Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Apex of Learning
Networking
CCNA
Definition : = An interconnected or interrelated chain,
group, or system.
Basic connectivity
Living in a Network Centric World
Chapter 01
• Network Fundamental
MGMT. Hostel
Block
Metropolitan Area Network
Delhi West
Delhi East
Delhi North
Delhi South
Wide Area Network
Delhi Pune
Indore
Assam
Types of Communication
• Unicast
When you talk to your gf /bf in private. The conversation takes places only
between two persons. “”
Unicast messaging is used for all network processes in which a private or
unique resource is requested.
Unicasting in terms of Network
Multicast
It is an Intrusion Detection
System, attempts to discover
unauthorized access to
a computer network by analyzing
traffic on the network for signs
of malicious activity.
LOAD BALANCER
A star topology
connects all cables to
a central point of
concentration.
EXTENDED STAR TOPOLOGY
An extended star
topology links
individual stars
together by
connecting the
hubs and/or switch.
This topology can
extend the scope
and coverage of
the network.
MESH TOPOLOGY
A mesh topology is
implemented to provide as
much protection as possible
from interruption of service.
A hierarchical
topology is similar
to an extended
star.
OSI Layers
Chapter-4
Communication???
Layer - 3 Network
Lower Layer
Layer - 2 Data Link or
Hardware Layer
Layer - 1 Physical
Application Layer
• It deals with Networking Application.
• It acts as an interface between the actual
application program.
Presentation
Session
Transport
Network
Data Link
Physical
Presentation Layer
• It ensures that data transferred from application layer of one
system can be read by application layer of other system.
• The presentation layer determines how data is transmitted and
represented to the user.
• It’s responsible for converting data into standard format which
may include:
JPEG, MPEG, BMP, MIDI, WAV, MP3
Tasks which can be performed:
a) Compression >< Decompression
b) Encryption >< Decryption
PDU- Formatted DATA
How Data Flows in Presentation
Layer
Application Data
Presentation Data
Session
Transport
Network
Data Link
Physical
ENCAPSULATION & DECAPSULATION IN OSI
MODEL
Session Layer
• This layer establishes, manages, and terminates sessions
between Peer to Peer.
• It keep different application’s data separate from other
applications.
Presentation Data
Session Data
Transport
Network
Data Link
Physical
Transport Layer
• Efficient guaranteed delivery is provided through
sequencing, acknowledgement & flow control.
SEGMENT = TCP/UDP Header + DATA
• It provides error correction before transmitting thus
insure reliable data transport .
a) UDP Protocol - unreliable & connectionless, used in
LIVE SCENARIOS.
b ) TCP Protocol - Reliable because of 3-way
handshake
PDU- SEGMENTS
TCP vs UDP
• Transmission Control • User Datagram
Protocol Protocol
• Acknowledgement • No Acknowledgement
• Reliable • Unreliable
• Slower • Faster
Segmentation
A B
Sequencing & Reassembling
you
Hello!
How ?
are
A B
Sequencing & Reassembling
Hello!
How are
you ?
A B
Error Correction
Hello!
How are
you ?
A B
How data flow in Transport Layer
Application Data
Presentation Data
Session Data
Transport Segment
Network
Data Link
Physical
Protocols
• Set of rules & Regulations for devices to
communicate.
• Ex. ENGLISH LANGUAGE.
Network Layer
• It use Logical Addressing(IP Addressing).
• Makes “Best Path Determination”
decisions based on Logical Addressing.
PACKET = S. IP + D. IP + TCP/UDP +
DATA
• Packet size is from 64 bytes to 1500 bytes.
PDU- PACKETS
Network Layer Protocols
• IP Address
• Routing
It is a medium for communication
between two different Networks.
How data flow in Network Layer
Application Data
Presentation Data
Session Data
Network Packet
Data Link
Physical
Data-Link Layer
• Its responsible for PHYSICAL
ADDRESSING(MAC ADDRESSING).
• It perform Error Detection & not
correction.
• Receives PACKETS from upper layer &
convert it into FRAMES.
FRAME = S. MAC + D. MAC + S. IP + D.
