Ccna Final Project File To B Printed
Ccna Final Project File To B Printed
Computer network allows the user to share and transfer information using cables or
modem with a network.
Computer network allows the user to share data with other users in a network for example
printers and faxes. Printer can be installed on one computer and can be accessed by other
users in a network by this the need of installing the printer is avoided on individual
computers. This results in cost effectiveness.
Computer network also allows the user to communicate with each other using instant
messaging tools to share ideas, files or solve queries.
TYPES OF NETWORKS
1
LOCAL AEA NETWORK (LAN)
Larger LANs are characterized by their use of redundant links with switches using
the spanning tree protocol to prevent loops, their ability to manage differing traffic types
via quality of service (QoS), and to segregate traffic with VLANs. Larger LANs also contain
a wide variety of network devices such as switches, firewalls, routers, load balancers, and
sensors.[9]
LANs may have connections with other LANs via leased lines, leased services, or by
tunneling across the Internet using virtual private network technologies. Depending on how
the connections are established and secured in a LAN, and the distance involved, a LAN may
also be classified as METROPOLITAN AREA NETWORK (MAN)
2
using a high-capacity backbone technology, such as fiber-optical links, and provides up-link
services to wide area networks (or WAN) and the Internet.
A MAN is optimized for a larger geographical area than a LAN, ranging from several blocks
of buildings to entire cities. MANs can also depend on communications channels of
moderate-to-high data rates. A MAN might be owned and operated by a single organization,
but it usually will be used by many individuals and organizations. MANs might also be
owned and operated as public utilities. They will often provide means for internetworking
of local networks.
A wide area network (WAN) is a computer network that covers a broad area (i.e., any
network whose communications links cross metropolitan, regional, or national boundaries).
This is in contrast with personal area networks (PANs), local area networks (LANs), campus
area networks (CANs), or metropolitan area networks (MANs) which are usually limited to a
room, building, campus or specific metropolitan area (e.g., a city) respectively.
WANs are used to connect LANs and other types of networks together, so that users and
computers in one location can communicate with users and computers in other locations.
Many WANs are built for one particular organization and are private. Others, built
by Internet service providers, provide connections from an organization's LAN to the
Internet. WANs are often built using leased lines. At each end of the leased line,
a router connects to the LAN on one side and a hub within the WAN on the other. Leased
lines can be very expensive. Instead of using leased lines, WANs can also be built using less
costly circuit switching or packet switching methods.
There are also several ways to connect NonStop S-series servers to WANs, including via the
ServerNet Wide Area Network (SWAN) or SWAN 2 concentrator, which provides WAN
client connectivity to servers that have Ethernet ports and appropriate communications
software. You can also use the Asynchronous Wide Area Network (AWAN) access server,
which offers economical asynchronous-only WAN access. Several options are available for
WAN connectivity:
3
s s Range Used
Transmission rates usually range from 1200 bps to 24 Mbps, although some connections such
as ATM and Leased lines can reach speeds greater than 156 Mbps. Typical communication
links used in WANs are telephone lines, microwave links & satellite channels.
Recently with the proliferation of low cost of Internet connectivity many companies and
organizations have turned to VPN to interconnect their networks, creating a WAN in that
4
way. Companies such as Cisco, New Edge Networks and Check Point offer solutions to
create VPN networks.
TOPOLOGIES
Topology is a pattern of computer devices and describes the way in which these devices are
connected. Topology can be physical or logical. Physical topology refers to the physical
structure of network, while a logical topology determines the way in which the data actually
passes through the network from one device to the other.
TYPES OF TOPOLOGIES
STAR TOPOLOGY
5
The star topology reduces the chance of network failure by connecting all of the systems to a
central node. When applied to a bus-based network, this central hub rebroadcasts all
transmissions received from any peripheral node to all peripheral nodes on the network,
sometimes including the originating node. All peripheral nodes may thus communicate with
all others by transmitting to, and receiving from, the central node only. The failure of a
transmission line linking any peripheral node to the central node will result in the isolation of
that peripheral node from all others, but the rest of the systems will be unaffected.
It is also designed with each node (file servers, workstations, and peripherals) connected
directly to a central network hub, switch, or concentrator.
Data on a star network passes through the hub, switch, or concentrator before continuing to
its destination. The hub, switch, or concentrator manages and controls all functions of the
network. It is also acts as a repeater for the data flow. This configuration is common
with twisted pair cable. However, it can also be used with coaxial cable or optical fibre cable.
Advantages
6
Disadvantages
The primary disadvantage of a star topology is the high dependence of the system on the
functioning of the central hub. While the failure of an individual link only results in the
isolation of a single node, the failure of the central hub renders the network inoperable,
immediately isolating all nodes. The performance and scalability of the network also depend
on the capabilities of the hub. Network size is limited by the number of connections that can
be made to the hub, and performance for the entire network is capped by its throughput.
While in theory traffic between the hub and a node is isolated from other nodes on the
network, other nodes may see a performance drop if traffic to another node occupies a
significant portion of the central node's processing capability or throughput. Furthermore,
wiring up of the system can be very complex and high costing.
BUS TOPOLOGY
A bus network topology is a network architecture in which a set of clients are connected via
a shared communications line, called a bus. There are several common instances of the bus
architecture, including one in the motherboard of most computers, and those in some versions
of Ethernet networks.
Bus networks are the simplest way to connect multiple clients, but may have problems when
two clients want to transmit at the same time on the same bus. Thus systems which use bus
network architectures normally have some scheme of collision handling or collision
avoidance for communication on the bus, quite often using Carrier Sense Multiple Access or
the presence of a bus master which controls access to the shared bus resource.
A true bus network is passive – the computers on the bus simply listen for a signal; they are
not responsible for moving the signal along. However, many active architectures can also be
described as a "bus", as they provide the same logical functions as a passive bus; for example,
7
switched Ethernet can still be regarded as a logical network, if not a physical one. Indeed, the
hardware may be abstracted away completely in the case of a software bus.
With the dominance of switched Ethernet over passive Ethernet, passive bus networks are
uncommon in wired networks. However, almost all current wireless networks can be viewed
as examples of passive bus networks, with radio propagation serving as the shared passive
medium.
The bus topology makes the addition of new devices straightforward. The term used to
describe clients is station or workstation in this type of network. Bus network topology uses a
broadcast channel which means that all attached stations can hear every transmission and all
stations have equal priority in using the network to transmit data.
The Ethernet bus topology works like a big telephone party line — before any device can
send a packet, devices on the bus must first determine that no other device is sending a packet
on the cable. When a device sends its packet out over the bus, every other network card on
the bus sees and reads the packet. Ethernet’s scheme of having devices communicate like
they were in chat room is called Carrier Sense Multiple Access/ Collision Detection
(CSMA/CD). Sometimes two cards talk (send packets) at the same time. This creates a
collision, and the cards themselves arbitrate to decide which one will resend its packet first.
All PCs on a bus network share a common wire, which also means they share the data
transfer capacity of that wire – or, in tech terms, they share its bandwidth.
This creates an interesting effect. Ten PCs chatting on a bus each get to use a much higher
proportion of its total bandwidth than, for instance, 100 PCs on the same bus (in this case,
one – tenth compared to one – hundredth). The more PCs on a bus, the more likely you’ll
have a communication traffic jam.
Advantages
8
Disadvantages
RING TOPOLOGY
A ring network is a network topology in which each node connects to exactly two other
nodes, forming a single continuous pathway for signals through each node - a ring. Data
travels from node to node, with each node along the way handling every packet.
Because a ring topology provides only one pathway between any two nodes, ring networks
may be disrupted by the failure of a single link. A node failure or cable break might isolate
every node attached to the ring. FDDI networks overcome this vulnerability by sending data
on a clockwise and a counterclockwise ring: in the event of a break data is wrapped back onto
the complementary ring before it reaches the end of the cable, maintaining a path to every
node along the resulting "C-Ring". 802.5 networks -- also known as IBM Token Ring
9
networks -- avoid the weakness of a ring topology altogether: they actually use
a star topology at the physical layer and a Multistation Access Unit (MAU) toimitate a ring at
the datalink layer.
Many ring networks add a "counter-rotating ring" to form a redundant topology. Such "dual
ring" networks include Spatial Reuse Protocol, Fiber Distributed Data Interface (FDDI),
and Resilient Packet Ring.
Advantages
Very orderly network where every device has access to the token and the opportunity
to transmit
Performs better than a star topology under heavy network load
Can create much larger network using Token Ring
Does not require network server to manage the connectivity between the computers
Disadvantages
One malfunctioning workstation or bad port in the MAU can create problems for the
entire network
Moves, adds and changes of devices can affect the network
Network adapter cards and MAU's are much more expensive than Ethernet cards and
hubs
Much slower than an Ethernet network under normal load.
Misconceptions
10
11
MESH TOPOLOGY
Mesh networking is a type of networking wherein each node in the network may act as an
independent router, regardless of whether it is connected to another network or not. It allows
for continuous connections and reconfiguration around broken or blocked paths by “hopping”
from node to node until the destination is reached. A mesh network whose nodes are all
connected to each other is a fully connected network. Mesh networks differ from other
networks in that the component parts can all connect to each other via multiple hops, and they
generally are not mobile. Mesh networks can be seen as one type of ad hoc network. Mobile
ad hoc networks (MANET) and mesh networks are therefore closely related, but MANET
also have to deal with the problems introduced by the mobility of the nodes. Mesh networks
are self-healing: the network can still operate when one node breaks down or a connection
goes bad. As a result, the network may typically be very reliable, as there is often more than
one path between a source and a destination in the network. Although mostly used in wireless
scenarios, this concept is also applicable to wired networks and software interaction. The
animation at the right illustrates how wireless mesh networks can self form and self heal.
