Network Setup
In addition to a built-in router, many different types of devices could be connected to a home network, as
shown in the figure. Here are some examples:
Desktop computers
Gaming Systems
Smart TV Systems
Printers
Scanners
Security cameras
Phones
Climate control devices
As new technologies come to market, more and more home functions will rely on a network to provide
connectivity and control.
Home and small business routers typically have two main types of ports:
In addition to wired ports, many home routers include a radio antenna and a built-in wireless access point.
By default, wireless devices are on the same local network as those physically connected to the LAN switch
ports. The Internet port is the only port that is on a different network in the default configuration.
Test your understanding of home networking basics by choosing the correct answer to the following
questions.
4.2.1 Wireless LAN Frequencies
The most commonly used wireless technologies in home networks are in the 2.4 GHz and 5 GHz frequency
ranges.
Bluetooth is a technology that uses the 2.4 GHz band. It is limited to low-speed, short-range
communications, but has the advantage of communicating with many devices at the same time. These one-
to-many device communications have made Bluetooth technology the preferred method for connecting
computer peripherals such as mice, keyboards, and printers. Bluetooth is a good method for streaming audio
to speakers or headphones.
Other technologies that use the 2.4 GHz and 5 GHz bands are modern wireless LAN technologies that comply
with the various IEEE 802.11 standards. Unlike Bluetooth technology, 802.11 devices transmit at a much
higher power level, giving them greater range and improved performance. Certain areas of the
electromagnetic spectrum may be used without a permit.
The figure shows where wireless technologies sit on the electromagnetic spectrum.
Although many home networking devices support wireless communications, there are still some applications
that benefit from a wired switch connection that is not shared with other network users.
The most commonly implemented wired protocol is the Ethernet protocol. Ethernet uses a set of protocols
that allow network devices to communicate over a wired LAN connection. An Ethernet LAN can connect
devices using many different types of wiring media.
Directly connected devices use an Ethernet patch cable, usually unshielded twisted pair. These cables can be
purchased with the RJ-45 connectors already installed, and come in various lengths. In more modern homes,
there may already be wired Ethernet jacks in the walls. In the case of homes that do not have UTP cabling,
other technologies, such as power lines, can be used to distribute wired connectivity throughout the
different spaces.
Test your understanding of home networking technologies by choosing the correct answer to the following
questions.
4.3.1 Wi-Fi Networks
A number of standards have been developed to ensure that wireless devices can communicate. They specify
the RF spectrum used, data transmission rates, how information is transmitted, and more. The primary
organization responsible for creating wireless technical standards is the Institute of Electrical and Electronics
Engineers (IEEE).
The IEEE 802.11 standard governs the WLAN environment. Certain modifications to the IEEE 802.11 standard
describe the characteristics of the different standards for wireless communications. Wireless standards for
LAN networks use the 2.4 GHz and 5 GHz frequency bands. Together, these technologies are known as Wi-Fi.
Another organization, known as the WiFi Alliance, is responsible for testing wireless LAN devices from
various manufacturers. The WiFi logo on a device means that the device is standards compliant and should
interoperate with other devices of the same standard.
Wireless standards are constantly improving the connectivity and speed of WiFi networks. It is important to
be aware of new standards as they are introduced because wireless device manufacturers will quickly
implement these standards into their new products.
Do you have a wireless network at home? Do you know what standards your wireless router supports?
The Packet Tracer Basic Wireless Configuration interface is shown in the figure. Wireless routers that use the
802.11 standards have many settings that need to be configured. The settings are as follows:
Network Mode
The 802.11 protocol can provide superior performance depending on the wireless network environment. If
all wireless devices connect using the same 802.11 standard, the highest speeds for that standard can be
achieved. If the access point is configured to accept only one 802.11 standard, devices that do not use that
standard cannot connect to the access point.
A mixed-mode wireless network environment can include devices that use any of the existing WiFi standards.
This environment provides easy access to older devices that need a wireless connection but do not support
the latest standards.
When setting up a wireless network it is important that the wireless components connect to the appropriate
WLAN. This is achieved by using an SSID.
The SSID is an alphanumeric string, case-sensitive and consists of up to 32 characters. It is sent in the header
of all frames transmitted over the WLAN. The SSID is used to inform wireless devices and so-called wireless
stations (STAs) which WLAN network they belong to and what other devices they can communicate with.
We use the SSID to identify a specific wireless network. It is essentially the name of the network. Wireless
routers usually broadcast their configured SSIDs by default. SSID broadcasting allows other wireless devices
and clients to automatically detect the name of the wireless network. If SSID broadcast is disabled, you must
manually enter the SSID into your wireless devices.
Disabling SSID broadcast can make it more difficult for legitimate clients to find your wireless network.
However, simply turning off SSID broadcast is not enough to prevent unauthorized clients from connecting to
your wireless network. All wireless networks should use the strongest encryption available to restrict
unauthorized access.
Check your understanding of wireless standards by choosing the correct answer to the following questions.
4.4.1 Initial Configuration
Many wireless routers designed for home use have an auto-configuration utility that can be used to
configure basic router settings. These utilities typically require a PC or laptop connected to a wired port on
the router. If no device with a wired connection is available, it may be necessary to first configure the
wireless client software on the laptop or tablet.
To connect to the router using a wired connection, connect an Ethernet patch cable to the network port on
your computer. Connect the other end to a LAN port on the router. Do not connect the cable to the port or
interface labeled “Internet.” The Internet port will connect to your DSL modem or cable modem. Some home
routers may have a built-in modem for Internet connections. If this is the case, check that the connection
type is correct for your Internet service. A cable modem connection will have a coaxial terminal to accept a
BNC type connector. A DSL connection will have a port for a telephone-type cable, usually an RJ-11
connector.
