CCNA
CCNA
CCNA
Project Report
on
BACHELOR OF TECHNOLOGY
IN
INFORMATION TECHNOLOGY
Submitted to:
Submitted by:
Er Amandeep KAur
Kumar Vivek
HOD CSE/IT
CCNA NETWORKING
CANDIDATE'S DECLARATION
I hereby certify that the work which is being presented in the project entitled, Case study of
Networking(CCNA) , by Kumar Vivek (100240824348) in partial fulfillment of requirement for the
award of degree of B.Tech. (Information Technology) submitted in Desh Bhagat Engineering College,
Mandi Gobindgarh is an authentic record of my own work carried out during a period from 09 th Jan 2014
to 2nd May 2014 under the supervision of Pratik Raj, Trainer, APPIN Technology Lab, Patna. The matter
presented in this project report is original and has not been submitted by me for the award of any other
Degree.
This is to certify that the above statement made by the candidate is correct to the best of my/our
knowledge
2
100240824348
CCNA NETWORKING
ACKNOWLEDGEMENT
I express my sincere gratitude to the Punjab Technical University, Jalandhar for giving me the opportunity
to work on the Project Case study of Networking during my final year of B.Tech.
I would like to thank Pratik Raj, Trainer, APPIN Technology Lab, Patna., Bihar for their kind support.
I would also like to thank my parents who helped and supported me. I would also like to thank everyone
who has knowingly & unknowingly helped me throughout my training. Last but not least, a word of
thanks for the authors of all those books and papers which I have consulted during my project work as
well as for preparing the report.
At the end thanks to the Almighty for giving me this opportunity to show my valuable knowledge.
Kumar Vivek
Uni. Roll No.100240824348
3
100240824348
CCNA NETWORKING
ABSTRACT
The project deals with various aspects of networking and implementation of a network using various
network devices like switches router etc.the project also delas with the network fundamental,osi reference
model,ip routing,cabeking,switching etc.A case study of a network of a college to achieve desired
objectives is also part of this project.
Index
Sr. No.
Topic
Page No.
CANDIDATE'S DECLARATION
ACKNOWLEDGEMENT
ABSTRACT
INDEX
NETWORK BASIC
5-10
11-17
IP ADDRESSING
18-24
CABELING
25-27
ROUTER FUNDAMENTAL
28-39
9
IP ROUTING
100240824348
10
LAN SWITCHING
40-65
66-80
CCNA NETWORKING
NETWORKING BASICS
Network
It is an interconnection of computers to share resources (H/w & S/w). There are many types of networks.
(i) LAN (Local Area Networks)
(ii) MAN (Metropolitan Area Networks)
(iii) WAN (Wide Area Networks)
LAN: - When the computers connected with in a building or in a campus is called LAN. This type
of networking used up to 1 Km. Mostly we used twisted wire to connect computers.
MAN: - When the computers connected in a big city or which connect two LANs is called MAN.
We use coaxial or fiber optic to connect.
WAN: - When the computers all over the world are connected to each other is called WAN. It has
wireless connection it is generally used to communicate with other countries and at long distances.
We use satellites to communicate with each other.
Topology
It is a geometric representation of computer networks. There are many topologies in computer networks.
(i) Bus Network Topology
(ii) Ring Network Topology
(iii)Star Network Topology
(iv) Tree Network Topology
(v) Mesh Network Topology
(vi) Hybrid Network Topology
Bus Network Topology
In bus topology all the computers are connected with a single wire for a network. The message is
broadcast on the network. There is a T-connectorto attach wires. To attach each computer with network
5
100240824348
CCNA NETWORKING
there is a BNC (Barrel Knack Connector, Bottle Knack Connector, and British Nabel
Connector)connector. In this we use coaxial cable. We use 2 50 connectors called terminatorsat both
ends to stop the data signal. If the signal travels continuously on the network it is called bouncing
Advantages
1. The main advantage of a broadcasting network is the reduction of physical lines.
2. The reliability of the network is high because the failure of a computer in the network does not
affect the network functioning for other computers.
3. Addition of new computers to the network is easy.
Limitation
1. Each computer connected to the line must have good communication and decision making
capability.
2. If the communication line fails, the entire system breaks down.
Star Network Topology
In star topology all the computers are connected to each other through a centralized device called HUB.
Maximum distance of a client from a hub is 100 m. In star network we use RJ 45 connector and Twisted
Pair cable.
There are two types of twisted pair:(i) STP (Shielded Twisted Pair)
(ii) UTP (Unshielded Twisted Pair)
CCNA NETWORKING
electricity wires are wired together. There are five categories of STP/UTP cable. Those are from cat -1 to
cat -5. In telephone lines we use cat -3 cables, which is three twisted per feet and its speed is 10 Mbps and
the connector is RJ 11. To data transfer we use cat -5 cables because its speed is 100 Mbps.
Advantages
1. This topology has minimal line cost because only n-1 lines are required for connecting n nodes.
2. Transmission delays between two nodes do not increase by adding new nodes to the n network
because any two nodes may be connected via two links only.
3
. If any of the local computers fail, the remaining portion of the network is unaffected.
Limitation
1. The system crucially depends on the central node. If the host computer fails, the entire network
fails.
Tree
A tree topology combines characteristics of linear bus and star topologies. It consists of groups of starconfigured workstations connected to a linear bus backbone cable (See fig. 4). Tree topologies allow for
the expansion of an existing network, and enable schools to configure a network to meet their needs.
7
100240824348
CCNA NETWORKING
Money. A linear bus network may be the least expensive way to install a network; you do not have
to purchase concentrators.
Length of cable needed. The linear bus network uses shorter lengths of cable.
Future growth. With a star topology, expanding a network is easily done by adding another
concentrator.
8
100240824348
CCNA NETWORKING
Cable type. The most common cable in schools is unshielded twisted pair, which is most often
used with star topologies.
Networking Media
To do networking we need to use some type of media. There are many types of media.
(i) Twisted pair cable
(ii) Coaxial Cable
(iii) Fiber optic cable
(iv) Microwave
(v) Satellite
Twisted Pair Cable
There are two wires, which are twisted with each other to avoid EMI. There are two types of twisted pair.
This cable comes in 7 categories. We generally use the Cat 5 cable of speed 100 Mbps in networking.
Shield Twisted Pair Cable (STP): - In this an extra wire which is called shielded wire is wrapped
over the inner cover which holds copper in pairs.
Unshielded Twisted Pair Cable (Utp): - In this type of wire no shielded cover is there for extra
protection from noise.
Coaxial Cable
Coaxial cable consists of an insulated copper conductor surrounded by a tube shaped copper braid outer
copper tune and the inner conductor have the same axis of curvature hence it called coaxial cable. It is
basically of two types
(i) BROADBAND SIGNAL CABLE(RG 59)
(ii) BASEBAND SINGLE CABLE(RG 58)
We used Base band signal cable in Networking of Computers. Its speed is 10 Mbps and impedance is 50
.
