67% found this document useful (3 votes)
1K views61 pages

CCNA

CCNA routing and switching

Uploaded by

rohit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
67% found this document useful (3 votes)
1K views61 pages

CCNA

CCNA routing and switching

Uploaded by

rohit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 61

CCNA ROUTING AND

SWITCHING

IP ADDRESSING
It is a numerical label assigned to each device.

IP Addressing is basically Logical Addressing.

Two Version of Addressing Scheme are:IP version 4 32 bit addressing,


IP version 6 128 bit addressing.

NEED OF IP ADDRESSING
You need an IP address to communicate with
the Internet.
If your computer is communicating with
the Internet, you are using an IP address.
If you are using a dial-up Internet Service or
an ISP using ISDN you will definitely have an
IP address on your computer.

CLASSES OF IP ADDRESS
Total IP Addressing Scheme is divided into 5 Classes.
CLASS A

LAN & WAN

CLASS B

LAN & WAN

CLASS C

LAN & WAN

CLASS D

Multicasting & Newsgroups

CLASS E

Research & Development

PRIORITY BIT
To identify the range of each class we will be using Priority Bit Concept.
Priority Bit is the left most bits in the First Octet.
CLASS A priority bit is

CLASS B priority bit is

10

CLASS C priority bit is

110

CLASS D priority bit is

1110

CLASS E priority bit is

1111

BINARY TO DECIMAL CONVERSION

DECIMAL TO BINARY CONVERSION


Example : 192.168.10.2

128

64

32

16

For the first octet: 192 we have to add = 128 + 64 = 192


so we get in binary = 1 1 0 0 0 0 0 0
similarly
For 2nd octet = 1 0 1 1 0 0 0 0
For 3rd octet = 0 0 0 0 1 0 1 0
For 4th octet = 0 0 0 0 0 0 1 0
So ip address in binary is

1 1 0 0 0 0 0 0. 1 0 1 1 0 0 0 0. 0 0 0 0 1 0 1 0. 0 0 0 0 0 0
10

Dotted Decimal Notation


IP addresses are written in a so-called
dotted decimal notation.
Each byte is identified by a decimal
number
in the2 range
[0-255].
1 Byte
Byte
4 Byte
3 Byte
st

nd

128
10000000

rd

143

137

10001111

10001001

128.143.137.144

th

144
10010000

Class A
Range: 0 - 127 0 & 127 are
reserved for
Loopback/Self
Testing.
N.H.H.H
8 bits reserved for network & 24 for Hosts.
N part cant be changed but H can be.

Class A Number of networks & Hosts


Class A Octet Format is N.H.H.H
Network bits : 8

Host bits : 24

No. of Networks
=
=
=

2^7 -2 ( 0 & 127 are reserved for


loopbacks)
128 2
126 Networks

No. of Host
=
=
=

224 2 (-2 is for Network ID & Broadcast ID)


16777216 - 2
16777214 Hosts/Network

Class B
Range: 128 to 191
N.N.H.H
16 bits reserved for Network & 16 for
Hosts.

Class B Number of networks & Hosts


Class B Octet Format is N.N.H.H

Network bits : 16
16

Host bits :

No. of Networks
=
=

2^(15-1) (1 is reserved for APIPA)


16348 Network

No. of Host
216 2 (-2 is for Network ID &
Broadcast ID)
=
65536 - 2
=
65534 Hosts/network
=

Class C

Range: 192 to 223


N.N.N.H
24 bits reserved for Network & 8 for Hosts.
Most Commonly used because wastage
of IP Addresses is Avoided.

Class C Number of networks & Hosts


Class C Octet Format is N.N.N.H
Network bits : 24

Host bits : 8

No. of Networks
=
=

223-2 (-2 is for Network Bits)


2,097,152 Networks

No. of Host
=
=
=

28 2 (-2 is for Network ID & Broadcast


ID)
256 - 2
254 Hosts/network

OSI Model Layers

Layer - 7

Application
Application

Layer - 6

Presentation
Presentation

Layer - 5

Session
Session

Layer - 4

Transport
Transport

Heart of OSI
Take

Layer - 3

Network
Network

Not

Layer - 2

Data
Data Link
Link

Layer - 1

Physical
Physical

Advice
Upper Layer
Person or
Software Layer
Sales

Lower Layer
Do
or
Hardware Layer
Please

Application Layer

Application
Application
Application
Application
Presentation
Presentation
Session
Session
Transport
Transport
Network
Network
Data
Data Link
Link
Physical
Physical

