Sei sulla pagina 1di 56

Organizational Details

Hewlett-Packard Company

Type

Public company

Traded as

NYSE: HPQ Dow Jones Industrial Average Component

Computer hardware Industry Computer software IT consulting IT services

Founded

Palo Alto, California (1939)

Founder(s)

Bill Hewlett David Packard

Headquarters

Palo Alto, California, US

Area served

Worldwide

Key people

Raymond Lane (Chairman) Lo Apotheker (President & CEO)

Computer Monitors Digital Cameras Enterprise Software Indigo Digital Press Mobile Phones Networking Personal Computers and Laptops Products Personal Digital Assistants Printers Scanners Servers Storage Televisions Telecommunications hardware and software List of HP products US$ 126.033 billion (FY 2010)[1]

Revenue

Operating income

US$ 11.479 billion (FY 2010)[1]

Net income

US$ 8.761 billion (FY 2010)[1]

Total assets

US$ 124.500 billion (FY 2010)[1]

Total equity

US$ 40.781 billion (FY 2010)[1]

Employees

324,600 (2010)[1]

Divisions

HP Enterprise Business(EB) HP Personal Systems Group(PSG)

HP Imaging and Printing Group(IPG) HP Financial Services(HPFS) HP Labs HP Software Division

3Com 3PAR Compaq Palm, Inc. Subsidiaries ProCurve Snapfish VoodooPC HP CDS List of acquisitions by HP

Website

HP.com

Hewlett-Packard Company commonly referred to as HP, is an American multinational information technology corporation headquartered in Palo Alto, California, USA. The company was founded in a one-car garage in Palo Alto by Bill Hewlett and Dave Packard. HP however, is one of the world's largest information technology companies, operating in nearly every country. HP specializes in developing and manufacturing computing, data storage, and networking hardware, designing software and delivering services. Major product lines include personal computing devices, enterprise, and industry standard servers, related storage devices, networking products, software and a diverse range of printers, and other imaging products. HP markets its products to households, small- to medium-sized businesses and enterprises directly as well as via online distribution, consumer-electronics and office-supply retailers, software partners and major technology vendors. HP also has strong services and consulting business around its products and partner products.

HP's posted net revenue in 2010 was $126.3 billion, in 2009 net revenue was $115 billion, with approximately $40 billion coming from services. In 2006, the intense competition between HP and IBM tipped in HP's favor, with HP posting revenue of

US$91.7 billion,compared to $91.4 billion for IBM; the gap between the companies widened to $21 billion in 2009. In 2007, HP's revenue was $104 billion, making HP the first IT company in history to report revenues exceeding $100 billion. In 2008 HP retained its global leadership position in inkjet, laser, large format and multi-function printers market, and its leadership position in the hardware industry. Also HP became No.2 globally in IT services as reported by IDC & Gartner. Major company changes include a spin-off of part of its business as Agilent Technologies in 1999, its merger with Compaq in 2002, and the acquisition of EDS in 2008, which led to combined revenues of $118.4 billion in 2008 and a Fortune 500 ranking of 9 in 2009In November 2009, HP announced the acquisition of 3Com with the deal closing on April 12, 2010. On April 28, 2010, HP announced the buyout of Palm for $1.2 billion. On September 2, 2010, won its bidding war for 3PAR with a $33 a share offer ($2.07 billion) which Dell declined to match. On August 6, 2010, CEO Mark Hurd resigned. Cathie Lesjak assumed the role of interim CEO, and on September 30, 2010, Lo Apotheker became HP's new permanent CEO and Ray Lane, Managing Partner at Kleiner Perkins Caufield & Byers, was elected to the position of non-executive Chairman. Both appointments were effective November 1, 2010.

Global Presence:HP's global operations are directed from its headquarters in Palo Alto, California, USA. Its U.S. operations are directed from its facility in unincorporated Harris County, Texas, near Houston. Its Latin America offices in unincorporated Miami-Dade County, Florida, U.S., near Miami. Its Europe offices are in Meyrin, Switzerland, near Geneva. Its AsiaPacific offices are in Singapore. It also has large operations in Boise, Idaho, Roseville, California, San Diego, and Plano, Texas (the former headquarters of EDS, which HP acquired). In the UK, HP is based at a large site in Bracknell, Berkshire with offices in various UK locations, including a landmark office tower in London, 88 Wood Street. Its recent acquisition of 3Com will expand its employee base to Marlborough, Massachusetts.

