Sunteți pe pagina 1din 168

Copyright | HP Education

1
Introduction to
Computer Networks
Copyright | HP Education
2
Computer Network
Interconnection of two or more computers and peripherals
Allows user to share and transfer information
Copyright | HP Education
3
Types of Computer Networks
Computer
Networks
Local
Area Network
(LAN)
Campus
Area Network
(CAN)
Metropolitan
Area Network
(MAN)
Wide
Area Network
(WAN)
3
Networks are classified depending on the geographical area covered by the
network
Copyright | HP Education
4 4
Local Area Network (LAN) - I
Covers a small area
Connects computers and workstations covering a local area like, office or home
Copyright | HP Education
5 5
Local Area Network (LAN) - II
Advantages of LAN:
Improves productivity due to faster work
Provides easy maintenance
New systems can be installed and configured easily
Disadvantages of LAN:
Limited number of systems can only be connected
Cannot cover large area
Network performance degrades as number of users exceeds
Copyright | HP Education
6
Types of LAN
LAN
Types
Ethernet
Token
Ring
Token Bus FDDI
6
LANs are classified depending on the techniques used for data sharing
Copyright | HP Education
7 7
Campus Area Network (CAN)
Made up of multiple LANs within limited area
Connects different LANs in a campus
Copyright | HP Education
8
Interconnects networks within a city
Supports data and voice transmission

8
Metropolitan Area Network
Copyright | HP Education
9
Covers a wide geographical area which includes multiple computers or LANs e.g.
Internet

9
Wide Area Network
Copyright | HP Education
10 10
Client/Server Configuration
Consists of two elements, Client and Server
Server:
A centralized element which provides resources to client
Manages data, printers or network traffic
Client:
Manages local resources used by users such as monitor, keyboard, CPU and
peripherals
Copyright | HP Education
11 11
Open System Interconnection (OSI) Model - I
Also known as ISO-OSI Reference Model
Developed by International Organization for Standardization (ISO)
Describes flow of information from one computer to another
Consists of seven layers
Copyright | HP Education
12 12
Open System Interconnection (OSI) Model - II
Copyright | HP Education
13
Topologies
13
Copyright | HP Education
14
Introducing Topologies
Topology refers to physical or logical arrangement of network
Physical topologies are
Single Node
Bus
Star
Ring
Mesh
Tree
Hybrid
14
Copyright | HP Education
15
Single device, at times device called dumb terminal is connected to the server
Devices operates on files from server and returns them back after completing task

15
Single Node Topology - I
Copyright | HP Education
16 16
Disadvantages:

Network consists of single device

Dumb terminal is dependent on
server





Advantages:

Easy to install, configure and
manage

Least expensive

Single cable is required



Single Node Topology - II
Copyright | HP Education
17 17
Bus topology - I
All devices are connected to a common cable called trunk
Maximum segment length of cable is 200 m
Maximum of 30 devices per segment

Copyright | HP Education
18 18
Bus topology - II
Server is at one end and devices are at different positions
50 ohm terminator is used
Devices are not responsible for data transmission
Number of collisions are more
Usually uses Thinnet or Thicknet
Performance degrades as more computers are added to the bus.

Copyright | HP Education
19 19
Bus topology - III
Advantages:

Installation of devices is easy

Requires less cable compared to
star topology

Less expensive and works better for
smaller networks


Disadvantages:

If backbone breaks, entire network
gets down

Difficult to isolate problems

Limited number of devices


Copyright | HP Education
20
Star Topology - I
Each device is connected to a central device called hub through cable
Data passes through hub before reaching destination
If a computer goes down, the network functions normally.

20
Copyright | HP Education
21
Star Topology - II
Advantages:

Easy to install, configure, manage
and expand

Centralized management

Addition or removal of device does
not affect the whole network


Disadvantages:

Requires more cable

Failure of hub affects entire
network
More Expensive




21
Copyright | HP Education
22
Ring Topology - I
Devices are connected in a closed loop
All devices have equal access to media
Most common type is Token Ring
Each computer acts as a repeater and
keeps the signal strong

22


Copyright | HP Education
23
Ring Topology - II
Advantages:

Data travels at greater speed

No collisions

Handles large volume of traffic

Disadvantages:

More cabling is required compared
to bus

One faulty device affects the entire
network

Addition of devices affect network

23
Copyright | HP Education
24
Dual Ring Topology
Consists of two independent primary
and secondary rings

Secondary ring is redundant, used only
when primary stops functioning


24
Copyright | HP Education
25
Mesh Topology - I
Used in WANs to interconnect LANs
Every device is connected to every
other device
Use routers to determine the best path
of communication
25
Copyright | HP Education
26
Mesh Topology - II
Full mesh topology All devices are connected to each other
Partial mesh topology - Some devices are connected to only those with whom they
exchange most of the data
26
Types
Full mesh Partial mesh
Copyright | HP Education
27
Mesh Topology - III
Advantages:

Improves fault tolerance

Failure of one link does
not affect entire network

Centralized
management is not
required
Disadvantages:

Difficult to install and
manage

Each link from one
device to other requires
individual NIC

Very much expensive
27
Copyright | HP Education
28
Tree Topology - I
Connects groups of star networks
Devices are wired to root hub
Root hub is connected to second level
devices
Lowest level devices are smaller
computers

28
Copyright | HP Education
29
Tree Topology - II
Advantages:
Easy to add new
devices
Point-to-point wiring for
each device
Fault detection is easy

