# Network Configuration Concepts

Video Activity
Join over 3 million cybersecurity professionals advancing their career
or

Time
12 hours 9 minutes
Difficulty
Beginner
CEU/CPE
12
Video Transcription
00:00
less than 13.8 network configuration concepts. In this lesson, we're gonna discuss different types of network configuration and networking concepts that you should know. So let's go and get started.
00:13
I p b for I P v four has been around for many years. Andi will be around for a long time to come.
00:21
I p v four uses 32 bit addressing separating Thio eight ock techs in a desolate format on these are separated by periods. So let's break apart an I p V for I p address before we move on so we can get a clear understanding of what this means.
00:37
So let's take the I P address of 1 92.1 68.1 dot 200. So if we break apart the i p v for I p address, this is how it looks in binary form. The 1 92.1 68 down 1.200 breaks out to be 11000000
00:55
10101000
00:59
0000000111001000 and that's how it's in binary form.
01:10
So in binary form, if we break this part and look at it even closer,
01:14
each portion of this I P address is consistent of eight bits. So each of these fields are eight bits
01:23
now a B, it bits equals one bite,
01:26
and that equals one octet. So each of these sections, or each of these areas, is one octave. The 1 92 in the Byner form the 1000000 That's one octet of that I p address
01:44
a total I P addresses 32 bits on, and that equals out to four bites.
01:49
Because one bite equals eight bits. The maximum decibel value for each bite is 255.
01:59
So let's look at that compared to an I P V six i p address I P v six is a newer I p. Addressing scream that's been out for several years now, and it is ground getting steam and being used more and more wily and networks.
02:15
And as you can see, I P v six is a lot longer than I p V for I p addresses
02:21
M v I P v four. We are experiencing or coming to a place of I p v for exhaustion, which means that
02:30
PV four in its structure were coming to an end of all the available I P addresses. That and for other capabilities I p v six came along. I p v six gives us future forward looking technology
02:46
and additional routing capabilities that I p v four did not give us.
02:51
So here you have the I. P V six i p address and it is 100 and 28 bit address. And as you can see, the NYPD address here is 2000 or to zoos or one, and they're separated by not periods. But but Coghlan's
03:07
2001 colon. Zero D B eight
03:12
Colon 0000 Colon 0000 Colon 0000 Colon eight a to e colon 0370 Colon 7334 And there isn't a way to abbreviate thes. If you have sections that has,
03:30
they're leading, zeroes are continuing her entire zeros.
03:35
You can just some break that up or define that as in using commas as you see below.
03:43
So let's take the I P. V six i p address and break that out into by an airy and that is what you'll see there at the bottom. That is an I P V six breaking up in a bite written in binary. Now I P V six, of course, is a lot longer. 16 bits for each of the segments.
04:01
R equals out to be two bites,
04:03
so each of those fields or each of those sections, equals onto two octet. It's and again this is 100 and 28 bit I P. Address or 16 bites.
04:15
Figuring I p v for I p addresses onto your device. There's one of two ways you'll set those I p addresses. That's either static or manual or D A. C P.
04:24
Static is when you're assigning an I P address to a device, and that I p address will not change for whatever reason. In your network, that device will stay that I p address where they be a server and other clients needs to connect to that so they need to therefore find it
04:40
and that i p address can't change. Or you may have a dedicated piece of software hardware
04:45
where other network host need to connect to that. That I P address will remain constant and fixed to that device. So that will be a static I p addressing
04:54
when you said, Ah, your computer toe a static i p address or manual Entering Indian, you would need the of course, the I p address the subnet mask, the gateway D N s and whatever other information that you need. So you can configure that i p address and it will not change on your network.
05:11
The other way is dynamically or did using D A, c p dynamic or D A C P stands for dynamic host control protocol.
05:19
Basically, in this situation, you plug your device into the network and it will reach out to the i. P address giving server around word access point and request an I P address from that device. That device, through D. C. P server will push out an I P address
05:35
configured with the I P. Address the subnet mask the Gateway Indian s information
05:41
to that particular device
05:43
using D. A. C. P. That device will get an I P address, but it will be on a lease basis and that least will expire over a period of time and when it does inspire that device will have to reach back out to the dates he p server to get a new I p address. Ah Pippa a p i p p a.
06:00
So Windows provides a function that provides an i p address when an I P address is not received by D c P server
06:06
the automatic private I p addressing function or ah Pippa assigns a Class B I P address in the range of 1 69 to 54.0 dot 0 to 1 69 to 54.255 dot 255
06:21
Now, this is a non raw, edible I p address. If a d c. P server is is available later,
06:28
the I P address from the server will replace Thea Pippa i. P. Address
06:32
VPN is another concept that you should know on any network. Virtual private network extends a private network across a public network and enables users to send and receive data across shared or public networks as if they were on the same network.
06:48
Various configuration types. There's either a point to point or remote access
06:54
many different security confederations using different technologies.
06:59
Ah, villain is another common concept that you should know. Ah, villain or virtual land is a network traffic from a specific host that is partitioned and isolated in a computer network. Villains work by applying tax to the network frames, inhaling these tags and networking
07:15
equipment, creating the appearance and functionality of a network that is physically separate so you could have a network of computers. And, if you need it, traffic certain traffic to go to certain computers. You would set up a V land
07:31
using the same physical network. No more wires or additional wires.
07:36
But using tags from your router or your firewall that will tag specific frames for certain computers. That's within that villain. Now again, it provides network segmentation separating traffic from one group to another group, the 802 11 q V land specification.
07:55
Now tags are in the router or the switch so they recognize those tax.
07:59
And it can be also port based on the physical switch, which means
08:03
some switches have the capability of providing a port based V land port. Water on that switches villain one port to his villain, too So you plug computer A and support one narrow net villain. You plug computer, be into the second port and there on that violent and their segregated by the port
08:24
Nat is another concept that you should know about network address. Translation is the method of remapping of public Internet I p address to private internal I P addresses behind your idol or firewall
08:37
public. I p address is translated to a private network conserves the number of public I P addresses most, so whole routers would do this automatically.
08:50
Okay, those are the network concept types that you should know in the i p Addressing schemes. We talked about I p v four verses i p v six i p addressing static dynamic. And Pippa um along with the sub net mass in the gateway. And we went into detail about the VPN
09:09
villain and the Nats service. So
09:11
that is it for this lesson, and we will see you in the next lesson.
Up Next
CompTIA A+ 220-1001

This CompTIA A+ training covers the 220-1001 exam components needed to earn the CompTIA A+ certification. The course will also include labs and quizzes to help reinforce learning.

Instructed By