Networking Essentials Notes 1
Networking Essentials Notes 1
Networking Essentials Notes 1
TABLE OF CONTENTS
Comprehensive Notes ............................................................................................................................................ 4
Chapter 1 ............................................................................................................................................................ 4
Chapter 2 .......................................................................................................................................................... 15
Chapter 3 .......................................................................................................................................................... 26
Chapter 4 .......................................................................................................................................................... 32
Chapter 5 .......................................................................................................................................................... 45
Chapter 6 .......................................................................................................................................................... 53
Chapter 7 .......................................................................................................................................................... 63
Chapter 8 .......................................................................................................................................................... 69
Chapter 9 .......................................................................................................................................................... 79
Chapter 10 ........................................................................................................................................................ 83
Chapter 11 ........................................................................................................................................................ 89
Revision Notes .................................................................................................................................................... 101
Chapter 1 ........................................................................................................................................................ 101
Clobally Connected ..................................................................................................................................... 101
Lans, Wans and the internet ....................................................................................................................... 102
The Network as a platform ......................................................................................................................... 106
The Changing Network Environment.......................................................................................................... 107
The Changing Network Environment.......................................................................................................... 110
Chapter 2 ........................................................................................................................................................ 113
Bootcamp ................................................................................................................................................... 113
Getting Basic ............................................................................................................................................... 116
Address Schemes ........................................................................................................................................ 119
Chapter 3 ........................................................................................................................................................ 121
COMPREHENSIVE NOTES
CHAPTER 1
Globally Connected
Networking Today
o Networks in our daily lives
Breakthroughs in technology have extended
communication possibilities
Creation of data networks has profound effect
Ideas can become a reality, news events are worldwide, and
social interactions and game playing can happen globally
o Technology then and now
Resources include: sharing photos, videos and experiences,
accessing school network, communicating via email, IM, or
VoIP, watching movies/tv shows, playing online games,
checking weather and traffic, as well as bank balance.
Internet of Everything- bringing people, process, data and
things together to make network connections more
relevant/valuable
o The Global Community
Advancements are change agents
Create a world where geography and physical limitations
are irrelevant
Independent of location or time zone
Human networks- online communities
o Networks support the way we learn
Changing the way we learn- Maximising the dissemination
of knowledge
Traditionally- textbook and instructor- both limited
Networks deliver interactive activities, assessments,
feedback, virtual classrooms, on demand video, learning
spaces, mobile learning, distance learning, e-learning,
discussion boards and wikis, admin- student enrolment,
assessment delivery, progress tracking
o Networks support the way we communicate
IM/texting: real time communication between 2+ people,
also file transfer, voice, video communication
Social Media: interactive websites where user generated
content is shared
Advantages
Disadvantages
Easy to set up
No central admin
Less complex
Not as secure
Simultaneous client/server
may slow performance
Encoding
Wireless transmission
Electromagnetic waves
Criteria
Distance the medium can carry a signal
Environment
Amount of data and speed it must be transmitted
Cost of medium and installation
o Network Representations
Network Interface Card (or LAN adapter)- provides physical
connection. Medium connecting plugs into the NIC
Physical Port- connector/outlet on device where medium is
connected to host
Interface- Specialised ports on internetworking devicesconnect to individual networks. Routers used to
interconnect networks, so ports on router called network
interfaces
LANs and WANs
o Network infrastructure varies in size of area, number of users,
and number of services
o LAN
Home, school, office, or campus
Administered by single organisation/individual, on network
level
High speed bandwidth to internal
o WAN
Managed by service providers or Internet service providers
Media type
Interconnect LANs
Usually by multiple service providers
Typically slower speed
o MAN- Metropolitan area network
Physically larger than LAN, still not WAN (a city)
o WLAN- Wireless LAN
o SAN- Storage area network- designed to support file servers
and provide storage, retrieval, and replication of data.
Components include servers, disk arrays, and Fibre Channel
Interconnection
The Internet
o Used to communicate outside of your local network
o Conglomerate of networks not owned by anyone
o Organisations developed to maintain structure and
standardisation of protocols and processes
Internet Engineering Task Force (IETF)
Internet Corporation for Assigned Names and Numbers
(ICANN)
Internet Architecture Board (IAB)
o Intranet
Private connection of LANs and WANs, only accessible to
members of organisation
Can include internal events, health and safety policies,
newsletters, phone directories, class schedules, curricula,
forums
Eliminate paperwork, speed workflows
o Extranet
Individuals from outside the organisation can gain access
to information they require from the organisation's intranet
Examples include outside suppliers and contractors,
hospitals providing booking schedules for doctors
o Internet Access Technologies
Home users need to connect to an internet service provider
(ISP)
Broadband cable, broadband digital subscriber line (DSL),
wireless, and mobile services
Organisations need fast connections for business services,
IP phones, video conferencing, and data centre storage
Business class interconnections provided by SP- business
DSL, leased lines, and Metro Ethernet
o Connecting Remote users to the Internet
Cable
DSL
Cellular
Satellite
Dialup
Inexpensive, using a phone line and modem
telephone Low bandwidth, low speed
o
Dedicated
Leased Line
Metro
Ethernet
Refocus of IT resources
Creation of new business models
Types- Private, public, hybrid, and custom
Private- only for specific organisation, e.g.
government- internally managed (expensive to build
up) or externally with strict access security
Public- offered to general population, free or pay per
use, using the internet
Hybrid- 2+ clouds where each part is distinctive but
have connection via a single architecture. Various
services levels based on user access rights
Custom- build to meet the needs of a specific industrycan be private or public
Data centres
Facility used to house computer systems and
associated components, and makes cloud computing
possible
Associated components
Redundant data communication connections
High speed virtual servers (server farms or server
clusters)
Redundant storage systems (SAN)
Redundant/back up power supplied
Environmental controls (AC, fire suppression)
Security devices
Can be one room, one floor, or even a whole building
Use cloud computing and virtualisation (runs several
Oss in parallel on a single CPU, reducing admin and
cost overheads)
Very expensive to build and maintain, generally large
organisations have their own, smaller lease.
Technology Trends in the Home
Smart home technology
Integration of everyday appliances
Powerline Networking
Uses existing electrical wiring to connect devices
"no new wires" saves cost of installing data cables, no cost
to electric bill
Alternative when cables or wireless are not a viable option
Use a standard powerline adapter
Wireless Broadband
CHAPTER 2
Introduction
Home routers
o Router- forwards data packets to and receives data packets
from the internet
o Switch- connects end devices using network cables
o WAP- consists of a radio transmitter, connecting end devices
wirelessly
o Firewall appliance- secures outgoing traffic and restricts
incoming traffic
Cisco Internetwork Operating System (IOS)
o Collection of network OS used on networking devices
o Used on most devices regardless of type or size
IOS Bootcamp
Cisco IOS
o Operating Systems
All end devices and network devices require an OS
Hardware, Kernel, Shell, GUI
o Purpose of an OS
IOS on switch or router provides an interface
Possible to upgrade the IOS version or feature set for more
capabilities
Cisco IOS release 15.x.
