Beruflich Dokumente
Kultur Dokumente
contact@networkraft.com
www.linkedin.com/company/networkraft
www.facebook.com/networkraft
COURSE STRUCTURE
BASICS
ROUTING
SWITCHING
INDUSTRIAL TRAINING
BASICS:
Computer Networks
Cables
IP Addressing/Subnetting
Packet Flow
Network Devices
ROUTING:
Router Hardware
Routing Working
Static Routing
Dynamic Routing
RIP
EIGRP
OSPF
LAB
SWITCHING:
Switch Working
VLAN and Inter-VLAN Routing
DTP and VTP
Spanning Tree Protocol
Ether-channel
Redundancy Protocol
LAB
Access Lists
Natting
IPv6
PPP
Frame-Relay
MPLS
LAB
INDUSTRIAL TRAINING:
Incident Management
Change Management
Configuration Management
Troubleshooting Steps
Network Tools
Introduction
Computer Networks
LAN
OSI Reference Model – Kick start
Desktop 1 Desktop 2
Desktop 1 Desktop 2
Laptop
Effective
Laptop
communication
Desktop Desktop
Resource sharing
Laptop
Definition:
Desktop 1 Desktop 2
11010011 11010011
Electrical signal
Layer-2 addressing, flow control, address notification, error correction (low level)
Senses if the media is available for the communication or who has the access to the
media
Takes data from Higher Layers converts them into Segments and
transfers them to lower layers and vice versa
Responsibilities:
Translation
Can change the data type
Compression
Compress the data to send more information in same time
Encryption
Protects the data from interception and saves integrity
Application
Presentation MESSAGE
Session
Transport SEGMENT/DATAGRAM
Network PACKET
Data Link FRAME
Physical BITS
Options (0 or 32 if any)
Data (Varies)
TCP UDP
Sequenced Not sequenced (Random)
Reliable Unreliable
Connection-Oriented Connection-less
Acknowledgment No Acknowledgment
Flow Control and Windowing No Flow control and Windowing
Converged Network
VOICE VIDEO
Delay sensitive -> Minimal DATA
Delay sensitive -> delay is accepted but Packet
drops are not acceptable for Delay intensive
Delay not accepted QoE
QoE depends on
PRIORITY 1
Video
PRIORITY 2
PRIORITY 3
Converged network
Prioritization is critical
Media Types
Wired Wireless
Single Twisted
Multi-Mode Thick Wire
Mode Pair
UTP STP
CAT-4
CAT-5
CAT-6
Serial Communication
It takes a chunk of data and LINE DELIVERS it to other end
Line Delivering means superimposing low intensity signal on high
intensity signals
Ethernet:
Ethernet (10Mbps)
Fast Ethernet (100Mbps)
Gigabit Ethernet (1Gbps)
10GE (10Gbps)
Thin Wire
Co-axial cable 10Mbps180MetersRepeaters/Bridges
Thick Wire
Co-axial cable 10Mbps500MetersRepeaters/Bridges
Twisted Pair
STP/UTP10Mbps-10Gbps100MetersHub/Switch/Routers
Fiber
Fiber10Mbps-10Gbps500Meters-2KMSwitch/Routers
8 wires 4 pairs
If shielded with metal foil then STP
If not shielded with metal foil then UTP
Connector of STP also has metal body that in tern
connects to STP foil
CAT-610/100/1000MbpsThickestMost turns
Crosstalk Rule
Cancellation of EM waves
Straight Cable:
1Tx 1Rx
3Rx 3Tx
22
6 6
Cross Cable:
1Tx 3Rx
3Rx 1Tx
26
62
Straight Cross
Straight Cross
Cross Cross
Sx: Short Haul Lx: Long Haul Zx: Ultra Long Haul
Low intensity light Medium intensity More intense light
Short coverage – 500 light Most coverage
mts Medium coverage
Fundamental: CSMA/CD
Standard: 802.3
Protocol: ARPA (Cisco created this protocol for
supporting Ethernet on Cisco Routers)
00-1A-C2-A5-23-BC
DD:DD:DD
??? AA:AA:AA 10.0.0.4 10.0.0.1 DATA
Repeaters
Co-axial medium 10Mbps
Bridge
Hub Twisted Pair 10Mbps
Hub and Repeaters are similar devices but used on different media. Hub is used
over Twisted pair whereas repeaters are used on Thin wire/Thick wire cable.
