Ccna Itn Chp6
Ccna Itn Chp6
Ccna Itn Chp6
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Network Layer in Communications
The Network Layer
• The network layer, which resides at OSI Layer 3,
provides services that allow end devices to exchange
data across a network.
• The network layer uses four processes in order to
provide end-to-end transport:
• Addressing of end devices – IP addresses must be
unique for identification purposes.
• Encapsulation – The protocol data units from the
transport layer are encapsulated by adding IP
header information including source and destination
IP addresses.
• Routing – The network layer provides services to
direct packets to other networks. Routers select the
best path for a packet to take to its destination
network.
• De-encapsulation – The destination host de-
encapsulates the packet to see if it matches its own.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Network Layer in Communications
Network Layer Protocols
• There are several network layer
protocols in existence; however, the
most commonly implemented are:
• Internet Protocol version 4 (IPv4)
• Internet Protocol version 6 (IPv6)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Characteristics of the IP Protocol
Encapsulating IP
• At the network layer, IP encapsulates
the transport layer segment by adding
an IP header for the purpose of delivery
to the destination host.
• The IP header stays the same from the
source to the destination host.
• The process of encapsulating data layer
by layer enables the services at different
layers to scale without affecting other
layers.
• Routers implement different network
layer protocols concurrently over a
network and use the network layer
packet header for routing.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Characteristics of the IP Protocol
Characteristics of IP
• IP was designed as a protocol
with low overhead – it provides
only the functions required to
deliver a packet from the source
to a destination.
• An IP packet is sent to the
destination without prior
establishment of a connection
• IP was not designed to track and
manage the flow of packets.
• These functions, if required, are
performed by other layers –
primarily TCP
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Characteristics of the IP Protocol
IP - Connectionless
• IP is a connectionless protocol:
• No dedicated end-to-end
connection is created before
data is sent.
• Very similar process as sending
someone a letter through snail
mail.
• Senders do not know whether or
not the destination is present,
reachable, or functional before
sending packets.
• This feature contributes to the
low overhead of IP.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Characteristics of the IP Protocol
IP – Best Effort Delivery
IP is a Best Effort Delivery protocol:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Characteristics of the IP Protocol
Activity: IP Characteristics (to be answered)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Characteristics of the IP Protocol
IP – Media Independent
• IP operates independently from the
media that carries the data at lower
layers of the protocol stack – it does not
care if the media is copper cables, fiber
optics or wireless.
• The OSI data link layer is responsible for
taking the IP packet and preparing it for
transmission over the communications
medium.
• The network layer does have a
maximum size of the PDU that can be
transported – referred to as MTU
(maximum transmission unit).
• The data link layer tells the network layer
the MTU.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
IPv4 Packet
IPv4 Packet Header
• An IPv4 packet header consists of the fields
containing binary numbers. These numbers
identify various settings of the IP packet
which are examined by the Layer 3 process.
• Significant fields include:
• Version – Specifies that the packet is IP version 4
• Differentiated Services or DiffServ (DS) – Used to
determine the priority of each packet on the
network.
• Time-to-Live (TTL) – Limits the lifetime of a packet
– decreased by one at each router along the way.
• Protocol – Used to identify the next level protocol.
• Source IPv4 Address – Source address of the
packet.
• Destination IPv4 Address – Address of
destination.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
IPv6 Packet
Activity: IPv4 Header Fields (to be answered)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
IPv6 Packet
Limitations of IPv4
• IPv4 has been updated to address new challenges.
• Three major issues still exist with IPv4:
• IP address depletion – IPv4 has a limited number of unique
public IPv4 addresses available. Although there are about 4
billion IPv4 addresses, the exponential growth of new IP-
enabled devices has increased the need.
• Internet routing table expansion – A routing table contains the
routes to different networks in order to make the best path
determination. As more devices and servers are connected to
the network, more routes are created. A large number of routes
can slow down a router.
• Lack of end-to-end connectivity – Network Address Translation
(NAT) was created for devices to share a single IPv4 address.
However, because they are shared, this can cause problems for
technologies that require end-to-end connectivity.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
IPv6 Packet
Introducing IPv6
• In the early ‘90s, the IETF started
looking at a replacement for IPv4 –
which led to IPv6.
