IT 104 Finals
IT 104 Finals
Coaxial Cable
Coax consists of:
• A copper conductor used to transmit the electronic signals.
• A layer of flexible plastic insulation surrounding a copper conductor.
• The insulating material is surrounded in a woven copper braid, or metallic foil, that acts as the second wire in the
circuit and as a shield for the inner conductor.
• The entire cable is covered with a cable jacket to prevent minor physical damage.
UTP cable has essentially replaced coaxial cable in modern Ethernet installations but is used in:
• Wireless installations: Coaxial cables attach antennas to wireless devices.
• Cable Internet installations
UTP Cabling
Properties of UTP Cabling
Consists of four pairs of color-coded copper wires that have been twisted
together and then encased in a flexible plastic sheath.
Small size can be advantageous during installation. Notice that the orange/orange white
UTP cable does not use shielding to counter the effects of EMI and RFI. pair is twisted less than the
• Cancellation: When two wires in an electrical circuit are placed close blue/blue white pair. Each colored
together, their magnetic fields are the exact opposite of each other and pair is twisted a different number of
cancel out any outside EMI and RFI signals. times.
• Varies the number of twists per wire pair to further enhance the
cancellation effect of a paired circuit.
UTP Cabling Standards
UTP cabling conforms to the standards established by TIA/EIA.
• TIA/EIA-568 stipulates the cabling standards for LAN installations
Cat 3 Cable
• Used for voice communication
• Most often used for phone lines
Cat 5 and 5e Cable
• Used for data transmission
• Cat5 supports 100 Mb/s and can support 1000Mb/s, but it is not recommended
• Cat5e supports 1000 Mb/s
Cat 6 Cable
• Used for data transmission
• An added separator is between each pair of wires allowing it to function at
higher speeds
• Support 1000 Mb/s – 10 Gb/s, though 10 Gb/s is not recommended
UTP Connectors
UTP cable terminated with an RJ-45 connector.
TIA/EIA-568 standard describes the wire color codes to pin assignments (pinouts) for Ethernet cables.
RJ-45 connector is the male component, crimped at the end of the cable.
Socket is the female component of a network device, wall, cubicle partition outlet, or patch panel.
Essential that all copper media terminations be of high quality to ensure optimum performance with current and future
network technologies.
Types of UTP Cable
Multimode LC Connectors
• Similar to LC but using a duplex connector.
Wireless Media
Properties of Wireless Media
Wireless media carry electromagnetic signals that represent the binary digits
of data communications using radio or microwave frequencies.
Wireless areas of concern:
• Coverage area: Construction materials used in buildings and
structures, and the local terrain, will limit the coverage.
• Interference: Disrupted by such common devices as fluorescent
lights, microwave ovens, and other wireless communications.
• Security: Devices and users, not authorized for access to the
network, can gain access to the transmission.
• Shared medium: Only one device can send or receive at a time and
the wireless medium is shared amongst all wireless users.
Types of Wireless Media
Wi-Fi: Standard IEEE 802.11
• Uses Carrier/Sense Multiple Access/Collision Avoidance (CSMA/CA).
• Wireless NIC must wait till channel is clear.
Bluetooth: Standard IEEE 802.15
• Wireless Personal Area Network (WPAN)
• Uses a device pairing process for distances 1 to 100 meters
WiMAX: Standard IEEE 802.16
• Worldwide Interoperability for Microwave Access
• Wireless broadband access.
Wireless LAN
Wireless LAN requires the following network devices:
• Wireless Access Point (AP): Concentrates the wireless signals
from users and connects to the existing copper-based network Home and small business wireless
infrastructure, such as Ethernet. routers integrate the functions of a
router, switch, and access point into
• Wireless NIC adapters: Provide wireless communication
one device.
capability to each network host.
Data Link Protocols
Data Link Layer
Encapsulating IP
• At the network layer, IP encapsulates the transport
layer segment by adding an IP header for the
purpose of delivery to the destination host.
• The IP header stays the same from the source to the
destination host.
• The process of encapsulating data layer by layer
enables the services at different layers to scale
without affecting other layers.
• Routers implement different network layer
protocols concurrently over a network and use the
network layer packet header for routing.
Characteristics of IP
• IP was designed as a protocol with low overhead – it
provides only the functions required to deliver a
packet from the source to a destination.
• An IP packet is sent to the destination without prior
establishment of a connection
• IP was not designed to track and manage the flow of
packets.
• These functions, if required, are performed by
other layers – primarily TCP
IP- Connectionless
• IP is a connectionless protocol:
• No dedicated end-to-end connection is created
before data is sent.