IP + TCP/UDP + DATA
PDU- FRAMES
Data-Link Layer Protocols
• MAC Address
It’s a 48 bits Hexadecimal address.
Switch learns MAC Address and store it
in MAC Address TABLE on ASIC CHIP.
Switch's First attempt is Broadcast and
then Unicast, till the time MAC TABLE
didn’t FLUSH OUT.
• Address Resolution Protocol (ARP)
Its used to get the MAC Address of
unknown device with the help of
IP Address when two devices are
communicating for the First Time.
Presentation Data
Session Data
Transport Segment
Physical
Physical Layer
PDU-
BITS
How data flow in Physical Layer
Application Data
Presentation Data
Session Data
Transport Segment
Network Packet
Physical Bits
A B
Data
Application Data Application
Transport TH
Segment
Data TH
Segment
Data Transport TH
Network NHPacket
Segment NHPacket
Segment Network NH
Data Link DH
Packet
DTFrame
Packet Data LinkDH
DT
PacketDT
Packet
DHFrame
• Structure of an IP address
• Subnetting
• CIDR
• IP Version 6 addresses
What’s an IP Address..??
• An IP address is a 32 bit long, Logical Address
for a network interface.
• If a computer is communicating with
the Internet, then, actually its using an
IP address.
Example: 176.156.2.1
Dotted Decimal Notation
128.143.137.144
Decimal to Binary Conversion
• Example : 192.168.10.2
128 64 32 16 8 4 2 1
• For the first octet: 192 we have to add = 128 + 64 = 192
so we get in binary = 1 1 0 0 0 0 0 0
similarly
For 2nd octet = 1 0 1 0 1 0 0 0
For 3rd octet = 0 0 0 0 1 0 1 0
For 4th octet = 0 0 0 0 0 0 1 0
So IP address in binary is
1 1 0 0 0 0 0 0. 1 0 1 0 1 0 0 0. 0 0 0 0 1 0 1 0. 0 0 0 0 0 0 1 0
Binary to Decimal Conversion
IP Address’s Uniqueness
• Example: abhijit.eie.azureskynet.Braintech
128.143 137.144
11111111.00000000.00000000.00000000
Class B : N.N.H.H
11111111.11111111.00000000.00000000
Class C : N.N.N.H
11111111.11111111.11111111.00000000
Types of IP Address
Public IP Address: Its used for connectivity with WAN.
Private IP Address: non routable, cant travel without
NAT. There are certain addresses in
each class of IP address that are
reserved for LAN.
Range of Private IP Address
Class A
10.0.0.0 to
10.255.255.255
Class B
172.16.0.0 to 172.31.255.255
Class C
192.168.0.0 to 192.168.255.255
IP Address Classes
Chapter-6
Classes of IP Addresses
Total IP Addressing Scheme is divided into 5 Classes.
Class A 0
Network Prefix Host Number
8 bits 24 bits
bit # 0 1 2 15 16 31
bit # 0 1 2 3 23 24 31
bit # 0 1 2 3 4 5 31
No. of Networks
•= 2^7
•= 128 – 2 (-2 is for 0 & 127 Network)
•= 126 Networks
No. of Host
•= 224 – 2 (-2 is for Network ID & Broadcast ID)
•= 16777216 - 2
•= 16777214 Hosts/Network
Class B
• Range: 128 to 191
• N.N.H.H
• 16 bits reserved for Network & 16 for Hosts.
Class B Number of networks & Hosts
No. of Networks
•= 2^(16)
•= 65536 - 2 Networks
•= 65534 Network
No. of Host
•= 216 – 2 (-2 is for Network ID & Broadcast ID)
•= 65536 - 2
•= 65534 Hosts
Class C
• Range: 192 to 223
• N.N.N.H
• 24 bits reserved for Network & 8 for Hosts.
• Most Commonly used because wastage of
IP Addresses is Avoided.