Wireless mesh networks were originally developed for military applications and are typical of
mesh architectures. Over the past decade the size, cost, and power requirements of radios has
12
declined, enabling more radios to be included within each device acting as a mesh node. The
additional radios within each node enable it to support multiple functions such as client
access, backhaul service, and scanning (required for high speed handover in mobile
applications). Additionally, the reduction in radio size, cost, and power has enabled the mesh
nodes to become more modular—one node or device now can contain multiple radio cards or
modules, allowing the nodes to be customized to handle a unique set of functions and
frequency bands.
TREE TOPOLOGY
The type of network topology in which a central 'root' node (the top level of the hierarchy) is
connected to one or more other nodes that are one level lower in the hierarchy (i.e., the
second level) with a point-to-point link between each of the second level nodes and the top
level central 'root' node, while each of the second level nodes that are connected to the top
level central 'root' node will also have one or more other nodes that are one level lower in the
hierarchy (i.e., the third level) connected to it, also with a point-to-point link, the top level
central 'root' node being the only node that has no other node above it in the hierarchy (The
hierarchy of the tree is symmetrical.) Each node in the network having a specific fixed
number, of nodes connected to it at the next lower level in the hierarchy, the number, being
referred to as the 'branching factor' of the hierarchical tree.This tree has individual peripheral
nodes.
1. A network that is based upon the physical hierarchical topology must have at least three
13
levels in the hierarchy of the tree, since a network with a central 'root' node and only one
hierarchical level below it would exhibit the physical topology of a star.
2. A network that is based upon the physical hierarchical topology and with a branching
factor of 1 would be classified as a physical linear topology.
3. The branching factor, f, is independent of the total number of nodes in the network and,
therefore, if the nodes in the network require ports for connection to other nodes the total
number of ports per node may be kept low even though the total number of nodes is large –
this makes the effect of the cost of adding ports to each node totally dependent upon the
branching factor and may therefore be kept as low as required without any effect upon the
total number of nodes that are possible.
4. The total number of point-to-point links in a network that is based upon the physical
hierarchical topology will be one less than the total number of nodes in the network.
5. If the nodes in a network that is based upon the physical hierarchical topology are required
to perform any processing upon the data that is transmitted between nodes in the network,
the nodes that are at higher levels in the hierarchy will be required to perform more
processing operations on behalf of other nodes than the nodes that are lower in the
hierarchy. Such a type of network topology is very useful and highly recommended.
HYBRID TOPOLOGY
Hybrid networks use a combination of any two or more topologies in such a way that the
resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.).
For example, a tree network connected to a tree network is still a tree network, but two star
networks connected together exhibit a hybrid network topology. A hybrid topology is always
produced when two different basic network topologies are connected. Two common
examples for Hybrid network are: star ring network and star bus network
A Star ring network consists of two or more star topologies connected using
a multistation access unit (MAU) as a centralized hub.
A Star Bus network consists of two or more star topologies connected using a bus
trunk (the bus trunk serves as the network's backbone).
While grid networks have found popularity in high-performance computing applications,
some systems have used genetic algorithms to design custom networks that have the fewest
possible hops in between different nodes. Some of the resulting layouts are nearly
incomprehensible, although they function quite well.
14
NETWORKING
15
To understand the function of the Physical Layer, contrast it with the functions of the Data
Link Layer. Think of the Physical Layer as concerned primarily with the interaction of a
single device with a medium, whereas the Data Link Layer is concerned more with the
interactions of multiple devices (i.e., at least two) with a shared medium. Standards such
as RS-232 do use physical wires to control access to the medium.
The major functions and services performed by the Physical Layer are:
16
performs network routing functions, and might also perform fragmentation and reassembly,
and report delivery errors. Routers operate at this layer—sending data throughout the
extended network and making the Internet possible. This is a logical addressing scheme –
values are chosen by the network engineer. The addressing scheme is not hierarchical.
A number of layer management protocols belong to the Network Layer. These include
routing protocols, multicast group management, Network Layer information and error, and
Network Layer address assignment. It is the function of the payload that makes these belong
to the Network Layer, not the protocol that carries them.
Although not developed under the OSI Reference Model and not strictly conforming to the
OSI definition of the Transport Layer, typical examples of Layer 4 are the Transmission
Control Protocol (TCP) and User Datagram Protocol (UDP).
Of the actual OSI protocols, there are five classes of connection-mode transport protocols
ranging from class 0 (which is also known as TP0 and provides the least features) to class 4
(TP4, designed for less reliable networks, similar to the Internet). Class 0 contains no error
recovery, and was designed for use on network layers that provide error-free connections.
Class 4 is closest to TCP, although TCP contains functions, such as the graceful close, which
OSI assigns to the Session Layer.
Perhaps an easy way to visualize the Transport Layer is to compare it with a Post Office,
which deals with the dispatch and classification of mail and parcels sent. Do remember,
however, that a post office manages the outer envelope of mail. Higher layers may have the
equivalent of double envelopes, such as cryptographic presentation services that can be read
by the addressee only. Roughly speaking, tunneling protocols operate at the Transport Layer,
such as carrying non-IP protocols such as IBM's SNA or Novell's IPX over an IP network, or
end-to-end encryption with IPsec. While Generic Routing Encapsulation (GRE) might seem
to be a Network Layer protocol, if the encapsulation of the payload takes place only at
endpoint, GRE becomes closer to a transport protocol that uses IP headers but contains
complete frames or packets to deliver to an endpoint. L2TP carries PPP frames inside
transport packet.
17
Layer 5: Session Layer
The Session Layer controls the dialogues (connections) between computers. It establishes,
manages and terminates the connections between the local and remote application. It provides
for full-duplex, half-duplex, or simplex operation, and establishes check pointing,
adjournment, termination, and restart procedures. The OSI model made this layer responsible
for graceful close of sessions, which is a property of the Transmission Control Protocol, and
also for session check pointing and recovery, which is not usually used in the Internet
Protocol Suite. The Session Layer is commonly implemented explicitly in application
environments that use remote procedure calls.
This layer provides independence from data representation (e.g., encryption) by translating
between application and network formats. The presentation layer transforms data into the
form that the application accepts. This layer formats and encrypts data to be sent across a
network. It is sometimes called the syntax layer.
18
OSI model
7. Application Layer
NNTP · SIP · SSI · DNS · FTP ·Gopher · H
TTP · NFS · NTP · SMPP ·SMTP · DHCP ·
SNMP · Telnet
6. Presentation Layer
MIME · XDR · TLS · SSL
5. Session Layer
Named
Pipes · NetBIOS · SAP · SIP ·L2TP · PPTP
4. Transport Layer
TCP · UDP · SCTP · DCCP
3. Network Layer
IP · ICMP · IPsec · IGMP · IPX ·AppleTalk
ARP · CSLIP · SLIP · Ethernet · Frame
relay · ITU-T G.hn DLL · PPP
1. Physical Layer
RS-232 · RS-449 · V.35 · V.34 · I.430 ·I.431
· T1 · E1 · POTS · SONET/SDH ·OTN · DS
L · 802.11a/b/g/n PHY ·802.15.x PHY · ITU-
T G.hn PHY ·Ethernet · USB · Bluetooth
19
Networking Medias
Network media refers to media mainly used in computer networks such as the Internet.
Network media is essentially driven by technological development, emerging from the
internet as a non-centralized medium in the late nineties; the term has more recently begun to
be applied to both the arts and industry. The following features distinguish Network Media
from classical media, such as broadcast media and the printed press:
The choice of media type affects the type of network interface cards installed, the speed of
the network, and the ability of the network to meet future needs. Table below compares the
features of the common network media, including UTP, STP, coaxial cable, fiber-optic, and
wireless connections.
Comparing Media Types
Media Maximum Speed Comparative Advantages Disadvantages
Type Segment Cost
Length
UTP 100 meters 10 Mbps Least expensive Easy to in- Susceptible to
stall, widely interference; can cover
100 Mbps available, only a limited distance
widely used
STP 100 meters 10–100 More expensive Reduced Difficult to work with;
Mbps than UTP crosstalk, can cover only a limited
less sus- distance
ceptible to
EMI than
UTP or
Thinnet
Coaxial 500 meters 10–100 Relatively Less sus- Difficult to work with
(Thicknet) Mbps inexpensive, but ceptible to (Thicknet); limited
more costly than EMI than bandwidth; limited
185 meters UTP other types application (Thinnet);
(Thinnet) of copper damage to cable can
media bring down entire
network
20
Media Maximum Speed Comparative Advantages Disadvantages
Type Segment Cost
Length
Coaxial 500 meters 10–100 Relatively Less susceptible Difficult to work with
(Thicknet) Mbps inexpensive, to EMI than (Thicknet); limited
but more other types of bandwidth; limited
185 meters costly than copper media application (Thinnet);
(Thinnet) UTP damage to cable can
bring down entire
network
Fiber- 3 km and 10–1000 Expensive Cannot be Difficult to terminate
optic further (sin- Mbps (sin- tapped easily, so
gle-mode) gle-mode) security is bet-
ter; can be used
2 km and 100 Mbps– over great dis-
further 9.92 Gbps tances; not
(multimode) (multimode) susceptible to
EMI; higher
data rate than
coaxial and
twisted-pair
Wireless 50 km— 1–54 Mbps Expensive Does not Susceptible to
global require in- atmospheric conditions
stallation of
media
Twisted-Pair Cable
Twisted-pair is a copper wire-based cable that can be either shielded or unshielded. Twisted-
pair is the most common media for network connectivity. Unshielded twisted-pair (UTP)
cable, as shown, is a four-pair wire. Each of the eight individual copper wires in UTP cable is
covered by an insulating material. In addition, the wires in each pair are twisted around each
other. The advantage of UTP cable is its ability to cancel interference, because the twisted-
wire pairs limit signal degradation from electromagnetic interference (EMI) and radio
frequency interference (RFI). To further reduce crosstalk between the pairs in UTP cable, the
number of twists in the wire pairs varies. UTP, as well as shielded
twisted-pair (STP) cable, must follow precise specifications as to
how many twists or braids are permitted per meter.