• Very similar process as sending someone a
letter through snail mail.
• Senders do not know whether or not the destination is present, reachable, or functional before sending
packets.
• This feature contributes to the low overhead of IP.
IP – Best Effort Delivery
IP is a Best Effort Delivery protocol:
• IP is considered “unreliable” because it does not guarantee that all packets that are sent will be received.
• Unreliable means that IP does not have the capability to manage and recover from undelivered, corrupt, or out of
sequence packets.
• If packets are missing or not in the correct order at the destination, upper layer protocols/services must resolve these
issues.
IP – Media Independent
• IP operates independently from the media that carries the data at lower layers of the protocol stack – it does not care if
the media is copper cables, fiber optics or wireless.
• The OSI data link layer is responsible for taking the IP packet and preparing it for transmission over the
communications medium.
• The network layer does have a maximum size of the PDU that can be transported – referred to as MTU (maximum
transmission unit).
• The data link layer tells the network layer the MTU.
IPv4 Packet Header
• An IPv4 packet header consists of the fields containing binary numbers. These numbers identify various settings of the
IP packet which are examined by the Layer 3 process.
• Significant fields include:
• Version – Specifies that the packet is IP version 4
• Differentiated Services or DiffServ (DS) – Used to determine the priority of each packet on the network.
• Time-to-Live (TTL) – Limits the lifetime of a packet – decreased by one at each router along the way.
• Protocol – Used to identify the next level protocol.
• Source IPv4 Address – Source address of the packet.
• Destination IPv4 Address – Address of destination.
Limitations of IPv4
• IPv4 has been updated to address new challenges.
• Three major issues still exist with IPv4:
• IP address depletion – IPv4 has a limited number of unique public IPv4 addresses available. Although there
are about 4 billion IPv4 addresses, the exponential growth of new IP- enabled devices has increased the need.
• Internet routing table expansion – A routing table contains the routes to different networks in order to make
the best path determination. As more devices and servers are connected to the network, more routes are
created. A large number of routes can slow down a router.
• Lack of end-to-end connectivity – Network Address Translation (NAT) was created for devices to share a
single IPv4 address. However, because they are shared, this can cause problems for technologies that require
end-to-end connectivity.
Encapsulating IPv6
• The IPv6 header is simpler than the IPv4 header.
• Advantages of IPv6 over IPv4 using the simplified header:
• Simplified header format for efficient packet handling
• Hierarchical network architecture for routing efficiency
• Auto configuration for addresses
• Elimination of need for network address translation (NAT) between private and public addresses
• IPv6 packet header fields:
• Version – Contains a 4-bit binary value set to 0110 that identifies it as a IPv6 packet.
• Traffic Class – 8-bit field equivalent to the IPv4 Differentiated Services (DS) field.
• Flow Label – 20-bit field suggests that all packets with the same flow label receive the same type of handling
by routers.
• Payload Length – 16-bit field indicates the length of the data portion or payload of the packet.
• Next Header – 8-bit field is equivalent to the IPv4 Protocol field. It indicates the data payload type that the
packet is carrying.
• IPv6 packet header fields:
• Hop Limit – 8-bit field replaces the IPv4 TTL field. This value is decremented by 1 as it passes through each
router. When it reaches zero, the packet is discarded.
• Source IPv6 Address – 128-bit field that identifies the IPv6 address of the sending host.
• Destination IPv6 Address – 128-bit field that identifies the IPv6 address of the receiving host.
Routing
Host Forwarding Decision
• An important role of the network layer is to direct packets between hosts. A host can send a packet to:
• Itself – A host can ping itself for testing purposes using 127.0.0.1 which is referred to as the loopback
interface.
• Local host – This is a host on the same local network as the sending host. The hosts share the same network
address.
• Remote host – This is a host on a remote network. The hosts do not share the same network address.
• The source IPv4 address and subnet mask is compared with the destination address and subnet mask in order to
determine if the host is on the local network or remote network.
Default Gateway
• The default gateway is the network device that can route traffic out to other networks. It is the router that routes
traffic out of a local network.
• This occurs when the destination host is not on the same local network as the sending host.
• The default gateway will know where to send the packet using its routing table.
• The sending host does not need to know where to send the packet other than to the default gateway – or router.
Using the Default Gateway
• A host’s routing table usually includes a default gateway address – which is the router IP address for the network that
the host is on.
• The host receives the IPv4 address for the default gateway from DHCP, or it is manually configured.
