Sie sind auf Seite 1von 166

CCNA: CISCO CERTIFIED NETWORK ASSOCIATE

contact@networkraft.com
www.linkedin.com/company/networkraft

www.facebook.com/networkraft
COURSE STRUCTURE

 BASICS

 ROUTING

 SWITCHING

 BASIC SECURITY AND WAN TECHNOLOGIES

 INDUSTRIAL TRAINING

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 2


COURSE STRUCTURE

 BASICS:

 Computer Networks

 OSI and TCP/IP Protocol Suit

 Cables

 IP Addressing/Subnetting

 Packet Flow

 Network Devices

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 3


COURSE STRUCTURE

 ROUTING:

 Router Hardware

 Routing Working

 Static Routing

 Dynamic Routing
 RIP
 EIGRP
 OSPF
 LAB

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 4


COURSE STRUCTURE

 SWITCHING:

 Switch Working
 VLAN and Inter-VLAN Routing
 DTP and VTP
 Spanning Tree Protocol
 Ether-channel
 Redundancy Protocol
 LAB

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 5


COURSE STRUCTURE

 SECURITY AND WAN TECHNOLOGIES:

 Access Lists
 Natting
 IPv6
 PPP
 Frame-Relay
 MPLS
 LAB

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 6


COURSE STRUCTURE

 INDUSTRIAL TRAINING:

 General Network Architecture

 Incident Management

 Change Management

 Configuration Management

 Troubleshooting Steps

 Network Tools

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 7


OBJECTIVES

 Introduction
 Computer Networks
 LAN
 OSI Reference Model – Kick start

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 8


COMPUTER NETWORKS

Desktop 1 Desktop 2

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 9


COMPUTER NETWORKS: SCALABILITY ISSUE

Desktop 1 Desktop 2

Laptop

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 10


COMPUTERNETWORKS: SWITCH TO THE RESCUE

Effective
Laptop
communication
Desktop Desktop

Resource sharing

Laptop

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 11


LAN: LOCAL AREA NETWORK

LAN is a logical explanation of how bigger area


can be considered LOCAL

Definition:

When 2 or more computers/communication devices in a room or on a


floor or in a building or in a campus are connected to each other then
they are said to be connected on LAN

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 12


COMPUTER NETWORK: FUNCTIONS
Hello, how are you? Hello, how are you?

Desktop 1 Desktop 2

11010011 11010011

Electrical signal

User Language Acknowledgment Encryption

BBinary User Language Compression

Electrical signal Binary Decompression

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 13


OSI: OPEN SYSTEM INTERCONNECTION

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 14


PHYSICAL LAYER

 Deals with physical aspects

 Defines standards for physical medium such as cables, wireless,


connectors, voltages, currents etc.

 Converts all information to 0s and 1s.

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 15


DATA LINK LAYER

 Required for Node to Node communication


 Physical Addressing is involved- MAC address
 Two sub-layers
 Logical Link Control (LLC):

 Layer-2 addressing, flow control, address notification, error correction (low level)

 Media Access Control (MAC)

 Senses if the media is available for the communication or who has the access to the
media

 Determines the start and end of a frame, called as frame synchronization

 Does not move frames between two networks


 Devices: Layer-2 Switch, Access Point

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 16


NETWORK LAYER

 Responsible for End-to-End communication

 Logical Addressing is involved- IP addressing

 Devices included- Routers, Layer-3 Switches, APC

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 17


TRANSPORT LAYER

 Takes data from Higher Layers converts them into Segments and
transfers them to lower layers and vice versa

 Arrangements of segments is also the responsibility of this layer.


This process of arranging is called Sequencing.

 Responsible for Reliability and Host-to-Host delivery

 Two types of protocols


 Connection Oriented - TCP

 Connection less – UDP

 Port addressing is used

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 18


SESSION LAYER

 Establish, maintain and terminate the session

 Provides procedure for establishing checkpoints, adjournments,


termination and restart or recovery process

 Mediator between transport layer and presentation layer

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 19


PRESENTATION LAYER

 Responsibilities:

 Translation
 Can change the data type

 Compression
 Compress the data to send more information in same time

 Encryption
 Protects the data from interception and saves integrity

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 20


APPLICATION LAYER

 Application software, Operating Systems and other services

 Basically a user interface

 HTTP, POP3, SMTP etc.

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 21


PDU IN OSI LAYER

Application

Presentation MESSAGE
Session

Transport SEGMENT/DATAGRAM
Network PACKET
Data Link FRAME
Physical BITS

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 22


IP HEADER

Version Header Priority & Type Of Total length (16)


(4) Length(4) Service (8)
Identification (16) Flag (3) Fragment Offset (13)
Time to Live (8) Protocol (8) Header checksum (16)
Source IP Address (32)
Destination IP Address (32)
Options (0 or 32 if any)
Data (Varies if any)

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 23


TCP HEADER

Source Port (16) Destination Port (16)

Sequence Number (32)

Acknowledgement Number (32)

Header Reserved Code Bits Window (16)


Length (4) (6) (6)

Checksum (16) Urgent Pointer (16)

Options (0 or 32 if any)

Data (Varies)

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 24


UDP HEADER

Source Port (16) Destination Port (16)


Length (16) Checksum (16)
Data (if any)

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 25


TCP vs UDP

TCP UDP
Sequenced Not sequenced (Random)
Reliable Unreliable
Connection-Oriented Connection-less
Acknowledgment No Acknowledgment
Flow Control and Windowing No Flow control and Windowing

High Overhead Low Overhead

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 26


LAN CHARACTERISTICS

 High Bandwidth: High Speed

 Your Premise your LAN Your equipment NOT Service Provider’s

 Low Cost, Small devices

 Converged Network

 Larger the Campus Larger the LAN

 Administrative control is centralized or distributed

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 27


CONVERGED INFRASTRUCTURE
Types of services running on the network

VOICE VIDEO
Delay sensitive -> Minimal DATA
Delay sensitive -> delay is accepted but Packet
drops are not acceptable for Delay intensive
Delay not accepted QoE

QoE defines Real Time Services

QoE depends on

Latency Jitter Drops

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 28


HOW-PRIORITIZATION

PRIORITY 1

Video
PRIORITY 2

PRIORITY 3

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 29


MAN & WAN

 If a communication device or a computer or a network is


connected to other communication device, computer or a
network which is geographically separated but located in same
city then its said to be connected on MAN.

 But if they are located in different cities then it’s said to be


connected on WAN

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 30


CHARACTERISTICS OF MAN AND WAN

 Bandwidth Moderate – Cost being the limiting factor

 Cannot lay own fiber, It must be Leased from an ISP.

