CCNA-Day1 (Compatibility Mode) (Repaired)
CCNA-Day1 (Compatibility Mode) (Repaired)
CCNA-Day1 (Compatibility Mode) (Repaired)
Certifications
2
3
CCNA Exam
Exam Number – 200-301
Total Marks - 1000
Duration – 120 Min
Passing score – Passing score varies, but it is traditionally
around 800-850 out of 1000
Questions -Unstated to date Multiple Choice
Question types: Multiple Choice (single and
multiple answers), drag-and-drop, Sim, Simlet, Testlet
4
Benefits
Enhanced Learning Curve
enhance your knowledge of understanding
the core concepts of Cisco networking.
Potential Employer
Global Acceptance
The CCNA certification is globally accepted in different
countries of the world.
5
Cisco Icons and Symbols
6
Data Networks
7
Networking Devices
Network devices include all the devices that connect the end-
user devices together to allow them to communicate.
8
Network Interface Card
9
Hub
Connects a group of Hosts
10
Switch
11
Router
Routers are used to connect networks together
Route packets of data from one network to another
Cisco became the de facto standard of routers because of their high-
quality router products
Routers, by default, break up a broadcast domain
12
Network Topologies
Network topology defines the structure of the network.
13
Small office-home office
14
Campus LAN
15
Tier 2 Topology
16
Tier 3 Topology
17
Data center design
18
Spine and leaf
Leaf-spine is a two-layer network topology composed of
leaf switches and spine switches.
Leaf-spine is a two-layer data center network topology that's
useful for data centers that experience more east-west
network traffic than north-south traffic. The topology is
composed of leaf switches (to which servers and storage
connect) and spine switches (to which leaf switches
connect). Leaf switches mesh into the spine, forming the
access layer that delivers network connection points for
servers.
19
Spine and leaf
20
LANs, MANs, & WANs
22
WANs
23
The internet
24
On-premises vs cloud network
A on-premises network is a network within the organization that can be securely accessed
by only the employees. It is like the corporate IT network. On the contrary, a public network
can be accessed by any user and is an untrusted network. EAA Client allows secure access to
configured applications by tunneling traffic through the user’s machine. This is beneficial,
when the employees are in a public network. However, when they are within the corporate
network perimeter, this increases the delay. The reason is there is an additional hop from the
application server to the Enterprise Application Access management POP, and then to the
employee's machine (black path).
25
On-promises vs cloud services
26
Hybrid cloud
27
Virtual Private Network
A VPN is a private network that is constructed within a public network
infrastructure such as the global Internet. Using VPN, a telecommuter
can access the network of the company headquarters through the
Internet by building a secure tunnel between the telecommuter’s PC
and a VPN router in the headquarters.
28
Bandwidth
29
Measuring Bandwidth
30
Internetworking Devices
31
What Are The Components Of A
Network ?
Home Mobile
Office Users
Internet
Distribution
Layer
Access
Layer
33
Institute of Electrical and Electronics
Engineers (IEEE) 802 Standards
IEEE 802.1: Standards related to network management.
IEEE 802.2: General standard for the data link layer in the OSI
Reference Model. The IEEE divides this layer into two sublayers --
the logical link control (LLC) layer and the media access control
(MAC) layer.
IEEE 802.3: Defines the MAC layer for bus networks that use
CSMA/CD. This is the basis of the Ethernet standard.
IEEE 802.4: Defines the MAC layer for bus networks that use a
token-passing mechanism (token bus networks).
To address the problem of networks increasing in size and in number, the
International Organization for Standardization (ISO) researched many
network schemes and recognized that there was a need to create a network
model
36
Don’t Get Confused.
37
The OSI Reference Model
38
OSI Model
Application
Application
(Upper) Presentation
Layers
Session
Transport
Network
Data Flow
Layers
Data-Link
Physical
39
Layer 7 - The Application Layer
41
Layer 5 - The Session Layer
2 Data Link
Example:
1 Physical Client Software
( Used for logging in)
42
PDU - Formatted Data
Half Duplex
• It uses only one wire pair with a digital signal running in
both directions on the wire.
