Ccna Notes

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 67

IP addressing

Network & Broadcast Address ➢ The network address is represented with all bits as ZERO in the host portion of the address ➢ The broadcast
address is represented with all bits as ONES in the host portion of the address ➢ Valid IP Addresses lie between the Network Address and the
Broadcast Address.
f
.
Note-bootstap(ONE Software that save In ROM) program run by POST (check hardware) after that IOS search in
FLASH(memory there IOS save) then IOS load (copy)in RAM after that load startup config from NVRAM to RAM
j
DNS Server
DNS Server
DNS Server
DNS Server
DNS Server
OSI model
• Application - The applications which interact one human to another. Application layer provides services
• HTTP - Hypertext transfer protocol. [ Webpages] HTTPS - Hypertext transfer protocol Secure.[ Webpages]
SMTP - Simple Mail Transfer protocol.[Send Emails] POP - Post office protocol.[Receive Emails] IMAP -
Internet Message Access Protocol [Receive Emails] DHCP - Dynamic Host configuration protocol.
[Automatically IP]

• HTTP - 80 HTTPS - 443 SMTP - 25 POP - 110 IMAP - 143 DHCP -


67/68(UDP) DNS-53(TCP/UDP)
• Presentation - It is responsible for the representation of data in
human readable format. It tells what is the format of data.
• Image - Jpeg, PNG, GIF Audio - Mp3, Wav Video - Mp4, AVI
Transport Layer
• he major functions described at the Transport Layer are..
• • Identifying Service
• • Multiplexing & De-multiplexing
• • Segmentation
• • Sequencing & Reassembling
• • Error Correction
• • Flow Control
• Identifying a Service : Services are identified at this layer with the help of
Port No’s. The major protocols which takes care of Data Transportation at
Transport layer are…TCP,UDP
• Network Layer :It is responsible for end-to end Transportation of data
across multiple networks.
• Logical addressing & Path determination (Routing) are described at this layer.
• The protocols works at Network layer are
• Routed Protocols:
• Routed protocols acts as data carriers and defines logical addressing. IP,IPX,
AppleTalk.. Etc
• Routing Protocols:
• Routing protocols performs Path determination (Routing). RIP, IGRP, EIGRP,
OSPF.. Etc Devices works at Network Layer are Router, Multilayer switch etc..
Data Link LAYER
• It is responsible for end-to-end delivery of data between the devices on a Network
segment. Data link layer comprises of two sub-layers.
• 1) MAC (Media Access Control)
• It deals with hardware addresses (MAC addresses).
• MAC addresses are 12 digit Hexa-decimal identifiers used to identify the devices uniquely on the
network segment.
• It also provides ERROR DETECTION using CRC (Cyclic Redundancy Check) and FRAMING
(Encapsulation).
• Ex: Ethernet, Token ring…etc
• 2) LLC (Logical Link Control) It deals with Layer 3 (Network layer)
• Devices works at Data link layer are Switch, Bridge, NIC card.
Physical link layer
• Physical Layer • It deals with physical transmission of Binary data on the given media (copper,
Fiber, wireless..).
• • It also deals with electrical, Mechanical and functional specifications of the devices, media.. etc
• • The major functions described at this layer are..
• Encoding/decoding: It is the process of converting the binary data into signals based on the
type of the media.
• Copper media : Electrical signals of different voltages
• Fiber media : Light pulses of different wavelengths
• Wireless media: Radio frequency waves
• Mode of transmision of signals: Signal Communication happens in three different modes
Simplex, Half-duplex, Full-duplex Devices works at physical layer are Hub, Modems, Repeater,
Transmission Media
FLSM
• Subnetting - Divide a big network into smaller parts. To reduce the
wastage of Ip addresses we use subletting.
VLSM
VLSM
Telnet
• Telnet –Telnet is used to remotely access the network devices.
• TCP - 23
• It is not secure.
• Not Encrypted.
• Step 2 ! #### TELNET ##### !
• VTY - Virtual Terminal Lines line vty 0 4
• transport input telnet
• login local
• username irshad password irshad123
• enable password cisco123
SSH
• To remotely access the network devices securely.
• SSH connection is encrypted.
• SSH works on TCP port number : 22
• Hostname + Domain of device. [ SSH Create keys with the help of hostname + domain name ]
• Modulus - How much encryption we need to set in SSH.
• Create usernames and passwords for users.
SSH-SECURE SHELL
• Step 1 - Create hostname and domain name
• . hostname R1
• ip domain-name nwkings.com
• Step 2 - Generate RSA key
• R1(config)#crypto key generate rsa
• The name for the keys will be: R1.nwkings.com
• Step 3 - Create usernames and passwords.
• username abc password abc
• Step 4 - Configure SSH with transport input command under VTY Lines.
• line vty 0 4
• transport input ssh
• login local
• enable secret hello
STATIC ROUTING
• Router works on network layer. Router primary role is to do routing.
• Routing - Forwarding of packets from one network to another network is known as
routing.
• Router has best paths in the routing table.
• Routing table has a list of the best routes towards the destination.
• Router knows about its directly connected networks only.
• Static routing is a type of routing
