Professional Documents
Culture Documents
By
M.Gomathy Nayagam
Asst.Professor Department of Computer Science and Engineering Kalasalingam University Anand Nagar Krishnankoil-626190
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Contents
What is Network? Why we need Data Network? Networking Devices Network Topology LAN,MAN,& WAN Layered Approach Networking Media IP Address Design and Planning Router ,CISOC IOS and its Basic Configuration Switching and Basic Configurations CCNA EXAM Overview Opportunities in Networking Career
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
What is Network?
Communication! An interconnection of computers and other devices: Printers Servers (computers) Scanners Network Devices
3/22/2012
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Networking Devices
Equipment that connects directly to a network segment is referred to as a device. These devices are broken up into two classifications. End-user devices Network devices End-user devices include computers, printers, scanners, and other devices that provide services directly to the user. Network devices include all the devices that connect the end-user devices together to allow them to communicate.
3/22/2012 TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Ping is a utility used to verify Internet connectivity. The ping command works by sending multiple IP packets to a specified destination. Each packet sent is a request for a reply. The output response for a ping contains the success ratio and round-trip time to a destination. Ping 127.0.0.1 Called the internal loop back test and verifies the operation of the TCP/IP stack and NIC card function. Ping ip address of host Verifies the TCP/IP address configuration for the local host and connectivity to the host. Ping default-gateway IP Verifies whether the router that connects the local network to other networks can be reached. Ping remote destination IP Verifies connectivity to a remote host.
3/22/2012 TCNE,KALASALINGAM UNIVERSITY
3/22/2012
Hub
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Switch
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Router
Routers are used to connect networks together Route packets of data from one network to another Cisco became the de facto standard of routers because of their highquality router products Routers, by default, break up a broadcast domain
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Topology
Topology- the way of network is laid out.
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Mesh Topology
Every device has a dedicated point-to-point link to every other device. N- device needs to participate in mesh topology means it requires n(n-1)/2 physical Channel and n-1 input/output ports.
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Star Topology
Each device has dedicated point-to-point link only to central controller, usually called Hub.
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Tree Topology
A variation of star. In star, every node linked to central hub. Here, not every node plugs directly into the central hub.
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Bus Topology
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Ring Topology
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Hybrid Topology
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
LANs
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
WANs
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Bandwidth
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Measuring Bandwidth
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Internetworking Devices
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Branch Office
3/22/2012
Main Office
TCNE,KALASALINGAM UNIVERSITY
Distribution Layer
Access Layer
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
ISO - International Organization for Standardization OSI - Open System Interconnection IOS - Internetwork Operating System
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
3/22/2012
Memorize it!
TCNE,KALASALINGAM UNIVERSITY
OSI Model
Application Application (Upper) Layers Presentation Session Transport Network Data-Link Physical
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
3/22/2012
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
3/22/2012
Half Duplex
It uses only one wire pair with a digital signal running in both directions on the wire.
It also uses the CSMA/CD protocol to help prevent collisions and to permit retransmitting if a collision does occur. If a hub is attached to a switch, it must operate in half-duplex mode because the end stations must be able to detect collisions. Half-duplex Ethernettypically 10BaseTis only about 30 to 40 percent efficient because a large 10BaseT network will usually only give you 3 to 4Mbpsat most.
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
Full Duplex
In a network that uses twisted-pair cabling, one pair is used to carry the transmitted signal from one node to the other node. A separate pair is used for the return or received signal. It is possible for signals to pass through both pairs simultaneously. The capability of communication in both directions at once is known as full duplex.
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
3/22/2012
PDU - Segments
TCNE,KALASALINGAM UNIVERSITY
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
7 Application
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
Preamble
3/22/2012
This layer provides reliable transit of data across a physical link. Combines bits into bytes and bytes into frames Access to media using MAC address Error detection, not correction LLC and MAC Logical Link Control performs Link establishment MAC Performs Access method
PDU - Frames
SMAC Data length DATA FCS
TCNE,KALASALINGAM UNIVERSITY
DMAC
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
3/22/2012
This is the physical media through which the data, represented as electronic signals, is sent from the source host to the destination host. Move bits between devices Encoding
PDU - Bits
TCNE,KALASALINGAM UNIVERSITY
Data Encapsulation
Application
Presentation Upper-Layer Data TCP Header Upper-Layer Data Session
PDU
Segment
Transport
IP Header
Data
Network
Packet
LLC Header
Data
FCS
Data-Link
Frame
MAC Header
Data
FCS
0101110101001000010
3/22/2012
Physical
Bits
TCNE,KALASALINGAM UNIVERSITY
Data Encapsulation
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Type of Transmission
Unicast Multicast Broadcast
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Type of Transmission
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Broadcast Domain
A group of devices receiving broadcast frames initiating from any device within the group Routers do not forward broadcast frames, broadcast domains are not forwarded from one broadcast to another.
