You are on page 1of 148

Networking Essentials and Awareness of CCNA

By

M.Gomathy Nayagam

Asst.Professor Department of Computer Science and Engineering Kalasalingam University Anand Nagar Krishnankoil-626190

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Contents
What is Network? Why we need Data Network? Networking Devices Network Topology LAN,MAN,& WAN Layered Approach Networking Media IP Address Design and Planning Router ,CISOC IOS and its Basic Configuration Switching and Basic Configurations CCNA EXAM Overview Opportunities in Networking Career
TCNE,KALASALINGAM UNIVERSITY

ISO/OSI Model TCP/IP Model.

3/22/2012

What is Network?
Communication! An interconnection of computers and other devices: Printers Servers (computers) Scanners Network Devices


3/22/2012

Hubs Switches Routers Firewall Modem Wired and Wireless


TCNE,KALASALINGAM UNIVERSITY

Why we need Data Network?


Sharing data through the use of floppy disks is not an efficient or cost-effective manner. Businesses needed a solution that would successfully address the following three problems: How to avoid duplication of equipment and resources How to communicate efficiently How to set up and manage a network Businesses realized that networking technology could increase productivity while saving money.

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Networking Devices
Equipment that connects directly to a network segment is referred to as a device. These devices are broken up into two classifications. End-user devices Network devices End-user devices include computers, printers, scanners, and other devices that provide services directly to the user. Network devices include all the devices that connect the end-user devices together to allow them to communicate.
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

Network Interface Card


A network interface card (NIC) is a printed circuit board that provides network communication capabilities to and from a personal computer. Also called a LAN adapter.

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Network Interface Card


NICs are also called LAN adapters, it resides in a slot on the motherboard and provides an interface connection to the network media. The type of NIC must match the media and protocol used on the local network. NICs communicate with the network through a serial connection and with the computer through a parallel connection. The NIC uses an I/O address, an IRQ, and upper memory space to work with the OS. When selecting a NIC, consider the following:
Protocols FDDI, Token Ring, Ethernet Types of media twisted pair, coaxial, wireless, fiber. Type of system bus PCI, ISA, EISA

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Testing Internet Connectivity with PING

Ping is a utility used to verify Internet connectivity. The ping command works by sending multiple IP packets to a specified destination. Each packet sent is a request for a reply. The output response for a ping contains the success ratio and round-trip time to a destination. Ping 127.0.0.1 Called the internal loop back test and verifies the operation of the TCP/IP stack and NIC card function. Ping ip address of host Verifies the TCP/IP address configuration for the local host and connectivity to the host. Ping default-gateway IP Verifies whether the router that connects the local network to other networks can be reached. Ping remote destination IP Verifies connectivity to a remote host.
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

3/22/2012

Hub

Connects a group of Hosts

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Switch

Switches add more intelligence to data transfer management.

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Router
Routers are used to connect networks together Route packets of data from one network to another Cisco became the de facto standard of routers because of their highquality router products Routers, by default, break up a broadcast domain

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Topology
Topology- the way of network is laid out.

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Mesh Topology

Every device has a dedicated point-to-point link to every other device. N- device needs to participate in mesh topology means it requires n(n-1)/2 physical Channel and n-1 input/output ports.

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Star Topology
Each device has dedicated point-to-point link only to central controller, usually called Hub.

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Tree Topology
A variation of star. In star, every node linked to central hub. Here, not every node plugs directly into the central hub.

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Bus Topology

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Ring Topology

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Hybrid Topology

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Physical and Logical Topology

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

LANs

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

WANs

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Virtual Private Network


A VPN is a private network that is constructed within a public network infrastructure such as the global Internet. Using VPN, a telecommuter can access the network of the company headquarters through the Internet by building a secure tunnel between the telecommuters PC and a VPN router in the headquarters.

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Bandwidth

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Measuring Bandwidth

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Internetworking Devices

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

What Are The Components Of A Network ?


Home Office Internet Mobile Users

Branch Office
3/22/2012

Main Office

TCNE,KALASALINGAM UNIVERSITY

Network Structure & Hierarchy


Core Layer

Distribution Layer

Access Layer

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Why do we need the OSI Model?