• in which a network administrator configures the routes.
• into the routing table
• to be used by the router to send packets to a destination network.
• Static routing is a manual routing which we configure on a router in a routing table.
AD Value
Default Routing
• A default route is used mostly for internet connections.
• where destination is unknown, By default the router will forward all
traffic to ISP.
• A default route is the route that takes effect when no other route is
available for an IP destination address.
• A default route defines where packets will be sent if no specific
route for the destination network is listed in the routing table.
• ip route 0.0.0.0 0.0.0.0 200.1.1.2
OSPF
• OSPF stands for open shortest path first.
• OSPF is a dynamic routing protocol that comes under IGP(interior gateway protocol).
• It is also known as link state protocol. It works on shortest path first algorithm (SPF). It is also
known as Dijiskhtra Algorithm.
• To advertise routes information OSPF running routers send LSAs to exchange information with
neighbors.
• LSAs - Link State Advertisements.
• LSA Flooding
• This picture is showing how LSA flooding takes place whenever a change occurs in network. You
can see, at router 8, a new interface with IP address 172.16.3.1 is added and to notify other
routers about this change R8 sent LSAs to their neighbors and neighbors will send to their
neighbors and process will go on until all routers don't get LSA updates.
• It is open standard protocol.In OSPF, no router limit like EIGRP, it supports unlimited routers.It
uses 2 multicast address 224.0.0.5 and 224.0.0.6.IP protocol = 89, AD value = 110 It supports
subneting.
OSPF AREA 0 CONCEPT
OSPF Area Design Conditions
• Area 0 is mandatory.
• All areas should be connected to area 0.
• All areas should be continuous.
• Backbone Router: A router that belongs to area 0 is known as backbone router. All routers inside
area 0 including ABRs come under backbone routers.
• Internal Routers: Routers that lie inside a single area (all interfaces of router should be in same
area) are called as internal routers.
• ABR (Area Border Router): An OSPF router that belongs to area 0 and at least one other area is
called as ABR.
• ASBR (Autonomous System Boundary Router): A router that belongs to area 0 and one other area.
It is similar definition as ABR, yes it is similar, only one difference, on both interfaces different
protocols are running.
BGP Types of packet & table
• OSPF tables
• Neighbour Table: Neighbor table contains information about the directly connected ospf neighbors.
• Database Table: Database table contains information about the entire topology with respect to each
router.
• Routing Table: Routing table contains a list of the best paths calculated by the shortest path
first(SPF) algorithm.
• OSPF Packets
• Hello
• DBD (database description)
• LSR (Link State Request)
• LSU (Link State Update)
• LSACK (Link State Acknowledgment)
• OSPF stand for Open Shortest path first
• • Standard protocol
• • It’s a link state protocol
• • It uses SPF (shortest path first) or dijkistra algorithm
• • Unlimited hop count
• • Metric is cost (cost=10 ^8/B.W.)
• • Administrative distance is 110
• • It is a classless routing protocol
• • It supports VLSM and CIDR
• • It supports only equal cost load balancing
• • Introduces the concept of Area’s to ease management and control traffic
• • Provides hierarchical network design with multiple different areas
• • Must have one area called as area 0
• • All the areas must connect to area 0
• • Scales better than Distance Vector Routing protocols.
• • Supports Authentication
• • Updates are sent through multicast address 224.0.0.5
• • Faster convergence.
• • Sends Hello packet every 10 seconds
• • Trigger/Incremental updates
• • Router’s send only changes in updates and not the entire routing tables
• in periodic updates
STP-1-least priority value will be route bridge ,default priority value(32768)
2-if priority value so least Mac address will be router bridge.
STP- Note;Step1-find the route bridge (Priority, value&mac-address) Step 2-all non route bridge find out Root port(cost,
priority, mac, interface port)least on the basic of upstrim port,3-bridge port will be a forwarding port (Designated)& elecition held up
b/w Non Root port wheather on basic of(cost,priority,& mac address & interface )decide blocking port that will decide on basic of local
router
STP- Designated port on forwarding &NON Designated on blocking.
Note-First all switch send BPDU message & understand I am root bridge but after compare On neighbor the basic of( B1D )elect
the Root Bridge 2-Elected root Port will send BPDU & Not Root Bridge not send BPDU In case link goes down so switch will
weight 30 Sec for hello messages (when switch on then 30 sec required to confirm when switch will forwarding or blocking port
(When port is blocking state 50 sec required to come on Forwarding state)
Rapid STP-
TOPLOGY CHANGE NOTIFICATION IN RSTP
PORT FAST SPAnig tree:donot use b/w switch,IF PORT ON PORTFAST then avoid loop enble the BPDU GUARD then the port put be in error
disable state.2-port fast with bpdu filter they reenable the spaning tree(system connectecd to pc they not generate bpdu)

You might also like