CCNA Powerpoint - 1
CCNA Powerpoint - 1
CCNA Powerpoint - 1
Network Training
U Aung Khaing
Chapter-1
Networking Fundenmental
Network Basic
Networking Hardware
Network Characteristics
Host To Host Communication:
MAC Address
TCP / UDP Protocols
IP Addressing
Subnetting
3
The Cisco IOS Operating System
Y-Max University (YMU)
What is a Network?
A network consists of two or more computers that are linked in order to share
resources
exchange files,
(such as printers and CDs/DVDs), Drive HDD Storage
allow electronic communications.
game ML
4
Y-Max University (YMU)
Networking hardware:
5
Y-Max University (YMU)
Hub
Hubs connect multiple computer networking devices together.
6
Y-Max University (YMU)
Types of hubs
Active hubs repeat and strengthen incoming transmissions. They are also
sometimes referred to as repeaters.
Switch
Switches generally have a more intelligent role than hubs.
Routers are located at gateways, the places where two or more networks
connect.
Routers are intelligent devices, and they store information about the
networks they’re connected to
Y-Max University (YMU)
Types of routers
Core routers used by Internet Service Providers (ISPs) are the fastest and
most powerful,
A wireless router works in the same way as the router in a hard-wired home
or business local area network (LAN),
Y-Max University (YMU)
Bridge
Bridges are used to connect two or more hosts or network segments
together.
They use hardware Media Access Control (MAC) addresses for transferring
frames.
Bridges can also be used to connect two physical LANs into a larger logical
LAN.
Y-Max University (YMU)
Modem
Modem is short for "Modulator-Demodulator.
Similarly, it converts digital data from a computer or other device into an analog
signal that can be sent over standard telephone lines.
Access Point
An access point is a device that creates a wireless local area network, or
WLAN, usually in an office or large building
Internet
New York Boston
Wide Area
Network
Network Characteristics
Topology
Speed
Cost
Security
Availability
Scalability
Reliability
Host to Host Communications
Y-Max College (YMC)
MAC Address
A Unique Identifier assigned to network interfaces
Work at the data link layer
Also be known as Hardware Address or Physical Address
48-bit address
12 Hexadecimal digits, grouped in 6 pairs.
Example: 00 03 47 6F 5A 38
Sender Receiver
SYN
SYN-ACK
ACK
Y-Max College (YMC)
TCP/UDP Port Numbers
IP Addressing
Y-Max University (YMU)
What is IP Address.
IP History and Management.
Classes of IP Addresses.
Subnet Mask.
Valid and Invalid IP.
IPv4 Addresses: Public & Private
What is Subnetting.
Types of Subnetting
- FLSM (Full Length Subnet Mask)
- VLSM (Variable Length Subnet Mask)
Y-Max University (YMU)
IP HISTORY AND
MANAGEMENT
Y-Max University (YMU)
1992:
“It has become clear that … these problems are likely to become critical within the
next one to three years.” (RFC1366)
2004:
Establishment of the
Number Resource Organisation
Y-Max University (YMU)
Allocation
RIR*
IETF : Internet Engineering Task Force
IANA : Internet Assigned Numbers Authority
Allocation
ISP
American Registry for Internet Numbers (ARIN) for North America and parts of the Caribbean
RIPE Network Coordination Centre (RIPE NCC) for Europe, the Middle East and Central Asia
Asia-Pacific Network Information Centre (APNIC) for Asia and the Pacific region
Latin American and Caribbean Internet Addresses Registry (LACNIC) for Latin America and parts of
the Caribbean region
African Network Information Centre (AfriNIC) for Africa
Y-Max University (YMU)
Introduction to TCP/IP
What is TCP/IP?
TCP/IP is a standard protocol used between computers and network devices for
communication.
Y-Max University (YMU)
TCP/IP Addressing
IP Address is logical address given to each and every device in the network
defined by IANA.
Resides at OSI Layer-3 address (Network Layer).
Classes of IP Addresses
Classes Range Binary
Subnet Mask
Class A 255.0.0.0 /8
16 bits 16 bits
Class B Network Network Host Host
24 bits 8 bits
High-Order Bits
Class A (0)
Class B (10)
Class C (110)
Y-Max University (YMU)
Assignable IP Addresses
The number of assignable IP addresses in the various classes of IP addresses
shown in table.
Classes Range Binary Total number of Total number of
networks host
class A 10.0.0.0
class B 172.16.0.0
class C 192.168.10.0
When all the HOSTID portion bits of an IP address are one’s then it is called Broadcast Address.
class A 10.255.255.255
class B 172.16.255.255
class C 192.168.10.255
When all the NETID as well as HOSTID portion bits of an IP address are 0’s then it is used for Default
Routing (CISCO Routers)
Address 0.0.0.0
169.254.0.0/16
Y-Max University (YMU)
Private IP Public IP
Used with the LAN or within the Used on public network (Internet)
organization.
