Hello. My name is Dustin and welcome to networking Net Plus basics.
The network plus exam is an entry level in that working certification from Camp Tia.
This section will come are some of the basic knowledge required for the network plus exam
networking concepts. The network plus exam covers many basic topics of networking, and we're going to discuss a few of them in this section.
First, we'll go over what the OS I or Open systems interconnection model is and how it compares to the more modern T c P I. P model.
After that, we're going to go over I p class ranges and how you can distinguish a private i p address from a public i p address.
Once we've gone over the basic addressing oven I p network, we're going to go over subheading and cider. Notation
will then discuss network communication and the difference between a unit cast message, broadcast message and multi cast message.
Lastly, we're going to discuss several common ports and protocols and what they dio Let's get right into it.
So first we're going to go over the OS I model
Theo's. A model contains seven layers
that characterize and stand, arise the communication functions of a network without regard to the actual physical hardware that sets up the network.
So in short, that means it can give you a basic visual of everything going on in a network, which can help with design and troubleshooting issues.
An easy way to remember the seven layers in order from the top or layer seven is all people seen to need data processing.
So from the top, the layers are application
datalink and physical.
The visual on the right lists all of the layers, what happens in each layer and what data is referred to at each layer.
So let's start it later. Seven. The application layer.
This is what most users will actually see. It's the application being used, like your Web browser
going down. We've got Layer six,
which is the presentation layer.
It's the preparation layer for the data so it prepares the data in an application for Matt for a network for mom. So this is typically where encryption will take place.
Going down. We've got Layer five, which is the session layer. When any two devices need to communicate, there needs to be a session created. This is where that will happen. It will negotiate how long a system should wait for a response and when to terminate that session.
Layer four is the transport layer.
This coordinates the data transfer between the systems.
The best known example of the transport layer is tthe E Transmission Control Protocol, TCP, which is built on top of the Internet protocol, commonly known as T. C P, I, P
TCP and UDP. Port numbers work it layer four While I pee a dressing layer. I'm sorry I p addressing works a layer three, which is the network layer
so again later. Three is the network layer. This is where routers function and where routing takes place.
As I mentioned before, this is where the I P address comes into play.
You'll commonly hear I P address, referred to as a layer three address
layer to is the datalink layer, and this provides theme no to no data transfer, and it can handle air correction from Layer one.
This is where you'll see the Mac address is commonly referred to as a layer to address
well here. One is the physical layer,
which is the actual electrical and physical connections of the network.
Next, we're going to go over the TCP I P model.
So the TCP I P model is also an open standard networking model. In the TCP I P model, though there are only four layers instead of seven.
Layer four is the application layer, which combines the application presentation in session models are I'm sorry, layers from the OS I model into a single layer.
Layer three is the transport layer, which lines up with the transport layer in the OS I model
layer to is the Internet layer, which lines up with the network layer in the O S. I model.
Lastly, layer one is the link layer.
This combines layers to end one data link and physical from the OS I model
and on the right, we've got a nice graphic here showing how those layers lineup
Information Security Fundamentals
The foundational networking and security concepts taught in this career path form the backbone of ...
Kali Linux Fundamentals
If you’re interested in penetration testing and ethical hacking, then this Kali Linux course is ...
1 CEU/CPE Hours Available
Certificate of Completion Offered