ITN6 Instructor Materials Chapter6

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 30

Instructor Materials

Chapter 6: Network Layer

CCNA Routing and Switching


Introduction to Networks v6.0

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Chapter 6: Network Layer

Introduction to Networks v6.0

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Chapter 6 - Sections & Objectives
6.1 Network Layer Protocols
• Describe the purpose of the network layer in data communication.
• Explain why the IPv4 protocol requires other layers to provide reliability.
• Explain the role of the major header fields in the IPv4 and IPv6 packet.
6.2 Routing
• Explain how a host device uses routing tables to direct packets to itself, a local
destination, or a default gateway.
• Compare a host routing table to a routing table in a router.
6.3 Routers
• Describe the common components and interfaces of a router.
• Describe the boot-up process of a Cisco IOS router.
6.4 Configure a Cisco Router
• Configure initial settings on a Cisco IOS router.
• Configure two active interfaces on a Cisco IOS router.
• Configure devices to use the default gateway.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
6.1 Network Layer
Protocols

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Network Layer Protocols
Network Layer in Communications
 The Network Layer ( Allows end devices to exchange data across the
network )
( 4 Basic Processes used )
• Addressing end devices (Unique IP address)
• Encapsulation (adds IP header info. Srs & Dst)
• Routing (selects best path – hop – b/w – Routers )
• De-encapsulating (if IP matches Dst – Layer 4)
 Network Layer Protocols
• IPv4
• IPv6

 The Exchange of Data

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Network Layer Protocols
Characteristics of the IP Protocol
 Encapsulating IP
• Segments are encapsulated into IP packets for transmission.
• The network layer adds a header so packets can be routed to
the destination.
 IP - Connectionless
• Sender doesn’t know if the receiver is listening or the message
arrived on time.
• Receiver doesn’t know data is coming.
• No connection with the destination is established before sending
data packets.
 IP – Best Effort Delivery
• IP is inherently unreliable because packet delivery is not
guaranteed. No guarantee all packets sent are received.
 IP – Media Independent
• IP can travel over different types of media.
• Operation is independent of the medium (i.e., copper, fiber optic,
or wireless) carrying the data.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Connectionless Communication

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Best Effort Delivery

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Media Independent Process

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Network Layer Protocols
IPv6 Packet
 Limitations of IPv4
• IP address depletion
• Internet routing table expansion
• Lack of end-to-end connectivity
 Introducing IPv6
• Increased address space
• Improved packet handling
• Eliminates the need for NAT
 EncapsulatingIPv6
• Simplified header format
• No checksum process requirement
• More efficient Options Header mechanism
• Flow Label field makes it more efficient.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Network Layer Protocols
IPv6 Packet (Cont.)
 IPv6 Packet Header
• See Clip

See Packet Component


s

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Network Layer Protocols
IPv4 Packet
See Packet Component
 IPv4 Packet Header s
• See Clip
 Version = 0100
 DS = Packet
Priority
 TTL = Limits life of
Packet
 Protocol = Upper
layer protocol such
as TCP
 Source IP Address
= source of packet
 Destination IP
Address =
destination of
packet

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
6.2 Routing

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Routing
How a Host Routes
 Host Forwarding Decision
• Three types of destination: itself, local host, remote host.
 Default Gateway
• Routes traffic to other networks
• Has a local IP address in the same address range as other hosts on the network
• Can take data in and forward data out
 Using the Default Gateway
• Hosts will use the default gateway when sending packets to remote networks.
 Host Routing Tables
• Use the netstat –r command to display the
host routing table on a Windows machine.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Routing
How a Host Routes (Cont.)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
How a Host Routes
Router Routing Tables
 Router Packet Forwarding Decision
• Routers and hosts forward packets in a similar fashion.
• The main difference is that routers have more interfaces while hosts often have only one.
• Devices on directly connected networks can be reached directly.
• Devices on remote networks are reached through gateway.
 IPv4 Router Routing Table
• The router routing table stores network routes the router knows about.
• Use the show ip route command to display the routing table on a Cisco router.
• The router routing table also has information on: how the route was learned, its
trustworthiness and rating.
• It also contains which interface to use to reach that specifc destination.
 Directly Connected Routing Table Entries
 Remote Network Routing Table Entries
 Next-Hop Address
 Default Route