Disadvantages:
Difficult to configure
If backbone breaks,
entire network goes
down
More expensive

29
Copyright | HP Education
30
Hybrid Topology - I
Combines two or more different physical topologies
Commonly Star-Bus or Star-Ring
Star-Ring uses Multistation Access Unit (MAU)
30
Copyright | HP Education
31
Hybrid Topology - II
Advantages:

Used for creating larger
networks

Handles large volume of
traffic

Fault detection is easy


Disadvantages:

Installation and
configuration is difficult

More expensive than
other topologies

More cabling is required


31
Copyright | HP Education
32
Transmission Media
Copyright | HP Education
33
Segment Length Length of single wire
Attenuation Indicates loss of signal
Bandwidth Amount of data carried by cable
Number of Segments Maximum number of
segments in network
Cost Copper cables are cheapest, fiber optic cables
are expensive
Interference susceptibility and crosstalk Defines
concept of electronic interference on cables

33
Characteristics of Cables
Copyright | HP Education
34
Types of cables
Copper medium is the cheapest mode of data transfer
Types of cables
Coaxial cable Twisted pair cables
34
Copyright | HP Education
35
Consist of a solid copper core surrounded by an insulator mainly made up of Poly
Vinyl Chloride (PVC) or Teflon
Coaxial cables are less prone to interference (both internal and external)
35
Coaxial cable
Copyright | HP Education
36
Types of Coaxial cable
Coaxial cables are mainly divided into four categories
Types of
Coaxial cables
RG58 RG8 RG6 RG59
36
Copyright | HP Education
37
Maximum segment length is 200 (185) meters
Interference protection is better than twisted pair cables
BNC-T connector is used to connect this cable
Used in thinnet (10BASE2) network
Mostly used in changing environments
37
RG58
Copyright | HP Education
38
Maximum segment length is 500 meters
Interference protection is good compared to any copper cable
BNC-T or Vampire Tap connector is used to connect this cable
Used in 10BASE5 network

38
RG8
Copyright | HP Education
39
RG6
Broadband quad-shielded cable
Provides lower attenuation characteristics
Useful in cable TV, CCTV and satellite dish
antenna
39
Copyright | HP Education
40
RG59
Solid conductor is surrounded by a
foam polyethylene dielectric
Useful in security camera, cable TV and
home theatre
40
Copyright | HP Education
41
Twisted Pair Cables
A pair of cables twisted around each other forms a twisted pair cable.
Twisted Pair cables
Unshielded
Twisted Pair
Shielded
Twisted pair
41
Copyright | HP Education
42
UTP Cables
Pair of unshielded wires wound around
each other

Easily gets affected by EMI, RFI and crosstalk

Maximum segment length is 100 meters

42
Copyright | HP Education
43
UTP
Cat
1
Cat
2
Cat
3
Cat
4
Cat
5
Cat
5e
Cat
6
Cat
7
43
UTP Cable Types
Copyright | HP Education
44
STP Cables
Pair of wires wound around each other
is placed inside shield
Better protection from EMI, RFI and
crosstalk as compared to UTP
Maximum segment length of 100
meters
44
Copyright | HP Education
45
Consists of centre glass core surrounded by cladding
Electrical signals are converted into light signals
LED or laser is used to transmit signal
45
Fiber Optic Medium
Copyright | HP Education
46
Bandwidth Carries large amount of data ranging from 100 Mbps to 1 Gbps
Segment Length Transmits data signals over larger distance
Interference No electric signals pass through these types of cables thus providing
security
46
Fiber Optic Cable Characteristics
Copyright | HP Education
47
Fiber Optic Cable Types
Fiber optic cables can carry signals in a single direction.
Fiber Optic Cable
Types
Single Mode Multi mode
47
Copyright | HP Education
48
A type of cable that has only a single strand of glass fiber with a thin diameter.
Fiber optic cables that use lasers are known as single mode cable.
48
Single Mode Fiber Optic cable
Copyright | HP Education
49
A type of cable that contains a glass fiber with a larger diameter.
It is a 62.5/125 micrometer fiber cable.
49
Multi Mode Fiber Optic cable
Copyright | HP Education
50
Straight Tip (ST) Joins individual fibers to optical devices
Subscriber Connector (SC) Attaches two fibers to send and receive signals
Medium Interface Connector (MIC) Joins fiber to FDDI controller
Sub Miniature Type A (SMA) Uses individual connectors for each fiber stand
Fiber Jack Attaches two fibers in snap lock connector
50
Fiber Optic Cable Connectors
Copyright | HP Education
51
Media Comparison
Characteristics UTP STP Coaxial Cables Fiber Optic Cables
Bandwidth 10 Mbps 100
Mbps
10 Mbps 100
Mbps
10 Mbps 100 Mbps - 1 Gbps
Maximum cable
segment
100 meters 100 meters 200 500 meters 2 k.m. 100 k.m.
Interference rating Poor Better than UTP Better than twisted
pair wires
Very good as
compared to
any other cable
Installation cost Cheap Costly than UTP Costly than twisted
pair wires
Most costly to
install
Bend radius 360 degrees / feet 360 degrees / feet 360 degrees / feet or
30 degrees /
feet
30 degrees / feet
Security Low Low Low High
51
Copyright | HP Education
52
Internetworking
Devices
Copyright | HP Education
53
Introducing Network Elements
Networking devices interconnects networks
Manage data flow and network traffic
Networking
Devices
Repeaters Hubs Bridges Switches Routers Gateways
Other
Devices
53
Copyright | HP Education
54
Operate at Physical Layer of the OSI model
54
Repeaters
Reshape the weak signal
Connect two segments of the same LAN
Copyright | HP Education
55 55
Hubs - I
Simplest and low cost device
Also known as Multi-port Repeater
Operate at Physical Layer like Repeater
Data transfer to all the ports
Hub types:
Active hub Provides signal regeneration
Passive hub No signal regeneration
Intelligent hub Provides management of each port
Copyright | HP Education
56 56
Operation of Hub
Copyright | HP Education
57 57
Bridges - I
Layer 2 devices
as works at Data
Link Layer of the
OSI model
Interconnect
multiple LANs
and manages
data flow
Copyright | HP Education
58 58
Bridges - II
Working of a bridge
Copyright | HP Education
59
Bridges - III
Capable of passing a frame
Check Physical address
Pass frame to the specified segment
Perform error checking on the frame
Bridges
Transparent
Bridge
Translational
Bridge
Source-route
Bridge
59
Copyright | HP Education
60
Features
Easy to use as just plug in device
Helps in network expansion
Divides large network into small segments
Used for increasing network reliability
Disadvantages
Frames are buffered so provides network delay
During high traffic may overload network
Does not filter broadcast packets
Expensive than Repeaters
60
Bridges - IV
Copyright | HP Education
61
Switches
Switching
Methods
Cut-through
Method
Store &
Forward
Method
Fragment-Free
Method
61
Provide signal flow management
Replace slower hub
Being a Data Link Layer device uses MAC address
for data transfer
Data transfer to specific port
Copyright | HP Education
62 62
Routers - I
Operate at Network Layer of the OSI model
Can connect nearer or far network segments
Copyright | HP Education
63 63
Routers - II
Decide the best route with the help of network layer
address
Responsible for Source to Destination delivery of
packet
Route types:
Static route Routing tables are manually configured
Dynamic route Routing tables are automatically
configured
Copyright | HP Education
64 64
Routing Protocols - I
Helps routers to learn network topology and
network changes
Routing algorithms are used by routing protocols for
deciding the path