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Collision
The effect of two nodes sending transmissions simultaneously in Ethernet. When they meet on the physical media, the frames from each node collide and are damaged.
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Collision Domain
The network area in Ethernet over which frames that have collided will be detected. Collisions are propagated by hubs and repeaters Collisions are Not propagated by switches, routers, or bridges
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Physical Layer
Defines
Media type
Connector type
Signaling type
802.3 is responsible for LANs based on the carrier sense multiple access collision detect (CSMA/CD) access methodology. Ethernet is an example of a CSMA/CD network.
3/22/2012 TCNE,KALASALINGAM UNIVERSITY
Physical
802.3
Host Hub
10BaseTTwisted Pair
Hosts
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
All devices are in the same collision domain. All devices are in the same broadcast domain. Devices share the same bandwidth.
3/22/2012 TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Layer 2
MAC Layer802.3
Number of Bytes
2 Length
Variable Data
4 FCS
0000.0C
IEEE Assigned
xx.xxxx
Vendor Assigned
MAC Address
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
OR
Each segment has its own collision domain. All segments are in the same broadcast domain. 3/22/2012 TCNE,KALASALINGAM UNIVERSITY
Switches
Switch
Memory
Each segment is its own collision domain. Broadcasts are forwarded to all segments.
3/22/2012 TCNE,KALASALINGAM UNIVERSITY
Network
IP, IPX
Data-Link
802.2
Physical
802.3
EIA/TIA-232 V.35
TCNE,KALASALINGAM UNIVERSITY
Layer 3 : (cont.)
Network Layer End-Station Packet
IP Header
Source Address Destination Address Data
Logical Address
172.15.1.1
Network Node
Route determination occurs at this layer, so a packet must include a source and destination address. Network-layer addresses have two components: a network component for internetwork routing, and a node number for a device-specific address. The example in the figure is an example of an IP packet and address.
3/22/2012 TCNE,KALASALINGAM UNIVERSITY
Layer 3 (cont.)
Address Mask
172.16.122.204 255.255.0.0
172 16 122 204
Binary Mask
11111111 11111111
Network
00000000 00000000
Host
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Network
IP
IPX
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Reliable Service
Sender
Receiver
Synchronize
Acknowledge, Synchronize Acknowledge
Connection Established
Data Transfer (Send Segments)
3/22/2012 TCNE,KALASALINGAM UNIVERSITY
4 1
4 4
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light. The U.S. Department of Defense (DoD) created the TCP/IP reference model because it wanted a network that could survive any conditions, even a nuclear war.
