0% found this document useful (0 votes)
24 views

Network Media and IOS (Internetwork Operating System) Basics Configurations

This document discusses different types of network cabling, including twisted pair, coaxial, and fiber optic cabling. It describes categories of twisted pair cabling from Category 1 to Category 6e and their associated data transmission speeds. Common types of twisted pair cabling are unshielded twisted pair (UTP) and shielded twisted pair (STP). UTP cabling has straight through, crossover, and rollover implementations. The document also discusses network segmentation, frame transmission, and the role of routers in transmitting packets between network segments.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

Network Media and IOS (Internetwork Operating System) Basics Configurations

This document discusses different types of network cabling, including twisted pair, coaxial, and fiber optic cabling. It describes categories of twisted pair cabling from Category 1 to Category 6e and their associated data transmission speeds. Common types of twisted pair cabling are unshielded twisted pair (UTP) and shielded twisted pair (STP). UTP cabling has straight through, crossover, and rollover implementations. The document also discusses network segmentation, frame transmission, and the role of routers in transmitting packets between network segments.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

LECTURE 3  Category 5—Can transmit data at speeds up to 100

Network Media and IOS (Internetwork Mbps.


Operating System) Basics Configurations  Category 5e —Used in networks running at speeds
up to 1000 Mbps (1 gigabit per second [Gbps]).
What is Network Cabling?  Category 6—Typically, Category 6 cable consists of
- referred to as communications cabling and the four pairs of 24 American Wire Gauge (AWG)
primary media through which data is copper wires. Category 6 cable is currently the
transferred. fastest standard for UTP
- This may be between computers, routers,  Category 1—Used for telephone communications.
switches and/or other network based devices. Not suitable for transmitting data.
- a major component in any LAN infrastructure.  Category 2—Capable
Types of Network Media of transmitting data at
1. twisted-pair cabling speeds up to 4 megabits
2. coaxial cabling per second (Mbps).
3. fiber-optic cabling  Category 3—Used in
4. wireless 10BASE-T networks.
Twisted-pair Cabling Can transmit data at
• A type of cabling in
which two conductors
of a single circuit are speeds up to 10 Mbps.
twisted together for the  Category 4—
purposes of improving Used in Token Ring
electromagnetic networks. Can transmit
compatibility. data at speeds up to 16
• Comprised of eight Mbps.
wires in total, these
eight wires are twisted into four pairs of two. The EIA/TIA standards
Each pair is twisted at different “twist rates” in The TIA/EIA structured cabling standards define
order to eliminate “crosstalk”. how to design, build, and manage a cabling system that
• Crosstalk occurs when signals traveling is structured. Standards use for Unshielded Twisted Pair
through adjacent pairs of wires interfere with wiring.
each other.
2 Types of twisted-pair cabling 3 types of UTP implementation
o U n s h i e l d e d t w i s t
1. Straight through - Used in local area networks
to connect a computer to a network hub such as
a router. Also called as patch cable.

www.ciscopre 2. Cross-over - connects two computers together


ss.com/utp
ability
www.ciscopress.com/s
tp
to
cancel
interference. Used for telephone wiring
o Shielded twisted pair (STP) - protect against signal
degradation. Use in Ethernet network installations

without using a switch (or two switches directly). It


is most often used to connect two devices of the
same type: e.g. two computers (via network interface
controller) or two switches to each other.

Commonly used types of UTP cabling 


3. Rollover Wired Cables - most commonly called  Even though light is an electromagnetic wave, light
rollover cables, have opposite Pin assignments on in fibers is not considered wireless because the
each end of the cable. Not intended to carry data but electromagnetic waves are guided in the optical
instead create an interface with the device. fiber.
 wireless is reserved for radiated, or unguided,
electromagnetic waves

3. Wireless Communications
 uses radio frequencies (RFs) or infrared waves to
transmit data between devices on a LAN
 Does not require installation of media but
susceptible to atmospheric conditions
Coaxial cabling
Coaxial (or coax) cable is a type of transmission Network Segmentation
line, used to carry high frequency electrical signals • Segmentation
with low losses. – The breaking down of a single heavily populated
 This type of cable has an inner conductor which network segment into smaller segments, or collision
is surrounded by a tubular insulating layer. The domains, populated by fewer nodes
tubular insulating layer is also surrounded by a • Segment
tubular conducting shield. – Part of a network that is divided logically or
 One advantage of coax is that the signal only physically from the rest of the network
exists in the space between the inner and outer • When network administrators place too many
conductors. nodes on the same network segment
o This allows coaxial cable runs to be installed – Causes the number of collisions to increase
next to metal objects such as gutters without
the power losses that occur in other types of
transmission lines. •