To address the problem of networks increasing in size and in number, the International Organization for Standardization (ISO) researched many network schemes and recognized that there was a need to create a network model This would help network builders implement networks that could communicate and work together ISO therefore, released the OSI reference model in 1984.

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Dont Get Confused.

ISO - International Organization for Standardization OSI - Open System Interconnection IOS - Internetwork Operating System

To avoid confusion, some people say International Standard Organization.


3/22/2012 TCNE,KALASALINGAM UNIVERSITY

The OSI Reference Model


7 Application The OSI Model will be used throughout your entire networking career!

6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
3/22/2012

Memorize it!

TCNE,KALASALINGAM UNIVERSITY

OSI Model
Application Application (Upper) Layers Presentation Session Transport Network Data-Link Physical

Data Flow Layers

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Layer 7 - The Application Layer


7 Application This layer deal with networking applications. Examples: Email Web browsers

6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
3/22/2012

PDU - User Data

Each of the layers have Protocol Data Unit (PDU)


TCNE,KALASALINGAM UNIVERSITY

Layer 6 - The Presentation Layer


7 Application This layer is responsible for presenting the data in the required format which may include: Code Formatting Encryption Compression

6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
3/22/2012

PDU - Formatted Data

TCNE,KALASALINGAM UNIVERSITY

Layer 5 - The Session Layer


7 Application
This layer establishes, manages, and terminates sessions between two communicating hosts. Creates Virtual Circuit Coordinates communication between systems Organize their communication by offering three different modes Simplex Half Duplex Full Duplex

6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
3/22/2012

Example: Client Software ( Used for logging in)


TCNE,KALASALINGAM UNIVERSITY

PDU - Formatted Data

Half Duplex
It uses only one wire pair with a digital signal running in both directions on the wire.
It also uses the CSMA/CD protocol to help prevent collisions and to permit retransmitting if a collision does occur. If a hub is attached to a switch, it must operate in half-duplex mode because the end stations must be able to detect collisions. Half-duplex Ethernettypically 10BaseTis only about 30 to 40 percent efficient because a large 10BaseT network will usually only give you 3 to 4Mbpsat most.
TCNE,KALASALINGAM UNIVERSITY

3/22/2012

Full Duplex
In a network that uses twisted-pair cabling, one pair is used to carry the transmitted signal from one node to the other node. A separate pair is used for the return or received signal. It is possible for signals to pass through both pairs simultaneously. The capability of communication in both directions at once is known as full duplex.

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Layer 4 - The Transport Layer


7 Application
This layer breaks up the data from the sending host and then reassembles it in the receiver. It also is used to insure reliable data transport across the network. Can be reliable or unreliable Sequencing Acknowledgment Retransmission Flow Control

6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
3/22/2012

PDU - Segments
TCNE,KALASALINGAM UNIVERSITY

Layer 3 - The Network Layer


7 Application
Sometimes referred to as the Cisco Layer. End to End Delivery Provide logical addressing that routers use for path determination Segments are encapsulated Internetwork Communication Packet forwarding Packet Filtering Makes Best Path Determination Fragmentation PDU Packets IP/IPX

6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
3/22/2012

TCNE,KALASALINGAM UNIVERSITY

7 Application

Layer 2 - The Performs LinkAddressing Data Physical Layer

6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
Preamble
3/22/2012

This layer provides reliable transit of data across a physical link. Combines bits into bytes and bytes into frames Access to media using MAC address Error detection, not correction LLC and MAC Logical Link Control performs Link establishment MAC Performs Access method

PDU - Frames
SMAC Data length DATA FCS
TCNE,KALASALINGAM UNIVERSITY

DMAC

Layer 1 - The Physical Layer


7 Application

6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
3/22/2012

This is the physical media through which the data, represented as electronic signals, is sent from the source host to the destination host. Move bits between devices Encoding

PDU - Bits
TCNE,KALASALINGAM UNIVERSITY

Data Encapsulation
Application
Presentation Upper-Layer Data TCP Header Upper-Layer Data Session

PDU
Segment

Transport

IP Header

Data

Network

Packet

LLC Header

Data

FCS

Data-Link

Frame

MAC Header

Data

FCS

0101110101001000010
3/22/2012

Physical

Bits

TCNE,KALASALINGAM UNIVERSITY

Data Encapsulation

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Processes performed by each layer of the model

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Data Flow Through a Network

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Type of Transmission
Unicast Multicast Broadcast

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Type of Transmission

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Broadcast Domain
A group of devices receiving broadcast frames initiating from any device within the group Routers do not forward broadcast frames, broadcast domains are not forwarded from one broadcast to another.

