0% found this document useful (0 votes)
12 views52 pages

Network Fundamentals

The document outlines a comprehensive CCNA training course covering networking technologies, including the OSI and TCP/IP models, network components, and IOS CLI. It includes assessment questions on various networking protocols and concepts, as well as an introduction to networking and types of networks. The document also discusses network architecture, cabling types, and common issues related to network interfaces and cables.

Uploaded by

Habtamu Asayto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views52 pages

Network Fundamentals

The document outlines a comprehensive CCNA training course covering networking technologies, including the OSI and TCP/IP models, network components, and IOS CLI. It includes assessment questions on various networking protocols and concepts, as well as an introduction to networking and types of networks. The document also discusses network architecture, cabling types, and common issues related to network interfaces and cables.

Uploaded by

Habtamu Asayto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 52

CISCO

CCNA
TRAINING
A comprehensive course on networking technologies
Prepared By

Habtamu Asayto
PRESENTATION OUTLINES
Assessment Question

Introduction

OSI and TCP/IP


Presentation
outlines Network Components

IOS CLI

Network Architecture

06/09/2025 2
ASSESSMENT QUESTIONS
1. Which of the following protocols are examples of TCP/IP transport layer
protocols?

TCP UDP
 HTTP/HTTPS (Web)  DNS (Domain Name
 FTP (File Transfer) System)
 SMTP (Email)  DHCP (Dynamic Host
 SSH (Secure Shell) Configuration Protocol)
 VoIP (Voice over IP)
 Online gaming and video
streaming

06/09/2025
3
ASSESSMENT QUESTIONS
2. Which of the following protocols are examples of TCP/IP data-link layer
protocols?
 Ethernet
Data-link layer protocols
 HTTP
 Ethernet
 HDLC (High-Level Data Link
 PPP
Control)
 HDLC (High-Level Data Link
 IP
Control)
 ATM (Asynchronous Transfer
 Frame Relay
Mode)
 ATM (Asynchronous Transfer
 UDP
Mode)
 SMTP
 TCP
 PPP
 Frame Relay
06/09/2025
4
ASSESSMENT QUESTIONS
3. Which devices are operates at Layer 3 of the OSI model?

 Switch Layer 3 of the OSI model


 Router  Router
 Hub  Layer 3 switch
 Access Point
 Layer 3 switch

06/09/2025
5
ASSESSMENT QUESTIONS
4. Which protocol resolves an IP address to a MAC address?

 DNS Answer
 ICMP  ARP
 ARP
 DHCP

06/09/2025
6
ASSESSMENT QUESTIONS
5. Which of the following are valid private IP addresses?

 192.168.1.10 Valid private IP addresses


 172.33.5.1  192.168.1.10
 172.16.0.5  172.16.0.5
 8.8.8.8

10.0.0.0 – 10.255.255.255
172.16.0.0 – 172.31.255.255

192.168.0.0 – 192.168.255.255

06/09/2025
7
ASSESSMENT QUESTIONS
6. Which cabling type is used for long-distance backbone
connections?
 UTP  Fiber optic
 STP
 Coaxial
 Fiber optic

06/09/2025
8
INTRODUCTION TO NETWORKING
 Computer networking refers to connected computing devices

(such as laptops, desktops, servers, smartphones, and tablets)


and an ever-expanding array of IoT devices (such as cameras,
door locks, doorbells, refrigerators, audio/visual systems,
thermostats, and various sensors) that communicate with one
another.

 A network is a group of connected devices that share

resources (files, printers, and internet).

06/09/2025
9
INTRODUCTION TO NETWORKING

When is computer networking started?

Researchers were looking for ways to allow computers to communicate and share
resources which is began in 1960s. The first real network is 1969 – ARPANET
(Advanced Research Projects Agency Network) was the first operational packet-
switching network which is developed by DARPA, a part of the U.S. Department of
Defense.

Types of Networks:

Which is started 1980s–90s

 LAN (Local Area Network) – Small area, like a home or office.