Unregistered IP Registered IP
Y-Max University (YMU)
Subnetting
Y-Max University (YMU)
Subnetting : A network is divided into several smaller networks with each subnetwork
(or subnet) having its subnetwork address
Reasons:-
Provides addressing flexibility for the network administrator.
-Each LAN must have its own network or subnetwork address.
Provides some security since access to other subnets is only available through the
services of a router.
Reduce the Wastage of IP Addresses
Reduce network traffic
Y-Max University (YMU)
Subnetting
Class A, B, C in IP addressing are designed with two levels of hierarchy (not subnetted)
Subnetting (cont’d)
Further division of a network into smaller networks called subnetworks
R1 differentiating subnets
Y-Max University (YMU)
Subnetting (cont’d)
Three levels of hierarchy : netid, subnetid, and hostid
Y-Max University (YMU)
Types of Subnetting
Step 2: Identify the the total number of hosts for each subnets (how many)?
2m - 2 = number of valid hosts
26 – 2 = 62
Where m are remaining number of bits in hostid portion.
VLSM
Subnetting is based up HostId portion bits.
VLSM
Before VLSM
Need 10 addresses Class C. Give them
256.
Need 200 addresses Class C. Give them
256.
Need 500 addresses Class B. Give them
65,536.
Need 1000 addresses Class B. Give them
65,536.
Need 4000 addresses Class B. Give them
65,536.
The OSI Open Systems Interconnect Model
L7
OSI Reference Model - Encapsulation
L6 L7
OSI Reference Model - Encapsulation
L5 L6 L7
OSI Reference Model - Encapsulation
L4 L5 L6 L7
OSI Reference Model - Encapsulation
L3 L4 L5 L6 L7
OSI Reference Model - Encapsulation
L2 L3 L4 L5 L6 L7
OSI Reference Model - Encapsulation
L2 L3 L4 L5 L6 L7
OSI Reference Model - Encapsulation
L2 L3 L4 L5 L6 L7
OSI Reference Model - Encapsulation
L2 L3 L4 L5 L6 L7
OSI Reference Model - Encapsulation
L3 L4 L5 L6 L7
OSI Reference Model - Encapsulation
L4 L5 L6 L7
OSI Reference Model - Encapsulation
L5 L6 L7
OSI Reference Model - Encapsulation
L6 L7
OSI Reference Model - Encapsulation
L7
OSI Model
Benefits
Engineers do not need to design a technology to work end to end from
top to bottom of the model. They can just focus on their layer of
expertise, and make sure they comply with the standards for the layers
above and below.
This leads to open standards and multi-vendor interoperability.
For example: If you’re an application developer, you can just focus on
the top three layers, the lower layers are the domain of network
engineers.
Troubleshooting is easier because you can analyse a problem in a
logical fashion layer by layer.
The OSI Open Systems Interconnect
Model
It’s difficult to overstate how important the OSI Model is to computer
networking.
As you become more experienced you will ‘think’ according to the OSI
model when you are troubleshooting or learning a new network
technology.
On the job you will hear technologies and problems being described
according to their OSI layer.
OSI
Acronyms
The Classic: Please Do Not Throw Sausage Pizza Away
• For example, web servers have many users, so there are many
communication processes open at any given time to track.
Each of these layers have their own dedicated section later and you
will learn much more detailed information about them throughout the
course.
Layer 4 – The Transport Layer
The main characteristics of the Transport layer are whether TCP or
UDP transport is used, and the port number.
Definition:
‒ The transport layer defines services to segment, transfer, and
reassemble the data for individual communications between the end
devices.
‒ It breaks down large files into smaller segments that are less likely to
incur transmission problems.
Layer 3 – The Network
Layer
The most important information at the Network layer is the source and
destination IP address.
Routers operate at Layer 3.
Definition:
‒ The network layer provides connectivity and path selection between
two host systems that may be located on geographically separated
networks.
‒ The network layer is the layer that manages the connectivity of hosts
by providing logical addressing.
Layer 2 – The Data-Link
Layer
The most important information at the Data-Link layer is the source
and destination layer 2 address.
For example the source and destination MAC address if Ethernet is the
layer 2 technology.
Switches operate at Layer 2.
Definition:
‒ The data link layer defines how data is formatted for transmission and
how access to physical media is controlled.
‒ It also typically includes error detection and correction to ensure a
reliable delivery of the data.