Application Layer is
responsible for providing
Networking Services to
user. It also known as
Desktop Layer. Identification
of Services is done using
Port Numbers.
Ports are nothing but Socket
i.e. Entry and Exit Point to
the Layer
Total No. Ports 0 65535
Reserved Ports 0 1023
Open Ports
1024 65535

Presentation Layer

Application
Application
Presentation
Presentation
Presentation
Presentation
Session
Session
Transport
Transport
Network
Network
Data
Data Link
Link
Physical
Physical

Presentation Layer is
responsible for converting data
into standard format.
Examples : ASCII, EBCDIC,
JPEG, MPEG, BMP, MIDI, WAV,
MP3
Following tasks can be perform
at Presentation layer :
Encoding
Decoding
Encryption Decryption
Compression Decompression

Session Layer

Application
Application
Presentation
Presentation
Session
Session
Session
Transport
Transport
Network
Network
Data
Data Link
Link
Physical
Physical

Session Layer is responsible


establishing, maintaining and
terminating session.
Session ID also works at Session
Layer.
Examples :
RPC Remote Procedure Call
SQL Structured Query language
NFS Network File System

Transport Layer

Application
Application
Presentation
Presentation
Session
Session
Transport
Transport
Transport
Transport
Network
Network
Data
Data Link
Link
Physical
Physical

Transport Layer is
responsible for end-to-end
connectivity. It is also known as
heart of OSI Layers. Following
task are performed at Transport
Layer : -

SEGMENT = TCP/UDP +
DATA
Identifying Service
Multiplexing & De-multiplexing
Segmentation
Sequencing & Reassembling
Flow Control
Error Correction

Identifying Service
TCP
Transmission Control
Protocol

UDP
User Datagram
Protocol

Connection Oriented

Connection Less

Acknowledgement

No Acknowledgement

Reliable

Unreliable

Slower

Faster

Port No. 6

Port No. 17

e.g. HTTP, FTP, SMTP

e.g. DNS, DHCP, TFTP

Network Layer

Application
Application
Presentation
Presentation
Session
Session
Transport
Transport
Network
Network
Network
Network
Data
Data Link
Link
Physical
Physical

Network Layer is
responsible for providing best
path to data to reach destination.
Logical Addressing sits on this
layer.

The network layer provides a logical


topology, defines layer 3 addresses,
and finds best paths to logical
address destinations.
It is divided into two parts
Routed Protocols
e.g. IP, IPX, Apple Talk.
Routing Protocols
e.g. RIP, IGRP, OSPF, EIGRP
PACKET = S. IP + D. IP +
TCP/UDP +
DATA
Packet size - 64 bytes to 1500 bytes.

Routing Protocols

www.zoomgroup.com

Data link Layer

Application
Application
Presentation
Presentation
Session
Session
Transport
Transport
Network
Network
Data
Data
Link
Data Link
Link
Physical
Physical

Datalink Layer is
divided into two Sub Layers :
Most wide area network (WAN)
protocols primarily function at the
and physical layers.

data link

MAC Media Access Control

The data link layer defines hardware


(MAC) addresses as well as the
communication process that occurs within
a media type.
It perform Error Detection & not
correction.
Device working on Data Link
Layer is Switch, Bridge, NIC.

FRAME = S. MAC + D. MAC + S. IP + D. IP + TCP/UDP +

POINT TO REMEMBER
Remember that the primary function of
the data link layer is to regulate how
two networking devices connected to
the same layer 2 protocol communicate
with each other.
If the devices are on different layer 2
protocols or segments, the network
layer (layer 3) typically plays a role in
the communication of these devices.

Data-Link Layer Protocols


MAC Address
Its a 48 bits Hexadecimal address.
Switch learns MAC Address and
store it
in MAC Address TABLE on
ASIC CHIP.
Switch's First attempt is Broadcast
and den Unicast, till the time MAC
TABLE didnt FLUSH OUT.