 High cost – Depends on the Bandwidth

 Converged network

 Size of the MAN/WAN is also logical

 Administrative control depends on the Criticality of the service –


Centralized/Distributed

 Prioritization is critical

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 31


MEDIA TYPES

Media Types

Wired Wireless

Optical (Fibre) Electrical (Cu)

Single Twisted
Multi-Mode Thick Wire
Mode Pair

UTP STP

CAT-4
CAT-5
CAT-6

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 32


COMMUNICATION TECHNOLOGIES (1)

 Serial Communication
 It takes a chunk of data and LINE DELIVERS it to other end
 Line Delivering means superimposing low intensity signal on high
intensity signals

 Used for Long Distance Communication hence Delay


 Sync signals are sent to avoid collisions
 Bit correction is added
 Used in MAN and WAN

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 33


COMMUNICATION TECHNOLOGIES (2)

 Ethernet:
 Ethernet (10Mbps)
 Fast Ethernet (100Mbps)
 Gigabit Ethernet (1Gbps)
 10GE (10Gbps)

 This implies that the higher BW is possible


 Cost is less
 No Sync and bit correction
 Used for LAN

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 34


ETHERNET MEDIUMS

 Thin Wire
 Co-axial cable 10Mbps180MetersRepeaters/Bridges

 Thick Wire
 Co-axial cable 10Mbps500MetersRepeaters/Bridges

 Twisted Pair
 STP/UTP10Mbps-10Gbps100MetersHub/Switch/Routers

 Fiber
 Fiber10Mbps-10Gbps500Meters-2KMSwitch/Routers

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 35


TWISTED CABLE

 8 wires  4 pairs
 If shielded with metal foil then STP
 If not shielded with metal foil then UTP
 Connector of STP also has metal body that in tern
connects to STP foil

STP Cable UTP Cable

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 36


TYPES OF TWISTED PAIR CABLES

 CAT-4 10MbpsThinnerless number of twists/turns

 CAT-510/100MbpsThickerComparitively more turns

 CAT-610/100/1000MbpsThickestMost turns

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 37


WHY TWISTED PAIR

 Right Hand Thumb Rule


 Generation of EM waves

 Crosstalk Rule
 Cancellation of EM waves

 What if the Wires are not Twisted?

 In Twisted pair, Pairing is Tightly coupled and


two pairs are loosely coupled.

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 38


STRAIGHT AND CROSS CABLES

Straight Cable:

 1Tx  1Rx
 3Rx  3Tx
 22
 6 6

Cross Cable:

 1Tx  3Rx
 3Rx  1Tx
 26
 62

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 39


CONVENTIONS

Straight Cross

Straight Cross

Cross Cross

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 40


OTHER PAIRS…?

 Power over Ethernet (PoE): Generates -48 V


 These pairs supply power if and only if the switch
is PoE enabled.
 Power supply to IP phones, Access Points etc.
 No interference as +5V and -48V are in different
Quadrant

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 41


FIBER CABLES

 They are Connected to a Fiber


Module that will convert the
electrical signal to optical signal
 Coverage depends on the type of the
module
 Can cover long areas

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 42


TYPES OF OPTICAL FIBRES

 Single Mode Fiber


 Shorter diameter
 Less numbers of rays
 Used for Longer distance

 Multi Mode Fiber


 Bigger diameter
 Number of rays are Transmitted
 Refraction/Reflection delay
 Hence, used for shorter distance

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 43


TYPES OF CONNECTORS

SFP (Small GBIC (Almost


Formfactor Port) outdated)

Both have 3 modules types

Sx: Short Haul Lx: Long Haul Zx: Ultra Long Haul
 Low intensity light  Medium intensity  More intense light
 Short coverage – 500 light  Most coverage
mts  Medium coverage

Preference: Multimode - Sx and Lx; Single mode - Lx and Zx

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 44


C’s OF CABLES

C’s Twisted Pair Optical

Connector RJ45 LC/SC/ST

Capacity 10/100/1000/10000Mbps 10/100/1000/10000Mbps

Coverage 100 meters 500mts2KM40KM

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 45


ETHERNET

 Fundamental: CSMA/CD
 Standard: 802.3
 Protocol: ARPA (Cisco created this protocol for
supporting Ethernet on Cisco Routers)

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 46


CSMA/CD- CARRIER SENSE MULTIPLE
ACCESS/COLLISION DETECT

 Two or more computers/communication devices can get connected to


same medium
 All the computers can communicate when they feel like
 Before communicating, computers need to keep sensing the medium
 If the medium is free, device acquires the medium and transmit the
data
 When the data is already being sent, other devices can only listen
 While Transmitting, the sender is the complete owner of the network
 Only the device with whom sender wants to communicate responds
 Devices address others on the basis of MAC addresses

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 47


COLLISION

 Two communicating devices


 Sensed the medium at the same time
 Found the medium available
 Pushed the data on wire

 Collision does not destroy the data


 Collision Distorts the data
 Distorted packets reach source and
Destination
 CRC Check  Retransmission

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 48


COLLISION AVOIDANCE

 One collision can lead to multiple collisions


 Once the device observes a collision, it goes in an Integral wait state.
 Device starts sensing the medium again after the wait state is over.
 Less chances of another collision
 Multiple collisions cause longer wait state
 Device listens in Wait state but cannot send.

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 49


MAC - ADDRESS

00-1A-C2-A5-23-BC

Manufacturer Unique Address


Address given by
Provided by IEEE Manufacturing
Firm

• 6- bytes (48-bits) Hex Address


• Also called as BIA, machine address, Physical address,
Hardware Address

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 50


IP FLOW
Ping 10.0.0.4

10.0.0.1 10.0.0.2 10.0.0.3 10.0.0.4

DD:DD:DD
??? AA:AA:AA 10.0.0.4 10.0.0.1 DATA

Routing Table Routing Table


NIC1- 10.0.0.1 NIC1- 10.0.0.4
ARP Table ARP Table
10.0.0.1- AA:AA:AA:AA:AA:AA
10.0.0.4- DD:DD:DD:DD:DD:DD
10.0.0.4- DD:DD:DD:DD:DD:DD

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 51


COMMUNICATION DEVICES

 Repeaters
Co-axial medium 10Mbps
 Bridge
 Hub Twisted Pair 10Mbps

 Switch Twisted Pair 10/100/1000


 Router and Fiber Mbps

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 52


HUB

 Hub is a DUMB device

 Hub is an ELECTRICAL device

 Hub and Repeaters are similar devices but used on different media. Hub is used
over Twisted pair whereas repeaters are used on Thin wire/Thick wire cable.
 As soon as Hub receives an electrical signal on its port, it boosts the electrical
signal, restore the signal level and forward it to all other ports
 Hub EXTENDS the network
 Hub will boost the signal and make it capable of going another 100 meters

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 53


HUB
 Hub and Repeaters are Layer-1 Devices
 Every port of the Hub shares same bandwidth. Hub us a SHARED
BANDWIDTH DEVICE
 Every port of the HUB is a member of same Collision/Broadcast domain
 Hub is a SINGLE COLLISION/BROADCAST DOMAIN device

Advantages:
 Hub extends the network and increases the coverage area
 More computers can be connected

Disadvantages:
 By extending network & connecting more PCs probability of
acquiring medium reduces (performance degrades)
 Probability of Collision increases

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 54


SWITCH

Laptop
 Switch is an Intelligent Device
Desktop Desktop
 Switch and bridge are similar
devices but used on different
medium. Switches are used on
twisted pairs/fibers and Bridge
on Thin/Thick Wires

Laptop

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 55


SWITCH

 When switch receives a frames on its port it will open L2 info. Read MAC
Address, refer to MAC table to take forwarding decisions.
 Switch takes forwarding decisions on basis on MAC address. MAC address is
a layer 2 address and hence the switch is a layer 2 device
 As soon as switch receives a frame on its port, it will read MAC address, refer
it to the MAC table and forward the packet to the APPROPRIATE Port
 When switch receives the frame on its port, it Opens L2 information, reads
source MAC address and makes an entry in its MAC table against the port
number on which it was received
 Switch SEGMENTS network