BNC Connector

Fiber-Optic cabling
 used to carry light from the transmitting
device to the receiver. Understanding Frame Transmission
 The fiber elements are usually individually • Each host on a segment evaluates the frame
coated with plastic layers and contained in a – To determine whether the listed destination MAC
protective shield. The type of shielding must address matches its own or is a broadcast to all hosts
be suitable for the environment where the • The host makes a copy of the frame and sends the
cable will be deployed. original along the network path
 Applications for fiber optic cabling range • On the destination host, frames are sent up the TCP/
widely, such; data centers, hospitals, banks IP stack
and many others. – Removing each layer header information
2 types of fiber-optic network cables • For a packet to be routed on a TCP/IP internetwork
1. Single mode fiber – uses only a single ray of – An IP address and MAC address are required for
light to carry data. both the source and destination hosts
Uses lasers Routers on the Network
2. Multi mode fiber – • A router requires:
uses multiple rays – An IP address for every network segment to which
of light to carry data it is connected
using LEDs – A separate network interface or port for each
network
NOTE: Segment
• Computers send frames to destinations that are not • When TCP/IP hosts transmit packets to remote
on their segment to the router (default gateway) segments
• The router must determine which subnet should – They contact their default gateway (usually a
receive the frame router)
– The router references its routing table, determine • The router checks its routing tables against the
which of its interfaces is connected to the destination destination IP address
network. – To locate the appropriate network interface through
which to forward the packet
• Router re-addresses the frame or sends the packet to
the next router in the path (indirect routing)
Routing Packets

Network to Network
Routers maintain routing tables that they use to
route packets from one network to another
• When a network uses TCP/IP, each port on a router Cisco Router User Interface
requires an IP address - Cisco Internetwork Operating System (IOS)
– Allows the router to correctly forward the packet to  Provides a command-line interface
the appropriate network segment (CLI)
• On a TCP/IP network, the logical addresses on a  Allows network operators to check the
certain segment must be matched status of the router and network
– If you move a computer from one segment to administrators to manage and configure
another, the IP address will have to be changed the router
Accessing the IOS:

- Console port (also known as the console)

- Auxiliary port (AUX)

- Virtual terminals (VTY) – telnet access

Dynamic or Static Tables - Trivial File Transfer Protocol (TFTP)


• Routing tables match network addresses with the server - SSH access (Secure Shell)
addresses of the routers that handle those networks
– The tables can be built statically or dynamically
• Dynamic updates are provided through routing
protocols
– A router capable of dynamic routing can choose
from among the various routes on a network
– The router communicates with other dynamic
routers
• To determine the most efficient route from one point
to another on the network
• Methods to determine the best path across a network
– The distance-vector algorithm
– The link-state algorithm
Transmitting Packets to Remote Segments
Console access – used to configure newly acquired
devices that usually don’t have an IP address
configured, and therefore can not be accessed
through the network. – This port can be connected to
a computer using a rollover cable, a special type of
cable with pins on one end reversed on the other end
of the cable.
Telnet access – used to be a common way to access
network devices. – terminal emulation program that
enables to access IOS through the network and
configure the device remotely.– uses a well known
TCP port 23
SSH access – enables you to configure devices
remotely, but it adds an extra layer of security by
encrypting all communications using public-key
cryptography. – uses well known TCP port 22

System Configuration Dialog

Setup - the setup command will cause the router to


enter the system configuration dialog

User Interface
• The initial prompt consists of two parts:
– The host name of the router followed by
the greater than symbol (>)  Typing exit will take you back one level
– Default: router> Example: router(config-router)#
When the prompt displayed is the greater than  Typing end or pressing the Ctrl+Z keys will take you
symbol all the way back to the enable prompt
User EXEC mode (or user mode) – Network Example: router(config-line)#
operator can check router status and review several  Often, you can discover abbreviated commands by
of the router settings simply trying them
 The question mark activates context-sensitive Help  The router will show you the point at which you
on the Cisco router entered an incorrect character
 User mode does not allow to configure the router
o To do this, go into the privileged EXEC
mode
 To enter privileged EXEC, type the enable command
at the user mode prompt
o Next, may be prompted for a password.
o Greater than symbol (>) changes to a pound
sign (#)
Command Error
Configuration Models
 Incomplete command – did not enter all the - to keep unauthorized individuals from viewing
keywords or values passwords in the configuration file.
 Ambiguous command – did not enter enough - used to set a password on vty lines
characters - If you execute the show running-config or show
 Incorrect / Unrecognized command – wrong startup-config command prior to the service
command or no command as such password-encryption command being executed, the
Examples: unencrypted passwords are visible in the
configuration output, then can be executed and the
encryption will be applied to the passwords.
- NOTE: Once the encryption has been applied,
removing the encryption service does not reverse
the encryption.
- To turn off password encryption, type:
Router(config)#no service password-encryption