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Collision
The effect of two nodes sending transmissions simultaneously in Ethernet. When they meet on the physical media, the frames from each node collide and are damaged.

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Collision Domain
The network area in Ethernet over which frames that have collided will be detected. Collisions are propagated by hubs and repeaters Collisions are Not propagated by switches, routers, or bridges

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Physical Layer
Defines
Media type

Connector type
Signaling type

802.3 is responsible for LANs based on the carrier sense multiple access collision detect (CSMA/CD) access methodology. Ethernet is an example of a CSMA/CD network.
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

Physical

802.3

Physical Layer: Ethernet/802.3


10Base2Thin Ethernet 10Base5Thick Ethernet

Host Hub
10BaseTTwisted Pair

Hosts

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Device Used At Layer 1


Physical

All devices are in the same collision domain. All devices are in the same broadcast domain. Devices share the same bandwidth.
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

Hubs & Collision Domains


More end stations means more collisions.
CSMA/CD is used.

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Layer 2
MAC Layer802.3
Number of Bytes

2 Length

Variable Data

4 FCS

Preamble Destination Address Source Address

0000.0C
IEEE Assigned

xx.xxxx
Vendor Assigned

Ethernet II uses Type here and does not use 802.2.

MAC Address
3/22/2012

synchronize senders and receivers

TCNE,KALASALINGAM UNIVERSITY

Devices On Layer 2 (Switches & Bridges)


Data-Link

OR

Each segment has its own collision domain. All segments are in the same broadcast domain. 3/22/2012 TCNE,KALASALINGAM UNIVERSITY

Switches

Switch
Memory

Each segment is its own collision domain. Broadcasts are forwarded to all segments.
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

Layer 3 : Network Layer


Defines logical source and destination addresses associated with a specific protocol
Defines paths through network
3/22/2012

Network

IP, IPX

Data-Link

802.2

Physical

802.3

EIA/TIA-232 V.35

TCNE,KALASALINGAM UNIVERSITY

Layer 3 : (cont.)
Network Layer End-Station Packet
IP Header
Source Address Destination Address Data

Logical Address

172.15.1.1
Network Node

Route determination occurs at this layer, so a packet must include a source and destination address. Network-layer addresses have two components: a network component for internetwork routing, and a node number for a device-specific address. The example in the figure is an example of an IP packet and address.
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

Layer 3 (cont.)
Address Mask

172.16.122.204 255.255.0.0
172 16 122 204

Binary Address 10101100 00010000 01111010 11001100


255 255 0 0

Binary Mask

11111111 11111111
Network

00000000 00000000
Host

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Device On Layer 3 Router


Broadcast control Multicast control Optimal path determination Traffic management Logical addressing Connects to WAN services

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Layer 4 : Transport Layer


Distinguishes between upper-layer applications Establishes end-to-end connectivity between applications Defines flow control Provides reliable or unreliable services for data transfer
Transport TCP UDP SPX

Network

IP

IPX

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Reliable Service

Sender

Receiver

Synchronize
Acknowledge, Synchronize Acknowledge

Connection Established
Data Transfer (Send Segments)
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

How They Operate


Hub Bridge Switch Router

Collision Domains: 1 4 Broadcast Domains: 1


3/22/2012

4 1

4 4

TCNE,KALASALINGAM UNIVERSITY

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Why Another Model?

Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light. The U.S. Department of Defense (DoD) created the TCP/IP reference model because it wanted a network that could survive any conditions, even a nuclear war.
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

TCP/IP Protocol Stack


Application Presentation Session Transport Network Application
4 5

7 6 5 4 3 2 1

Transport
3

Internet
2

Data-Link
Physical
3/22/2012

Data-Link
1

Physical
TCNE,KALASALINGAM UNIVERSITY

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Origin of Ethernet
Found by Xerox Palo Alto Research Center (PARC) in 1975
Original designed as a 2.94 Mbps system to connect 100 computers on a 1 km cable Later, Xerox, Intel and DEC drew up a standard support 10 Mbps Ethernet II

Basis for the IEEEs 802.3 specification


Most widely used LAN technology in the world
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

10 Mbps IEEE Standards - 10BaseT


10BaseT 10 Mbps, baseband, over Twisted-pair cable
Running Ethernet over twisted-pair wiring as specified by IEEE 802.3 Configure in a star pattern Twisting the wires reduces EMI

Unshielded twisted-pair

Fiber Optic has no EMI

RJ-45 Plug and Socket

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Twisted Pair Cables


Unshielded Twisted Pair Cable (UTP) most popular maximum length 100 m prone to noise

Category 1 Category 2 Category 3 Category 4 Category 5 Category 6


3/22/2012

Voice transmission of traditional telephone For data up to 4 Mbps, 4 pairs full-duplex For data up to 10 Mbps, 4 pairs full-duplex For data up to 16 Mbps, 4 pairs full-duplex For data up to 100 Mbps, 4 pairs full-duplex For data up to 1000 Mbps, 4 pairs full-duplex
TCNE,KALASALINGAM UNIVERSITY

Baseband VS Broadband
Baseband Transmission
Entire channel is used to transmit a single digital signal Complete bandwidth of the cable is used by a single signal The transmission distance is shorter The electrical interference is lower
Use analog signaling and a range of frequencies Continuous signals flow in the form of waves Support multiple analog transmission (channels)

Broadband Transmission

Baseband 3/22/2012 Transmission

Modem Network TCNE,KALASALINGAM UNIVERSITY Card

Broadband Transmission

Straight-through cable

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Straight-through cable pinout

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Crossover cable

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Crossover cable

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Rollover cable

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Rollover cable pinout

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Straight-Thru or Crossover
Use straight-through cables for the following cabling: Switch to router Switch to PC or server Hub to PC or server
Use crossover cables for the following cabling: Switch to switch Switch to hub Hub to hub Router to router PC to PC Router to PC
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

IP Addressing
32 Bits Dotted Decimal Maximum
1

Network

Host

255
8 9

255
16 17

255
24 25

255
32

Binary

11111111 11111111
128 64 32 16 8 4 2 1 128 64 32 16 8 4 2 1

11111111 11111111
128 64 32 16 8 4 2 1 128 64 32 16 8 4 2 1

Example 172 16 122 204 Decimal Example 10101100 00010000 01111010 11001100 Binary 3/22/2012 TCNE,KALASALINGAM UNIVERSITY

IP Address Classes
8 Bits 8 Bits Host 8 Bits Host Host 8 Bits Host Host Host

Class A:
Class B: Class C: Class D: Class E:
3/22/2012

Network

Network Network

Network Network Network

Multicast Research
TCNE,KALASALINGAM UNIVERSITY

IP Address Classes
Bits: 1 8 9 Host 16 17 16 17 Host 24 25 24 25 Host 32 32

Class A:
Bits:

0NNNNNNN Range (1-126) 1 8 9

Class B:
Bits:

10NNNNNN
Range (128-191) 1 8 9 110NNNNN Range (192-223) 1 8 9 1110MMMM

Network
16 17 Network

Host
24 25

Host
32 Host 24 25 32

Class C:
Bits:

Network 16 17

Class D:
3/22/2012

Multicast Group Multicast Group Multicast Group

Range (224-239)

TCNE,KALASALINGAM UNIVERSITY

Host Addresses
172.16.2.2 10.1.1.1

10.6.24.2 E1
172.16.3.10 E0 172.16.2.1 10.250.8.11

172.16.12.12

10.180.30.118

172.16 Network
3/22/2012

12 . 12 Host

Routing Table Network Interface


172.16.0.0 10.0.0.0
TCNE,KALASALINGAM UNIVERSITY

E0 E1

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Cisco IOS
Cisco technology is built around the Cisco Internetwork Operating System (IOS), which is the software that controls the routing and switching functions of internetworking devices.
A solid understanding of the IOS is essential for a network administrator.

