1-CCNA BRYPHIL - BryPhil Technology

advertisement
Jan 9, 2015
Tools
Hardware;
- Router
- Switch
- Laptop/PC
- Console cable
- Ethernet Cable (Cat5(e)/Cat6)
Software;
- CIOS
- Packet Tracer
ICONS
What is a Router?
A router is a device that forwards data/voice packets
along networks.
A router is a device that routes network traffic
What is a Switch?
A switch serves as a controller, enabling networked
devices to talk to each other
Managed
Unmanaged
Device and Port/Interface Identification
Exercise 1.
1.
2.
3.
4.
Identify a router
Identify a switch
Identify all interfaces on your router and switch
Identify all cables and connectors.
Exercise 2
1. Install any terminal of your choice (Putty, secureCRT, Teraterm)
2. Configure serial line connection settings
i. Speed = 9600
ii. Data bits = 8
iii. Stop bits = 1
iv. Parity = None
v. Flow Control = XON/XOFF
3. Power on devices.
4. Examine the boot process.
Packet Tracer
The language.
- Computers only understand the language of zeros and ones.
Binary
Understanding IP Addressing
Understanding IP Addressing
IP Address: A logical numeric address that is assigned to every
single computer, printer, switch, router or any other device that is
part of a TCP/IP-based network
Subnet: A separate and identifiable portion of an organization's
network, typically arranged on one floor, building or geographical
location
Subnet Mask: A 32-bit number used to differentiate the network
component of an IP address by dividing the IP address into a
network address and host address
Network Interface Card (NIC): A computer hardware component
that allows a computer to connect to a network
Understanding IP Addressing
DHCP: Dynamic Host Configuration Protocol (DHCP) is a network
protocol that enables a server to automatically assign an IP address
to a computer from a defined range of numbers (i.e., a scope)
configured for a given network
TFTP: Trivial File Transfer Protocol (TFTP) is a simple, lock-step, file
transfer protocol which allows a client to get from or put a file onto
a remote host.
DMARC: The separation point between carrier equipment and CPE.
DNS (Domain Name System)
A system used on the Internet for translating names of network
nodes into addresses.
HTTP (Hypertext Transfer Protocol)
The protocol used by web browsers and web servers to transfer
files, such as text and graphic files.
Understanding IP Addressing
HTTPS (Hypertext Transfer Protocol Secure)
The protocol used by web browsers and web servers to transfer
files, such as text and graphic files securely.
Port Number
A field in a TCP or UDP header that identifies the application that
either sent or should receive the data inside the data segment.
Common ports include: 80, 443, 110, 21, 3389, 25, 5060
RAM (Random-access Memory)
A type of volatile memory that can be read and written by a
microprocessor.
Understanding IP Addressing
NVRAM (Non-Volatile Random-access Memory)
A type of non volatile memory that can be read and written by a
microprocessor and retains information when powered off.
Routing Protocol
A protocol that accomplishes routing through the implementation
of a specific routing algorithm. Examples include the Interior
Gateway Routing Protocol (IGRP), the Open Shortest Path First
(OSPF) protocol, and the Routing Information Protocol (RIP).
Subnetting.
Classful IP Addressing.
Subnetting.
Subnet Mask based on Class
Converting Decimals to Binary .
13
12
11
10
Bits
24
n
2
23
22
21
20
2 raised to
bit value
32
16
8
4
2
1
Actuals
224
240
248
252
254
255
Subnet
Mask
17
16
15
14
27
26
25
128
64
128
192
1
0
1
0
1
0
1
1
Exercise: Convert 171 to binary
n
2
Converting Decimals to Binary .
Converting Decimals to Binary .
Exercise 2.
1.Question 1: Convert
255 from decimal to
binary.
2.Question 2: Convert
187 from decimal to
binary.
3.Question 5: Convert
241 from binary to
decimal.
4. Question 3: Convert
223 from decimal to
binary.
5. Question 4: Convert
240 from decimal to
binary.
Converting Decimals to Binary .
Converting Decimals to Binary .
Cisco Devices/ IOS
Open Systems Interconnection model (OSI)
is a conceptual model that characterizes and
standardizes the internal functions of a
communication system by partitioning it into
abstraction layers.
7.
6.
5.
4.
3.
2.
1.
Application
Presentation
Session
Transport
Network
Data link
Physical
7.
6.
5.
4.
3.
2.
1.
Anyway
Packets
Stupid
Those
Need
Don’t
People
Please Do Not Tell Sales People Anything
Physical (Layer 1)
It provides the hardware means of sending and
receiving data on a carrier, including defining cables,
cards and physical aspects.
e.g RJ45
Please Do Not Tell Sales People Anything
Data Link (Layer 2)
At this layer, data packets are encoded and decoded
into bits. It furnishes transmission protocol knowledge
and management and handles errors in the physical
layer, flow control and frame synchronization.