Fiber Optical Cable
Fiber optic cable consists of a very fine fiber made from two types of glass, one for the inner core and the
other for the outer layer. That is transmitted as light through it. It is a costly but more secure transmission
media.
Types of Hub/Switch
Hub/Switch is a device, which is used to connect more than two computers with each other to use
resources and to communicate. There are many types of Hub/Switch
(i) Passive Hub: - In this type of hub, there is no electricity in hub; this hub does not
regenerate/amplify the data. It simply passes the data.
9
100240824348
CCNA NETWORKING
(ii) Active Hub: - It is a combination of passive hubs and repeater. In this type of hub, we need to
give electricity. This hub is also called Multipart repeater. This hub also regenerates the signals.
(iii) Switch: - Switch is actually hardware based. Standard ports of HUB/SWITCH are
8/16/24/48/72 ports.
NIC
NIC is Network Interface Card. It is also called LAN card or Ethernet card. It is inserted in extension slots
of motherboard. In old NIC both BNC and RJ-45 connector attached, so it is called COMBO. If we attach
NIC of different speed on a network, then there is Bottle Neck Problem.
MAC ADDRESS
MAC is Media Access Control. It is a 48 bit unique number which is given by the company in the time of
manufacturing. Switches work on Mac address. The Mac address of each network card is stored in MACTable of switch.
10
100240824348
CCNA NETWORKING
11
100240824348
CCNA NETWORKING
One of the greatest functions of the OSI specifications is to assist in data transfer between disparate hosts
meaning, for example, that they enable us to transfer data between a Unix host and a PC or a Mac.
The OSI isnt a physical model, though. Rather, its a set of guidelines that application developers can use
to create and implement applications that run on a network. It also provides a framework for creating and
implementing networking standards, devices, and internetworking schemes.
The OSI has seven different layers, divided into two groups. The top three layers define how the
applications within the end stations will communicate with each other and with users. The bottom four
layers define how data is transmitted end-to-end. These bottom layers also determine how to rebuild a data
stream from a transmitting host to a destination hosts application.
Network devices that operate at all seven layers of the OSI model include
Network management stations (NMS)
Web and application servers
Gatew
ays
(not
default
gateways)
Network hosts
Basically, the ISO is pretty much the Emily Post of the network protocol world. Just like Ms. Post, who
wrote the book setting the standardsor protocolsfor human social interaction, the ISO developed the
OSI reference model as the precedent and guide for an open network protocol set. Defining the etiquette
of communication models, it remains today the most popular means of comparison for protocol suites.
The OSI reference model has seven layers:
Application layer (layer 7)
Presentation layer (layer 6)
Session layer (layer 5)
Transport layer (layer 4)
Network layer (layer 3)
Data Link layer (layer 2)
Physical layer (layer 1)
CCNA NETWORKING
system, such as TCP/IP, NIC card, etc., and you could still use IE to view a local HTML documentno
problem.
But things would definitely get messy if you tried to do something like view an HTML document that
must be retrieved using HTTP, or nab a file with FTP. Thats because IE will respond to requests such as
those by attempting to access the Application layer. And whats happening is that the Application layer is
acting as an interface between the actual application programwhich isnt at all a part of the layered
structureand the next layer down, by providing ways for the application to send information down
through the protocol stack. In other words, IE doesnt truly reside within the Application layerit
interfaces with Application-layer protocols when it needs to deal with remote resources.
These tasks are important because computer applications sometimes require more than only desktop
resources. Often, theyll unite communicating components from more than one network application. Prime
examples are file transfers and e-mail, as well as enabling remote access, network management activities,
client/server processes, and information location. Many network applications provide services for
communication over enterprise networks, but for present and future internetworking, the need is fast
developing to reach beyond the limits of current physical networking. Today, transactions and information
exchanges between organizations are broadening to require internetworking applications such as the
following:
World Wide Web
Connects countless servers (the number seems to grow with each passing day) presenting diverse formats.
Most are multimedia and can include graphics, text, video, and sound. (And as pressure to keep up the
pace mounts, websites are only getting slicker and snappier. Keep in mind, the snazzier the site, the more
resources it requires. Youll see why I mention this later.) Netscape Navigator and IE simplify both
accessing and viewing websites.
E-mail gateways
Versatile; can use Simple Mail Transfer Protocol (SMTP) or the X.400 standard to deliver messages
between different e-mail applications.
Electronic data interchange (EDI)
A composite of specialized standards and processes that facilitates the flow of tasks such as accounting,
shipping/receiving, and order and inventory tracking between businesses.
Special interest bulletin boards
Include the many Internet chat rooms where people can meet (connect) and communicate with each
other either by posting messages or by typing a live conversation. They can also share public-domain
software.
Internet navigation utilities Include applications such as Gopher and WAIS, as well as search engines such
as Google and Yahoo!, which help users locate the resources and information they need on the Internet.
Financial transaction services
Target the financial community. They gather and sell information pertaining to investments, market
trading, commodities, currency exchange rates, and credit data to their subscribers.
13
100240824348
CCNA NETWORKING
The OSI has protocol standards that define how standard data should be formatted. Tasks like data
compression, decompression, encryption, and decryption are associated with this layer. Some Presentation
layer standards are involved in multimedia operations too. The following serve to direct graphic and visual
image presentation:
PICT
A picture format used by Macintosh programs for transferring QuickDraw graphics.
TIFF
Tagged Image File Format; a standard graphics format for high-resolution, bitmapped images.
JPEG
Photo standards brought to us by the Joint Photographic Experts Group. Other standards guide movies and
sound.
MIDI
Musical Instrument Digital Interface (sometimes called Musical Instrument Device Interface), used for
digitized music.
MPEG
Increasingly popular Moving Picture Experts Group standard for the compression and coding of motion
video for CDs. It provides digital storage and bit rates up to 1.5Mbps.
QuickTime
For use with Macintosh programs; manages audio and video applications.
RTF Rich Text Format, a file format that lets you exchange text files between different word processors,
even in different operating systems
The Session Layer
The Session layer is responsible for setting up, managing, and then tearing down sessions between
Presentation layer entities. This layer also provides dialogue control between devices, or nodes. It
coordinates communication between systems, and serves to organize their communication by offering
three different modes: simplex, half duplex, and full duplex.
14
100240824348
CCNA NETWORKING
To sum up, the Session layer basically keeps different applications data separate from other applications
data. The following are some examples of Session layer protocols and interfaces (according to Cisco):
Network File System (NFS)
Developed by Sun Microsystems and used with TCP/IP and Unix workstations to allow transparent access
to remote resources.
Structured Query Language (SQL)
Developed by IBM to provide users with a simpler way to define their information requirements on both
local and remote systems.