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 56


SWITCH

 MAC table size should be precise and concise


 Performance purpose
 For quick reference and fast forwarding
 To conserve resources
 To keep table size precise an concise, entries in MAC table should be
controlled and stale entries should be deleted
 Any entry in MAC table that is not referred for a stipulated time is
considered stale and removed from MAC table. Stipulated time can be 5-20
minutes depending upon switch

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 57


SWITCH OPERATION
 If switch receives a Broadcast frame on a port, it creates multiple copies and
forwards it to all OTHER ports. (Switch Does not Broadcast)
 If the sender and receivers are connected on the same port then, switch will
block/discard the frame
 Switch SEGMENTS network whereas Hub EXTENDS the network
 Switch allows simultaneous communication between multiple communication
pairs connected on different ports
 Every port of the switch has its own dedicated bandwidth. Switch is a dedicated
bandwidth device.
 If Receiver is not known then switch forwards information to all other ports
 Every port of the switch is a member of different collision domain. Switch is a
MULTIPLE COLLISION DOMAIN device
 Every port of the switch is a member of same Broadcast domain. Switch is a
SINGLE BROADCAST DOMAIN device.

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 58


ROUTER

 Router is an Intelligent Device


 Router ROUTES between networks
 Routers are placed at gateways
where two or more network
connects

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 59


ROUTER

 As soon as a router receives a packet on its port, it will open layer 3 information
(Header), refer its routing table to take forwarding decisions
 Routing table is a layer-3 table and IP address is a layer-3 address, hence router is a
layer-3 protocol
 Routing entries in a routing table can be made statically (by admin) or dynamically
(by routing protocols)
 Router will route the packet between networks only if it has a route to reach the
destination
 Router routes between networks whereas switch switches within same subnet

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 60


ROUTER

 Router routes between networks, hence every port of the router must be in
different subnets. No 2 ports of a router can be in same subnet
 Every port of router is a member of separate collision and broadcast domain
 Router is a multiple collision/broadcast domain device

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 61


contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 62
IP ADDRESSING

 Layer-3 addressing method, logical addresses


 Unique for every machine
 32- bits divided in 4 octets separated by dots (Ex: 10.20.30.40)
 IP address is divided in 2 parts
 Network ID
 Hosts ID
 IP address without subnet mask is just a set of numbers, it has no
meaning

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 63


MASK

 Mask defines how many bits in the IP Address are NETWORK BITS.

10.10.10.1/24 Prefix Mask

10.10.10.1 255.255.255.0 Net Mask

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 64


CLASSFUL ADDRESSING

 Addresses are divided in 5 classes-

NETWORK ID HOST HOST HOST


CLASS A (0xxx) ID ID ID

NETWORK ID NETWORK HOST HOST


CLASS B
(10xx) ID ID ID

NETWORK ID NETWORK NETWORK HOST


CLASS C
(110X) ID ID ID

(1110)
CLASS D MULTICAST ADDRESS

(1111)
CLASS E Reserved for FUTURE Use

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 65


RANGE- IP CLASSES
CLASS FROM TO No. of N/W No. of Hosts
(Valid) (Valid)
CLASS A 0.0.0.0 127.255.255.255 27-1= 127 224-2=
16,777,214
CLASS B 128.0.0.0 191.255.255.255 214-1= 216-2=
16,384 65,534
CLASS C 192.0.0.0 223.255.255.255 221-1= 28 -1= 254
1,097,152
CLASS D 224.0.0.0 239.255.255.255 NA NA

CLASS E 240.0.0.0 255.255.255.255 NA NA

GREEN: Group ID
RED: Network ID

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 66


PRIVATE RANGES

FROM TO
10.0.0.0 10.255.255.255
172.16.0.0 172.31.255.255
192.168.0.0 192.168.255.255

 IP’s within these ranges an e used repeatedly as long as they


don’t onfli t in their network.
 These IP’s are not routa le on the internet.
 To fa ilitate the internet onne tions these IP’s are NATTED to
public IP.

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 67


DEFAULT MASK

Class Format Default Mask


Class A NW.Host.Host.Host 255.0.0.0
Class B NW.NW.Host.Host 255.255.0.0
Class C NW.NW.NW.Host 255.255.255.0

HOW TO READ:
 130.20.20.0/16 : Class B address with a DEFAULT MASK of 16-bits
 130.20.20.0/24 : Class B address with a SUBNET MASK of 24-bits
 130.20.20.0/8 : Class B address with a SUPERNET MASK of 8-bits

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 68


WHY SUBNETTING

Benefits of subnetting include-


 Reduced network traffic
 Optimized network performance
 Simplified management
 Facilitated spanning of large geographical
distances.

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 69


LET’S DO IT!

16.20.20.0/24

12 Users 24 users 28 users 30 users

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 70


HOW?
 There are two perspective:
 Network Point of View
Number of hosts assigned by head office= 256
Number of Networks required= 8
Maximum number of Hosts we can get in one network= 256/8= 32
(if we divide them equally)
No. of bits required to get 8 networks= 3
Add them to the network side
 Host Point of View
Consider branch that requires Maximum number of IP Addresses

METHOD:
1. Max. number of IPs + 2
2. Calculate No. of bits to meet new requirement
3. Deduct these from total number of HOST bits
4. Add the remainder to Network side

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 71


CHART:
No. of IPs PER BIT

| | | | | | | |

28 27 26 25 24 23 22 21
256 128 64 32 16 8 4 2

CHART:2

MASK 128 2 224 240 248 252 254 255

19 | | | | | | | |
PLACE
128 64 32 16 8 4 2 1
VALUE

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 72


FLSM vs VLSM

 FLSM (Fixed Length Subnet Mask) is a network in which all subnets have Fixed
Length Masks.
 VLSM (Variable Length Subnet Mask) is a network in which subnets have
variable masks.
 In FLSM, many IPs are wasted, hence its preferable to use VLSM over FLSM.

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 73


SUBNETTING EXAMPLES

Given: 16.20.20.0/24
Requirement: I need 6 host addresses in each network
Question A. 1st valid host address
Question B. 2nd from last broadcast address

ANSWER:
No. of hosts required + 2 IPs = 6+2=8
No. of bits required to have 8 IP addresses on host sides= 3
Remaining 5 bits on network side  16.20.20.0/29

 1st valid Host address = 16.20.20.1

 2nd last broadcast address= 16.20.20.247/29

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 74


SUBNETTING EXAMPLES
 Prefix mask  Net mask examples:
i. Represent 10.10.10.0/26 in Net Mask
ii. Represent 12.23.34.0 255.255.255.224 in Prefix Mask
iii. Represent 192.168.1.0/22 in Net Mask
iv. Represent 130.60.20.0 255.255.224.0 in Prefix Mask

ANSWERS:
i. 10.10.10.0/26  10.10.10.0 255.255.255.192
ii. 12.23.34.0 255.255.255.224  12.23.34.0/27
iii. 192.168.1.0/22 192.168.1.0 255.255.252.0
iv. 130.60.20.0 255.255.224.0  130.60.20.0/19

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 75


SUBNETTING EXAMPLES

DRAG AND DROP


NETWORK ADDRESSES:
1) 16.20.20.12/30
2) 16.20.20.17/30

1 6 Users 3) 16.20.20.64/29
3 4) 16.20.20.192/27
5) 16.20.20.32/28
8 Users
24 4
5 Users

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 76


PROBLEM

 For end to end packet delivery, every router should know the route to reach
every network. There are 2 main issues with this.
 Long Routing Tables
 Link Flapping issue
 Drawback of Long Routing Tables:
 More process times, hence packet delay
 More process power
 More storage space is required
 Flapping Drawbacks:
 Frequent Routing Table updates wastes most of the Bandwidth
 Processing Energy is wasted
 Packet forwarding delay

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 77


SUPERNETTING

 Instead of sending individual routes, send summarized routes.


