Notes Ver 0.3 - 2
Notes Ver 0.3 - 2
Notes Ver 0.3 - 2
Important Websites:
Video Lessons : www.nwkings.com
Official Website: www.networkkings.org
Basics of Networking
What is a network anyway?
A network is just a collection of devices and end systems connected to each other and able
to communicate with each other. These could be computers, servers, smartphones, routers
etc.
A network could be as large as the internet or as small as your two computers at home
sharing files and a printer.
Network Cards: they translate data from your computer in a readable format
for the network.it is also known as NIC (Network interface card)
Routers: Routers interconnect networks and choose the best path to each network
Destination, router makes its routing table for best path.
1.windows button + R
2. type ncpa.cpl to go to your network connections
3.choose your lan adapter and go to properties and click on IPV4
4.Assign Ip address
Or visit :- http://www.wikihow.com/Configure-a-Static-Internet-Protocol-(IP)-Address-on-a-Computer
IP networks require two types of addresses. MAC and IP. Each station stores it's MAC address and IP address in it's own IP stack. It stores MAC and IP
addresses of other stations on it's LAN or subnet in the ARP cache.
• When the packet is being sent out to a station that is on the same network LAN segment, only the MAC address is needed.
• When the packet goes beyond, to different networks and travels through routers, the MAC address is still contained in the packet, but only the IP
address is used by the routers.
• IP Address is Logical Address.It is a Network Layer address (Layer 3), IPv4 addresses are 32-bit numbers that are typically displayed in dotted
decimal notation. A 32-bit address contains two primary parts: the network prefix and the host number.
• All hosts within a single network share the same network address. Each host also has an address that uniquely identifies it. Depending on the
scope of the network and the type of device, the address is either globally or locally unique
• IP addresses are assigned by a central numbering authority called the Internet Assigned Numbers Authority (IANA).
Private IP Address
There are certain addresses in each class of IP address that are reserved for Private Networks. These addresses are called private addresses.
Class A 10.0.0.0 to 10.255.255.255
Class B 172.16.0.0 to 172.31.255.255
Class C 192.168.0.0 to 192.168.255.255
Subnet Mask
Subnet Mask:-Its an address used to identify the network and host portion of the ip address
21 = 2 210 = 1024
22 = 4 2 11 = 2048
23 = 8 2 12 = 4096
24 = 16 213 = 8192
25 = 32 214 = 16384
2 6 = 64 215 = 32768
27 = 128 2 16 = 65536
FLSM : Example-- 1
1. 2h - 2 >= req
26 – 2 >= 40
64 – 2 >= 40
62 >= 40
5.Blocksize = 2h = 26 = 64
6.Subnets = 2n = 22 = 4 Subnets
7.Range :
6. Blocksize = = 2h = 29 = 512
7.Subnets = 2n = 27 = 128 Subnets
Range
Network ID --- Broadcast ID
172.16.0.0/23 ---- 172.16.1.255/23
172.16.2.0/23 ---- 172.16.3.255/23
172.16.4.0/23 ---- 172.16.5.255/23
172.16.6.0/23 ---- 172.16.7.255/23
FLSM : Example-- 3
8.Range:
Network ID --- Broadcast ID
10.0.0.0/21 … 10.0.7.255/21
10.0.8.0/21 … 10.0.15.255/21
10.0.16.0/21 … 10.0.23.255/21
…
…
10.0.248.0/21 … 10.0.255.255/21
10.1.0.0/21 --- 10.1.7.255/21
10.1.8.0/21 --- 10.1.15.255/21
10.1.16.0/21 --- 10.1.23.255/21
….
10.1.248.0/21 … 10.1.255.255/21
10.2.0.0/21 --- 10.2.7.255/21
➢ OSI was developed by the International Organization for Standardization (ISO) and introduced in 1984.
➢ It is a layered architecture (consists of seven layers).
➢ Each layer defines a set of functions in data communication.
Physical Layer: This layer describes stuff like voltage levels, timing, physical data
rates, physical connectors and so on. Everything you can “touch” since it‟s physical.
Data Link: This layer makes sure data is formatted the correct way, takes care of
error detection and makes sure data is delivered reliably. This might sound a bit
vague now, for now try to remember this is where “Ethernet” lives. MAC Addresses
and Ethernet frames are on the Data Link layer.
Network: This layer takes care of connectivity and path selection (routing). This is
where IPv4 and IPv6 live. Every network device needs a unique address on the
network.