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
How a Host Routes
Router Routing Tables (Cont.)
 Remote Network Routing
Table Entries
• Remote destinations can’t be
reached directly.
• Remote routes contain the
address of the intermediate
network device to be used to
reach the destination.
 Next-Hop Address
• Next-Hop address is the
address of the intermediate
device used to reach a specifc
remote destination.

See Clip

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
6.3 Routers

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Routers
Anatomy of a Router
 A Router is a Computer
• Routers have CPU, memory and I/O devices
• Cisco routers use IOS as their operating system.
 Router Memory
• Just as a computer, routers have memory.
• Routers contain RAM, ROM, NVRAM and Flash memory.
 Inside a Router
• Routers have the same general structure.
 Connect to a Router
• Routers have may ports to support connections.
 LAN and WAN Interfaces
• Routers have LAN and WAN ports.
• Different models ship with different ports.
• Ethernet is very common on different router
models.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Routers
Anatomy of a Router
 Bootset Files
• IOS image file, stored in the Flash, contains See Clip
the IOS.
• The Flash also stores other system files.
• The NVRAM stores configuration parameters.
 Router Bootup Process
1. Perform the POST and load the bootstrap
program.
2. Locate and load the Cisco IOS software.
3. Locate and load the startup configuration file
or enter setup mode
 Show Version Output
• The show version command is very useful.
• It provides information on the amounts of
memory installed, what IOS images was
loaded during boot and more.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Network Layer

Practical Lab:
Exploring Internetworking Devices – (.pka)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
6.4 Configuring a Cisco
Router

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Configure a Cisco Router
Configure Initial Settings
 Basic Switch Configuration  Basic Router Configuration
Steps Steps
• Configure device name • Configure device name
• Secure EXEC mode • Secure EXEC mode
• Secure VTY lines • Secure VTY lines
• Secure privilege EXEC mode • Secure privilege EXEC mode
• Secure all passwords • Secure all passwords
• Provide legal notification • Provide legal notification
• Configure the management SVI • Configure the management SVI
• Save the configuration • Save the configuration

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Configure a Cisco Router
Configure Interfaces
 Configure Router Interfaces
• Enter the interface sub-configuration mode.
• Add a description to the Interface (optional)
• Configure an IPv4 or IPv6 address.
• Activate the interface with a no shutdown
command
 Verify Interface Configuration
• show ip route - Displays the contents of the
IPv4 routing table stored in RAM.
• show interfaces - Displays statistics for all
interfaces on the device.
• show ip interface - Displays the IPv4
statistics for all interfaces on a router.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Configure a Cisco Router
Configure the Default Gateway
 Default Gateway for a Host

 Default Gateway for a Switch


• A default gateway is required for remote network communication.
• If a switch is to be managed via its VTY lines, it needs a default gateway.
• Use the ip default-gateway command to configure the default gateway for a switch.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Network Layer

Practical Labs:
- Configure Initial Router Settings – (.pka)
- Connect a Router to a LAN (.pka)
- Troubleshoot Default Gateway Issues (.pka)
- Building a Switch & a Router Network (Practice)
- Skills Integration (Compulsory) (.pka)
-

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
6.5 Chapter Summary

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Chapter Summary
Summary
 Explain how network layer protocols and services support communications across data
networks.
 Explain how routers enable end-to-end connectivity in a small to medium-sized business
network.
 Explain how devices route traffic in a small to medium-sized business network.
 Configure a router with basic configurations.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30

You might also like