0% found this document useful (0 votes)
46 views

Lecture2 Networking Devices

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views

Lecture2 Networking Devices

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

Networking Infrastructure

Chapter 2

Networking Devices
Module Objectives
Module Title: Networking Devices

Module Objective: Explain networking devices and operations.

Topic Title Topic Objective


NIC Explain Network Interface Card (NIC)

Hub Explain the working of Hub

Switch Explain the working of switch

Router Explain Router and features of routers

Gateway Explain Gateway

Configure Switch and End Device Basic Switch and End Device Configuration
Networking Devices
• Networking devices interconnects networks
• Manage data flow and network traffic

Networking
Devices

Other
NIC Hubs Bridges Switches Routers Gateways
Devices
2.1 Network Interface Card (NIC)
Networking Devices
Network Interface Card (1)
• In a network, to send the data the node
requires the destination address.
• In a network, each node should have its own
address to send and receive their data.
• This address is known as physical or MAC
(Media Access Control) address.
• It is provided by a device known as Network
Interface Card (NIC) and it operates at layer
2 of the OSI model.
Networking Devices
Network Interface Card (2)
❖MAC (Media Access Control) address.
• Is a 12 digit hexadecimal number (48 bit
address).
• Is made up of numbers from 0-9 or a letter from
A-F.
❖Two parts:
• The first part of the address gives information
about the adapter manufacturer (ID number of
the manufacturer).
• The second half of the MAC address represents
a serial number for that NIC provided by the
manufacturer.
2.2 Hub
Networking Devices
Hub

• Simplest and low cost device


• Also known as Multi-port Repeater

• Operates at Physical Layer like Repeater

• Transfers data to all the ports


2.3 Switch
Networking Devices
Switch(1)

• Provide signal flow management, replace slower


hub.

• Data transfer to specific port.

• On an Ethernet LAN, the switch determines from


MAC address in each incoming message frame
which output port to forward it to and out of .

• Being a Data Link Layer device uses MAC


address for data transfer
Networking Devices
Switch(2)

❖Multispeed Switch:
• Having number of ports such as 100 Base T
and one or two gigabit ports

• Port detects the speed of NIC and runs at that


speed is called auto sensing
Uplink
• Port runs at 10, 100 or gigabit is referred to as Figure 5.9 – Uplink Port

10/100/1000 port
Networking Devices
Switch(3)

❖Working of Switch:
• When switch receives data from one of the
connected devices, it forwards data only to the
port on which the destination system is
connected.
• Uses the Media Access Control (MAC) address
of the devices to determine the correct port.
• Refers to MAC table which stores MAC address
with corresponding port number.
2.4 Router
Networking Devices
Router

• Works in LAN, MAN and WAN environments


• Having LAN and WAN ports

• WAN port connects to regular phone line or


more advanced telephone connection like
ISDN, ADSL, T1 or may be a cable modem

• Route the packets seeing the IP address stored


in the packet
• Comes in variety shapes, sizes and functions.
2.5 Gateway
Networking Devices
Gateway
• Is a networking device which acts as an
entrance (or a gate) for another network.
• In enterprises, the gateway is the computer
that routes the traffic from an internal network
to the outside network.

• The gateway node often acts as a proxy


server or a firewall or a router.

• A default gateway is the one that meets the


criteria:
• It is on the same subnet as your computer.

• It is the gateway that your computer depends


upon when it does not know through which
route to send the traffic towards destination.
2.6 Practice and Quiz
Module Practice and Quiz
Packet Tracer – Basic Switch and End Device Configuration
In this Packet Tracer, you will do the following:

▪ Configure hostnames and IP addresses on two switches

▪ Use Cisco IOS commands to specify or limit access to the device configurations

▪ Use IOS commands to save the running configuration

▪ Configure two host devices with IP addresses

▪ Verify connectivity between the two PC end devices


Module Practice and Quiz
Lab – Basic Switch and End Device Configuration

In this lab, you complete the following objectives:

• Set Up the Network Topology

• Configure PC Hosts

• Configure and Verify Basic Switch Settings


2.6.1 Cisco IOS Access
Cisco IOS Access
Operating Systems
• Shell - The user interface that allows
users to request specific tasks from
the computer. These requests can be
made either through the CLI or GUI
interfaces.
• Kernel - Communicates between the
hardware and software of a computer
and manages how hardware
resources are used to meet software
requirements.
• Hardware - The physical part of a
computer including underlying
electronics.
Cisco IOS Access
GUI
• A GUI allows the user to interact with the
system using an environment of graphical
icons, menus, and windows.

• A GUI is more user-friendly and requires


less knowledge of the underlying command
structure that controls the system.

• Examples of these are: Windows, macOS,


Linux KDE, Apple iOS and Android.