Transport: The transport layer takes care of transport, when you downloaded this
book from the Internet the file was sent in segments and transported to your
computer.
o TCP lives here; it‟s a protocol which send data in a reliable way.
o UDP lives here; it‟s a protocol which sends data in an unreliable way.
o ICMP lives here; when you send a ping you are using ICMP.
Session: The session layer takes care of establishing, managing and termination of
sessions between two hosts. When you are browsing a website on the
internet you
are probably not the only user of the webserver hosting that website. This
webserver
needs to keep track of all the different “sessions”.
Presentation: This one will make sure that information is readable for the
application layer by formatting and structuring the data. Most computers
use the
ASCII table for characters. If another computer would use another character
like
EBCDIC than the presentation layer needs to “reformat” the data so both
computers
agree on the same characters.
Application: Here are your applications. E-mail, browsing the web (HTTP),
FTP and
many more.
Port Numbers
• Identifying Service
• Multiplexing & De-multiplexing
• Segmentation
• Sequencing & Reassembling
• Error Correction
• Flow Control
Network Layer
It is responsible for end-to end Transportation of data across multiple networks.
Logical addressing & Path determination (Routing) are described at this layer.
The protocols works at Network layer are
Routed Protocols:
Routed protocols acts as data carriers and defines logical addressing.
IP,IPX, AppleTalk.. Etc
Routing Protocols:
Routing protocols performs Path determination (Routing).
RIP, IGRP, EIGRP, OSPF.. Etc
Data-link Layer
Devices works at Data link layer are Switch, Bridge, NIC card.
Physical Layer
• It deals with physical transmission of Binary data on the given media (copper, Fiber, wireless..).
• It also deals with electrical, Mechanical and functional specifications of the devices, media.. etc
• The major functions described at this layer are..
Mode of transmision of signals: Signal Communication happens in three different modes Simplex, Half-duplex, Full-duplex
Devices works at physical layer are Hub, Modems, Repeater, Transmission Media
Wht is a Router ?
• Router is a device which makes communication possible between two or more different networks present in different geographical locations.
Router Classification
• Access Layer Routers are example • Distribution and Core Layer Routers
of Fixed Router except 1600 and example of Modular Router
1700 series
Serial Port
• Serial pin configuration is 60 pin configuration female (i.e. 15 pins and 4 rows) and Smart Serial pin configuration is 26 pin configuration female.
• It is known as WAN Port
• It is used for connecting to Remote Locations
• V.35 cable is having 60 pin configuration male at one end and on the other end 18 pin configuration male.
Console Connectivity
• Connect a rollover cable to the router console port (RJ-45 connector).
• Connect the other end of the rollover cable to the RJ-45 to DB-9 converter
Auxiliary Port
• It is known as Remote Administrative Port.
• Used for remote administration
• Its an RJ-45 port
• A console or a rollover cable is to be used.
Internal Components
• ROM
A bootstrap program is located here. It is same as the BIOS of the PC. Bootstrap program current version is 11.0
• Flash
Internetwork Operating System (IOS) developed by Cisco is stored here. IOS is Command line interface.
• NVRAM
Non volatile RAM, similar to Hard Disk It is also known as Permanent Storage or Startup Configuration. Generally size of NVRAM is 32 KB.
• RAM
Network Kings | www.networkkings.org | info@networkkings.org | Watch Videos: https://www.youtube.com/networkkingss and www.nwkings.com
31 | P a g e
It is also known as Temporary Storage or running Configuration. Minimum size of RAM is 2MB. The size of RAM is greater than NVRAM in the Router.
• Processor
Motorola Processor 70 Mhz, RISC based processor (Reduced Instruction Set Computer)
User mode:
Router >
Router > enable
Privilege mode:
Router # show running-config
Router # show startup-config
Router # show flash
Router # show version
Router #show ip interface brief
Router(config) #
Show commands:
Router#show flash
Router#show ip protocols
Use this command to view the status of the current layer 3 routed protocols running on your router
Router#show version
This command will give you critical information, such as: router platform type, operating system revision, operating system last boot time and file location,
amount of memory, number of interfaces, and configuration register
Router#show clock
Router#show hosts
will display a cached list of hosts and all of their interfaces IP addresses
Router#show users
Will show a list of all users who are connected to the router
Router#show interfaces
Router#show protocols
This command will show brief descriptions about interface. This command mostly used in troubleshooting.
