CCNA ppt

61
CCNA ROUTING AND SWITCHING

description

CCNA routing and switching

Transcript of CCNA ppt

PowerPoint Presentation

Ccna routing and switchingIP ADDRESSING NEED OF IP ADDRESSINGCLASSES OF IP ADDRESSPRIORITY BITBINARY TO DECIMAL CONVERSION

DECIMAL TO BINARY CONVERSIONExample : 192.168.10.2

For the first octet: 192 we have to add = 128 + 64 = 192 so we get in binary = 1 1 0 0 0 0 0 0 similarlyFor 2nd octet = 1 0 1 1 0 0 0 0For 3rd octet = 0 0 0 0 1 0 1 0For 4th octet = 0 0 0 0 0 0 1 0So ip address in binary is 1286432164128 1 1 0 0 0 0 0 0. 1 0 1 1 0 0 0 0. 0 0 0 0 1 0 1 0. 0 0 0 0 0 0 1 0Dotted Decimal NotationIP addresses are written in a so-called dotted decimal notation.Each byte is identified by a decimal number in the range [0-255].

100011111000000010001001100100001st Byte 1282nd Byte 1433rd Byte 1374th Byte 144128.143.137.144Class ARange: 0 - 1270 & 127 are reserved for Loopback/Self Testing.N.H.H.H8 bits reserved for network & 24 for Hosts.N part cant be changed but H can be.

Class A Number of networks & HostsClass BRange: 128 to 191N.N.H.H16 bits reserved for Network & 16 for Hosts.

Class B Number of networks & HostsClass CRange: 192 to 223N.N.N.H 24 bits reserved for Network & 8 for Hosts.Most Commonly used because wastage of IP Addresses is Avoided.

Class C Number of networks & HostsAdvicePersonSalesTakeNotDoPleaseOSI Model LayersApplication PresentationSessionTransport Network Data LinkPhysicalLayer - 7Layer - 6Layer - 5Layer - 4Layer - 3Layer - 2Layer - 1Upper Layer or Software LayerLower Layer or Hardware LayerHeart of OSIApplication LayerApplication Layer is responsible for providing Networking Services to user. It also known as Desktop Layer. Identification of Services is done using Port Numbers.

Ports are nothing but Socket i.e. Entry and Exit Point to the Layer

Total No. Ports 0 65535 Reserved Ports 0 1023 Open Ports 1024 65535Application PresentationSessionTransport Network Data LinkPhysicalApplication Presentation LayerPresentation Layer is responsible for converting data into standard format.

Examples : ASCII, EBCDIC, JPEG, MPEG, BMP, MIDI, WAV, MP3

Following tasks can be perform at Presentation layer :

Encoding DecodingEncryption DecryptionCompression Decompression

Application PresentationSessionTransport Network Data LinkPhysicalPresentationSession LayerSession Layer is responsible establishing, maintaining and terminating session. Session ID also works at Session Layer.

Examples :

RPC Remote Procedure Call SQL Structured Query languageNFS Network File System

Application PresentationSessionTransport Network Data LinkPhysicalSessionTransport LayerTransport Layer is responsible for end-to-end connectivity. It is also known as heart of OSI Layers. Following task are performed at Transport Layer : - SEGMENT = TCP/UDP + DATAIdentifying ServiceMultiplexing & De-multiplexingSegmentationSequencing & ReassemblingFlow ControlError CorrectionPDU= SegmentApplication PresentationSessionTransport Network Data LinkPhysicalTransport Identifying ServiceTransmission Control ProtocolConnection OrientedAcknowledgementReliable SlowerPort No. 6e.g. HTTP, FTP, SMTPUser Datagram ProtocolConnection LessNo AcknowledgementUnreliable FasterPort No. 17e.g. DNS, DHCP, TFTPTCPUDPNetwork LayerNetwork Layer is responsible for providing best path to data to reach destination. Logical Addressing sits on this layer. The network layer provides a logical topology, defines layer 3 addresses, and finds best paths to logical address destinations.It is divided into two parts Routed Protocolse.g. IP, IPX, Apple Talk.Routing Protocolse.g. RIP, IGRP, OSPF, EIGRP PACKET = S. IP + D. IP + TCP/UDP + DATAPacket size - 64 bytes to 1500 bytes.

PDU=DATAApplication PresentationSessionTransport Network Data LinkPhysicalNetwork Routing Protocols

A

www.zoomgroup.comData link LayerDatalink Layer is divided into two Sub Layers :

Most wide area network (WAN) protocols primarily function at the data link and physical layers.