44
Layer 4 - The Transport Layer
45
Layer 3 - The Network Layer
Sometimes referred to as the “Cisco Layer”.
7 Application End to End Delivery
Provide logical addressing that routers use for
6 Presentation path determination
Segments are encapsulated
5 Session Internetwork Communication
Packet forwarding
4 Transport Packet Filtering
Makes “Best Path Determination”
3 Network Fragmentation
1 Physical
46
Layer 2 - The Data Link Layer
Performs Physical Addressing
7 Application This layer provides reliable transit of
data across a physical link.
6 Presentation Combines bits into bytes and
bytes into frames
5 Session Access to media using MAC address
Error detection, not correction
LLC and MAC
4 Transport Logical Link Control performs Link
establishment
3 Network MAC Performs Access method
2 Data Link
1 Physical PDU - Frames
Preamble DMAC SMAC Data length DATA FCS
47
Layer 1 - The Physical Layer
7 Application
6 Presentation
This is the physical media
5 Session through which the data,
represented as electronic signals,
4 Transport is sent from the source host to
3 Network the destination host.
48
Data Encapsulation
Application
Presentation
Session
PDU
Upper-Layer Data
Transport Segment
TCP Header Upper-Layer Data
Network Packet
IP Header Data
Physical Bits
0101110101001000010
49
Data Encapsulation
50
OSI Model Analogy
Application Layer - Source Host
58
OSI Model Analogy
Network Layer - Destination
64
Type of Transmission
Unicast
Multicast
Broadcast
65
Type of Transmission
66
Broadcast Domain
A group of devices receiving broadcast frames
initiating from any device within the group
67
Collision
The effect of two nodes sending transmissions
simultaneously in Ethernet. When they meet on the
physical media, the frames from each node collide and
are damaged.
68
Collision Domain
The network area in Ethernet over which frames
that have collided will be detected.
Collisions are propagated by hubs and repeaters
Collisions are Not propagated by switches,
routers, or bridges
69
Physical Layer
Defines
EIA/TIA-232
• Media type
Ethernet
802.3
Physical
V.35
• Connector type
• Signaling type
802.3 is responsible for LANs based on the carrier sense multiple access
collision detect (CSMA/CD) access methodology. Ethernet is an example
of a CSMA/CD network.
70
Physical Layer:
Ethernet/802.3
10Base2—Thin Ethernet
10Base5—Thick Ethernet
Host
Hub
10BaseT—Twisted Pair
Hosts
71
Device Used At Layer 1
Physical
A B C D
73
Layer 2
MAC Layer—802.3
Number of Bytes 8 6 6 2 Variable 4
Preamble Destination Address Source Address Length Data FCS
Ethernet II
uses “Type”
0000.0C xx.xxxx here and
does not use
IEEE Assigned Vendor 802.2.
Assigned
MAC Address
synchronize senders and receivers
74
Devices On Layer 2
(Switches & Bridges)
Data-Link
1 2 3 4 OR 1 2
Switch
Memory
• Each segment is its
own collision domain.
• Broadcasts are
forwarded to all
segments.
76
Layer 3 : Network Layer
Network
• Defines logical IP, IPX
source and
destination
Frame Relay
Data-Link
addresses 802.2
HDLC
associated with a
Ethernet
specific protocol
• Defines paths
Physical
802.3
EIA/TIA-232
through network V.35
77
Layer 3 : (cont.)
Logical
Address
172.15.1.1
Network Node
Route determination occurs at this layer, so a packet must include a source and
destination address.
Network-layer addresses have two components: a network component for
internetwork routing, and a node number for a device-specific address. The
example in the figure is an example of an IP packet and address.
78
Layer 3 (cont.)