Remote Procedure Call (RPC)
A broad client/server redirection tool used for disparate service
created on clients and performed on servers.
environments.
Its
procedures
are
X Window
Widely used by intelligent terminals for communicating with remote Unix computers, allowing them to
operate as though they were locally attached monitors.
AppleTalk Session Protocol (ASP)
Another client/server mechanism, which both establishes and maintains sessions between AppleTalk client
and server machines.
Digital Network Architecture Session Control Protocol (DNA SCP)
A DECnet Session layer protocol.
15
100240824348
CCNA NETWORKING
Two types of packets are used at the Network layer: data and route updates.
Data packets
Used to transport user data through the internetwork. Protocols used to support data traffic are called
routed protocols; examples of routed protocols are IP and IPX. Youll learn about IP addressing in Chapter
2 and Chapter 3, IP Subnetting and Variable Length Subnet Masks (VLSMs).
Route update packets
Used to update neighboring routers about the networks connected to all routers within the internetwork.
Protocols that send route update packets are called routing protocols; examples of some common ones are
RIP, EIGRP, and OSPF. Route update packets are used to help build and maintain routing tables on each
router.
For a host to send packets to individual hosts on a local network as well as transmitting packets between
routers, the Data Link layer uses hardware addressing. Each time a packet is sent between routers, its
framed with control information at the Data Link layer, but that information is stripped off at the receiving
router and only the original packet is left completely intact. This framing of the packet continues for each
hop until the packet is finally delivered to the correct receiving host. The IEEE Ethernet Data Link layer
has two sublayers:
Media Access Control (MAC) 802.3
16
100240824348
CCNA NETWORKING
Defines how packets are placed on the media. Contention media access is first come/first served access
where everyone shares the same bandwidthhence the name. Physical addressing is defined here, as well
as logical topologies. Whats a logical topology? Its the signal path through a physical topology. Line
discipline, error notification (not correction), ordered delivery of frames, and optional flow control can
also be used at this sub layer.
Logical Link Control (LLC) 802.2
Responsible for identifying Network layer protocols and then encapsulating them. An LLC header tells the
Data Link layer what to do with a packet once a frame is received. It works like this: A host will receive a
frame and look in the LLC header to find out where the packet is destined forsay, the IP protocol at the
Network layer. The LLC can also provide flow control and sequencing of control bits.
17
100240824348
CCNA NETWORKING
IP Addressing Scheme
IPv4 uses a 32-bit binary addressing scheme to identify networks, network devices, and networkconnected machines. These addresses, known as IP addresses, are strictly regulated by the Internet
Network Information C!=nter (InterNIC). It is entirely possible for a network administrator to arbitrarily
select unregistered IP addresses; this practice should not be condoned. Computers having such spurious IP
addresses will function properly only within the confines of their domain. Attempts to access the Internet
will demonstrate the ramifications of this shortsighted act.
18
100240824348
CCNA NETWORKING
Each TCP/IP host is identified by a logical IP address. A unique IP address is required for each host and
network component that communicates by using TCP/IP.
The IP address identifies a system's location on the network in the same way that a street address identifies
a house on a city block. Just as a street address must identify a unique residence, an IP address must be
globally unique and have a uniform format.
Network ID
Each IP address defines the network ID and host ID. The network ID identifies the systems that are
located on the same physical segment. All systems on the same physical segment must have the same
network ID. The network ID must be unique to the internet work.
Host ID
The host ID identifies a workstation, server, router, or other TCP/IP host within a segment. The address for
each host must be unique to the network ID.
Each IP address is 32 bits long and is composed of four OS-bit fields, called octets. Octets are separated
by periods. The octet represents a decimal number in the range 0-255. This format is called dotted decimal
notation. The following is an example of an IP address in binary and dotted decimal formats.
19
100240824348
CCNA NETWORKING
Binary format
10000011.01101011.00000011.00011000
131.107.3.24
20
100240824348
CCNA NETWORKING
The Internet community has defined five IP address classes to accommodate networks of varying sizes.
TCP/IP in Windows 2000 supports class A, B, and C address assigned to hosts. The class of address
defines, which bits are used for the network TD and which bits are used for the host TD. It also defines the
possible number of networks and the number of hosts per network.
The following chart shows the network and host ID fields for class A, B, and C IP addressing:
Class
IP address
Network ID
Host ID
w.x.y.z
x.y.z
w.x.y.z
w.x
y.z
w.x.y.z
w.x.y
Class A
Class A address is assigned to networks with a very large number of hosts. The high order bit in a class A
address is always set to zero. The next seven bits (completing the first octet) complete the network ID. The
remaining 24 bits (the last three octets) represents the host ID. This allows for 126 networks and
approximately 17 million hosts per network.
Class B
Class B addresses are used for small local area networks (LANs). The three high order bits in a class C
address are always et to binary 110. The next 21 bits (completing the first three octets) complete the
network ID. The remaining 16 bits (last two ocetets) represents the host ID. This allows for 16, 384
networks and approximately 65,000 hosts per network.
Class C
Class C address are used for small local area networks (LANs). The three high order bits in a class C
address are always set to binary 1 10. The next 21 bits (completing the first three octets) complete the
network ID. The remaining 8 bits (last octet) represent the host ID. This allows for approximately 2
million network and 254 hosts per network.
Class D
Class D addresses are used for multicast group usage. A multicast group may contain one or more hosts, or
none at all. The four high order bits in a class D address are always set to binary 1110. The remaining bits
designated the specific group in which the client participates. There are no network or host bits in the
multicast operations. Packets are passed to a selected subset of hosts on network. Only those hosts
registered for the multicast address accept the packet. Microsoft uses class D addresses for applications to
21
100240824348
CCNA NETWORKING
multicast data to hosts on an internet work, including Windows Internet Name Service (WINS) and
Microsoft NetShow .
Class E
Class E is an experimental address that is not available for general use; It is reserved for future use. The
high-order bits in a class E address are set to 1111.
Note For more information about multicasting, see the white paper Multicasting under Additional
Readingon the Web page on the Student Materials compact disc.
The graphic in the previous slide summarizes the number of networks and number of hosts per network,
and the range of network IDs in class A, B and C IP addresses. The 32 bit IP addressing scheme presented
in the graphic supports a total of 3, 720,314, 628 hosts.
Addressing Guidelines
100240824348
CCNA NETWORKING
Follow this guidelines when assigning network IDs and host IDs:
The network ID and host ID cannot be 255 (all bits set 1). If all bits are set to 1, the address
is interpreted as a broadcast rather than a host ID.
The network ID and host ID bits cannot all be set to 0. If all bits are set to 0, the address is
interpreted to mean this network only.