The data link layer is divided into two sub layers: The Media Access Control (MAC)
layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a
computer on the network gains access to the data and permission to transmit it. The
LLC layer controls frame synchronization, flow control and error checking.
e.g. PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE 802.3/802.2, HDLC
Please Do Not Tell Sales People Anything
Network (Layer 3)
This layer provides switching and routing technologies,
creating logical paths, known as virtual circuits, for
transmitting data from node to node. Routing and
forwarding are functions of this layer, as well as
addressing, internetworking, error handling,
e.g. AppleTalk, IP,
Please Do Not Tell Sales People Anything
Transport (Layer 4)
This layer provides transparent transfer of data
between end systems, or hosts, and is
responsible for end-to-end error recovery and
flow control. It ensures complete data transfer.
e.g SPX, TCP, UDP.
Please Do Not Tell Sales People Anything
Session (Layer 5)
This layer establishes, manages and terminates
connections between applications. The session layer
sets up, coordinates, and terminates conversations,
exchanges, and dialogues between the applications at
each end. It deals with session and connection
coordination.
- e.g. RPC, SQL.
Please Do Not Tell Sales People Anything
Presentation (Layer 6)
This layer provides independence from differences in data
representation by translating from application to network format,
and vice versa. The presentation layer works to transform data into
the form that the application layer can accept. This layer formats
and encrypts data to be sent across a network, providing freedom
from compatibility problems.
TIFF, GIF, JPEG, MPEG, MIDI.
Please Do Not Tell Sales People Anything
Application (Layer 7)
This layer supports application and end-user processes.
Communication partners are identified, quality of service is
identified, user authentication and privacy are considered, and
any constraints on data syntax are identified.
file transfers, e-mail, and other network software services. Telnet
and FTP are applications that exist entirely in the application
e.g. browsers, NFS, SNMP, Telnet, HTTP, FTP
Please Do Not Tell Sales People Anything
3:1
1:1
1:1
2:1
Please Do Not Tell Sales People Anything
Please Do Not Tell Sales People Anything
Please Do Not Tell Sales People Anything
Please Do Not Tell Sales People Anything
Which of the following correctly describe steps in the OSI data encapsulation process?
(Choose two)
A. The transport layer divides a data stream into segments and may add reliability and
flow control information.
B. The data link layer adds physical source and destination addresses and an FCS to
the segment.
C. Packets are created when the network layer encapsulates a frame with source and
destination host addresses and protocol-related control information.
D. Packets are created when the network layer adds Layer 3 addresses and control
information to a segment.
E. The presentation layer translates bits into voltages for transmission across the
physical link.
Please Do Not Tell Sales People Anything
A network administrator is verifying the configuration of a newly
installed host by establishing an FTP connection to a remote
server. What is the highest layer of the protocol stack that the
network administrator is using for this operation?
A. application
B. presentation
C. session
D. transport
E. internet
F. data link
Please Do Not Tell Sales People Anything
A receiving host computes the checksum on a frame and
determines that the frame is damaged. The frame is then
discarded. At which OSI layer did this happen?
A. session
B. network
C. physical
D. data link
E. transport
Please Do Not Tell Sales People Anything
At which layer of the OSI model is RSTP used to
prevent loops?
A. data link
B. network
C. physical
D. transport
Please Do Not Tell Sales People Anything
Please Do Not Tell Sales People Anything
Routers are Computers
Routers are at the Center of every Network
What is a Router?
Main Function
Is to router or
forward packets
destined for local
and remote
network by
determining best
path
What is a Router?
Routers are Computers
CPU
RAM
ROM
Operating system
CPU
RAM
ROM
Flash memory
NVRAM
Cisco Devices/ IOS
CPU
The CPU executes operating system instructions such as
1. System initialization
2. Routing Functions
3. Network interface Control
RAM
Stores information or instructions needed to be executed such as
1.
2.
3.
4.
Operating system (Copied to RAM during bootup)
Running Configuration
IP Routing Tables
ARP Cache (Maps IP addresses to MAC addresses)
ROM
Read only memory is permanent storage. Cisco devices use ROM to store
1. Bootstrap instructions
2. Basic diagnostics software
3. A scaled down version of IOS
Flash Memory
This is non volatile computer memory that can be electronically erased and
reprogrammed. It is used as a permanent storage of the;
1. Operating system (CIOS)
NVRAM
This is also non volatile Random Access Memory which is used to store
1. The start-up configuration file.
The Boot Process
The Boot Process
The Boot Process
The Boot Process
A Cisco router is booting and has just completed the POST
process. It is now ready to find and load an IOS image.