Address Mask
172.16.122.204 255.255.0.0
172 16 122 204
Binary
Address 10101100 00010000 01111010 11001100
255 255 0 0
Binary
Mask 11111111 11111111 00000000 00000000
Network Host
79
Device On Layer 3
Router
• Broadcast control
• Multicast control
• Optimal path
determination
• Traffic management
• Logical addressing
• Connects to WAN
services
80
Layer 4 : Transport Layer
• Distinguishes between
upper-layer applications
Transport
• Establishes end-to-end
connectivity between TCP UDP SPX
applications
• Defines flow control
Network
IP IPX
• Provides reliable or
unreliable services for
data transfer
81
Reliable Service
Sender Receiver
Synchronize
Acknowledge, Synchronize
Acknowledge
Connection Established
Data Transfer
(Send Segments)
82
How They Operate
Hub Bridge Switch Router
Collision Domains:
1 4 4 4
Broadcast Domains:
1 1 1 4
83
84
Why Another Model?
7 Application
6 Presentation 5
Session Application
5
4
4 Transport Transport
3
3
Network Internet
2
2
Data-Link Data-Link
1
1 Physical Physical
86
Application Layer Overview
File Transfer
- TFTP*
- FTP*
- NFS
E-Mail
- SMTP
Remote Login
Application
- Telnet*
- rlogin*
Transport Network Management
- SNMP*
Internet Name Management
- DNS*
Data-Link
Data-Link
Physical
88
TCP Segment Format
Bit 0 Bit 15 Bit 16 Bit 31
Options (0 or 32 if Any)
Data (Varies)
89
Port Numbers
F T S D T S R
T E M N F N I
Application P
Layer
P L T S T M
N P P P
E
T
90
TCP Port Numbers
Source Destination
…
Port Port
Telnet Z
Host A Host Z
91
TCP Port Numbers
92
TCP Three-Way
Handshake/Open Connection
Host A Host B
Send SYN
1 (seq = 100 ctl = SYN)
SYN Received
93
Opening & Closing Connection
94
Windowing
• Windowing in networking means the quantity of data
segments which is measured in bytes that a machine
can transmit/send on the network without receiving an
acknowledgement
95
TCP Simple Acknowledgment
Sender Receiver
Send 1
Receive 1
Send ACK 2
Receive ACK 2
Send 2
Receive 2
Send ACK 3
Receive ACK 3
Send 3
Receive 3
• Window Size = 1 96
TCP Sequence and
Acknowledgment Numbers
Source Destination Sequence Acknowledgment
…
Port Port
I just
sent number
I just got number
11.
11, now I need
number 12.
Source
Source Dest.
Dest. Seq.
Seq. Ack.
Ack.
23 1028 100 11
23 1028 101 12 97
Windowing
98
Windowing
99
Transport Layer Reliable Delivery
100
Flow Control
Another function of the transport layer is to provide
optional flow control.
SEQ 3072
Win 0
30 73
A c k
2
i n 30 7
30 73 W
Ac k
102
User Datagram Protocol (UDP)
104
TCP vs UDP
105
Internet Layer Overview
Options (0 or 32 if Any)
107
Protocol Field
Transport
TCP UDP
Layer
6 17 Protocol
Numbers
Internet
Layer IP
Application
Transport Destination
1 Unreachable
ICMP
Echo (Ping)
Internet
Other
Data-Link
Physical
109
Address Resolution Protocol
I need the
I heard that broadcast.
Ethernet
The message is for me.
address of
Here is my Ethernet
176.16.3.2.
address.
172.16.3.1 172.16.3.2
IP: 172.16.3.2
Ethernet: 0800.0020.1111
• Map IP MAC
• Local ARP
110
Reverse ARP
I heard that
broadcast.
What is
Your IP
my IP
address is
address?
172.16.3.25.
