CCNA Routing and Switching Chapter-1-2-3 MME
-
Upload
ratul-hasan -
Category
Documents
-
view
22 -
download
3
description
Transcript of CCNA Routing and Switching Chapter-1-2-3 MME
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 1:Exploring the Network
Introduction to Networks
Chapter 2:Configuring a Network OS
Chapter 3:Network Protocols and Communications
Mohammad Mamun ElahiAssistant Professor, Department of CSE
Instructor, UIU Cisco Networking Academy
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Providing Resources in a NetworkNetworks of Many Sizes
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Providing Resources in a NetworkClients and Servers
Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Providing Resources in a NetworkPeer-to-Peer
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs, WANs, and InternetsComponents of a Network
There are three categories of network components: Devices Media Services
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a NetworkNetwork Media
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a NetworkNetwork Representations
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a NetworkTopology Diagrams
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs and WANsTypes of Networks
The two most common types of network infrastructures are: Local Area Network (LAN) Wide Area Network (WAN).
Other types of networks include: Metropolitan Area Network (MAN) Wireless LAN (WLAN) Storage Area Network (SAN)
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs and WANsLocal Area Networks (LAN)
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs and WANsWide Area Networks (WAN)
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs, WANs, and InternetsThe Internet
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The InternetIntranet and Extranet
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs, WANs, and InternetsInternet Access Technologies
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting to the InternetConnecting Remote Users to the Internet
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting to the InternetConnecting Businesses to the Internet
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converged NetworksThe Converging Network
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable NetworkSupporting Network Architecture
As networks evolve, we are discovering that there are four basic characteristics that the underlying architectures need to address in order to meet user expectations: Fault Tolerance Scalability Quality of Service (QoS) Security
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable NetworkFault Tolerance in Circuit Switched Network
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable NetworkPacket-Switched Networks
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable NetworkScalable Networks
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable NetworkProviding (QoS)
Examples of priority decisions for an organization might include: Time-sensitive communication - increase priority for services
like telephony or video distribution. Non time-sensitive communication - decrease priority for web
page retrieval or email. High importance to organization - increase priority for
production control or business transaction data. Undesirable communication - decrease priority or block
unwanted activity, like peer-to-peer file sharing or live entertainment
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable NetworkProviding Network Security
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network TrendsData Centers
A data center is a facility used to house computer systems and associated components including: Redundant data communications connections High-speed virtual servers (sometimes referred to as server
farms or server clusters) Redundant storage systems (typically uses SAN technology) Redundant or backup power supplies Environmental controls (e.g., air conditioning, fire
suppression) Security devices
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Networking Technologies for the HomeTechnology Trends in the Home
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Networking Technologies for the HomeWireless Broadband
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Future of NetworkingNetwork Security
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network SecuritySecurity Threats
The most common external threats to networks include: Viruses, worms, and Trojan horses Spyware and adware Zero-day attacks, also called zero-hour attacks Hacker attacks Denial of service attacks Data interception and theft Identity theft
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network SecuritySecurity Solutions
Network security components often include: Antivirus and antispyware Firewall filtering Dedicated firewall systems Access control lists (ACL) Intrusion prevention systems (IPS) Virtual Private Networks (VPNs)
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 2
2.1 IOS Bootcamp
2.2 Getting Basic
2.3 Address Schemes
2.4 Summary
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco IOSOperating Systems
All networking equipment dependent on operating systems End users (PCs, laptops, smart phones, tablets) Switches Routers Wireless access points Firewalls
Cisco Internetwork Operating System (IOS) Collection of network operating systems used on Cisco devices
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco IOSOperating Systems
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco IOSLocation of the Cisco IOS
IOS stored in Flash Non-volatile storage – not lost when power is lost Can be changed or overwritten as needed Can be used to store multiple versions of IOS IOS copied from flash to volatile RAM Quantity of flash and RAM memory determines IOS that can be used
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco IOSIOS FunctionsMajor functions performed or enabled by Cisco routers and switches include:
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Accessing a Cisco IOS DeviceConsole Access Method
Most common methods to access the Command Line Interface Console Telnet or SSH AUX port
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Accessing a Cisco IOS DeviceConsole Access Method
Console port Device is accessible even if no networking services have been
configured (out-of-band) Need a special console cable Allows configuration commands to be entered Should be configured with passwords to prevent unauthorized
access Device should be located in a secure room so console port can not
be easily accessed
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Accessing a Cisco IOS DeviceTelnet, SSH, and AUX Access MethodsTelnet Method for remotely accessing the CLI over a network Require active networking services and one active interface that is
configured
Secure Shell (SSH) Remote login similar to Telnet but utilizes more security Stronger password authentication Uses encryption when transporting data
Aux Port Out-of-band connection Uses telephone line Can be used like console port
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Accessing a Cisco IOS DeviceTerminal Emulation Programs
Software available for connecting to a networking device PuTTY Tera Term SecureCRT HyperTerminal OS X Terminal
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Navigating the IOSCisco IOS Modes of Operation
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Navigating the IOSPrimary Modes
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Navigating the IOSGlobal Configuration Mode and Submodes
Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Navigating the IOSNavigating between IOS Modes
Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Navigating the IOSNavigating between IOS Modes (cont.)
Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Command StructureIOS Command Structure
Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Command StructureContext Sensitive Help
Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Command StructureCommand Syntax Check
Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Command StructureHot Keys and Shortcuts
Tab - Completes the remainder of a partially typed command or keyword
Ctrl-R - Redisplays a line Ctrl-A – Moves cursor to the beginning of the line Ctrl-Z - Exits configuration mode and returns to user EXEC Down Arrow - Allows the user to scroll forward through former
commands Up Arrow - Allows the user to scroll backward through former
commands Ctrl-Shift-6 - Allows the user to interrupt an IOS process such
as ping or traceroute. Ctrl-C - Aborts the current command and exits the configuration
mode
Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Command StructureIOS Examination Commands
Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Command StructureThe show version Command
Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
HostnamesWhy the Switch
Let’s focus on Creating a two PC network connected via a switch Setting a name for the switch Limiting access to the device configuration Configuring banner messages Saving the configuration
Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
HostnamesDevice Names
Some guidelines for naming conventions are that names should: Start with a letter Contain no spaces End with a letter or digit Use only letters, digits, and dashes Be less than 64 characters in length
Without names, network devices are difficult to
identify for configuration purposes.
Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
HostnamesHostnames
Hostnames allow devices to be identified by network administrators over a network or the Internet.
Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
HostnamesConfiguring Hostnames
Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Limiting Access to Device ConfigurationsSecuring Device Access
The passwords introduced here are:
Enable password - Limits access to the privileged EXEC mode
Enable secret - Encrypted, limits access to the privileged EXEC mode
Console password - Limits device access using the console connection
VTY password - Limits device access over Telnet
Note: In most of the labs in this course, we will be using simple passwords such as cisco or class.
Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Limiting Access to Device ConfigurationsSecuring Privileged EXEC Access
use the enable secret command, not the older enable password command
enable secret provides greater security because the password is encrypted
Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Limiting Access to Device ConfigurationsSecuring User EXEC Access
Console port must be secured• reduces the chance of unauthorized personnel physically
plugging a cable into the device and gaining device access
vty lines allow access to a Cisco device via Telnet• number of vty lines supported varies with the type of
device and the IOS version
Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Limiting Access to Device ConfigurationsEncrypting Password Display
service password-encryption prevents
passwords from showing up as plain text when viewing the configuration
purpose of this command is to keep unauthorized individuals from viewing passwords in the configuration file
once applied, removing the encryption service does not reverse the encryption
Presentation_ID 58© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Limiting Access to Device ConfigurationsBanner Messages important part of
the legal process in the event that someone is prosecuted for breaking into a device
wording that implies that a login is "welcome" or "invited" is not appropriate
often used for legal notification because it is displayed to all connected terminals
Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Saving ConfigurationsConfiguration Files
Switch# reloadSystem configuration has been modified. Save? [yes/no]: nProceed with reload? [confirm]
Startup configuration is removed by using the erase startup-configSwitch# erase startup-config
On a switch you must also issue the delete vlan.dat
Switch# delete vlan.dat Delete filename [vlan.dat]?Delete flash:vlan.dat? [confirm]
Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Saving ConfigurationsCapturing Text
Presentation_ID 61© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ports and AddressesIP Addressing in the Large Each end device on a
network must be configured with an IP address
Structure of an IPv4 address is called dotted decimal
IP address displayed in decimal notation, with four decimal numbers between 0 and 255
With the IP address, a subnet mask is also necessary
IP addresses can be assigned to both physical ports and virtual interfaces
Presentation_ID 62© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ports and AddressesInterfaces and Ports Network communications depend on end user device interfaces,
networking device interfaces, and the cables that connect them Types of network media include twisted-pair copper cables, fiber-
optic cables, coaxial cables, or wireless Different types of network media have different features and benefits Ethernet is the most common local area network (LAN) technology Ethernet ports are found on end user devices, switch devices, and
other networking devices Cisco IOS switches have physical ports for devices to connect to, but
also have one or more switch virtual interfaces (SVIs - no physical hardware on the device associated with it; created in software)