o Location of the Cisco IOS
Several megabytes in size (file)
Stored in semi-permanent memory area called flash
Doesn't lose memory when turned off, but can be
overwritten if need be
Generally IOS copied from flash into RAM
RAM has functions including storing data, increasing
performance, however data lost during power cycle
(restarted)
Amount of memory needed changes per device
o IOS Functions (generally accessed by CLI)
Security
IP addressing
Optimise connectivity- interface-specific configurations
Routing
QoS technologies
Incomplete command
Incorrect command
Hot Keys and Shortcuts
Ambiguous Command
Getting Basic
Host Names
o Why the Switch
One of the simplest devices that can be configured on a
network
No configuration prior to functioning
Has initial settings like name, device config, banner
messages, and saving
o Device Names
One of the first steps is configuring unique device name or
hostname
Appear in CLI prompts, authentication processes, and
topology diagrams
Default name is assigned until hostname given
Use naming convention to easily understand
Start with a letter
Contain no spaces
End with a letter or digit
Use only letters, digits, and dashes
Be less than 64 characters
o Host Names
Allow devices to be identified by network admins over
network or internet
Use physical location- floor 1, floor 2, etc
o Configuring Host Names
From privileged EXEC mode, go to global configure
terminal
Enter hostname hostname Sw-Floor-1
Hostname will appear in the prompt
To remove a name, use no hostname
Limiting Access to Device Configurations
o Securing Device Access
Physically- closets and locked racks
Address Schemes
Ports and Addresses
o IP Addressing of devices
Use of IP addresses (IPv4 or IPv6) is primary means of
enabling devices to locate each other
Examples of end devices
Computers- work stations, laptops, file servers, web
servers
Network printers
VoIP phones
Security Cameras
Smart phones
Mobile handheld devices
CHAPTER 3
Rules of Communication
The rules
o What is communication
Needs a sender and a receiver and a channel
Sending is governed by protocols
o Establishing the rules
Identified sender and receiver
Common language and grammar
Speed and time of delivery
Confirmation or acknowledgement requirements
o Message Encoding
Encoding from bits to patterns of light, sound, waves, or
electrical impulses
Destination receives and decodes signals to interpret
message
o Message Formatting and Encapsulation
Placing one message format in another message format
Frame provides address of destination and host
o Message Size
Must meet minimum and maximum size requirementssegmented down
o Message Timing
Access Method- when someone can send a message
Flow Control- how much info sent and speed- transmit at
faster rate than receive and process
Response Timeout- how long to wait for response, what to
do if timeout occurs
o Message Delivery Options
One to one (unicast) or one to many (multicast)
Sometimes necessary to return an acknowledgement
Network Protocols and Standards
Protocols
o Protocols: Rules that Govern Communications
Protocol Suite- group of interrelated protocols necessary to
perform communication function
o Network Protocols
IP, HTTP, DHCP
o Interaction of Protocols
IRTF (Internet Research Task Force)- long term research e.g. anti
spam, crypto forum, peer to peer, and router research
o IEEE (Institute of Electrical and Electronics Engineers)dedicating to advance innovations and standards
o ISO (International Organisation for Standardisation)
Best known for OSI (Open Systems Interconnection)
Published in 1984 for layered framework
TCP/IP protocol suite is for internet
OSI protocol suite is for telecommunications equipment
o Other Standards Organisations
EIA (Electronic Industries Alliance) standards for electrical
wiring, connectors, racks
TIA (Telecommunications Industry Association)
communication standards in radio equipment, cellular
towers, VoIP, satellite
ITU-T (International Telecommunications UnionTelecommunication Standardisation Sector) one of largest
and oldest, defines video compression, IP Television,
broadband communication like DSL
ICANN (Internet Corporation for Assigned Names and
Numbers) coordinates IP address allocation, domain names,
protocol identifiers/port numbers
IANA (Internet Assigned Numbers Authority) department of
ICANN- does IP address allocation, domain name, and
protocol identifiers
Reference Models
o The Benefits of Using a Layered Model
Assists in protocol design
Fosters competition
Prevents technology or capability changes in one layer from
affecting other layers
Provides a common language
Two types of networking Models
Protocol- describes the functions that occur at each
layer of protocols: e.g. TCP/IP
Reference- aids in clearer understanding of functions
and processes involved- provides consistency within all
types of network protocols: e.g. OSI model
o The OSI reference model
Framework on which to build a suite of open systems
protocols
o
CHAPTER 4
Introduction
In TCP/IP model, data link layer and physical layer are essentially
one layer
Sending
o DLL's role to prepare data and control how it accesses physical
media
o Physical layer's role controls how data is transmitted onto
physical media- encoding into binary digits
Receiving
o Physical layer receives signals, decoding, and passes to DLL for
accepting and processing
Getting it connected
Connecting to the network
o Physical connection is necessary
NIC
o Ethernet NIC for wired
o WLAN NICs for wireless
Purpose of the Physical Layer
The Physical Layer
o Transport bits that make up DLL frame across the media
o Encodes frames to create electrical, optical, or radio waves
o Signals sent one at a time
o Destination node physical layer retrieves signals, restores to
bits, passes up to DDL as frame
Media
o Copper cable- electrical
o Fibre-Optic Cable- light
o Wireless- Microwaves
Standards
o TCP/IP suite protocols defined by IETF (Internet Engineering
Task Force) in RFCs
o Physical layer consists of circuitry, media, and connectors
o Governed by ISO, TIA/EIA, ITU, ANSI, IEEE, FCC, ETSI, CSA,
CENELEC, JSA
Copper Cabling
Characteristics
o Inexpensive, easy to install, low resistance
o Limited by distance and signal interference
o Signal attenuation- longer it travels, more it deteriorates
o Electromagnetic Interference (EMI) or radio frequency
interference (RFI): fluorescent lights or electric motors can
distort/corrupt signals
o Crosstalk: EM fields disturb adjacent wires- can hear part of
another voice conversation on phones
o To counter EMI/RFI, some cables wrapped in metallic shielding
with grounding connections
o To counter crosstalk, some cables have opposing circuit wire
pairs twisted together
o Susceptibility can be further limited by choosing most suited
type to environment, designing avoidance cable infrastructure,
and properly handling and terminating cables
Copper Media
o 3 types
Unshielded Twisted-Pair Cable
o UTP most common, terminated with RJ-45 connectors
o 4 pairs of colour coded wires twisted together and encased for
protection
o Twisting protects from signal interference
Shielded Twisted-Pair (STP) Cable
o Better noise protection, but more expensive and difficult to
install
o Shielding and wire twisting to counter EMI/RFI and crosstalk,
and terminated with special shielded connectors (but if
UTP Cabling
o Properties
Four pairs of colour coded wires twisted together
22- or 24- gauge copper wire
No shielding for EMI/RFI, but can limit by
Cancellation: when 2 wires placed together, magnetic
fields exact opposite, cancel each other out, as well as
other EMI and RFI signals
o
o
Fibre-Optic Cabling
o Properties
Longer distances and higher bandwidths
Flexible thin transparent strand of pure silica glass
Can transmit signals with less attenuation and immune to
EMI/RFI
Used in:
Enterprise networks: backbone cabling applications
and infrastructure devices
FTTH and Access Networks: Fibre-to-the-home is
always on broadband services
Long-Haul networks: connect countries and cities
Submarine Network: able to survive undersea
environments
Cable Design
Core- pure glass, where light is carried
Cladding- surrounds core, acts as mirror- total internal
reflection
Jacket- PVC jacket protects core and cladding
Types
Light pulses can be lasers or light emitting diodes (LEDs)
Photodiodes detect light pulses, converting them to voltages
and reconstructed into data frames
Single-Mode Fibre (SMF): small core, expensive single laser
light- good for long distance telephony and tv
Multimode fibre (MMF): large core, uses LED at different
angles- popular in LANs, cheaper, up to 550m, but
dispersion
Connectors
Dimensions and methods of mechanical coupling differ
Straight-Tip (ST): bayonet style used with multimode
Subscriber Connector (SC): LAN/WAN connector uses
push/pull mechanism- multi and single-mode
Lucent Connector (LC): smaller size, supports both
Two fibres required to support full duplex operation, so two
fibre cables bundled together and terminated with single
fibre connectors- duplex connector
Patch cords used to interconnect infrastructure devices
Testing
Misalignment: media not precisely aligned when joined
End Gap: media does not completely touch splice or
connection
End Finish: ends not well polished or dirt present at
termination
Can use bright flashlight or OTDR to test
Fibre vs Copper
No interference, longer
More expensive, different skills needed, more careful
handling
Wireless Media
o Properties
Unrestricted by conductors or pathways, great mobility
options, increasing number of wireless devices
Concerns
Coverage areas: good in open areas, but limited inside
Interference: cordless phones, fluorescent lights,
microwave ovens can all disrupt
Security: devices and users not authorised can gain
access- no access to physical media necessary
Types
Data communications Standards
Standard IEEE 802.11: WLAN (Wifi), contention system
with CSMA/CA media access process used
Standard IEEE 802.15: WPAN (Wireless personal area
network), e.g. bluetooth, uses device pairing
Standard IEEE 802.16: Worldwide Interoperability for
Microwave Access (WiMAX), point to multipoint
topology for wireless broadband access
Physical layer specifications applied to areas like
Data to radio signal encoding
Frequency and power of transmission
Signal reception and decoding requirements
Antenna design and construction
Wireless LAN
WAP: concentrates wireless signals and connects to ethernet
Wireless NIC adaptors: provides communication capability to
each network host
802.11 WiFi Standards
IEEE 802.11a: 5GHz and speeds up to 54 Mb/s (not with b
and g), higher frequency, less coverage/penetration
IEEE 802.11b: 2.4GHz 11Mb/s
IEEE 802.11g: 2.4 GHz 54 Mb/s
IEEE 802.11n: 2.4GHz and 5GHz, 150-600 Mb/s range of 70m,
backwards compatible with a/b/g
IEEE 802.11ac: 5Ghz 450 Mb/s - 1.3 Gb/s, backward
compatible with a/ n
IEEE 802.11ad: WiGig uses tri-band of 2.4 GHz, 5GHz, 60GHz,
up to 7Gb/s
Layer 2 Standards
o Generally not defined by RFCs
o Described by Engineering organisations (IEEE, ITU, ISO, ANSI)
and communication companies
Topologies
o Controlling Access
Equivalent of traffic rules regulating entrance of motor
vehicles onto roadway, but varies
Depends on topology and media sharing (point to point or
LAN)
o Physical and Logical
Physical: How end devices and infrastructure devices are
interconnected (point to point or star)
Logical: way a network transfers frames from one node to the
next, using virtual connections; signal paths defined by DLL
protocols
WAN Topologies
o Common Physical WAN
Point-to-Point: permanent link between two endpoints
Hub and Spoke: WAN version of Star- central site
interconnects branch sites using point to point
Mesh: High availability, but every end system connected to
everything, high admin/physical costs
o Logical Point to point topology