Ethernet: 0800.0020.1111
IP: 172.16.3.25
• Map MAC IP
111
112
Origin of Ethernet
113
10 Mbps IEEE Standards - 10BaseT
114
Twisted Pair Cables
Baseband Transmission
Entire channel is used to transmit a single digital signal
Complete bandwidth of the cable is used by a single signal
The transmission distance is shorter
The electrical interference is lower
Broadband Transmission
Use analog signaling and a range of frequencies
Continuous signals flow in the form of waves
Support multiple analog transmission (channels)
117
Straight-through cable pinout
118
Crossover cable
119
Crossover cable
120
Rollover cable
121
Rollover cable pinout
122
Straight-Thru or Crossover
1 2
100 = 1
10 70 101 = 10
100 100 102 = 100
1000
172 103 = 1000
10101100
20 = 1
21 = 2
1
10101100– Base 2 2
0
0 22 = 4
4 4 23 = 8
8 8
16 0
24 = 16
32 32 25 = 32
64 0 26 = 64
128 128
27 = 128
172
125
Base 2 Number System
101102 = (1 x 24 = 16) + (0 x 23 = 0) + (1 x 22 = 4) +
(1 x 21 = 2) + (0 x 20 = 0) = 22
126
Converting Decimal to Binary
128
Hex to Binary to Decimal Chart
129
Introduction to TCP/IP
Addresses
172.18.0.1 172.16.0.1
172.18.0.2 172.16.0.2
HDR SA DA DATA
10.13.0.0 192.168.1.0
10.13.0.1 172.17.0.1 172.17.0.2 192.168.1.1
8
4
2
1
128
64
32
16
128
64
32
16
8
4
2
1
128
64
32
16
8
4
2
1
128
8
4
2
1
64
32
16
Example
Decimal 172 16 122 204
Example 10101100 00010000 01111010 11001100
Binary 131
IP Address Classes
•Class D: Multicast
•Class E: Research
132
IP Address Classes
Bits: 1 8 9 16 17 24 25 32
0NNNNNNN Host Host Host
Class A:
Range (1-126)
Bits: 1 8 9 16 17 24 25 32
10NNNNNN Network Host Host
Class B:
Range (128-191)
1 8 9 16 17 24 25 32
Bits:
110NNNNN Network Network Host
Class C:
Range (192-223)
1 8 9 16 17 24 25 32
Bits:
1110MMMM Multicast Group Multicast Group Multicast Group
Class D:
Range (224-239)
133
Host Addresses
172.16.2.2 10.1.1.1
10.6.24.2
E1
172.16.3.10 E0 10.250.8.11
172.16.2.1
172.16.12.12 10.180.30.118
Routing Table
172.16 . 12 . 12 Network Interface
Network Host 172.16.0.0 E0
10.0.0.0 E1
134
Classless Inter-Domain Routing
(CIDR)
• Basically the method that ISPs (Internet Service
Providers) use to allocate an amount of
addresses to a company, a home
• Ex : 192.168.10.32/28
• The slash notation (/) means how many bits are
turned on (1s)
135
CIDR Values
136
Determining Available Host
Addresses
Network Host
172 16 0 0
N
12
11
10
9
8
7
6
5
4
3
2
1
16
15
14
13
10101100 00010000 00000000 00000000 1
00000000 00000001 2
00000000 00000011 3
...
...
...
11111111 11111101 65534
11111111 11111110 65535
11111111 11111111 65536
– 2
2N – 2 = 216 – 2 = 65534 65534
137
IP Address Classes Exercise
10.2.1.1
128.63.2.100
201.222.5.64
192.6.141.2
130.113.64.16
256.241.201.10
138
IP Address Classes Exercise
Answers
256.241.201.10 Nonexistent
139
Subnetting
140
Formula
Number of subnets – 2x-2
Where X = number of bits borrowed
141
Subnetting
Classful IP Addressing SNM are a set of 255’s and 0’s.
In Binary it’s contiguous 1’s and 0’s.
SNM cannot be any value as it won’t follow the rule of
contiguous 1’s and 0’s.
Possible subnet mask values
– 0
– 128
– 192
– 224
– 240
– 248
– 252
– 254
– 255
142
Addressing Without Subnets
…...
