Académique Documents
Professionnel Documents
Culture Documents
What is a network?
Ethernet Cable
PC---Network Interface Card
Router---WAN + Internet
WAN + Internet --- service Provider
Switch—Router
Switch--- Server
Delay
Availability
Speed & Size
Bit Byt KiloByt MegaByt GigaByt TerraByt
e e e e e
Network Designs
2 | CCNA ( 6 4 0 - 8 0 2 )
By: Engr.Faraz Iqbal
Bus
Star
Ring
Mytyhical OSI Model
ftp
ftp.cisco.com
Netstat
3 | CCNA ( 6 4 0 - 8 0 2 )
By: Engr.Faraz Iqbal
OSI vs TCP/IP
Application
Presentatio Telne FT
Application SMTP DNS RIP SNMP
n t P
Session
Host to Host
Transport TCP UDP
Transport Layer
Network
Data Link
Access
Etherne Token Frame
(Network ATM
t Ring Relay
IP Address Format
4 Numbers, each number from 0-255, 32bits in length alongwith subnet mask and
gateway.
Source IP-----------------Fixed
4 | CCNA ( 6 4 0 - 8 0 2 )
By: Engr.Faraz Iqbal
Destination IP-----------Fixed
Source MAC-------------Vary
Destination MAC-------vary
TCP UDP
Builds Connections Connectionless
Uses Sequence Numbers Best-Effort Delivery
Reliable (Uses Acks) Unreliable
TCP—Three-Way Handshake--SYN-SYSACK-ACK
TCP Windowing
Port Numbers
Port Number+IP=Socket/session
www.iana.org/assignments/port-numbers
0-1023 is considered as well –known ports.
5
200 Gigabit Ethernet emerges (1000MBPS)
0
200 10 Ethernet emerges (10000MBPS)
2
200 100 Ethernet emerges (100000MBPS)
7
Average user uses 5% of the bandwidth out of 100MBPS.
Ethernet lies in between Data Link and Physical Layer.
@ Data Link Layer ethernet again devides into 2 layers.
• Logical Link Layer (LLC)
• Media Access Control (MAC)
•
Carrier Sense, Multiple Access / Collision Detection
CSMA/CA
Used by Token Ring
Methods of Communicating
Unicast
Multicasting
Broadcasting
MAC Addresses
Consists of 12 hexa characters
6 hexa characters are for Organizational Unique Identifier (OUI)
6 hexa characters are for Vender Assigned
www.coffer.com/mac_find
Cabling Standards
-T568A + T568A =Straight Thru
(Greenwhitegreen-Orangewhiteblue-bluewhiteorange-brownwhitebrown)
-T568B + T568B =Straight Thru
(Orangewhiteorange-Greenwhiteblue-Bluewhitegreen-brownwhitebrown)
-T568A + T568B =Crossover
-T568B is by far is the most famous standard.
-Unlike devices use Straight-Thru
-Like devices use Crossover
Cisco IOS
-The Internetwork Operating System
-A command line method of configuring a cisco device
-Software that is consistant through nearly all cisco devices
-Learn it once, use it many times
7 | CCNA ( 6 4 0 - 8 0 2 )
By: Engr.Faraz Iqbal
-More powerful than any graphical interface
Device Nevigation
Esc > Show the last line from the history buffer
Esc b Move cursor back one word
Esc d Delete the word in front of the cursor
Esc f Move the cursor forward one word
Esc Del Delete the word before the cursor
SSH steps
1. Username and password
2. Domain name (in order to develop certificate it is required)
3. Generate the keys
4. Version of ssh (ip ssh version 2)
5. Transport input ssh
-Tera Term web 3.1 (SSH program)
-Terminal monitor command in global mode will log messages when there is an
activity on ports
MAC Security
Interface
Switchport mode access
Switchport port-security maximum
Switchport port-security violation
Switchport port-security mac-address
9 | CCNA ( 6 4 0 - 8 0 2 )
By: Engr.Faraz Iqbal
-show port-security int
STP
-Switches forward broadcast packets out all ports by design
-Reducdant connections are necessary in business networks
-The place of ST: Drop trees on redundant links (until they are needed)
Unlicensed Frequencies
900MHZ Range: 900 - 928
2.4GHZ Range: 2.400 -2.483
5GHZ Range: 5.150 – 5.350
10 | CCNA ( 6 4 0 - 8 0 2 )
By: Engr.Faraz Iqbal
-The lower the frequency the further the bandwidth for lower band
RF
-RF waves are absorbed (passing through walls) or reflected (by metal)
-Higher Data rates have shorter ranges
-Higher frequencies of RF have higher data rates
-Higher frequencies of RF have shorter ranges
*Check out cisco’s wireless explorer game
802.11 Lineup
802.11B
-Official as of September 1999
-Frequency 2.4GHZ
-Up to 11 MBPS (1, 2, 5.5, 11 Data rates)
-Most popular standard
-3 clean channels
802.11G