3/22/2012 TCNE,KALASALINGAM UNIVERSITY
7 6 5 4 3 2 1
Transport
3
Internet
2
Data-Link
Physical
3/22/2012
Data-Link
1
Physical
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Origin of Ethernet
Found by Xerox Palo Alto Research Center (PARC) in 1975
Original designed as a 2.94 Mbps system to connect 100 computers on a 1 km cable Later, Xerox, Intel and DEC drew up a standard support 10 Mbps Ethernet II
Unshielded twisted-pair
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Voice transmission of traditional telephone For data up to 4 Mbps, 4 pairs full-duplex For data up to 10 Mbps, 4 pairs full-duplex For data up to 16 Mbps, 4 pairs full-duplex For data up to 100 Mbps, 4 pairs full-duplex For data up to 1000 Mbps, 4 pairs full-duplex
TCNE,KALASALINGAM UNIVERSITY
Baseband VS Broadband
Baseband Transmission
Entire channel is used to transmit a single digital signal Complete bandwidth of the cable is used by a single signal The transmission distance is shorter The electrical interference is lower
Use analog signaling and a range of frequencies Continuous signals flow in the form of waves Support multiple analog transmission (channels)
Broadband Transmission
Broadband Transmission
Straight-through cable
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Crossover cable
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Crossover cable
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Rollover cable
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Straight-Thru or Crossover
Use straight-through cables for the following cabling: Switch to router Switch to PC or server Hub to PC or server
Use crossover cables for the following cabling: Switch to switch Switch to hub Hub to hub Router to router PC to PC Router to PC
3/22/2012 TCNE,KALASALINGAM UNIVERSITY
IP Addressing
32 Bits Dotted Decimal Maximum
1
Network
Host
255
8 9
255
16 17
255
24 25
255
32
Binary
11111111 11111111
128 64 32 16 8 4 2 1 128 64 32 16 8 4 2 1
11111111 11111111
128 64 32 16 8 4 2 1 128 64 32 16 8 4 2 1
Example 172 16 122 204 Decimal Example 10101100 00010000 01111010 11001100 Binary 3/22/2012 TCNE,KALASALINGAM UNIVERSITY
IP Address Classes
8 Bits 8 Bits Host 8 Bits Host Host 8 Bits Host Host Host
Class A:
Class B: Class C: Class D: Class E:
3/22/2012
Network
Network Network
Multicast Research
TCNE,KALASALINGAM UNIVERSITY
IP Address Classes
Bits: 1 8 9 Host 16 17 16 17 Host 24 25 24 25 Host 32 32
Class A:
Bits:
Class B:
Bits:
10NNNNNN
Range (128-191) 1 8 9 110NNNNN Range (192-223) 1 8 9 1110MMMM
Network
16 17 Network
Host
24 25
Host
32 Host 24 25 32
Class C:
Bits:
Network 16 17
Class D:
3/22/2012
Range (224-239)
TCNE,KALASALINGAM UNIVERSITY
Host Addresses
172.16.2.2 10.1.1.1
10.6.24.2 E1
172.16.3.10 E0 172.16.2.1 10.250.8.11
172.16.12.12
10.180.30.118
172.16 Network
3/22/2012
12 . 12 Host
E0 E1
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Cisco IOS
Cisco technology is built around the Cisco Internetwork Operating System (IOS), which is the software that controls the routing and switching functions of internetworking devices.
A solid understanding of the IOS is essential for a network administrator.
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Introduction to Routers
A router is a special type of computer. It has the same basic components as a standard desktop PC. However, routers are designed to perform some very specific functions. Just as computers need operating systems to run software applications, routers need the Internetwork Operating System software (IOS) to run configuration files. These configuration files contain the instructions and parameters that control the flow of traffic in and out of the routers. The many parts of a router are shown below:
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
NVRAM
3/22/2012
- Start up configuration
TCNE,KALASALINGAM UNIVERSITY
ROM
Read-Only Memory ROM has the following characteristics and functions:
Maintains instructions for power-on self test (POST) diagnostics Stores bootstrap program and basic operating system software Mini IOS
3/22/2012 TCNE,KALASALINGAM UNIVERSITY
RAM
Random Access Memory, also called dynamic RAM (DRAM) RAM has the following characteristics and functions: Stores routing tables Holds ARP cache Performs packet buffering (shared RAM) Provides temporary memory for the configuration file of the router while the router is powered on Loses content when router is powered down or restarted
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
NVRAM
Non-Volatile RAM NVRAM has the following characteristics and functions:
Provides storage for the startup configuration file Retains content when router is powered down or restarted Configuration Register 16 bit register which decides boot sequence
3/22/2012 TCNE,KALASALINGAM UNIVERSITY
Flash
Flash memory has the following characteristics and functions: Holds the operating system image (IOS) Allows software to be updated without removing and replacing chips on the processor Retains content when router is powered down or restarted Can store multiple versions of IOS software Is a type of electronically erasable, programmable ROM (EEPROM)
3/22/2012 TCNE,KALASALINGAM UNIVERSITY
Interfaces
Interfaces have the following characteristics and functions:
Connect router to network for frame entry and exit Can be on the motherboard or on a separate module
Types of interfaces: Ethernet Fast Ethernet Serial ISDN BRI Loopback Console Aux
3/22/2012 TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Step 1 The generic bootstrap loader in ROM executes. A bootstrap is a simple set of instructions that tests hardware and initializes the IOS for operation.