Don't have to share media with others, no question about
whether incoming frame is for them
o Physical point to point topology
Use of physical devices does not affect logical topology
Logical connection formed between two devices is called
virtual circuit (even if intermediary devices)
Media access method used by DLL protocol is determined by
logical point to point topology rather than physical
o Half and full duplex
Half Duplex- Both devices can transmit and receive on
media, but not simultaneously; ethernet established
arbitration rules to resolve same time conflicts
LAN Topologies
o Physical LAN topologies
Star- End devices connected to central switch; most common
LAN topology as easy to install and troubleshoot, scalable
Extended star/Hybrid: central intermediate devices
interconnect other star topologies (in hybrid, may
interconnect using bus)
Bus: all end systems chained to each other, terminated in
some form on each end; switches not required, used in
legacy ethernet because cheap and easy set up
Ring: end systems connected to neighbour, not terminated;
used in Fiber Distributed Data Interface (FDDI) networkssecond ring for fault tolerance or performance
enhancements
o Logical Topology for shared media
When several entities share media, some mechanism must
be in place to control access- access methods
Contention-based access: all nodes compete, plan if there
are collisions
Controlled access: each node has own time to use medium
o Contention Based Access
Non-deterministic contention-based method, attempt to
access medium whenever it has data to send
Uses Carrier Sense Multiple Access (CSMA) process to first
detect if media carrying a signal
If busy, will wait short time and try again. If free, transmits
data- used by Ethernet and wireless networks
Can fail, causing data collision- corrupted, needs to be resent
Don't have overhead, but doesn't scale well under heavy
media use, and recovery mechanisms diminishes
throughput
Carrier Sense Multiple Access with Collision detection
(CSMA/CD): end device monitors for signal, if free, send, if
detected, wait (used by traditional ethernet)
Carrier sense multiple access with collision avoidance
(CSMA/CA): device checks for data signal- if free, notifies
Layer 2 Address
Physical addresses don't indicate network- unique device
specific address
Used to locate device within limited area
Trailer
Error detection is placing a math summary of bits in packet,
added in DLL
Transmitting node creates logical summary of contentsCyclic Redundancy Check (CRC)
Value placed in Frame Check Sequence (FCS) of frame
Receiving node calculates own logical summary (CRC), and
compares two values
If different, frame discarded
LAN and WAN Frames
Layer 2 protocol depends on logical topology of network,
technology used to implement, and size of network
LAN uses high bandwidth technology, capable of supporting
lots of hosts
High bandwidth technology not cost effective for WANScost of long distance links means low bandwidths
Common DLL protocols
Ethernet
Point-To-Point Protocol (PPP)
802.11 Wireless
High level Data Link Control (HDLC)
Frame Relay
Ethernet Frame
Dominant, defined in 802.2 and 802.3
Supports 10 mbps, 100 mbps, 1gbps, 10 gbps
Methods of detecting and placing data on media varies
Provides service using CSMA/CD as media access method
PPP Frame
Delivers frames between 2 nodes, defined by RFC, developed
as WAN protocol
Can be used on twisted pair, fibre-optic, satellite, and virtual
Uses layered architecture- logical connections called sessions
Session hides media from upper PPP protocol, and can
encapsulate multiple protocols over PP link- each protocol
establishes own PPP session
Also allows 2 nodes to negotiate options- authentication,
compression, multilink
CHAPTER 5
Ethernet Operations
LLC and MAC Sublayers
o Operates in DLL and physical layer
o 802.2 in LLC, 802.3 in MAC and physical
o Supports from 10Mb/s to 100 Gb/s
o
LLC Sublayer
MAC Sublayer
CSMA/CA
If free media, sends notification with intent to use, then
sends data
Wireless LAN
MAC Address: Ethernet Identity
o MAC Address used to remove overhead of every computer in
network processing every frame
o MAC added as part of layer 2 PDU
o 48-bit binary value as 12 digits
o Structure
MAC must be globally unique
IEEE enforced rules for vendors - assigns vendors
Organisationally Unique Identifier (OUI) 24 bit code
Last 24 bits must have unique value
Frame Processing
o MAC address (BIA) historically burned into ROM on NIC
o At boot, NIC copies MAC addresses into RAM
o Each NIC in network views packet at MAC to see if destination
o
Length Field 2
Defines length of data field- used by FCS to ensure no
errors
Describe which protocol is present
If less/more than 1500, then Ethernet II/802.3
Data Field
46-1500
If small packet is encapsulated, additional bits called a
pad used to increase size to 64
Frame Check Sequence Field 4
CRC
If no match, frame is dropped
Ethernet MAC
o MAC Addresses and Hexadecimal
Respresented by 0x prefix, or H suffix
Used to represent MAC or IPv6 addresses
Conversions
Easier to convert to binary, then hex/decimal
o MAC Address Representations
Ipconfig /all used to identify MAC address
o Unicast MAC Address
o
MAC and IP
o End-to-End Connectivity, MAC, and IP
Source sends packet using IP address, using DNS
ARP Functions
Broadcast requests and unicast replies
Resolves IPv4 addresses to MAC
o When packet encapsulated to frame, node refers to table to find
DLL address mapped to IPv4 address- called ARP table/cache,
stored in RAM
o Each entry binds IP to MAC- relationship is called a map
o If MAC found in table, uses it as address
Maintains a table of mappings
o Maintained dynamically- monitor incoming traffic, or send ARP
request
o Unicast reply comes, and new entry is made in table
o Time stamped- if expires, removed from table
o Static entries can be entered, and do not expire over time
ARP Operations
Creating the Frame
o If no response, packet dropped as it cannot be created
ARP Role in Remote Communication
If destination host not on local network, delivered to router, using
gateway MAC address
When packet created, compares destination IP address and own IP
address to see if on local network; if not, determines MAC address
for router
Removing entries from an ARP Table
ARP cache timer removes entries- time different
Commands used to manually remove
Need to remove no longer operational devices, otherwise will
attempt to send
ARP tables on Networking devices
ARP Issues
How ARP can create problems
o Broadcasts, overhead on the media
Possible reduction in performance if lots try to access
simultaneously initially, until ARP established
o
Security
ARP spoofing/poisoning
Inject wrong MAC address with fake ARP replies
Frames sent to wrong destination
Manually configuring static, or restrict
Mitigating ARP problems
o Modern switches provide segmentation, divide LAN into
independent collision domains
o Each port provides full media bandwidth
o Isolate unicast communications so that they're only heard by
source and destination- ARP replies only 2 nodes
Switching
Switch port fundamentals
o Based only on OSI MAC address
o Builds MAC address table used to make forwarding decisions
Switch MAC address table
o Switch fabric is integrated circuits and accompanying machine
programming that allows data paths through switch to be
controlled
o For switch to know which port to use, must learn which nodes
exist
o Handles incoming data using MAC address table- records MAC
address of nodes from each port
o If dont know, forwards packet to all ports, receives response
and records
o If connected to another switch, can have multiple MAC
addresses for that switch in table
Duplex Settings
o Port must be configured to match duplex setting of media type
Fixed or Modular
Layer 3 Switching
Layer 2 Versus Layer 3 Switching
o Layer 2 based only on MAC address and depends on routers to
pass data out of LAN
o Layer 3 can also use IP address information, can also perform
routing functions
Cisco Express Forwarding
o CEF decouples layer 2 and layer 3 decision making to accelerate
forwarding
o Forwarding information base (FIB): similar to routing table- best
path to destination network stored in CEF data structuresnetworking device uses FIB lookup table to make decisions
without route cache, and updated when changes
o Adjacency tables maintain layer 2 next-hop addresses
o Separation of FIB and adjacency benefits
Separate building, without any packets being process
switched
MAC header rewrite not stored in cache, so changes do not
require invalidation of entries
Types of Layer 3 Interfaces
o Switch Virtual Interface (SVI): logical interface associated with
VLAN- must be enabled for remote, as well as routing between
VLANs
Routed Port: physical port acting as router port on switchenable them to act as routers
o Layer 3 EtherChannel: logical interface associated with bundle
of routed ports. Used to bundle Ethernet links to aggregate
bandwidth
Configuring a Routed Port on a Layer 3 Switch
o Not associated with VLAN, can be configured with layer 3
routing protocol, and does not support layer 2 protocol
o Interface mode, no switchport
o
CHAPTER 6
IPv4 Packet
IPv4 Packet Header
o ARPANET 1983
o IP Header and Payload
o Version: IPv4 is 0100
o Internet Header Length (IHL): 4 bit identifies number of 32 bit
addresses in header- minimum 5, maximum 15 (20-60 bytes)
o Differentiated Services (DS): 8 bits to show priority of packet.
First 6 identify Differentiated Services Code Point (DSCP) for
QoS. Last 2 identify Explicit Congestion Notification (ECN) value
used to prevent dropped packets during congestion
o Total Length: 16 bits defines entire packet size- minimum 20
bytes, max 65,535 bytes
o Identification: 16 bits identifies fragment
o Flags: 3 bits how fragmented, used with Fragment Offset and
Identification fields
o Fragment Offset: 13 bits identifies order to place fragment
o Header Checksum: 16 bits used for error checking header
o TTL: 8 bits specified in seconds but usually hop count,
decreased by 1 each hop. If turns to 0, router discards and
sends ICMP time exceeded message
o Protocol: 8 bits data payload type- ICMP (1), TCP (6) and UDP
(17)
o Source IP Address
o Destination IP Address
IPv4 Header Fields
IPv6 Packet
Limitations of IPv4
o IP Address Depletion: 4 billion addresses, Increasing IP enabled
devices, always-on connections, and potential growth
o Internet Routing table expansion: More nodes connect, number
of network routes increase, consume memory and processor
resources
o Lack of End-to-end connectivity: Network Address Translation
(NAT) allows for multiple devices to share 1 public IP addressinternal network host address is hidden, problematic for end to
end connectivity
Introducing IPv6
o 1990s IETF
o Increased Address Space: 128 bit hierarchical- 340 undecilion
addresses
o Improved Packet Handling: Simplified, fewer fields, improving
packet handling and support for scalability
o Eliminates need for NAT: reduces problem, everyone can get an
IPv6 address
o Integrated Security: supports authentication and privacy
capabilities
Encapsulating IPv6
o IPv4 Header had 20 octets and 12 basic fields
o IPv6 Header has 40 octets (mostly addresses) and 8 header
fields
o Better routing efficiency for performance and scalability
o No requirement for processing checksums
o Simplified more efficient extension header mechanisms
o Flow label for per-flow processing, don't need to open inner
packet to identify various traffic flows
IPv6 Packet Header
o Version: 4 bits IPv6 is 0110
o Traffic Class: 8 bit field same to DS in IPv4
o Flow Label: 20 bits provides special service to real-time
applications, used to inform routers/switches to maintain same
path for packet flow so not reordered
Anatomy of a Router
A Router is a computer
o Branch: teleworkers, small business, medium size branch sites.