Category 1—Used for telephone communications; not suitable for transmitting data
Category 4—Used in Token Ring networks; can transmit data at speeds up to 16 Mbps
Category 6—Consists of four pairs of 24-gauge copper wires that can transmit data at
speeds up to 1000 Mbps
Shielded twisted-pair (STP) cable, as shown in Figure 4-2, combines the techniques of
shielding and the twisting of wires to further protect against signal degradation. Each pair of
wires is wrapped in a metallic foil. The four pairs of wires are then wrapped in an overall
metallic braid or foil, usually 150-ohm cable. Specified for use in Ethernet network
installations, STP reduces electrical noise both within the cable (pair-to-pair coupling, or
crosstalk) and from outside the cable (EMI and RFI). Token Ring network topology uses
STP. When you consider using UTP and STP for your network media, consider the
following:
22
Both are the least-expensive media for data communication. UTP is less expensive
than STP.
Because most buildings are already wired with UTP, many transmission standards are
adapted to use it to avoid costly rewiring with an alternative cable type. Twisted-pair
cabling is the most common networking cabling.
Coaxial Cable
Coaxial cable consists of a hollow outer cylindrical conductor that surrounds a single inner
wire conducting element. This section describes the characteristics and uses of coaxial cable.
As shown in Figure, the single inner wire located in the center of a coaxial cable is a copper
conductor, surrounded by a layer of flexible insulation. Over this insulating material is a
woven copper braid or metallic foil that acts both as the second wire in the circuit and as a
shield for the inner conductor. This second layer, or shield, can help reduce the amount of
outside interference. An outer jacket covers this shield. The BNC connector shown looks
much like a cable-television connector and connects to an older NIC with a
BNC interface. Coaxial cable supports 10 to 100 Mbps and is relatively
inexpensive, although more costly than UTP. Coaxial cable can be laid over
longer distances than twisted-pair cable. For example, Ethernet can run
approximately 100 meters using twisted-pair cable, but 500 meters using
coaxial cable.
Coaxial cable offers several advantages for use in LANs. It can be run with fewer boosts
from repeaters, which regenerate the signals in a network so that they can cover greater
distances between network nodes than either STP or UTP cable. Coaxial cable is less
expensive than fiber optic cable, and the technology is well known. It has been used for many
years for all types of data communication. When you work with cable, consider its size. As
the thickness, or diameter, of the cable increases, so does the difficulty in working with it.
Cable must often be pulled through existing conduits and troughs that are limited in size.
Coaxial cable comes in a variety of sizes. The largest diameter, frequently referred to as
Thicknet, was specified for use as Ethernet backbone cable because historically it had greater
transmission length and noise rejection characteristics. However, Thicknet cable can be too
rigid to install easily in some environments because of its thickness. Generally, the more
difficult the network media is to install, the more expensive it is to install. Coaxial cable is
more expensive to install than twisted-pair cable, and Thicknet cable is almost with an
outside diameter of only 0.35 cm, sometimes referred to as Thinnet, was used in Ethernet
networks. It was especially useful for cable installations that required the cable to make many
twists and turns. Because Thinnet was easier to install, it was also cheaper to install. Thus, it
was also referred to as Cheapernet.
Fiber-Optic Cable
23
protection for the fragile, hair-thin glass fibers. Where buried fiber-optic cables are required
by codes, a stainless steel wire is sometimes included for added strength. Several connectors
can connect fiber to the networking device; the most common
is a SC connector, which has two optics; one connecting to
transmit and the other connecting to receive the light-guiding
parts of an optical fiber are called the core and the cladding.
The core is usually very pure glass with a high index of
refraction. When a cladding layer of glass or plastic with a low
index of refraction surrounds the core glass, light can be
trapped in the fiber core. This process is called total internal
reflection, and it allows the optical fiber to act like a light pipe,
guiding light for long distances, even around bends. Fiber-optic
cable is the most expensive of the three types discussed in this lesson, but it supports higher
rate line speeds. Fiber-optic cable does not carry electrical impulses as copper wire does.
Instead, signals that represent bits are converted into pulses of light. Two types of fiber-optic
cable exist:
Single-mode—Single-mode fiber-optic cable allows only one mode (or wavelength)
of light to propagate through the fiber. This type of cable is capable of higher band-
width and greater distances than multimode and is often used for campus backbones.
Single-mode cable uses lasers as the light-generating method and is more expensive
than multimode cable. The maximum cable length of single-mode cable is 60+ km
(37+ miles).
Multimode—Multimode fiber-optic cable allows multiple modes of light to
propagate through the fiber. Multimode cable is often used for workgroup
applications, using light emitting diodes (LEDs) as light-generating devices. The
maximum length of multimode cable is 2 km (1.2 miles).
The characteristics of the different media have a significant impact on the speed of data
transfer. Although fiber-optic cable is more expensive, it is not susceptible to EMI and is
capable of higher data rates than any of the other types of networking media discussed here.
Fiber-optic cable is also more secure because it does not emit electrical signals that could be
received by external devices.
Wireless Communications
Wireless networks are becoming increasingly popular, and they utilize a different type of
technology. Wireless communication uses radio frequencies (RFs) or infrared waves to
transmit data between devices on a LAN. For wireless LANs, a key component is the
wireless hub, or access point, used for signal
distribution. To receive the signals from the
access point, a PC or laptop needs to install a
wireless adapter card, or wireless network
interface card (NIC). Figure shows a number of
wireless access points connected to an Ethernet
backbone to provide access to the Internet.
24
Wireless signals are electromagnetic waves that can travel through the vacuum of outer space
and through a medium such as air. No physical medium is necessary for wireless signals,
making them a versatile way to build a network. They use portions of the RF spectrum to
transmit voice, video, and data. Wireless frequencies range from 3 kHz to 300 GHz. The
data-transmission rates range from 9 kbps to 54 Mbps. Figure 4-6 shows the electromagnetic
spectrum chart.
Electromagnetic Spectrum
Another common application of wireless data communication is the wireless LAN (WLAN),
which is built in accordance with Institute of Electrical and Electronic Engineers (IEEE)
802.11 standards. WLANs typically use radio waves (for example, 902 MHz), microwaves
(for example, 2.4 GHz), and infrared (IR) waves (for example, 820 nm) for communication.
Wireless technologies are a crucial part of the future of networking.
25
Switch
A network switch is a computer networking device that connects network segments. The term
commonly refers to a network bridge that processes and routes data at the data link layer
(layer 2) of the OSI model. Switches that additionally process data at the network layer (layer
3 and above) are often referred to as Layer 3 switches or multilayer switches.
The term network switch does not generally encompass unintelligent or passive network
devices such as hubs and repeaters. The network switch, packet switch (or just switch) plays
an integral part in most Ethernet local area networks or LANs. Mid-to-large sized LANs
contain a number of linked managed switches. Small office/home office (SOHO) applications
typically use a single switch, or an all-purpose converged device such as gateway access to
small office/home broadband services such as DSL router or cable Wi-Fi router. In switches,
intended for commercial use, built-in or modular interfaces make it possible to connect
different types of networks, including Ethernet, Fiber Channel, ATM, ITU-T G.hn and
802.11. This connectivity can be at any of the layers mentioned. While Layer 2 functionality
is adequate for speed-shifting within one technology, interconnecting technologies such as
Ethernet and token ring are easier at Layer 3. In other cases, the switch is used to create a
mirror image of data that can go to an external device. Since most switch port mirroring
provides only one mirrored stream, network hubs can be useful for fanning out data to several
read-only analyzers, such as intrusion detection systems and packet sniffers.
This was how the internal data circulation occurred within a site but when we need to go for
the inter site communication that too when they are far from each other then the need for
router becomes essential as with the help of its VPN (virtual private network) we could easily
do that and that too efficiently but too make it more economical its always preferred to go for
some service provider.
Routers
Routers are used to tie multiple networks together. For example, you would use a router to
connect your networked computers to the Internet and thereby share an Internet connection
among many users. The router will act as a dispatcher, choosing the best route for your
information to travel so that you receive it quickly.
Routers analyze the data being sent over a network, change how it is packaged and send it to
another network or over a different type of network. They connect your business to the
outside world, protect your information from security threats, and can even decide which
computers get priority over others.
26
Depending on your business and your networking plans, you can choose from routers that
include different capabilities. These can include functions such as:
o Firewall: specialized software that examines incoming data and protects your
business network against attacks
o Virtual Private Network (VPN): A way to allow remote employees to safely access
your network remotely
o IP Phone network : Combine your company's computer and telephone network
using voice and conferencing technology, to simplify and unify your
communications
Now this was the way we made network and connected it with other networks so that our
motto of interconnection between different sites was achieved and there was proper flow of
the data going on as far that organization was concerned now this was not where all ended as
network management was also to be done which include:
27
IP ADDRESSING
One of the most important topics in any discussion of TCP/IP is IP addressing. An IP address
is a numeric identifier assigned to each machine on an IP network. It designates the specific
location of a device on the network. An IP address is a software address, not a hardware
address—the latter is hard-coded on a network interface card (NIC) and used for finding
hosts on a local network. IP addressing was designed to allow hosts on one network to
communicate with a host on a different network regardless of the type of LANs the hosts are
participating in.
