Ch-1 NDC - 114903
Ch-1 NDC - 114903
Chapter One
1.1. Configuration Wizard
OSI Model
• The OSI Model (Open Systems Interconnection
Model) is a conceptual framework used to
describe the functions of a networking system.
The OSI model characterizes computing functions
into a universal set of rules and requirements in
order to support interoperability between different
products and software. It comprises of seven
layers.
Cont’d…
Advantages:-
• Network communication is broken into smaller,
more manageable parts.
• Allows different types of network hardware and
software to communicate with each other.
• All layers are independent and changes does not
affect other layers.
• Easier to understand network communication.
Cont’d…
• The second, the logical link control (LLC), provides flow and
protocols.
– Error correction
– Flow control
LAYER 6: PRESENTATION
• The presentation layer formats or translates data for the application layer
this, it at times also called the syntax layer. This layer can also handle the
compression of data.
Layer 1 cannot communicate with upper layers Layer 2 does this using LLC
Layer 1 can only describe stream of bits Layer 2 uses framing to organize bits
Cont’d…
Data Encapsulation
the data that flows down the OSI model. The 5 Steps of Data
Encapsulation are:
users’ input.
hosts.
Cont’d…
such as www.wsu.edu.et
dynamically.
• It allows for easier administration and works well in small to very large
network environments.
Cont’d…
TCP (Transmission Control Protocol)
• UDP does not sequence the segments and does not care about
• UDP just sends the segments off and forgets about them.
Cont’d…
Transparent Bridges:
Repeaters work with the actual physical signal, and do not attempt
to interpret the data being transmitted, they operate on the physical
layer, the first layer of the OSI model. Repeaters are majorly
employed in long distance transmission to reduce the effect of
attenuation. It is important to note that repeaters do not amplify the
original signal but simply regenerate it.
Modem
network. It is both an OSI layer 1 (physical layer) and layer 2 (data link
built into the board itself, eliminating the need for a standalone card.
42
43
44
45
Cont’d…
A switch operates in the layer 2, i.e. data link layer of the OSI
model.
Unmanaged Switch −
rates.
The Benefits of Media Converters
Cisco switch by default have a host name “switch”. To change this name
follow the instructions below:
Cont’d…
• Click on the Switch. A popup window will be
opened.
• Go to CLI tab in the popup window.
• Click in command box.
• Press “Enter”.
• To enable the switch give give following
command: 1 | enable
• To enable configuration mode give following
command:
1 | configure terminal
Cont’d…
steps.
• SUMMARY STEPS
• configure terminal
• password password
• login
• password password
• login
• end
1.2. View VLANs by Device and Port
• Ports are active only if they are assigned to VLANs that exist
on the switch.
• Static port assignments are performed by the administrator
and do not change unless modified by the administrator,
whether the VLAN exists on the switch or not.
Cont’d…
Pre-configuration Tasks
• Before configuring a VLAN based on ports,
complete the following task: Connecting ports and
configuring physical parameters of the ports,
ensuring that the ports are physically Up.
Configuration Procedures
Figure 8-6 Procedure of configuring a VLAN based
on ports
Cont’d…
• you must verify that certain requirements are met for all
controllers that are to be included in the group.
Cont’d…
Controllers)
Gateway to Gateway
• This is a typical enterprise-to-enterprise configuration. The
two gateways communicate with each other
• Configuration Management
• Performance Management
• Fault Management
• CiscoView
Cont’d…
Using SNMP and CiscoView:
• A user can define a VTP domain,
All commands that are available on user EXEC mode are available in here
too
More complete set of commands under show and clear command are
available here. For example, in user EXEC mode there is no show running-
config under the show command, but in privileged EXEC mode it is exist.
Cont’d…
• Unless the user account that we used has specific
privilege level assigned to it, by default it will get the
highest privilege level, which is level 15.
• Privileged EXEC mode can be protected using an
enable password.
• Issuing disable command here will bring us back to
the user EXEC mode.
• Issuing exit command here will disconnect the session.
Cont’d…
Global configuration mode
This is where the real configurations are done. We can enter global
configuration mode from privileged EXEC mode by using
command configure terminal. From here we can do changes on the
global device configuration such as hostname, domain-name,
creating user accounts, etc; or we can enter more specific
configuration within global configuration mode and make changes
such as IP address interface, access-list, DHCP, policy, etc.
Cont’d…
Some characteristics of global configuration mode are:
• Indicated by device hostname prompt, followed by a
word “config” inside a bracket and then hash sign (“#”).
• All commands from EXEC mode can be used here by
adding a word do before the command that we want to
execute, for example if we want to use show running-
config in global configuration mode we have to type it
as do show running-config.
Cont’d…
capability.
Submode Commands
CIsco devices usually have more than one physical interface. Once