Brand:According to a Business Week Study, HP is currently the world's 11th most valuable brand.[73] Since its creation, the HP Logo has remained largely the same. Because of its extreme simplicity, the logo is recognized all over the world. HP has many sponsorships. One well known sponsorship is of Walt Disney World's Epcot Park's Mission: SPACE. From 1995 to 1999 they were the shirt sponsor of Premier League club Tottenham Hotspur F.C. From 1997 to 1999 they were sponsors of Australian Football League club North Melbourne Football Club. They also sponsored the BMW Williams Formula 1 team until 2006 (a sponsorship formerly held by Compaq), and as of 2010 sponsor Renault F1. Hewlett-Packard also has the naming rights arrangement for the HP Pavilion at San Jose, home of the San Jose Sharks NHL hockey team. After the acquisition of Compaq in 2002, HP has maintained the "Compaq Presario" brand on low-end home desktops and laptops, the "HP Compaq" brand on business desktops and laptops, and the "HP ProLiant" brand on Intel-architecture servers. (The "HP Pavilion" brand is used on home entertainment laptops and all home desktops.) HP uses DEC's "StorageWorks" brand on storage systems; Tandem's "NonStop" servers are now branded as "HP Integrity NonStop".

PART1- INTRODUCTION TO NETWORKING


Definition :A network is a system that transmits any combination of voice, video and/or data between users. A network can be defined by its geographical dimensions and by which the users PC access it. A network consists of a: The network operating system (Windows NT/2000TM/Xp) on the users PC (client) and server. The cables connecting all network devices (users PC, server, peripherals, etc.). All supporting network components (hubs, routers and switches, etc.). Computer Network means an interconnected collection of autonomous computers.

Requirements of Networking
Resource sharing- To make all programs, equipment, and especially data available to anyone on the network without regard to the physical location of the resource and the user. High reliability- As all files could be replicated on two or three machines, so if one of them is unavailable (due to hardware failure), the other copies could be used. Scalability- It is the ability to increase system performance gradually as the workload grows just by adding more processors. A computer network can provide a powerful communication medium along widely separated employees.

TYPES OF NETWORKS
Networks are classified depending on the geographical area covered by the network.

Computer Networks

Local Area Network (LAN)

Campus Area Network (CAN)

Metropolitan Area Network (MAN)

Wide Area Network (WAN)

LAN (LOCAL AREA NETWORK) These are privately owned networks within a single building or campus of up to a few a kilometers in size. LANs are distinguished from other networks by three characteristics: 1) Their size 2) Their transmission technology 3) Their topology

LANs run at speeds of 10 to 100 Mbps, have low delays, and make very few errors. Advantages of LAN: Improves productivity due to faster work Provides easy maintenance New systems can be installed and configured easily Disadvantages of LAN: Limited number of systems can only be connected Cannot cover large area Network performance degrades as number of users exceeds LANs are classified depending on the techniques used for data sharing:-

LAN Types

Ethernet

Token Ring

Token Bus

FDDI

CAN(CAMPUS AREA NETWORK) Made up of multiple LANs within limited area Connects different LANs in a campus

MAN(METROPOLITAN AREA NETWORK) It connects two or more LANs in the same geographic area. MANs provide high-speed connections (1.544 Mbps). A MAN, for example,might connect two different buildings or offices in the same city. Supports data and voice transmission

WAN(WIDE AREA NETWORK)


It is a Computer network that spans a relatively large geographical area, often a country or continent. Typically a WAN consists of two or more Local Area Network. Computers connected to WAN are often connected through public networks such as telephone systems. They can also be connected through leased lines or satellites. The largest WAN in existence is Internet. WANs run at speed of maximum 2 to 10 mbps.

CLIENT/SERVER CONFIGURATION Consists of two elements, Client and Server. Server: A centralized element which provides resources to client Manages data, printers or network traffic Client: Manages local resources used by users such as monitor, keyboard, CPU and peripherals

TOPOLOGIES Topology refers to physical or logical arrangement of network. Physical topologies are:-

Single Node Topology Single device, at times device called dumb terminal is connected to the server Devices operates on files from server and returns them back after completing task

Advantages: Easy to install, configure and manage Least expensive Single cable is required Disadvantages: Network consists of single device Dumb terminal is dependent on server

Bus topology All devices are connected to a common cable called trunk. Maximum segment length of cable is 200 m. Maximum of 30 devices per segment .

Server is at one end and devices are at different positions Devices are not responsible for data transmission Number of collisions are more Performance degrades as more computers are added to the bus. Advantages: Installation of devices is easy Requires less cable compared to star topology Less expensive and works better for smaller networks Disadvantages: If backbone breaks, entire network gets down Difficult to isolate problems Limited number of devices

Star Topology Each device is connected to a central device called hub through cable Data passes through hub before reaching destination If a computer goes down, the network functions normally.