Physical Layer

Application
Application
Presentation
Presentation
Session
Session
Transport
Transport
Network
Network
Data
Data Link
Link
Physical
Physical
Physical

Physical Layer is
responsible for electrical,
mechanical or procedural checks.
Data will be converted in Binary
that is 0s & 1s. Data will be in the
form of electrical pulses if it is
Coaxial or Twisted Pair cable and in
the form of Light if it is Fiber Optic
Cable.
Devices working at Physical Layer
are Hubs, Repeaters, Cables,
Modems etc.

How data flows from Physical Layer

e.g. Hub

Application
Application

Data

Presentation
Presentation

Data

Session
Session

Data

Transport
Transport

Segment

Network
Network

Packet

Data
Data Link
Link

Frame

Physical
Physical

Bits

Comparing OSI with TCP/IP Layers

OSI Layers

TCP/IP Layers

Application
Application
Presentation
Presentation

Application
Application

Session
Session
Transport
Transport
Network
Network
Data
Data Link
Link
Physical
Physical

Transport
Transport
Internet
Internet
Network
Network
Access
Access

Networking Devices
Equipment that connects directly to a network segment is
referred to as a device.
These devices are broken up into two classifications.

end-user devices

network devices
End-user devices include computers, printers, scanners, and
other devices that provide services directly to the user.
Network devices include all the devices that connect the enduser devices together to allow them to communicate.

Networking Device Icons

Repeater
A repeater is a network device used to regenerate a signal.
Repeaters regenerate analog or digital signals distorted by
transmission loss due to attenuation. A repeater does not
perform intelligent routing.

Hub
Hubs concentrate
connections. In other words,
they take a group of hosts
and allow the network to see
them as a single unit.
This is done passively,
without any other effect on
the data transmission.
Active hubs not only
concentrate hosts, but they
also regenerate signals.

Bridge
Bridges convert network transmission data formats as well as
perform basic data transmission management. Bridges, as
the name implies, provide connections between LANs. Not
only do bridges connect LANs, but they also perform a check
on the data to determine whether it should cross the bridge or
not. This makes each part of the network more efficient.

Workgroup Switch
Workgroup switches add
more intelligence to data
transfer management.
Switches can determine
whether data should remain
on a LAN or not, and they
can transfer the data to the
connection that needs that
data.

Router
Routers have all capabilities of the previous devices. Routers
can regenerate signals, concentrate multiple connections,
convert data transmission formats, and manage data
transfers.They can also connect to a WAN, which allows them
to connect LANs that are separated by great distances.

The Cloud
The cloud is used in diagrams to represent where the
connection to the internet is.
It also represents all of the devices on the internet.

Network Topologies
Network topology defines the structure of the network.
One part of the topology definition is the physical topology,
which is the actual layout of the wire or media.
The other part is the logical topology,which defines how the
media is accessed by the hosts for sending data.

Physical Topologies

Bus Topology
A bus topology uses a single backbone cable that is
terminated at both ends.
All the hosts connect directly to this backbone.

Ring Topology
A ring topology connects one host to the next and the last host
to the first.
This creates a physical ring of cable.

Star Topology
A star topology connects all cables to a central point of
concentration.

Extended Star Topology


An extended star topology links individual stars together by
connecting the hubs and/or switches.This topology can extend
the scope and coverage of the network.

Hierarchical Topology
A hierarchical topology is similar to an extended star.

Mesh Topology
A mesh topology is implemented to provide as much
protection as possible from interruption of service.
Each host has its own connections to all other hosts.
Although the Internet has multiple paths to any one
location, it does not adopt the full mesh topology.

LANs, MANs, & WANs


One early solution was the creation of local-area network
(LAN) standards which provided an open set of guidelines for
creating network hardware and software, making equipment
from different companies compatible.
What was needed was a way for information to move
efficiently and quickly, not only within a company, but also
from one business to another.
The solution was the creation of metropolitan-area networks
(MANs) and wide-area networks (WANs).

LANs

WANs

Introduction to Ethernet
Three data rates currently defined
for the operation over optical fiber
and twisted-pair cables
10 Mbps 10Base-T Ethernet
100 Mbps - Fast Ethernet
1000 Mbps - Gigabit Ethernet

What is router?