 Summarization Rules:
 Only consecutive networks can be summarized
 You can summarize or power of networks ,4,8, 6…..
 You cannot summarize any two, four… consecutive networks. First address
must be a power of 2

10.0.0.0/24
10.0.1.0/24
10.0.2.0/24
10.0.3.0/24
10.0.4.0/24
10.0.5.0/24
10.0.6.0/24
10.0.7.0/24

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 78


SUPERNETTING

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 79


ROUTING

 Router IOS
 Cisco Router Components
 Boot Process
 Command Line Interface (CLI)
 Routing protocols and static routing

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 80


ROUTER IOS

 Carries Network Protocols and Functions


 Connects high speed traffic between network devices
 Adds security to network access
 Provides scalability for growth
 Supplies reliability

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 81


ROUTER BOOTUP PROCESS

 Three stage process


 Perform POST (Power On Self Test) and load Bootstrap Program
 Locate and load the Cisco IOS software
 Bootstrap Program performs this task
 By default IOS is stored in flash memory
 Locate Startup Configuration file or enter in Setup Mode.
 Bootstrap searches for startup config (present in NVRAM)
 Or else goes in Setup Mode.

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 82


ROUTERS- MODES OF OPERATION

 User Mode
 Privileged Mode
 Global Configuration Mode

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 83


EDITING COMMANDS FOR NETWORK GEEKS

Commands Explanation
Ctrl+A Moves the cursor to the begining of the line
Ctrl+E Moves the cursor to the end of the line
Esc+B Moves back one Word
Esc+F Moves forward one Word
Ctrl+R Redisplays a line
Ctrl+U Erases a line
Ctrl+W Erases a word
Ctrl+Z Ends configuration mode
TAB Finishes command for you

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 84


EDITING COMMANDS FOR NETWORK GEEKS

Commands Explanation
Ctrl+P Shows Last entered command
Ctrl+N Shows Previous commands entered
Show history Show last 10 commands entered by default
Show terminal Shows terminal configurations and history buffer size
Terminal history size Changes buffer size (max 256)

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 85


BASIC CONFIGURATION AND IMPORTANT
COMMANDS

 Configuring Hostname:
Router(config)# hostname <NAME>
 Configuring Banner:
Router(config)#banner motd ^c <TYPE THE BANNER>
 Configuring Password:
Router(config)#enable password
Router(config)#enable secret
 Interface configuration
Router(config)#
 …and many more

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 86


BASIC CONFIGURATION AND IMPORTANT
COMMANDS

 Configuring Hostname
 Configuring Banner
 Configuring Password
 Interface configuration
 …and many more

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 87


ROUTING

 WHAT DOES A ROUTER KNOW?


 Router knows about all the networks it can reach
 All paths to reach all networks
 Best path to reach all network
 Neighbor router

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 88


ROUTING

 IMPORTANT STATEMENTS:
 For end to end communication, it is not enough to have only forwarding
path, but having reverse path is also important.
 If you can reach one host on a network that does not mean you can reach all
hosts on that network.
 Initially router knows only about its directly connected neighbors, hence
can only communicate with them.
 Router must know the route to reach the destination network

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 89


STATIC vs DYNAMIC

 There are two ways to provide routes to the router


 Static Routing
 Provide the route manually
 Not very helpful in larger network
 Better when there is a need to provide a specific route
 Dynamic Routing
 Configuring Routing Protocols on routers
 Very useful in larger network
 Calculates the best path automatically

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 90


LEARNING A ROUTE THROUGH MULTIPLE
ROUTING PROTOCOLS

PROBLEM:
If a route is learnt from static entry and same is learnt from one of the routing
protocol and both paths are different, then which path to prefer?
SOLUTION:
Administrative Distance (AD)
This is a value associated with each routing protocol and also with static route.
Lower the AD value better the path.
So, the router will prefer the path dictated by the one with LOWER AD value.

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 91


ONE ROUTING PROTOCOL MULTIPLE PATHS

PROBLEM:
If there is only one Routing Protocol running on the router and it receives two
different routes to reach same network, then which one to prefer?
SOLUTION:
Metric:
This is a value associated with the path. Every routing protocol has a way to
calculate its own metric. Lower the Metric Better the path and hence preferred.

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 92


DYNAMIC ROUTING- ROUTING PROTOCOLS

 Routing protocols can be categorized as


 Interior Gateway Protocol
 Exterior Gateway Protocol
 Routing Protocols can also be categorized as
 Classful Protocols
 Classless Protocols
 …and also as
 Link state Routing
 Distance Vector Routing

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 93


DYNAMIC ROUTING- ROUTING PROTOCOLS

ROUTING PROTOCOL

 Interior Gateway Protocols (IGP):  Exterior Gateway Protocols (EGP):


– RIPv1 (CF/DV) – EBGP (CL/DV)
– RIPv2 (CL/DV) – EIGRP (CL/Ad. DV)
– IGRP (CF/DV) – OSPF (CL/LS)
– IBGP (CL/DV) – ISIS (CL/LS)

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 94


CLASSFUL ROUTING

 Classful Routing Protocols do not send subnet mask with


its route information
 Classful Routing automatically summarizes the mask at
Classful boundaries.
 May lead to Sub-optimal paths.
 Examples of Classful Routing Protocols:
• RIP Version 1 (RIPv1)
• IGRP

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 95


CLASSLESS ROUTING

 Classless Routing Protocol send subnet mask with IP route


information
 Classless routing protocols support variable-length subnet
masking (VLSM).
 Examples of classless routing protocols:
i. RIP Version 2 (RIPv2)
ii. EIGRP
iii. OSPF
iv. IS-IS

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 96


DISTANCE VECTOR ROUTING PROTOCOL

 These are the protocols in which…


 Updates are sent periodically (every 30/90 seconds)
 Entire Routing Table is sent as an update
 Updates are broadcasted
 Updates are sent to directly connected neighbors only and not to
the entire group
 Routers don’t have end-to-end visibility of the entire network,
Directly connected neighbors are the worlds
 Convergence is slow.
 RIP, IGRP and BGP are DISTANCE VECTOR Routing Protocols

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 97


ROUTING INFORMATION PROTOCOL

 Used for smaller networks


 Metric: Hop Count
 Maximum Hop Count: 15
 Administrative Distance: 120
 Load Balancing: over equal metric path (4 by default)
 RIP versions: RIPv1 and RIPv2
 RIPv1 sends updates on Broadcast address
 RIPv2 sends updates on Multicast address 224.0.0.9
 Encrypted Authentication between 2 RIPv2 routers