Copyright | HP Education
65
Gateways - I
Gateway
Types
Address
Gateway
Protocol
Gateway
Application
Gateway
Transport
Gateway
65
Operate at all layers of the OSI model
Act as gate to other networks
A default gateway is on the same subnet as your
computer
Copyright | HP Education
66 66
Gateways - II

Address Gateway Interconnects same protocol
networks
Protocol Gateway Interconnects different protocol
networks
Application Gateway Connects two parts of
applications
Transport Gateway Connects networks at
transport layer
Copyright | HP Education
67
Other Devices - I
Other
Devices
Multi-Protocol
Routers
Brouters
Layer 3
Switches
67
Multi-protocol router supports multiple
communication protocols
Like router, it operates at Network Layer
Copyright | HP Education
68 68
Other Devices - II
Brouter provides combined functions of Bridge and
Router
Works at two layers, Data Link and Network
Can operate only as bridge or only as router
High performance switch operating at network layer
is Layer 3 Switch
Copyright | HP Education
69
Network Protocols

Copyright | HP Education
70
Set of predefined rules used by devices in network for data transfer
Network Protocols:
TCP/IP
ARP/RARP
ICMP/IGMP
UDP
IPX/SPX
HDLC/SDLC
70
Introducing Protocols
Copyright | HP Education
71
Two layer communication protocol used by Internet
TCP provides connection-oriented reliable transport service
Divides the message into smaller packets called segments
IP is a connectionless and unreliable datagram protocol and provides no error
checking
IP transfers data in the form of packets called datagrams
71
TCP/IP
Copyright | HP Education
72
TCP/IP Protocol Suite
Designed before OSI model
Consists of five layers
Provides independent protocols at
each layer
72
Copyright | HP Education
73
To deliver packet both physical and logical addresses are necessary
Address Resolution Protocol (ARP) provides physical address when logical address is
known
Reverse Address Resolution Protocol (RARP) maps logical address to physical address
RARP is useful when device is booted for first time
73
ARP/RARP
Copyright | HP Education
74
Internet Control Message Protocol (ICMP) provides error reporting and query
management mechanism
ICMP handles problems occurring while packet transmission
Internet Group Message Protocol (IGMP) manages multicasting and group
membership of devices


74
ICMP/IGMP
Copyright | HP Education
75
User Datagram Protocol (UDP) provides connectionless process-to-process
communication
UDP packets are called user datagrams.
User Datagram Format:

75
UDP
Copyright | HP Education
76
Novell NetWare system uses IPX/SPX as communication protocol within networks
IPX (Internetwork Packet Exchange) operates at Network layer for connectionless
communication
SPX (Sequenced Packet Exchange) operates at Transport layer for connection-
oriented communication
Together, IPX/SPX provides same services as TCP/IP
76
IPX/SPX
Copyright | HP Education
77 77
IPX/SPX Protocol Suite
Copyright | HP Education
78
High Level Data Link Control (HDLC) and Synchronous Data Link Control (SDLC) are
bit-oriented synchronous protocols in which data frames are interpreted as series
of bits
Both are useful for half-duplex and full-duplex communication
Windows XP still support DLC
78
HDLC/SDLC
Copyright | HP Education
79
Protocols at Different Layers