MAC Media Access ControlThe data link layer defines hardware (MAC) addresses as well as the communication process that occurs within a media type.It perform Error Detection & not correction.Device working on Data Link Layer is Switch, Bridge, NIC.

Application PresentationSessionTransport Network Data LinkPhysicalData LinkFRAME = S. MAC + D. MAC + S. IP + D. IP + TCP/UDP + DATAPOINT TO REMEMBERRemember that the primary function of the data link layer is to regulate how two networking devices connected to the same layer 2 protocol communicate with each other. If the devices are on different layer 2 protocols or segments, the network layer (layer 3) typically plays a role in the communication of these devices.Data-Link Layer ProtocolsMAC Address Its a 48 bits Hexadecimal address. Switch learns MAC Address and store it in MAC Address TABLE on ASIC CHIP. Switch's First attempt is Broadcast and den Unicast, till the time MAC TABLE didnt FLUSH OUT.Physical LayerPhysical Layer is responsible for electrical, mechanical or procedural checks. Data will be converted in Binary that is 0s & 1s. Data will be in the form of electrical pulses if it is Coaxial or Twisted Pair cable and in the form of Light if it is Fiber Optic Cable.

Devices working at Physical Layer are Hubs, Repeaters, Cables, Modems etc.Application PresentationSessionTransport Network Data LinkPhysicalPhysicalHow data flows from Physical LayerDataDataDataSegmentPacketFrameBitse.g. Hub

Application PresentationSessionTransport Network Data LinkPhysicalApplication Transport InternetNetwork AccessComparing OSI with TCP/IP Layers OSI LayersTCP/IP LayersApplication PresentationSessionTransport Network Data LinkPhysicalNetworking DevicesEquipment that connects directly to a network segment is referred to as a device.

These devices are broken up into two classifications. end-user devices network devices

End-user devices include computers, printers, scanners, and other devices that provide services directly to the user.

Network devices include all the devices that connect the end-user devices together to allow them to communicate.Networking Device Icons

RepeaterA repeater is a network device used to regenerate a signal. Repeaters regenerate analog or digital signals distorted by transmission loss due to attenuation. A repeater does not perform intelligent routing.

HubHubs concentrate connections. In other words, they take a group of hosts and allow the network to see them as a single unit.

This is done passively, without any other effect on the data transmission.

Active hubs not only concentrate hosts, but they also regenerate signals.

BridgeBridges convert network transmission data formats as well as perform basic data transmission management. Bridges, as the name implies, provide connections between LANs. Not only do bridges connect LANs, but they also perform a check on the data to determine whether it should cross the bridge or not. This makes each part of the network more efficient.

Workgroup SwitchWorkgroup switches add more intelligence to data transfer management.

Switches can determine whether data should remain on a LAN or not, and they can transfer the data to the connection that needs that data.

Router

Routers have all capabilities of the previous devices. Routers can regenerate signals, concentrate multiple connections, convert data transmission formats, and manage data transfers.They can also connect to a WAN, which allows them to connect LANs that are separated by great distances.

The CloudThe cloud is used in diagrams to represent where the connection to the internet is.

It also represents all of the devices on the internet.

Network TopologiesNetwork topology defines the structure of the network.

One part of the topology definition is the physical topology, which is the actual layout of the wire or media.

The other part is the logical topology,which defines how the media is accessed by the hosts for sending data. Physical Topologies

Bus TopologyA bus topology uses a single backbone cable that is terminated at both ends.

All the hosts connect directly to this backbone.

Ring TopologyA ring topology connects one host to the next and the last host to the first.

This creates a physical ring of cable.

Star TopologyA star topology connects all cables to a central point of concentration.

Extended Star TopologyAn extended star topology links individual stars together by connecting the hubs and/or switches.This topology can extend the scope and coverage of the network.

Hierarchical TopologyA hierarchical topology is similar to an extended star.

Mesh TopologyA mesh topology is implemented to provide as much protection as possible from interruption of service. Each host has its own connections to all other hosts. Although the Internet has multiple paths to any one location, it does not adopt the full mesh topology.

LANs, MANs, & WANsOne early solution was the creation of local-area network (LAN) standards which provided an open set of guidelines for creating network hardware and software, making equipment from different companies compatible.

What was needed was a way for information to move efficiently and quickly, not only within a company, but also from one business to another.

The solution was the creation of metropolitan-area networks (MANs) and wide-area networks (WANs). LANs

WANs

Introduction to Ethernet Three data rates currently defined for the operation over optical fiber and twisted-pair cables10 Mbps 10Base-T Ethernet 100 Mbps - Fast Ethernet1000 Mbps - Gigabit Ethernet

What is router?