Router is device which is used to make communication


between two or more different network which are
present in different/same geographical location

If you want to make communication between two of


more different network which are present in same
geographical location, what steps you will do?
Answer : Configure Software Router or you can
Change Subnet Mask.

Model 2501
AUI
Attachment
Unit Interface
E0

Serial Ports
S0 and S1

Console
Con 0

Power Switch

Auxiliary
Aux 0

Power
Supply

Attachment Unit Interface


An
An IP
IP address
address needs
needs to
to be
be assigned
assigned to
to this
this interface
interface
and
it
should
be
in
the
same
network
as
of
the
and it should be in the same network as of theLAN.
LAN.

E0
192.168.1.150/24

Straight Cable

Straight Cable

1.1

1.2

1.3

LAN - 192.168.1.0/24

Routing Protocols

OSPF (Open Shortest Path First)


Protocol

2003, Cisco Systems, Inc. All rights reserved.

52

OSPF is a Link-State Routing


Protocols
Link-state (LS) routers recognize much more information
about the network than their distance-vector
counterparts,Consequently LS routers tend to make more accurate
decisions.

Link-state routers keep track of the following:


Their neighbours
All routers within the same area
Best paths toward a destination

OSPF vs. RIP


RIP is limited to 15 hops, it converges slowly, and it sometimes chooses
slow routes because it ignores critical factors such as bandwidth in route
determination. OSPF overcomes these limitations and proves to be a
robust and scalable routing protocol suitable for the networks of today.

OSPF Terminology
The next several slides explain various OSPF terms
-one per slide.

EIGRP Concepts & Terminology


EIGRP routers keep route and topology information readily
available in RAM, so they can react quickly to changes.
Like OSPF, EIGRP saves this information in several tables and
databases.
EIGRP saves routes that are learned in specific ways.
Routes are given a particular status and can be tagged to
provide additional useful information.
EIGRP maintains three tables:

Neighbor table

Topology table

Routing table

Neighbor Table
The neighbor table is the most important table in EIGRP.
Each EIGRP router maintains a neighbor table that lists adjacent
routers. This table is comparable to the adjacency database used by
OSPF. There is a neighbor table for each protocol that EIGRP
supports.
When a neighbor sends a hello packet, it advertises a hold time. The
hold time is the amount of time a router treats a neighbor as
reachable and operational. In other words, if a hello packet is not
heard within the hold time, then the hold time expires.
When the hold time expires, the Diffusing Update Algorithm (DUAL),
which is the EIGRP distance vector algorithm, is informed of the
topology change and must recalculate the new topology.

Topology Table
The topology table is made up of all the EIGRP routing tables in the
autonomous system.
DUAL takes the information supplied in the neighbor table and the topology
table and calculates the lowest cost routes to each destination. By
tracking this information, EIGRP routers can identify and switch to alternate
routes quickly.
The information that the router learns from the DUAL is used to determine
the successor route, which is the term used to identify the primary or best
route.
A copy is also placed in the topology table.
Every EIGRP router maintains a topology table for each configured network
protocol. All learned routes to a destination are maintained in the topology
table.

Routing Table
The EIGRP routing table holds the best routes to a destination. This
information is retrieved from the topology table. Each EIGRP router
maintains a routing table for each network protocol.
A successor is a route selected as the primary route to use to reach a
destination.DUAL identifies this route from the information contained in the
neighbor and topology tables and places it in the routing table.
There can be up to four successor routes for any particular route. These
can be of equal or unequal cost and are identified as the best loop-free
paths to a given destination.
A copy of the successor routes is also placed in the topology table.
A feasible successor (FS) is a backup route.These routes are identified at
the same time the successors are identified, but they are only kept in the
topology table. Multiple feasible successors for a destination can be
retained in the topology table although it is not mandatory.

IPv6
128 bit hexadecimal
larger address space
more secure & faster than IPv4
Uses ICMP version 6
doesnt use ARP
IPv6 contains 8 fields and each field contains
16 bits.
1stField: 2ndField: 3rdField: 4thField: 5thField:
6thField: 7thField: 8thField

END OF SLIDES

You might also like