• Advantages of IPv6 over IPv4 include:
• Increased address space – based on
128-bit addressing vs. 32-bit with IPv4
• Improved packet handling – fewer
fields with IPv6 than IPv4
• Eliminates the need for NAT – no need
to share addresses with IPv6
• There are roughly enough IPv6
addresses for every grain of sand on
Earth.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
IPv6 Packet
Encapsulating IPv6
• The IPv6 header is simpler than the IPv4 header.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
IPv6 Packet
Encapsulating IPv6 (Cont.)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
IPv6 Packet
IPv6 Packet Header
• IPv6 packet header fields:
• Version – Contains a 4-bit binary value set
to 0110 that identifies it as a IPv6 packet.
• Traffic Class – 8-bit field equivalent to the
IPv4 Differentiated Services (DS) field.
• Flow Label – 20-bit field suggests that all
packets with the same flow label receive
the same type of handling by routers.
• Payload Length – 16-bit field indicates the
length of the data portion or payload of the
packet.
• Next Header – 8-bit field is equivalent to
the IPv4 Protocol field. It indicates the
data payload type that the packet is
carrying.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
IPv6 Packet
IPv6 Packet Header (Cont.)
• IPv6 packet header fields:
• Hop Limit – 8-bit field replaces the IPv4 TTL
field. This value is decremented by 1 as it
passes through each router. When it
reaches zero, the packet is discarded.
• Source IPv6 Address – 128-bit field that
identifies the IPv6 address of the sending
host.
• Destination IPv6 Address – 128-bit field that
identifies the IPv6 address of the receiving
host.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
IPv6 Packet
Activity: IPv6 Header Fields (to be answered)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
6.2 Routing
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
How a Host Routes
Host Forwarding Decision • An important role of the network
layer is to direct packets between
hosts. A host can send a packet to:
• Itself – A host can ping itself for testing
purposes using 127.0.0.1 which is referred to
as the loopback interface.
• Local host – This is a host on the same local
network as the sending host. The hosts
share the same network address.
• Remote host – This is a host on a remote
network. The hosts do not share the same
network address.
• The source IPv4 address and subnet
mask is compared with the
destination address and subnet
mask in order to determine if the
host is on the local network or
remote network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
How a Host Routes
Default Gateway
• The default gateway is the
network device that can route
traffic out to other networks. It is
the router that routes traffic out
of a local network.
• This occurs when the
destination host is not on the
same local network as the
sending host.
• The default gateway will know
where to send the packet using
its routing table.
• The sending host does not need
to know where to send the
packet other than to the default
gateway – or router.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
How a Host Routes
Using the Default Gateway
• A host’s routing table usually
includes a default gateway
address – which is the router IP
address for the network that the
host is on.
• The host receives the IPv4
address for the default gateway
from DHCP, or it is manually
configured.
• Having a default gateway
configured creates a default route
in the routing table of a host -
which is the route the computer will
send a packet to when it needs to
contact a remote network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
How a Host Routes
Host Routing Tables
• On a Windows host, you can
display the routing table using:
• route print
• netstat -r
• Three sections will be
displayed:
• Interface List – Lists the Media
Access Control (MAC) address and
assigned interface number of
network interfaces on the host.
• IPv4 Route Table – Lists all known
IPv4 routes.
• IPv6 Route Table – Lists all known
IPv6 routes.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Router routing Tables
• When a router receives a packet
Router Packet Forwarding Decision destined for a remote network, the
router has to look at its routing
table to determine where to
forward the packet. A router’s
routing table contains:
• Directly-connected routes – These
routes come from the active router
interfaces configured with IP
addresses.
• Remote routes – These routes come
from remote networks connected to
other routers. They are either
configured manually or learned
through a dynamic routing protocol.
• Default route – This is where the
packet is sent when a route does not
exist in the routing table.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Router Routing Tables
IPv4 Router Routing Table • On a Cisco IOS router, the show ip
route command is used to display
the router’s IPv4 routing table. The
routing table shows:
• Directly connected and remote routes
• How each route was learned
• Trustworthiness and rating of the route
• When the route was last updated
• Which interface is used to reach the
destination
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Router Routing Tables • 10.1.1.0/24 identifies the
Understanding Remote Route Entries destination network.
• 90 is the administrative distance
for the corresponding network –
or the trustworthiness of the
route. The lower the number,
the more trustworthy it is.
