october 31. 2015. tools hardware; -router -switch -laptop/pc -console cable -ethernet cable...

Post on 18-Jan-2016

217 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

October 31. 2015

ToolsHardware;- Router- Switch- Laptop/PC- Console cable- Ethernet Cable (Cat5(e)/Cat6)

Software;- CIOS- Packet Tracer

ICONS

What is a Router?

A router is a device that forwards data/voice packets along networks.

A router is a device that routes network traffic

What is a Switch?

A switch serves as a controller, enabling networked devices to talk to each other

Managed Unmanaged

Device and Port/Interface Identification

Exercise 1.

1. Identify a router2. Identify a switch3. Identify all interfaces on your router and switch4. Identify all cables and connectors.

Exercise 21. Install any terminal of your choice (Putty, secureCRT, Teraterm)2. Configure serial line connection settings

i. Speed = 9600ii. Data bits = 8iii. Stop bits = 1iv. Parity = Nonev. Flow Control = XON/XOFF

3. Power on devices.4. Examine the boot process.

Packet Tracer

The language.

- Computers only understand the language of zeros and ones.

Binary

Understanding IP Addressing

Understanding IP AddressingIP Address: A logical numeric address that is assigned to every single computer, printer, switch, router or any other device that is part of a TCP/IP-based networkSubnet: A separate and identifiable portion of an organization's network, typically arranged on one floor, building or geographical locationSubnet Mask: A 32-bit number used to differentiate the network component of an IP address by dividing the IP address into a network address and host addressNetwork Interface Card (NIC): A computer hardware component that allows a computer to connect to a network

Understanding IP AddressingDHCP: Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers (i.e., a scope) configured for a given networkTFTP: Trivial File Transfer Protocol (TFTP) is a simple, lock-step, file transfer protocol which allows a client to get from or put a file onto a remote host. DMARC: The separation point between carrier equipment and CPE.DNS (Domain Name System) A system used on the Internet for translating names of network nodes into addresses.HTTP (Hypertext Transfer Protocol)The protocol used by web browsers and web servers to transfer files, such as text and graphic files.

Understanding IP AddressingHTTPS (Hypertext Transfer Protocol Secure)The protocol used by web browsers and web servers to transfer files, such as text and graphic files securely.

Port NumberA field in a TCP or UDP header that identifies the application that either sent or should receive the data inside the data segment.

Common ports include: 80, 443, 110, 21, 3389, 25, 5060

RAM (Random-access Memory) A type of volatile memory that can be read and written by a microprocessor.

Understanding IP AddressingNVRAM (Non-Volatile Random-access Memory) A type of non volatile memory that can be read and written by a microprocessor and retains information when powered off.

Routing Protocol

A protocol that accomplishes routing through the implementation of a specific routing algorithm. Examples include the Interior Gateway Routing Protocol (IGRP), the Open Shortest Path First (OSPF) protocol, and the Routing Information Protocol (RIP).

Subnetting.

Classful IP Addressing.

Subnetting.

Subnet Mask based on Class

Converting Decimals to Binary .

2n

2n

17 16 15 14 13 12 11 10 Bits

27 26 25 24 23 22 21 20 2 raised to bit value

128 64 32 16 8 4 2 1 Actuals

128 192 224 240 248 252 254 255 SubnetMask

1 0 1 0 1 0 1 1

Exercise: Convert 171 to binary

Converting Decimals to Binary .

Converting Decimals to Binary .Exercise 2.

1.Question 1: Convert

255 from decimal to binary.

2.Question 2: Convert 187 from decimal to binary.

3.Question 5: Convert 241 from binary to decimal.

4. Question 3: Convert 223 from decimal to binary.

5. Question 4: Convert 240 from decimal to binary.

Converting Decimals to Binary .

Converting Decimals to Binary .

Cisco Devices/ IOS

Open Systems Interconnection model (OSI)

is a conceptual model that characterizes and standardizes the internal functions of a communication system by partitioning it into abstraction layers.