After you confirm that the computer is connected to the network router and the NIC link lights are lit to
indicate that the connection is working, the computer needs an IP address. Most network routers are
configured so that the computer receives an IP address automatically from a local DHCP server. If your
computer does not have an IP address, consult your router documentation and configure your PC or tablet
with a unique IP address, subnet mask, default gateway, and DNS information.
Before you enter the configuration utility, or manually configure your router through a web browser, you
should consider how your network will be used. You don't want to configure your router so that those
settings limit your network's capabilities, but you also don't want to leave your network unprotected.
4.4.3 Video - Wireless Router and Client Configuration
In this Packet Tracer activity, you will complete the following objectives.
Most home networks consist of at least two separate networks. The public network from the service
provider. The router is connected to the Internet. Your home router is most likely equipped with both wired
and wireless capabilities. A home network is a small LAN with devices that typically connect to a built-in
router and to each other to exchange information.
Installing wireless technology is simple and inexpensive. The advantages of wireless LAN technology include
mobility, scalability, flexibility, cost savings, reduced installation time, and reliability in harsh environments.
In addition to a built-in router, there are many different types of devices that can be connected to a home
network; for example, desktop computers, gaming systems, smart TV systems, printers, scanners, security
cameras, and temperature control devices.
Home and small business routers typically have two main types of ports: Ethernet ports and Internet ports.
In addition to wired ports, many home routers include a radio antenna and a built-in wireless access point.
Wireless technologies use electromagnetic waves to transport information between devices. The
electromagnetic spectrum includes radio and television transmission bands, visible light, X-rays, and gamma
rays. Some types of electromagnetic waves are not suitable for carrying data. Other parts of the spectrum
are regulated by governments and licensed for specific applications to various organizations.
Unauthorized sections of the spectrum are incorporated into consumer products, including the Wi-Fi routers
found in most homes. - The most commonly used wireless technologies in home networks are in the 2.4 GHz
and 5 GHz frequency ranges. Bluetooth is a technology that uses the 2.4 GHz band. Other technologies that
use the 2.4 GHz and 5 GHz bands are modern wireless LAN technologies that comply with the various IEEE
802.11 standards. Unlike Bluetooth technology, 802.11 devices transmit at a much higher power level, giving
them greater range and improved performance.
Although many home network devices support wireless communications, there are still some applications
where devices benefit from a wired switch connection. The most commonly implemented wired protocol is
the Ethernet protocol. Directly connected devices use an Ethernet patch cable, usually unshielded twisted
pair. Category 5e is the most common cabling used in a LAN. The cable consists of four pairs of twisted wires
to reduce electrical interference. In the case of homes that do not have UTP cabling, other technologies,
such as power lines, can be used to distribute wired connectivity throughout the different spaces.
Wireless Standards
The IEEE 802.11 standard governs the WLAN environment. Wireless standards for LAN networks use the 2.4
GHz and 5 GHz frequency bands. Together, these technologies are known as Wi-Fi. The Wi-Fi Alliance is
responsible for testing wireless LAN devices from different manufacturers.
Wireless routers that use the 802.11 standards have many settings that need to be configured. The settings
are as follows:
Network Mode - Determines the type of technology to be supported. For example, 802.11b,
802.11g, 802.11n mixed mode.
Network Name (SSID) - Used to identify the WLAN. All devices that want to participate in the WLAN
must have the same SSID.
Standard Channel - Specifies the channel through which communication will occur. The default
setting is set to Auto to allow the AP to determine the optimal channel to use.
SSID Broadcast - Determines whether the SSID will be broadcast to all devices within range. By
default it is Enabled
The 802.11 protocol can provide superior performance depending on the wireless network environment. If
all wireless devices connect using the same 802.11 standard, the highest speeds for that standard can be
achieved. If the access point is configured to accept only one 802.11 standard, devices that do not use that
standard cannot connect to the access point. A mixed-mode wireless network environment can include
devices that use any of the existing WiFi standards.
When setting up a wireless network it is important that the wireless components connect to the appropriate
WLAN. This is achieved by using an SSID. The SSID is used to tell wireless devices, called STAs, which WLAN
they belong to and which other devices they can communicate with. SSID broadcasting allows other wireless
devices and clients to automatically detect the name of the wireless network. If SSID broadcast is disabled,
you must manually enter the SSID into your wireless devices.
Many wireless routers designed for home use have an auto-configuration utility that can be used to
configure basic router settings. To connect to the router using a wired connection, connect an Ethernet patch
cable to the network port on your computer. Connect the other end to a LAN port on the router.
Once the computer is connected to the network router and the link lights on the NIC indicate a working
connection, the computer needs an IP address. Most network routers are configured so that the computer
receives an IP address automatically from a local DHCP server.
Before you enter the configuration utility, or manually configure your router through a web browser, you
should consider how your network will be used. Consider what you will call your network and what devices
need to connect to your network. It is not good practice to include the device model or brand as part of the
SSID, as Internet searches can expose security weaknesses.
The decision about who can access your home network should be made based on how you plan to use the
network. Many routers support MAC address filtering. This allows you to specifically identify who is allowed
on the wireless network. This allows you to specifically identify who is allowed on the wireless network. On
some wireless routers, it is possible to set up guest access. This is a special SSID coverage area that allows
open access, but restricts such access to Internet use only.