Cisco 800, 1900, 2900, 3900, ISR, G2
o WAN: Large businesses, organisations, enterprises. Catalyst
6500 Series, ASR 1000
o Service Provider: Large SP. ASR 1000, ASR 9000, XD 12000, CRS3, 7600 Series
o All require OS, CPU, RAM, and ROM, NVRAM
Router CPU and OS
o CPU needed to execute OS instructions- initialisation, routing
and switching functions
o OS needed to provide these functions, usually Internetwork
Operating System (IOS)
Router Memory
o RAM
IOS copied on during bootup
Running config file
IP routing table
ARP Cache
Packet Buffer
Use Dynamic RAM- DRAM, which stores instructions and
data needed by CPU
Volatile memory
ROM
Bootup instructions
Basic Diagnostic software- POST
Limited IOS- limited back up of OS
Firmware embedded on integrated circuit
o NVRAM
Permanent storage for startup config
o Flash Memory
IOS copied from flash into RAM during bootup
o 1941 routers come with 2 external Compact Flash slots
Inside a router
o Fan
o Power Supply
o Shield for WAN interface card WIC or high speed WIC
o Advanced Integration Module (AIM) option that offloads
processor-intensive functions such as encryption from the main
CPU
o Synchronous Dynamic RAM used for holding the running config
and routing tables, and for supporting packet buffering
o Nonvolatile RAM and boot flash memory used for storing the
ROMMON boot code as well as
o CPU
Router backplane
o Console Ports: 2 for initial configuration using RJ-45 and USB
Type-B (Mini B)
o AUX port: RJ-45 for remote management access
o Two LAN Interfaces: Gigabit Ethernet
o Enhanced High-speed WAN interface Card (EHWIC) slots: 2
provide modularity and flexibility, supporting different types of
interface modules- serial, DSL, switch port, wireless
o Dual compact flash memory slots: can support 4 GB compact
flash card for more storage space
o 2 USB host ports: additional storage space, secure token
capability
o Compact Flash: store IOS software image, log files, voice config
files, HTML files, backup configs- default only slot 0 is populated
Connecting to a router
o Management Ports: Console and Auxiliary ports used to
configure, manage and troubleshoot router, not packet
forwarding
o
Router Bootup
Cisco IOS
o Addressing, Interfaces, Routing, Security, QoS, Resource
Management (SQRAIR)
o IOS file several mb, stored in flash memory, allowing upgrades
or new features added
o During bootup, IOS copied from flash into RAM; faster, so
increases performance
Bootset files
o IOS Image File: basic operation of device's hardware
components- flash
o Startup configuration file: commands to initially configure
router and create running config- NVRAM
Router bootup process
1. Perform POST and load bootstrap program
i. POST tests router hardware, conducted by ROM chip on
CPU, RAM, NVRAM
ii. After POST, bootstrap copied from ROM to RAM, and
executes bootstrap task mainly to locate Cisco IOS and load
into RAM
2. Locate and load IOS software
i. During self decompression of IOS image file, string of #
displayed
ii. If not located in flash, looked for using TFTP server, if still
not found, scaled down version loaded instead, diagnose
problems or load full version
3. Locate and load startup config file or enter setup mode
i.
description
CHAPTER 7
Transportation of Data
Role of the Transport Layer
o Tracking the individual communication between applications on
source and destination hosts: establishes temporary
communication sessions. Each set of data called conversation
(web pages, IM, video, etc)
o Segmenting data for manageability and reassembling into
streams of application data: TCP and UDP used to transport
layer segments into appropriate size, adding header
o Identifies proper application for each communication stream:
Transport layer must identify target application - assigns each
application an identifier (port number)
Conversation Multiplexing
o Some types of data use all available bandwidth, making error
recovery and retransmission difficult
o Segmenting allows interleaving (multiplexing) of different
communication from different users on same network
o Provides means to send and receive data when running multiple
applications
o Adds header that allows multiplexing
Transport Layer Reliability
o Manages reliability requirements of conversation
o Specifies how to transfer messages between hosts using
Transmission Control Protocol (TCP) and User Datagram
Protocol (UDP)
o TCP is reliable full featured
o UDP is simple, no reliability provision
TCP
o Tracking transmitted data segments
o Acknowledging received data- sent in certain period of time
o Retransmitting any unacknowledged data
o File Transfer Protocol (FTP) and Hypertext Transfer Protocol
(HTTP) use TCP to ensure data delivery
o Place additional overhead
UDP
o No reliability, no burden on overhead
o Best effort delivery protocol
The right Transport layer protocol for the right application
o TCP good for when very specific sequence or all data needs to
be received needed: Databases, web browsers, email clients
During phone calls the user, not the protocol, manages lost
information
o Unique identifiers are port numbers
TCP and UDP Port Addressing
o Destination port: determines what kind of data
o Source port: randomly generated by sending device to identify
conversation between two devices, allowing simultaneous
conversations- separate HTTP service requests to web server at
same time
o Combination of source and destination IP addresses and port
numbers called socket
o Identifies server and service
o Socket identifies application process running on individual host
device
o Socket Pair has both source and destination sockets, identifying
specific conversation
o <ip address>:<port number>
o Communication endpoints known, allowing distinguishing
o IANA assigns port numbers
Well-Known Ports (0-1023)
Registered Ports (1024-49151): for user processes or
applications- when not used for server resource, can be
dynamically selected as source port
Dynamic or Private Ports (49152-65535): ephemeral ports,
assigned to identify client application during
communication when client initiates connection to service
Some applications use TCP and UDP- DNS can serve many
client requests very quickly, but requested info might need
reliability
o Netstat
Lists protocols in use, local address and port number,
foreign address and port number, and connection state
Unexplained/unnecessary TCP connections are security
threat and consume resources respectively
TCP and UDP Segmentation
o Different segmentation and order
o
TCP Communications
TCP Reliable Delivery
o Establishing connection, but overhead
UDP Communication
UDP Low Overhead Versus reliability
o DNS, SNMP, DHCP, RIP, TFTP, VoIP, online games
o TCP would detect small losses and retransmit, which is more
detrimental
UDP Datagram reassembly
o Transaction based- when application has data to send, it sends
data, so arrives in wrong order
USP Server Processes and Requests
o Assigned port numbers, like TCP
UDP Client Processes
o As soon as data ready to be sent and ports randomly identified,
UDP can form datagrams and send them on
o Same ports used for all datagrams in transaction
TCP or UDP, that is the question
Applications that use TCP
o HTTP, FTP, SMTP, Telnet, DNS, SNMP
Applications that use UDP
o Applications that can tolerate data loss but can't have delay:
VoIP and IPTV
o have simple request and reply transactions: DCHP, DNS and
SNMP
o or unidirectional communication
o Handle reliability themselves: TFTP
CHAPTER 8
IPv4 Issues
The need for IPv6
o 128 bit address for 340 undecillion addresses
o ICMPv6 (Internet Control Message Protocol Version 6) includes
simultaneously
Tunneling
Transporting IPv6 packet over an IPv4 network- IPv6
encapsulated in IPv4 packet
Translation
NAT64 allows IPv6-enabled devices to communicate with
IPv4 enabled devices
IPv6 Addressing
IPv6 Address Representation
o 32 bits, can be upper or lowercase
o Preferred format is 4 letters then :
Rule 1: Omit leading 0s
o To reduce, omit leading 0s
Rule 2: Omit all 0 segments
o Compressed format
Types of IPv6 Addresses
IPv6 Address Types
o Unicast: unique identification
o Multicast
o Anycast: any IPv6 unicast address that can be assigned to
multiple devices- beyond scope
IPv6 Prefix Length
o Prefix can range from 0-128, but generally /64
IPv6 Unicast Addresses
o Unicast address uniquely identifies interface on IPv6-enabled
device. 6 types
o Global Unicast: similar to public IPv4 Address, can be
dynamically or statically addressed
o Link-Local: communicate with other devices on same local
link/subnet
CHAPTER 9
Network Segmentation
Reasons for subnetting
o Reduces overall network traffic and improve network
performance-(Flat network design- all devices on one IP
network, good for small networks but Broadcasts create traffic
on large)
o Grouped by geographic location, organisational unit, device
type
Communication between subnets
o Routers use subnet mask to determine if local or remote
destination host
o Subnetting creates multiple logical networks from single
address block, each treated separate
o Traffic must be forwarded between subnets using routers-each
interface must have IP address
IP Subnetting is Fundamental
The plan
o Examine needs of organisation's network usage and how
subnets are structured via network requirements study
o Look at entire network, determine main sections, and how
segmented
o Address plan- needs for each subnet in size, hosts, and host
addresses, static/dynamic
o Public addresses generally allocated by SP
o
10.0.0.0
255.0.0.0
172.16.0.0
255.240.0.0
192.168.0.0
255.255.0.0
o
o
o
VLSM Chart
o Identify which blocks available for use
o Assign to minimise waste and keep unused contiguous
Structured Design
Planning to address the network
o Preventing Duplication of Addresses: documentation needed
o Providing and Controlling Access: Servers can give info to
internal and external hosts
o Monitoring Security and Performance: examine network traffic
for excessive packet addresses
Assigning addresses to devices
o Address for clients- usually DHCP, reduces burden, virtually
eliminates entry errors, leased
o Address for Servers and Peripherals- static, use consistent
numbering system for devices
o Address for hosts accessible from internet- generally servers,
static, have public space address, or private and router
configured to translate into public
o Addresses for Intermediary devices- concentration point for
traffic, good to monitor, manage, secure network, assigned level
3 addresses manually
CHAPTER 10
Telnet
Dynamic Host
Configuration Protocol
Hypertext Transfer
Protocol
FTP
Bootstrap Protocol
(BOOTP)
Internet Message
Access Protocol
o
o
o
o
o
o
o
o
o
o
POP
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
Move it
Network Access Layer for generation of data onto mediaframe with header and trailer (MAC address of source and
next hop)
o Data link Layer of OSI model
o Encodes to bits and electrical pulses that are sent across
Transporting the Data
o Can travel across different media- network access layer
specifies technique of getting across
Delivering the Data to the Correct Destination Application
o Network access to network, to transport, to application layer
o In transport layer, information in header identified specific
process running on destination device
o Individual processes communicate with each other via port
number (source and destination)
o
CHAPTER 11
who accesses
Username and password, challenge and response
questions, token cards
Local authentication: each device has own database of
user/pass
External Authentication: External network server