-Official as of June 2003
-Frequency 2.4GHZ
-Backards compatible with 802.11B
-Up to 54 MBPS (12 Data rates)
-3 clean channels
802.11A
-Official as of September 1999
-Frequency 5.8GHZ
-Up to 54 MBPS
-Not compatible with 802.11B/G
-12 to 23 clean channels
802.11N
-Up to 100 MbPS
-MIMO (multiple input multiple output)
Wireless Dangers
Wireless Security
Authentication
Encryption
Intrusion Prevention System
11 | CCNA ( 6 4 0 - 8 0 2 )
By: Engr.Faraz Iqbal
Reviewing IP Basics
Ipv4 Address:
-Four octet (byte) address
-Can be one of three different classes
-When combined with a subnet mask, defines a network and host portion
-Operates at layer 3 of the OSI Model
Network Requirements
1-Determine Number of Networks and convert to binary
5 = 00000101 (3 BITS)
2-Reserve Bits in subnet mask and find your increment
255.255.255.0 = 11111111.11111111.11111111.00000000
11100000
-------------
= 255 . 255 . 255 . 224
3-Use increment to find your network ranges
216.21.5.0 ----216.21.5.31
216.21.5.32 ----216.21.5.63
216.21.5.64 ----216.21.5.95
216.21.5.96 ----
Note: Can’t use the first ID (Network ID) as well as the last ID (broadcast ID)
Note: Can’t use the first ID (Network ID) as well as the last ID (broadcast ID)
Note: Can’t use the first ID (Network ID) as well as the last ID (broadcast ID)
Practice
Network Requirements
1-Determine Number of Hosts and convert to binary
30 = 00011110 (5 BITS)
2-Reserve Bits in subnet mask and find your increment
255.255.255.0 = 11111111.11111111.11111111.00000000
11100000
-------------
= 255 . 255 . 255 . 224
3-Use increment to find your network ranges
216.21.5.0 ----216.21.5.31
216.21.5.32 ----216.21.5.63
216.21.5.64 ----216.21.5.95
216.21.5.96 ----
Note: Can’t use the first ID (Network ID) as well as the last ID (broadcast ID)
Note: Can’t use the first ID (Network ID) as well as the last ID (broadcast ID)
Practice
# logging synchronous
#line con 0
#Exec-timeout 30 0
#interface range 0 - 3
DHCP Process
Note: BY bringing the router as DHCP server now the clients automatically get the IP
addresses. Hence therefore no need of windows DHCP server
DHCP Pool Status
SDM >Additional tasks > DHCP Pools > DHCP Pool Status
20 | CCNA ( 6 4 0 - 8 0 2 )
By: Engr.Faraz Iqbal
Understanding RIP
-Algorithm first developed in 1969
-Comes in two versions: RIPv1 and RIPv2
RIPv1:
• Classsful (advertise network but not subnet mask) version (Doesn’t supports
VLSM)
• No Authentication
• Uses Broadcast (30 seconds)
RIPv2:
• Classless version (supports VLSM)
• Adds Authentication
• Uses Multicast
Configuring RIP
• Turn on RIP (Global Configuration),#router rip
• Change version #version 2
• Enter network statements (does 2 things—1) tells rip what networks to
advertise and – 2) tells rip what interfaces to send advertise on)
#network (ex.192.168.1.0)
-no auto-summary: It keep rip for auto summarization of classful network
WAN Connectivity
24 | CCNA ( 6 4 0 - 8 0 2 )
By: Engr.Faraz Iqbal
Styles of WAN Connections
Leased Lines: Dedicated bandwidth between locations
• T1 CAS (channel-Associated Signaling)
• E1 CAS
Circuit Switched: On-demand bandwidth between locations
• Dial-up modems
• ISDN
Packet switched: Shared, but guaranteed, bandwidth between locations
• Frame Relay
• ATM
Configuring Leased Line Connections
L2 Protocols: HDLC (Cisco) and PPP (Open)
Serial Cross-over cable (DCE-DTE)
#Show controllers
#clock rate
Understanding VLANs
VLAN Foundations
• Logically groups users
• Segments Broadcast Domains
• Subnet Correlation
• Access Control
• Quality of service
The Normal Switching World
• One collision Domain per port
• Broadcasts sent to all ports
• One subnet per LAN
• Very Limited access Control
The Flexibility of VLANs
• Segmentation of users without routers
• No longer limited to physical location
• Tighter control of broadcasts
What is Trunking?
• Trunking (AKA Tagging)passes multi-VLAN information between switches
• Places VLAN information into each frame
• Layer 2 Feature
Note: Native VLAN is always untagged
28 | CCNA ( 6 4 0 - 8 0 2 )
By: Engr.Faraz Iqbal
VOMIT- (Voice over Misconfigured IP telephony) a hacking program used to hack IP
telephones.
