CCNA
CCNA
SWITCHING
IP ADDRESSING
It is a numerical label assigned to each device.
NEED OF IP ADDRESSING
You need an IP address to communicate with
the Internet.
If your computer is communicating with
the Internet, you are using an IP address.
If you are using a dial-up Internet Service or
an ISP using ISDN you will definitely have an
IP address on your computer.
CLASSES OF IP ADDRESS
Total IP Addressing Scheme is divided into 5 Classes.
CLASS A
CLASS B
CLASS C
CLASS D
CLASS E
PRIORITY BIT
To identify the range of each class we will be using Priority Bit Concept.
Priority Bit is the left most bits in the First Octet.
CLASS A priority bit is
10
110
1110
1111
128
64
32
16
1 1 0 0 0 0 0 0. 1 0 1 1 0 0 0 0. 0 0 0 0 1 0 1 0. 0 0 0 0 0 0
10
nd
128
10000000
rd
143
137
10001111
10001001
128.143.137.144
th
144
10010000
Class A
Range: 0 - 127 0 & 127 are
reserved for
Loopback/Self
Testing.
N.H.H.H
8 bits reserved for network & 24 for Hosts.
N part cant be changed but H can be.
Host bits : 24
No. of Networks
=
=
=
No. of Host
=
=
=
Class B
Range: 128 to 191
N.N.H.H
16 bits reserved for Network & 16 for
Hosts.
Network bits : 16
16
Host bits :
No. of Networks
=
=
No. of Host
216 2 (-2 is for Network ID &
Broadcast ID)
=
65536 - 2
=
65534 Hosts/network
=
Class C
Host bits : 8
No. of Networks
=
=
No. of Host
=
=
=
Layer - 7
Application
Application
Layer - 6
Presentation
Presentation
Layer - 5
Session
Session
Layer - 4
Transport
Transport
Heart of OSI
Take
Layer - 3
Network
Network
Not
Layer - 2
Data
Data Link
Link
Layer - 1
Physical
Physical
Advice
Upper Layer
Person or
Software Layer
Sales
Lower Layer
Do
or
Hardware Layer
Please
Application Layer
Application
Application
Application
Application
Presentation
Presentation
Session
Session
Transport
Transport
Network
Network
Data
Data Link
Link
Physical
Physical
Application Layer is
responsible for providing
Networking Services to
user. It also known as
Desktop Layer. Identification
of Services is done using
Port Numbers.
Ports are nothing but Socket
i.e. Entry and Exit Point to
the Layer
Total No. Ports 0 65535
Reserved Ports 0 1023
Open Ports
1024 65535
Presentation Layer
Application
Application
Presentation
Presentation
Presentation
Presentation
Session
Session
Transport
Transport
Network
Network
Data
Data Link
Link
Physical
Physical
Presentation Layer is
responsible for converting data
into standard format.
Examples : ASCII, EBCDIC,
JPEG, MPEG, BMP, MIDI, WAV,
MP3
Following tasks can be perform
at Presentation layer :
Encoding
Decoding
Encryption Decryption
Compression Decompression
Session Layer
Application
Application
Presentation
Presentation
Session
Session
Session
Transport
Transport
Network
Network
Data
Data Link
Link
Physical
Physical
Transport Layer
Application
Application
Presentation
Presentation
Session
Session
Transport
Transport
Transport
Transport
Network
Network
Data
Data Link
Link
Physical
Physical
Transport Layer is
responsible for end-to-end
connectivity. It is also known as
heart of OSI Layers. Following
task are performed at Transport
Layer : -
SEGMENT = TCP/UDP +
DATA
Identifying Service
Multiplexing & De-multiplexing
Segmentation
Sequencing & Reassembling
Flow Control
Error Correction
Identifying Service
TCP
Transmission Control
Protocol
UDP
User Datagram
Protocol
Connection Oriented
Connection Less
Acknowledgement
No Acknowledgement
Reliable
Unreliable
Slower
Faster
Port No. 6
Port No. 17
Network Layer
Application
Application
Presentation
Presentation
Session
Session
Transport
Transport
Network
Network
Network
Network
Data
Data Link
Link
Physical
Physical
Network Layer is
responsible for providing best
path to data to reach destination.
Logical Addressing sits on this
layer.
Routing Protocols
www.zoomgroup.com
Application
Application
Presentation
Presentation
Session
Session
Transport
Transport
Network
Network
Data
Data
Link
Data Link
Link
Physical
Physical
Datalink Layer is
divided into two Sub Layers :
Most wide area network (WAN)
protocols primarily function at the
and physical layers.
data link
POINT TO REMEMBER
Remember that the primary function of
the data link layer is to regulate how
two networking devices connected to
the same layer 2 protocol communicate
with each other.
If the devices are on different layer 2
protocols or segments, the network
layer (layer 3) typically plays a role in
the communication of these devices.
Physical Layer
Application
Application
Presentation
Presentation
Session
Session
Transport
Transport
Network
Network
Data
Data Link
Link
Physical
Physical
Physical
Physical Layer is
responsible for electrical,
mechanical or procedural checks.
Data will be converted in Binary
that is 0s & 1s. Data will be in the
form of electrical pulses if it is
Coaxial or Twisted Pair cable and in
the form of Light if it is Fiber Optic
Cable.