As soon as Hub receives an electrical signal on its port, it boosts the electrical
signal, restore the signal level and forward it to all other ports
Hub EXTENDS the network
Hub will boost the signal and make it capable of going another 100 meters
Advantages:
Hub extends the network and increases the coverage area
More computers can be connected
Disadvantages:
By extending network & connecting more PCs probability of
acquiring medium reduces (performance degrades)
Probability of Collision increases
Laptop
Switch is an Intelligent Device
Desktop Desktop
Switch and bridge are similar
devices but used on different
medium. Switches are used on
twisted pairs/fibers and Bridge
on Thin/Thick Wires
Laptop
When switch receives a frames on its port it will open L2 info. Read MAC
Address, refer to MAC table to take forwarding decisions.
Switch takes forwarding decisions on basis on MAC address. MAC address is
a layer 2 address and hence the switch is a layer 2 device
As soon as switch receives a frame on its port, it will read MAC address, refer
it to the MAC table and forward the packet to the APPROPRIATE Port
When switch receives the frame on its port, it Opens L2 information, reads
source MAC address and makes an entry in its MAC table against the port
number on which it was received
Switch SEGMENTS network
As soon as a router receives a packet on its port, it will open layer 3 information
(Header), refer its routing table to take forwarding decisions
Routing table is a layer-3 table and IP address is a layer-3 address, hence router is a
layer-3 protocol
Routing entries in a routing table can be made statically (by admin) or dynamically
(by routing protocols)
Router will route the packet between networks only if it has a route to reach the
destination
Router routes between networks whereas switch switches within same subnet
Router routes between networks, hence every port of the router must be in
different subnets. No 2 ports of a router can be in same subnet
Every port of router is a member of separate collision and broadcast domain
Router is a multiple collision/broadcast domain device
Mask defines how many bits in the IP Address are NETWORK BITS.
(1110)
CLASS D MULTICAST ADDRESS
(1111)
CLASS E Reserved for FUTURE Use
GREEN: Group ID
RED: Network ID
FROM TO
10.0.0.0 10.255.255.255
172.16.0.0 172.31.255.255
192.168.0.0 192.168.255.255
HOW TO READ:
130.20.20.0/16 : Class B address with a DEFAULT MASK of 16-bits
130.20.20.0/24 : Class B address with a SUBNET MASK of 24-bits
130.20.20.0/8 : Class B address with a SUPERNET MASK of 8-bits
16.20.20.0/24
METHOD:
1. Max. number of IPs + 2
2. Calculate No. of bits to meet new requirement
3. Deduct these from total number of HOST bits
4. Add the remainder to Network side
| | | | | | | |
28 27 26 25 24 23 22 21
256 128 64 32 16 8 4 2
CHART:2
19 | | | | | | | |
PLACE
128 64 32 16 8 4 2 1
VALUE
FLSM (Fixed Length Subnet Mask) is a network in which all subnets have Fixed
Length Masks.
VLSM (Variable Length Subnet Mask) is a network in which subnets have
variable masks.
In FLSM, many IPs are wasted, hence its preferable to use VLSM over FLSM.
Given: 16.20.20.0/24
Requirement: I need 6 host addresses in each network
Question A. 1st valid host address
Question B. 2nd from last broadcast address
ANSWER:
No. of hosts required + 2 IPs = 6+2=8
No. of bits required to have 8 IP addresses on host sides= 3
Remaining 5 bits on network side 16.20.20.0/29
ANSWERS:
i. 10.10.10.0/26 10.10.10.0 255.255.255.192
ii. 12.23.34.0 255.255.255.224 12.23.34.0/27
iii. 192.168.1.0/22 192.168.1.0 255.255.252.0
iv. 130.60.20.0 255.255.224.0 130.60.20.0/19
1 6 Users 3) 16.20.20.64/29
3 4) 16.20.20.192/27
5) 16.20.20.32/28
8 Users
24 4
5 Users
For end to end packet delivery, every router should know the route to reach
every network. There are 2 main issues with this.
Long Routing Tables
Link Flapping issue
Drawback of Long Routing Tables:
More process times, hence packet delay
More process power
More storage space is required
Flapping Drawbacks:
Frequent Routing Table updates wastes most of the Bandwidth
Processing Energy is wasted
Packet forwarding delay
10.0.0.0/24
10.0.1.0/24
10.0.2.0/24
10.0.3.0/24
10.0.4.0/24
10.0.5.0/24
10.0.6.0/24
10.0.7.0/24
Router IOS
Cisco Router Components
Boot Process
Command Line Interface (CLI)
Routing protocols and static routing
User Mode
Privileged Mode
Global Configuration Mode
Commands Explanation
Ctrl+A Moves the cursor to the begining of the line
Ctrl+E Moves the cursor to the end of the line
Esc+B Moves back one Word
Esc+F Moves forward one Word
Ctrl+R Redisplays a line
Ctrl+U Erases a line
Ctrl+W Erases a word
Ctrl+Z Ends configuration mode
TAB Finishes command for you
Commands Explanation
Ctrl+P Shows Last entered command
Ctrl+N Shows Previous commands entered
Show history Show last 10 commands entered by default
Show terminal Shows terminal configurations and history buffer size
Terminal history size Changes buffer size (max 256)
Configuring Hostname:
Router(config)# hostname <NAME>
Configuring Banner:
Router(config)#banner motd ^c <TYPE THE BANNER>
Configuring Password:
Router(config)#enable password
Router(config)#enable secret
Interface configuration
Router(config)#
…and many more
Configuring Hostname
Configuring Banner
Configuring Password
Interface configuration
…and many more
IMPORTANT STATEMENTS:
For end to end communication, it is not enough to have only forwarding
path, but having reverse path is also important.