Plethora of Passwords

Setting Line
passwords

- Line passwords are the first line of defense


against unauthorized intrusion into the router

enable and enable secret password configuration - Setting passwords for each line used to
- enable password contains weak cryptography configure the router
and should never be used if the enable secret command
is available. NOTE: can be seen on plain text  - Configure the console line password
- enable secret serves the same purpose as the  Enter line configuration mode
enable password command, but it is more secure and
with one major difference – the configured password is - Can also configure passwords on the five virtual
stored in encrypted form. NOTE: Uses a very secure terminal lines that exist on every router
MD5 cryptographic hash algorithm.  In much the same way as on the console port
Console Password (Switch/Router)

*Note: Verify the Password

Encrypting Password Display


Router(config)#service password-encryption
- The service password-encryption command
applies weak encryption to all unencrypted
passwords. This encryption does not apply to
passwords as they are sent over media only in the
configuration.
User Authentication: Telnet (Router)
2. Configure enable password or enable secret password
and Telnet password for remote access.
With USER ACCOUNT name Once you are in privileged
Router#conf t mode, you must type the
Router(config)#login local Router>en config t command to enter
Router(config)#line console 0 Router#conf t global configuration mode
Router(config-line)#exit Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#username peji password netman Router(config)#enable password admin
Router(config)#username aaa password bbb Router(config)#line vty 0 4
Router(config)#exit Router(config-line)#password cisco
Verify the Authentication  Router#exit Router(config-line)#login
User Access Verification Router(config-line)#^Z
Router#
Username: peji
Password: netman
Router > enable
!!! TYPE HERE Encrypted
Password
Password: kelly
Router#
Verify the User Status
!!!The * Shows user is active and Connected to Console Port Typing the line vty 0 4 command
NetMan# show users
changes you to line configuration
Line User Host(s) Idle Location mode and specififes that you want
* 0 con 0 peji idle 00:00:00 alla the
Just like following
console password,commands
the loginto
User Authentication: Telnet (Router) apply to all five vty lines
command specifies that users must log
1. Assign a static IP addresses. in when they access the router via the
Router>en vty lines. The password command
Router#conf t
specifies that vty password is cisco
Enter configuration commands, one per line. End with
CNTL/Z. 3. Test Telnet connectivity.
Router(config)#int fastEthernet 0/0 PC>telnet 10.0.0.1
Router(config-if)#ip address 10.0.0.1 255.0.0.0 Trying 10.0.0.1 ...Open
Router(config-if)#no shutdown
%LINK-5-CHANGED: Interface FastEthernet0/0, User Access Verification
changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Password: What do you think is the password?
Interface FastEthernet0/0, changed state to up Router>ena
Router(config-if)#end Password: What do you think is the password?
Router# Router#
%SYS-5-CONFIG_I: Configured from console by
console
Router#conf t
Enter configuration commands, one per line. End with
CNTL/Z.
Router(config)#int vlan 1
Router(config-if)#no shut
Switch>enable
%LINK-5-CHANGED: Interface Vlan1, changed state
Switch#conf t
to up
Enter configuration commands, one per line. End with Configure a banner
CNTL/Z. ‒ A banner is a message that you can configure to
Switch(config)#enable password admin display each time someone attempts to log in to
Switch(config)#int vlan 1 the router. Enter global configuration mode by
Switch(config-if)#ip address 192.168.1.1 255.255.255.0 typing config t. Then type banner motd,
Switch(config-if)#no shut followed by a space and a delimiting character
%LINK-5-CHANGED: Interface Vlan1, changed state
to up
%LINEPROTO-5-UPDOWN: Line protocol on
Interface Vlan1, changed state to up
Switch(config-if)#exit
Switch(config)#line vty 0 15
Switch(config-line)#password cisco
Switch(config-line)#login
Switch(config-line)#

Test Telnet connectivity:

PC>telnet 192.168.1.1
Trying 192.168.1.1 ...Open

User Access Verification

Password: cisco Type:


Switch>ena no banner
Password: admin - To remove the banner
Switch#  Configure an interface description
- Use the description command
Command History - The interface description helps you remember
 Allows to retrieve previously typed commands which network the interface services
Up to 10 previously typed commands can be seen by
typing show history

- From either the user EXEC or privileged EXEC


mode
 To modify the number of commands stored by the  Use the clock set command in enable mode to
router, use the terminal command configure the time
- Up to 256 previous commands
• You must be in global configuration
mode to configure the time zone
- Type terminal history size n

Configuring Router Identification


 Router Name/ IOS Hostname
Router#configure terminal !!! After the command is
executed, the prompt will change to:
Router(config)# !!! In the global mode, enter the
hostname (the name can be any word you choose):
Router(config)#hostname Netman !!!HOSTNAME
change the router name. After the command is executed,
the prompt will change to:
netman(config)#
 To remove the name of a device, use:
netman(config)# no hostname
Router(config)# Router Components
Read-only memory (ROM)  The IOS contains commands to view each of the
- Loads the bootstrap program that initializes the router’s components
router’s basic hardware components  show running-config startup-config
- Not modified during normal operations, but it  show memory
can be upgraded with special plug-in chips  show buffers
 The content of ROM is maintained even when the  show startup-config
router is rebooted  Copy running-config startup-config
 The ROM monitor firmware runs when the router is  Abbreviated as Copy run start
turned on or rebooted
Flash memory
- A type of erasable, programmable, read-only
memory (EPROM)
- Not typically modified during normal operations
 However, it can be upgraded or erased when
necessary
 The content of flash memory is maintained even
when the router is rebooted
- Contains the working copy of the current Cisco
IOS
- Is the component that initializes the IOS for
normal router operations

Interfaces
Nonvolatile random access memory (NVRAM) - A router can ship with a variety of configurable
- A special type of RAM that is not cleared when interfaces
the router is rebooted  A common interface is Ethernet0
 The startup configuration file for the router is stored - Other types of interfaces include:
in NVRAM by default  Token Ring
- This is the first file created by the person who  Basic Rate Interface (BRI)
sets up the router  Asynchronous Transfer Mode (ATM)
 The Cisco IOS uses the configuration file in  Fiber Distributed Data Interface (FDDI)
NVRAM during the router boot process  Channel Interface Processor (CIP) for
Systems Network Architecture (SNA)
Random access memory (RAM)/DRAM  High-Speed Serial Interface (HSSI)
- Also known as dynamic random access
memory (DRAM)
- A volatile hardware component
- Its information is not maintained in the event of
a router reboot
 Changes to the router’s running configuration take
place in RAM/DRAM
12. At the global configuration mode type “do reload”
in the router, Yes for confirmation
13. Enter the copy running-configuration startup-
configuration command to save your changes

Configuration Register Commands


 Ctrl+Break - Key combination used to interrupt
router boot sequence
 Confreg - Rommon command for modifying the
configuration register
 config-register - Directs the router where to load the
IOS and configuration files from
 copy start run - Copies the startup-config file to
RAM and names it running-config
 config t - Takes you to global config
 enable secret password - Sets the enable password
 Reload - Reboots the router
 NOTE: Inside (config) terminal always insert do in
every command. Outside (config) terminal – can use
tab
 Saving the running configuration to the startup
configuration file in NVRAM preserves the changes
as the new startup configuration
Router >copy running-config startup-config
 Removing All Configurations
Router#erase startup-config
 Once the command
is issued, the router
Router Password Recovery
will prompt a
1. Turn the router off and on using the power switch
2. Press Ctrl+Break several times within the first 60 confirmation:
seconds of bootup (fn+ctrl+pause)  Erasing the
3. At the rommon 1> prompt, type confreg 2142 and nvram filesystem
press Enter. will remove all
4. Enter the reset command at the rommon 2> prompt. configuration
5. Enter no if asked to enter the system configuration files! Continue?
dialog [confirm]
6. Enter enable to get to privileged mode.
7. Enter the copy startup-configuration running-
configuration command to load the saved
configuration file from NVRAM into RAM
8. Enter the show run command to view the
configuration
9. Remove password or change the password –
change: enable password | remove: no enable
password, type: copy running-configuration startup-
configuration
10. Change the configuration register to 0x2102, type:
config-register 0x2102 at the global configuration
mode prompt to make sure the router reboots in the
default manner
11. Execute the “show version” command to see what
register you are running and what register will be it
in after the reboot – to load the 2102 into normal

You might also like