Administratively down: - port is disable by shutdown command (Default mode of any port on router.)
R1#show ip route
This command will give a detail about known route. Router will not forward packet if route is not shown here for that packet. Router’s routing decision is
made by this routing table.
Most common use of this command is to find out whether the port is DCE end or DTE. If the port is DCE end then clock rate and bandwidth command will
require. As you can see in output that port is DCE.
R1#show ip protocols
1) All The Lan Should Be In Diffrenet Networks ( Should Not Repeat The Same Net)
Router>enable
Router#configure terminal
Error : IF you will try to assign the same network on another interface.
Router(config)#interface fa0/0
Router(config-if)#ip address 172.16.0.1 255.255.0.0
% 172.16.0.0 overlaps with FastEthernet0/1
In short, router has learned both the networks from both the interfaces.
Ping Results,
ROUTING
Network Kings | www.networkkings.org | info@networkkings.org | Watch Videos: https://www.youtube.com/networkkingss and www.nwkings.com
47 | P a g e
Routing
– Forwarding of packets from one network to another network choosing the best path from the routing table.
– Routing table consist of only the best routes for every destinations.
Types of Routing
1. Static Routing
2. Default Routing
Static Routing
• It is configured by Administrator manually.
• Mandatory need of Destination Network ID
• It is Secure & fast
• Used for Small organizations with a network of 10-15 Routers.
Disadvantages :-
• Used for small network.
• Everything to manually
• Network change effect complete n/W
Delhi Mumbai
192.168.1.0 - Nwid 192.168.1.128 - Nwid
192.168.1.127 - Broadcast Id 192.168.1.255 - Broadcast Id
Delhi Mumbai
conf t conf t
hostname delhi hostname Mumbai
int fa0/0 int fa0/0
ip address 192.168.1.1 255.255.255.128 ip address 192.168.1.200 255.255.255.128
no shutdown no shutdown
Default Routes
• Manually adding the single route for all the destination. Default route is used when destination is
unknown
• Last preferred route in the routing table
• When there is no entry for the destination network in a routing table, the router will forward the
packet to its default router.
• Default routes help in reducing the size of your routing table.
Or
Router(config)# ip route <Destination Network ID> <Destination Subnet Mask>
<Exit interface type><interface number>
Jio Dell-delhi-gw1
conf terminal conf terminal
int fa4/0 hostname dell-delhi-gw1
Network Kings | www.networkkings.org | info@networkkings.org | Watch Videos: https://www.youtube.com/networkkingss and www.nwkings.com
52 | P a g e
ip address 203.1.1.1 255.255.255.0 int fa4/0
no shutdown ip address 203.1.1.2 255.255.255.0
no shutdown
int loopback 0
ip address 172.217.166.14 255.255.255.0 int fa0/0
description google.com ip address 192.168.1.1 255.255.255.0
no shutdown
int loopback 1
ip address 31.13.79.35 255.0.0.0 Default route
description facebook.com dell-delhi-gw1(config)#ip route 0.0.0.0
0.0.0.0 203.1.1.1
int loopback 2
ip address 104.244.42.193 255.0.0.0
description twitter.com
int loopback 3
ip address 13.13.13.13 255.0.0.0
description nwkings.com
Troubleshooting commands:
Dynamic Routing
IGP EGP
• Works with Bellman Ford • Works with Dijkstra • Also called as Advance
algorithm algorithm Distance vector Protocol
• Periodic updates • Link state updates • Works with DUAL
• Classful routing protocol • Classless routing protocol algorithm
• Full Routing tables are • Missing routes are • Link state updates
exchanged exchanged • Classless routing protocol
• Updates are through • Updates are through • Missing routes are
broadcast multicast exchanged
• Example: RIP 1, RIP 2, • Example : OSPF, IS-IS • Updates are through
Network Kings | www.networkkings.org | info@networkkings.org | Watch Videos: https://www.youtube.com/networkkingss and www.nwkings.com
57 | P a g e
IGRP multicast
• Example : EIGRP
Administrative Distance
• Rating of the Trustworthiness of a routing information source.
• The Number is between 0 and 255
• The higher the value, the lower the trust.
• Default administrative distances are as follows :
• Directly Connected = 0
• Static Route = 1
• IGRP = 100
• OSPF = 110
• RIP = 120
• EIGRP = 90/170
Rip Timers
RIP Version 2
• Classless routing protocol
• Supports VLSM
• Auto summary can be done on every router
• Supports authentication
• Trigger updates
• Uses multicast address 224.0.0.9.