If you can reach one host on a network that does not mean you can reach all
hosts on that network.
Initially router knows only about its directly connected neighbors, hence
can only communicate with them.
Router must know the route to reach the destination network
PROBLEM:
If a route is learnt from static entry and same is learnt from one of the routing
protocol and both paths are different, then which path to prefer?
SOLUTION:
Administrative Distance (AD)
This is a value associated with each routing protocol and also with static route.
Lower the AD value better the path.
So, the router will prefer the path dictated by the one with LOWER AD value.
PROBLEM:
If there is only one Routing Protocol running on the router and it receives two
different routes to reach same network, then which one to prefer?
SOLUTION:
Metric:
This is a value associated with the path. Every routing protocol has a way to
calculate its own metric. Lower the Metric Better the path and hence preferred.
ROUTING PROTOCOL
• Update Timer: (default: 30 sec): Indicates how often the router will send out a routing
update
• Invalid Timer: (default: 180 sec): Indicates how long the route will remain in the
routing table before it gets invalid, if no new updates are received
• Hold-Down Timer: (default: 180 sec): Indicate how long RIP will suppress the route
that it has placed in HOLD state.
– HOLD state:
• Invalid timer has expired.
• Update received for a router marking that route with Metric 16 (unreachable)
• An update received from a router, with a higher metric than what is currently in
the routing table. (to prevent loops)
• Flush Timer: (default: 240 sec): Indicates how long a route can stay in the routing table
before its been flushed, if updates are not received
Load Balancing:
Load balancing on unequal metric path is possible.
Default value: 4; Max Value: 6
EIGRP elects Next Best path at the same time, when it elects BEST
PATH
Best Path is called as SUCCESSOR
Next Best Path is called as FEASIBLE SUCCESSOR
RULES:
For a path to be considered as a feasible successor, its Advertised
Distance should be less than current Feasible Distance.
For a path to be considered as a valid path, its AD should be less
than 2 times current FD
FOR ROUTER C:
A
(1) FD AD Topology
(1) Via B 3 1 Successor
B D
Via D 4 2 Feasible Successor
(2) Via E 4 3
(2) (1)
Neighbor Table
Topology Table- DATABASE Table
EIGRP and other DV protocols: Info that just have been passed on
by neighbors
They know the roadmap to their entire AREA
Routing Table
Solution: Summarization
Area Border
Router (ABR)
AREA 1 AREA 2
AREA 0-
Internal BACKBONE
Router
Autonomous
System Boundary
Router (ASBR)
MARKETING FINANCE
HR FINANCE
Creating VLANs:
SW1(config)# vlan 100 VLAN created
SW1(config)# name <name> Assigns a Name
Configuration:
SW1(config)# interface gi0/1
SW1(config-if)# switchport mode dynamic desirable
SW1(config-if)# switchport mode dynamic auto
Priority 200
B C
Priority 32768 Priority 32768
D E
Priority 32768 Priority 32768
The port with lowest path cost to reach Root Bridge is the Root Port
Path cost is the cumulative cost to reach the Root Bridge
Path cost info is mentioned in the BPDUs and the BPDU with lowest
path cost is considered as Superior BPDU and others are considered
as inferior BPDUs
If path cost is equal, then select the port connected to neighbor switch
with lowest Bridge ID
If all the paths go through the same neighboring switch then local port
that receives the lowest Port ID on it will become the Root Port
Each switch can have only one root port
Root Bridge does not have a Root Port
HELLO TIMER:
Determines how often switch sends BPDUs
BPDUs are sent every 2 seconds, by default
FORWARDING DELAY:
Introduced to ensure that STP has enough time to detect and
eliminate the loop
Default Duration: 15 Sec
Occurs Twice in the convergence process
Root Port:
Port with Best path cost to reach Root Bridge
Alternate Port:
Backup root port that has a less desirable path cost
Designated Port:
Non-root port that represent the best path cost to reach Root port in each
Network Segment
Backup Port:
Designated port with less desirable path cost
DISCARDING:
Neither will forward frames nor will learn MAC
Listens to the BPDUs
Alternate and Backup ports are in Discarding state
LEARNING:
Learn MAC Addresses
Doesn’t forward Frames
FORWARDING:
Send/receive BPDUs, Learn MAC address and Forward frames
Root and Designated Ports are placed in Forwarding state
Two ways to do it
Manual- Admin
SW1(config)#interface range gi0/1-4 Select a Range of ports
SW1(config-if)# channel-group 1 mode on logical grouping
Do the same config on other switch
Make sure to have all settings equal
Channel-group number is the port channel identifier
Gi0/1-4 Port-channel 1
Dynamic- Aggregation Protocols
Port Aggregation Protocol (PAgP)- Cisco Proprietary
Link Aggregation Control Protocol (LACP)- IEEE 802.3ad
Modes of Operation:
Auto- Waits for remote switch to initiate a channel
Desirable- Actively tries to form a channel
Modes of Operation:
Passive- Waits for remote switch to initiate a channel
Active- Actively tries to form a channel
Inside Local:
Specific IP addresses assigned to an inside host (actual IP- Private)
Inside Global:
The IP that represents the host (with private IP) over the outside
network (Translated IP- Public).