172.16.0.0
172.16.3.0
172.16.4.0
172.16.1.0 172.16.2.0
172.16.2.160 172.16.3.150
172.16.2.160 172.16.3.150
IP
Address
172 16 0 0
Network Host
Default
Subnet
Mask
255 255 0 0
11111111 11111111 00000000 00000000
• Also written as “/16,” where 16 represents the number of 1s
in the mask
Network Subnet Host
8-Bit
Subnet 255 255 255 0
Mask
• Also written as “/24,” where 24 represents the number of
1s in the mask 147
Decimal Equivalents of Bit
Patterns
128 64 32 16 8 4 2 1
0 0 0 0 0 0 0 0 = 0
1 0 0 0 0 0 0 0 = 128
1 1 0 0 0 0 0 0 = 192
1 1 1 0 0 0 0 0 = 224
1 1 1 1 0 0 0 0 = 240
1 1 1 1 1 0 0 0 = 248
1 1 1 1 1 1 0 0 = 252
1 1 1 1 1 1 1 0 = 254
1 1 1 1 1 1 1 1 = 255 148
Subnet Mask Without Subnets
Network Host
Network 172 16 0 0
Number
192
224
240
248
252
255
128
254
Network
Number 172 16 2 0
192
224
240
248
252
255
128
192
224
240
248
252
254
255
128
254
Network
Number 172 16 2 128
172.16.2.10 255.255.255.0
10.6.24.20 255.255.240.0
10.30.36.12 255.255.255.0
152
Subnet Mask Exercise Answers
153
Broadcast Addresses
172.16.3.0
172.16.4.0
172.16.1.0
172.16.3.255 172.16.2.0
(Directed Broadcast)
255.255.255.255
(Local Network Broadcast)
X
172.16.255.255
(All Subnets Broadcast)
154
Addressing Summary Example
172 16 2 160
3
172.16.2.160 10101100 00010000 00000010 10100000 Host 1
192.168.5.16
Other
Subnets
192.168.5.32 192.168.5.48
157
Class C Subnet Planning
Example
IP Host Address: 192.168.5.121
Subnet Mask: 255.255.255.248
Network Network Network Subnet Host
? – SNM
? – Block Size
?- Subnets
159
Exercise
• /27
? – SNM – 224
? – Block Size = 256-224 = 32
?- Subnets
? – SNM
? – Block Size
?- Subnets
161
Exercise
• /30
? – SNM – 252
? – Block Size = 256-252 = 4
?- Subnets
165
Exercise
192.168.10.54 /29
Mask ?
Subnet ?
Broadcast ?
166
Exercise
192.168.10.130 /28
Mask ?
Subnet ?
Broadcast ?
167
Exercise
192.168.10.193 /30
Mask ?
Subnet ?
Broadcast ?
168
Exercise
192.168.1.100 /26
Mask ?
Subnet ?
Broadcast ?
169
Exercise
192.168.20.158 /27
Mask ?
Subnet ?
Broadcast ?
170
Class B
172.16.0.0 /19
Subnets ?
Hosts ?
Block Size ?
171
Class B
172.16.0.0 /19
Subnets 23 -2 = 6
Hosts 213 -2 = 8190
Block Size 256-224 = 32
172
Class B
172.16.0.0 /27
Subnets ?
Hosts ?
Block Size ?
173
Class B
172.16.0.0 /27
Subnets 211 -2 = 2046
Hosts 25 -2 = 30
Block Size 256-224 = 32
174
Class B
172.16.0.0 /23
Subnets ?
Hosts ?
Block Size ?
175
Class B
172.16.0.0 /23
Subnets 27 -2 = 126
Hosts 29 -2 = 510
Block Size 256-254 = 2
176
Class B
172.16.0.0 /24
Subnets ?
Hosts ?
Block Size ?