IP Terminology
Bit
Byte
Octet
Network address
This is the designation used in routing to send packets to a remote network—for example,
10.0.0.0, 172.16.0.0, and 192.168.10.0.
Broadcast address
The address used by applications and hosts to send information to all nodes on a network is
called the broadcast address. Examples include 255.255.255.255, which is all networks, all
nodes; 172.16.255.255, which is all subnets and hosts on network 172.16.0.0; and
10.255.255.255, which broadcasts to all subnets and hosts on network 10.0.0.0.
An IP address consists of 32 bits of information. These bits are divided into four sections,
referred to as octets or bytes, each containing 1 byte (8 bits). IP address can be written using
one of three methods:
-Dotted-decimal, as in 172.16.30.56
-Binary, as in 10101100.00010000.00011110.00111000
-Hexadecimal, as in AC.10.1E.38
28
Network Addressing
The network address uniquely identifies each network. Every machine on the same network
shares that network address as part of its IP address. In the IP address 172.16.30.56, for
example, 172.16 is the network address. The node address is assigned to, and uniquely
identifies, each machine on a network. This part of the address must be unique because it
identifies a particular machine—an individual—as opposed to a network, which is a group.
This number can also be referred to as a host address.
In the sample IP address 172.16.30.56, the 30.56 is the node address. The designers of the
Internet decided to create classes of networks based on network size. For the small number of
networks possessing a very large number of nodes, they created the rank Class A network. At
the other extreme is the Class C network, which is reserved for the numerous networks with a
small number of nodes. The class distinction for networks between very large and very small
is predictably called the Class B network. Subdividing an IP address into a network and node
address is determined by the class designation of one’s network.
Class D: Multicast
Class E: Research
The designers of the IP address scheme said that the first bit of the first byte in a Class A
network address must always be off, or 0. This means a Class A address must be between 0
and 127 in the first byte, inclusive.
29
Network Address Range: Class B
In a Class B network, the RFCs state that the first bit of the first byte must always be turned
on but the second bit must always be turned off. If you turn the other 6 bits all off and then all
on, you will find the range for a Class B network:
10000000 = 128
10111111 = 191
So, a Class B network is defined when the first byte is configured from 128 to 191.
For Class C networks, the RFCs define the first 2 bits of the first octet as always turned on,
but the third bit can never be on. Following the same process as the previous classes, convert
from binary to decimal to find the range. Here’s the range for a Class C network:
11000000 = 192
11011111 = 223
So, an IP address that starts at 192 and goes to 223, it is a Class C IP address.
The addresses from 224 to 255 are reserved for Class D and E networks. Class D (224–239)
is used for multicast addresses and Class E (240–255) for scientific purposes.
Reserved IP Addresses
Address Function
Network address of all
0s Interpreted to mean “this network or segment.”
30
Class A Addresses
In a Class A network address, the first byte is assigned to the network address and the three
remaining bytes are used for the node addresses. The Class A format is as follows:
network.node.node.node
For example, in the IP address 49.22.102.70, the 49 is the network address and 22.102.70 is
the node address. Every machine on this particular network would have the distinctive
network address of 49.
Class A network addresses are 1 byte long, with the first bit of that byte reserved and the 7
remaining bits available for manipulation (addressing). As a result, the maximum number of
Class A networks that can be created are 128. Why? Because the remaining seven bits can be
either a 0 or a 1, thus 27, or 128.
The network address of all 0s (0000 0000) is reserved to designate the default route.
Additionally, the address 127, which is reserved for diagnostics, can’t be used either, which
means that only the numbers 1 to 126 can be used to designate Class A network addresses.
This means the actual number of usable Class A network addresses is 128 minus 2, or 126.
The IP address 127.0.0.1 is used to test the IP stack on an individual node and cannot be used
as a valid host address. Each Class A address has 3 bytes (24-bit positions) for the node
address of a machine. This means there are 2 24—or 16,777,216—unique combinations and,
therefore, precisely that many possible unique node addresses for each Class A network.
Because node addresses with the two patterns of all 0s and all 1s are reserved, the actual
maximum usable number of nodes for a Class A network is 2 24 minus 2, which equals
16,777,214.
Here’s an example of how to figure out the valid host IDs in a Class A network address:
The valid hosts are the numbers in between the network address and the broadcast address:
10.0.0.1 through 10.255.255.254.
Class B Addresses
In a Class B network address, the first 2 bytes are assigned to the network address and the
remaining 2 bytes are used for node addresses. The format is as follows:
network.network.node.node
For example, in the IP address 172.16.30.56, the network address is 172.16 and the node
address is 30.56.
31
With a network address being 2 bytes (8 bits each), there would be 216 unique combinations.
But the Internet designers decided that all Class B network addresses should start with the
binary digit 1, then 0. This leaves 14 bit positions to manipulate, therefore 16,384 (that is,
214) unique Class B network addresses.
A Class B address uses 2 bytes for node addresses. This is 2 16 minus the two reserved
patterns (all 0s and all 1s), for a total of 65,534 possible node addresses for each Class B
network.
The valid hosts would be the numbers in between the network address and the broadcast
address: 172.16.0.1 through 172.16.255.254.
Class C Addresses
The first 3 bytes of a Class C network address are dedicated to the network portion of the
address, with only 1 measly byte remaining for the node address. Here’s the format:
network.network.network.node
Using the example IP address 192.168.100.102, the network address is 192.168.100 and the
node address is 102.
In a Class C network address, the first three bit positions are always the binary 110. The
calculation is as follows: 3 bytes, or 24 bits, minus 3 reserved positions leaves 21 positions.
Hence, there are 221, or 2,097,152, possible Class C networks.
Each unique Class C network has 1 byte to use for node addresses. This leads to 2 8 or 256,
minus the two reserved patterns of all 0s and all 1s, for a total of 254 node addresses for each
Class C network.
The valid hosts would be the numbers in between the network address and the broadcast
address: 192.168.100.1 through 192.168.100.254.
32
SUBNETTING
CHOOSING A CLASS
SUNBET MASK = DEFINES NETWORK ID AND HOST ID. AND ALSO CLASS.
EX.
IP ADD.= 192.168.100.20
MEANS IST, 2nd and 3rd octets are net id and last octet is host id.
CLASS A = 255.0.0.0
CLASS B = 255.255.0.0
CLASS C = 255.255.255.0
For the subnet address scheme to work, every machine on the network must know which part
of the host address will be used as the subnet address. This is accomplished by assigning a
subnet mask to each machine. A subnet mask is a 32-bit value that allows the recipient of IP
packets to distinguish the network ID portion of the IP address from the host ID portion of
the IP address. The network administrator creates a 32-bit subnet mask composed of 1s and
0s. The 1s in the subnet mask represent the positions that refer to the network or subnet
addresses. Not all networks need subnets, meaning they use the default subnet mask. This is
basically the same as saying that a network doesn’t have a subnet address. Table 3.1 shows
the default subnet masks for Classes A, B, and C. These default masks cannot change. In
other words, you can’t make a Class B subnet mask read 255.0.0.0. If you try, the host will
read that address as invalid and usually won’t even let you type it in.
For a Class A network, you can’t change the first byte in a subnet mask; it must read
255.0.0.0 at a minimum. Similarly, you cannot assign 255.255.255.255, as this is all 1s—a
broadcast address. A Class B address must start with 255.255.0.0, and a Class C has to start
with 255.255.255.0.
33
Default Subnet
Class Format Mask
A network.node.node.node 255.0.0.0
B network.network.node.node 255.255.0.0
C network.network.network.node 255.255.255.0
INVALID IP ADDRESSES:-
169.254.0.1 - 169.254.255.254
127.0.0.1 - 127.255.255.254
MEDIA COMPARISION
Different types of medium are used for communication purpose. The characteristics of each
medium are given below:
34
Variable Length Subnet Masks (VLSMs)
To take one network and create many networks using sub-net masks of different lengths on
different types of network designs is called VLSM networking.
Suppose, you have just been hired by a new company and need to add on to the existing
network. There is no problem with starting over with a new IP address scheme. Should you
use a VLSM classless network or a classful network?
Let’s just say you happen to have plenty of address space because you are using the Class A
10.0.0.0 private network address in your corporate environment and can’t even come close to
imagining that you’d ever run out of IP addresses. Why would you want to bother with the
VLSM design process?
Because by creating contiguous blocks of addresses to specific areas of your network, you
can then easily summarize your network and keep route updates with a routing protocol to a
minimum. Why would anyone want to advertise hundreds of networks between buildings
when you can just send one summary route between buildings and achieve the same result?
Summarization, also called Supernetting, provides route updates in the most efficient way
possible by advertising many routes in one advertisement instead of individually.
35
TCP/IP SERVICES
TCP/IP
TCP/IP is not a single protocol. It is a suite of protocols. A group of many protocols refers to
as TCP/IP.
TCP : -
It is used to transport data from one PC to another.
IP : -
It helps in transporting data through an internetwork,i.e.,from one network to another.
DNS : -
It is used to translate computer names into ip addresses.
DHCP : -
It is used to assign ip addresses to computers automatically.
HTTP : -
It is used to access websites from the Web Server on the client PC.
Telnet : -
It is used to access a remote computer and to do administrative tasks on it using a
commandline interface.