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 98


RIP TIMERS

• Update Timer: (default: 30 sec): Indicates how often the router will send out a routing
update
• Invalid Timer: (default: 180 sec): Indicates how long the route will remain in the
routing table before it gets invalid, if no new updates are received
• Hold-Down Timer: (default: 180 sec): Indicate how long RIP will suppress the route
that it has placed in HOLD state.
– HOLD state:
• Invalid timer has expired.
• Update received for a router marking that route with Metric 16 (unreachable)
• An update received from a router, with a higher metric than what is currently in
the routing table. (to prevent loops)
• Flush Timer: (default: 240 sec): Indicates how long a route can stay in the routing table
before its been flushed, if updates are not received

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 99


LINK STATE ROUTING PROTOCOL

 These are the protocols in which


 Updates are triggered and not periodic
 Updates are incremental, entire routing table is not sent as a part of
routing update
 Updates are sent as a multicast and not as broadcast
 Convergence is fast as updates are triggered
 Routers have end to end visibility of entire network through
topology table.
 OSPF and ISIS are Link State Routing Protocols

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 100


ADVANCED DISTANCE VECTOR ROUTING PROTOCOL

 Combination of both Distance vector and Link State routing


protocols
 Best features of both are used in this
 Best feature of D.V Simple Configuration
 Best feature of L.S triggered updates, convergence is fast
etc.
 Used only in EIGRP

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 101


ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL
(EIGRP)

 Classless Routing Protocol


 Cisco Proprietary Protocol
 Advanced Distance Vector Protocol
 Uses DUAL (Diffusion Update Algorithm) to determine Best Path to
reach destinations
 Neighbors are formed with only directly connected routers
 Mostly the EIGRP traffic is sent on Multicast Address 224.0.0.10
 Updates are incremental and triggered
 Summarization can be done on any router interface manually
 Administrative Distance:
 Internal EIGRP : Routes originating within local AS- 90
 External EIGRP: Routes coming from outside AS- 170
 Summary EIGRP: 5

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 102


EIGRP
 Maintains 3 tables
 Neighbor Table: List of all neighbor routers
 Topology Table: List of all routes in the AS
 Routing Table: Best routes to reach all networks

 Load Balancing:
 Load balancing on unequal metric path is possible.
 Default value: 4; Max Value: 6

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 103


EIGRP OPERATION

 When routers are up, they exchange Multicast Hellos.


 Neighbor relation is formed after this exchange. Only directly
connected routers can become neighbors
 Topology table will be exchanged, till every router reaches converged
state
 After every router reaches converged state…
 No more exchange of Topology table, only updates will be sent after
modification in the network topology.
 EIGRP DUAL is run to find the best path to reach all networks
 Multicast echoes are exchanged to check the connectivity (Keep
Alive)

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 104


EIGRP METRIC

 EIGRP is called COMPOSIT METRIC


 Bandwidth (K1) and Delay of the line (K3) is used by default to
calculate the distance Metric
 Reliability (K4/K5), MTU and Load (K2) are the other 3 parameters
that can be considered
 By default:
EIGRP METRIC= + delay * 256
�� ����

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 105


EIGRP- EXTRA

 EIGRP elects Next Best path at the same time, when it elects BEST
PATH
 Best Path is called as SUCCESSOR
 Next Best Path is called as FEASIBLE SUCCESSOR
 RULES:
 For a path to be considered as a feasible successor, its Advertised
Distance should be less than current Feasible Distance.
 For a path to be considered as a valid path, its AD should be less
than 2 times current FD

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 106


DUAL
(a)

FOR ROUTER C:
A

(1) FD AD Topology
(1) Via B 3 1 Successor
B D
Via D 4 2 Feasible Successor
(2) Via E 4 3
(2) (1)

C E AD: Advertised Distance


(1) FD: Feasible Distance

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 107


OPEN SHORTEST PATH FIRST- OSPF

 Linked State Routing Protocol


 Metric: COST
 Higher the Bandwidth Lower the Cost, Lower the Cost Better the Path.
8
 �� =
��
 Determine the Best Path to reach all networks: Dijkstra Shortest Path
Algorithm
 AD Value: 110
 Sends Mask as a part of updates hence supports VLSM
 Updates are triggered
 Load Balancing on EQUAL costs path
 Multicast Address: 224.0.0.5 and 224.0.0.6
 Every OSPF router carries the visibility of the entire network with the help of
Link State Database

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 108


TABLES

 Neighbor Table
 Topology Table- DATABASE Table
 EIGRP and other DV protocols: Info that just have been passed on
by neighbors
 They know the roadmap to their entire AREA
 Routing Table

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 109


THE PROBLEM

 OSPF is a highly scalable protocol and can scale up to 1000s of routers.


 Has end to end visibility every router knows about all routes to reach
entire networks
 Updates are triggered after each Network Modification. This includes
addition/deletion of the route from routing table
 High Process Utilization
 High Bandwidth Utilization
 High Memory Utilization

 Solution: Summarization

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 110


CONCEPT OF AREA

Area Border
Router (ABR)

AREA 1 AREA 2

AREA 0-
Internal BACKBONE
Router

Autonomous
System Boundary
Router (ASBR)

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 111


CONCEPT OF AREA

 All areas must connect to Area 0- One interface of ABR must


be connected to AREA 0
 All routers in an area have the same Topology Table
 Purpose: Localizing updates within a area
 Automatic Summarization is done at the ABR/ASBR only
 Hierarchical design is required

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 112


OSPF ROUTER ID

 In OSPF neighbors are identified by their RIDs


 RID is the highest IP of LOOPBACK interface.
 )n absence of LOOPBACK interface, it’s the )P of highest ACTIVE
INTERFACE when router starts
 RID is also Hardcoded in the configuration using router id command-
Highest Preference

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 113


OSPF NEIGHBOR RELATIONSHIP
 Determining own Router ID
 Hardcoded
 Loopback
 Physical
 Add interfaces to Link State Database dictated by Network Command
 Send Hello on those interfaces
 This is DOWN state: Sending Hello but still waiting to hear back
 Receives Hello
 Goes in INIT state
 Checks: Hello/Dead timer, Authentication password, Area ID, Net mask 
must be identical
 Other parameters: DR/BDR IP address, Router ID and Router Priority
 Reaches TWO WAY state.