Advantages of RIP
– Easy to configure
– No design constraints
– No complexity
– Less overhead
Disadvantage of RIP
– Bandwidth utilization is very high as broadcast for every 30 second
– Works only on hop count
– Not scalable as hop count is only 15
– Slow convergence
Configuring RIP 1
Router(config)# router rip
Router(config-router)# network <Network ID>
Configuring RIP 2
Router(config)# router rip
Router(config-router)# network <Network ID>
Router(config-router)# version 2
int loopback 1
ip address 4.1.1.1 255.255.255.255
Disadvantages of EIGRP
• Works only on Cisco Routers
Configuring EIGRP
Network Kings | www.networkkings.org | info@networkkings.org | Watch Videos: https://www.youtube.com/networkkingss and www.nwkings.com
62 | P a g e
Router(config)# router eigrp <as no>
Router(config-router)# network <Network ID>
Router ID
The highest IP address of the active physical interface of the router is Router ID.
If logical interface is configured, the highest IP address of the logical interface is Router ID
Router Types
In OSPF depending upon the network design and configuration we have different types of routers.
Internal Routers are routers whose interfaces all belong to the same area. These routers have a single Link State Database.
Area Border Routers (ABR) It connects one or more areas to the backbone area and has at least one interface that belongs to the backbone, Backbone
Router Area 0 routers
Autonomous System Boundary Router (ASBR) Router participating in OSPF and other protocols (like RIP, EIGRP and BGP)
2) Database table Database table contains information about the entire view of the topology with respect to each router.
3) Routing information Table Routing table contains information about the best path
calculated by the shortest path first algorithm in the database table.
Advantages of OSPF
• Open standard
• No hop count limitations
• Loop free
• Faster convergence
Disadvantages
• Consume more CPU resources
• Support only equal cost balancing
• Support only IP protocol don’t work on IPX and APPLE Talk
• Summarization only on ASBR and ABR
E.g.
Network Kings | www.networkkings.org | info@networkkings.org | Watch Videos: https://www.youtube.com/networkkingss and www.nwkings.com
68 | P a g e
255.255.255.255
– 255.255.255.240
---------------------
0. 0. 0. 15
Configuring OSPF
Router(config)# router ospf <pid>
Router(config-router)# network <Network ID> <wildcard mask> area <area id>
OSPF STATES
• DR/BDR Selection
• First Router to Initialize
• Router with Highest Priority ID
• Router with Highest Router ID
• Set the Highest Router ID
• Highest Loopback Interface IP Address
• Highest Interface IP Address
• ACL is a set of rules which will allow or deny the specific traffic moving through the router
• It is a Layer 3 security which controls the flow of traffic from one router to another.
• It is also called as Packet Filtering Firewall.
ACCESS-LIST
NUMBERED NAMED
• The access-list number range is 1 – 99 • The access-list number range is 100 – 199
• Can block a Network, Host and Subnet • Can block a Network, Host, Subnet and
Service
• Two way communication is stopped
• One way communication is stopped
• All services are blocked.
• Selected services can be blocked.
• Implemented closest to the destination.
• Implemented closest to the source.