177
Class B
172.16.0.0 /24
Subnets 28 -2 = 254
Hosts 28 -2 = 254
Block Size 256-255 = 1
178
Class B
172.16.0.0 /25
Subnets ?
Hosts ?
Block Size ?
179
Class B
172.16.0.0 /25
Subnets 29 -2 = 510
Hosts 27 -2 = 126
Block Size 256-128 = 128
180
Find out Subnet and Broadcast
Address
• 172.16.85.30/29
182
Find out Subnet and Broadcast
Address
• 172.30.101.62/23
183
Find out Subnet and Broadcast
Address
• 172.20.210.80/24
184
Exercise
• Find out the mask which gives 100
subnets for class B
185
Exercise
• Find out the Mask which gives 100 hosts
for Class B
186
Class A
10.0.0.0 /10
Subnets ?
Hosts ?
Block Size ?
187
Class A
10.0.0.0 /10
Subnets 22 -2 = 2
Hosts 222 -2 = 4194302
Block Size 256-192 = 64
188
Class A
10.0.0.0 /18
Subnets ?
Hosts ?
Block Size ?
189
Class A
10.0.0.0 /18
Subnets 210 -2 = 1022
Hosts 214 -2 = 16382
Block Size 256-192 = 64
190
Broadcast Addresses Exercise
201.222.10.60 255.255.255.248
15.16.193.6 255.255.248.0
128.16.32.13 255.255.255.252
153.50.6.27 255.255.255.128
191
Broadcast Addresses Exercise
Answers
192
VLSM
• VLSM is a method of designating a different subnet
mask for the same network number on different subnets
193
Variable Length Subnetting
VLSM allows us to use one class C address to
design a networking scheme to meet the
following requirements:
Bangalore 60 Hosts
Mumbai 28 Hosts
Sydney 12 Hosts
Singapore 12 Hosts
WAN 1 2 Hosts
WAN 2 2 Hosts
WAN 3 2 Hosts
194
Networking Requirements
Bangalore 60
WAN 2
WAN 1
WAN 3
Sydney 60 Singapore 60
Mumbai 60
In the example above, a /26 was used to provide the 60 addresses
for Bangalore and the other LANs. There are no addresses left for
WAN links 195
Networking Scheme
Mumbai 192.168.10.64/27
28
192.168.10.128/30 192.168.10.132/30
2 2
2 WAN 192.198.10.137 and 138
192.168.10.136/30
60 12 12
25
192.168.1.0
197
VLSM Exercise
192.168.1.8/30 192.168.1.16/28
192.168.1.64/26
12
40 2 2
2
192.168.1.12/30
192.168.1.4/30
25
192.168.1.32/27
192.168.1.0
198
VLSM Exercise
2
8 5
2
2
2
35
15
192.168.1.0
199
Summarization
• Summarization, also called route aggregation, allows
routing protocols to advertise many networks as one
address.
• The purpose of this is to reduce the size of routing
tables on routers to save memory
• Route summarization (also called route aggregation or
supernetting) can reduce the number of routes that a
router must maintain
• Route summarization is possible only when a proper
addressing plan is in place
• Route summarization is most effective within a
subnetted environment when the network addresses are
in contiguous blocks
200
Summarization
201
Supernetting
202
Supernetting
172.16.12.0/24
172.16.13.0/24 172.16.12.0/22
172.16.14.0/24
172.16.15.0/24 203
Supernetting Question
17 17
2.1 2.1
. 4.1 .4.
128
17 28/ /25
2. 25
1 .5
. 0/
4 2
17
2.
1.
6.
0/
24 17
2.
1.
7.
0/
24
What is the most efficient summarization that TK1 can use to advertise its
networks to TK2?
A. 172.1.4.0/24172.1.5.0/24172.1.6.0/24172.1.7.0/24
B. 172.1.0.0/22
C. 172.1.4.0/25172.1.4.128/25172.1.5.0/24172.1.6.0/24172.1.7.0/24
D. 172.1.0.0/21
E. 172.1.4.0/22
204