authentication- RADIUS (open standard, low use of CPU,
switches routers wireless devices) and TACACS+ (modular
AAA uses daemon running on security server)
Authorisation
What they can do
Determine what sources user can use and which operations
they can perform
o Accounting
Their actions are monitored
What they do, what is accessed, how many times, and
changes made
Firewalls
o Control traffic in network
o Resides between 2+ networks and controls traffic travelling into
network
o Packet Filtering: prevents/allows access based on IP/MAC
address
o Application Filtering: prevents/allows by port number
applications
o URL filtering: URL filtering/keywords
o Stateful packet inspection (SPI): incoming packets must be
legitimate responses from internal requests (can also filter out
DoS)
o Firewalls can also perform NAT, concealing IP addresses from
outside users
o Appliance-based firewalls: built in to security appliance device
o Server-based firewalls: runs on NOS like unix or windows
o Integrated firewalls: router receives firewall functionality
Endpoint security
o Laptops, desktops, servers, smart phones, tablets
o Employees trained on proper use, policies, documentation
o Securing layer 2 devices against MAC address spoofing, MAC
address table overflow attacks, LAN storm attacks (Attack
mitigation)
o
Securing devices
Introduction to securing devices
o Default username and password changed immediately
o Access to system resources restricted
o Any unnecessary services/applications turned off/uninstalled
Passwords
o 8+ characters, complex (uppercase lowercase letters symbols),
meaningless, misspell words, change often, don't write down
Ping
Interpreting Ping results
o Identify source of problem
o Checks protocol stack and IPv4 Address and connectivity
o IOS Ping Indicators
! Is receipt of ICMP echo reply, Layer 3 successful
. Indicates time expired, device security or no path to
destination
U unreachable, no route to destination or blocked
o Testing the Loopback: Verifies IP config on local host using
127.0.0.1
Extended ping
o Privileged EXEC mode with no IP address
o Can remotely ping by changing source ping address
Network Baseline
o Process that studies network at intervals, report created over
time
o Copy results from ping/trace into text file time stamped with
date and archived
o Compare results over time- error messages and response times
o Verifies host to host connectivity, latency issues, helpful for
network admins to keep network running efficiently
Tracert
Interpreting Tracert messages
o List of hops
o Form depends where command is issued (tracert from
windows, traceroute from router)
Show Commands
Common show commands revisited
o Show running-config
o Show interface
o Show arp
o Show ip route
o Show protocols
o Show version
Viewing Router settings with the show version Command
o Used to verify/troubleshoot basic hardware/software
components
o IOS version, bootstrap version, filename of IOS and bootstrap,
CPU type, RAM, number and type of physical interfaces, amount
of NVRAM, amount of flash memory, currently configured value
of software configuration register in hexadecimal
o Configuration register tells how to boot up, can change so looks
for IOS in different place on next bootup
Viewing Switch settings with the show version command
o Software and bootstrap version, system up-time, system restart
info, IOS filename, model number and processor type, memory
type (shared/main), hardware interfaces, configuration register
Host and IOS commands
Flash File System: several files located in flash, but last listing is
current Cisco IOS file image
o NVRAM File System: to view, must change current default file
system using cd. Pwd (present working directory) shows which
directory you're working in. dir command lists contents,
including start-up config file
Switch file systems
o Copy config files, archive software images
o Same commands as router
o
Integrated Router
Multifunction Device
o Homes use for internet sharing, print sharing, centralised
storage, etc
o Don't need switches and routers, so use multifunction devices
(multifunction device)
o Combined switch and router, happens internally
o Offers wired and wireless connectivity, offering access point
o Also offer DHCP, firewall, and sometimes network attached
storage services (NAS)
Types of Integrated Routers
o Small for home office, or powerful for enterprise branch offices
o Linksys wireless router
Reduces cost of device, but single point of failure
ISR (integrated services router) have modularity, separate
components (allowing adding, replacing, and upgrading)
Allow config settings like passwords, IP addresses, DHCP
settings
Wireless Capability
o Wireless Mode
IEEE 802.11 wireless standard- most support b,g,n
Will return to oldest standard
o SSID (Service Set Identifier)
Helps connect to correct WLAN
Case sensitive, alpha-numeric name for network
Tells wireless devices which WLAN they belong to and
which devices they can communicate with
All wireless devices must have same SSID to communicate
o Wireless Channel
Dividing up available RF spectrum, so each channel can
carry a different conversation
Aps can function closely, as long as they use different
channels
Basic Security of Wireless
o Change default values for SSID, usernames, and passwords
o Disable broadcast SSID
o Configure encryption using WEP or WPA
REVISION NOTES
CHAPTER 1
CLOBALLY CONNECTED
Networking Today
o Technology then and now
Resources include: sharing photos, videos and experiences,
accessing school network, communicating via email, IM, or
VoIP, watching movies/tv shows, playing online games,
checking weather and traffic, as well as bank balance.
Internet of Everything- bringing people, process, data and
things together to make network connections more
relevant/valuable
o The Global Community
Create a world where geography and physical limitations are
irrelevant
Independent of location or time zone
o Networks support the way we learn
Maximising the dissemination of knowledge
Traditionally- textbook and instructor- both limited
Networks deliver interactive activities, assessments, feedback,
virtual classrooms, on demand video, learning spaces,
mobile learning, distance learning, e-learning, discussion
boards and wikis, admin- student enrolment, assessment
delivery, progress tracking
o Networks support the way we communicate
IM/texting: real time communication between 2+ people,
also file transfer, voice, video communication
Social Media: interactive websites where user generated
content is shared
Collaboration tools: working together on shared documentsremote locations can contribute equally with city
counterparts
Weblogs: anyone can easily update and edit thoughts to
global audience
Wikis: group creation of information, extensive reviewing and
editing
Podcasts: audio-based medium can deliver recordings to
wide audience
P2P file sharing: share files with each other without having to
Advantages
Disadvantages
Easy to set up
No central admin
Less complex
Not as secure
Simultaneous client/server
may slow performance
Components of a Network
o Devices- hardware
End Devices
Form interface between users and communication
network
Each host is identified by an address
Media type
Encoding
Metallic wires
Wireless transmission
Electromagnetic waves
Criteria
Distance the medium can carry a signal
Environment
Amount of data and speed it must be transmitted
Cost of medium and installation
Services- Software and processes that run on devices
Network Representations
Network Interface Card (or LAN adapter)- provides physical
connection.
Physical Port- connector/outlet on device where medium is
connected to host
Interface- Specialised ports on internetworking devicesconnect to individual networks. Routers used to
interconnect networks, so ports on router called network
interfaces
o
o
o
o
o
The Internet
o Collection of interconnected private and public networks
o Intranet
Private connection of LANs and WANs, only accessible to
members of organisation
Eliminate paperwork, speed workflows
e.g. internal events, health and safety policies, newsletters,
phone directories, class schedules, curricula, forums
o Extranet
Individuals from outside the organisation can gain access to
information they require from the organisation's intranet
e.g. outside suppliers and contractors, hospitals providing
booking schedules for doctors
o Internet Access Technologies
Home users need to connect to an internet service provider
(ISP)
Business class interconnections provided by SP
o Connecting Remote users to the Internet
Cable
Cellular
Satellite
Dialup
Inexpensive, using a phone line and modem
telephone Low bandwidth, low speed
o
Dedicated
Leased Line
Metro
Ethernet
Business DSL
Satellite
Network Trends
o Bring Your Own Device
Students and employees bring their own phones, tablets,
laptops, notebooks, e-readers
More flexibility
o Online Collaboration
Ensuring everyone has access to all the information, on the
same page
Decreased budget and personnel, balancing resources
Maintain face to face relationships
o Video Communication
Identity theft
Internal threats
Security solutions
Home/small office
Antivirus and antispyware
Firewall filtering
Corporate
Dedicated firewall systems
Access Control Lists (ACL)
Intrusion Prevention Systems (IPS)- prevent zero day
Virtual Private Networks (VPN)- secure access to
remote workers
THE CHANGING NETWORK ENVIRONMENT
Network Trends
o Bring Your Own Device
Students and employees bring their own phones, tablets,
laptops, notebooks, e-readers
More flexibility
o Online Collaboration
Ensuring everyone has access to all the information, on the
same page
Decreased budget and personnel, balancing resources
Maintain face to face relationships
o Video Communication
Used for communication, collaboration, and entertainment
Distance business, lowering costs, reduce impact on
environment
Drivers for organisations to develop video solution strategy
Global workforce and need for real time collaboration
Reducing costs and green IT
New opportunities for IP convergence- video
applications such as collab, advertising, and
surveillance systems onto single IP network
Media explosion- high quality low cost video recording
devices
Social networking- employees film short videos to
share best practices
Demands for universal media access
Cloud Computing
Resources delivered as a service over a network, charging a
service fee
Benefits
Organisational flexibility
Agility and rapid development
Reduced cost of infrastructure
Refocus of IT resources
Creation of new business models
Types
Private- only for specific organisation, e.g.
government- internally managed (expensive to build
up) or externally with strict access security
Public- offered to general population, free or pay per
use, using the internet
Hybrid- 2+ clouds where each part is distinctive but
have connection via a single architecture. Various
services levels based on user access rights
Custom- build to meet the needs of a specific industrycan be private or public
Data centres
Facility used to house computer systems and
associated components
Associated components
Redundant data communication connections
High speed virtual servers (server farms or server
clusters)
Redundant storage systems (SAN)
Redundant/back up power supplied
Environmental controls (AC, fire suppression)
Security devices
Use cloud computing and virtualisation (runs several
OSs in parallel on a single CPU, reducing admin and
cost overheads)
Very expensive to build and maintain, generally large
organisations have their own, smaller lease.