OSI Layers Protocols
Physical Layer No protocols defined
Data Link Layer HDLC, SDLC
Network Layer NetBEUI, IP, ICMP, IGMP, ARP, RARP, IPX
Transport Layer NetBEUI, TCP, UDP, SPX
Session Layer NetBIOS, SAP, SMTP, FTP, DNS, SNMP,
Presentation Layer NCP, RIP, NLSP, SMTP, FTP, DNS, SNMP, NFS
Application Layer SMTP, DNS, SNMP, NFS, TFTP
79
Copyright | HP Education
80
TCP/IP Services and Applications
Copyright | HP Education
81
Specifies how mail should be delivered from one system to another
Standard protocol used for transferring email from one computer to another
Makes connection between senders server and recipient and then transfer
messages

81
Simple Mail Transfer Protocol (SMTP)
Copyright | HP Education
82
A two-way transmission channel established between the sender SMTP and a
receiver SMTP










Commands are generated by sender SMTP and sent to receiver SMTP
82
SMTP Work Flow
Copyright | HP Education
83
Set of rules used to exchange files on World Wide Web
Users can exchange text, graphic images, sound, video and other multimedia files
Defines how messages are formatted and transmitted over the Internet
83
Hypertext Transfer Protocol (HTTP)
Copyright | HP Education
84
HTTP works on request and response
between browser and server
Web server is designated to handle HTTP
requests then sends requested HTML
page
84
HTTP Work Flow
Proxy servers is used with firewalls to monitor and direct HTTP traffic through
proxy to external internet
Copyright | HP Education
85
Used over Internet to exchange files
Uses Internet's TCP/IP protocols to enable data transfer
Establishes two way connections between computers
85
File Transfer Protocol (FTP)
Copyright | HP Education
86
Machine that are involved in an FTP transaction Client (local host) machine and a
server (remote host)
Client machine initiates transfer
Get command used to
copy files from server to
client
Put command is used to
copy files from client to server
86
FTP Communication
Copyright | HP Education
87
Used to transfer files to and from a remote computer
Used by servers to boot diskless workstations, X-terminals and routers
Start with a small amount of built-in software
87
Trivial File Transfer Protocol (TFTP) - I
Copyright | HP Education
88
Connection and Communication between Client/Server
Communication and messaging different in TFTP when compared with FTP
TFTP uses UDP
Process of transferring a file:
Initial Connection
Data Transfer
Connection Termination
88
Trivial File Transfer Protocol (TFTP) II
Copyright | HP Education
89
Used to transfer Usenet news from one machine to another machine
Usenet news is a large collection of discussion groups, covering a wide range of
topics
NNTP provides connection-oriented service
Communication takes place between a client and a server that keeps netnews on
both the places
89
Network News Transfer Protocol
(NNTP)
Copyright | HP Education
90
Framework for managing devices over Internet using TCP/IP protocol suite
Provides set of fundamental operation for monitoring and maintaining devices in the
network
Agent is server process that maintains Management Information Base (MIB)
database for host
90
Simple Network Management
Protocol (SNMP)
Copyright | HP Education
91
Used to retrieve email from remote server to local client over TCP/IP connection
E-mail clients using POP3 connect, retrieve all messages or store them on user's PC as
new messages or delete them from server and disconnect
POP3 is a TCP/IP client/server protocol
Session States:
Authorization State
Transaction State
Update State
91
Post Office Protocol (POP)
Copyright | HP Education
92
Enables the users to work with the mail on the server
Does not download the mails
Used to access e-mails from a local server
Working with mails
Accessing and deleting mails
Attachments
92
Internet Message Access Protocol
(IMAP)
Copyright | HP Education
93
BOOTP First automated configuration tool for IP hosts
Bootstrapping Provides the host with the capability of getting IP addresses
while machine boots
Requires two phases:
Client provided with address and other parameters
Client downloads softwares to function on network and perform tasks
93
BOOTP and DHCP - I
Copyright | HP Education
94
Dynamic Host Configuration Protocol (DHCP) Successor of BOOTP with different
features
Dynamically assign addresses to clients and centrally manage
Consists of two major components 1. Address allocation mechanism 2. Protocol
that allows clients and server to communicate
DHCP standard includes three different address allocation mechanisms:
Manual , Automatic and Dynamic
94
BOOTP and DHCP II
Copyright | HP Education
95
Network protocol used on internet or local area network connections
Terminal emulation program for TCP/IP networks
Enables to control server and communicate with other servers on network
95
TELNET
Copyright | HP Education
96
WWW is a network of Internet servers, which support documents that are
developed using HTML
Hyper Text Markup Language (HTML) is a language in which these documents are
formatted
Client-side
Computer application Web browser that runs on users local computer and
connects to server
Interpreter that interprets code in an HTML page
Operations carried out on client-side
96
World Wide Web (WWW) - I
Copyright | HP Education
97
Server Side
Software program Web server that runs on a remote
server
Manages and shares web based applications
Operations include processing and storage of data from
client to server