Layer 1 – The Physical
Layer
• The Physical layer concerns literally the physical components of
the network, for example the cables being used.
• Definition:
‒ The physical link enables bit transmission between end
devices.
‒ It defines specifications needed for activating, maintaining,
Sender
Broadcast
Traffic
Sender
Unicast Traffic to Multiple
Hosts
Sender
Multicast
Traffic
Sender
The Cisco IOS Operating System
A Short History of Cisco Operating
Systems
• Most people think of Cisco as primarily a routing and switching
company, but they actually started out with just routers in 1984.
• IOS is the operating system that has been used on Cisco routers since
their inception.
• Cisco Catalyst switches evolved from the acquisition of Crescendo in
1993.
• The original Cisco switch operating system was CatOS, which has now
been deprecated.
A Short History of Cisco Operating
Systems
• Cisco firewalls evolved from the acquisition of Network Translation’s
PIX firewall with Finesse operating system in 1995.
• Cisco switches and firewalls were ported over to the IOS operating
system over the following years.
Other Cisco Operating
Systems
• IOS remains as the operating system used on the majority of Cisco
enterprise grade network devices.
• Other operating systems have been developed for some more recent
router and switch platforms.
Other Cisco Operating
Systems
The Cisco Nexus and MDS data center switch product lines run on
NX-OS.
The IOS-XR operating system runs on the service provider NCS, CRS,
ASR9000 and XR12000 series routers.
IOS-XE runs on the ASR1000 series service provider routers.
The Command Line Interfaces for the other operating systems are
nearly identical to IOS.
Connecting to a Cisco Device over the
network
• The lab exercises in this course use Cisco Packet Tracer simulation
software on your PC.
• See Section 2 ‘How to Set Up the Lab’ for step by step instructions on
how to use Packet Tracer for the course lab exercises.
• This lecture shows how to connect to a real router or switch over the
network with Putty.
• You do not need to install or use Putty to do the course lab exercises.
Connecting over the
network
Connecting to a Cisco
Device
To get to the Command Line Interface for day to day management of a
Cisco device you will use Secure Shell (SSH) to connect to it’s management
IP address over the network.
Telnet is also supported but not recommended because it is insecure.
In enterprise networks, secure login will typically be enforced through
integration with a centralised AAA (Authentication, Authorization and
Accounting) server.
We will cover SSH and AAA in later lessons.
Connecting to a Cisco
Device
To get to the Command Line Interface for day to day management of a
Cisco device you will use Secure Shell (SSH) to connect to it’s management
IP address over the network.
Telnet is also supported but not recommended because it is insecure.
In enterprise networks, secure login will typically be enforced through
integration with a centralised AAA (Authentication, Authorization and
Accounting) server.
We will cover SSH and AAA in later lessons.
Out of Band
Management
Connecting to a Cisco
Device
• This lecture shows how to connect to a real router or switch over a
console connection with Putty.
• The lab exercises in this course use Cisco Packet Tracer simulation
software on your PC.
• You do not need to install or use Putty to do the course lab
exercises.
• See Section 2 ‘How to Set Up the Lab’ for step by step instructions on
how to use Packet Tracer for the course lab exercises.
Initial Connection to a Cisco
Device
Cisco devices do not usually have a default IP address, so we need to
set one up before we can connect to it over the network.
We need a way to connect to the device to do the initial configuration
including adding IP addresses. This is where the console connection
comes in.
The Console Cable (DB9 to
RJ45)
The New Console Cable (USB to Mini-
USB)
Console Connection Troubleshooting
• As well as for initial configuration, the console port can be used if the
device’s IP addresses become unresponsive.
• It can also be used to troubleshoot the bootup process. You can view
the device booting up from a console connection but this is not
possible with SSH because the system must have booted already
before the IP address will be live.
IOS Command Hierarchy
hostname> User Exec mode
•There must be only one possible match for what you typed for
abbreviation to succeed
Context Sensitive Help
•‘show ?’ will show all available keyword options for the ‘show’
command
•‘show ip ?’ will show all available keyword options for the ‘show ip
command’
Moving the Cursor
•The arrow keys (˂ and ˃) move the cursor left and right one character
at a time
•See http://etherealmind.com/cisco-ios-cli-shortcuts/
for more
Command History
The up and down arrows (˄ and ˅) cycle through previously entered
commands at the same level in the hierarchy.
Showing command output
•Enter will show ‘show’ command output which scrolls off the end of the
page line by line.
•The Spacebar will show it page by page.
•Ctrl-C will break out of the show command output and return to the
command prompt.
Piped Command Examples
show running-config interface FastEthernet0/0