Advantages: Easy to install, configure, manage and expand Centralized management Addition or removal of device does not affect the whole network Disadvantages: Requires more cable Failure of hub affects entire network More Expensive

Ring Topology Devices are connected in a closed loop All devices have equal access to media Device waits for its turn to transmit

Most common type is Token Ring Each computer acts as a repeater and keeps the signal strong

Advantages: Data travels at greater speed No collisions Handles large volume of traffic Disadvantages: More cabling is required compared to bus One faulty device affects the entire network Addition of devices affect network

Mesh Topology Used in WANs to interconnect LANs Every device is connected to every other device Use routers to determine the best path of communication

Advantages: Improves fault tolerance Failure of one link does not affect entire network Centralized management is not required Disadvantages: Difficult to install and manage Each link from one device to other requires individual NIC Very much expensive

Tree Topology Connects groups of star networks Devices are wired to root hub Root hub is connected to second level devices Lowest level devices are smaller computers

Advantages: Easy to add new devices Point-to-point wiring for each device Fault detection is easy Disadvantages: Difficult to configure If backbone breaks, entire network goes down

Hybrid Topology Combines two or more different physical topologies Commonly Star-Bus or Star-Ring Star-Ring uses Multistation Access Unit (MAU)

Advantages: Used for creating larger networks Handles large volume of traffic Fault detection is easy Disadvantages: Installation and configuration is difficult More expensive than other topologies More cabling is required

CABLES
There are different Cabling options depending on the access method : Twisted pair The wires are twisted around each other to minimize interference from other twisted pairs in the cable. Twisted pair cables are available unshielded (UTP) or shielded (STP). UTP is the most common type and uses a RJ-45 Connector. Typical lengths are up to 100m. Twisted pair network uses a star topology.

Coaxial Coaxial cable uses BNC connectors. The maximum cable lengths are around 500m. Coaxial networks use a single bus topology

Fiber Optic UTP and Co-axial cables are not capable for driving the data signals for long distance i.e. UTP is capable of transmitting up to a distance 100 meters only by using the Fiber cables it is possible to send the data about 10 kilometers. Fiber optic cable uses SC, ST, LC connectors (most common in use is SC connector) In fiber cables the data is converted to light signals and the signal is made to propagate through the fiber cable. There are two types of Fibre optic cable available: Single mode: In this mode typical length is up to 12km and data rate is 1000Mbps. The core diameter is about 9.25 nm cable is known as 1000 base LX cable. Multi mode: This mode is further categorised in two: SX: Typical length is up to 500m and data rate is 1000Mbps. FX: Typical length is up to 220m and data rate is 100Mbps.

NETWORKING DEVICES
Networking devices do various kind of jobs like transferring the data to signals, providing connectivity to different network devices, transferring the data in form of packets or frames form one device to other. These are the central connections for all the network equipments and handles a data type known as frame or packet.

Network Interface Card (NIC) A Network Interface Card (NIC) is a circuit board that plugs into both clients and servers and controls the exchange of data between them (A specific softwaredriver must be installed depending on the make of the NIC. A physical transmission medium, such as twisted pair or coaxial cable interconnects all network interface cards to network hubs or switches. Hub Hub is a layer one device. i.e. it operates on the physical layer of the OSI model. It is designed to do broadcasting i.e when it gets any frame it broadcasts it to every port irrespective that whether it is destined for that port or not. Hub has no way of distinguishing which port a frame should be sent. Broadcasting results in lot of traffic on the network which lead to poor network response. If two PC simultaneously transmit there data packets and both are connected to a HUB, then collision will occur, so we can say, it creates a single collision domain. Switch Switches are intelligent devices which work on the Layer2 of the OSI model. Basically a switch keeps a record of MAC addresses of all the devices connected to it. Using this information, it builds a MAC address table. So when a frame is received, it knows exactly which port to send it to, which increases the network response time. Basic Working Principle of Switch:1. At the time of initializing the switch the MAC address table is yet to be built up. When a frame is send by some of the PC, it recognises the source MAC address and update the MAC address table. 2. If the destination is available in the MAC table then forward to the corresponding PC.

3. If the destination MAC address is not present in the table then forwards in all the port available expect the incoming one. The designated PC will respond for the data and it will send the acknowledge for the data received. This acknowledged data will be examined by the switch and the MAC address table would be up dated accordingly. If two PC simultaneously transmit there data packets and both are connected to a SWITCH, then collision will not occur, so we can say, it creates a multiple collision domain. The switch supports broadcast. Hence we can call switches create single broadcast domain and multiple collision domains. Switches are of two types 1) Managed 2) Unmanaged Router For interconnecting two LAN or two or more different networks A device known as router is used. Its main job is to route ( sends ) packets to other networks and to do the routing ( establishing paths between networks ) it uses the IP address. A router is typically connected to at least two networks, commonly two LANs or WANs or a LAN and its ISPs network. Routers are located at gateways, the places where two or more networks connect. Routers to determine the best path for forwarding the packet are using forwarding tables. It is a layer 3 device i.e it operates at network layer of OSI model. The working principle of the router is totally different from a switch. Router makes a table known as routing table, which contains all the IP address in the network, the information for IP address router obtains directly ( all configured IP address on it ) or indirectly ( from neighbour routers ). When a packet is received it compares the destination IP address of the packet with the available IP addresses in its Routing table. If the IP address is not available in the routing table then it simply discard the packet instead of flooding in all the ports like a switch.