Powerline Networking
Uses existing electrical wiring to connect devices
"no new wires" saves cost of installing data cables, no cost
to electric bill
Alternative when cables or wireless are not a viable option
Use a standard powerline adapter
Wireless Broadband
WISP (Wireless internet provider)
Rural environments where DSL/cable not found
Connects subscribers to hotspot
Antenna can be attached to existing elevated structure
Wireless Broadband Service
Antenna installed outside the house
Uses same technology used by smartphone/tablet
Security Threats
CHAPTER 2
BOOTCAMP
IOS Bootcamp
Cisco IOS
o Location of the Cisco IOS
Stored in flash
Generally IOS copied from flash into RAM
RAM has functions including storing data, increasing
performance, however data lost during power cycle
o IOS Functions (generally accessed by CLI)
Security
IP addressing
Optimise connectivity- interface-specific configurations
Routing
QoS technologies
Network management technologies
Accessing a Cisco IOS device
o Console
Management port that provides out of band access
Access via dedicated management channel for maintenance
purposes- initial configuration, when remote access
unavailable
Connect to determine status of device, showing start up,
debugging and error messages
o Telnet SSH and AUX
Telnet
Method for remotely establishing CLI session through
virtual interface
Unlike console, requires active networking services on
device- must have one active interface with address
like IPv4
Cisco IOS devices include Telnet server process- allows
configuration commands from Telnet client
Also has Telnet client, can telnet from device to any
other device with telnet server process
SSH
Show startup-config
Displays the saved configuration located in NVRAM
Show running-config
Displays the contents of the currently running config
file
More
When output is more than single page, --more-appears, press spacebar for more, enter for one more
line
The show version Command
Displays info about the currently loaded IOS version +
hardware and device information
Includes
Software version- stored in flash
Bootstrap version- stored in Boot ROM
System up-time
System restart info- method of restart
Software image name- filename stored in flash
Router type and processor type- model number
Memory type and allocation (shared/main)- RAM and
shared packet buffering
Software features
Hardware interfaces- interfaces available
Configuration register- sets bootup specifications,
console speed setting, and other parameters
GETTING BASIC
Host Names
o Why the Switch
One of the simplest devices, no configuration prior to
functioning
Has initial settings like name, device config, banner
messages, and saving
o Device Names
Appear in CLI prompts, authentication processes, and
topology diagrams
Default name is assigned until hostname given
Use naming convention to easily understand
Start with a letter
Contain no spaces
End with a letter or digit
Saving Configurations
o Configuration Files
Running-Config
Running config file reflects current configuration
applied to IOS device, changes take effect immediately
Stored in working memory of device- RAM, so
temporarily active while running, but if powered off,
changes are lost unless saved
Options after making a change
Return device to original config- reload, no at
prompt
Remove all configs from device- Erase startupconfig, also need to delete vlan.dat
Make changed config the new start up configcopy running-config startup-config
Startup-config
File reflects config that will be used upon reboot,
stored in NVRAM
o Capturing Text
Config files can be saved and archived to text document
Steps
File menu click log
Choose location
After capture has been started, execute show
running/startup config
Text displayed in window will be placed into file
ADDRESS SCHEMES
Verifying Connectivity
Test the Loopback Address on an End Device
o Ping command on reserved address called loopback (127.0.0.1)
Testing the interface assignment
o Show ip interface brief to verify condition of the switch
interfaces
Testing PC-to-Switch Connectivity
o Ping command can be used on a PC
Testing end to end connectivity
o Ping with computers
CHAPTER 3
RULES OF COMMUNICATION
Protocols
Interaction of Protocols
o
o
o
o
Protocol Suites
Protocol Suite: TCP/IP- open standard (freely available to public)
o
o
o
interoperate
Some are proprietary- one company controls how the protocol
Standards Organisations
Open Standards
o ISOC (The internet society)- open development, evolution, and
internet use
o IAB (Internet Architecture Board)- overseen by ISOC, responsible
for overall management and development of internet
Standards- 13 members
o IETF (Internet Engineering Task Force)- develop, update and
maintain internet and TCP/IP technologies. Produces request for
comments (RFC) documents. Consists of working groups (WGs).
IESG (Internet Engineering Steering Group) is responsible for
technical management of IETF
o IRTF (Internet Research Task Force)- long term research e.g. anti
spam, crypto forum, peer to peer, and router research
o IEEE (Institute of Electrical and Electronics Engineers)dedicating to advance innovations and standards
o ISO (International Organisation for Standardisation)
Best known for OSI (Open Systems Interconnection)
Reference Models
The Benefits of Using a Layered Model
o Assists in protocol design, Fosters competition, Prevents
technology or capability changes in one layer from affecting
other layers, Provides a common language
o Protocol- describes the functions that occur at each layer of
protocols: e.g. TCP/IP
o Reference- aids in clearer understanding of functions and
processes involved- provides consistency within all types of
network protocols: e.g. OSI model
The OSI reference model
o Framework on which to build a suite of open systems protocols
o 7 layers, often referred to by number
The TCP/IP Protocol model
o Four categories of functions
o Standards discussed in public forum and defined in publicly
available set of RFCs-contain both formal specification of
protocols and resources
o RFCs also contain technical and organisational documents
Comparing the OSI model with the TCP/IP model
o
o
Data Encapsulation
Communicating the Messages
o Divide data into packets- segmentation
o By sending smaller pieces, many different conversations can be
interleaved- multiplexing
o Increases reliability- can be split up to not overload congested
networks, and if a piece fails to arrive, only that bit needs to be
retransmitted
o Downside- added complexity
Protocol Data Units
o PDU is form that piece of data takes, changes name at each
layer
Data- general term for PDU at application layer
Segment- Transport layer PDU
Packet- Network layer PDU
Frame- Data link layer PDU
Bits- Physical layer PDU
Encapsulation
o Application layer protocol, HTTP, delivers HTML formatted web
page data to transport layer- broken into TCP segments
o Each TCP segment given label (header), with info about which
process on destination computer should receive message, and
how to reassemble
o Sends to internet layer, where IP protocol implemented- IP
header added, containing source and destination host IP
address
o IP packet sent to network access layer, encapsulated in a frame
header and trailer- header contains source and destination
physical address (devices), trailer contains error checking info
o Bits encoded onto media by server NIC
Accessing Local Resources
Network addresses and data-link addresses
o Network address (layer 3)
CHAPTER 4
PHYSICAL LAYER PROTOCOLS
Encoding
Signaling
Bandwidth
o Capacity of medium to carry data
o Digital bandwidth- amount of data that can flow in a given
amount of time
o Factors include properties of physical media, and technologies
chosen for signaling and detecting network signals
Throughput
o Measure of the transfer of bits across media over given period
of time
o Factors such as amount, type of traffic, and latency created by
intermediary network devices between source and destination
o Cannot be faster than slowest link of the path
o Goodput- throughput minus traffic overhead
Types of Physical Media
o Standards for copper media
Type of copper cabling
Bandwidth of communication
Type of connectors used
Pinout and colour codes of connections
Maximum distance of media
NETWORK MEDIA
Copper Cabling
Characteristics
o Inexpensive, easy to install, low resistance
o Signal attenuation- longer it travels, more it deteriorates
o Electromagnetic Interference (EMI) or radio frequency
interference (RFI): fluorescent lights or electric motors can
distort/corrupt signals
o Crosstalk: EM fields disturb adjacent wires- can hear part of
another voice conversation on phones
o To counter EMI/RFI, wrapped in metallic shielding with
grounding connections
o To counter crosstalk, opposing circuit wire pairs twisted
together
Shielded Twisted-Pair (STP) Cable
o Better noise protection, but more expensive and difficult to
install
o Terminated with special shielded connectors (but if improperly
grounded, shield could counterproductively act as antenna and
pick up more signals)
Fibre-Optic Cabling
Properties
o Longer distances and higher bandwidths
o Can transmit signals with less attenuation and immune to
EMI/RFI
o Used in:
Enterprise networks: backbone cabling applications and
infrastructure devices
FTTH and Access Networks: Fibre-to-the-home is always on
broadband services
Long-Haul networks: connect countries and cities
Submarine Network: able to survive undersea environments
Cable Design
o Core- pure glass, where light is carried
o Cladding- surrounds core, acts as mirror- total internal
reflection
o Jacket- PVC jacket protects core and cladding
Types
o Light pulses can be lasers or light emitting diodes (LEDs)
o Photodiodes detect light pulses, converting them to voltages
and reconstructed into data frames
Wireless Media
Properties
o Unrestricted by conductors or pathways, great mobility options,
increasing number of wireless devices
o Concerns
Coverage areas: good in open areas, but limited inside
Interference: cordless phones, fluorescent lights, microwave