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 114


OSPF NEIGHBOR RELATIONSHIP

 Determines Master-Slave Relationship


 Determines who will send the routing first
 This is an EX_START ST
 Higher priority  Masters
 Master sends Database Description Packets (DBD) like cliff notes
 Slave sends DBDs
 DBDs are Acknowledged and Reviewed
 Router Goes in LOADING state
 First slave reviews the DBD and asks for missing info through LINK STATE REQUEST
to Master
 Master sends response in terms of LINK STATE UPDATES
 Master sends LSR and Slave responds back with LSU
 Neighbors are Synchronized
 This is the FULL STATE
 Now, Dijkstra’s SPF algorithm is applied to chose the Best Path and put it in the
routing table
 Keep Alive are sent

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 115


DR/BDR

 DR/BDR listen on 224.0.0.6


 DROTHERS listen on 224.0.0.5
 DR/BDR is only for shared segments
 DR/BDR election is based on Router
Priority (Default: 1)
 If Router Priority is equal then the
Tie Breaker is the Router ID
 DROTHERS DO NOT need to
exchange their entire Routing info
with each other. Send it to only DR
and BDR
 Hence can stuck in TWO WAY state

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 116


OSPF PACKETS
 Hello:
 Sent every 10/30 sec
 Contains- Router ID, DR/BDR, Subnet Mask, Neighbors, Hello/Dead Intervals,
Auth Password, Router Priority, Area ID
 Neighbor relationship formation and keep alive
 Link State Request:
 Sent in Loading state for requesting detailed information about a Network
 Link State Update:
 Response LSR
 Contain Multiple LSA
 Link State Advertisement:
 Response of each sub request
 Link State Acknowledgement:
 Reliability Mechanism
 OSPF itself is a Reliability Protocol
 Data-Base Description:
 Cliff notes sent in Ex-start state

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 117


LSA TYPES

 LSA 1 (Router LSA): contains a list of links local to the


router and generated by all the routers in the area
 LSA 2 (Network LSA): Generated by DR, contains list of all
routers attached to it
 LSA 3 (Network Summary LSA): Generated by ABRs; Used
for inter-area communication
 LSA 4 (ASBR Summary LSA): Route to reach ASBR
 LSA 5 (External LSA): Generated by ASBR and contains
routes to reach destinations outside local AS.

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 118


VLANS

 Definition: A logical grouping of network users and resources connected to


administratively defined ports on a switch
 By default, all ports of a switch belong to VLAN 1
 Smaller Broadcast domains
 Organized by…
 Location
 Function
 Department
 Application of Protocol
 Advantages:
 Simplifies Network Management
 Eliminates unnecessary broadcast, hence improves network performance
 Logically separates the user/departments restricting access between them
 Removes physical boundaries

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 119


VLAN

MARKETING FINANCE

HR FINANCE

MARKETING HR  Access Link: A link that is a part of


only one VLAN
 Trunk Link: Carries multiple VLANs

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 120


VLAN MEMBERSHIP

 Two ways to configure it


 Statically: Manually assign one or more ports to a VLAN

 Dynamically: Based on the MAC address of the host. User can


connect to any physical port and still it will get same VLAN every
time. It requires MAC address to VLAN mapping. Cisco developed
VLAN MEMBERSHIP POLICY SERVER (VMPS) for this

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 121


FRAME TAGGING

 )t’s used to mark a packet with a VLAN number


 When the packet is sent over a trunk port, it is marked
(tagged) with the VLAN ID
 When a packet is going out of an Access port, VLAN tag is
removed, hence VLAN ID is transparent to the end devices

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 122


FRAME TAGGING METHODS

 Inter-Switch Link (ISL)


 Cisco Proprietary
 ISL encapsulates frames with 26 byte header and 4 byte trailer
increasing the overhead
 Supports Maximum of 1000 VLANs on a trunk port
 IEEE 802.1Q (dot1Q)
 Industry standard
 It embeds 4 byte VLAN tag into layer 2 header
 Supports maximum of 4096 VLANs on a trunk port

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 123


CONFIGURING VLANs

 Creating VLANs:
SW1(config)# vlan 100  VLAN created
SW1(config)# name <name>  Assigns a Name

 Assigning switch port to VLAN – Access Port:


SW1(config)# interface Gi0/1
SW1(config-if)# switchport mode access  Making the port Access
SW1(config-if)# switchport access vlan 100  Assigning VLAN to a port
SW1# show vlan

 Configuring a Trunk Link


SW1(config)# interface Gi0/1
SW1(config-if)# switchport mode trunk
SW1(config-if)# switchport trunk encapsulation <dot1q/isl>  Adding encapsulation

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 124


DYNAMIC TRUNKING PROTOCOL

 DTP negotiates whether a port becomes a TRUNK port at all


 DTP has 2 modes
 Desirable: Port will actively attempt to form a Trunk with neighbor switch
 Auto: Port will passively wait for the other switch to initiate the trunk
request

 Configuration:
SW1(config)# interface gi0/1
SW1(config-if)# switchport mode dynamic desirable
SW1(config-if)# switchport mode dynamic auto

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 125


VLAN TRUNCKING PROTOCOL- VTP

 Purpose: To maintain a database of configured VLAN for easier


management in a large switching environment
 Cisco Proprietary Protocol
 VLAN information is shared with the switches that are the part of same
VTP Domain through VTP Advertisements
 Modes of Operation:
 Server: Responsible for Creating, Deleting and modifying the VLAN entries
 Client: Cannot Create, Delete or Modify entries. Relies on updates from
other switches and forwards the advertisement on every trunk port
 Transparent: Switch maintains it’s own database and does not accept
VLAN information from any switch. It forwards the advertisement out on
its trunk port
 With every update the Revision number is incremented by 1

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 126


SWITCHING LOOP

 All ports of a switch belong to


A single Broadcast Domain.
 Broadcast packets are
C forwarded to all the ports
B
except the one it was received
on.
D  Switching loop causes a
E BROADCAST STORM, that
ends up chocking network
traffic

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 127


SPANNING TREE PROTOCOL

 Purpose: To prevent Broadcast Storms caused by switching loops


 Standard RFC: IEEE 802.1D
 STP builds a Topology of the network and identify whether there is
loop in the network
 One or more ports are blocked to avoid switching loop
 Blocked port can be reactivated, when necessary

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 128


BUILDING STP TOPOLOGY

 STP enabled switches exchange BPDUs (Bridge Protocol Data Units)


every two seconds
 These BPDUs are sent out on every port on a dedicated Multicast MAC
address- 01:80:C2:00:00:00

 Steps in Building STP Topology:


 Root Bridge Election
 Identifying Root Ports
 Identifying Designated Ports
 Placing ports in Blocking state if required

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 129


ROOT BRIDGE ELECTION

 Root Bridge is the central reference point of an STP topology


 Root bridge is elected on the basis of Bridge ID
 Bridge ID= Bridge Priority (16-bits) + MAC Address (48-bits)
 Default Bridge Priority- 32768
 Lowest Priority Wins
 IN case of equal Bridge Priorities, MAC address is the Tie-breaker and
Lowest MAC Address Wins
A

Priority 200
B C
Priority 32768 Priority 32768

D E
Priority 32768 Priority 32768

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 130


IDNTIFYING ROOT PORT

 The port with lowest path cost to reach Root Bridge is the Root Port
 Path cost is the cumulative cost to reach the Root Bridge
 Path cost info is mentioned in the BPDUs and the BPDU with lowest
path cost is considered as Superior BPDU and others are considered
as inferior BPDUs
 If path cost is equal, then select the port connected to neighbor switch
with lowest Bridge ID
 If all the paths go through the same neighboring switch then local port
that receives the lowest Port ID on it will become the Root Port
 Each switch can have only one root port
 Root Bridge does not have a Root Port

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 131


IDENTIFYING DESIGNATED PORT

 Only one designated port for each network segment


 Forwards BPDU frames to that network segment
 If two ports are eligible to become Designated port, then
there is a loop and one needs to be placed in the Blocking
state
 Designated ports are determined by the lowest cumulative
path cost
 If path cost is equal, then the Bridge-ID is the Tie-Breaker