• Having a default gateway configured creates a default route in the routing table of a host - which is the route the
computer will send a packet to when it needs to contact a remote network.
Host Routing Tables
• On a Windows host, you can display the routing table using:
• route print
• netstat -r
• Three sections will be displayed:
• Interface List – Lists the Media Access Control (MAC) address and assigned interface number of network
interfaces on the host.
• IPv4 Route Table – Lists all known IPv4 routes.
• IPv6 Route Table – Lists all known IPv6 routes.
Router Packet Forwarding Decision
• When a router receives a packet destined for a remote network, the router has to look at its routing table to determine
where to forward the packet. A router’s routing table contains:
• Directly-connected routes – These routes come from the active router interfaces configured with IP addresses.
• Remote routes – These routes come from remote networks connected to other routers. They are either
configured manually or learned through a dynamic routing protocol.
• Default route – This is where the packet is sent when a route does not exist in the routing table.
IPv4 Router Routing Table
• On a Cisco IOS router, the show ip route command is used to display the router’s IPv4 routing table. The routing
table shows:
• Directly connected and remote routes
• How each route was learned
• Trustworthiness and rating of the route
• When the route was last updated
• Which interface is used to reach the destination
• A router examines an incoming packet’s header to determine the destination network. If there’s a match, the packet is
forwarded using the specified information in the routing table.
Understanding Remote Route Entries
• 10.1.1.0/24 identifies the destination network.
• 90 is the administrative distance for the corresponding network – or the trustworthiness of the route. The lower the
number, the more trustworthy it is.
• 2170112 – represents the metric or value assigned to reach the remote network. Lower values indicate preferred
routes.
• 209.165.200.226 – Next-hop or IP address of the next router to forward the packet.
• 00:00:05 - Route Timestamp identifies when the router was last heard from.
• Serial/0/0/0 – Outgoing Interface
Router
• A router is a computer. Like computers, a router requires a CPU, an operating system, and memory.
• Cisco routers are designed to meet the needs of wide variety of businesses and networks:
• Branch – Teleworkers, small businesses, and medium-size branch sites.
• WAN – Large businesses, organizations and enterprises.
• Service Provider – Large service providers.
• The focus of the CCNA certification is on the branch family of routers.
Router CPU and OS
• Like computers, Cisco routers require a CPU to execute OS instructions including system initialization, routing
functions and switching functions.
• The component highlighted in the figure to the left is the CPU of a Cisco 1941 with the heatsink attached. A heatsink
is used to dissipate the heat from the CPU for cooling purposes.
• The CPU requires an operating system to provide routing and switching functions. Most Cisco devices use the Cisco
Internetwork Operating System (IOS).
Router Memory
• Volatile memory – requires continual power to store information.
• Non-volatile memory – does not require continual power.
• A router uses four types of memory:
• RAM – Volatile memory used to store applications, processes, and data needed to be executed by the CPU.
• ROM – Non-volatile memory used to store crucial operational instructions and a limited IOS. ROM is
firmware embedded on an integrated circuit inside of the router.
• NVRAM – Non-volatile memory used as permanent storage for the startup configuration file (startup-config).
• Flash – Non-volatile memory used as permanent storage for the IOS and other operating system files such as
log or backup files.
Inside Router
• There are numerous types and models of routers, however, they all have the same general hardware components:
• Power supply
• Cooling fan
• SDRAM - Synchronous Dynamic RAM
• Non-volatile RAM (NVRAM)
• CPU
• Heat shields
• Advanced Integration Module (AIM)
Connect to Router
• Cisco devices, routers, and switches typically interconnect many devices. The Cisco 1941 router backplane includes
the following ports and connections:
• Enhanced High-speed WAN Interface Card (eHWIC) Slots
• Auxiliary (AUX) – RJ-45 port for remote management.
• Console Port – Used for initial configuration and Command Line Interface access – RJ-45 or USB
Type-B (mini-B USB)
• Gigabit Ethernet used to provide LAN access by connecting to switches, users, or to other routers.
• Compact Flash Slots – Labeled as CF0 and CF1 and used to provide increased storage flash space
upgradable to 4GB.
• USB port – used to provide additional storage space.
LAN and WAN Interfaces
Cisco router connections can be classified in two categories:
In-band router interfaces – LAN and WAN interfaces
Management ports – Console and AUX ports
• The most common ways to access user EXEC mode in the CLI environment on a Cisco router:
• Console – This is a physical management port that provides out-of-band access to the Cisco router. Out-of-
band means that it is dedicated and does not require network services to be configured on the router.