OSI NETWORK MODEL The OSI model describes how information makes its way from application programs through a network medium to another application program in other computer. It divides one big problem in to seven smaller problems . Each problem is addressed by one of the seven layers of the OSI model.

Functions of Network Layers in Brief: APPLICATION LAYER Used for applications specifically written to run over the network Allows access to network services that support applications; Directly represents the services that directly support user applications Handles network access, flow control and error recovery Example apps are file transfer, e-mail, Net BIOS-based applications PRESENTATION LAYER Translates from application to network format and vice-versa All different formats from all sources are made into a common uniform format that the rest of the OSI model can understand Responsible for protocol conversion, character conversion, data encryption / decryption, expanding graphics commands, data compression Sets standards for different systems to provide seamless communication from multiple protocol stacks Not always implemented in a network protocol SESSION LAYER Establishes, maintains and ends sessions across the network Responsible for name recognition (identification) so only the designated parties can participate in the session

Provides synchronization services by planning check points in the data stream => if session fails, only data after the most recent checkpoint need to be transmitted Manages who can transmit data at a certain time and for how long Examples are interactive login and file transfer connections, the session would connect and re-connect if there was an interruption; recognize names in sessions and register names in history TRANSPORT LAYER Additional connection below the session layer Manages the flow control of data between parties across the network Divides streams of data into chunks or packets; the transport layer of the receiving computer reassembles the message from packets "Train" is a good analogy => the data is divided into identical units Provides error-checking to guarantee error-free data delivery, with on losses or duplications Provides acknowledgment of successful transmissions; requests retransmission if some packets dont arrive error-free Provides flow control and error-handling TCP, ARP, RARP; NETWORK LAYER Translates logical network address and names to their physical address (e.g. computer name ==> MAC address) Responsible for addressing and determining routes for sending Managing network problems such as packet switching, data congestion and routing If router cant send data frame as large as the source computer sends, the network layer compensates by breaking the data into smaller units. At the receiving end, the network layer reassembles the data Think of this layer stamping the addresses on each train car IP; ARP; RARP, ICMP; RIP; OSFP; DATA LINK LAYER Turns packets into raw bits 100101 and at the receiving end turns bits into packets. Handles data frames between the Network and Physical layers The receiving end packages raw data from the Physical layer into data frames for delivery to the Network layer Responsible for error-free transfer of frames to other computer via the Physical Layer

This layer defines the methods used to transmit and receive data on the network. It consists of the wiring, the devices use to connect the NIC to the wiring, the signaling involved to transmit / receive data and the ability to detect signaling errors on the network media Logical Link Control Error correction and flow control Manages link control and defines SAPs PHYSICAL LAYER Transmits raw bit stream over physical cable Defines cables, cards, and physical aspects Defines NIC attachments to hardware, how cable is attached to NIC Defines techniques to transfer bit stream to cable IP ADDRESSING Every machine on the internet has a unique identifying number, called an IP Address. A typical; IP address looks like this: 216.27.61.45 IP ADDRESS is a 32-bit number, usually written in dotted decimal form, that uniquely identifies an interface of some computer. This 32-bit number is divided into 4 octets each separated by a decimal. Out so many values certain values are restricted for use as typical IP address. For example, the IP address 0.0.0.0 is reserved for the default network and the address 255.255.255.255is used for broadcast. Each IP address is split into 2 sections:
1) Network address 2) Host address

Individual IP address in same network all have a different value in the host part of address, but they have identical value in network part, just as in town there are different street address but same ZIP code. There are five IP classes: Class A This class is for very large networks, such as a major international company. IP addresses with a first octet from 1 to 126 are part of this class. The other three octets are each used to identify each host. Net 54. Host or Node 24.54.43

Loopback- The IP address 127.0.0.1 is used as the loopback address. This means that it is used by the host computer to send a message back to itself. It is commonly used for troubleshooting and network testing. Class B- Class B is used for medium-sized networks. A good example is a large college campus. IP addresses with a first octet from 128 to191 are part of this class. Class B addresses also include the second octet as part of the Net identifier. The other two octets are used to identify each host. Net 145. Host or Node 24 53.198

Class C- Class C addresses are commonly used for small to mid-size business. IP addresses with a first octet from192 to 223 are part of this class. Class C addresses also include the second and third octets as part of Net identifier. The last octet is used to identify each host. Net 196. Host or Node 54.34 86

Class D- It is used for multicast. It has first bit value of 1, second bit value of 1, third bit value of 1 and fourth bit value of 0. The other 28 bits are used to identify the group of computers the multicast messages is intended for. Net 224. Host or Node 24.54.145

Class E- It is used for experimental purpose only.