• 2170112 – represents the metric or
value assigned to reach the remote
network. Lower values indicate
preferred routes.
• 209.165.200.226 – Next-hop or IP
address of the next router to
forward the packet.
• 00:00:05 - Route Timestamp
• The D represents the Route Source which is how the
identifies when the router was last
network was learned by the router. D identifies the
heard from.
route as an EIGRP route or (Enhanced Interior
Gateway Routing Protocol) • Serial/0/0/0 – Outgoing Interface
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Router Routing Tables
Next-Hop Address • When a packet arrives at a router
destined for a remote network, it will
send the packet to the next hop
address corresponding to the
destination network address in its
routing table.
• For example, if the R1 router in the
figure to the left receives a packet
destined for a device on the
10.1.1.0/24 network, it will send it to
the next hop address of
209.165.200.226.
• Notice in the routing table, a default
gateway address is not set – if the
router receives a packet for a
network that isn’t in the routing
table, it will be dropped.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Router Routing Tables
Activity: Identify the Elements of a Router Routing Table Entry
(to be answered)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
6.3 Routers
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Anatomy of a Router • A router is a computer. Like
A Router is a Computer computers, a router requires a
CPU, an operating system, and
memory.
• Cisco routers are designed to
meet the needs of wide variety of
businesses and networks:
• Branch – Teleworkers, small
businesses, and medium-size branch
sites.
• WAN – Large businesses,
organizations and enterprises.
• Service Provider – Large service
providers.
• The focus of the CCNA
certification is on the branch family
of routers.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Anatomy of a Router
• Like computers, Cisco routers
Router CPU and OS require a CPU to execute OS
instructions including system
initialization, routing functions and
switching functions.
• The component highlighted in the
figure to the left is the CPU of a
Cisco 1941 with the heatsink
attached. A heatsink is used to
dissipate the heat from the CPU
for cooling purposes.
• The CPU requires an operating
system to provide routing and
switching functions. Most Cisco
devices use the Cisco
Internetwork Operating System
(IOS).
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Anatomy of a Router • Volatile memory – requires continual
Router Memory power to store information.
• Non-volatile memory – does not
require continual power.
• A router uses four types of memory:
• RAM – Volatile memory used to store
applications, processes, and data needed
to be executed by the CPU.
• ROM – Non-volatile memory used to
store crucial operational instructions and
a limited IOS. ROM is firmware
embedded on an integrated circuit inside
of the router.
• NVRAM – Non-volatile memory used as
permanent storage for the startup
configuration file (startup-config).
• Flash – Non-volatile memory used as
permanent storage for the IOS and other
operating system files such as log or
backup files.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Anatomy of a Router
Inside a Router
• There are numerous types and
models of routers, however, they all
have the same general hardware
components:
• Power supply
• Cooling fan
• SDRAM - Synchronous Dynamic RAM
• Non-volatile RAM (NVRAM)
• CPU
• Heat shields
• Advanced Integration Module (AIM)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Anatomy of a Router
• Cisco devices, routers, and switches
Connect to a Router typically interconnect many devices. The
Cisco 1941 router backplane includes the
following ports and connections:
• Enhanced High-speed WAN Interface Card
(eHWIC) Slots
• Auxiliary (AUX) – RJ-45 port for remote
management.
• Console Port – Used for initial configuration
and Command Line Interface access – RJ-45
or USB Type-B (mini-B USB)
• Gigabit Ethernet used to provide LAN access
by connecting to switches, users, or to other
routers.
• Compact Flash Slots – Labeled as CF0 and
CF1 and used to provide increased storage
flash space upgradable to 4GB.
• USB port – used to provide additional storage
space.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Anatomy of a Router
LAN and WAN Interfaces • The most common ways to access
user EXEC mode in the CLI
• Cisco router connections can be classified in two environment on a Cisco router:
categories: • Console – This is a physical
• In-band router interfaces – LAN and WAN interfaces management port that provides out-of-
band access to the Cisco router. Out-
• Management ports – Console and AUX ports
of-band means that it is dedicated and
does not require network services to be
configured on the router.
• Secure Shell (SSH) – This is a secure
method of remotely establishing a CLI
connection over a network. SSH does
require active networking services
configured.