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

The Purpose of Cisco IOS


As with a computer, a router or switch cannot function without an operating system. Cisco calls its operating system the Cisco Internetwork Operating System or Cisco IOS.

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Introduction to Routers
A router is a special type of computer. It has the same basic components as a standard desktop PC. However, routers are designed to perform some very specific functions. Just as computers need operating systems to run software applications, routers need the Internetwork Operating System software (IOS) to run configuration files. These configuration files contain the instructions and parameters that control the flow of traffic in and out of the routers. The many parts of a router are shown below:

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Router Internal Components

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Router Memory Components


ROM FLASH MemoryRAM
- Read Only Memory Bootstrap/POST IOS Images are kept here - Erasable reprogrammable ROM - Contents are kept on Power down or reload

- Random Access memory

- Routing Tables - Running Configuration - Contents are lost on reboot

NVRAM
3/22/2012

- Start up configuration
TCNE,KALASALINGAM UNIVERSITY

- Configuration Register - Contents are kept on reload

ROM
Read-Only Memory ROM has the following characteristics and functions:

Maintains instructions for power-on self test (POST) diagnostics Stores bootstrap program and basic operating system software Mini IOS
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

RAM
Random Access Memory, also called dynamic RAM (DRAM) RAM has the following characteristics and functions: Stores routing tables Holds ARP cache Performs packet buffering (shared RAM) Provides temporary memory for the configuration file of the router while the router is powered on Loses content when router is powered down or restarted

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

NVRAM
Non-Volatile RAM NVRAM has the following characteristics and functions:

Provides storage for the startup configuration file Retains content when router is powered down or restarted Configuration Register 16 bit register which decides boot sequence
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

Flash
Flash memory has the following characteristics and functions: Holds the operating system image (IOS) Allows software to be updated without removing and replacing chips on the processor Retains content when router is powered down or restarted Can store multiple versions of IOS software Is a type of electronically erasable, programmable ROM (EEPROM)
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

Interfaces
Interfaces have the following characteristics and functions:

Connect router to network for frame entry and exit Can be on the motherboard or on a separate module
Types of interfaces: Ethernet Fast Ethernet Serial ISDN BRI Loopback Console Aux
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

Router Power-On/Bootup Sequence


1. 2. 3. 4. 5. 6. 7. Perform power-on self test (POST). Load and run bootstrap code. Find the Cisco IOS software. Load the Cisco IOS software. Find the configuration. Load the configuration. Run the configured Cisco IOS software.

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

After the Post


After the POST, the following events occur as the router initializes:

Step 1 The generic bootstrap loader in ROM executes. A bootstrap is a simple set of instructions that tests hardware and initializes the IOS for operation.
Step 2 The IOS can be found in several places. The boot field of the configuration register determines the location to be used in loading the IOS. Step 3 The operating system image is loaded. Step 4 The configuration file saved in NVRAM is loaded into main memory and executed one line at a time. The configuration commands start routing processes, supply addresses for interfaces, and define other operating characteristics of the router. Step 5 If no valid configuration file exists in NVRAM, the operating system searches for an available TFTP server. If no TFTP server is found, the setup dialog is initiated.
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

External Components of a 2600 Router

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Internal Components of a 2600 Router

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Computer/Terminal Console Connection

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

HyperTerminal Session Properties

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Establishing a HyperTerminal Session

Take the following steps to connect a terminal to the console port on the router: First, connect the terminal using the RJ-45 to RJ-45 rollover cable and an RJ-45 to DB-9 or RJ-45 to DB-25 adapter. Then, configure the terminal or PC terminal emulation software for 9600 baud, 8 data bits, no parity, 1 stop bit, and no flow control.

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Router Command Line Interface

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

IOS File System Overview

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Router LED Indicators


Cisco routers use LED indicators to provide status information. Depending upon the Cisco router model, the LED indicators will vary. An interface LED indicates the activity of the corresponding interface. If an LED is off when the interface is active and the interface is correctly connected, a problem may be indicated. If an interface is extremely busy, its LED will always be on. The green OK LED to the right of the AUX port will be on after the system initializes correctly.