Class C Number of networks & Hosts
No. of Networks
•= 224
•= 16777216- 2 Networks
•= 1,67,77,214 Networks
No. of Host
•= 28 – 2 (-2 is for Network ID & Broadcast
ID)
•= 256 - 2
•= 254 Hosts
Valid IP Addresses
• It lies between the Network Address and the
Broadcast Address.
eg: 192.168.1.0/24
192.168.1.1 to
192.168.1.254
• Valid IP Addresses
N = 2^2 = 4
2) Find Subnet Mask. 255.255.255.192
3) Find Block Size. 256 - 192 = 64
4) Find Number of Host. 2^6 - 2 = 64 - 2 = 62
192.200.200.0 192.200.200.64
192.200.200.128 192.200.200.192
For Class B
1) N = 7,
2) S.M. = 255.255.254.0,
3) B.S.=2,
4) H=2^9 - 2= 512-2=510
Variable Length Subnet Mask
• It’s used to reduce number of IP Addresses.
• In VLSM, we calculate number of IP Addresses
based on the nodes, which means
Based on Number of Host Bits.
Steps for VLSM
1) Find the largest segment in the area.
2) Follow all the 4 steps of Subnetting.
192.200.200.0/24 192.200.200.64
LAN 1 to
30 Devices 192.200.200.95
LAN 4
6 Devices
192.200.200.112
to
192.200.200.120
R1 R2 R3
Global
Configuration
Enable/ Mode
User Mode
Privilege Mode • Interface Configuration
Mode
• Sub-Interface Mode
• Router Mode
• Its used for user login.
User Mode • Very basic commands can be used here.
“Router>” • It’s a default mode.
Acknowledgement
Request
Offer
Discover
DHCP Configuration
int $ f0/0 Router
Version 11
11.1, 11.2 11.3, 11.4
Version 12
12.1, 12.2 12.3, 12.4
• Version 15 (LATEST)
Fundamental Terminologies
• Serial
• Clock Rate
• Fast-Ethernet
• Console
• Auxilliary
Serial
Types of Serial
DCE: Data Communication Equipment
Clock-Rate is to be given here.
DTE: Data Terminal Equipment
Console
It’s used to configure Cisco device viz Router or Switch.
Auxiliary
• It’s used for MODEM's connectivity. Can be used
as a Console cable for configuration purpose.
Flash
It’s used to store IOS.
It can be said that its Router's HDD.
Global
Configuration
Enable/ Mode
User Mode
Privilege Mode • Interface Configuration
Mode
• Sub-Interface Mode
• Router Mode
• Its used for user login.
User Mode • Very basic commands can be used here.
“Router>” • It’s a default mode.
• Use basic commands, Ping, tracert, Telnet
• Sub-Interface Mode:
Router(config-subif)#
It’s used to make logical interfaces.
• Router Mode:
Router(config-router)#
It’s used for Routing Protocols
RIP, EIGRP OSPF
• Line Mode
– Router(config-line)#
– In this mode, Console, Telnet & Auxiliary password can be set.
Password Setting
• Simple Text Password:
#enable $ password $ pune
• Encrypted Password:
#enable $ secret $ pune123
• Telnet Password
#conf $ t
#line $ vty $ 0 $ 2
#password $ pune
#login
#exit
Enable Password is “MUST” for
configuring Telnet Password.
• Console Password
#conf $ t
#line $ console $ 0
#password $ pune
#login
Static RIP
Distance
Routing vector
To Verify:
R# show ip route
Dynamic Routing Protocol
• It dynamically learn about route and do send
route information to the neighbor router.
• In dynamic routing we always define
directly connected network.
Dynamic Routing Protocol Types
RIP
Distance
vector
Dynamic
Routing OSPF Link State
EIGRP
Hybrid
Protocol
Distance Vector Routing
• It selects the route based on distance i.e. hop
count.
• When a packet cross a router i.e. called hop.
• It will select the route, which provides a
network after crossing least hop.
eg: RIP
Routing Information Protocols(RIP)
• RIP is a true distance-vector routing protocol.
• RIP only use the hop count to determine the best path to
a remote network.
• RIP sends the complete routing table out to all active interface
every 30 sec.
• RIP maximum allowable hop count of 15 by default.
• It has two version.