97
World Wide Web (WWW) II
Copyright | HP Education
98
Wireless Networking
Copyright | HP Education
99
Wireless Networking Basics
99
Wireless networking allows
you to establish:
Communication using standard network
protocols
Communication without the use of
cables
Technologies used for wireless access
based on
Wireless fidelity (Wi-Fi)
Home Radio Frequency
(HomeRF)
Copyright | HP Education
100
Types of Wireless Network I
Peer-to-Peer(P2P) or Ad-Hoc
Connected wirelessly with the use of wireless Network
Interface Card (NIC)
Computers can access printers and share files
Wired LAN can be accessed using bridging
100
Copyright | HP Education
101
Access point or
Infrastructure wireless
LAN
Wireless device connects
to the access point to
connect to the network
Access point acts as a hub
to connect two wireless
devices
Wireless bridge used to
connect wireless network
to wired network
101
Types of Wireless Network II
Copyright | HP Education
102
Security
Four methods of wireless network security:
Data encryption - WEP (Wired Equivalent Privacy) and
WPA (Wi-Fi Protected Access)
Port based access control
Service Set Identifier (SSID)
Media Access Control (MAC) address filtering
102
IEEE 802.11
Copyright | HP Education
103
The important components required for setting up
a wireless network are:
Medium
Access point and Extension point
Wireless bridges and Power line bridges
Antennas
Wireless adapters
Wireless Station and Server
Software
103
Components Requirements
Copyright | HP Education
104
Wireless medium is an unguided form of networking
medium
Wireless transmission involves use of technologies
such as Bluetooth, Infrared, Lasers, Radio signals and
Microwave technologies
Mobile computing allows users to do their work at any
location
104
Medium
Copyright | HP Education
105
Access Point
Device that bridges a wireless connection and a
wired connection
Two types of access points: Hardware access points
and Software access points
Extension Point
Used if single access point is not able to cover entire
area
105
Access Point and Extension Point
Copyright | HP Education
106
Hardware access point is a physical device that is
used to establish a connection between a wired
network and a wireless network
106
Hardware Access Points
Copyright | HP Education
107
Software Access Points are computer which
includes a wireless network interface card.
107
Software Access Points
Copyright | HP Education
108
Extension points are used if a single
access point is not able to cover the
entire area.
108
Extension Point
Copyright | HP Education
109
Antennas are used to increase the range of
wireless network
Types of antennas used:
Omnidirectional antennas - Used indoors and small in
size
Directional antennas - High gain and used for long
range outdoor use
Wireless adapters help to connect computer or
PDA to a network
Wireless adapters are available as PC cards, PCI
and mini PCI, USB, and CompactFlash.
109
Antennas and Adapters
Copyright | HP Education
110
Wireless Station and Server
Wireless Local Area Network consists of
wireless station and wireless server
Wireless station - Connects wireless network
into a wireless medium
Wireless Stations
Wireless Clients Access Points
110
Wireless server The main server which controls
all devices within the wireless network
Copyright | HP Education
111
Wireless network adapter requires two types of
software so as to function properly:
Driver
Configuration Utility
Windows XP has built-in tools for configuring
network adapter settings
111
Software
Copyright | HP Education
112
Cisco Router Configuration Basics
Copyright | HP Education
113
Router is a device that acts as interconnect to two networks
Tpyes of router
(a) Hardware router
(b) Software router
Hardware routers are small boxes which run special software created by their
vendors to give them the routing capability and the only thing they do is simply
route data from one network to another. Most companies prefer hardware routers
because they are faster and more reliable, even though their cost is considerably
more when compared with a software router
WHAT IS A ROUTER


Copyright | HP Education
114
Software routers do the same job with the above hardware routers (route data),
but they don't come in small flashy boxes. A software router could be an NT server,
NetWare server or Linux server. All network servers have built-in routing
capabilities.
Software router
Copyright | HP Education
115
Cisco
Juniper
Alcatel
Zdnet etc.
Router Vendors
Copyright | HP Education
116
Cisco has three hierarchical model
Core layer
Distribution
Acces layer

Cisco hierarchical model
Copyright | HP Education
117
Core layer: This layer is considered the backbone of the network and includes the
high-end switches and high-speed cables such as fiber cables. This layer of the
network does not route traffic at the LAN. In addition, no packet manipulation is
done by devices in this layer. Rather, this layer is concerned with speed and ensures
reliable delivery of packets
Difine the layer
Copyright | HP Education
118
Distribution layer: This layer includes LAN-based routers and layer 3 switches. This layer
ensures that packets are properly routed between subnets and VLANs in your enterprise.
This layer is also called the Workgroup layer
Access layer: This layer includes hubs and switches. This layer is also called the desktop layer
because it focuses on connecting client nodes, such as workstations to the network. This
layer ensures that packets are delivered to end user computers.

Copyright | HP Education
119
cisco hierarchical model Example
Copyright | HP Education
120
Modular Router- In modular router the interfaces are not fixed so that we will be
able to installed cards later on this router
Fixed Router In non modular router the interfaces fixed we can not able to add
ports/interfaces later on
Fixed & Modular Router
Copyright | HP Education
121
Bootstrap stored in ROM microcode
brings router up during initialisation, boots router and
loads the IOS.
POST Power On Self Test - stored in ROM microcode
checks for basic functionality of router hardware and
determines which interfaces are present
ROM Monitor stored in ROM microcode used for
manufacturing, testing and troubleshooting
Mini-IOS a.k.a RXBOOT/boot loader by Cisco small IOS
ROM used to bring up an interface and load a Cisco IOS
into flash memory from a TFTP server; can also perform a
few other maintenance operations