Outside Global:
The address assigned to an Outside Host (Public)
Outside Local:
The address that identifies an outside host to the inside network
(Mostly same as Outside Global)
DYNAMIC ROUTING:
Router (config)# int fa0/0
Router (config-if)# ip nat inside
Router (config)# int fa0/1
Router (config-if)# ip nat outside
Router (config)# ip nat pool POOL_NAME 72.10.1.1 72.10.1.50 netmask 255.255.255.0
Purpose:
To identify Traffic
To filter traffic
)t’s a set of rules, organized in a rule table
Rules are either to allow or restrict the traffic
Access Lists can be identified by either numbers or names
Types of ACLs:
Standard Access List – 1-99
Extended Access List – 100-199
Named Access Lists – Names
FORMAT:
Access-list [1-99] [permit|deny] [source address] [wild card mask]
CONFIGURATION:
Router(config)# access-list 10 deny 172.18.0.0 0.0.255.255
Router(config)# access-list 10 permit any
Router(config)# int s0
Router(config-if)# ip access-group 10 in
CONFIGURATION:
Router(config)# access-list 101 permit tcp 172.18.0.0 0.0.255.255 host 172.16.10.10 eq 80
Router(config)# access-list 101 deny ip 172.18.0.0 0.0.255.255 172.16.0.0 0.0.255.255
Router(config)# access-list 101 permit ip any any
Router(config)# int e0
Router(config-if)# ip access-group 101 in
CONFIGURATION:
Standard Named:
Router(config)# ip access-list standard NAME
Router(config-std-nacl)# deny 172.18.0.0 0.0.255.255
Router(config-std-nacl)# permit any
Extended Named:
Router(config)# ip access-list extended NAME
Router(config-ext-nacl)# permit tcp 172.18.0.0 0.0.255.255 host 172.16.10.10 eq 80
Router(config-ext-nacl)# deny ip 172.18.0.0 0.0.255.255 172.16.0.0 0.0.255.255
Router(config-ext-nacl)# permit ip any any
INSIDE NETWORK
R2
It can work with more than just with TCP/IP. It works with IPX,
AppleTalk and many more.
PPP has Authentication, Encryption and Compression Capabilities
PPP session establishment is a three phase process:
Link Establishment Phase: LCP (Link Control Protocol) packets
are exchanged to communicate the configurations
Authentication Phase (Optional):
Two protocols used-
PAP (Password Authentication Protocol): password is sent in ASCI
(not encrypted)
CHAP (Challenge Handshake Authentication Protocol): Never
sends Actual password on the wire, sends Hash value instead
Network Layer Protocol Phase: NCP (Network Control Protocol)
packets are sent to negotiate the settings
On Router 1:
NYC1# config t
NYC1 (config)# username NYC2 password cisco123 same on both routers
NYC1 (config)#interface serial1/0
NYC1 (config-if)# encapsulation ppp
NYC1 (config-if)#ppp authentication chap
On Router 2:
NYC2# config t
NYC2 (config)# username NYC1 password cisco123 same on both routers
NYC2 (config)#interface serial1/0
NYC2 (config-if)# encapsulation ppp
NYC2 (config-if)#ppp authentication chap
IP MAC
10.0.0.1 AAA
IP MAC
10.0.0.4 DDD
Ping 10.0.0.4
10.0.0.1
IP MAC
10.0.0.2 BBB
10.0.0.2
contact@networkraft.com
www.linkedin.com/company/networkraft
www.facebook.com/networkraft