The network ID identifies the TCP/IP hosts that are located on the same physical network. All hosts on the
same physical network must be assigned the same network ID to communicate with each other. If your
networks are connected by routers, a unique network ID is required for each wide area connection. For
example, in the graphic :
Network 2 represents the wide area network ID so that the interfaces between the two routes can
be assigned unique host IDs.
If you plan to connect your network to the Internet, you must obtain the network ID portion of the IP
address to guarantee IP network ID uniqueness. For domain name registration and IP network number
assignment, see your ISP.
The host ID identifies a TCP/IP host within a network and must be unique to the network ID. All TCP/IP
hosts, including interfaces to routers, required unique host IDs.
The host ID of the router interface is the IP address confugred as a default gateway to the work station
when TCP/IP is installed. For example, for the host on subnet 1 with an IP address of 124.0.0.27, the IP
address of the default gateway is 124.0.0.1.
23
100240824348
CCNA NETWORKING
Beginning range
Ending range
Class A
w. 0.0.01
w. 255.255.254
Class B
w.x.0.1
w.x.255.254
Class C
w.x.y.1
w.x.y.254
24
100240824348
CCNA NETWORKING
25
100240824348
CCNA NETWORKING
CABLING
In cat-3 we use 2 pairs or 4 wires, which are used in telephone. In cat-5 there are 4 pairs or 8 wires. In a
pair of wire there is one wire, which is fully colored called solid and second is color with white color
called stripe. We measure the cable length in 10 base 5 form, in which 10 means speed, base means band
and 5 means 500 m. In 8 pin connector pin no. 1,2,3,6 are used for transmit data on a network.
Connection: (i) Hub- to- PC: - To transmit data from a Hub to PC, we use straight cabling.
(ii) PC- to- PC: - To transmit data from a PC to PC, we use cross cabling.
(iii) Hub- to- Hub: (a) In this type of attachment we attach two hubs, to transmit data from a Hub to Hub, we
use cross cabling. But we can attach only 14 PCs with two 8 ports Hub i.e. 2 ports are
wasted.
(b) In this type, we use uplink to attach/connect two hubs. It is an extra port in a hub. In this
we attach an uplink to a normal port. When we attach any PC to uplink, we use cross cable,
instead of straight because uplink is cross by default which change it into straight. In
straight cabling we connect wires straightly but in this only 10 MBps data can be transmit
not 100 MBps. In cross cabling 1st wire is attached with 3rd (1-3) and 2nd with 6th (2-6).
We can also call it rule 13 26.
26
100240824348
CCNA NETWORKING
(1) Processor
Speed: - 20 MHz to 1GHz
Architecture: - RISC
Reduce Instruction set computer
Manufacturers: - Motorola, IBM, Power PC, Texas, Dallis, Intel.
(2) Flash RAM
Flash Ram is the permanent read/write memory. This memory is used to store one or more
copies of router o/s. Router o/s is also called IOS (Internetwork Operating System).
Flash Ram stores the only o/s.
The size of flash ram in the router is 4mb to 128mb. The flash ram may be
available in one of the following three packages: SLMM Flash: - Single Line Memory Module
PCMCIA Flash: - Personal Computer Memory Card Interface Architecture Compact
Router
Fundamental
s
(3) NVRAM
NVRAM is a Non Volatile Random Access Memory. It is used to store the
configuration of the Router. The size of NVRAM is 8 KB to 512 KB.
(4) RAM
Ram of the router is divided into two logical parts.
(i)
Primary RAM
(ii)
Shared RAM
Primary RAM
Primary RAM is used for: (a) Running copy of IOS.
27
100240824348
CCNA NETWORKING
PC
CMOS Setup
Bootable Floppy/CD
O/S From HDD
28
100240824348
CCNA NETWORKING
Connector
RJ45
color
yellow
AUI
DB15
yellow
RJ45
DB60
Technology like Leased
yellow
blue
Speed
Use
10 mbps
to connect Ethernet LAN
Using UTP media
10 mbps
to connect Ethernet LAN
Using Trans-Receiver
100 mbps
to connect Ethernet LAN
E1-2 mbps
to connect WAN
SS
RJ45
blue
orange
192 kbps
to connect ISDN Basic
RJ11
white
Fast Ethernet
Serial
T1-1.5 mbps
Smart Serial
BRI ISDN
Rate Interface
VOIP
EPABX
Connector
RJ45
Auxiliary
RJ45
Virtual terminal
Vty
interface
Color
sky blue
black
Modem
-
Speed
9600bps
depend on
-
Details
used for configuration
Using PC
to connect remote
router using PSTN line
to connect remote router
with telnet protocol via
CCNA NETWORKING
Violet
4/16 mbps
White
E1-2048 kbps
up-640 kbps
Down-8 mbps
User mode
In this mode, we can display basic parameter and status of the router we can test connectivity and perform
telnet to other devices. In this mode we are not enable to manage & configure router.
Privileged mode
In this mode, we can display all information, configuration, perform administration task, debugging, testing
and connectivity with other devices. We are not able to perform here configuration editing of the router. The
command to enter in this mode is enable. We have to enter enable password or enable secret password to
enter in this mode. Enable secret has more priority
than enable password. If both passwords are configured then only enable secret will
work.
30
100240824348
CCNA NETWORKING
Global configuration
This mode is used for the configuration of global parameters in the router. Global parameters applied to the
entire router.
For e.g: - router hostname or access list of router
The command enter in this mode is configure terminal.
Line configuration mode
This mode is used to configure lines like console, vty and auxiliary. There are main types of line that are
configured.
(i) Console
router(config)#line console 0
(ii) Auxiliary
router(config)#line aux 0
(iii) Telnet or vty
router(config)#line vty 0 4
Interface configuration mode
This mode is used to configure router interfaces. For e.g:- Ethernet, Serial, BRI etc.
Router(config)#interface <type><number>
Router(config)#interface serial 1
Routing configuration mode
This mode is used to configure routing protocol like RIP, EIGRP, OSPF etc.
Router(config)#router <protocol> [<option>]
Router(config)#router rip
Router(config)#router eigrp 10
Configuring Password
There are five types of password available in a router
(1) Console Password
router#configure terminal
router(config)#line console 0
router(config-line)#password <word>
router(config-line)#login
router(config-line)#exit
to erase password do all steps with no command.
(2) Vty Password
31
100240824348
CCNA NETWORKING
router>enable
router#configure terminal
router(config)#line vty 0 4
router(config-line)#password <word>
router(config-line)#login
router(config-line)#exit
(3) Auxiliary Password
router#configure terminal
router(config)#line Aux 0
router(config-line)#password <word>
router(config-line)#login
router(config-line)#exit
(4) Enable Password
router>enable
router#configure terminal
router(config)#enable password <word>
router(config)#exit
(5) Enable Secret Password
Enable Password is the clear text password. It is stored as clear text in configuration
where as enable secret password is the encrypted password with MD5 (Media Digest 5)
algorithm.