Router Components
Copyright | HP Education
122
RAM holds packet buffers, ARP cache, routing table, software
and data structure that allows the router to function; running-
config is stored in RAM, as well as the decompressed IOS in
later router models
ROM starts and maintains the router
Flash memory holds the IOS; is not erased when the router is
reloaded; is an EEPROM [Electrically Erasable Programmable
Read-Only Memory] created by Intel, that can be erased and
reprogrammed repeatedly through an application of higher than
normal electric voltage
NVRAM Non-Volatile RAM - holds router configuration; is not
erased when router is reloaded
Router Components
Copyright | HP Education
123
How a Cisco device locates and loads IOS
The default source for Cisco IOS software depends on the hardware platform, but
most commonly the router looks to the boot system commands saved in NVRAM
Cisco IOS software allows several alternatives to be used. Other sources can be
specified for the software, or the router can use its own fallback sequence to load
the software

Introduction of Cisco IOS
Copyright | HP Education
124
The value in the configuration register
tells the router where to get the IOS
This can be confirmed by using the
show version command and looking at
the last line for the configuration
register

MANAGING CISCO IOS
Copyright | HP Education
125
MANAGING CISCO IOS
Copyright | HP Education
126
MANAGING CISCO IOS
Managing configuration files using TFTP
Enter the command copy running-config tftp.
At the prompt, enter the IP address of the TFTP server to store the configuration
file.
Enter the name to assign to the configuration file or accept the default name.
Confirm the choices by typing yes each time.
Copyright | HP Education
127
MANAGING CISCO IOS
Copyright | HP Education
128
MANAGING CISCO IOS
Enter the command copy tftp running-config.
At the prompt, select a host or network configuration file.
At the system prompt, enter the IP address of the TFTP server where the
configuration file is located.
At the system prompt, enter the name of the configuration file or accept the
default name.
Confirm the configuration filename and the server address that the system
supplies.
Copyright | HP Education
129
You can tell in which area of the routers configuration you are by looking at the router
prompts:
Router> USER prompt mode
Router# PRIVILEGED EXEC prompt mode
Router(config) terminal configuration prompt
Router(config-if) interface configuration prompt
Router(config-subif) sub-interface configuration prompt
*
Router Basics Commands
Copyright | HP Education
130
Router(config)# hostname hpes
Router(config-if) no shut
Router(config-if) shut
Set Banner to Router
Router(config) banner login (telnet) . welcome tp hpes .
Router(config) banner motd. (message of the day Banner
Router Basics Commands
Copyright | HP Education
131
Router(config) line console 0
Router(config-line) password hpes
Router(config-line) login

Set administrative mode Password
Router(config) enable password hpes
Router(config) enable secret hpes

Set Telnet Mode Passwords
Router(config) line vty 0 4
Router(config-line) password hpes
Router(config-line) login



Set Router Passwords
Copyright | HP Education
132
Power-cycle the router when Router is boot press+Ctrl+Break
Rouer will come Rommon mode
Rommon >Confreg 0X2142
Rommon>reset
Continue with configuration dialog pesss No
Router will come user mode
Router>enable
Router# copy Startup-config Running-config
Router(config)# enable password hpes1
Router(config)# config-register 0x2102
Router# copy running-config startup-config
Router# reload


Break Password on Router

Copyright | HP Education
133
What is Routing> Routing is the process of sending a packet of information from one
network to another networks,routes based on the destination network
The Administrative Distance of Common Routing Protocol
O Connected
1 Static
20 BGP
Internal EIGRP 90
IGRP 100
OSPF 110
RIP - 120

Routing
Copyright | HP Education
134
There are two basic methods of building a routing table: Statically and Dynamically
Static
1. Static routing table is created, mainted and updated by a network Administrator,
manually
2. Static routes have an administrative Distance is 1
3. Static will not share Static routes with each other
4. When there is low bandwidth Connectivity
5. When an administrator wants total control over the route
6. When hardware router is not able to handle routing updates
Routing Type
Copyright | HP Education
135
A dynamic routing table is created, maintained , and updated by a routing protocol
running on the router Example-(RIP,EIGRP,OSPF,IGRP)
Dynamic Routing
Copyright | HP Education
136
There are two type of dynamic Routing Protocol
1. Distance-vector routing Protocol
2. Link-state routing Protocol
Example of distance vector routing protocol (RIP,IGRP)
Example of link state Routing Protocol (OSPF,IS-IS)
EIGRP both distance-vector and link state routing Protocol


Dynamic Routing Categories
Copyright | HP Education
137
1. distance Vector is classfull Routing protocol
2. periodic updates of the full routing table are sent to routing neighbors.
3. Distance vector routing protocol is used Bellman-Ford algorithm.
Distance vector routing protocol begins by advertising directly connected networks to its
neighbors. (RIP every 30 seconds; IGRP every 90 seconds)
Distance vector protocols utilize some form of distance to calculate a rotes metric.
Distance Vector
Copyright | HP Education
138
Classless routing protocol
Support for VLSM
Connection Oriented protocol
Trigger update support
Link state routing protocol is used Dijkstra algorithm
Link state routing protocol maintain 3 seprate tables.
A. Neighbor Table
B. Topology Table
C. Routing Table
Link State Routing Protocol
Copyright | HP Education
139
RIP is a standardized Distance Vector protocol, designed for use on smaller networks.
RIP sends out periodic routing updates (30 sec)
RIP sends out the full routing table every periodic update.
RIP uses a form of distance as its metric hopcount 15 (max.)
RIP uses the Bellman ford Distance Vector algorithm to determine the best path to particular
destination
RIP v1 (Routing Information Protocol)
Copyright | HP Education
140
RIP support only Classfull IP routing protocol
RIP send updates as broadcasts to address 255.255.255.255
RIP v1 not support VLSM
RIP support IP and IPX routing
RIP routes have an administrative distance of 120
Hop count no of routers in between the route