• Filtering is done based on only source IP
address • Checks source, destination, protocol, port
Terminology
To Verify :
Router# show access-list
Router# show access-list <no>
r1 r2
conf t conf t
int fa0/1 int fa0/1
ip address 192.168.1.1 255.255.255.0 ip address 172.16.1.1 255.255.0.0
no shutdown no shutdown
int fa0/0 int fa0/0
ip address 1.0.0.1 255.255.255.252 ip address 1.0.0.2 255.255.255.252
no shutdown no shutdown
Configure telnet on R1
line vty 0 4
password cisco
login
exit
enable password cisco
Make ACL
Permit 192.168.1.0
Explict deny
R1(config)#access-list 1 permit 192.168.1.0 0.0.0.255
R1(config)#line vty 0 4
R1(config-line)#access-class 1 in
FTP DHCP
SMTP NNTP
Objective :
Block HTTP - 80
PC 192.168.1.2 > Nwkings 192.168.2.2
PC 192.168.1.3 > Cisco 192.168.2.3
R1(config)#access-list 100 deny tcp host 192.168.1.2 host 192.168.2.2 eq 80
R1(config)#access-list 100 deny tcp host 192.168.1.3 host 192.168.2.3 eq 80
Block FTP - 21
Network 192.168.1.0 > Nwkings 192.168.2.2
R1(config)#int fa0/1
R1(config-if)#ip access-group ABC in
R1#show access-lists
Extended IP access list ABC
10 deny tcp host 192.168.1.2 host 192.168.2.2 eq www
20 deny tcp host 192.168.1.3 host 192.168.2.3 eq www
30 deny tcp 192.168.1.0 0.0.0.255 host 192.168.2.2 eq ftp
40 deny icmp 192.168.1.0 0.0.0.255 host 192.168.2.3 echo
50 deny icmp 192.168.1.0 0.0.0.255 host 192.168.2.3 echo-reply
1. console connnection
2. open hypertrm
3. power on the device
5. on modular routers
OR
on fixed routers
>o/r 0x2142
>i
>enable
#copy start run
8. (config)#config-register 0x2102
(config)#exit
# write
# reload
router(config)# ip dhcp excluded-address 192.168.1.50 (if you don’t want to assign ip’s range )
router(config-dhcp)# ip dhcp pool cisco
router(config-dhcp)# network 192.168.1.0 255.255.255.0
router(config-dgcp)# default-router 192.168.1.1
router(config-dgcp)#exit
APIPA:-
Short for Automatic Private IP Addressing, a feature of later Windows operating systems. With APIPA, DHCP clients can automatically self-configure an IP
address and subnet mask when a DHCP server isn't available. When a DHCP client boots up, it first looks for a DHCP server in order to obtain an IP address
and subnet mask. If the client is unable to find the information, it uses APIPA to automatically configure itself with an IP address from a range that has been
reserved especially for Microsoft. The IP address range is 169.254.0.1 through 169.254.255.254. The client also configures itself with a default class B subnet
mask of 255.255.0.0. A client uses the self-configured IP address until a DHCP server becomes available.
Small companies typically get their public IP addresses directly from their ISPs, which have a limited number.
Large companies can sometimes get their public IP addresses from a registration authority, such as the Internet Assigned Numbers Authority (IANA).
Common devices that can perform address translation include firewalls, routers, and servers. Typically address translation is done at the perimeter of the
network by either a firewall (more commonly) or a router.
There are certain addresses in each class of IP address that are reserved for Private Networks. These addresses are called private addresses.
• Inside Local Addresses – An IP address assigned to a host inside a network. This address is likely to be a RFC 1918 private address
• Inside Global Address – A legitimate IP address assigned by the NIC or service provider that represents one or more inside local IP address to the
outside world.
• Outside Local Address - The IP address of an outside host as it known to the hosts in the inside network.
• Outside Global Address - The IP address assigned to a host on the outside network. The owner of the host assigns this address.
Types of NAT:-
1. Dynamic NAT
2. Static NAT
3. PAT
Static NAT
• This type of NAT is designed to allow one-to-one mapping between local and global addresses.
• Keep in mind that the static version requires you to have one real Internet IP address for every host on your network..
Syntax:
(Config)# IP nat inside source static <private IP> <public IP>
Implementation :
(Config) # interface s0
(Config-if)# ip nat outside
Network Kings | www.networkkings.org | info@networkkings.org | Watch Videos: https://www.youtube.com/networkkingss and www.nwkings.com
85 | P a g e
(Config)# interface e0
(Config-if)# ip nat inside
Dynamic NAT
• This version gives you the ability to map an unregistered IP address to a registered IP address from out of a pool of registered IP addresses.
• You don’t have to statically configure your router to map an inside to an outside address as you would using static NAT, but you do have to have
enough real IP addresses for everyone who’s going to be sending packets to and receiving them from the Internet.
Syntax :
(Config)# access-list < NO> permit <net.ID> <WCM>
(Config)#ip nat inside pool <name> <starting Pub IP><end Pub IP>
<netmask < mask>
Implementation :
(Config) # interface s0
(Config-if)# ip nat outside
• It is also known as Port Address Translation (PAT), and by using PAT (NAT Overload), you get to have thousands of users connect to the Internet using
only one real global IP address.