What function does the router perform next?
A. It checks the configuration register
B. It attempts to boot from a TFTP server
C. It loads the first image file in flash memory
D. It inspects the configuration file in NVRAM for boot
instructions
CLI Configuration and Addressing-Basic Router Configuration
User EXEC Mode
The default command mode for the CLI is user EXEC mode. the user EXEC commands
allow you to connect to remote devices, perform basic tests, and list system information.
Router>.
Privileged EXEC Mode
Privileged EXEC mode is password protected, and allows the use of all EXEC mode
commands available on the system.
Router# .
Global Configuration Mode
Global configuration commands generally apply to features that affect the system as a
whole, rather than just one protocol or interface.
Router(config)# .
ROM Monitor Mode, and Setup Mode (ignore)
Basic Router Configuration
When configuring a router, certain basic tasks are
performed. Including the following
1. Name the router.
2. Setting password.
3. Configuring interfaces.
4. Configuring a banner.
5. Saving changes on a router.
6. Verifying basic configuration and router operations.
Appendix 1A
A network administrator needs to allow only one Telnet connection to a router.
Which set of commands will accomplish this task?
A.
access-list 1 permit 192.168.1.0 0.0.0.255
line vty 0 4
login
password cisco
access-class 1
B.
enable password secret
line vty 0
login
password cisco
C. line vty 1
login
password cisco
D. line vty 0 4
login
password cisco
Subnet Mask / # of Host
Routers are at the Center of every Network
Subnet Mask / # of Host
n
2
Subnets =
n
Host = 2 -2
n= # of borrowed bits
Subnet Mask / # of Host
16 hosts < 25 – 2 (we need to borrow 5 bits -> /27)
11 hosts < 24 – 2 (borrow 4 bits -> /28)
5 hosts < 23 – 2 (borrow 3 bits -> /29)
Subnet Mask / # of Host
Convert the following binary to decimal--01101101.
225
109
1101
112
Subnet Mask / # of Host
What address Class does 172.16.33.1/24 belong to?
Class A
Class B
Class C
Class D
Subnet Mask / # of Host
When calculating usable hosts per subnet, the following
formula is used 2^bits - 2. For what reason is two
subtracted? (choose two)
Broadcast
Multicast
Unicast
Network
Subnet Mask / # of Host
Your organization is designing a Wide Area Network. Locations
have varying numbers of hosts. The largest network will have no
more than 55 hosts. What subnet mask accomplishes the goal
and maximizes the number of subnets that may be created?
A: 255.255.255.192
B: /25
C: 255.255.255.224
D: /27
Subnet Mask / # of Host
What are two ways to represent a network mask that would
allow 14 hosts?
A: /14
B: 255.255.255.240
C: 255.255.14.0
D: /28
Subnet Mask / # of Host
Based on 1.1.1.0/24, the IP address would be:
Class A
Class B
Class C
Class D
Subnet Mask / # of Host
How many hosts can be located on a network,
where the IPv4 netmask is 27 bits?
A: 27
B: 30
C: 32
D: 5
Appendix 1B-1
Appendix 1B
Cisco Discovery Protocol
CDP
CDP is primarily used to obtain protocol addresses of direct neighboring devices
and discover the platform of those devices
Command
Router(config)# cdp run
Purpose
Enables CDP on the system.
Router(config)# no cdp run
Disables CDP on the system.
Router(config-if)# cdp enable
Enables CDP on an interface.
Router(config-if)# no cdp enable
Disables CDP on an interface.
Router# show cdp neighbour
Collision & Broadcast domain
A collision domain is, as the name implies, a part of a network where
packet collisions can occur. A collision occurs when two devices send a
packet at the same time on the shared network segment. The packets
collide and both devices must send the packets again, which reduces
network efficiency. HUB and SWITCHES
A broadcast domain is a domain in which a broadcast is forwarded. A
broadcast domain contains all devices that can reach each other at the
data link layer (OSI layer 2) by using broadcast. All ports on a hub or a
switch are by default in the same broadcast domain. All ports on a
router are in the different broadcast domains and routers don't forward
broadcasts from one broadcast domain to another. ROUTER
ICONS
Routing Protocols
RIP
1. Routing protocols enable routers to know where to
forward packets.
2. Information about where a router should send specific
packets are stored in the ROUTING TABLE.
Types of routes.