ovens can all disrupt
Security: devices and users not authorised can gain accessno access to physical media necessary
Types
o Data communications Standards
Standard IEEE 802.11: WLAN (Wifi), contention system with
CSMA/CA media access process used
Standard IEEE 802.15: WPAN (Wireless personal area
network), e.g. bluetooth, uses device pairing
Topologies
Physical: How end devices and infrastructure devices are
interconnected
Logical: way a network transfers frames from one node to the next,
using virtual connections; signal paths defined by DLL protocols
WAN Topologies
Common Physical WAN
o Point-to-Point: permanent link between two endpoints
o Hub and Spoke: WAN version of Star- central site interconnects
branch sites using point to point
o Mesh: High availability, but every end system connected to
everything, high admin/physical costs
Logical Point to point topology
o Don't have to share media with others, no question about
whether incoming frame is for them
o Use of physical devices does not affect logical topology
o Logical connection formed between two devices is called virtual
circuit (even if intermediary devices)
o Media access method used by DLL protocol is determined by
logical point to point topology rather than physical
LAN Topologies
Physical LAN topologies
o Star- End devices connected to central switch; most common
LAN topology as easy to install and troubleshoot, scalable
o Extended star/Hybrid: central intermediate devices interconnect
other star topologies (in hybrid, may interconnect using bus)
o Bus: all end systems chained to each other, terminated in some
form on each end; switches not required, used in legacy
Ethernet because cheap and easy set up
o Ring: end systems connected to neighbour, not terminated;
used in Fibre Distributed Data Interface (FDDI) networkssecond ring for fault tolerance or performance enhancements
Logical Topology- Contention Based Access
o Non-deterministic contention-based method, attempt to access
medium whenever it has data to send
o Can fail, causing data collision- corrupted, needs to be resent
o Don't have overhead, but doesn't scale well under heavy media
use, and recovery mechanisms diminishes throughput
o Carrier Sense Multiple Access with Collision detection
(CSMA/CD): end device monitors for signal, if free, send, if
detected, wait (used by traditional Ethernet) Using switches and
full-duplex mean now unnecessary
CHAPTER 5
ETHERNET PROTOCOLS
Ethernet Operations
802.2 in LLC, Supports from 10Mb/s to 100 Gb/s
MAC Sublayer
o Implemented by hardware: Ethernet- 802.3, 802.3u fast ethernet,
802.3z GigabitEthernet, FDDI
o
Ethernet MAC
MAC Addresses and Hexadecimal
o Respresented by 0x prefix, or H suffix
o Used to represent MAC or IPv6 addresses
o Ipconfig /all used to identify MAC address
Unicast MAC Address
ARP Functions
Broadcast requests and unicast replies
Resolves IPv4 addresses to MAC
o When packet encapsulated to frame, node refers to table to find
DLL address mapped to IPv4 address- called ARP table/cache,
stored in RAM
o Each entry binds IP to MAC- relationship is called a map
o If MAC found in table, uses it as address
Maintains a table of mappings
o Maintained dynamically- monitor incoming traffic, or send ARP
request
o Unicast reply comes, and new entry is made in table
o If no response, packet dropped as it cannot be created
o Time stamped- if expires, removed from table
o Static entries can be entered, and do not expire over time
ARP Role in Remote Communication
If destination host not on local network, delivered to router, using
gateway MAC address
When packet created, compares destination IP address and own IP
address to see if on local network; if not, determines MAC address
for router
Removing entries from an ARP Table
ARP cache timer removes entries- time different
Commands used to manually remove
Need to remove no longer operational devices, otherwise will
attempt to send
ARP Issues
How ARP can create problems
o Broadcasts, overhead on the media
Possible reduction in performance if lots try to access
simultaneously initially, until ARP established
o
Security
ARP spoofing/poisoning
Inject wrong MAC address with fake ARP replies
LAN SWITCHES
Switching
Switch port fundamentals
o Based only on OSI MAC address
o Builds MAC address table used to make forwarding decisions
Switch MAC address table
o Integrated circuits accompanying machine programming that
allows data paths through switch to be controlled
o For switch to know which port to use, must learn which nodes
exist
o Handles incoming data using MAC address table- records MAC
address of nodes from each port
o If dont know, forwards packet to all ports, receives response
and records
o If connected to another switch, can have multiple MAC
addresses for that switch in table
Duplex Settings
o Port must be configured to match duplex setting of media type
o Half Duplex (CSMA/CD)
Unidirectional data flow
Higher collision rates
Hub connectivity
Both devices can transmit and receive on media, but not
simultaneously; Ethernet established arbitration rules to
resolve same time conflicts
o Full Duplex
Bidirectional, reducing wait time
Frames cannot collide because end nodes have two
separate circuits
Fixed or Modular
Fixed versus Modular Configurations
o Power over Ethernet (PoE): allows switch to deliver power to
device over Ethernet cabling
o Forwarding Rate: rates how much data a switch can process per
second
o Entry layer switches have lower FR than enterprise layer
switches
o
o
o
o
Layer 3 Switching
Layer 2 Versus Layer 3 Switching
o Layer 2 based only on MAC address and depends on routers to
pass data out of LAN
o Layer 3 can also use IP address information, can also perform
routing functions
Cisco Express Forwarding
o CEF decouples layer 2 and layer 3 decision making to accelerate
forwarding
o Forwarding information base (FIB): similar to routing table- best
path to destination network stored in CEF data structuresnetworking device uses FIB lookup table to make decisions
without route cache, and updated when changes
o Adjacency tables maintain layer 2 next-hop addresses
o Separation of FIB and adjacency benefits
Separate building, without any packets being process
switched
MAC header rewrite not stored in cache, so changes do not
require invalidation of entries
Types of Layer 3 Interfaces
o Switch Virtual Interface (SVI): logical interface associated with
VLAN- must be enabled for remote, as well as routing between
VLANs
o Routed Port: physical port acting as router port on switchenable them to act as routers
o Layer 3 EtherChannel: logical interface associated with bundle
of routed ports. Used to bundle Ethernet links to aggregate
bandwidth
Configuring a Routed Port on a Layer 3 Switch
o Not associated with VLAN, can be configured with layer 3
routing protocol, and does not support layer 2 protocol
o Interface mode, no switchport
CHAPTER 6
NETWORK LAYER PROTOCOLS
IPv4 Packet
IPv4 Packet Header
o ARPANET 1983
o IP Header and Payload
o Version: IPv4 is 0100
o Internet Header Length (IHL): 4 bit identifies number of 32 bit
addresses in header- minimum 5, maximum 15 (20-60 bytes)
o Differentiated Services (DS): 8 bits to show priority of packet.
First 6 identify Differentiated Services Code Point (DSCP) for
QoS. Last 2 identify Explicit Congestion Notification (ECN) value
used to prevent dropped packets during congestion
o Total Length: 16 bits defines entire packet size- minimum 20
bytes, max 65,535 bytes
o Identification: 16 bits identifies fragment
o Flags: 3 bits how fragmented, used with Fragment Offset and
Identification fields
o Fragment Offset: 13 bits identifies order to place fragment
o Header Checksum: 16 bits used for error checking header
o TTL: 8 bits specified in seconds but usually hop count,
decreased by 1 each hop. If turns to 0, router discards and
sends ICMP time exceeded message
o Protocol: 8 bits data payload type- ICMP (1), TCP (6) and UDP
(17)
o Source IP Address
o Destination IP Address
IPv4 Header Fields
o
o
IPv6 Packet
Limitations of IPv4
o IP Address Depletion: 4 billion addresses, Increasing IP enabled
devices, always-on connections, and potential growth
o Internet Routing table expansion: More nodes connect, number
of network routes increase, consume memory and processor
resources
o Lack of End-to-end connectivity: Network Address Translation
(NAT) allows for multiple devices to share 1 public IP addressinternal network host address is hidden, problematic for end to
end connectivity
Introducing IPv6
o 1990s IETF
o Increased Address Space: 128 bit hierarchical- 340 undecilion
addresses
o Improved Packet Handling: Simplified, fewer fields, improving
packet handling and support for scalability
o Eliminates need for NAT: reduces problem, everyone can get an
IPv6 address
o Integrated Security: supports authentication and privacy
capabilities
Encapsulating IPv6
o IPv4 Header had 20 octets and 12 basic fields
o IPv6 Header has 40 octets (mostly addresses) and 8 header
fields
o Better routing efficiency for performance and scalability
o No requirement for processing checksums
o Simplified more efficient extension header mechanisms
o Flow label for per-flow processing, don't need to open inner
packet to identify various traffic flows
IPv6 Packet Header
o Version: 4 bits IPv6 is 0110
o Traffic Class: 8 bit field same to DS in IPv4
o Flow Label: 20 bits provides special service to real-time
applications, used to inform routers/switches to maintain same
path for packet flow so not reordered
o Payload Length: same as Total length in IPv4
o
o
o
o
o
ROUTING
o
o
o
o
127.0.0.0-127.255.255.255: Loopback
192.168.10.0/24: has network address representing all, the host
address, and the broadcast address
224.0.0.0: Multicast class D addresses, through loopback or host
IP interface
255.255.255.255: limited broadcast IP address values for
loopback/host, used to find DHCP server
o
o
o
ROUTERS
Anatomy of a Router
A Router is a computer
o Branch: teleworkers, small business, medium size branch sites.