7. Application6. Presentation5. Session4. Transport3. Network2. Data link1. Physical

7. Anyway6. Packets5. Stupid4. Those3. Need2. Don’t1. People

Please Do Not Tell Sales People Anything

Please Do Not Tell Sales People Anything

Physical (Layer 1)

It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects.

e.g RJ45

Please Do Not Tell Sales People Anything

Data Link (Layer 2)At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization.

The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking.

e.g. PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE 802.3/802.2, HDLC

Please Do Not Tell Sales People Anything

Network (Layer 3)This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling,

e.g. AppleTalk, IP,

Please Do Not Tell Sales People Anything

Transport (Layer 4)This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.

e.g SPX, TCP, UDP.

Please Do Not Tell Sales People Anything

Session (Layer 5)This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination.

- e.g. RPC, SQL.

Please Do Not Tell Sales People Anything

Presentation (Layer 6)

This layer provides independence from differences in data representation by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems.

TIFF, GIF, JPEG, MPEG, MIDI.

Please Do Not Tell Sales People Anything

Application (Layer 7)

This layer supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified.

file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application

e.g. browsers, NFS, SNMP, Telnet, HTTP, FTP

Please Do Not Tell Sales People Anything

3:11:11:12:1

Please Do Not Tell Sales People Anything

Please Do Not Tell Sales People Anything

Please Do Not Tell Sales People Anything

Please Do Not Tell Sales People Anything

Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two)

A. The transport layer divides a data stream into segments and may add reliability and flow control information.

B. The data link layer adds physical source and destination addresses and an FCS to the segment.

C. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.

D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.

E. The presentation layer translates bits into voltages for transmission across the physical link.

Please Do Not Tell Sales People Anything

A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the network administrator is using for this operation?

A. applicationB. presentationC. sessionD. transportE. internetF. data link

Please Do Not Tell Sales People Anything

A receiving host computes the checksum on a frame and determines that the frame is damaged. The frame is then discarded. At which OSI layer did this happen?

A. sessionB. networkC. physicalD. data linkE. transport

Please Do Not Tell Sales People Anything

At which layer of the OSI model is RSTP used to prevent loops?

A. data link B. network C. physical D. transport

Please Do Not Tell Sales People Anything

Routers are Computers

Routers are at the Center of every Network

What is a Router?

Main Function

Is to router or forward packets destined for local and remote network by determining best path

What is a Router?

CPURAMROMOperating system

CPURAMROMFlash memoryNVRAM

Routers are Computers

Cisco Devices/ IOS

CPU

The CPU executes operating system instructions such as

1. System initialization2. Routing Functions3. Network interface Control

RAM

Stores information or instructions needed to be executed such as

4. Operating system (Copied to RAM during bootup)5. Running Configuration6. IP Routing Tables7. ARP Cache (Maps IP addresses to MAC addresses)

ROMRead only memory is permanent storage. Cisco devices use ROM to store8. Bootstrap instructions9. Basic diagnostics software10. A scaled down version of IOS

Flash Memory

This is non volatile computer memory that can be electronically erased and reprogrammed. It is used as a permanent storage of the;

1. Operating system (CIOS)

NVRAM

This is also non volatile Random Access Memory which is used to store

1. The start-up configuration file.

The Boot Process

The Boot Process

The Boot Process

The Boot Process

A Cisco router is booting and has just completed the POST process. It is now ready to find and load an IOS image. What function does the router perform next?

A. It checks the configuration registerB. It attempts to boot from a TFTP serverC. It loads the first image file in flash memoryD. It inspects the configuration file in NVRAM for boot instructions

CLI Configuration and Addressing-Basic Router Configuration

User EXEC Mode The default command mode for the CLI is user EXEC mode. the user EXEC commands allow you to connect to remote devices, perform basic tests, and list system information. Router>.

Privileged EXEC Mode Privileged EXEC mode is password protected, and allows the use of all EXEC mode commands available on the system. Router# . Global Configuration Mode Global configuration commands generally apply to features that affect the system as a whole, rather than just one protocol or interface. Router(config)# .