VTP (VLAN Trunking Protocol)or can say it VRP (VLAN Replication Protocol)
• 0/1-4096 VLAN numbers
VTP Modes
SERVER (Default)
• Power to change VLAN information
• Sends and Receives VTP updates
• Saves VLAN configuration
CLIENT
• Can’t change VLAN Information
• Sends and Receives VTP updates
• Doesn’t Save VLAN configuration
TRANSPARENT
• Power to change VLAN Information
• Forwards (Passes Through) VTP updates
• Doesn’t listen to VTP advertisements
• Saves VLAN configuration
VLAN PRUNING
• Keeps unnecessary broadcast traffic from crossing trunk links
• Only works on VTP servers
S2#int vlan 1
S2# ip address 192.168.1.11 255.255.255.0
29 | CCNA ( 6 4 0 - 8 0 2 )
By: Engr.Faraz Iqbal
S2# no shut
S3#int vlan 1
S3# ip address 192.168.1.12 255.255.255.0
S3# no shut
Step 1: Configure Trunks
S1(3550)#int fa 0/11
S1#switchport trunk encapsulation dot1q
S1#switchport mode trunk
S1#int fa 0/12
S1#switchport trunk encapsulation dot1q
S1#switchport mode trunk
S1# int range fa 0/1 – 10
S1#switchport mode access
S1# int range fa 0/13 – 23
S1#switchport mode access
S2(2950)#int fa 0/1
S2#switchport trunk
S2#int range fa 0/2 – 24
S2#switchport mode access
S3(2950)#int fa 0/1
S3#switchport trunk
S3#int range fa 0/2 – 24
S3#switchport mode access
-#sh int trunk
-#sh int fa 0/1 switchport
-#sh run int fa 0/1
Router-on-a-stick works
• Router physical interface divided into subinterfaces
• Switchport connecting to router set up as a trunk
• Router’s subinterfaces assigned specific VLAN Tag
R2#
31 | CCNA ( 6 4 0 - 8 0 2 )
By: Engr.Faraz Iqbal
R2#int fa 0/0.20
R2#encapsulation dot1Q 20
R2#ip address 192.168.20.1 255.255.255.0
R2#int fa 0/0.10
R2#encapsulation dot1Q 10
R2#ip address 192.168.10.1 255.255.255.0
Note: on Ethernet, max packet 1500 bytes, baby giant 1504 (tagging)
Understanding STP
An Ideal Design: Switch layers
• Core-Backbone of the Network
• Distribution- Major segments happen (modules, services, server form)
• Access-Devices plug in to the Network
-Layered approach allows for easy, manageable growth.
-Etherchannel can provide more bandwidth on key links.
-Redundant connections eliminate a single point failure.
Redundancy
• Switches forward broadcast packets out all ports by design
• Redundant connections are necessary in business networks
• The place of spanning tree: Drop trees on redundant links (until they are
needed)
32 | CCNA ( 6 4 0 - 8 0 2 )
By: Engr.Faraz Iqbal
Facts about Spanning Tree
• Original STP (802.1D) was created to prevent loops
• Switches send “PROBES” into the network called “Bridge Protocol Data Units
(BPDUs)” to discover loops
• The BPDU Probes also help elect the core switch of network, called the ROOT
Bridge
• The simplistic view of STP: All switches find the best way to reach the Root
Bridge then “Block” all redundant links
Understanding BPDUs and Elections
• Three port types
-Root port: used to reach the root bridge
-Designated port: Forwarding port, one per link
-Blocking/Non-Designated port: where the tree fell
-Bridge ID = Priority.MAC Address
-Every switch has by default priority value = 32768
-Lowest priority/MAC is the best for switch to get elected as Root Bridge
How STP finds the best path
Step 1: Elect the Root
Step 2: Switches find lowest cost path to root
Link Bandwidth Cost
10Mbps 100
100Mbps 19
1Gps 4
10Gbps 2
Enhancements to STP
Problems with STP
34 | CCNA ( 6 4 0 - 8 0 2 )
By: Engr.Faraz Iqbal
Problems and solutions
• Problems with PCs: Modern PCs can boot faster than 30 seconds
Solution: portfast
Switch(config-if)# spanning-tree portfast
• Problems with uplink ports: 50 seconds of down time causes big problems
Solution: Rapid Spanning-Tree
Initial STP Enhancement: PVST+
• Runs an instance of STP per-VLAN (by default runs on every switch)
• Allows different Root Bridge per VLAN
Rapid STP
• 802.1w
• Proactive system
• Redefined port roles
• Many STP similarities
RSTP improves performance
-Root port: used to reach the root bridge
-Designated port: Forwarding port, one per link
-Alternate port: Discarding port, backup path to root
Configuring and Testing RSTP
S1#Spanning-tree mode rapid-pvst
S3#int fa 0/
S3#spanning-tree portfast
S2#int fa 0/
S2#spanning-tree portfast