• NAT Overload is the real reason we haven’t run out of valid IP address on the Internet
Syntax :
(Config)# access-list < NO> permit <net.ID> <WCM>
(Config)#ip nat inside pool <name> <starting Pub IP><end Pub IP> netmask
< mask>
Implementation :
(Config) # interface s0
(Config-if)# ip nat outside
(Config)# interface e0
Network Kings | www.networkkings.org | info@networkkings.org | Watch Videos: https://www.youtube.com/networkkingss and www.nwkings.com
87 | P a g e
(Config-if)# ip nat inside
Switch
• It is Datalink layer device (Layer 2)
• Its is An Intelligent device
• It works with Physical addresses (i.e. MAC addresses)
• It works with fixed bandwidth
• It works with Flooding and Unicast
• It has 1 Broadcast domain and Number of Collision domains depends upon the number of ports.
• It maintains a MAC address table
E0 E1 E0 E1
Types of Switches
• Manageable switches
On a Manageable switch, an IP address can be assigned and configurations can be made. It has a console port .
• Unmanageable switches
On an Unmanageable switch, configurations cannot be made, an IP address cannot be assigned as there is no console port.
Catalyst 1900
Catalyst 2900
3550 switch
Switching Mode
Latency is the total time taken for a Frame to pass through the Switch. Latency depends on the switching mode and the hardware capabilities of the Switch.
Console Connectivity
Connect one end of console cable to console port of switch and other end of cable to your computer’s com port.
Now open Hyper terminal and power on the switch.
2950>en
2950#config terminal
Network Kings | www.networkkings.org | info@networkkings.org | Watch Videos: https://www.youtube.com/networkkingss and www.nwkings.com
93 | P a g e
To assign IP to a Switch
ADVANCE SWTCHING
• Spanning Tree Protocol (STP) uses Spanning Tree Algorithm to avoid the Switching loops in layer-2 devices (bridges or switches).
• STP works when multiple switches are used with redundant links avoiding Broadcast Storms, Multiple Frame Copies & Database instability.
• First Developed By DEC
• STP is a open standard (IEEE 802.1D)
• STP is enabled by default on all Cisco Catalyst switches
STP Terminology
• BPDU
– All switches exchange information through what is called as Bridge Protocol Data Units (BPDUs)
– BPDUs contain a lot of information to help the switches determine the topology and any loops that result from that topology.
– BPDUs are sent every 2 sec
Network Kings | www.networkkings.org | info@networkkings.org | Watch Videos: https://www.youtube.com/networkkingss and www.nwkings.com
95 | P a g e
• Bridge ID
– Each switch has a unique identifier called a Bridge ID or Switch ID
– Bridge ID = Priority + MAC address of the switch
– When a switch advertises a BPDU , they place their switch id in these BPDUs.
• Root Bridge
– The bridge with the Best (Lowest) ID.
– Out of all the switches in the network , one is elected as a root bridge that becomes the focal point in the network.
• Non-Root bridge
– All Switches other than the Root Bridge are Non-Root Bridges
• Designated port
– Either a port On a root bridge or a port that has been
determined as having the best (lower) cost.
– A designated port will always in Forward Mode
• Root port
– The link directly connected to the root bridge, or the
shortest path to the root bridge.
– Priority and Alternatives if Config occurred.
• Root port with the least cost (Speed) connecting to the root bridge.
• The bridge with the Best (Lowest) Switch ID.
• Lowest Physical Port Number.
– Only One root port will Be in Bridge or switch.
• Non Designated port
– All the Port or ports which are blocked by STP to avoid switching loop.
– A Non Designated port Will Always in Blocked Mode.
• Listening : Listens to BPDUs to make sure no loops occur on the network before passing data frames.
• Learning : Learns MAC addresses and builds a filter table but does not forward frames.
Virtual LAN
• A Layer 2 Security
• Divides a Single Broadcast domain into Multiple Broadcast domains.
• By default all ports of the switch are in VLAN1 . This VLAN1 is known as Administrative VLAN or Management VLAN
Network Kings | www.networkkings.org | info@networkkings.org | Watch Videos: https://www.youtube.com/networkkingss and www.nwkings.com
97 | P a g e
• VLAN can be created from 2 – 1001
• Can be Configured on a Manageable switch only
• 2 Types of VLAN Configuration
– Static VLAN
– Dynamic VLAN
1 Broadcast Domain
A B
B
E0 E1
C E2 E3 D
4 Collision Domains
• By default, routers allow broadcasts only within the originating network, but switches forward broadcasts to all segments.
• The reason it’s called a flat network is because it’s one Broadcast domain , not because its design is physically flat. (Flat Network Structure)
• Network adds, moves, and changes are achieved by configuring a port into the appropriate VLAN.