36
INTRODUCTION TO ROUTER
The Network layer (also called layer 3) manages device addressing, tracks the location of
devices on the network, and determines the best way to move data, which means that the
Network layer must transport traffic between devices that aren’t locally attached. Routers
(layer 3 devices) are specified at the Network layer and provide the routing services within an
internetwork. It happens like this: First, when a packet is received on a router interface, the
destination IP address is checked. If the packet isn’t destined for that particular router, it will
look up the destination network address in the routing table. Once the router chooses an exit
interface, the packet will be sent to that interface to be framed and sent out on the local
network. If the router can’t find an entry for the packet’s destination network in the routing
table, the router drops the packet. Two types of packets are used at the Network layer: data
and route updates.
Data packets Used to transport user data through the internetwork. Protocols used to support
data traffic are called routed protocols; examples of routed protocols are IP and IPv6.
Route update packets Used to update neighboring routers about the networks connected to
all routers within the internetwork. Protocols that send route update packets are called routing
protocols; examples of some common ones are RIP, RIPv2, EIGRP, and OSPF. Route update
packets are used to help build and maintain routing tables on each router.
3.2
37
Interface The exit interface a packet will take when destined for a specific network.
Metric It is the distance to the remote network. Different routing protocols use different ways
of computing this distance
Routers break up broadcast domains, which mean that by default, broadcasts aren’t
forwarded. Routers also break up collision domains, but you can also do that using layer 2
(Data Link layer) switches. Because each interface in a router represents a separate network,
it must be assigned unique network identification numbers, and each host on the network
connected to that router must use the same network number.
A router in an internetwork
o Routers use the logical address in a Network layer header to determine the next hop
router to forward the packet to.
o Routers can use access lists, created by an administrator, to control security on the types
of packets that are allowed to enter or exit an interface.
o Routers can provide layer 2 bridging functions if needed and can simultaneously route
through the same interface.
The term routing is used for taking a packet from one device and sending it through the
network to another device on a different network. Routers don’t really care about hosts—
they only care about networks and the best path to each network. The logical network address
of the destination host is used to get packets to a network through a routed network, and then
the hardware address of the host is used to deliver the packet from a router to the correct
destination host.
38
TYPES OF ROUTER MEMORY
ROM:-
Rom:- Read Only Memory – Bootstrap/POST
Maintains instructions for power-on self test (POST) diagnostics
Stores bootstrap program and basic operating system software
Mini IOS
EEPROM 1:-
Is a type of electronically erasable, programmable ROM.
Holds the operating system image (IOS)
Allows software to be updated without removing and replacing chips on the
processor
Retains content when router is powered down or restarted
Can store multiple versions of IOS software
NVRAM :-
Provides storage for the startup configuration file
Retains content when router is powered down or restarted Configuration Register
– 16 bit register which decides boot sequence
RAM:-
Random Access Memory, also called dynamic RAM (DRAM)
Stores routing tables
Holds ARP cache
Performs packet buffering (shared RAM)
Provides temporary memory for the configuration file of the router while the router
is powered on
Loses content when router is powered down or restarted
39
MODES OF ROUTER
MODES FUNCTION
USER By default user is in this mode.
It is denoted as Router >.
MODES FUNCTION
ROUTER It is denoted as
Router (config-router)#
LINE It is denoted as
Router(config-line) #
INTERFACE It is denoted as
Router(config-if) #
BASIC COMMANDS
40
PRIVILEGE MODE COMMANDS
41
ROUTING AND ROUTING PROTOCOLS
TYPES OF ROUTING
TYPES OF
ROUTING
STATIC ROUTING
Static routing is the simplest form of routing, but it is a manual process and does not work
well when the routing information has to be changed frequently or needs to be configured on
a large number of routing devices (routers).
DEFAULT ROUTING
Default routing is used to send packets with a remote destination network not in the routing
table to the next-hop router.
DYNAMIC ROUTING
Dynamic routing protocols are software applications that dynamically discover network
destinations and how to get to them.
IGP - Interior Gateway Protocol. The name used to describe the fact that each system
on the internet can choose its own routing protocol. RIP and OSPF are interior
gateway protocols.
EGP - Exterior Gateway Protocol. Used between routers of different systems. There
are two of these, the first having the same name as this protocol description:
42
TYPES OF DYNAMIC ROUTING PROTOCOLS
RIP
IGRP
EIGRP
BGP
IS-IS
OSPF
RIP is a true distance-vector routing protocol. RIP sends the complete routing table out to all
active interfaces every 30 seconds. RIP uses hop count to determine the best path to a remote
network, but it has a maximum allowable hop count of 15, by default meaning that 16 is
deemed unreachable. RIP works well in a small network, but it’s inefficient on large
networks with slow WAN links or on networks with a large number of routers installed.
There are two versions of RIP namely RIPv1 and RIPv2. RIPv1 sends classful updates and it
sends update on broadcast address 255.255.255.255 whereas RIPv2 can send classless
updates also and it uses multicast address 224.0.0.9 to update.
RIP Timers
(a) Update Timer: It is the time interval between the updates exchange by the
router to the neighbor routes. It is by default set to 30 sec.
43
(b) Hold Down Timer: It is the time interval which is used to keep the
network as active when it is not receiving information about network.
By default the hold down timer is 180 seconds.
(c) Invalid Timer: It is the time duration after which router will declare
network as down or invalid. It declares the router down or invalid after
180 seconds from the time hello packet was received.
(d) Flush Timer: It is a timer which is used to flush the entry i.e. delete the
entry of invalid network from routing table. By default it is 240
seconds.
Drawbacks of RIP
OSPF (RFC 1257) is a link state protocol rather than a distance vector protocol. It tests the
status of its link to each of its neighbors and sends the acquired information to them. It
stabilizes after a route or link failure faster than a distance vector protocol based system.
OSPF uses IP directly, not relying on TCP or UDP. OSPF can:
Have routes based on IP type of service (part of IP header message) such as FTP or
Telnet.
Support subnets.
Assign cost to each interface based on reliability, round trip time, etc.
Distribute traffic evenly over equal cost routes.
Uses multicasting.
Costs for specific hops can be set by administrators. Adjacent routers swap
information instead of broadcasting to all routers.
This is the open standard routing protocol i.e. any vendor can use this. Suppose if there are
different vendor’s router and a very large network is to be employed then only OSPF is the
solution. OSPF works by using Dijkstra algorithm also known as shortest path first (SPF)
algorithm. OSPF converges very quickly, although not as quickly as EIGRP and it supports
equal cost routes to the destination. It has unlimited hop count. It is a link state routing
protocol.
44
Packet Types
1) Hello packet: This packet provides dynamic neighbor discovery and maintain neighbor
relationships. Hello packets are addressed to 224.0.0.5
3) DBD: DBD is database descriptor packet. It sends a list of router IDs from whom the
router has an LSA and the current sequence number. This information is used to compare
information about the network.
4) LSR: Link State Request follows DBD to ask for any missing LSAs.
5) LSU: Link State Update replies to a link state request with the requested data.
Neighborship
Following are the steps which are passed through the formation of neighbors:
1) Blocked: Initially all routers are in blocked state and in this state no information has been
received from the neighbor.
2) Init: This state indicates that the router has received a hello packet from its neighbor, but
the receiving router’s ID was not included in the hello packet.
3) 2-Way: This state indicates that bi-drectional communication has been established
between two routers. In this DR/BDR election takes place.
DR/BDR
In OSPF, in any broadcast link, DR/BDR is elected. DR is known as designated router and
BDR is backup designated router. In this protocol all the updates are transferred to DR/BDR
in a broadcast link and DR will forward the update to everyone in broadcast link. This
decreases the update flooding when there is no DR/BDR routers. When a DR router goes
down then BDR takes its place and becomes DR and new BDR is elected. BDR always listen
and keeps an eye on DR.
The router which starts first with OSPF enabled will become DR and the second will become
BDR. This is by default. If in some case all routers start simultaneously then the router with
highest router priority will become the DR. if priority is same, which is same by default, then
the router with highest router ID will become DR and second highest will become the BDR.
DR/BDR election is on interface basis. Updates to DR/BDR are transmitted on multicast
address 224.0.0.5 and DR sends the reply on 224.0.0.6
Exstart State: In this state the master/slave are selected which is temporary only. Master/slave
are made for proper communication to establish between routers.
45
Exchange State: In this state the DBD packets are exchanged. First the master sends its dat to
slave and slave acknowledges and after that slave transmits and master acknowledges.
Loading State: In this state, the actual exchange of link state information occurs. Also
when there is something new in the network the update takes place at this stage only i.e.
loading takes place.
Full state: In this state, routers are fully adjacent with each other i.e. neighborship has been
established. All the network LSAs are exchanged and the router databases are fully
synchronized.
Router ID
Router ID is the unique name of router. It is like IP address only i.e. 32 bit. There are two
ways of providing router a router ID viz manually and automatically.
Manually: Providing router the router ID manually, is given by a command which is given
under OSPF process as follows:
Router(config)#router OSPF <process no.>
Router(config-router)#router id <ID as A.B.C.D>
Automatically: If manually router ID is not given then router itself assigns the ID. First it
checks the loopbacks. If loopbacks are there then highest loopback address is assigned to the
router as router ID. If loopbacks are not present then it checks the active interface and assigns
the highest IP as router ID. If there are no active interfaces and loopbacks then OSPF process
won’t run.
OSPF Areas
If there are huge number of routers in a network then in OSPF they can be grouped to a
particular area. In OSPF each router has full map of a network. So larger the network, larger
the map will be and more the processing each router will take. Now that large network can be
divided into smaller areas in which every router now keeps the map of those router present in
its area.