Net 240. Host or Node 23.45.105

Private IP It is not necessary that every time we make a network we are connected to some ISP (Internet Service Provider). So in that case we require some private IP also which can be used in indigenous networks .In each class a range of IP addresses have been defined for this purpose CLASS A 10.0.0.1 to 10.255.255.244 CLASS B 172.16.0.1 to 172.34.255.254 CLASS C 192.168.0.0/16

MASKING Computers use a mask to define size of network and host part of an address. Mask is a 32-bit number written in dotted decimal form. It provides us the network address when we perform a Boolean AND of mask with the IP address. It also define number of host bits in an address.

SUBNETTING
Basically it is a process of subdividing networks into smaller subnets. In case we have 2-3 small networks but we cant buy IP address for each and every network. So here we use the basic concept of SUBNETTING i.e using one public IP address we will give them IP address and make them independent networks. For this we take some bits of host address and use them for network address so we have different independent networks.

Example If subnet mask is 255.255.240.0 And an IP address for a computer is given as 142.16.52.4 142.16.0.0 is network address 0.0.48.0 is the subnet address 0.0.4.4 is the host address of the computer

10001110.00010000.00110100.00000100 is ANDed with 11111111.11111111.11110000.00000000 and output is 10001110.00010000.00110000.00000000 here first two octets represents Network address and third octet represents subnet address. It can be compared with a postal address as there is only one ZIP code (Network address), different streets (Subnet address), and different house number (Host address).

TCP/IP Two layer communication protocol used by Internet. TCP provides connection-oriented reliable transport service. Divides the message into smaller packets called segments. IP is a connectionless and unreliable datagram protocol and provides no error checking. IP transfers data in the form of packets called datagrams .

TCP Segment Format

ARP/RARP To deliver packet both physical and logical addresses are necessary Address Resolution Protocol (ARP) provides physical address when logical address is known Reverse Address Resolution Protocol (RARP) maps logical address to physical address RARP is useful when device is booted for first time

ICMP/IGMP Internet Control Message Protocol (ICMP) provides error reporting and query management mechanism ICMP handles problems occurring while packet transmission Internet Group Message Protocol (IGMP) manages multicasting and group membership of devices

UDP User Datagram Protocol (UDP) provides connectionless process-to-process communication UDP packets are called user datagrams. User Datagram Format:

IPX/SPX Novell NetWare system uses IPX/SPX as communication protocol within networks IPX operates at Network layer for connectionless communication SPX operates at Transport layer for connection-oriented communication Together, IPX/SPX provides same services as TCP/IP

HDLC/SDLC High Level Data Link Control (HDLC) and Synchronous Data Link Control (SDLC) are bit-oriented synchronous protocols in which data frames are interpreted as series of bits Both are useful for half-duplex and full-duplex communication Windows XP still support DLC Types of HDLC nodes are: Primary Station Secondary Station Combined Station Supported link configurations: Unbalanced Balanced HDLC Data Transfer Modes: Normal Response Mode (NRM) Secondary station requires permission from primary station before sending data Asynchronous Response Mode (ARM) Secondary station can transfer without permission from primary station Asynchronous Balanced Mode (ABM) Either of the combined station can initiate the transmission

PART 2-CISCO ROUTER CONFGURATION BASICS

CISCO HIERARCHIAL MODEL The hierarchical network model consists of three functional layers Core layer Distribution Access layer CORE LAYER Core layer is the main layer of the network. It is responsible for fast and reliable transportation of data across a network. The core layer reduce the latency time in the delivery of packets. The core layer includes high end switch or cables. Ex- high speed wan switch (6000,5000,4000), high speed enterprise wan router (7000,7200,7500) DISTRIBUTION LAYER It is responsible for routing and managing network traffic. This layer ensures that packets are properly routed between the subnet. It is also known as workgroup layer Ex lan router, layer 3 switch , router (2600,4000) ACCESS LAYER Access layer includes hub and switch. It is also known as the desktop layer. It connects client nodes to the network.