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Router User Interface Modes


The Cisco command-line interface (CLI) uses a hierarchical structure. This structure requires entry into different modes to accomplish particular tasks. Each configuration mode is indicated with a distinctive prompt and allows only commands that are appropriate for that mode. As a security feature the Cisco IOS software separates sessions into two access levels, user EXEC mode and privileged EXEC mode. The privileged EXEC mode is also known as enable mode.

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Overview of Router Modes

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Router Modes

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

CLI Command Modes


All command-line interface (CLI) configuration changes to a Cisco router are made from the global configuration mode. Other more specific modes are entered depending upon the configuration change that is required. Global configuration mode commands are used in a router to apply configuration statements that affect the system as a whole.

The following command moves the router into global configuration mode
Router#configure terminal Router(config)# (or config t)

When specific configuration modes are entered, the router prompt changes to indicate the current configuration mode. Typing exit from one of these specific configuration modes will return the router to global configuration mode. Pressing Ctrl-Z returns the router to all the way back privileged EXEC mode. 3/22/2012 TCNE,KALASALINGAM UNIVERSITY

Show Version Command


wg_ro_a#show version Cisco Internetwork Operating System Software IOS (tm) 2500 Software (C2500-JS-L), Version 12.0(3), RELEASE SOFTWARE (fc1) Copyright (c) 1986-1999 by cisco Systems, Inc. Compiled Mon 08-Feb-99 18:18 by phanguye Image text-base: 0x03050C84, data-base: 0x00001000 ROM: System Bootstrap, Version 11.0(10c), SOFTWARE BOOTFLASH: 3000 Bootstrap Software (IGS-BOOT-R), Version 11.0(10c), RELEASE SOFTWARE(fc1) wg_ro_a uptime is 20 minutes System restarted by reload System image file is "flash:c2500-js-l_120-3.bin" (output omitted) --More-Configuration register is 0x2102

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Layer 2 Switching
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same bandwidth. A hub network is a typical example of this type of technology Each port on a switch is actually its own collision domain, you can make a much better Ethernet LAN network just by replacing your hubs with switches
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

Switching Services
Unlike bridges that use software to create and manage a filter table, switches use Application Specific Integrated Circuits (ASICs) Layer 2 switches and bridges are faster than routers because they dont take up time looking at the Network layer header information. They look at the frames hardware addresses before deciding to either forward the frame or drop it. layer 2 switching so efficient is that no modification to the data packet takes place
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

How Switches and Bridges Learn Addresses


Bridges and switches learn in the following ways:
Reading the source MAC received frame or datagram address of each

Recording the port on which the MAC address was received.

In this way, the bridge or switch learns which addresses belong to the devices connected to each port.
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

Ethernet Access with Hubs

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Ethernet Access with Switches

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Ethernet Switches and Bridges

Address learning Forward/filter decision Loop avoidance


3/22/2012 TCNE,KALASALINGAM UNIVERSITY

Switch Features
There are three conditions in which a switch will flood a frame out on all ports except to the port on which the frame came in, as follows: Unknown unicast address

Broadcast frame Multicast frame

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

MAC Address Table

Initial MAC address table is empty.


3/22/2012 TCNE,KALASALINGAM UNIVERSITY

Learning Addresses

Station A sends a frame to station C. Switch caches the MAC address of station A to port E0 by learning the source address of data frames. The frame from station A to station C is flooded out to all ports except port E0 (unknown unicasts are flooded).
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

Learning Addresses (Cont.)

Station D sends a frame to station C.


Switch caches the MAC address of station D to port E3 by learning the source address of data frames. The frame from station D to station C is flooded out to all ports except port E3 (unknown unicasts are flooded).
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

Some Example Switches and Routers


Routers:
CISCO 2600 Series Routers CISCO 3600 Series Routers CISCO 3700 Series Routers

Switches:
Catalyst 4507 R Switches Catalyst 3550 Switches Catalyst 2950 Switches
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

Communications and Services Certifications

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

CCNA Exam
Exam Number - 640-801 Total Marks - 1000 Duration 90 Mts Passing score 849 Questions -45-55 Multiple Choice Simulations Drag and Drop
TCNE,KALASALINGAM UNIVERSITY

3/22/2012

Benefits
Peer Validation
Personal Potential Employer

Career advancement

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Cisco Icons and Symbols

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Role of System Administrator


User administration (setup and maintaining account) Maintaining system Verify that peripherals are working properly Quickly arrange repair for hardware in occasion of hardware failure Monitor system performance Create file systems Install software Create a backup and recover policy Monitor network communication Update system as soon as new version of OS and application software comes out Implement the policies for the use of the computer system and network Setup security policies for users. A sysadmin must have a strong grasp of computer security (e.g. firewalls and intrusion detection systems).