Version 1
Version 2
Configuration for RIP Routing
R(config)# router rip
R(config-router)# network<connected network>
For RIPv2
R(config)#router rip
R(config-router)#version $ 2
R(config-router)#network <connected network>
To Verify:
R# show ip route
R# show ip protocol
R#debug ip rip
RIP version 1 RIP version 2
Routing Distance Classless Uses Use of Max Auto Support Supports Uses
Protocol Vector Routing Hold- Split Hop Summary CIDR VLSM Authen-
Protocol Down Horizon count tication
Timers or = 15
Split
Horizon
w/
Poison
Reverse
RIPv2 Yes Yes Yes Yes Yes Yes Yes Yes Yes
Link-State Routing Protocols
• Contents of LSP:
State of each Directly
Connected Network.
Includes information
about neighbors such as
Neighbor ID, Link-Type &
Bandwidth.
Open Shortest
Path First
Protocol Number-
88
Introduction to OSPF
• It’s an Interior Gateway, Classless, Link-State
Routing Protocol.
• It only sends the information or change in
Network Topology which the other device
requires.
• It work on the Metric of COST.
Introduction to OSPF
• It’s an Open Standard, classless(VLSM) Protocol.
• It uses Virtual-Link, Router ID, Process ID (1-65535),
Wild-Card Mask with Unlimited Hop-Count,
Designated Router(DR) & Backup Designated
Router(BDR).
• It’s working is based on Areas, namely: Backbone
Area, Area Border Router (ABR) & Autonomous
Synchronous Border Router (ASBR).
• It uses 224.0.0.5 for Multicast for all Routers in OSPF
& 224.0.0.6 for Designated Router (DR).
OSPF Terms: DR & BDR
Process ID
It defines that how many Networks or Routers are connected in
same Administrative Unit.
Range: 1-65535 Given by IANA.
OSPF Routing Tables
Link Cost
• The value assigned to a Link, rather than Hope.
• Link-State protocol assigns a cost to a link,
which is based on the Bandwidth of the LINK
(Transmission Speed).
Routing Table/Forwarding Database
• Routing Table for each Router is unique.
• It’s generated when an algorithm starts
running on the Link-State Database.
DR Requirements
1) Higher Priority
Default Priority is 1 & max. can be 255.
If Priority is zero then Router will not
participate in DR & BDR Election.
2) Router ID
• It’s based on
Highest Loopback
Highest Physical Interface IP
It can be Manually configured
OSPF Metric
• OSPF metric is COST.
Formula for Cost: 100 Mbps
Bandwidth
Link Cost
• The value assigned to a Link, rather than Hope.
• Link-State protocol assigns a cost to a link,
which is based on the Bandwidth of the LINK
(Transmission Speed).
OSPF Routers
Backbone Router
R3
Area 0
R4
Area 2
R2
BANDWIDTH
(K1)
Metric Calculation
Protocol InDependent
Module (PDM)
Reliable Transport
Protocol (RTP)
Types of Routing Table
RT
• Routing Table Diffusing Update
Algorithm (DUAL)
NT
• Neighbor-ship Table
TT
• Topology Table
• Hello Dead Timer: 15 sec for Broadcast & Point-Point
– 180 sec for Broadcast
To Verify:
R# show ip eigrp neighbor
R# show ip eigrp topology (won’t show FS)
Switching
Chapter-12
• Switch provides
Reliable & Manageable Network.
• Good network design will improve performance and
also reduce the difficulties associated.
Switches
• Layer 2 Switches
Performs only Switching.
• Layer 3 Switches
Switching as well as Routing can be
performed.
Layer-1 (Physical Layer) Layer-2 (Data-Link Layer) Layer-3 (Multi-layer)
Global
Enable/ Configuration
User Mode Privilege Mode
• Interface
Mode Configuration Mode
• VLAN Mode
• Line Mode
• Its used for user login.
User Mode • Very basic commands can be used here.
“Switch>” • It’s a default mode.
• VLAN Mode:
Switch(config-VLAN)#
It’s used to enter into VLAN mode.