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 132


STP PORT STATES
 BLOCKING:
 Initially all ports are placed in the BLOCKING State
 Will not learn MAC address.
 Listen to BPDUs but will not send
 LISTENING:
 Port will listen and send BPDUs to participate in Root Bridge,
Root/Designated port election
 Port will neither learn MAC nor will it forward the Frame
 LEARNING:
 Port continues to send and receive BPDUs
 Learns MAC addresses but doesn’t forward the frame yet
 FORWARDING:
 Port will send/receive the BPDUs, Learn MAC Addresses and Forward the
frames
 DISABLED:
 Port Administratively Shut Down

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 133


STP TIMERS

 HELLO TIMER:
 Determines how often switch sends BPDUs
 BPDUs are sent every 2 seconds, by default

 MAX AGED TIMER:


 Determines how long BPDU info is retained
 Default duration: 20 Sec

 FORWARDING DELAY:
 Introduced to ensure that STP has enough time to detect and
eliminate the loop
 Default Duration: 15 Sec
 Occurs Twice in the convergence process

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 134


RAPID SPANNING TREE PROTOCOL (RSTP)

 30-50 seconds of convergence delay (in STP) is not


acceptable today
 To eliminate this drawback, some modifications were made
to the protocol, resulting in new RFC standard- RFC
802.1w
 RSTP as well elects the Root Bridge and identifies
Root/Designated Port

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 135


RSTP- PORT ROLES

 Root Port:
 Port with Best path cost to reach Root Bridge
 Alternate Port:
 Backup root port that has a less desirable path cost
 Designated Port:
 Non-root port that represent the best path cost to reach Root port in each
Network Segment
 Backup Port:
 Designated port with less desirable path cost

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 136


RSTP- STATES

 DISCARDING:
 Neither will forward frames nor will learn MAC
 Listens to the BPDUs
 Alternate and Backup ports are in Discarding state
 LEARNING:
 Learn MAC Addresses
 Doesn’t forward Frames
 FORWARDING:
 Send/receive BPDUs, Learn MAC address and Forward frames
 Root and Designated Ports are placed in Forwarding state

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 137


ETHERCHANNEL- WHY?

 Multiple switches are connected to each other in a network


 They are connected through a trunk port to extend the VLANs to other
switch
 Only one Trunk port is used hence there is no redundancy and a hinder
that all other (access) ports will send the traffic on only one port to
send the traffic across to the other switch
 If multiple ports are used,
 Either spanning tree will block one or more ports to avoid loops
 Or If STP is disabled, then there will be a Switching loop

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 138


PORT AGGREGATION

 Port aggregation is bundling multiple Physical ports to form a single


logical port
 Provides redundancy (without placing any port in Blocking state) and
provides high Bandwidth
 Cisco’s implementation of Port Aggregation is called EtherChannel
 EtherChannel supports Fast Ethernet, Gigabit Ethernet and 10 G
Ethernet ports
 Maximum of 8 ports can be bundled on one EtherChannel
 EtherChannel can be configured on Access, Trunk and even on Layer 3
ports

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 139


ACTIVE ETHERCHANNEL

 All the ports must be configured identically for an


EtherChannel to become Active
 Following configurations must be identical on all the ports
in an EtherChannel
 Speed
 Duplex
 VLAN configurations including allowed VLANs on ports
 Trunking Encapsulation Protocol

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 140


CONFIGURING ETHERCHANNEL

 Two ways to do it
 Manual- Admin
SW1(config)#interface range gi0/1-4  Select a Range of ports
SW1(config-if)# channel-group 1 mode on  logical grouping
 Do the same config on other switch
 Make sure to have all settings equal
 Channel-group number is the port channel identifier
 Gi0/1-4  Port-channel 1
 Dynamic- Aggregation Protocols
 Port Aggregation Protocol (PAgP)- Cisco Proprietary
 Link Aggregation Control Protocol (LACP)- IEEE 802.3ad

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 141


PORT AGGREGATION PROTOCOL

 Modes of Operation:
 Auto- Waits for remote switch to initiate a channel
 Desirable- Actively tries to form a channel

 Port Channel will Form when…


 Switch A (Desirable) (Desirable) Switch B
 Switch A (Desirable) (Auto) Switch B

 Port channel will not form if…


 Both switches are configured with Auto settings
 One switch is configured with Desired and other Manually or with
LACP

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 142


LINK AGGREGATION CONTROL PROTOCOL

 Modes of Operation:
 Passive- Waits for remote switch to initiate a channel
 Active- Actively tries to form a channel

 Port Channel will Form when…


 Switch A (Active) (Active) Switch B
 Switch A (Active) (Passive) Switch B

 Port channel will not form if…


 Both switches are configured with Auto settings
 One switch is configured with Desired and other Manually or with
PAgP

 Along with 8 active ports, adding 8 more ports in standby state is


allowed in LACP

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 143


NETWORK ADDRESS TRANSLATION

 IPv4 range is not enough


 Private IPs are not routable on the internet
 Multiple Private IPs can be translated to few public addresses
 There are three types of NAT
 Static NAT
 Dynamic NAT
 NAT Overload (Port Address Translation)

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 144


NAT- TERMINOLOGY

 Inside Local:
 Specific IP addresses assigned to an inside host (actual IP- Private)
 Inside Global:
 The IP that represents the host (with private IP) over the outside
network (Translated IP- Public).
 Outside Global:
 The address assigned to an Outside Host (Public)
 Outside Local:
 The address that identifies an outside host to the inside network
(Mostly same as Outside Global)

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 145


NAT CONFIGURATION
 STATIC NAT:
Router (config)# int fa0/0
Router (config-if)# ip nat inside
Router (config)# int fa0/1
Router (config-if)# ip nat outside
Router (config)# ip nat inside source static 10.0.0.1 20.0.0.1

 DYNAMIC ROUTING:
Router (config)# int fa0/0
Router (config-if)# ip nat inside
Router (config)# int fa0/1
Router (config-if)# ip nat outside
Router (config)# ip nat pool POOL_NAME 72.10.1.1 72.10.1.50 netmask 255.255.255.0

 NAT OVERLOAD (PAT):


Router (config)# int fa0/0
Router (config-if)# ip nat inside
Router (config)# int fa0/1
Router (config-if)# ip nat outside
Router (config)# ip nat source list 10 interface fa0/1 overload
Router (config)# access-list 10 permit 10.0.0.0 0.0.0.255

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 146


ACCESS CONTROL LISTS (ACL)

 Purpose:
 To identify Traffic
 To filter traffic
 )t’s a set of rules, organized in a rule table
 Rules are either to allow or restrict the traffic
 Access Lists can be identified by either numbers or names

 Types of ACLs:
 Standard Access List – 1-99
 Extended Access List – 100-199
 Named Access Lists – Names

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 147


STANDARD ACCESS LIST

 Based on the source host/network IP address


 Advisable to place closest to the destination

 FORMAT:
Access-list [1-99] [permit|deny] [source address] [wild card mask]

 CONFIGURATION:
Router(config)# access-list 10 deny 172.18.0.0 0.0.255.255
Router(config)# access-list 10 permit any
Router(config)# int s0
Router(config-if)# ip access-group 10 in

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 148


EXTENDED ACCESS LIST

 Based on the source and destination IP addresses/networks. Also on


TCP/UDP port numbers
 Advisable to place near source network
 FORMAT:
Access-list [100-199] [permit|deny] [source address] [wild card
mask] [destination address] [wild card mask]

 CONFIGURATION:
Router(config)# access-list 101 permit tcp 172.18.0.0 0.0.255.255 host 172.16.10.10 eq 80
Router(config)# access-list 101 deny ip 172.18.0.0 0.0.255.255 172.16.0.0 0.0.255.255
Router(config)# access-list 101 permit ip any any
Router(config)# int e0
Router(config-if)# ip access-group 101 in

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 149


NAMED ACCESS LIST

 We can apply an identifiable name to an access list, for documentation


purposes.
 We can remove individual lines in a named access-list, which is not
possible with numbered access lists.