• Telnet – Telnet is an insecure method of
remotely establishing a CLI session
through a virtual interface over a
network. The connection is not
encrypted.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Anatomy of a Router
Activity: Description of Router Functions and Hardware Parts
(to be answered)
Answer on the next slide © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Anatomy of a Router
Activity: Description of Router Functions and Hardware Parts
(to be answered)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Router Boot-up
Bootset Files
• Cisco routers and switches
load the IOS image and
startup configuration file into
RAM when they are booted.
• The running configuration is
modified when the network
administrator makes any
changes. These changes
should be saved to the startup
configuration file in NVRAM in
order for them to take effect on
the next reboot of the router or
during in the event of a power
loss.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Router Boot-up
• Three major phases to the bootup
Router Bootup Process process of a router:
• Perform the POST and load the
bootstrap program – During the
Power-on Self-Test, the router
executes diagnostics from ROM on
various hardware components. After
the POST, the bootstrap program is
copied from ROM into RAM and its job
is to locate the Cisco IOS and load it
into RAM.
• Locate and load the Cisco IOS
software – Typically, the IOS is stored
in flash memory and is copied into
RAM for execution by the CPU.
• Locate and load the startup
configuration file or enter setup mode
– The bootstrap program then copies
the startup config file from NVRAM
into RAM and becomes the running
configuration.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Router Boot-up
Activity: The Router Bootup Process
Answer on the next slide © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Router Boot-up
Activity: The Router Bootup Process
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
6.4 Configure a Cisco Router
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Configure Initial Settings
Basic Switch Configuration Steps
• Cisco routers and switches have
many similarities in regards to their
configuration:
• Support a similar operating system.
• Support similar command structure.
• Support many of the same
commands.
• They also have identical initial
configuration steps when
implemented in a network.
• The commands on the left display a
sample configuration of a switch.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Configure Initial Settings
Basic Router Configuration Steps
• Similar to the configuration of a
switch on the previous slide, the
initial configuration should include:
• Configure the router’s device name
• Secure the user EXEC mode
• Secure remote Telnet and SSH access
• Secure privileged EXEC mode
• Secure all passwords in the config file
• Provide legal notification – Authorized
access only
• Save the configuration
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
Configure Interfaces • For routers to be reachable by other
Configure Router Interfaces devices in the network, the in-band
interfaces must be configured. For
example, a Cisco 1941 router has
four in-band interfaces:
• Two Gigabit Ethernet Interfaces – G0/0
and G0/1
• One serial WAN Interface card with two
interfaces – S 0/0/0 and S0/0/1
• The commands in the figure to the
left provide an example of how to
configure a router’s interface to
provide network connectivity.
• It is important that you use the
command no shutdown when you
are ready to make the interface
active.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Configure Interfaces
Activity: Basic Router Configuration (to be answered)
Direction: Configure R1’s and R2’s interfaces.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Configure Interfaces
Verify Interface Configuration
• After configuring an interface, or for
troubleshooting purposes, there are
several commands that can be used:
• show ip interface brief – Provides you a
summarized view of all interfaces to verify if
they are activated and operational. Look
for Status of “up” and Protocol of “up”.
• show ip route – Displays the contents of
the IPv4 routing table stored in RAM.
• show interfaces – Displays the IPv4
statistics for all interfaces on a router.
• Remember to save your configuration
changes with the copy running-
config startup-config command.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Configure the Default Gateway
• For an end device or a host to
Default Gateway for a Host communicate over the network, it
must be configured with the correct
IP address information including the
default gateway address.
• The default gateway is only used
when the host wants to send a
packet to a device on another
network – if the device is on the
same network, it can send it directly
to that device.
• If PC1 needs to send a packet to
PC3 which is on a different network,
it must send it to the default gateway
address of 192.168.10.1 on router
R1’s G0/0 interface.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Configure the Default Gateway • Normally, a Layer 2 device, such as
Default Gateway for a Switch a switch, does not require an IP
address to function.
• An IP address, subnet mask, and
default gateway address are
required in order to connect to it
remotely (via SSH or Telnet) for
configuration or administrative
purposes.
• Use the command ip default-
gateway global configuration
command to configure the default
gateway on a switch.
• It is important to note that a switch
does not use the default gateway
address to forward packets to from
hosts on its local network to remote
networks.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52