 WAN (Wide Area Network) – Large geographical area, like the internet.

 MAN (Metropolitan Area Network) – City-wide networks.


06/09/2025
1
OSI & TCP/IP
OSI and TCP/IP models

 The OSI Model (Open Systems Interconnection Model) started in 1970s

which is a conceptual framework used to describe functions of a


networking system. In the OSI reference model, the communications
between a computing systems are split into seven different abstraction
layers:

06/09/2025
1
OSI & TCP/IP
OSI and TCP/IP models
How Network Communication Works via OSI model?

06/09/2025
1
CONT…
OSI & TCP/IP Model Layers
TCP/IP Model (4 Layers)
OSI Model (7 Layers)
1. Application: User interface for network
1. Application: Combines OSI layers 5-7
services
functions
2. Presentation: Data translation and
2. Transport: Reliable or unreliable
encryption
transmission (TCP/UDP)
3. Session: Managing dialog between
3. Internet: Logical addressing and
devices
routing (IP)
4. Transport: Ensures data delivery and
4. Network Access: Physical hardware
error recovery
and data framing
5. Network: Routing and addressing
packets
6. Data Link: Frames data for physical
transmission 06/09/2025
1
7. Physical: Transmits raw bit stream over
CONT…
OSI & TCP/IP Model Layers

Layer 7 – Application layer

 The application layer is the highest abstraction layer of the TCP/IP model that provides the interfaces

and protocols needed by the users.

 Protocols: SMTP, HTTP, FTP, TFTP, Telnet, DNS, POP3 and etc.

 This is the closest layer to the end user. It provides the interface between the applications we use

and the underlying layers.

Layer 6 – Presentation layer

 This layer ensures the presentation of data, that the communications passing through are in the

appropriate form for the recipient. In general, it acts as a translator of the network which can
formats or translates data for the application layer based on the syntax or semantics that the
application accepts. It can also handle the encryption and decryption required by the application
layer

 Protocols: Video (WMV, AVI…), Bitmap (JPG, BMP, PNG…), Audio (WAV, MP3, WMA…)
06/09/2025
1
CONT…
Layer 5 – Session layer

 This layer manages the establishment, maintenance, and termination of

connections (sessions) between applications on different devices, ensuring a


reliable and organized flow of data.

 It is also answerable for the orderly recovery from failures by implementing

appropriate check pointing mechanisms.

 Protocols: SQL, RPC, NETBIOS names…

Layer 4 – Transport layer

 The transport layer manages the delivery and error checking of data packets. It

regulates the size, sequencing, and ultimately the transfer of data between
systems and hosts. It can be either UTP or TCP.

06/09/2025
1
CONT…
 Compare TCP and UDP

TCP (Transmission Control UDP (User Datagram Protocol)


Protocol) Connectionless protocol with low
Connection-oriented protocol overhead and no delivery
ensuring reliable data delivery. guarantee.
 Establishes a connection before  No handshake or guaranteed
data transfer packet order
 Guarantees packet order and  Faster, suitable for real-time
error checking applications
 Used for web browsing, emails,  Used for video streaming,
file transfers gaming, VoIP
Reference 06/09/2025
1
CONT…
Layer 3 – Network layer

 This layer provides logical addresses which routers will use to determine the path to the

destination with a means of the IP addresses which is IPv4/IPv6 (including source &

destination IP addresses). Which is responsible for receiving frames from the data link layer,

and delivering them to their intended destinations among based on the addresses

contained inside the frame.


 Protocols: IP, ICMP, IPX, AppleTalk

Layer 2 – Data Link Layer

 It is responsible for the reliable transfer of data frames from one node to another connected

by the physical layer. It can establishes an error-free communications path between the
network nodes over the physical medium.

 This layer uses Media Access Control (MAC) address, or sometimes Ethernet address,

physical address, adaptor address, hardware address, etc


06/09/2025
1
CONT…
 MAC address is a 48 bits unique physical address which is burned into the NIC

card on the device by its manufacturer.The first 6 digits are the Vendor code,
(003065 belongs to Apple), and the last 6 are the individual interface's own.