• Secure Shell (SSH) – This is a secure method of remotely establishing a CLI connection over a network. SSH
does require active networking services configured.
• Telnet – Telnet is an insecure method of remotely establishing a CLI session through a virtual interface over a
network. The connection is not encrypted.
Bootset Files
• Cisco routers and switches load the IOS image and startup configuration file into RAM when they are booted.
• The running configuration is modified when the network administrator makes any changes. These changes should be
saved to the startup configuration file in NVRAM in order for them to take effect on the next reboot of the router or
during in the event of a power loss.
Router Bootup Process
• Three major phases to the bootup process of a router:
• Perform the POST and load the bootstrap program – During the Power-on Self-Test, the router executes
diagnostics from ROM on various hardware components. After the POST, the bootstrap program is copied
from ROM into RAM and its job is to locate the Cisco IOS and load it into RAM.
• Locate and load the Cisco IOS software – Typically, the IOS is stored in flash memory and is copied into
RAM for execution by the CPU.
• Locate and load the startup configuration file or enter setup mode – The bootstrap program then copies the
startup config file from NVRAM into RAM and becomes the running configuration.
Show version Output
• The show version command displays information about the version of the Cisco IOS software running on the router
as well as:
• The version of the bootstrap program
• Information about the hardware configuration
• Amount of system memory
Configure a Cisco Router
Basic Switch Configuration
• Cisco routers and switches have many similarities
in regards to their configuration:
• Support a similar operating system.
• Support similar command structure.
• Support many of the same commands.
• They also have identical initial
configuration steps when implemented in a
network.
• The commands on the left display a sample
configuration of a switch.
Basic Router Configuration Steps
• Similar to the configuration of a switch on the
previous slide, the initial configuration should
include:
• Configure the router’s device name
• Secure the user EXEC mode
• Secure remote Telnet and SSH access
• Secure privileged EXEC mode
• Secure all passwords in the config file
• Provide legal notification – Authorized access only
• Save the configuration
Lesson 7 IP ADDRESSING
IPv4 Addresses
Binary numbering system consists of the numbers 0 and 1 called bits
• IPv4 addresses are expressed in 32 binary bits divided into 4 8-bit octets
IPv4 addresses are commonly expressed in dotted decimal notation
Positional Notation
The first row identifies the number base or radix. Decimal is 10.
Binary is based on 2, therefore radix will be 2
The 2nd row considers the position of the number starting with 0.
These numbers also represent the exponential value that will be
used to calculate the positional value (4th row).
The 3rd row calculates the positional value by taking the radix
and raising it by the exponential value of its position.
Note: n^0 is always = 1.
The positional value is listed in the fourth row.
Binary to Decimal
To convert a binary IPv4 address to decimal enter the 8-bit binary number of each octet under the positional value of row 1
and then calculate to produce the decimal.
Classless Addressing
Classful Addressing wasted addresses and exhausted the availability of IPv4 addresses.
Classless Addressing Introduced in the 1990s
• Classless Inter-Domain Routing (CIDR, pronounced “cider”)
• Allowed service providers to allocate IPv4 addresses on any address bit boundary (prefix length) instead of only by a
class A, B, or C.
Assignment of IP Address
The following organizations manage and maintain IPv4 and IPv6 addresses for the various regions.
• American Registry for Internet Numbers (ARIN)- North America.
• Réseaux IP Europeans (RIPE) - Europe, the Middle East, and Central Asia
• Asia Pacific Network Information Centre (APNIC) - Asia and Pacific regions
• African Network Information Centre (AfriNIC) – Africa
• Regional Latin-American and Caribbean IP Address Registry (LACNIC) - Latin America and some Caribbean islands
IPv6 Network Addresses
IPv6 versus IPv4:
• Has a larger 128-bit address space
• 340 undecillion addresses
• Solves limitations with IPv4
• Adds enhancement like address auto-configuration.
Why IPv6 is needed:
• Rapidly increasing Internet population
• Depletion of IPv4
• Issues with NAT
• Internet of Things
IPv4 and IPv6 Coexistence
Migration from IPv4 to IPv6 Techniques
Dual stack - Devices run both IPv4 and IPv6 protocol stacks simultaneously.
Tunneling - The IPv6 packet is encapsulated inside an IPv4 packet.
Translation - Network Address Translation 64 (NAT64) allows IPv6-enabled devices to communicate with IPv4 devices.
IPv6 Address Representation
IPv6 Addresses:
• 128 bits in length
• Every 4 bits is represented by a single hexadecimal digit
• Hextet - unofficial term referring to a segment of 16 bits or four hexadecimal values.