1. Connected Routes
2. Static Routes
3. Dynamics routes.
Routes
1.Routing tables store information about
other destinations subnets (Subnet
number and subnet mask)
2.They contain the direction which tells the
router what other routers or host to send
packets next(Outgoing interface and nexthop router
Learning Connected Routes
Subnets to which routers interfaces are connected are
called DIRECTLY CONNECTED ROUTES.
A router adds a directly connected route for each interface
that has been configured with an IP address, and its up
and working to its database.
Next Hop
Next Hop
Next Hop
LAB Static Route
Administrative distance
Administrative distance is the feature that routers use in
order to select the best path when there are two or more
different routes to the same destination from two different
routing protocols.
Administrative distance defines the reliability of a routing
protocol.
Each Routing Protocol has its default administrative distance.
Administrative distance
The Default Administrative
distance for RIP is 120
Routing Information Protocol (RIP)
• Routing Protocols exchange routing table information
• Therefore, they learn routing information about IP subnets from their
neighboring routers
• They advertise routing information with their neighboring routers
• If more than one route exist for each subnet, they chose the best route.
(HOW DO THEY DO THIS?)
• If a link fails (topology changes) they react by advertising that some
routes have failed and pick a new currently best route (Convergence)
Routing Information Protocol (RIP)
All routing protocols use a metric
A metric simply determines how good each route is.
Hop-count tells the router how many more routers a
packet has to traverse to get to its destination.
Next Hop
Refer to the exhibit, Host A pings interface S0/0 on router 3,
what is the TTL value for that ping ?
A. 253
B. 252
C. 255
D. 254
Next Hop
Refer to the exhibit, Host A pings interface S0/0 on router 3,
what is the TTL value for that ping ?
Refer to the exhibit. A network administrator attempts to
ping Host2 from Host1 and receives the results that are shown.
What is a possible problem?
A. The link between Host1 and Switch1 is down.
B. TCP/IP is not functioning on Host1
C. The link between Router1 and Router2 is
down.
D. The default gateway on Host1 is incorrect.
E. Interface Fa0/0 on Router1 is shutdown.
F. The link between Switch1 and Router1 is
down.
LAB RIP
Configuring RIP v2 on a Network.
BryPhil#configure terminal
BryPhil(config)#router rip
BryPhil(config-router)#version 2
BryPhil(config-router)#no auto summary
BryPhil(config-router)#network 192.168.1.0
BryPhil(config-router)#network 192.168.2.0
BryPhil(config-router)#network 172.16.1.0
BryPhil(config-router)#network 172.16.2.0
BryPhil(config-router)#end
BryPhil#copy run start
LAB RIP
Review
HINT
A network administrator is verifying the configuration of a
newly installed host by establishing an FTP connection to a
remote server.
What is the highest layer of the protocol stack that the
network administrator is using for this operation?
A. Application
B. Presentation
C. Session
D. Transport
E. Internet
F. Data link
Routing Protocol
OSPF
RIP v1
RIPv2
OSPF
Distance Vector
Classful
Hop-count
Slow Convergence
Distance Vector
Classless
Hop-Count
Slow
Convergence
Less CPU
Less complex
Link-State
Classless
Bandwidth/Cost
Fast Convergence
Less CPU
Less complex
More CPU
More complex
More OSPF
OSPF Cost Calculation and Path Determination
OSPF Cost Calculation and Path Determination
OSPF Cost Calculation and Path Determination
Link-state Routing Process
1. R1; Ethernet network 10.1.0.0/16; Cost 2
2. R1 -> R2; Serial point-to-point network; 10.2.0.0/16; Cost 20
3. R1 -> R3; Serial point-to-point network; 10.3.0.0/16; Cost 5
4. R1 -> R4; Serial point-to-point network; 10.4.0.0/16; Cost 20
Routers in other areas learn that
this route is down, but this is done
with a type of LSP that does not
cause them to rerun their SPF
algorithm. Routers in other areas
can update their routing tables
directly
Route source - Identifies how the route was learned.
Destination network - Identifies the address of the remote network.
Administrative distance - Identifies the trustworthiness of the route source.
Metric - Identifies the value assigned to reach the remote network. Lower values indicate preferred routes.
Next hop - Identifies the IPv4 address of the next router to forward the packet to.
Route timestamp - Identifies from when the route was last heard.
Outgoing interface - Identifies the exit interface to use to forward a packet toward the final destination.
Router(config)# router ospf process_ID
Router(config-router)# network IP_address wildcard_mask area_#
R4(config)#router ospf 4
R4(config-router)#network X.X.X.X xxx.xxx.xxx.xxx area 0
R4(config-router)#network X.X.X.X xxx.xxx.xxx.xxx area 0
R4(config-router)#
X.X.X.X = IP Address
xxx.xxx.xxx.xxx = wild card mask
Download