0% found this document useful (0 votes)
11 views22 pages

Net Conf Chapter 2

Uploaded by

Mekonnen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views22 pages

Net Conf Chapter 2

Uploaded by

Mekonnen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Chapter Two

Router and switch


Router

• A router is a computer, just like any other computer,


including a PC.
• The router is a layer 3 device that operates on the
network layer.
• It’s primary responsibility is to forward packets
destined for local and remote networks by:
 Determining the best path to send packets
 Forwarding packets toward their destination
Cont..

• Routers have many of the same hardware and software


components that are found in other computers, including:
 CPU
 ROM
 RAM
 Operating System

• CPU: The CPU executes operating system instructions,


such as system initialization, routing functions, and
network interface control.
Cont..

 RAM: Similar to other computers, RAM stores the


instructions and data needed to be executed by the CPU.
RAM is used to store:
o Operating system: The IOS is copied into RAM during
bootup.
o Running configuration file: This is the configuration file
that stores the configuration commands that the router’s
IOS is currently using.
o IP routing table: This is the file that stores information
about directly connected and remote networks.
• RAM is volatile memory and loses its contents when the router
is powered down or restarted. For this reason, the router also
contains permanent storage areas such as ROM, flash, and
Cont..

 ROM: ROM is a form of permanent storage. Router use ROM to


store,
o Bootstrap instructions
o Basic diagnostic software
o Scaled-down version of IOS

 Flash Memory: Flash memory is nonvolatile router memory


that can be electrically erased and reprogrammed.
• Flash is used as permanent storage for the operating
system, IOS.
• In most models of routers, the IOS is permanently stored in
flash memory and copied into RAM during the bootup
process.
Cont..

 NVRAM: used as a permanent storage for the startup


configuration file (startup-config).
• All configuration changes are stored in the running-config
file in RAM.
• To save those changes in case the router is restarted or
loses power, the running-config file must be copied to
NVRAM, where it is stored as the startup-config file.
• NVRAM retains its contents even when the router is
powered off.
Router Bootup Process
 There are six major phases in the router bootup
processes;
1. POST: Testing the router hardware
2. Loading the bootstrap program
3. Locating IOS
4. Loading IOS
5. Locating the configuration file
6. Loading the startup configuration file or entering
setup mode
Cont..
Step 1: Performing the POST
• The POST process is used to test the router hardware. When the
router is powered on, software on the ROM chip conducts the
POST.
• During this self test, the router executes diagnostics from ROM
on several hardware components, including the CPU, RAM, and
NVRAM.

Step 2: Loading the Bootstrap Program


• After the POST, the bootstrap program is copied from ROM into
RAM.
• When the bootstrap program is in RAM, the CPU executes the
instructions in the bootstrap program.
• The main task of the bootstrap program is to locate the IOS and
load it into RAM
Cont..

Step 3: Locating the IOS


• The bootstrap program is responsible for locating the IOS
and copying it into RAM.
• The IOS is typically stored in flash memory, but it can be
stored in other places such as a TFTP (Trivial File Transfer
Protocol) server.

Step 4: Loading the IOS


• Some of the older routers ran the IOS directly from flash,
but current models copy the IOS into RAM for execution by
the CPU.
• When the IOS begins to load, you might see a string of
pounds signs (#) while the image decompresses.
Cont..

Step 5: Locating the Configuration File


• After the IOS is loaded, the bootstrap program searches for
the startup configuration file, known as the startup-config
file, in NVRAM.
• This file has the previously saved configuration commands
and parameters, including the following:
o Interface addresses
o Routing information
o Passwords
o Any other configurations saved by the network
administrator
Cont..

Step 6: Loading the Startup Configuration File or Entering


Setup Mode
• If a startup configuration file is found in NVRAM, the IOS
loads it into RAM as the running-config file and executes
the commands in the file one line at a time.
Verifying Router Bootup Process

o The show version command can be used to help verify and


troubleshoot some of the basic hardware and software
components of the router.

o The output from the show version command includes


information about the following:
 IOS version
 ROM bootstrap program
 Location of IOS
 CPU and amount of RAM
 Interfaces
 Amount of NVRAM
 Amount of flash
 Configuration register information
Router Interfaces

1. LAN Interfaces: are interfaces that are used to connect the


router to the LAN, similar to how a PC’s Ethernet network
interface card (NIC) is used to connect the PC to the Ethernet
LAN.
Example: Ethernet and Fast Ethernet interfaces.

2. WAN Interfaces: are interfaces used to connect routers to


external networks, usually over a larger geographical distance.
Example: Serial, ISDN, and Frame Relay interfaces.
Basic Router Configuration

• When configuring a router, certain basic tasks are


performed, including the following:
o Naming the router
o Setting passwords
o Configuring interfaces
o Configuring a banner
o Saving changes on a router
o Verifying basic configuration and router operations
Verifying Basic Router Configuration

Verification Action
Command
show running- displays the current running configuration
config that is stored in RAM

show startup- displays the startup configuration file


config stored in NVRAM

Show ip route displays the routing table that IOS is


currently using to choose the best path to
its destination networks

show interfaces displays all the interface configuration


parameters and statistics

show ip interface displays abbreviated interface configuration


brief information, including IP address and
interface status
Switch Boot Sequence

o A network switch is a multiport network bridge that uses


hardware addresses to process and forward data at the data link
layer (layer 2) of the OSI model.

o Switches forward Ethernet frames based on the destination MAC


address of the frames.

o A LAN switch keeps a table that it uses to determine how to


forward traffic through the switch

o When a switch receives an incoming frame with a MAC address


that is not found in the CAM(Content Address Memory) table, it
floods it to all ports but the one that received the frame.
Switch Boot Sequence

o Switch Boot Sequence


1. POST
2. Run boot loader software
3. Boot loader does low-level CPU initialization
4. Boot loader initializes the flash file system
5. Boot loader locates and loads a default IOS operating system
software image into memory and hands control of the switch
over to the IOS.
Basic Switch Management

o To prepare Switch for remote management access the switch


must be configured with an IP address and subnet mask, as
well as the default gateway.
o We can assign IP addresses for SVI which is directly related to
VLAN which are numbered logical groups to which physical
ports can be assigned.
o By default the switch is configured to have the management
of switch controlled through VLAN 1, all ports are assigned to
it.

o For security purpose, it is considered a best practice to use a


VLAN other than VLAN 1.
Switch Basic Configuration
Remote Access

o Remote access is the ability to get access to a computer or


a network from a remote distance. i.e. using Telnet or SSH
Telnet:
o is a network protocol that allows a user to communicate with a
remote device.
o It is a virtual terminal protocol used mostly by network
administrators to remotely access and manage devices.
o Administrator can access the device by “telnetting” to the IP
address or hostname of a remote device through a Telnet
client software.
o Disadvantages of this protocol is that all data, including
usernames and passwords, is sent in clear text, which is a
potential security risk.
SSH

o Secure Shell (SSH) is a protocol that provides a secure (encrypted)


command-line based connection to a remote device.
o The key difference between Telnet and SSH is that SSH uses
encryption, which means that all data transmitted over a network is
secure from eavesdropping.
o Like Telnet, a user accessing a remote device must have an SSH
client installed.
o SSH uses TCP port 22 by default.
o NOTE :SSH is the most common way to remotely access a network
devices.
?

You might also like