Router>enable
Router#configure terminal
Router(config)#enable secret <word>
Router(config)#exit
Encryption all passwords
All passwords other than enable secret password are clear text password. We can encrypt
all passwords using level 7 algorithm. The command to encrypt all password are
Router#configure terminal
Router(config)#service password-encryption
Managing Configuration
There are two types of configuration present in a router
(1) Startup Configuration
(2) Running Configuration
(1) Startup configuration is stored in the NVRAM. Startup configuration is used to save
settings in a router. Startup configuration is loaded at the time of booting in to the
Primary RAM.
32
100240824348
CCNA NETWORKING
(2) Running Configuration is present in the Primary RAM wherever we run a command
for configuration, this command is written in the running configuration.
To save configuration
Router#copy running-configuration startup-configuration
Or
Router#write
To abort configuration
Router#copy startup-configuration running-configuration
To display running-configuration
Router#show running-configuration
To display startup configuration
Router#show startup-configuration
To erase old configuration
Router#erase startup-configuration
Router#reload
Save[y/n]:n
Access Router using console
Com/Port--------DB9------------------------Console
Cisco Console
RJ45
Router
In windows
Click start=> program=> accessories=> comm.
(communication)=>hyperterminalType any name
Select com port
Set settings
Speed 9600
stop bit 1
Data bits 8
Parity no
Click ok
Press shift+home to default prompt
CISCO command line shortcuts
Tab - to auto complete command
? - To take help
Ctrl+P - to recall previous command
33
100240824348
CCNA NETWORKING
Slot 1
Serial 1/0
Serial 1/1
Slot 0
Serial 0/0
CCNA NETWORKING
Router(config-if)#description <line>
Configuring optional parameter on LAN interface
Router#configure terminal
Router(config)#interface <type><no>
Router(config-if)#duplex <half|full|auto>
Router(config-if)#speed <10|100|auto>
Router(config-if)#end
Configuring optional parameter on WAN interface
Router#configure terminal
Router(config)#interfac<type><no>
Router(config-if)#encapsulation <protocol>
Router(config-if)#clock rate <value>
Router(config-if)#end
To display interface status
Router#show interfaces (to show all interfaces)
Router#show interface <type><no>
CCNA NETWORKING
interface for Vlan communication and in frame relay we need sub interface for multipoint
connectivity. Sub interface means creating a logical interface from physical interface.
Router#configter
Router(config)#interface <type><no><subint no>
Router(config-subif)#
Router(config-subif)#end
Router(config)#interface serial 0.2
Configuring secondary IP
Router#config terminal
Router(config)#interface <type><no>
Router(config-if)#IP address 192.168.10.5 255.255.255.0
Router(config-if)#IP address 192.168.10.18 255.255.255.0 secondary
Router(config-if)#no shutdown (to enable the interface because they always shutdown)
Router(config-if)#exit
Router#show run (to display secondary IP)
Managing Command Line History
We can use CTRL+P & CTRL+N shortcuts to display command history. By default
router will up to 10 commands. In the command line history, we can use following
commands to edit this setting
To display commands present in history
Router#show history
To display history size
Router#show terminal
CCNA NETWORKING
CCNA NETWORKING
C:\>route print
38
100240824348
CCNA NETWORKING
39
100240824348
CCNA NETWORKING
IP Routing
When we want to connect two or more networks using different n/w addresses then we have to use IP
Routing technique. The router will be used to perform routing between the networks. A router will perform
following functions for routing.
(1) Path determination
(2) Packet forwarding
i)
ii)
IP
R
ou
tin
g
100240824348
40
CCNA NETWORKING
S. MAC
PC1
D. IP 172.16.0.5
S. IP 10.0.0.6
D. MAC
R1
41
100240824348
CCNA NETWORKING
The router will receive the frame, store it into the buffer. When obtain packet from the frame then forward
data according to the destination IP of packet. The router will obtain a route from routing table according
to which next hop IP and interface is selected
(iv) According to the next hop, the packet will encapsulated with new frame and data issend to the
output queue of the interface.
Static Routing
In this routing, we have to use IP route commands through which we can specify routes for different
networks. The administrator will analyze whole internetwork topology and then specify the route for
each n/w that is not directly connected to the router.
Steps to perform static routing
(1) Create a list of all n/w present in internetwork.
(2) Remove the n/w address from list, which is directly connected to n/w.
(3) Specify each route for each routing n/w by using IP route command.
Router(config)#ip route <destination n/w><mask><next hop ip>
Next hop IP it is the IP address of neighbor router that is directly connected our router.
Static Routing Example: Router#confter
Router(config)#ip route 10.0.0.0 255.0.0.0 192.168.10.2
Advantages of static routing
(1) Fast and efficient.
(2) More control over selected path.
(3) Less overhead for router.
(4) Bandwidth of interfaces is not consumed in routing updates.
Disadvantages of static routing
(1) More overheads on administrator.
(2) Load balancing is not easily possible.
(3) In case of topology change routing table has to be change manually.
Alternate command to specify static route
Static route can also specify in following syntax: Old
Router(config)#ip route 172.16.0.0 255.255.0.0 172.25.0.2
Or
Router(config)#ip route 172.16.0.0 255.255.0.0 serial 0
42
100240824348
CCNA NETWORKING
AD
0
1
20
90
100
110
120
Default Routing
Default routing means a route for any n/w. these routes are specify with the help of following
syntax: Router(config)#ip route 0.0.0.0 0.0.0.0 <next hop> Or
<exit interface> This type of
routing is used in following scenario.
Scenario 1: Stub network
A n/w which has only one exit interface is called stub network.
43
100240824348
CCNA NETWORKING
44
100240824348
Domain
Protocols
Interior Routing
RIP
IGRP
EIGRP
OSPF
Exterior Routing
BGP
EXEIGRP
(2) The neighbor will receive routing updates and process the route according to following
conditions: (i) If update of a new n/w is received then this information is stored in routing table.
(ii) If update of a route is received which is already present in routing table then route will be refresh that is
route times is reset to zero.
(iii)
If update is received for a route with lower metric then the route, which is already present in our
routing table. The router will discard old route and write the new route in the routing table.
(iv) If update is received with higher metric then the route that is already present in routing table, in
this case the new update will be discard.
(3) A timer is associated with each route. The router will forward routing information on all interfaces
and entire routing table is send to the neighbor. There are three types of timers associated with a route.
(i) Route update timer
It is the time after which the router will send periodic update to the neighbor.
(ii) Route invalid timer
It is the time after which the route is declared invalid, if there are no updates for the route. Invalid
route are not forwarded to neighbor routers but it is still used to forward the traffic.
(iii) Route flush timer
It is the time after which route is removed from the routing table, if there are no updates about
the router.