To communicate between different areas there must be area ‘0’ in between them which is
known as backbone area. The routers which connects two areas are known as ABR (area
border router). The router which connects different autonomous systems is known ASBR
(autonomous system border router). Area is formed on the interface basis.
OSPF Tables
a) Adjancy Table: In this table the list of all the neighbor routers with their router ID is
present with whom the adjancy has been established.
b) Database Table: In this table whole topology table is present i.e. the routers which are
present in a network are stored in this table.
46
c) Forwarding Table: This table is also known as routing table. In this all the best path to
routers are stored so that whenever packet comes to a router, the router sees the routing
table and forward the packet immediately.
Wild card bits or wild card mask is derived from subnet mask by subtracting subnet mask
from 255.255.255.255 e.g. if a subnet mask is 255.255.255.240 then the wild card bit will be
0.0.0.15
Described by RFC 1267, 1268, and 1497. It uses TCP as a transport protocol. When two
systems are using BGP, they establish a TCP connection, then send each other their BGP
routing tables. BGP uses distance vectoring. It detects failures by sending periodic keep alive
messages to its neighbours every 30 seconds. It exchanges information about reachable
networks with other BGP systems including the full path of systems that are between them.
47
EIGRP has five packet types as:
a) Hello Packet: Hello packet establishes the neighborship and maintains the neighborship.
b) Update Packet: Update packets are used to exchange information about network.
c) Query Packets: These packets are used to send the request to neighbor about network.
e) Ack Packet: These packets are used to send the acknowledgement for update, query, and
reply packet.
1) Neighbor Table: It keeps the list of its neighbors in the neighbor table. This table also
contains the neighbors IP address, Interface, SRTT (smooth round trip time), RTO
(retransmission time out) timer, and it also contains the uptime of a neighborship. It only
trusts the routes coming from a neighbor. If the router who’s entry is not listed in
neighbor table, EIGRP will not accept its update.
2) Topology Table: All the routes which are learnt by an EIGRP router are kept in topology
table. It contains the backup routes to a destination.
3) Routing Table: It contains the list of best paths for a destination. Only this is the table
which is used by router to forward packet for destination. From here the route is taken
and the packet is forwarded.
EIGRP metric is Bandwidth, Load, Delay, MTU (maximum transfer unit), and Reliability. By
default bandwidth and delay are used.
48
ACL (Access Control List)
Access control list is used to provide the packet filtering function in the network. ACL is
used to permit or deny the unwanted packets or they can be used to control that which
network will or will not be advertised by dynamic routing protocol.
The packet is always compared with each line of the access list in sequential order.
The packet is compared with lines of the access list only until a match is made. Once the
packet matches the condition on a line of the access list, the packet is acted upon and no
further comparison takes place.
There is an implicit “deny” at the end of each access list i.e. if a packet doesn’t match the
condition on any of the lines in the access list, the packet will be discarded.
Standard IP access list filter network traffic by examining the source IP address in a packet.
Standard access lists are created by using the access list numbers 1 to 99 or 1300 to 1999.
Access list types are generally differentiated using a number. Based on the number used
when the access list is created, the router knows which type of syntax to expect as the list is
entered.
The access list is first created and applied on the interface as shown below:
49
Extended Access List
Extended access list checks source IP, destination IP, and protocol like TCP, UDP, IP etc. On
the basis of all these things the packet is either permit or deny as per the list created.
Extended access list range is 100 to 199 or 2000 to 2699.
For best results standard access list should be applied near the destination and extended
access list should be applied near the source.
The configuration of extended access list is as:
50
Network Address Translation/ Port Address Translation (NAT/PAT)
In computer networking, network address translation (NAT) is the process of
modifying network address information in datagram (IP) packet headers while in transit
across a traffic routing device for the purpose of remapping one IP address space into
another.
As described, the method enables communication through the router only when the
conversation originates in the masqueraded network, since this establishes the translation
tables. For example, a web browser in the masqueraded network can browse a website
outside, but a web browser outside could not browse a web site in the masqueraded network.
However, most NAT devices today allow the network administrator to configure translation
table entries for permanent use. This feature is often referred to as "static NAT" or port
forwarding and allows traffic originating in the "outside" network to reach designated hosts
in the masqueraded network.
In the mid-1990s NAT became a popular tool for alleviating the problem of IPv4 address
exhaustion. It has become a standard, indispensable feature in routers for home and small-
office Internet connections.
NAT obscures an internal network's structure: all traffic appears to outside parties as if it
originated from the gateway machine.
51
There are two levels of network address translation.
Basic NAT. This involves IP address translation only, not port mapping.
PAT (Port Address Translation). Also called simply "NAT" or "Network Address
Port Translation, NAPT". This involves the translation of both IP addresses and port
numbers.
All Internet packets have a source IP address and a destination IP address. Both or either of
the source and destination addresses may be translated.
Some Internet packets do not have port numbers: for example, ICMP packets. However, the
vast bulk of Internet traffic is TCP and UDP packets, which do have port numbers. Packets
which do have port numbers have both a source port number and a destination port number.
Both or either of the source and destination ports may be translated.
NAT which involves translation of the source IP address and/or source port is called source
NAT or SNAT. This re-writes the IP address and/or port number of the computer which
originated the packet.
NAT which involves translation of the destination IP address and/or destination port number
is called destination NAT or DNAT. This re-writes the IP address and/or port number
corresponding to the destination computer.
52
(Address) restricted cone NAT
53
all requests from the same host to
different destinations.
Only an external host that
receives a packet from an internal
host can send a packet back.
"Pure NAT", operating on IP alone, may or may not correctly parse protocols that are totally
concerned with IP information, such as ICMP, depending on whether the payload is
interpreted by a host on the "inside" or "outside" of translation. As soon as the protocol stack
is climbed, even with such basic protocols as TCP and UDP, the protocols will break unless
NAT takes action beyond the network layer.
The major transport layer protocols, TCP and UDP, have a checksum that covers all the data
they carry, as well as the TCP/UDP header, plus a "pseudo-header" that contains the source
and destination IP addresses of the packet carrying the TCP/UDP header. For an originating
NAT to successfully pass TCP or UDP, it must recompute the TCP/UDP header checksum
based on the translated IP addresses, not the original ones, and put that checksum into the
TCP/UDP header of the first packet of the fragmented set of packets. The receiving NAT
must recompute the IP checksum on every packet it passes to the destination host, and also
recognize and recompute the TCP/UDP header using the retranslated addresses and pseudo-
header. This is not a completely solved problem. One solution is for the receiving NAT to
reassemble the entire segment and then recompute a checksum calculated across all packets.
STATIC NAT
Static NAT is a simple one-to-one mapping of private and public addresses. This is required
to support inbound connections from your public network into your private network. For each
local address defined, there has to be an associated globally unique address.
54
Dynamic NAT
Dynamic NAT can only be used to establish connections from within the private network out
to the public network. A pool of network addresses is maintained and used when an outbound
connection is made. Each connection is assigned a unique public address. The maximum
number of simultaneous connections is equal to the number of public addresses in the pool.
This is similar to a one-to-one correspondence between addresses. Dynamic NAT allows you
to communicate with the Internet through a dynamic NAT address. The figure below
illustrates Dynamic NAT.
55
DRAWBACKS
End-to-end connectivity has been a core principle of the Internet, supported for example by
the Internet Architecture Board. Current Internet architectural documents observe that NAT is
a violation of the End-to-End Principle, but that NAT does have a valid role in careful design.
56
There is considerably more concern with the use of IPv6 NAT, and many IPv6 architects
believe IPv6 was intended to remove the need for NAT.
Because of the short-lived nature of the stateful translation tables in NAT routers, devices on
the internal network lose IP connectivity typically within a very short period of time unless
they implement NAT keep-alive mechanisms by frequently accessing outside hosts. This
dramatically shortens the power reserves on battery-operated hand-held devices and has
thwarted more widespread deployment of such IP-native Internet-enabled devices.
BENFITS
The primary benefit of IP-masquerading NAT is that it has been a practical solution to the
impending exhaustion of IPv4 address space. Even large networks can be connected to the
Internet with as little as a single IP address. The more common arrangement is having
machines that require end-to-end connectivity supplied with a routable IP address, while
having machines that do not provide services to outside users behind NAT with only a few IP
addresses used to enable Internet access.
Some have also called this exact benefit a major drawback, since it delays the need for the
implementation of IPv6
57
SWITCHING BASICS
A network interface card, network adapter, network interface controller (NIC), or LAN adap-
ter is a computer hardware component designed to allow computers to communicate over a
computer network. It is both an OSI layer 1 (physical layer) and layer 2 (data link layer)
device, as it provides physical access to a networking medium and provides a low-level
addressing system through the use of MAC addresses.
Address learning Layer 2 switches and bridges remember the source hardware address of
each frame received on an interface, and they enter this information into a MAC database
called a forward/filter table.
Forward/filter decisions When a frame is received on an interface, the switch looks at the
destination hardware address and finds the exit interface in the MAC database. The frame is
only forwarded out the specified destination port.
Loop avoidance If multiple connections between switches are created for redundancy
purposes, network loops can occur. Spanning Tree Protocol (STP) is used to stop network
loops while still permitting redundancy.
Address Learning
When a switch is first powered on, the MAC forward/filter table is empty, as shown in figure.