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

Role of System Administrator


Many tasks for system administration can be automated using perl or shell scripts. For example:

3/22/2012

Create new users Resetting user passwords Lock/unlock user accounts Monitor server security Monitor special services etc
TCNE,KALASALINGAM UNIVERSITY

Role of System Administrator


System administrators are not...
Cookie cutting software engineers. Developers. It is not usually within your duties to design new applications software. But, you must understand the behavior of software in order to deploy it and to troubleshoot problems, and generally should be good at several programming languages used for scripting or automation of routine tasks such as shell, awk, perl, python
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

Role of Network Administrator


Setting up and configuring network hardware and software Installing and configuring network media and connections Connecting user nodes and peripherals of all kinds to the network Adding users to and removing users from the network Managing user accounts such as passwords storage space and file-access privileges Creating and maintaining a system for backing up data and program files Ensuring the security of the network Managing the organization's e-mail system Managing users' ability to access the Internet via the network Training users to utilize the network's resources

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

IT Professionals and their Skills


Maintenance technician

A computing maintenance technician is in charge of ensuring that workstations, software, and user devices (such as printers, etc.) all function properly. sometimes called a support technician or operations technician He/she also troubleshoots them whenever needed.
Besides the technical skills which are needed in order to perform the job well (understanding how computers work, assembling computers, and a background in the users' operating systems), the maintenance technician must be willing to listen to users, and display patience and an open mind.
TCNE,KALASALINGAM UNIVERSITY

Skills

3/22/2012

IT Professionals and their Skills


Hotline technician A support technician is an IT maintenance technician in charge of remotely (usually over the telephone) helping users troubleshoot problems encountered while using computing tools, especially when a machine fails to work. (sometimes referred to as a hotline technician, phone support, or simply tech support) When a support technician works at a call centre (also called a help desk), he/she may deal with users from different companies. Most of the time, the support technician only handles "level 1" problems. It meaning that he/she notes the caller's name and the problem encountered and use them for a database query. Assisted by a knowledge base which lists the most common questions and answers, he/she diagnoses the problem and tries to find a solution within a length of time set by the employer. If the task runs overlong, or if the technician does not have the skills needed to help, the problem is routed to an expert, whose job is to solve "level 2" problems.

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

IT Professionals and their Skills


Skills As with a maintenance technician, a tech support worker needs to have real technical skills (in both hardware and software) as well as the ability to listen to users and to mediate. The hotline technician must also have a methodically analytical mind and possess good judgment in determining which questions to ask the user, as well as being able to tell what the caller's level of IT knowledge is so as not to use too much (or too little) technical jargon.

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

IT Professionals and their Skills


Network technician The job of a network technician is to work with network equipment and wiring in order to ensure that users have the best possible quality of service. In large corporations, the network technician may act under the authority of a network administrator or a network engineer who knows the company's network architecture perfectly.
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

IT Professionals and their Skills


Depending on the company, the technician's duties may include some or all of the following:
Monitoring network activity; Dealing with cables, especially in the connection ports; Configuring network equipment (such as the router, the hub, etc.); Analysing network security; Working with network hardware distribution companies' post-sale service departments.
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

IT Professionals and their Skills


Skills The network technician must have a profound understanding of the main types of wires, equipment, and protocols used in networks. Additionally, deductive reasoning is essential to be able to diagnose the cause of glitches,network congestion, or packet loss.
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