Step 2 The IOS can be found in several places. The boot field of the configuration register determines the location to be used in loading the IOS. Step 3 The operating system image is loaded. Step 4 The configuration file saved in NVRAM is loaded into main memory and executed one line at a time. The configuration commands start routing processes, supply addresses for interfaces, and define other operating characteristics of the router. Step 5 If no valid configuration file exists in NVRAM, the operating system searches for an available TFTP server. If no TFTP server is found, the setup dialog is initiated.
3/22/2012 TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Take the following steps to connect a terminal to the console port on the router: First, connect the terminal using the RJ-45 to RJ-45 rollover cable and an RJ-45 to DB-9 or RJ-45 to DB-25 adapter. Then, configure the terminal or PC terminal emulation software for 9600 baud, 8 data bits, no parity, 1 stop bit, and no flow control.
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Router Modes
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
The following command moves the router into global configuration mode
Router#configure terminal Router(config)# (or config t)
When specific configuration modes are entered, the router prompt changes to indicate the current configuration mode. Typing exit from one of these specific configuration modes will return the router to global configuration mode. Pressing Ctrl-Z returns the router to all the way back privileged EXEC mode. 3/22/2012 TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Layer 2 Switching
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same bandwidth. A hub network is a typical example of this type of technology Each port on a switch is actually its own collision domain, you can make a much better Ethernet LAN network just by replacing your hubs with switches
3/22/2012 TCNE,KALASALINGAM UNIVERSITY
Switching Services
Unlike bridges that use software to create and manage a filter table, switches use Application Specific Integrated Circuits (ASICs) Layer 2 switches and bridges are faster than routers because they dont take up time looking at the Network layer header information. They look at the frames hardware addresses before deciding to either forward the frame or drop it. layer 2 switching so efficient is that no modification to the data packet takes place
3/22/2012 TCNE,KALASALINGAM UNIVERSITY
In this way, the bridge or switch learns which addresses belong to the devices connected to each port.
3/22/2012 TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Switch Features
There are three conditions in which a switch will flood a frame out on all ports except to the port on which the frame came in, as follows: Unknown unicast address
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Learning Addresses
Station A sends a frame to station C. Switch caches the MAC address of station A to port E0 by learning the source address of data frames. The frame from station A to station C is flooded out to all ports except port E0 (unknown unicasts are flooded).
3/22/2012 TCNE,KALASALINGAM UNIVERSITY
Switches:
Catalyst 4507 R Switches Catalyst 3550 Switches Catalyst 2950 Switches
3/22/2012 TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
CCNA Exam
Exam Number - 640-801 Total Marks - 1000 Duration 90 Mts Passing score 849 Questions -45-55 Multiple Choice Simulations Drag and Drop
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
Benefits
Peer Validation
Personal Potential Employer
Career advancement
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Create new users Resetting user passwords Lock/unlock user accounts Monitor server security Monitor special services etc
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
A computing maintenance technician is in charge of ensuring that workstations, software, and user devices (such as printers, etc.) all function properly. sometimes called a support technician or operations technician He/she also troubleshoots them whenever needed.
Besides the technical skills which are needed in order to perform the job well (understanding how computers work, assembling computers, and a background in the users' operating systems), the maintenance technician must be willing to listen to users, and display patience and an open mind.
TCNE,KALASALINGAM UNIVERSITY
Skills
3/22/2012
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
Skills
3/22/2012
Skills
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
The profession of a network engineer requires complete knowledge in the field of networking and telecommunications (infrastructure, wiring, protocols, administration tools, security, etc.), as well as the interpersonal and organisation skills of a project manager in order to coordinate the technical teams. He/she may also become involved in recruiting teams of technicians. A telecom engineer must have expertise in multiple specialised fields, including electronics, computing, and transmission techniques, as well as the basics of business management.
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
3/22/2012
TCNE,KALASALINGAM UNIVERSITY
3/22/2012
Thank You
3/22/2012
TCNE,KALASALINGAM UNIVERSITY