Cisco 800, 1900, 2900, 3900, ISR, G2
o WAN: Large businesses, organisations, enterprises. Catalyst
6500 Series, ASR 1000
o Service Provider: Large SP. ASR 1000, ASR 9000, XD 12000, CRS3, 7600 Series
o All require OS, CPU, RAM, and ROM, NVRAM
Router CPU and OS
o CPU needed to execute OS instructions- initialisation, routing
and switching functions
o OS needed to provide these functions, usually Internetwork
Operating System (IOS)
Router Memory
o RAM
IOS copied on during bootup
Running config file
IP routing table
ARP Cache
Packet Buffer
Use Dynamic RAM- DRAM, which stores instructions and
data needed by CPU
Volatile memory
o ROM
Bootup instructions
Basic Diagnostic software- POST
Limited IOS- limited back up of OS
Firmware embedded on integrated circuit
o NVRAM
Permanent storage for startup config
o Flash Memory
IOS copied from flash into RAM during bootup
Router Bootup
Cisco IOS
o Addressing, Interfaces, Routing, Security, QoS, Resource
Management (SQRAIR)
o IOS file several mb, stored in flash memory, allowing upgrades
or new features added
o During bootup, IOS copied from flash into RAM; faster, so
increases performance
Bootset files
o IOS Image File: basic operation of device's hardware
components- flash
o Startup configuration file: commands to initially configure
router and create running config- NVRAM
Router bootup process
1. Perform POST and load bootstrap program
i. POST tests router hardware, conducted by ROM chip on
CPU, RAM, NVRAM
ii. After POST, bootstrap copied from ROM to RAM, and
executes bootstrap task mainly to locate Cisco IOS and load
into RAM
2. Locate and load IOS software
i. During self decompression of IOS image file, string of #
displayed
ii. If not located in flash, looked for using TFTP server, if still
not found, scaled down version loaded instead, diagnose
problems or load full version
3. Locate and load startup config file or enter setup mode
i. Bootstrap searches for startup config- if exists, copied into
running config
ii. If TFTP server not found, router displays setup mode
prompt
CHAPTER 7
TRANSPORT LAYER PROTOCOLS
Transportation of Data
Role of the Transport Layer
o Tracking conversations: establishes temporary communication
sessions.
o Segmenting/reassembling into streams of application data
o Identifies destination : assigns each a unique identifier (port
number)
Conversation Multiplexing
o Header provides means to send and receive data when running
multiple applications/different users
The right Transport layer protocol for the right application
o TCP good for when very specific sequence or all data needs to
be received needed: Databases, web browsers, email clients,
FTP, HTTP, SMTP, Telnet, DNS, SNMP
o UDP good for video streaming, internet radio, RIP, online
games, Applications that can tolerate data loss but can't have
delay (VoIP and IPTV), have simple request and reply
transactions (DHCP, DNS and SNMP), or unidirectional
communication, or handle reliability themselves: TFTP
Introducing TCP and UDP
Introducing Transmission Control Protocol (RFC 793)
o Establishing sessions, Reliable Delivery, Ordered data
reconstruction, Flow control
o Stateful protocol: keeps track of state of communication
session- what has been acknowledged
o Header- 20 bytes of overhead
Sequence number (32): reassembly order
Acknowledgement number (32): indicates the data received
Header length (4): data offset, indicates length of header
Reserved (6): for future
Control bits (6): flags to indicate purpose/function of TCP
Window Size (16): number of segments accepted at one
time
Checksum (16): error checking
Urgent (16): Indicates if data is urgent
Introducing User Datagram Protocol (RFC 768)
TCP Communications
TCP Connection Establishment and Termination
o Open port accepts segments- restrict server access to open
ports (security)
o TCP is full duplex protocol- each connection is two one-way
communication streams
o Control bits indicate progress and status of connection
UDP Communication
UDP Low Overhead Versus reliability
o TCP would detect small losses and retransmit, which is more
detrimental
UDP Datagram reassembly
o Transaction based- when application has data to send, it sends
data, so arrives in wrong order
USP Server Processes and Requests
o Assigned port numbers, like TCP
UDP Client Processes
o As soon as data ready to be sent and ports randomly identified,
UDP can form datagrams and send them on
o Same ports used for all datagrams in transaction
CHAPTER 8
IPV4 NETWORK ADDRESSES
IPv4 Issues
The need for IPv6
o 128 bit address for 340 undecillion addresses
o ICMPv6 (Internet Control Message Protocol Version 6)
includes address resolution and address auto-configuration
IPv4 and IPv6 Coexistence
o Dual Stack
Allows IPv4 and IPv6 to coexist on same network- run
simultaneously
Tunneling
Transporting IPv6 packet over an IPv4 network- IPv6
encapsulated in IPv4 packet
Translation
NAT64 allows IPv6-enabled devices to communicate
with IPv4 enabled devices
IPv6 Addressing
32 bits, can be upper or lowercase- Preferred format is 4 letters
then :
Rule 1: Omit leading 0s. Rule 2: Omit all 0 segments
Types of IPv6 Addresses
IPv6 Unicast Addresses
o Prefix can range from 0-128, but generally /64
o Unicast address uniquely identifies interface on IPv6enabled device. 6 types
o Global Unicast: Link-Local: Loopback: ::1/128 Unspecified
Address: ::/128 (can only be used as source address- when
device doesn't have permanent IPv6 address yet, or
irrelevant to destination)Unique Local: FC00::/7-FDFF::/7
(used for local addresses in a site or limited number of sites,
not routable)IPv4 embedded: (used to help transition,
beyond scope)
IPv6 Link-Local Unicast Addresses
o communicate with other devices on same local link/subnet
o Cannot be routed, have significant role in aspects of
network- every IPv6 interface must have link-local address
o On FE80::/10 range
o
o
CONNECTIVITY VERIFICATION
ICMP
ICMPv4 and ICMPv6 Messages
o If certain errors, IP messages sent
o ICMP is for both IPv4 and IPv6, messaging protocol and more
respectively
o Host confirmation: Echo used to determine if operational- basis
of ping
o Destination/service unreachable: when host/gateway receives
package it can't deliver- 0=net unreachable, 1=host
unreachable, 2=protocol unreachable, 3=port unreachable
o Time exceeded: TTL field was decremented to 0- router discards,
sends message to source host (IPv6 uses hop limit field)
Network Segmentation
Reasons for subnetting
o Reduces overall network traffic and improve network
performance-(Flat network design- all devices on one IP
network, good for small networks but Broadcasts create traffic
on large)
o Grouped by geographic location, organisational unit, device
type
Communication between subnets
o Subnetting creates multiple logical networks from single
address block, each treated separate
IP Subnetting is Fundamental
The plan
o Examine needs (usage and structure) via network requirements
study
o Look at entire network, determine main sections, and how
segmented
o Address plan- needs for each subnet in size, hosts, and host
addresses, static/dynamic
o Public addresses generally allocated by SP
Subnetting an IPv4 Network
Basic Subnetting
o IPv4 subnets created by using 1+ host bits as network bits- the
more hosts borrowed, more subnets defined
o For each bit borrowed, number of subnets doubled
Calculating the hosts
o Borrow however many bits to cover subnet (2^n -2)
o Find subnetting masks
o Calculate network address, host range and broadcast
Benefits of variable-length subnet masking
Traditional subnetting Wastes addresses
o If all are 30 hosts, then WAN wastes 28 hosts
o Subnetting a subnet to maximise
Variable-length subnet masks
o Varies depending on how many bits borrowed for particular
subnet
o Subnetting subnets reduces number addresses per subnet to
appropriate size
o Frees up for future networks
VLSM Chart
o Identify which blocks available for use
o Assign to minimise waste and keep unused contiguous
ADDRESSING SCHEMES
Structured Design
Planning to address the network
CHAPTER 10
APPLICATION LAYER PROTOCOLS
Telnet
Dynamic Host
Configuration Protocol
Hypertext Transfer
Protocol
FTP
Bootstrap Protocol
(BOOTP)
CHAPTER 11
CREATE AND GROW
Securing devices
Introduction to securing devices
o Default username and password changed immediately
o Access to system resources restricted
o Any unnecessary services/applications turned off/uninstalled
Passwords
o 8+ characters, complex (uppercase lowercase letters symbols),
meaningless, misspell words, change often, don't write down
o On cisco routers, can use space, pass phrase
o Verify strength by using brute force attack tools on own
passwords
Basic security Practices
o Additional Password Security
Service password-encryption to prevent people from
seeing passwords in plain text
Security passwords min-length command
Login block-for 120 attempts 3 within 60
o Banners: Able to prosecute anyone accessing system
inappropriately
o Exec-timeout 10
Enable SSH
o Router has unique host name, and configure IP domain name
o One way secret keys (crypto key generate rsa general-keys
modulus) determines size of key
o Create local database username entry (username <name>
secret < secret>)
o Enable vty inbound SSH using login local and transport input
ssh
BASIC NETWORK PERFORMANCE
Ping
Interpreting Ping results
o Identify source of problem by checking protocol stack, IPv4, and
connectivity
o IOS Ping Indicators
! Is receipt of ICMP echo reply, Layer 3 successful
. Indicates time expired, device security or no path to
destination
U unreachable, no route to destination or blocked
o Testing the Loopback
Extended ping
o Privileged EXEC with no IP address: Can remotely ping by
changing source
Network Baseline
o Process that studies network at intervals, report created over
time
o Copy results from ping/trace into text file time stamped with
date and archived
o Compare results over time- error messages and response times
o Verifies host to host connectivity, latency issues, helpful for
network admins to keep network running efficiently
Tracert
List of hops: (tracert from windows, traceroute from router)
Show Commands
Common show commands revisited
o Show running-config
o Show interface
o Show arp
o Show ip route
o Show protocols
o Show version
Viewing Router settings with the show version Command
o Used to verify/troubleshoot basic hardware/software
components
o IOS version, bootstrap version, filename of IOS and bootstrap,
CPU type, RAM, number and type of physical interfaces, amount
Integrated Router
Multifunction Device
o Homes use for internet sharing, print sharing, centralised
storage, etc
o Offers wired and wireless connectivity, DHCP, firewall, and
sometimes network attached storage services (NAS)