ROM Monitor Mode, and Setup Mode (ignore)

Basic Router Configuration When configuring a router, certain basic tasks are performed. Including the following

1. Name the router.2. Setting password.3. Configuring interfaces.4. Configuring a banner.5. Saving changes on a router.6. Verifying basic configuration and router operations.

Appendix 1A

A network administrator needs to allow only one Telnet connection to a router. Which set of commands will accomplish this task?

A. access-list 1 permit 192.168.1.0 0.0.0.255 line vty 0 4 login password cisco access-class 1B. enable password secret line vty 0 login password ciscoC. line vty 1 login password ciscoD. line vty 0 4 login password cisco

Routers are at the Center of every Network

Subnet Mask / # of Host

Subnet Mask / # of Host

Subnets = 2n

Host = 2n -2n= # of borrowed bits

Subnet Mask / # of Host

16 hosts < 25 – 2 (we need to borrow 5 bits -> /27)

11 hosts < 24 – 2 (borrow 4 bits -> /28)

5 hosts < 23 – 2 (borrow 3 bits -> /29)

Subnet Mask / # of Host

Convert the following binary to decimal--01101101. 225

109 1101

112

Subnet Mask / # of Host

What address Class does 172.16.33.1/24 belong to? Class AClass B Class CClass D

Subnet Mask / # of Host

When calculating usable hosts per subnet, the following formula is used 2^bits - 2. For what reason is two subtracted? (choose two) BroadcastMulticastUnicastNetwork

Subnet Mask / # of Host

Your organization is designing a Wide Area Network. Locations have varying numbers of hosts. The largest network will have no more than 55 hosts. What subnet mask accomplishes the goal and maximizes the number of subnets that may be created? A: 255.255.255.192 B: /25C: 255.255.255.224D: /27

Subnet Mask / # of Host

What are two ways to represent a network mask that would allow 14 hosts? A: /14B: 255.255.255.240 C: 255.255.14.0D: /28

Subnet Mask / # of Host

Based on 1.1.1.0/24, the IP address would be: Class A Class BClass CClass D

Subnet Mask / # of Host

How many hosts can be located on a network, where the IPv4 netmask is 27 bits? A: 27B: 30 C: 32D: 5

Appendix 1B-1Appendix 1B

CDPCisco Discovery Protocol

CDP is primarily used to obtain protocol addresses of direct neighboring devices and discover the platform of those devices

Command Purpose Router(config)# cdp run Enables CDP on the system.

Router(config)# no cdp run Disables CDP on the system.

Router(config-if)# cdp enable Enables CDP on an interface.

Router(config-if)# no cdp enable Disables CDP on an interface.

Router# show cdp neighbour

Collision & Broadcast domain

A collision domain is, as the name implies, a part of a network where packet collisions can occur. A collision occurs when two devices send a packet at the same time on the shared network segment. The packets collide and both devices must send the packets again, which reduces network efficiency. HUB and SWITCHES

A broadcast domain is a domain in which a broadcast is forwarded. A broadcast domain contains all devices that can reach each other at the data link layer (OSI layer 2) by using broadcast. All ports on a hub or a switch are by default in the same broadcast domain. All ports on a router are in the different broadcast domains and routers don't forward broadcasts from one broadcast domain to another. ROUTER

ICONS

RIPRouting Protocols

1. Routing protocols enable routers to know where to forward packets.

2. Information about where a router should send specific packets are stored in the ROUTING TABLE.

Types of routes.3. Connected Routes4. Static Routes5. Dynamics routes.

Routes1.Routing tables store information about

other destinations subnets (Subnet number and subnet mask)

2.They contain the direction which tells the router what other routers or host to send packets next(Outgoing interface and next-hop router

Learning Connected Routes

Subnets to which routers interfaces are connected are called DIRECTLY CONNECTED ROUTES.

A router adds a directly connected route for each interface that has been configured with an IP address, and its up and working to its database.