 CONFIGURATION:
Standard Named:
Router(config)# ip access-list standard NAME
Router(config-std-nacl)# deny 172.18.0.0 0.0.255.255
Router(config-std-nacl)# permit any
Extended Named:
Router(config)# ip access-list extended NAME
Router(config-ext-nacl)# permit tcp 172.18.0.0 0.0.255.255 host 172.16.10.10 eq 80
Router(config-ext-nacl)# deny ip 172.18.0.0 0.0.255.255 172.16.0.0 0.0.255.255
Router(config-ext-nacl)# permit ip any any

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 150


FIRST HOP REDUNDANCY PROTOCOL

 Three main First Hope Redundancy


Protocols
 Hot Standby Redundancy Protocol
 Virtual Router Redundancy
Protocol
 Gateway Load Balancing Protocol

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 151


HOT STANDBY REDUNDANCY PROTOCOL

 It provides a layer 3 redundancy to a network where default gateway is


configured
 Multiple routers are deployed at the edge of the network and along
with their physical address (MAC and IP) configured on the interfaces
they are assigned with a Virtual IP and MAC address
 Routers within same HSRP group must be assigned with same group
number
 )t’s a Redundancy protocol and not a Load Balancing protocol

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 152


ROUTER ROLES

 ACTIVE ROUTER: Currently serving as a gateway. Elected on the basis


of Priority. Highest priority router becomes Active

 STANDBY ROUTER: Backup router who will assume the services of


Active router after failover. Router with second highest priority
becomes Standby

 LISTENING ROUTER: All other routers participating in HSRP


R1

INSIDE NETWORK

R2

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 153


HSRP STATES

 Disabled: admin down/ HSRP not configured


 Initial: Router begins in this state once its configured for HSRP
 Learn: When HSRP does not know Virtual IP
 Listen: Knows VIP but is not elected as Active/standby
 Speak: Participating in Active/Standby election on the basis of Hello
packets
 Standby: Elected as Standby and exchanging hello packets with Active
Router
 Active: Elected as Active and exchanges hellos with Standby

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 154


HSRP CONFIGURATION

SW1(config)# int fa0/0


SW1(config-if)# standby 1 ip 10.0.0.3
SW1(config-if)# standby 1 priority 110
SW1(config-if)# standby 1 preempt

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 155


IPv6

 IPv4 has 32 bits IP address


 IPv4 address can provide (232 = 4,294,967,296)
 The number of usable addresses are much less than this, as
many IPs are used for experimental, diagnostic and
multicast purpose
 IPv6 has 128 bits of IP address, that comes out to be
340,282,366,920,938,463,463,374,607,431,768,211,456 IP
addresses.

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 156


FEATURES

 Increased Address Space and Scalability: Many available


IP addresses
 Simple Configuration: Allows hosts to auto-configure
their IPv6 addresses, based on network prefixes advertised
by routers.
 Integrated Security: Provides built-in authentication and
encryption into the IPv6 network header.
 Compatibility with IPv4: Simplifies address migration, as
IPv6 is backward-compatible with IPv4.

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 157


IPv6 ADDRESS

 IPv6 address is 128 bit long and is represented as


hexadecimal notation
 8 groups of 4 hex numbers are created and are separated
by colon
1423:0021:0C13:CC1E:3142:0001:2222:3333
 We can drop any leading zeros in each field of an IPv6
address
1423:21:C13:CC1E:3142:1:2222:3333

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 158


PREFIX ID AND HOST ID

 )Pv4 utilizes a subnet mask to define the network prefix


and host portions of an address.
 Full Address:
1254:1532:26B1:CC14:123:1111:2222:3333/64
 Prefix ID:
1254:1532:26B1:CC14
 Host ID:
123:1111:2222:3333

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 159


LINK LOCAL ADDRESS

 Link-local IPv6 addresses are used only on a SHARED link


(subnet)
 This address is not routed
 Every IPv6-enabled interface on a host (or router) is
assigned a link-local address.
 The first field of a link-localIPv6 address will always begin
FE8x
 A prefix of /10 is used for link-local addresses
FE80::1311:22FF:FE22:3333/10

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 160


WAN CONNECTION TYPES

 Leased lines – PPP, HDLC


 Packet switching- Frame Relay
 Circuit Switched (over telephone Network)– PPP, HDLC
 Metro Ethernet - Ethernet
 Broadband- PPPoE, Ethernet

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 161


POINT-TO-POINT PROTOCOL

 )t’s a standardized WAN encapsulation Protocol and can be used on


 ISDN
 Asynchronous Dial-up links
 Point to Point serial links

 PPP has 4 components:


 Physical: standard for physical serial communication (EIA/TIA-
232-C, V.35 etc.)
 HDLC: for encapsulating packets into frames
 LCP: for establishing, maintaining and terminating the link
 NCP: Allows multiple L3 protocols to be encapsulated

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 162


POINT-TO-POINT PROTOCOL

 It can work with more than just with TCP/IP. It works with IPX,
AppleTalk and many more.
 PPP has Authentication, Encryption and Compression Capabilities
 PPP session establishment is a three phase process:
 Link Establishment Phase: LCP (Link Control Protocol) packets
are exchanged to communicate the configurations
 Authentication Phase (Optional):
 Two protocols used-
 PAP (Password Authentication Protocol): password is sent in ASCI
(not encrypted)
 CHAP (Challenge Handshake Authentication Protocol): Never
sends Actual password on the wire, sends Hash value instead
 Network Layer Protocol Phase: NCP (Network Control Protocol)
packets are sent to negotiate the settings

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 163


CONFIGURATION

On Router 1:
NYC1# config t
NYC1 (config)# username NYC2 password cisco123  same on both routers
NYC1 (config)#interface serial1/0
NYC1 (config-if)# encapsulation ppp
NYC1 (config-if)#ppp authentication chap

On Router 2:
NYC2# config t
NYC2 (config)# username NYC1 password cisco123  same on both routers
NYC2 (config)#interface serial1/0
NYC2 (config-if)# encapsulation ppp
NYC2 (config-if)#ppp authentication chap

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 164


IP MAC
10.0.0.3 10.0.0.3 CCC

IP MAC
10.0.0.1 AAA
IP MAC
10.0.0.4 DDD
Ping 10.0.0.4

10.0.0.1

MAC PORT 10.0.0.4


FFF AAA 10.0.0.2 10.0.0.1 ARP
AAA PORT 1
DDD PORT 4
??? AAA 10.0.0.2 10.0.0.1 PING

IP MAC
10.0.0.2 BBB

10.0.0.2

contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 165


THANK YOU!

contact@networkraft.com
www.linkedin.com/company/networkraft

www.facebook.com/networkraft

Das könnte Ihnen auch gefallen