Welcome to the third of five courses in the Cisco Networking Basics Specialization.
Now that you know the basics of what an network is and how the devices on a network communicate with each other, it is time to explore the network further. In this course, you will learn the benefits and limitations of the IPv4 addressing system and why NAT and IPv6 were implemented to address the limitations. You will also explore common network services and protocols such as email, web services, instant messaging, DNS, HTTP, HTML, SMTP, Telnet, and SSH.
At the end of this course, you will be able to:
1. Describe the role of network services including DHCP and DNS.
2. Use Cisco Packet Tracer to configure a router to perform DHCP services for a LAN.
3. Explain use of IPv4 private addresses with NAT.
4. Compare TCP and UDP protocol operations for efficiency and reliability.
5. Describe the network services and applications for file transfer, web access, email, remote access and instant messaging.
6. Observe how web requests are processed by the web client and the server.
7. Use various tools to verify network operations.
Now that you know the basics of what an network is and how the devices on a network communicate with each other, it is time to explore the network further. In this course, you will learn the benefits and limitations of the IPv4 addressing system and why NAT and IPv6 were implemented to address the limitations. You will also explore common network services and protocols such as email, web services, instant messaging, DNS, HTTP, HTML, SMTP, Telnet, and SSH.
At the end of this course, you will be able to:
1. Describe the role of network services including DHCP and DNS.
2. Use Cisco Packet Tracer to configure a router to perform DHCP services for a LAN.
3. Explain use of IPv4 private addresses with NAT.
4. Compare TCP and UDP protocol operations for efficiency and reliability.
5. Describe the network services and applications for file transfer, web access, email, remote access and instant messaging.
6. Observe how web requests are processed by the web client and the server.
7. Use various tools to verify network operations.