Next Hop

Next Hop

Next Hop

LAB Static Route

Administrative distanceAdministrative distance is the feature that routers use in order to select the best path when there are two or more different routes to the same destination from two different routing protocols.

Administrative distance defines the reliability of a routing protocol.

Each Routing Protocol has its default administrative distance.

Administrative distance

The Default Administrative distance for RIP is 120

Routing Information Protocol (RIP)• Routing Protocols exchange routing table information• Therefore, they learn routing information about IP subnets from their

neighboring routers

• They advertise routing information with their neighboring routers

• If more than one route exist for each subnet, they chose the best route. (HOW DO THEY DO THIS?)

• If a link fails (topology changes) they react by advertising that some routes have failed and pick a new currently best route (Convergence)

Routing Information Protocol (RIP)

All routing protocols use a metricA metric simply determines how good each route is.

Hop-count tells the router how many more routers a packet has to traverse to get to its destination.

Next HopRefer to the exhibit, Host A pings interface S0/0 on router 3, what is the TTL value for that ping ?

A. 253B. 252 C. 255 D. 254

Next HopRefer to the exhibit, Host A pings interface S0/0 on router 3, what is the TTL value for that ping ?

Refer to the exhibit. A network administrator attempts to ping Host2 from Host1 and receives the results that are shown. What is a possible problem?

A. The link between Host1 and Switch1 is down.B. TCP/IP is not functioning on Host1C. The link between Router1 and Router2 is down.D. The default gateway on Host1 is incorrect.E. Interface Fa0/0 on Router1 is shutdown.F. The link between Switch1 and Router1 is down.

LAB RIP

LAB RIP

Configuring RIP v2 on a Network.

BryPhil#configure terminalBryPhil(config)#router ripBryPhil(config-router)#version 2BryPhil(config-router)#no auto summaryBryPhil(config-router)#network 192.168.1.0BryPhil(config-router)#network 192.168.2.0BryPhil(config-router)#network 172.16.1.0BryPhil(config-router)#network 172.16.2.0BryPhil(config-router)#endBryPhil#copy run start

Review

HINT

A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server.What is the highest layer of the protocol stack that the network administrator is using for this operation?

A. ApplicationB. PresentationC. SessionD. TransportE. InternetF. Data link

Routing Protocol

OSPF

RIP v1 RIPv2 OSPFDistance Vector Distance Vector Link-StateClassful Classless ClasslessHop-count Hop-Count Bandwidth/Cost Slow Convergence Slow

ConvergenceFast Convergence

Less CPU Less CPU More CPULess complex Less complex More complex

More OSPF

OSPF Cost Calculation and Path Determination

OSPF Cost Calculation and Path Determination

OSPF Cost Calculation and Path Determination

Link-state Routing Process

1. R1; Ethernet network 10.1.0.0/16; Cost 22. R1 -> R2; Serial point-to-point network; 10.2.0.0/16; Cost 203. R1 -> R3; Serial point-to-point network; 10.3.0.0/16; Cost 54. R1 -> R4; Serial point-to-point network; 10.4.0.0/16; Cost 20

Routers in other areas learn that this route is down, but this is done with a type of LSP that does not cause them to rerun their SPF algorithm. Routers in other areas can update their routing tables directly

Route source - Identifies how the route was learned. Destination network - Identifies the address of the remote network.Administrative distance - Identifies the trustworthiness of the route source. Metric - Identifies the value assigned to reach the remote network. Lower values indicate preferred routes. Next hop - Identifies the IPv4 address of the next router to forward the packet to.Route timestamp - Identifies from when the route was last heard.Outgoing interface - Identifies the exit interface to use to forward a packet toward the final destination.

Router(config)# router ospf process_ID Router(config-router)# network IP_address wildcard_mask area_#

R4(config)#router ospf 4R4(config-router)#network X.X.X.X xxx.xxx.xxx.xxx area 0R4(config-router)#network X.X.X.X xxx.xxx.xxx.xxx area 0R4(config-router)#

X.X.X.X = IP Address

xxx.xxx.xxx.xxx = subnet mask

top related