IT Professionals and their Skills


Network administrator
A network administrator (also called a network manager) is in charge of maintaining and developing a business's network infrastructure.
Today, network infrastructure is such an integral part of most businesses that network unavailability may sometimes mean unavoidable financial losses, which may, in some rare cases, lead to bankruptcy. The network administrator must be able to monitor activity on the network, and call in technicians quickly if congestion or access problems arise. He/she must also have a very precise knowledge of all network equipment, various communication protocols, the OSI model and different network architectures. He/she is also in charge of managing user accounts, creating them for new staff members and deleting them when they leave the company.
TCNE,KALASALINGAM UNIVERSITY

Skills

3/22/2012

IT Professionals and their Skills


What's more, in light of the fast-changing pace of technology and transmission media, the network administrator must keep up with the latest advances in order to upgrade the company's network infrastructure. As with a security manager, the network administrator is in charge of implementing suitable protection measures, monitoring logs, and keeping a close watch on security alerts. In anticipation of potential dangers, he/she has to come up with a recovery plan defining what to do to restore access as quickly as possible, in accordance with the company's security policy.
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

IT Professionals and their Skills


Database administrator
A database administrator (or DBA for short) is in charge of maintaining and operating the databases which form a company's information system.
Given the critical nature of the data he/she is in charge of, the database administrator must be well versed in IT, with a particularly good knowledge of DBMSs (database management systems) and the query language SQL, as well as knowing several programming languages, in order to be able to automate certain tasks. His/her duties involve ensuring the integrity of the company's information system. What's more, a keen understanding of DBMSs may be necessary for optimising queries, adjusting DBMS settings, or fine-tuning database access monitoring tools.

Skills

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

IT Professionals and their Skills


The database administrator may be called upon to act as technical support for client application users or development teams in order to fix their problems, advise them, or help them carry out complicated queries. Working with the security manager, the database administrator will need to develop data backup and restoration plans and procedures, in order to preserve the data which he/she is responsible for. Besides these technical skills, the database administrator must have a good understanding of the company's applications and be in a position to listen to users' needs when developing or editing a database. Ideally, he/she has experience with designing information systems and UML models.

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

IT Professionals and their Skills


Systems engineer The job of a systems engineer (sometimes called a system manager) is to install and operate a company's hardware and software installations. Working with the technical teams, the systems engineer must establish and perpetually update an inventory for the company's computers, and formulate a plan of operations. In addition, he/she must ensure that workstations are usable, and implement tools that make work easier for the company staff. He/she must also monitor the hardware and software.

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

IT Professionals and their Skills


Skills The profession of a systems engineer requires not only technical knowledge of the business's systems, hardware and software, but also the interpersonal and organisational skills of a project manager, in order to coordinate technical teams. He/she may also become involved in recruiting teams of technicians.
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

IT Professionals and their Skills


Network engineer A network engineer (sometimes called a telecom engineer) is responsible for making sure that the company's telecommunications networks run smoothly. Working with the technical teams, he sets a strategy for operating the company's telecommunications infrastructure.
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

IT Professionals and their Skills


Skills

The profession of a network engineer requires complete knowledge in the field of networking and telecommunications (infrastructure, wiring, protocols, administration tools, security, etc.), as well as the interpersonal and organisation skills of a project manager in order to coordinate the technical teams. He/she may also become involved in recruiting teams of technicians. A telecom engineer must have expertise in multiple specialised fields, including electronics, computing, and transmission techniques, as well as the basics of business management.
TCNE,KALASALINGAM UNIVERSITY

3/22/2012

TIFAC CORE in NETWORK ENGINEERING


TIFAC Technological Information Forecasting and Assessment Council CORE Centre of Relevance and Excellence 16 TIFC core around India DST Funded Project Value of TIFAC CORE is 16 cr
3/22/2012 TCNE,KALASALINGAM UNIVERSITY

TIFAC CORE in NETWORK ENGINEERING


Aim is to technically develop the rural area students to meet the requirements of companies/organizations.

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

TIFAC CORE in NETWORK ENGINEERING-Lab facilities


Network Technology Lab Gigabit Testbed Lab NetMat Lab Network Installation and Cabling Lab Network Security Lab Network Processor Lab Embedded Networking Lab OST Lab
TCNE,KALASALINGAM UNIVERSITY

3/22/2012

Thank You

3/22/2012

TCNE,KALASALINGAM UNIVERSITY

You might also like