This layer ensures that the packets are delivered to the destination computers. Ex desktop, hub , repeater.

cisco hierarchical model Example

Router Components
Processor- Cisco router has a CPU that execute the IOS commands . Cisco router use two types of processors such as Motorola 68030 and Orion/R4600. ROM Monitor used for manufacturing, testing and troubleshooting. It is a non volatile memory. POST Power On Self Test checks for basic functionality of router hardware and determines which interfaces are present or not. The post is a series of 14 tests that runs in the reverse numerical order.

Mini-IOS The mini-ios is not present in every router. The Mini-IOS component provides an alternate file for the router boot up. can also perform a few other maintenance operations. Bootstrap this program loads the IOS image for the router with the help of configuration register . this configuration register is a file that decide the boot mode for the IOS image. the register value is a set of four hexadecimal digit.tha last hexadecimal digit decide the boot up process. The values for the image are 0x0- Boots the router into ROM monitor mode. 0x1- Boots the router using the mini-ios 0x2- Boots the router using the default boot sequence. RAM holds packet buffers, ARP cache, routing table, software and data structure that allows the router to function; running-config is stored in RAM, as well as the decompressed IOS in later router models. ROM Monitor It is a program stored in the ROM which is used for debug user programs. starts and maintains the router. Flash memory It holds the IOS is not erased when the router is reloaded is an EEPROM [Electrically Erasable Programmable Read-Only Memory] created by Intel, that can be erased and reprogrammed repeatedly through an application of higher than normal electric voltage. NVRAM Non-Volatile RAM - holds router configuration is not erased when router is reloaded.

Router Boot Sequence


Router performs the POST check for testing the hardware components and memory. Bootstrap program is loaded from the ROM and executed. Bootstrap program start loading the IOS image from the location specified by the configuration register value.IOS saved in flash , RAM and TFTP server. IOS loads a configuration file present in the NVRAM into the main memory.

Router Basics Commands


We can tell in which area of the routers configuration we are by looking at the router prompts: Router> USER prompt mode Router# PRIVILEGED EXEC prompt mode Router(config) terminal configuration prompt Router(config-if) interface configuration prompt Router(config-subif) sub-interface configuration prompt

Set Router Passwords


Router(config) line console 0 Router(config-line) password hpes Router(config-line) login

Set administrative mode Password


Router(config) enable password hpes Router(config) enable secret hpes

Set Telnet Mode Passwords


Router(config) line vty 0 4 Router(config-line) password hpes Router(config-line) login

Break Password on Router Power-cycle the router when Router boots, press+Ctrl+Break Router will come in Rommon mode Rommon >Confreg 0X2142 Rommon>reset Continue with configuration dialog, press No Router will come in user mode
Router>enable Router# copy Startup-config Running-config Router(config)# enable password hpes1 Router(config)# config-register 0x2102 Router# copy running-config startup-config Router# reload

ROUTING
Routing is the process of sending a packet of information from one network to another networks,routes based on the destination network. The Administrative Distance of Common Routing Protocol Routing Type There are two basic methods of building a routing table: Statically and Dynamically Static Static routing table is created, mainted and updated by a network Administrator, manually Static routes have an administrative Distance is 1 Static will not share Static routes with each other Dynamic A dynamic routing table is created, maintained , and updated by a routing protocol running on the router Example-(RIP,EIGRP,OSPF,IGRP). There are two type of dynamic Routing Protocol Distance-vector routing Protocol Link-state routing Protocol Example of distance vector routing protocol (RIP,IGRP) Example of link state Routing Protocol (RIP2,OSPF,IS-IS) EIGRP both distance-vector and link state routing Protocol 0 Connected 1 Static 20 BGP Internal EIGRP 90 IGRP 100 OSPF 110 RIP 120

Distance Vector Routing Distance Vector is classfull Routing protocol

Periodic updates of the full routing table are sent to routing neighbors. Distance vector routing protocol uses Bellman-Ford algorithm. Distance vector routing protocol begins by advertising directly connected networks to its neighbors. (RIP every 30 seconds; IGRP every 90 seconds) Distance vector protocols utilize some form of distance to calculate a rotes metric.

Link State Routing Classless routing protocol Support for VLSM(Variable Length Subnet Mask) Connection Oriented protocol Trigger update support Link state routing protocol is used Dijkstra algorithm Link state routing protocol maintain 3 seprate tables. Neighbor Table Topology Table Routing Table

RIP v1 (Routing Information Protocol)


RIP is a standardized Distance Vector protocol, designed for use on smaller networks. RIP sends out periodic routing updates (30 sec) RIP sends out the full routing table every periodic update.