58
Host A Host B Host C Host D
When a device transmits and an interface receives a frame, the switch places the frame’s
source address in the MAC forward/filter table, allowing it to remember which interface the
sending device is located on. The switch then has no choice but to flood the network with this
frame out of every port except the source port because it has no idea where the destination
device is actually located. If a device answers this flooded frame and sends a frame back,
then the switch will take the source address from that frame and place that MAC address in
its database as well, associating this address with the interface that received the frame. Since
the switch now has both of the relevant MAC addresses in its filtering table, the two devices
can now make a point-to-point connection. The switch doesn’t need to flood the frame as it
did the first time because now the frames can and will be forwarded only between the two
devices. This is exactly the thing that makes layer 2 switches better than hubs. In a hub
network, all frames are forwarded out all ports every time— no matter what. Following figure
shows the processes involved in building a MAC database.
E0/0: 0000.8c01.000A
E0/1: 0000.8c01.000B
E0/2:E0/3:
59
Host A sends a frame to Host B. Host A’s MAC address is 0000.8c01.000A;
Host B’s MAC address is 0000.8c01.000B.
The switch receives the frame on the E0/0 interface and places the source address in the
MAC address table. Since the destination address is not in the MAC database, the frame is
forwarded out all interfaces—except the source port. Host B receives the frame and responds
to Host A. The switch receives this frame on interface E0/1 and places the source hardware
address in the MAC database. Host A and Host B can now make a point-to-point connection
and only the two devices will receive the frames. Hosts C and D will not see the frames, nor
are their MAC addresses found in the database because they haven’t yet sent a frame to the
switch. If Host A and Host B don’t communicate to the switch again within a certain amount
of time, the switch will flush their entries from the database to keep it as current as possible.
Forward/Filter Decisions
When a frame arrives at a switch interface, the destination hardware address is compared to
the forward/filter MAC database. If the destination hardware address is known and listed in
the database, the frame is only sent out the correct exit interface. The switch doesn’t transmit
the frame out any interface except for the destination interface. This preserves bandwidth on
the other network segments and is called frame filtering. But if the destination hardware
address is not listed in the MAC database, then the frame is flooded out all active interfaces
except the interface the frame was received on. If a device answers the flooded frame, the
MAC database is updated with the device’s location (interface). If a host or server sends a
broadcast on the LAN, the switch will flood the frame out all active ports except the source
port by default. Remember, the switch creates smaller collision domains, but it’s still one
large broadcast domain by default.
Forward/filter table
Switch#sh mac address-table
1 0005.dccb.d74b Fa0/4
1 000a.f467.9e80 Fa0/5
1 000a.f467.9e8b Fa0/6
60
Since Host A’s MAC address is not in the forward/filter table, the switch will add the source
address and port to the MAC address table and then forward the frame to Host D. If Host D’s
MAC address was not in the forward/filter table, the switch would have flooded the frame out
all ports except for port Fa0/3.
DYNAMI
1 0005.dccb.d74b Fa0/1
C
DYNAMI
1 000a.f467.9e80 Fa0/3
C
DYNAMI
1 000a.f467.9e8b Fa0/4
C
DYNAMI
1 000a.f467.9e8c Fa0/3
C
1 0010.7b7f.c2b0 DYNAMI Fa0/3
C
DYNAMI
1 0030.80dc.460b Fa0/3
C
1 0030.9492.a5dd DYNAMI Fa0/1
C
DYNAMI
1 00d0.58ad.05f4 Fa0/1
C
Loop Avoidance
Redundant links between switches are a good idea because they help prevent complete
61
network failures in the event one link stops working. This is because frames can be flooded
down all redundant links simultaneously, creating network loops as well as other evils.
Here’s a list of some of the ugliest problems:
If no loop avoidance schemes are put in place, the switches will flood broadcasts endlessly
throughout the internetwork. This is sometimes referred to as a broadcast storm.
Broadcast storm
Spanning-Tree Operation
62
• Non-designated ports are unused
63
VLANS (Virtual LANs)
A VLAN permits a group of users to share a common broadcast domain regardless of their
physical location in the internetwork. VLAN improve performance and security in switched
networks.
A Catalyst switch operates in a network like a traditional bridge. Each VLAN configured on
the switch implements address learning, forwarding/filtering decisions, and loop avoidance
mechanisms.
Ports belonging to a VLAN are configured with a membership mode that determines to which
VLAN they belong. Catalyst switches support two VLAN membership modes: static and
dynamic.
The IEEE 802.1Q protocol is used to transport frames for multiple VLANs between switches
and routers, and for defining VLAN topologies.
64
WAN (Wide Area Network) and Protocols involved
Below figures shows the different WAN connection types that can be used to connect distant
devices.
Synchronous serial
When you’ve got plenty of cash, this is really the way to go because it uses synchronous
serial lines up to 45Mbps. HDLC and PPP encapsulations are frequently used on leased lines.
Circuit switching When you hear the term circuit switching, think phone call. The big
advantage is cost—you only pay for the time you actually use. No data can transfer before an
end-to-end connection is established. Circuit switching uses dial-up modems or ISDN and is
used for low-bandwidth data transfers.
Packet switching This is a WAN switching method that allows you to share bandwidth with
other companies to save money. Packet switching can be thought of as a network that’s
designed to look like a leased line yet charges you more like circuit switching. But less cost
isn’t always better—there’s definitely a downside: If you need to transfer data constantly, just
forget about this option. Instead, get yourself a leased line. Packet switching will only work
65
for you if your data transfers are the bursty type—not continuous. Frame Relay and X.25 are
packet-switching technologies with speeds that can range from 56Kbps up to T3 (45Mbps).
Frame Relay A packet-switched technology that made its debut in the early 1990s, Frame
Relay is a high-performance Data Link and Physical layer specification. It’s pretty much a
successor to X.25, except that much of the technology in X.25 used to compensate for
physical errors (noisy lines) has been eliminated. An upside to Frame Relay is that it can be
more cost effective than point-to-point links, plus it typically runs at speeds of 64Kbps up to
45Mbps (T3). Another Frame Relay benefit is that it provides features for dynamic
bandwidth allocation and congestion control.
HDLC High-Level Data-Link Control (HDLC) was derived from Synchronous Data Link
Control (SDLC), which was created by IBM as a Data Link connection protocol. HDLC
works at the Data Link layer and creates very little overhead compared to LAPB. It wasn’t
intended to encapsulate multiple Network layer protocols across the same link—the HDLC
header doesn’t contain any identification about the type of protocol being carried inside the
HDLC encapsulation. Because of this, each vendor that uses HDLC has its own way of
identifying the Network layer protocol, meaning each vendor’s HDLC is proprietary with
regard to its specific equipment.
PPP Point-to-Point Protocol (PPP) is a pretty famous, industry-standard protocol. Because all
multiprotocol versions of HDLC are proprietary, PPP can be used to create point-to-point
links between different vendors’ equipment. It uses a Network Control Protocol field in the
Data Link header to identify the Network layer protocol and allows authentication and multi-
link connections to be run over asynchronous and synchronous links.
66
IP Version-6
IPv4 exhaustion
Estimates of the time frame until complete exhaustion of IPv4 addresses varied widely. In
2003, Paul Wilson (director of APNIC) stated that, based on then-current rates of
deployment, the available space would last for one or two decades. In September 2005, a
report by Cisco Systems suggested that the pool of available addresses would dry up in as
little as 4 to 5 years. As of May 2009, a daily updated report projected that the IANA pool of
unallocated addresses would be exhausted in June 2011, with the various Regional Internet
Registries using up their allocations from IANA in March 2012. There is now consensus
among Regional Internet Registries that final milestones of the exhaustion process will be
passed in 2010 or 2011 at the latest, and a policy process has started for the end-game and
post-exhaustion era.
In most regards, IPv6 is a conservative extension of IPv4. Most transport- and application-
layer protocols need little or no change to operate over IPv6; exceptions are application
protocols that embed internet-layer addresses, such as FTP or NTPv3.
67
Larger address space
The most important feature of IPv6 is a much larger address space than that of IPv4:
addresses in IPv6 are 128 bits long, compared to 32-bit addresses in IPv4.
The very large IPv6 address space supports a total of 2 128 (about 3.4×1038) addresses—or
approximately 5×1028 (roughly 295) addresses for each of the roughly 6.8 billion (6.8×109)
people alive in 2010.
the longer addresses allow a better, systematic, hierarchical allocation of addresses and
efficient route aggregation. With IPv4, complex Classless Inter-Domain Routing (CIDR)
techniques were developed to make the best use of the small address space. Renumbering an
existing network for a new connectivity provider with different routing prefixes is a major
effort with IPv4. With IPv6, however, changing the prefix announced by a few routers can in
principle renumber an entire network since the host identifiers (the least-significant 64 bits of
an address) can be independently self-configured by a host.
The size of a subnet in IPv6 is 264 addresses (64-bit subnet mask), the square of the size of the
entire IPv4 Internet. Thus, actual address space utilization rates will likely be small in IPv6,
but network management and routing will be more efficient because of the inherent design
decisions of large subnet space and hierarchical route aggregation.
Now we will understand how IP addresses are structured and used. We have already read
about the fact that at 128 bits, an IPv6 address is much larger than an IPv4 address. Because
of this, as well as the new ways the addresses can be used, it is believed that IPv6 will be
more complicated to manage. But it is not true. Following is a figure which has a sample
IPv6 address broken down into sections.
68
Shortened Expression
There are few tricks to help rescue us when writing these long addresses. For one thing, we
can actually leave out parts of the address to abbreviate it, but to get away with doing that we
have to follow a couple of rules.
First, we can drop any leading zeros in each of the individual blocks. After we do that, the
sample address from earlier would then look like this:
2001:db8:3c4d:12:0:0:1234:56ab
Interface ID
2001:0db8:3c4d:0012:0000:0000:1234:56ab
Global prefix Subnet
Again referring to our sample address, we can remove the two blocks of zeros by replacing
them with double colons, like this:
2001:db8:3c4d:12:: 1234:56ab
We replaced the blocks of all zeros with double colons. So if the address has four blocks of
zeros and each of them were separated, we just don't get to replace them all; the rule is that
we can only replace one contiguous block with double colon.