Metric of Dynamic Routing
Metric are the measuring unit to calculate the distance of destination n/w. A protocol may use a one or
more than one at a time to calculate the distance. Different types of metric are: (1) Hop Count
(2) Band Width
(3) Load
(4) Reliability
(5) Delay
(6) MTU
Hop Count
It is the no. of Hops (Routers) a packet has to travel for a destination n/w.
Bandwidth
Bandwidth is the speed of link. The path with higher bandwidth is preferred to send the data.
Load
Load is the amount of traffic present in the interface. Paths with lower load and high throughput are
used to send data.
Reliability
Reliability is up time of interface over a period of time.
Delay
Delay is the time period b/w a packet is sent and received by the destination.
MTU Maximum Transmission Unit
It is the maximum size of packet that can be sent in a frame mostly MTU is set to 1500.
(1)
(2)
(3)
(4)
(5)
Split Horizon
Split Horizon states a route that update receive from an interface can not be send back to same interface.
Poison Reverse
This method is the combination of split Horizon and Flash updates. It implements the rule that information
received from the interface can not be sent back to the interface and in case of topology change flash
updates will be send to the neighbor.
Hold Down
If a route changes frequently then the route is declared in Hold Down state and no updates are
received until the Hold Down timer expires.
Routing Information Protocol
Features of RIP: * Distance Vector
* Open standard
* Broadcast Updates (255.255.255.255)
* Metric
Hop Count *Timers
Update 30 sec Invalid 180 sec
Hold 180 sec Flush 240 sec
* Loop Control Split Horizon
Triggered Updates
*
*
*
*
*
*
Configuring RIP
Router#confterRouter(config)#router rip
Router(config-router)#network <own net address> Router(configrouter)#network <own net address>
--------------------------Router(config-router)#exit
172.16.0.6
10.0.0.1
172.16.0.5
200.100.100.12
Router(config-router)#network 10.0.0.0
Router(config-router)#network 172.16.0.0
Router(config-router)#network 200.100.100.0
175.2.0.0 via 172.16.0.6
Display RIP Routes
Router#ship route rip
175.2.1.1
Serial
2048 k
2048 k
256 k
sync
Neighbor
11.0.0.1
13.0.0.2
Topology
R1 11.0.0.0 dc
12.0.0.0 dc
13.0.0.0 dc
R2 11.0.0.0
10.0.0.0
R3 13.0.0.0
14.0.0.0
15.0.0.0
16.0.0.0
R4 16.0.0.0
17.0.0.0
R5 18.0.0.0
19.0.0.0
20.0.0.0
14.0.0.0
R6
20.0.0.0
21.0.0.0
Routing
R6
20.0.0.0
21.0.0.0
19.0.0.0
20.0.0.0
R
6
18.0.0.0
R
5
21.0.0.0
14.0.0.0
15.0.0.0
R
3
16.0.0.0
17.0.0.0
13.0.0.0
R
1
11.0.0.0
R
2
10.0.0.0
12.0.0.0
R
4
*
*
*
*
*
Bandwidth
Delay
Load
Reliability
MTU
Neighbor Recovery
Partial updates
Triggered updates
Backup Route
Multi Protocol Routing
EIGRP Protocols & Modules
(1) Protocol depended module
This module is used to perform multi protocol routing that is the router will maintain 3 routing table for
TCP/IP, IPX/SPX and Appletalk.
IP Routing
TCP/IP
Pack
IPX/SPX
et
type?
Appletalk
IPX Routing
Appletalk
Routing
If neighbor stops responding to the Hello packets then RTP will send unicast Hello packet for that
neighbor.
(3) Partial updates
(4) No updates are send if there is no topology change.
Diffusing Update Algorithm (DUAL)
DUAL is responsible for calculating best path from the topology table. Dual has following
features: * Backup Path
* VLSM
* Route queries to neighbor for unknown n/w.
Configuring EIGRP
Router(config)#router eigrp<as no>
Router(config-router)#network <net addr.>
Router(config-router)#network <net addr.>
Router(config-router)#exit
Advanced Configuration EIGRP
Configuring following options are same as configuring IGRP
(1) Bandwidth on Interfaces
(2) Neighbor
(3) Load balancing
Max path
Variance
Configuring EIGRP Metric
If we want our router to use additional metric then we can use following command: Router(config)#Router eigrp<as no>
Router(config-router)#metric weights 0 <k1><k2><k3><k4><k5>
Type of service (default)
Router(config-router)#exit
Metric
Bandwidth
Load
Delay
Reliability
MTU
K
K1
K2
K3
K4
K5
Default value
1
0
1
0
0
All routers exchanging update with each other must have same AS no. and same K value.
To up the Ethernet without connect wire
Router(config)#int eth0
Router(cofig-if)#no keepalive
Router(config-if)#bandwidth 64
Router#clearip route *
Hush routing table and again make it.
Router#shipeigrp topology It shows topology database.
P-> passive->stable A->active->under updation
Router#shipeigrp neighbor
It shows neighbor table
Router#redistribute<protocol> ?
Metric also need to be modified
Debug IGRP
Router#debugipigrp events
Its display info. On special event
Router#debugipigrp transactions
It shows every update
Debug EIGRP
Router#debugipeigrp
For full debug
Router#debugipeigrp summary
For few debug
Router ID
Router ID is the highest IP address of router interfaces. This id is used as the identity of the router. It
maintaining link state databases. The first preference for selecting router ID is given to the Logical
interfaces. If logical interface is not present then highest IP of physical interface is selected as router id.
ROUTER ID
ROUTER ID
Area
Area is the group of routers & n/ws, which can share their routing information directly with each
other.
Adjacency
A router is called adjacency when neighbor relationship is established. We can also say adjacency
relationship is formed between the routers.
OSPF Hierarchical Model
A
B
C
D
C
A
C
E
A
B
F
Neighbor
This problem is solved with the help of electing a router as designated router and backup designated
router.
Designated Router
A router with highest RID (router id) will be designated router for a particular interface. This router is
responsible for receiving LSA from non-DR router and forward LSA to the all DR router.
Backup Designated Router
This router will work as backup for the designated router. In BDR mode, it will receive all information
but do not forward this information to other non-DR router.
Commands to configure OSPF
Router#confter
Router(config)#router ospf<process no>
Router(config-router)#network <net address><wild mask> area <area id> Router(configrouter)#network <net address><wild mask> area <area id> Router(config-router)#exit
Wild Mask Complement of subnet mask
Example 255.255.0.0
0.0.255.255
255.255.255.255
- Subnet mask
Wild mask
255.255.255.255
- 255.255.192.0
subnet mask
0.0.63.255
wild mask
R1
Router(config-router)#network 20.0.0.0 0.255.255.255 area 0
Router(config-router)#network 10.0.0.0 0.255.255.255 area 0
R2
Router(config-router)#network 20.0.0.0 0.255.255.255 area 0
Router(config-router)#network 30.0.0.0 0.255.255.255 area 1
Router(config-router)#network 40.0.0.0 0.255.255.255 area 1
R3
Router(config-router)#network 40.0.0.0 0.255.255.255 area 1
Router(config-router)#network 50.0.0.0 0.255.255.255 area 1
Configuring bandwidth on interface
If the actual bandwidth of interface is not equal to the maximum speed of interface then we have to use
bandwidth command to specify the actual bandwidth.