RIP uses a form of distance as its metric hopcount 15 (max.) RIP uses the Bellman ford Distance Vector algorithm to determine the best path to particular destination RIP support only Classfull IP routing protocol RIP send updates as broadcasts to address 255.255.255.255 RIP v1 not support VLSM RIP support IP and IPX routing RIP routes have an administrative distance of 120

RIP v2 (Routing Information Protocol) RIP is a standardized Distance Vector protocol, designed for use on smaller networks. RIP sends out periodic routing updates (30 sec) RIP sends out the full routing table every periodic update. RIP uses a form of distance as its metric hopcount 15 (max.) RIP uses the Bellman ford Distance Vector algorithm to determine the best path to particular destination RIP support only Classless IP routing protocol RIP send updates as multicasts address 224.0.0.9 RIP v2 support VLSM RIP support IP and IPX routing RIP routes have an administrative distance of 120

EIGRP (Enhanced Interior Gateway Routing Protocol) EIGRP is a Cisco-proprietary Hybrid routing protocol, incorporating features of both Distance-Vector and Link- State routing protocols. EIGRP uses Diffusing update algorithm to determine the best path among all feasible paths. EIGRP will form neighbor relationship with adjacent routers in the same Autonomous System (AS) EIGRP uses multicasts on address 224.0.0.10. EIGRP is a classless protocol and thus supports VLSMs. EIGRP supports IP, IPX, and Appletalk routing. EIGRP Administrative Distance is 90. EIGRP has a maximum hop-count of 224,

Neighbour Discovery and Rediscovery

OSPF (Open Shortest Path First) OSPF is a standardized Link-State routing protocol, designed to scale efficiently to support larger networks. OSPF allows for a hierarchical network design through the us of Areas OSPF uses the Dijkstra shortest path first algorithm. OSPF is a classless protocol, and thus supports VLSMs. OSPF Traffic is multicast 224.0.0.5 (all OSPF routers) or 224.0.0.6 ( all Designated Routers) OSPF support only IP routing OSPF administrative distance is 110 OSPF uses cost as its metric, which is computed based on bandwidth of the link. OSPF has no hop-count limit.

Part3-VLANs and Access-Lists

VLAN (Virtual LAN)


VLANs are used to control broadcast domain. Advantages of VLANs: Broadcast Control Broadcasts are received by every host on the switched network. In contrast, each VLAN belongs to its own broadcast domain (or IP subnet); thus broadcast traffic from one VLAN will never reach another VLAN. Security VLANs allow administrators to logically separate users and departments. Flexibility and Scalability VLANs remove the physical boundaries of a network. Users and devices can be added or moved anywhere on the physical network, and yet remain assigned to the same VLAN. VLAN membership can be configured one of two ways: Statically Individual switch-ports must be manually assigned to a VLAN. Dynamically Devices are automatically assigned into a VLAN based on its MAC address. Cisco developed a dynamic VLAN product called the VLAN Membership policy Server (VMPS). Configure VLAN

Switch(config)#vlan 2 Switch(config-vlan)#name sales Switch(config-vlan)#exit Switch(config)#vlan 3 Switch(config-vlan)#name it Switch(config)# vlan 4 Switch(config-vlan)# name HR Switch# show vlan Add pc to Vlan Switch(config)# int fa0/1 Switch(config-if)# switchport access vlan 2

VTP (VLAN Trunking Protocol) In large switching environments, it can become difficult to maintain a consistent VLAN database across all switches on the network. VTP allows the VLAN database to be easily managed throughout the network. By default, VTP updates are sent out every 300 seconds.

VTP Modes: Server Only VTP servers can create, modify or delete entries in the VLAN database. Servers advertise their VLAN database to all other switches on the network. Server can only advertise VLANs 1-1005 Client VTP clients cannot make modifications to the VLAN database, A client will also forward an update from a server to other clients. Transparent VTP transparent switches will not advertise or accept any VLAN database information from other switches (even a server).

Access Control Lists Access lists cause a router to discard some packets based on criteria defined by the network engineer. The goal of these filters is to prevent unwanted traffic in the networkwhether to prevent hackers from penetrating the network, or just to prevent employees from using systems that they should not be using. Key features of access lists: Packets can be filtered as they enter an interface, before the routing decision. Packets can be filtered before they exit an interface, after the routing decision. Deny is the term used in Cisco IOS software to imply that the packet will be filtered. Permit is the term used in Cisco IOS software to imply that the packet will not be filtered. The filtering logic is configured in the access list. At the end of every access list is an implied deny all traffic statement. Therefore, if a packet does not match any of your access list statements, it is blocked. Two types of configured Access lists: IP standard access list IP extended access list 1-99 100-199

Standard access list is based on layer 3 information, i.e. based on Source address. It is created on destination Routers destination port as outbound. Extended access list is based on layer3 and layer 4 information .It is created on Source Routers Source port as inbound.