For example:
2001:0000:0000:0012:0000:0000:1234:56ab
And we just can’t do this:
2001::12::1234:56ab
Address Types
We’re all familiar with IPv4’s unicast, broadcast, and multicast addresses that basically
define who or at least how many other devices we’re talking to. Broadcasts, as we know,
have been eliminated in IPv6 because of their cumbersome inefficiency.
So let’s find out what each of these types of IPv6 addressing and communication methods do
for us.
Unicast
Packets addressed to a unicast address are delivered to a single interface. For load balancing,
multiple interfaces can use the same address. There are a few different types of unicast
addresses, but we don’t need to get into that here.
These are your typical publicly routable addresses, and they’re the same as they are in IPv4.
69
Link-local addresses
These are like the private addresses in IPv4 in that they’re not meant to be routed. Think of
them as a handy tool that gives you the ability to throw a temporary LAN together for
meetings or for creating a small LAN that’s not going to be routed but still needs to share and
access files and services locally.
These addresses are also intended for non-routing purposes, but they are nearly globally
unique, so it’s unlikely you’ll ever have one of them overlap. Unique local addresses were
designed to replace site-local addresses, so they basically do almost exactly what IPv4 private
addresses do—allow communication throughout a site while being routable to multiple local
networks. Site-local addresses were denounced as of September 2004.
Multicast
Again, same as in IPv4, packets addressed to a multicast address are delivered to all
interfaces identified by the multicast address. Sometimes people call them one-to-many
addresses. It’s really easy to spot a multicast address in IPv6 because they always start with
FF.
Anycast
Like multicast addresses, an anycast address identifies multiple interfaces, but there’s a big
difference: the anycast packet is only delivered to one address—actually, to the first one it
finds defined in terms of routing distance. And again, this address is special because you can
apply a single address to more than one interface. You could call them one-to-one-of many
addresses, but just saying “anycast” is a lot easier.
Special Addresses
There are a plenty of special, reserved addresses in IPv6 they are there in IPv4. Let’s go over
them now.
They’re all special or reserved for specific use, but unlike IPv4, IPv6 gives us a galaxy of
addresses, so reserving a few here.
0:0:0:0:0:0:0:0
Equals ::. This is the equivalent of IPv4’s 0.0.0.0, and is typically the source address of a host
when you’re using stateful configuration.
0:0:0:0:0:0:0:1
70
0:0:0:0:0:0:192.168.100.1
This is how an IPv4 address would be written in a mixed IPv6/IPv4 network environment.
2000::/3
FC00::/7
FE80::/10
FF00::/8
3FFF:FFFF::/32
2001:0DB8::/32
2002::/16
Used with 6to4, which is the transition system—the structure that allows IPv6 packets to be
transmitted over an IPv4 network without the need to configure explicit tunnels.
71
Wi-Fi
Wi-Fi is the name for the popular wireless networking technology that uses radio waves to
provide wireless high-speed Internet and network connections. The Wi-Fi Alliance, the
organization that owns the Wi-Fi (registered trademark) term specifically defines Wi-Fi as
any "wireless local area network (WLAN) products that are based on the Institute of
Electrical and Electronics Engineers' (IEEE) 802.11 standards."
The inventors initially intended to use the technology for cashier systems; the first wireless
products were brought on the market under the name WaveLAN with raw data rates of 1
Mbit/s and 2 Mbit/s.
Below are some basic facts and pieces of information related to Wi-Fi which will help you
understand Wi-Fi much better and easier.
1. Wi-Fi is a wireless technology that lets digital devices such as PC’s, laptops,
mobile phones to connect and access internet through a router without any
physical association with the wired network(LAN).Interestingly,’Wireless
Fidelity’,as such does not mean anything.It was actually a branding strategy
by the governing Alliance to make their service a bit more catchy and “Hi-Fi”.
2. Wi-Fi hotspots are the access points through which wireless internet is
accessed. Restaurants, coffee-shops, food joints offer free hotspots within their
premises as a mode of attraction. More hotspots correspond to more coverage
and heavy usage support(higher bandwidth support).
3. To establish a Wi-Fi connectivity, the two primary conditions are Wireless
adapter at user’s end(within the laptop or PC) and a Wi-Fi router(externally
placed).Most of new laptops and desktop computers come with built-in
wireless adapter.
4. Wi-Fi networks are very limited in range. A typical Wi-Fi router might have a
range of 30 m(~100 ft) indoor and 90 m(295 ft) outdoor. Range also varies
with selected frequency band. Wi-Fi in the 2.4 GHz frequency band has
slightly better range than Wi-Fi in the 5 GHz frequency band.
5. Wi-Fi is much more prone to security abuse than wired LAN.As the level of
openness is quite high, Wi-Fi’s encryption methods face continuous failure in
front of easily available softwares such as Aircrack. This is the reason why
private Wi-Fi networks prefer employing ‘Whitelist IP Usage’ only.
72
Initially, Wi-Fi was used in place of only the 2.4GHz 802.11b standard, however the Wi-Fi
Alliance has expanded the generic use of the Wi-Fi term to include any type of network or
WLAN product based on any of the 802.11 standards, including 802.11b, 802.11a, dual-band,
and so on, in an attempt to stop confusion about wireless LAN interoperability.
Wi-Fi works with no physical wired connection between sender and receiver by using radio
frequency (RF) technology, a frequency within the electromagnetic spectrum associated with
radio wave propagation. When an RF current is supplied to an antenna, an electromagnetic
field is created that then is able to propagate through space. The cornerstone of any
wireless network is an access point (AP). The primary job of an access point is to broadcast a
wireless signal that computers can detect and "tune" into. In order to connect to an access
point and join a wireless network, computers and devices must be equipped with
wireless network adapters
73
Wireless Technology Standards
Because there are multiple technology standards for wireless networking, it pays to do your
homework before buying any equipment. The most common wireless technology
standards include the following:
802.11b: The first widely used wireless networking technology, known as 802.11b
(more commonly called Wi-Fi), first debuted almost a decade ago, but is still in use.
802.11g: In 2003, a follow-on version called 802.11g appeared offering greater
performance (that is, speed and range) and remains today's most common wireless
networking technology.
74
802.11n: Another improved standard called 802.11n is currently under development
and is scheduled to be complete in 2009. But even though the 802.11n standard has
yet to be finalized, you can still buy products based on the draft 802.11n standard,
which you will be able to upgrade later to the final standard.
All of the Wi-Fi variants (802.11b, g and n products) use the same 2.4 GHz radio frequency,
and as a result are designed to be compatible with each other, so you can usually use devices
based on the different standards within the same wireless network. The catch is that doing so
often requires special configuration to accommodate the earlier devices, which in turn can
reduce the overall performance of the network. In an ideal scenario you'll want all your
wireless devices, the access point and all wireless-capable computers, to be using the same
technology standard and to be from the same vendor whenever possible.
A General Misconception
A common misconception is that the term Wi-Fi is short for "wireless fidelity," however this
is not the case. Wi-Fi is simply a trademarked term meaning IEEE 802.11x
75
COMMANDS TO SET PASSWORDS ON A ROUTER
Router(config-line)#password daviet
Router(config-line)#login
Router(config)#line vty 0 4
Router(config-line)#password daviet
Sometimes the user forgets the password set by him on a router. To avoid such inconvenience
in the use of routers, below is given the method to break the password on a router.
As we know that, when a router boots up, it takes all of the previous data from its non-
volatile memory which flows in the following way:
76
This is due to the default registered value (i.e, 0x2102) being provided by Cisco to the router
while manufacturing it.
If we change this registered value from 0x2102 to 0x2142, then the router while booting up
will not demand any passwords being set up previously by the user because now it doesn’t
takes the data present in NVRAM.
Commands required:-
While booting up, Press Ctrl+ Pause Break- to switch from USER MODE to ROMMOM
MODE.
Rommon>confreg 0x2142
Rommon>reset
Router>enable
Router#configure terminal
Now,all the data from startup configuration has got copied in the running configuration.
Thus, now we can set up cancel all previous passwords and set up new passwords.
Now, we have to follow the same procedure to again change the registered value from
0x2142 to 0x2102 so that the router follows its previous method of booting up.
Thus, now we have canceled the previous passwords on the router and set up new ones
without knowing the previous passwords.
77
ROUTER CONFIGURATION
1 Configure routers
2 Access Routers through Telnet
3 Security
4 Wi-Fi
5 Switching database(vlan database)
6 Trunking
7 Firewall
8 Configuration of routers through Propriety protocol’s(eigrp vlsm)
78
CONFIGURE ROUTERS
To configure router first time through HyperTerminal using rollover cable Router
configuration process commands-:
3. This dialog then appears. Click the selection arrow on the "Connect using" list
box, and select the COM port your modem is connected to-not the modem
name. When you select the COM port, the phone number to dial boxes are grayed.
Click OK
79
4. The COM port properties box comes up. For 56k modems, make sure that you set
the Bits per second to 2400
The other defaults shown here are correct
Click OK
5. You now get the HyperTerminal window where you are able to control your modem
with commands.
80
FUTURE SCOPE
Here are some examples of the skills students will be able to perform after completing
CCNA course:
81
BIBLIOGRAPHY
Books:-
Sites:-
www.4shared.com
www.rapidshare.com
www.about.com
http://en.wikipedia.org/wiki/
82