• GUIs can fail, crash, or simply not operate


as specified. For these reasons, network
devices are typically accessed through a
CLI.
Cisco IOS Access
Purpose of an OS
PC operating system enables a user to do the CLI-based network operating system enables a
following: network technician to do the following:
Use a mouse to make selections and • Use a keyboard to run CLI-based
run programs network programs
Enter text and text-based commands • Use a keyboard to enter text and
text-based commands
View output on a monitor
• View output on a monitor
Cisco IOS Access
Access Methods
• Console – A physical management port
used to access a device in order to provide
maintenance, such as performing the initial
configurations.

• Secure Shell (SSH) – Establishes a secure


remote CLI connection to a device, through
a virtual interface, over a network. (Note:
This is the recommended method for
remotely connecting to a device.)

• Telnet – Establishes an insecure remote


CLI connection to a device over the
network. (Note: User authentication,
passwords and commands are sent over the
network in plaintext.)
Cisco IOS Access
Terminal Emulation Programs
• Terminal emulation programs are used to connect to a network device by either a console
port or by an SSH/Telnet connection.
• There are several terminal emulation programs to chose from such as PuTTY, Tera Term
and SecureCRT.
2.6.2 IOS Navigation
IOS Navigation
Primary Command Modes
User EXEC Mode:
Allows access to only a limited
number of basic monitoring
commands
Identified by the CLI prompt that
ends with the > symbol

Privileged EXEC Mode:


• Allows access to all
commands and features
• Identified by the CLI prompt
that ends with the # symbol
IOS Navigation
Configuration Mode and Subconfiguration Modes

Global Configuration Mode:


Used to access configuration
options on the device

Line Configuration Mode:


Used to configure console, SSH,
Telnet or AUX access

Interface Configuration Mode:


Used to configure a switch port
or router interface
IOS Navigation
Navigation Between IOS Modes
▪ Privileged EXEC Mode:
To move from user EXEC mode to privilege
EXEC mode, use the enabled command.
▪ Global Configuration Mode:
To move in and out of global configuration
mode, use the configure terminal command.
To return to privilege EXEC mode, use the exit
command.
▪ Line Configuration Mode:
To move in and out of line configuration mode,
use the line command followed by the
management line type. To return to global
configuration mode, use the exit command.
IOS Navigation
Navigation Between IOS Modes (Cont.)
Subconfiguration Modes:
To move out of any subconfiguration mode to get
back to global configuration mode, use the exit
command. To return to privilege EXEC mode, use
the end command or key combination Ctrl +Z.

To move directly from one subconfiguration mode


to another, type in the desired subconfiguration
mode command. In the example, the command
prompt changes from (config-line)# to (config-
if)#.
IOS Navigation
Video – Navigation Between IOS Modes
This video will cover the following:
enable
disable
configure terminal
exit
end
Control + Z on keyboard
Other commands to enter sub configuration modes
The Command Structure
Basic IOS Command Structure

• Keyword – This is a specific parameter defined in the operating system (in the figure, ip
protocols).

• Argument - This is not predefined; it is a value or variable defined by the user (in the
figure, 192.168.10.5).
The Command Structure
IOS Command Syntax Check
A command might require one or more arguments. To determine the keywords
and arguments required for a command, refer to the command syntax.
Boldface text indicates commands and keywords that are entered as shown.
Italic text indicates an argument for which the user provides the value.

Convention Description
Boldface text indicates commands and keywords that you enter literally as
boldface
shown.
italics Italic text indicates arguments for which you supply values.

[x] Square brackets indicate an optional element (keyword or argument).

{x} Braces indicate a required element (keyword or argument).

Braces and vertical lines within square brackets indicate a required choice
[x {y | z }] within an optional element. Spaces are used to clearly delineate parts of the
command.
The Command Structure
IOS Command Syntax Check (Cont.)
▪ The command syntax provides the pattern, or format, that must be used when entering a
command.

▪ The command is ping and the user-defined


argument is the ip-address of the
destination device. For example, ping
10.10.10.5.
▪ The command is traceroute and the
user-defined argument is the ip-
address of the destination device. For
example, traceroute 192.168.254.254.

▪ If a command is complex with multiple arguments, you may see it represented like this:
The Command Structure
IOS Help Features
The IOS has two forms of help available: context-sensitive help and command
syntax check.
• Context-sensitive help enables you to • Command syntax check verifies that
quickly find answers to these questions: a valid command was entered by
• Which commands are available in each command the user.
mode? • If the interpreter cannot understand the
• Which commands start with specific characters or command being entered, it will provide
group of characters? feedback describing what is wrong with
the command.
• Which arguments and keywords are available to
particular commands?

You might also like