Part 4-WANs

Integrated Services Digital Network (ISDN) ISDNs primary goal is the integration of voice and nonvoice services. ISDN is actually a set of communication protocols proposed by telephone companies that allows them to carry a group of digital services that simultaneously convey data, text, voice, music, graphics, and video to end users, and it was designed to achieve this over the telephone systems already in place. There are two types of channels: B channel D channel B channel
Bearer channels (B channels) are used to transport data. B channels are called bearer channels because they bear the burden of transporting the data. B channels operate at speeds of up to 64 kbps.

D channel
D channels are used for signaling. They are used to establish the session before the data is actually transfer.

ISDN INTERFACES Types of ISDN interfaces: 1) Basic Rate Interface (BRI) 2) Primary Rate Interface (PRI). BRI: ISDN Basic Rate Interface (BRI, also known as 2B+1D) service provides two B channels and one D channel. The BRI B-channel service operates at 64Kbps and carries data, while the BRI D-channel service operates at 16Kbps and usually carries control and signaling information. PRI: According to American standards , the ISDN Primary Rate Interface (PRI, also known as 23B+D1) service delivers 23 64Kbps B channels and one 64Kbps D channel for a total bit rate of up to 1.544Mbps. And according to European standards, ISDN provides 30 64Kbps B channels and one 64Kbps D channel for a total bit rate of up to 2.048Mbps.

Network Address Translation (NAT) Method in which a systems IP address is changed into a different IP address before its sent out to an external network (Internet) Enables the private network (Intranet) to use addresses that differs from the actual IP address on the Internet Allows address hiding, thus it acts as a firewall Web servers cannot be used as NAT clients Provides a strong protection against unauthorized users Advantages: Hides internal structure of the network and increases network security Allows unlimited class C network address Helps in maintaining same internal networks IP address when a computer is attached to the Internet Disadvantages: Changes IP addresses, thus troubleshooting becomes more complex Blocks incoming connections Static NAT A private (internal network) IP address is converted to a public IP address, which is always static (always remains same An internal network IP address is mapped to a registered IP address on one-toone basis

Dynamic NAT An unregistered IP address is represented to a registered IP address from a set of registered IP addresses A computer with IP address 25.0.18.25 will translate to first available IP into a particular range for example from 28.35.15.100 to 28.35.15.125

Working of NAT When packets of information are received from the outside network, NAT enabled router checks destination address and destination port on the packet Router checks whether packet belongs to that network in translation table Packet is rejected if it does not find any match in the translation table Else router changes destination address to the one saved in address translation table and sends it to that computer Computer receives the packet from the router

Frame Relay Frame Relay is a standardized wide area network technology that specifies the physical and logical link layers of digital telecommunications channels using a packet switching methodology. Originally designed for transport across Integrated Services Digital Network (ISDN) infrastructure, it may be used today in the context of many other network interfaces.

Network providers commonly implement Frame Relay for voice (VoFR) and data as an encapsulation technique, used between local area networks (LANs) over a wide area network (WAN). Each end-user gets a private line (or leased line) to a Frame Relay node. The Frame Relay network handles the transmission over a frequently-changing path transparent to all end-users. Frame Relay has become one of the most extensively-used WAN protocols. Its cheapness (compared to leased lines) provided one reason for its popularity. The extreme simplicity of configuring user equipment in a Frame Relay network offers another reason for Frame Relay's popularity.

Project Details

Name-Internetworking devices and their configuration Devices involved Routers Switches Multilayer Switches Servers Concepts implemented Rip Routing DNS Server WEB Server VLAN Inter Vlan Routing TFTP backup Server NAT Telnet

Screen Shot Of The Project

Inter VLAN Routing :-

In switch VLAN has been created and for communication, Inter VLAN Routing has been used.

NATTING(Different ip conversions for different VLANs):-

Natting has been performed on the multilayer switch connected to India in order to prevent VLAN 2 users of India from communicating with VLAN 2 users of UK.

WEB Server:-

Web Servers of Cisco and Yahoo are accessible by all the users in the WAN.

RIP Routing:-

RIP Routing protocol has been used in the project in order to route the packets from source to destination.

DNS Server:-

Two DNS servers have been created so that PCs should access server nearer to them.PCs from India will access DNS1 server and PCs from USA,UK will access DNS server.

BIBLIOGRAPHY
Wikipedia CCNA lab manual CCNA study guide 6th edition-Tod Lammie CCNA exploration companion guide-Routing protocols and concepts CCNA exploration companion guide-Network fundamentals CCNA exploration companion guide-LAN switching and Wireless CCNA exploration companion guide-accessing the WAN Network Design and Management-HPES

Potrebbero piacerti anche