Devices working at Physical Layer
are Hubs, Repeaters, Cables,
Modems etc.
e.g. Hub
Application
Application
Data
Presentation
Presentation
Data
Session
Session
Data
Transport
Transport
Segment
Network
Network
Packet
Data
Data Link
Link
Frame
Physical
Physical
Bits
OSI Layers
TCP/IP Layers
Application
Application
Presentation
Presentation
Application
Application
Session
Session
Transport
Transport
Network
Network
Data
Data Link
Link
Physical
Physical
Transport
Transport
Internet
Internet
Network
Network
Access
Access
Networking Devices
Equipment that connects directly to a network segment is
referred to as a device.
These devices are broken up into two classifications.
end-user devices
network devices
End-user devices include computers, printers, scanners, and
other devices that provide services directly to the user.
Network devices include all the devices that connect the enduser devices together to allow them to communicate.
Repeater
A repeater is a network device used to regenerate a signal.
Repeaters regenerate analog or digital signals distorted by
transmission loss due to attenuation. A repeater does not
perform intelligent routing.
Hub
Hubs concentrate
connections. In other words,
they take a group of hosts
and allow the network to see
them as a single unit.
This is done passively,
without any other effect on
the data transmission.
Active hubs not only
concentrate hosts, but they
also regenerate signals.
Bridge
Bridges convert network transmission data formats as well as
perform basic data transmission management. Bridges, as
the name implies, provide connections between LANs. Not
only do bridges connect LANs, but they also perform a check
on the data to determine whether it should cross the bridge or
not. This makes each part of the network more efficient.
Workgroup Switch
Workgroup switches add
more intelligence to data
transfer management.
Switches can determine
whether data should remain
on a LAN or not, and they
can transfer the data to the
connection that needs that
data.
Router
Routers have all capabilities of the previous devices. Routers
can regenerate signals, concentrate multiple connections,
convert data transmission formats, and manage data
transfers.They can also connect to a WAN, which allows them
to connect LANs that are separated by great distances.
The Cloud
The cloud is used in diagrams to represent where the
connection to the internet is.
It also represents all of the devices on the internet.
Network Topologies
Network topology defines the structure of the network.
One part of the topology definition is the physical topology,
which is the actual layout of the wire or media.
The other part is the logical topology,which defines how the
media is accessed by the hosts for sending data.
Physical Topologies
Bus Topology
A bus topology uses a single backbone cable that is
terminated at both ends.
All the hosts connect directly to this backbone.
Ring Topology
A ring topology connects one host to the next and the last host
to the first.
This creates a physical ring of cable.
Star Topology
A star topology connects all cables to a central point of
concentration.
Hierarchical Topology
A hierarchical topology is similar to an extended star.
Mesh Topology
A mesh topology is implemented to provide as much
protection as possible from interruption of service.
Each host has its own connections to all other hosts.
Although the Internet has multiple paths to any one
location, it does not adopt the full mesh topology.
LANs
WANs
Introduction to Ethernet
Three data rates currently defined
for the operation over optical fiber
and twisted-pair cables
10 Mbps 10Base-T Ethernet
100 Mbps - Fast Ethernet
1000 Mbps - Gigabit Ethernet
What is router?
Model 2501
AUI
Attachment
Unit Interface
E0
Serial Ports
S0 and S1
Console
Con 0
Power Switch
Auxiliary
Aux 0
Power
Supply
E0
192.168.1.150/24
Straight Cable
Straight Cable
1.1
1.2
1.3
LAN - 192.168.1.0/24
Routing Protocols
52
OSPF Terminology
The next several slides explain various OSPF terms
-one per slide.
Neighbor table
Topology table
Routing table
Neighbor Table
The neighbor table is the most important table in EIGRP.
Each EIGRP router maintains a neighbor table that lists adjacent
routers. This table is comparable to the adjacency database used by
OSPF. There is a neighbor table for each protocol that EIGRP
supports.
When a neighbor sends a hello packet, it advertises a hold time. The
hold time is the amount of time a router treats a neighbor as
reachable and operational. In other words, if a hello packet is not
heard within the hold time, then the hold time expires.
When the hold time expires, the Diffusing Update Algorithm (DUAL),
which is the EIGRP distance vector algorithm, is informed of the
topology change and must recalculate the new topology.
Topology Table
The topology table is made up of all the EIGRP routing tables in the
autonomous system.
DUAL takes the information supplied in the neighbor table and the topology
table and calculates the lowest cost routes to each destination. By
tracking this information, EIGRP routers can identify and switch to alternate
routes quickly.
The information that the router learns from the DUAL is used to determine
the successor route, which is the term used to identify the primary or best
route.
A copy is also placed in the topology table.
Every EIGRP router maintains a topology table for each configured network
protocol. All learned routes to a destination are maintained in the topology
table.
Routing Table
The EIGRP routing table holds the best routes to a destination. This
information is retrieved from the topology table. Each EIGRP router
maintains a routing table for each network protocol.
A successor is a route selected as the primary route to use to reach a
destination.DUAL identifies this route from the information contained in the
neighbor and topology tables and places it in the routing table.
There can be up to four successor routes for any particular route. These
can be of equal or unequal cost and are identified as the best loop-free
paths to a given destination.
A copy of the successor routes is also placed in the topology table.
A feasible successor (FS) is a backup route.These routes are identified at
the same time the successors are identified, but they are only kept in the
topology table. Multiple feasible successors for a destination can be
retained in the topology table although it is not mandatory.
IPv6
128 bit hexadecimal
larger address space
more secure & faster than IPv4
Uses ICMP version 6
doesnt use ARP
IPv6 contains 8 fields and each field contains
16 bits.
1stField: 2ndField: 3rdField: 4thField: 5thField:
6thField: 7thField: 8thField
END OF SLIDES