Virtual LAN (VLAN)
VLAN
EXTENDED RANGE
1006 - 4094
Configuration for VLAN
Switch#configure $ terminal
Switch(config)# vlan $ vlan-number
Switch(config-vlan)# Name $ name
Trunk
• Trunk is the link which carries
all the VLAN Traffic.
• Trunk ports are configured when:
Two Switches OR
Switch & Router are connected.
Types of Trunk
• Static Trunk
It’s to be configured by the Network Admin
Manually.
Switch(c0nfig)#interface $ int-number
Switch(config-if)#switchport $ mode $
trunk
• Dynamic Trunk
By Default, it’s created on a Switch through DTP
Packets.
By Default, all Switch ports are in Dynamic Mode.
Inter-VLAN Routing
• It’s used in communication between different
VLANs.
• A Layer- 3 Device is required.
Eg: Router
• Sub-interfaces need to be configured, on
Router.
It’s tough to create VLAN on each & every port of
Switch, That’s why
VLAN Trunking Protocol ( VTP)
All switches can be managed through a single switch,
through VTP.
VTP Versions:
VTP Version 1
VTP Version 2
VTP Version 3
Administrator have to define each & every VLAN
individually, for Security Purpose.
VTP Modes
SWITCH3
Transparent Client
Server
SWITCH1 SWITCH2 Vlan 2 Vlan 3
SWITCH4
Vlan1 Client
Vlan1
Vlan 2
Vlan 3
Vlan 3 Vlan 2 Vlan1
If two or more Switches are connected with each other then
loops can occur.
More
Preferred
Root Port (RP)
• Lowest Best Path to Root-Bridge will be elected
as RP.
Root Port Election
Lowest Path Cost (depend on Link Band-Width)
Lowest Neighbor Sender Bridge ID
Lowest Neighbor Port Priority(Default 128, increases by 16)
Lowest Neighbor Port ID Speed Cost
10 mbps 100
100 mbps 19
1 GB 4
10 GB 2
Designated Port (DP)
• It’s used to transmit the BPDUs.
Designated Port Election
It’s same as the Election of Root Port (RP).
All ports of Root Bridge Switch, will be DP because it’s
used to communicate, as a head starter.
Switch B has DP because:
Cost is same.
Priority is same as 32768.
Switch B is preferred over Switch C because it has
Lower MAC-Address.
Blocked Port
• It only receive BPDUs & doesn’t transmit.
• It’s Temporarily Blocked it’s blocked only till
the time the port against it is DP.
SPANNING TREE TIMERS
Local Addresses may not be used Public Addresses are Globally Unique.
externally.
192.168.1.0/24 172.168.1.0/24
Inside Global Outside Global
R1 ISP R3
10.1.1.0/24 30.1.1.0/24
1 2 3 7 8 9
NAT Terminology
INSIDE LOCAL
The term “inside” refers to an address used for a host inside an enterprise.
It is the actual IP address assigned to a host in the private enterprise network.
It is a Private Address.
INSIDE GLOBAL
NAT uses an “Inside Global” address to represent the inside host as the packet is
sent through the outside network, typically the Internet.
A NAT router changes the source IP address of a packet sent by an inside host from
an inside local address to an inside global address as the packet goes from the inside
to the outside network.
NAT Terminology
OUTSIDE GLOBAL
The term “Outside” refers to an address used for a host outside an enterprise, the
Internet.
An outside global is the actual IP address assigned to a host that resides in the
outside network, typically the Internet.
OUTSIDE LOCAL
NAT uses an outside local address to represent the outside host as the packet is
sent through the private enterprise network.
Numbered Named
ACL ACL
Link Local:
Range: FE80::/10
Unique Local:
Range: FC00::/8
Multicast:
Range: FF00::/8
• EIGRPv6:
– Works on 88-IP protocol Number
– Multicast Address used is FF02::A
– All features are same as IPv4, EIGRP.
• OSPFv3:
– Works on 89-IP protocol Number
– Multicast Address used is FF02::5( for broadcast to all) &
FF02::6(for multicast to Designated Router)
– All features are same as IPv4, OSPF.