Router(config)#interface <type><no>
Router(config-if)#bandwidth <speed>
Configuring logical interface for OSPF
By default the highest IP address of interface will be elected as Router id. If there is a change in status of
interface then router will reelect some IP as Router id. So if we create logical interface, it will never go
down and first preference give to the logical interface for RID.
Command: Router(config)#interface loopback <no>
LAN Switching
Ethernet switches are used in LAN to create Ethernet n/ws. Switches forward the traffic on the basis of
MAC address. Switches maintain a Mac Addresse table in which mac
addresses and port no.s are used to perform switching decision. Working
of bridge and switch is similar to each other.
LA
N
Sw
itc
hin
g
Classification of switches
Switches are classified according to the following criteria: Types of switches based on working
(1) Store & Forward
This switch receives entire frame then perform error checking and
start forwarding data to the destination.
(2) Cut through
This switch starts forwarding frame as soon as first six bytes of
the frame are received.
(3) Fragment-free
This switch receives 64 bytes of the frame, perform error checking
and then start forwarding data.
(4) Adaptive cut-through
It changes its mode according the condition. If it see there are errors in
many frames then it changes to Store & Forward mode from Cut through
or Fragment-free.
Types of switches based on management
2 Manageable switches
3 Non-Manageable switches
4 Semi-Manageable switches
Types of switches based on OSI layer
(1) Layer 2 switches (only switching)
(2) Layer 3 switches (switching & routing)
Types of switches based on command mode (only in Cisco)
(1) IOS based
(2) CLI based
Type of switches based on hierarchical model
(1) Core layer switches
Qualities of switch
No. of ports
Speed of ports
Type of media
Switching or wire speed or throughput
Basic Switch Administration
IOS based switches are similar to the routers. We can perform following function on switches in a
similar manner as performed on router.
(1) Access switch using console
(2) Commands to enter & exit from different mode
(3) Commands to configure passwords
(4) Manage configuration
(5) Backup IOS and configuration
(6) Configuring and resolving hostnames
(7) Managing telnet
(8) Configuring CDP
(9) Configuring time clock
(10) Configuring Banners
(11) Command line shortcuts and editing shortcuts
(12) Managing history
(13) Configure logging
(14) Boot system commands
Following function and options are not similar in router and switch.
(1) Default hostname is Switch
(2) Auxiliary port is not present
(3) VTY ports are mostly 0 to 15
(4) By default interfaces are enabled
(5) IP address cannot be assign to interfaces
(6) Routing configuration mode is not present
(7) Interface no. starts from 1
(8) Web access is by default enabled
(9) Configuration registry is not present in similar manner
(10)
Flash memory may contain multiple files and startup-configuration is also saved in flash
Configuring IP and Gateway on switch
We can configure IP address on switch for web access or telnet IP address is required for the
administration of the switch. If we have to access switch from remote n/w then we will configure default
gateway in addition to IP address.
IP address is assigned to the logical interface of switch with following command:Switch(config)#interface vlan 1
Switch(config)#IP address <ip><mask>
Switch(config)#no sh Switch(config)#exit
Old Switches
Switch(config)#ip address <ip><mask>
Switch(config)#exit
Configuring Gateway
Switch(config)#ip default-gateway <ip>
Switch(config)#exit
Breaking Switch Password
(1) Power off switch press mode button present in front of switch then power on the switch.
(2) Keep mode button press until Switch: prompt appears on console.
(3) In switch monitor mode, type following commands: flash_initload_helper
renameflash:config.text flash:<anyname>dir flash:
boot
(4) After booting switch will prompt to enter in initial configuration dialog. Enter no here and type.
Switch>enable
Rename flash:<anyname>Flash:config.text Configure memory
Change password and save config. Then copy run start_config.
Cisco Hierarchal Model
When we want to create a large sized LAN network then we may face following problems if we are
going design the network in flat model.
(1) High latency
(2) Conjunction between switches
(3) Large broadcast domain
Cisco hierarchal model recommends three layer design of the network
(i) Core layer
(ii) Distribution layer
(iii) Access layer
on each layer there are some rules which we have to follow
(1) Highest performance devices are connected on Core layer
(2) Resources should be placed on Core layer
(3) Polices should not be applied on core layer
(4) On distribution layer, we can implement policies
(5) Distribution and Core devices should be connected with high-speed links.
(6) Access layer devices are basic devices and may be non manageable.
CORE LAYER
DISTRIBUTION
LAYER
ACCESS
LAYER
(Hierarchal model)
After using hierarchal model the most of LAN problem will be solve but one problem still
remain same that is all pc s will be in single broadcast domain. We have to implement
following solution for this problem.
(1) Physical Segmentation
(2) Logical Segmentation VLAN
Trunking
VTP
Inter
VLAN
Pruning
Logical Segmentation of Network
To perform logical segmentation, we have to create VLAN in the network. With the help of
VLAN, we can logically divide the broadcast domain of the network
VLAN (Virtual LAN)
VLAN provides Virtual Segmentation of Broadcast Domain in the network. The devices, which are
member of same Vlan, are able to communicate with each other. The devices of different Vlan may
communicate with each other with routing. So that different Vlan devices will use different n/w addresses.
Vlan provides following advantages: (1) Logical Segmentation of network
(2) Enhance network security
Creating port based Vlan
In port based Vlan, first we have to create a Vlan on manageable switch then we have to add ports to the
Vlan.
Commands to create Vlan
Switch#configterSwitch(config)#vlan<no>
[name<word>] Switch(config)#exit
optional
Or
Switch#vlan database
Switch(vlan)#vlan<no>
[name<word>]
Switch(vlan)#exit
Commands to configure ports for a Vlan
By default, all ports are member of single vlan that is Vlan1. we can change vlan membership
according to our requirement.
Switch#confter
Switch(config)#interface <type><no>
Switch(config-if)#switchport access vlan<no>
Switch(config-if)#exit
Commands to configure multiple ports in a vlan
Switch#confter
Switch(config)#interface range <type><slot/port no (space)(space) port no> Switch(configif)#switchport access vlan<no>
Switch(config-if)#exit
Example: - Suppose we want to add interface fast Ethernet 0/10 to 0/18 in vlan5Switch#configter
Switch(config)#interface range fastethernet 0/10 18 Switch(configif)#switchport access vlan 5 Switchconfig-if#exit
Mac address
00-08-a16-ab-6a-7b
type
dynamic
ports
fa0/7
In Trunking: -
Vlan 1,3,7
Trunk
Trunk
Switches will perform trunking with the help of frame tagging. The trunk port will send data frames by
adding a Vlan id information to the frame, at the receiving end vlanidinformation is removing from the
end and according to the tag data is delivered to the corresponding vlan. There are two protocols to
perform frame tagging.