SVI provides a means to remotely manage a switch over a network
Presentation_ID 63© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Addressing DevicesConfiguring a Switch Virtual Interface
IP address - together with subnet mask, uniquely identifies end device on internetwork
Subnet mask - determines which part of a larger network is used by an IP address
interface VLAN 1 - interface configuration mode ip address 192.168.10.2 255.255.255.0 - configures the IP address
and subnet mask for the switch no shutdown - administratively enables the interface Switch still needs to have physical ports configured and VTY lines to
enable remote management
Presentation_ID 64© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Addressing DevicesManual IP Address Configuration for End Devices
Presentation_ID 65© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Addressing DevicesAutomatic IP Address Configuration for End Devices
Presentation_ID 66© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Addressing DevicesIP Address Conflicts
Presentation_ID 67© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verifying ConnectivityTest the Loopback Address on an End Device
Presentation_ID 68© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verifying ConnectivityTesting the Interface Assignment
Presentation_ID 69© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verifying ConnectivityTesting End-to-End Connectivity
Presentation_ID 70© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 3
3.1 Rules of Communication3.2 Network Protocols and Standards3.3 Moving Data in the Network3.4 Summary
Presentation_ID 71© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The RulesWhat is Communication?
Presentation_ID 72© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The RulesMessage Formatting and Encapsulation
Example: Personal letter contains the following elements: An identifier of the recipient A salutation or greeting The message content A closing phrase An identifier of the sender
Presentation_ID 73© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The RulesMessage Delivery Options
Presentation_ID 74© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
ProtocolsRules that Govern Communications
Presentation_ID 75© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
ProtocolsNetwork Protocols How the message is formatted or structured The process by which networking devices share information
about pathways with other networks How and when error and system messages are passed
between devices The setup and termination of data transfer sessions
Presentation_ID 76© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
ProtocolsInteraction of Protocols Application Protocol – Hypertext Transfer Protocol (HTTP) Transport Protocol – Transmission Control Protocol (TCP) Internet Protocol – Internet Protocol (IP) Network Access Protocols – Data Link & Physical layers
Presentation_ID 77© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Protocol SuitesProtocol Suites and Industry Standards
Presentation_ID 78© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Protocol SuitesTCP/IP Protocol Suite and Communication
Presentation_ID 79© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reference ModelsThe OSI Reference Model
Presentation_ID 80© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reference ModelsThe TCP/IP Reference Model
Presentation_ID 81© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reference ModelsComparing the OSI and TCP/IP Models
Presentation_ID 82© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data EncapsulationCommunicating the Messages Segmenting message benefits
Different conversations can be interleavedIncreased reliability of network communications
Segmenting message disadvantageIncreased level of complexity
Presentation_ID 83© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data EncapsulationProtocol Data Units (PDUs) Data Segment Packet Frame Bits
Presentation_ID 84© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data EncapsulationEncapsulation
Presentation_ID 85© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data EncapsulationDe-encapsulation
Presentation_ID 86© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Moving Data in the NetworkAccessing Local Resources
Presentation_ID 87© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Accessing Local ResourcesNetwork Addresses & Data Link addresses Network Address
Source IP addressDestination IP address
Data Link AddressSource data link addressDestination data link address
Presentation_ID 88© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Accessing Local ResourcesCommunicating with Device / Same Network
Presentation_ID 89© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Accessing Local ResourcesMAC and IP Addresses
PC1192.168.1.110
AA-AA-AA-AA-AA-AA
PC2192.168.1.111
BB-BB-BB-BB-BB-BB
FTP Server192.168.1.9
CC-CC-CC-CC-CC-CC
R1192.168.1.1
11-11-11-11-11-11ARP
RequestS1 R1
Presentation_ID 90© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Accessing Remote ResourcesDefault Gateway
PC 1192.168.1.110
AA-AA-AA-AA-AA-AA
PC 2192.168.1.111
BB-BB-BB-BB-BB-BB
FTP Server192.168.1.9
CC-CC-CC-CC-CC-CC
R1192.168.1.1
11-11-11-11-11-11
R2172.16.1.99
22-22-22-22-22-22
Web Server172.16.1.99
AB-CD-EF-12-34-56
Presentation_ID 91© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Accessing Remote ResourcesCommunicating Device / Remote Network
Presentation_ID 92© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Accessing Remote ResourcesUsing Wireshark to View Network Traffic
Presentation_ID 93© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential