This is the hardware address of a computer/com. system. Hard Encoded in Network Chips. This is a unique address that allows for communication in local networks without IP addresses.
Ex: 00:0a:95:9d:68:16
Media Access Control Address (MAC Address).
First 3 Hex Values of a MAC Address (00:0a:95)
Organizational Unique Identifier (OUI)
Last 3 Hex values of a MAC Address (9d:68:16)
Unique ID of Hardware
A “Dotted Quad Format” address with the values 0-255 in one quad
IP Address (IPv4)
A “communication endpoint” at the software level
Network Port
These kinds of ports are assigned and controlled. (0-1023)
“Well Known Ports”
These ports are not assigned or controlled, but instead can be registered to prevent duplication
Registered Port
Analogy: A street address is like a…
IP Address
Analogy: An apartment/room in a house on the address
Network Port
Analogy: Resident of the Apartment
Application/Program.
Used for Internal Networks(Home routers, schools, etc). Not routable on internet/WAN
Private IP
Ranges of Private IP
10.0.0.0 -> 10.255.255.255.255 172.16.0.0 -> 172.31.255.255 192.168.0.0 -> 192.168.255.255
These are Unique Locally and Globally
IP Address
Class A Range
0-127 (First Octet is Network, rest are Host Address)
Class B Range
128-191(first two are Network ID, Final two are Host)
Class C Range
192-223(Last Octet is host, first 3 are Network ID)
Software that keeps track of internet traffic from LAN to/fro WAN. Allows multiple Private IP’s to use the same Public ID on WAN. Router Does this
Network Address Translation
Way out of your local network and the way into the ‘next’ network (WAN/Internet).
Default Gateway
IP address used to target all hosts on a network/subnet. Any info sent to this IP would go to all devices on the network.
Broadcast Network Address.
Network management protocol used to automatically assign IP address and other network config. Info. to each device on a network. GIVES DEVICE AND IP, GATEWAY, DNS ADDRESS, ETC.
Dynamic Host Control Protocol (DHCP)
Software created Network
Virtual Lan (VLAN)
Controls flow of traffic by preventing unauthorized network traffic from entering/leaving a particular portion of the network.
Firewall.
Provides RELIABLE, ORDERED, ERROR-CHECKED delivery of a stream of octets (bytes) between applications running on hosts communicating via IP Network. Gets data on the internet.
Transmission Control Protocol (TCP)
When data is being delivered in the correct order, it will be…
Connection Oriented.