Copyright | HP Education
141
Update Timer (Default 30 seconds)- indicates how often the router will send out a routing
table update.
Invalid Timer (Default 180 seconds)- If no new updates are heard about this route. The invalid
timer will be reset if an update is received for that particular route before the timer expires.
Hold-down Timer(Default 180 sec)rip will not accept any new updates for routes in hold-down
state, until the hold-timer expires
Flush Timer (Default 240 Seconds)- indicates how long a route can remain in a routing table
before being flushed, if no new updates are heard about this route.
RIP Timers
Copyright | HP Education
142
Router A
Router(config)# router rip
Router(config-router)# Network 172.16.0.0
Router(config-router)# Network 172.17.0.0
Router B
Router(config)# router rip
Router(config-router)# Network 172.17.0.0
Router(config-router)# Network 172.18.0.0

RIP v1 Basic Configuration
Router A
Router B
172.16.1.2/16
172.17.1.1/16
172.17.1.2/16
172.18.1.1/16
Copyright | HP Education
143
RIP is a standardized Distance Vector protocol, designed for use on smaller networks.
RIP sends out periodic routing updates (30 sec)
RIP sends out the full routing table every periodic update.
RIP uses a form of distance as its metric hopcount 15 (max.)
RIP uses the Bellman ford Distance Vector algorithm to determine the best path to particular
destination
RIP v2 (Routing Information Protocol)
Copyright | HP Education
144
RIP support only Classless IP routing protocol
RIP send updates as multicasts address 224.0.0.9
RIP v2 support VLSM
RIP support IP and IPX routing
RIP routes have an administrative distance of 120


Copyright | HP Education
145
Router A
Router(config)# router rip
Router(config)# version 2
Router(config-router)# Network 172.16.0.0
Router(config-router)# Network 172.17.0.0
Router B
Router(config)# router rip
Router(config)# version 2
Router(config-router)# Network 172.17.0.0
Router(config-router)# Network 172.18.0.0

RIP v2 Basic Configuration
Router A
Router B
172.16.1.2/16
172.17.1.1/16
172.17.1.2/16
172.18.1.1/16
Copyright | HP Education
146
EIGRP is a Cisco-proprietary Hybrid routing protocol, incorporating features of both
Distance-Vector and Link- State routing protocols.
EIGRP uses Diffusing update algorithm to determine the best path among all
feasible paths.
EIGRP will form neighbor relationship with adjacent routers in the same
Autonomous System (AS)
EIGRP (Enhanced Interior Gateway Routing
Protocol)
Copyright | HP Education
147
EIGRP uses multicasts on address 224.0.0.10.
EIGRP routers do not send periodic, full-table routing updates.
EIGRP is a classless protocol and thus supports VLSMs.
EIGRP supports IP, IPX, and Appletalk routing.
EIGRP Administrative Distance is 90.
EIGRP uses Bandwidth and Delay of the Line by default, to calculate its distance
metric Reliability, Load and MTU.
EIGRP has a maximum hop-count of 224,
Copyright | HP Education
148
Neighbor table list of all neighboring routers. Neighbors must belong to the same AS.
Topology table list of all routes in the AS.
Routing table contains the best route for each known network.

EIGRP Tables:
Copyright | HP Education
149
EIGRP forms neighbor relationships in the same AS by exchanging Hello packets.
Hello packets are sent multicast address 224.0.0.10
EIGRP hellos packet are sent every 5 seconds. (high speed wan),slower links are
send every 60 seconds
Hold timer is three times of Hello timer High speed 15 second, slow link 180
seconds.

EIGRP Neighbors
Copyright | HP Education
150
Configuring EIGRP
Copyright | HP Education
151
Router A
RouterA(config)# router eigrp 10
RouterA(config-router)# network 20.0.0.0
RouterA(config-router)# network 10.0.0.0
Router B
RouterB(config)# router eigrp 10
RouterB(config-router)# network 20.0.0.0
RouterB(config-router)# network 172.31.0.0
Router C
RouterC(config)# router eigrp 10
RouterC(config-router)# network 172.31.0.0
RouterC(config-router)# network 192.168.10.0
Copyright | HP Education
152
OSPF is a standardized Link-State routing protocol, designed to scale efficiently to
support larger networks.
OSPF allows for a hierarchical network design through the us of Areas
OSPF uses the Dijkstra shortest path first algorithm.
OSPF is a classless protocol, and thus supports VLSMs.
OSPF Traffic is multicast 224.0.0.5 (all OSPF routers) or 224.0.0.6 ( all
Designated Routers)
OSPF (Open Shortest Path First)
Copyright | HP Education
153
OSPF support only IP routing
OSPF administrative distance is 110
OSPF uses cost as its metric, which is computed based on bandwidth of the
link.
OSPF has no hop-count limit.
There are two types of area
Transit area(backbone) used to transit information of are regular areas
Regular area uses are found in this area this area can not be used as transit
area and it must be connected to transit area
OSPF Tables:
Neighbor table
Topology table
Routing table