• A group of users needing high security can be put into a VLAN so that no users outside of the VLAN can communicate with them.
• As a logical grouping of users by function, VLANs can be considered independent from their physical or geographic locations.
• VLANs can enhance network security.
• VLANs increase the number of broadcast domains while decreasing their size.
A B
B
E0 E1
C E2 E3 D
4 Collision Domains
Static VLAN
• Static VLAN’s are based on port numbers
• Need to manually assign a port on a switch to a VLAN
• Also called Port-Based VLANs
• It can be a member of single VLAN and not multiple VLAN’s
• Creation of VLAN:-
Switch # vlan database
Switch(vlan)# vlan <vlan id> name <vlan name>
Switch(vlan)# exit
• Verify using
Switch # show vlan
Dynamic VLAN
• Dynamic VLAN’s are based on the MAC address of a PC
• Switch automatically assigns the port to a VLAN
• Each port can be a member of multiple VLAN’s
• For Dynamic VLAN configuration, a software called VMPS( VLAN Membership Policy Server) is needed
Types of links/ports
• Access links
– This type of link is only part of one VLAN, and it’s referred to as the native VLAN of the port.
• Trunk links
– Trunks can carry multiple VLANs.
– A trunk link is a 100- or 1000Mbps point-to-point link between two switches, between a switch and router, or between a switch and server.
These carry the traffic of multiple VLANs—from1 to 1005 at a time.
– Trunking allows you to make a single port part of multiple VLANs at the same time.
VTP Modes
VTP Mode are of three types :
• Server Mode
o A Switch configured in Server mode can Add , Modify and Delete VLAN’s
o A Default VTP mode for all switches
• Client Mode
o A switch configured in Client mode cannot Add , Modify and Delete its VLAN configurations
o Doesn’t store its VLAN configuration information in the NVRAM. Instead , learns it from the server every time it boots up
• Transparent Mode
o A switch configured in a Transparent Mode can Add , Modify and Delete VLAN configurations.
o Changes in one transparent switch will not affect any other switch.
VTP Pruning
• Preserves bandwidth by configuring it to reduce the amount of broadcasts, multicasts, and unicast packets.
• VTP pruning only sends broadcasts to trunk links that truly must have the information.
• Enabling pruning on a VTP server, enables it for the entire domain.
• By default, VLANs 2 through 1005 are pruning-eligible, but VLAN 1 can never prune because it’s an administrative VLAN.
Step 1. As a requirement to generate an RSA general-usage key you’ll need to change the hostname to a hostname other then the default “Router”
hostname. In this case, you can use R1 as shown below;
Router>enable
Password:
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R1
R1(config)#
. Configure the transport input protocol on the VTY lines to accept only SSH by executing the transport input ssh under the vty line configuration mode as
shown below;
R1(config)#line vty 0 4
R1(config-line)#transport input ssh
Step 6. Verify your SSH configuration by using the Cisco IOS SSH client and SSH to the routers loopback interface 10.1.1.1
R1(config-line)#end
R1#ssh -l john 10.1.1.1
Password:
Password:
R1#show ssh
IPv6
IPv6 has 128 bit addresses and has a much larger address space than 32-bit IPv4 which offered us a bit more than 4 billion addresses. Keep in mind
every additional bit doubles the number of IP addresses…so we go from 4 billion to 8 billion, 16,32,64, etc. Keep doubling until you reach 128 bit. With
128 bits this is the largest value you can create:
340,282,366,920,938,463,463,374,607,431,768,211,456
The main reason to start using IPv6 is that we need more addresses but it also offers some new features:
• No Broadcast traffic: No broadcasts anymore. We use multicast in IPV6. It means protocols like ARP are replaced with other solutions.
• Stateless Autoconfiguration: Its like a “mini DHCP server”. Routers running IPv6 are able to advertise the IPv6 prefix and gateway address to
hosts so that they can automatically configure themselves and get access outside of their own network.
• Address Renumbering: Renumbering static IPv4 addresses on your network is a pain. If you use stateless autoconfiguration for IPv6 then you
can easily swap the current prefix with another one.
• Mobility: IPv6 has built-in support for mobile devices. Hosts will be able to move from one network to another and keep their current IPv6
address.
• No NAT / PAT: we have so much IPv6 addresses that we don’t need NAT or PAT anymore, every device in your network can have a public IPv6
address.
IPv6 looks different than IPv4 but there are some similarities.
For example we have unicast addresses and we still have a “public” and “private” range. We use different names for these but the idea is the same. One
of the differences is that IPv6 has some additional unicast address types.
• IPV6 released in 1999 , 128 bit (approximately 340 undecillion or 3.4×1038) addresses
Unicast
Unicast IPv6 addresses are similar to unicast IPv4 addresses. These are meant to configure on one interface so that you can send and receive IPv6 packets.
There are a number of different unicast address types that we’ll discuss here.
Global Unicast
The global unicast IPv6 addresses are similar to IPv4 public addresses. These addresses can be used on the Internet. The big difference with IPv4 is that we
have so much address space that we can use global unicast addresses on any device in the network.
Unique Local
Unique local addresses work like the IPv4 private addresses. You can use these addresses on your own network if you don’t intend to connect to the Internet
or if you plan to use IPv6 NAT. The advantage of unique local addresses is that you don’t need to register at an authority to get some address space. The
FC00::/7 prefix is reserved for unique local addresses
2001:0000:0000:0012:0000:0000:1234:56ab
2001:0db8:3c4d:0012:0000:0000:1234:56ab
We can remove the one or more blocks of zeros by replacing them with double colons, But you can only replace one contiguous block of zeros in an address
2001:0000:0000:0012:0000:0000:1234:56ab
2001:0000:0000:0012::1234:56ab
2001:0:0:12::1234:56ab
2001:0000:0000:0012:0000:0000:1234:56ab
2001:0:0:12:0 : 0:1234:56ab
• 2001::12:0:0:1234:56ab (correct)
ADDRESS TYPES:
1) UNICAST 2) Multicast
FC00:1234:12:121:fe12::1/
FD00:1234:12:121:fe12::1/
FE80::45E:34:fc::0
Since we use a /64 it means that the first 64 bits are the prefix. Each hexadecimal character represents 4 binary bits so that means that this part is the
prefix:
2. We insert “FFFE” in between the two pieces so that we have a 64 bit value.
EIGRP
Network Kings | www.networkkings.org | info@networkkings.org | Watch Videos: https://www.youtube.com/networkkingss and www.nwkings.com
116 | P a g e
R1(config)#ipv6 router eigrp 1 R2(config)#ipv6 router eigrp 1
R1(config-rtr)#router-id 1.1.1.1 R2(config-rtr)#router-id 2.2.2.2
R1(config-rtr)#no shutdown R2(config-rtr)#no shutdown
Wi-Fi
Wi-Fi: - wireless fidelity
1. Half duplex, connectivity issues ( not reliable )
2. Shared signal
3. CSMA/CA
802.11a:- 25 mbps, can reach up to 54 mbps, indoor range is 100 feet , 5ghz frequency
802.11b:- 6.5 mbps, can reach up to 11 mbps, indoor range is 100 feet, 2.4 ghz frequency
802.11g: - 25 mbps, can reach up to 54 mbps, indoor range is 100 feet, 2.4 ghz
802.11n:- 200 mbps, can reach up to 540 mbps , indoor range is 160 feet , work on both 2.4 ghz frequency and 5 ghz
SSID: - service set identifier (name of your wlan) case sensitive 32 characters
Authentication
A WAN is a data communications network that operates beyond the geographic scope of a LAN.
1. Wireless
2. Satellite
3. Cables: - 1. Leased lines ---- dedicated lines
2. Circuit switching
3 . Packet switching
WAN Protocols
HDLC PPP
• After the PPP link establishment phase is complete, the local router sends a unique “challenge” message to the remote node.
• The remote node responds with a value (MD5)
• The local router checks the response against its own calculation of the expected hash value.
• If the values match, the authentication is acknowledged. Otherwise, the connection is terminated immediately.
Configuration of HDLC:-
Router(config)# interface serial 0/0
Router(config-if)# encapsulation hdlc
Configuration of PPP:
Router# configure terminal
Router(config)# interface serial 0/0
Router(config-if)# encapsulation ppp
DCE DTE
E0 V.35 V.35 E0
10.1.1.1/8 Cable Cable 20.1.1.1/8
2 pair of
Copper Wire
HYDERABAD KSA
MUX MUX
Frame relay:-
* Cost effective
* shared bandwidth
* NBMA :-NOn broadcast multi acess-- which not broadcast neither multicast
* Cheaper connections
* Available anywhere where internet is available
* Heavily encrypted and secure
* HIGH OVERHEAD (disadvantage)