(1) Inter switch link (cisco prop)
(2) IEEE 802.1 q
Configuring Trunking
In cisco switches all switch ports may be configured in three modes
(1) Trunk desirable (default)
(2) Trunk on
(3) Trunk off
Switch#confter
Switch(config)#interface <type><no>
Switch(config-if)#switchport mode <trunk|access|auto>
Switch(config-if)#exit
on
off desirable
To configure Vlans allowed on Trunk
By default all Vlans are allowed on Trunk port. We can add/remove a partucularVlan from trunk port
with following command
Switch#configterSwitch(config)#interface <type><no>
Switch(config-if)#switchport trunk allowed vlan all
Remove <vlan> Add
<vlan>Except<vlan>
To display trunk interfaces
Switch#sh interface trunk
Switch#sh interface <type><no> trunk
VlanTrunking Protocol (VTP)
With the help of VTP, we can simplify the process of creating Vlan. In multiple switches, we can
configure one switch as VTP server and all other switches will be configured as VTP client. We will create
Vlans on VTP server switch. The server will send periodic updates to VTP client switches. The clients will
create Vlans from the update received from the VTP server.
VTP server
VTP server is a switch in which we can create, delete or modify Vlans. The server will send periodic
updates for VTP clients.
VTP client
On VTP client, we are not able to create, modify or delete Vlans. The client will receive and forward vtp
updates. The client will create same Vlans as defined in vtp update.
VTP Transparent
Transparent is a switch, which will receive and forward VTP update. It is able to create, delete and
modify Vlans locally. A transparent will not send its own VTP updates and will not learn any information
from received vtp update.
Commands
Switch#confter
Switch(config)#vtp domain <name>
Switch(config)#vtp password <word>
Switch(config)#vtp mode <server|client|transparent>
Switch(config)#exit
By default in cisco switches the VTP mode is set as VTP server with no domain and no password.
To display VTP status
Switch#shvtp status
VTP Pruning
Pruning is the VTP feature through which a trunk link can be automatically disable, for a particular Vlan if
neighbor switch does not contain ports in that Vlan. Vlan1 is not prun eligible.
Command to configure VTP Pruning
We have to use only one command on VTP server for VTP Pruning. Switch#confter
Switch(config)#vtp pruning
Switch(config)#exit
Router
E0
E2
10.0.0.1
12.0.0.1
E1
11.0
Vlan1
T
Vlan3
T
Vlan5
T
1, 3, 5
1 3 5
13 5
1 3
N/w
10.x.x.x
11.x.x.x
12.x.x.x
Gateway 10.0.0.1
11.0.0.1
12.0.0.1
(2) Inter Vlan using router on a stick method
In this method a special router is used for Inter Vlan. In this router, we can create one interface for
each Vlan. The physical interface of router will be connected on trunk port switch. This router will route
traffic on the same interface by swapping vlan id information with the help of frame tagging protocol.
Router
Fa 0/0.1 10.0.0.1 -> Vlan1
Fa 0/0.2 11.0.0.1 -> Vlan3
Fa 0/0.3 12.0.0.1 -> Vlan5
Fa 0/0
Vlan 1, 3, 5
T
Trunk
T
T
1
N/w 10.x.x.x
Gateway 10.0.0.1
T
5
T
3
11.x.x.x
11.0.0.1
Configuration on Router
Router#configter
Router(config)#interface fastethernet 0/0
Router(config-if)#no ip address
Router(config-if)#no sh
Router(config-if)#exit
Router(config)#interface fastethernet 0/0.1
Router(config-if)#encapsulation dot1q 1
Router(config-if)#ip address 10.0.0.1 255.0.0.0
Router(config-if)#no sh
Router(config-if)#exit
Router(config)#interface fastethernet 0/0.2
Router(config-if)#encapsulation dot1q 3
Router(config-if)#ip address 11.0.0.1 255.0.0.0
Router(config-if)#no sh
12.x.x.x
12.0.0.1
Router(config-if)#exit
Router(config)#interface fastethernet 0/0.3
Router(config-if)#encapsulation dot1q 5
Router(config-if)#ip address 12.0.0.1 255.0.0.0
Router(config-if)#no sh
Router(config-if)#exit
Configuration on Core switch
(1) Configure switch as VTP server
(2) Create Vlans
(3) Configure interface connected to router as Trunk
(4) Configure interfaces connected to other switches as trunk (if required)
Configuration on Distribution layer switches
(1) Configure switch as VTP client
(2) Configure required interface as Trunk (optional)
(3) Add ports to Vlan
Configuration on Pc
Configure IP and Gateway
Spanning Tree Protocol
When we connect multiple switches with each other and multiple path exist from one switch to another
switch then it may lead to the switching loop in the network. Multiple paths are used to create
redundancy in the network. STP is only required when multiple path exist then there is possibility of
loop in n/w.
Packets
Switch
Switch
Switch
Spanning Tree Protocol will solve this problem by blocking the redundancy interface. So that only one
path will remain active in the switches. If the primary path goes down then disabled link will become
enable and data will be transferred through that path.
Working of STP
The STP will create a topology database in which one switch will be elected as Route switch. Path cost
is calculated on the basis of bandwidth. The lowest path cost link will be enable mode and another path
will be disable.
Root Switch
1 Gb
1 Gb
Switch
Switch
100 Mb
100 Mb
100 Mb
Switch
Switch
Lowest cost (Disable)
STP terminology
(1) Bridge id
It is the combination of bridge priority and base mac address. In Cisco switches default priority
no. is 32768.
(2) Root Bridge
The Bridge/Switch with lowest Bridge id will become the Route Bridge. Route Bridge is used as
the center point for calculating path cost in topology.
(3) BPDU Bridging Protocol Data Units
It is the STP information, which is exchange between the switches to create topology and path
selection.
(4) STP port mode
An STP is enabled a port may be in one of the following mode.
(i) Listening: - in this mode a port will send/receive BPD.
(ii)
Learning: - a port will learn mac address table.
(iii)
Forwarding: - the port will forward data based on mac address table.
(iv)Blocking: - the port is block to send/receive data by Spanning Tree Protocol.
(v) Disable: - the port is administratively disabled.
Path cost calculation
The links in switches will be enable or disabled on the basis of path cost. The path cost for each link is
calculated according to following table.
Old IEEE
Speed
10 Mb
100 Mb
1 Gb
10 Gb
Cost
New IEEE
Cost
100
10
1
1
100
19
4
2