Copyright | HP Education
154
Router ID can be manually specified
The highest ip address configured on any Loopback interface on the router
will become the Router id
If no loopback interface exits the highest ip address configured on any
physical interface will become the Router ID
OSPF Hello packets are sent out on interface every 10 seconds for broadcast
and point-to-point interface and 30 seconds for non broadcast point to
multipoint interface
Router ID Selection
Copyright | HP Education
155
OSPF also has a Dead Interval , which indicates how long a router will wait without
hearing any hellos before announcing a neighbor as down. Default for Dead Interval
is 40 Seconds for broadcast and point-to-point interfaces, and 120 seconds for non-
broadcast and point-to-multipoint interfaces




















Copyright | HP Education
156
Down indicates that no Hellos have been heard from the neighboring router.
Init indicates a Hello packet has been heard from the neighbor.
2-Way indicates that bidirectional communication has been established.
ExStart indicates that the routers are preparing to share link state information.
Exchange indicates that the routers are exchanging Database Descriptors.
Loading routers are sharing their topology tables with each other.
Full indicates that the routers are fully synchronized.
OSPF Neighbor States
Copyright | HP Education
157
Configuring OSPF
Copyright | HP Education
158
Router A(config)# router ospf 1
Router A(config-router)# network 10.0.0.0 0.255.255.255 area 0
Router A(config-router)# network 20.0.0.0 0.255.255.255 area 0
Router B(config)# router ospf 1
Router B(config-router)# network 20.0.0.0 0.255.255.255 area 0
Router B(config-router)# network 30.0.0.0 0.255.255.255 area 1
Router C(config)# router ospf 1
Router C(config-router)# network 10.0.0.0 0.255.255.255 area 0
Router C(config-router)# network 40.0.0.0 0.255.255.255 area 2
Router D(config)# router ospf 1
Router D(config-router)# network 30.0.0.0 0.255.255.255 area 1
Router E(config)# router ospf 1
Router E(config-router)# network 40.0.0.0 0.255.255.255 area 2













Copyright | HP Education
159
VLANs is used to control broadcast domain.
Advantages of VLANs
Broadcast Control Broadcasts are received by every host on the switched network. In
contrast, each VLAN belongs to its own broadcast domain (or IP subnet); thus
broadcast traffic from one VLAN will never reach another VLAN.
Security VLANs allow administrators to logically separate users and departments.
Flexibility and Scalability VLANs remove the physical boundaries of a network. Users
and devices can be added or moved anywhere on the physical network, and yet
remain assigned to the same VLAN.
VLAN (Virtual LAN)
Copyright | HP Education
160
VLAN membership can be configured one of two ways:
Statically Individual switch-ports must be manually assigned to a VLAN.
Dynamically Devices are automatically assigned into a VLAN based on its MAC
address. Cisco developed a dynamic VLAN product called the VLAN Membership
policy Server (VMPS).

Cisco switches support two frame-tagging protocols, Inter-Switch Link (ISL) and IEEE
802.1Q
Inter-Switch Link ISL is cisco s proprietary frame-tagging protocol ISL encapsulates a
frame with an additional Header(26 bytes) and 4 bytes Trailer, increasing the size of an
ethernet frame up to 30 bytes. The header contains the 10 bytes VLAN ID, non-ISL
devices (non-Cisco devices) will actually drop ISL-tagged frames.

VLAN Membership
Copyright | HP Education
161
IEEE 802.1Q IEEE802.1Q, otherwise known as DOT1Q, is the standardized
frame tagging protocol supported most switch manufacturers
By default configure VLAN 1 and VLAN 1002-1005
Copyright | HP Education
162
Configure VLAN
Copyright | HP Education
163
Switch(config)#vlan 2
Switch(config-vlan)#name sales
Switch(config-vlan)#exit
Switch(config)#vlan 3
Switch(config-vlan)#name it
Switch(config)# vlan 4
Switch(config-vlan)# name HR
Switch# show vlan
Add pc to Vlan
Switch(config)# int fa0/1
Switch(config-if)# switchport access vlan 2
Add other PC to Vlan
Copyright | HP Education
164
In large switching environments, it can become difficult to maintain a consistent
VLAN database across all switches on the network. VTP allows the VLAN
database to be easily managed throughout the network.
By default, VTP updates are sent out every 300 seconds.
VTP (VLAN Trunking Protocol)
Copyright | HP Education
165
Server Only VTP servers can create, modify or delete entries in the VLAN database.
Servers advertise their VLAN database to all other switches on the network. Server
can only advertise VLANs 1-1005
Client VTP clients cannot make modifications to the VLAN database, A client will also
forward an update from a server to other clients.
Transparent VTP transparent switches will not advertise or accept any VLAN database
information from other switches (even a server).
VTP Modes
Copyright | HP Education
166
ACLs can be used for two purposes on Cisco devices to filter traffic, and to
identify traffic.
ACL can be configure inbound and outbound.
Two types of configure Access lists
Named and Numbered
IP standard access list 1-99
IP extended access list 100-199


Access Control Lists
Copyright | HP Education
167
Standard access list based on layer 3 information, it is based on Source
address, it is created on destination Router destination port as outbound
Extended access list based on layer3 and layer 4 information it is based
Source address as Source port as inbound
Standard ACLs
Thank you

S-ar putea să vă placă și