Router is device which is used to make communication between two or more different network which are present in different/same geographical location

If you want to make communication between two of more different network which are present in same geographical location, what steps you will do?Answer : Configure Software Router or you can Change Subnet Mask.

Model 2501Serial PortsS0 and S1AUIAttachment Unit InterfaceE0ConsoleCon 0AuxiliaryAux 0Power SwitchPower Supply50This slide depicts the broad range of Cisco access router product portfolio. With this announcement, Cisco is enhancing its access router portfolio to offer enterprise customers with a broadest range of routers to meet the needs of enterprise teleworkers, small offices, branch offices, regional offices, all the way to enterprise HQ.This provides customers with the benefit of standardizing on a single operating environment which they are familiar with across all varying office sizes to simplify deployment, maintenance, and lowering support costs and training.

In the small office space, with the Cisco SOHO & 800 Series, Cisco has introduced new models such as the SOHO 71 which brings affordable multi-user access and Internet security for Small Businesses as well as new DSL models with an integrated 4 port hub.

E0 192.168.1.150/24

LAN - 192.168.1.0/241.11.21.3An IP address needs to be assigned to this interface and it should be in the same network as of the LAN.Attachment Unit InterfaceStraight CableStraight Cable

Routing Protocols

OSPF (Open Shortest Path First) Protocol 2003, Cisco Systems, Inc. All rights reserved.52OSPF is a Link-State Routing ProtocolsLink-state (LS) routers recognize much more information about the network than their distance-vector counterparts,Consequently LS routers tend to make more accurate decisions.

Link-state routers keep track of the following:Their neighboursAll routers within the same areaBest paths toward a destination

OSPF vs. RIPRIP is limited to 15 hops, it converges slowly, and it sometimes chooses slow routes because it ignores critical factors such as bandwidth in route determination. OSPF overcomes these limitations and proves to be a robust and scalable routing protocol suitable for the networks of today.

OSPF TerminologyThe next several slides explain various OSPF terms -one per slide.

EIGRP Concepts & TerminologyEIGRP routers keep route and topology information readily available in RAM, so they can react quickly to changes.

Like OSPF, EIGRP saves this information in several tables and databases.

EIGRP saves routes that are learned in specific ways.

Routes are given a particular status and can be tagged to provide additional useful information.

EIGRP maintains three tables:Neighbor table Topology table Routing table Neighbor TableThe neighbor table is the most important table in EIGRP.

Each EIGRP router maintains a neighbor table that lists adjacent routers. This table is comparable to the adjacency database used by OSPF. There is a neighbor table for each protocol that EIGRP supports.

When a neighbor sends a hello packet, it advertises a hold time. The hold time is the amount of time a router treats a neighbor as reachable and operational. In other words, if a hello packet is not heard within the hold time, then the hold time expires.

When the hold time expires, the Diffusing Update Algorithm (DUAL), which is the EIGRP distance vector algorithm, is informed of the topology change and must recalculate the new topology.Topology TableThe topology table is made up of all the EIGRP routing tables in the autonomous system.

DUAL takes the information supplied in the neighbor table and the topology table and calculates the lowest cost routes to each destination. By tracking this information, EIGRP routers can identify and switch to alternate routes quickly.

The information that the router learns from the DUAL is used to determine the successor route, which is the term used to identify the primary or best route. A copy is also placed in the topology table.

Every EIGRP router maintains a topology table for each configured network protocol. All learned routes to a destination are maintained in the topology table.

Routing TableThe EIGRP routing table holds the best routes to a destination. This information is retrieved from the topology table. Each EIGRP router maintains a routing table for each network protocol.

A successor is a route selected as the primary route to use to reach a destination.DUAL identifies this route from the information contained in the neighbor and topology tables and places it in the routing table.

There can be up to four successor routes for any particular route. These can be of equal or unequal cost and are identified as the best loop-free paths to a given destination.

A copy of the successor routes is also placed in the topology table.

A feasible successor (FS) is a backup route.These routes are identified at the same time the successors are identified, but they are only kept in the topology table. Multiple feasible successors for a destination can be retained in the topology table although it is not mandatory. IPv6128 bit hexadecimallarger address spacemore secure & faster than IPv4Uses ICMP version 6doesnt use ARP

IPv6 contains 8 fields and each field contains 16 bits.1stField: 2ndField: 3rdField: 4thField: 5thField: 6thField: 7thField: 8thField

END OF SLIDES