 Example: ab-cd-ef-12-34-56 or ab:cd-ef:12:34:56....

 This layer is subdivide into 2 sub-layers: logical link control (LLC) and media

access control (MAC).

The LLC functions include:


 Managing frames to upper and lower layers

 Error Control

 Flow control

 Protocols: LAN, WAN (HDLC, PPP, Frame Relay…), 802.11 (Wi-Fi)


06/09/2025
1
CONT…
Layer 1 – Physical layer

 The lowest layer of the OSI Model is concerned with transmitting individual

bits from one node to another over a physical medium. It manages the
physical relation to the structure with communication and signal
acceptance.

 Devices: Network hubs, cabling, repeaters, network adapters or modems

are resources of physical layer.

 Names of TCP/IP Messages - segment, packet, and frame

06/09/2025
1
CONT…
Physical interface and cabling types

 It refers to the hardware-level components and standards used to connect


networking devices such as routers, switches, and end devices.

 A physical interface is a hardware port on a networking device (like a router or

switch) that allows for the physical connection of cables.


Common types of physical interfaces:

1. Ethernet interfaces (RJ-45 ports): Used for LAN connections

2. Serial interfaces: Used for WAN links (less common now)

3. Fiber-optic interfaces (SFP, SFP+): High-speed connections over longer


distances

4. Console ports: For initial device configuration (usually an RJ-45 to serial cable
or USB) 06/09/2025
2
CONT…
Cabling Types

a. Twisted Pair Cables (Copper)


 UTP (Unshielded Twisted Pair) – Most common in LAN (e.g., Cat5e, Cat6)

 STP (Shielded Twisted Pair) – Used in environments with high interference

Types of Ethernet cables


 Straight-through cable – Connects different device types (e.g., PC to

switch)
 Crossover cable – Connects similar devices (e.g., switch to switch)

 Rollover cable – For console access (Cisco proprietary)

Fiber Optic Cables - These are used with transceivers like SFP, SFP+, and
GBIC
 Single-mode fiber (SMF): Long-distance, narrow core, laser-based
06/09/2025
2
CONT…
Cabling Types

06/09/2025
2
CONT…
Cable Arrangement in Networking
There are two main types of Ethernet cable arrangements (wiring standards) used for
RJ-45 connectors
Pin | Wire Color
1. TIA/EIA-568A Standard ----|-------------
1 | White/Green
2 | Green
3 | White/Orange
4 | Blue
5 | White/Blue
6 | Orange
7 | White/Brown
8 | Brow

Pin | Wire Color


2. TIA/EIA-568B Standard - most widely used
----|-------------
1 | White/Orange
2 | Orange
3 | White/Green
4 | Blue
5 | White/Blue
6 | Green
7 | White/Brown
8 | Brown
06/09/2025
2
INTERFACE AND CABLE ISSUES
Collision, Errors, Mismatch duplex, speed

Collision occurs when two devices transmit data at the same time over a
shared network medium, leading to a data packet clash. Which is common in
half-duplex Ethernet configurations (older hubs, older NICs).
Symptoms

 Slow Network Performance - Packets are retransmitted after a collision,

causing delays.

 Excessive Network Traffic - Collisions cause devices to use backoff

algorithms (like CSMA/CD) to retry, consuming bandwidth.

 Unstable Connection - Devices may repeatedly lose connection if the

collision rate is high.


06/09/2025
2
INTERFACE AND CABLE ISSUES
Collision, Errors, Mismatch duplex, speed

 Error messages - High CRC (Cyclic Redundancy Check) errors and FCS

(Frame Check Sequence) errors in logs and "Network cable unplugged"


warnings or link may goes down which is caused by:
 Incorrect IP Address

 Misconfiguration of DHCP settings or static IP address conflicts.

 The DHCP server or router may be down or not properly connected.

Solved by Full-duplex communication with same speed (preferably auto-


negotiation on modern NICs/switches can eliminates collisions and errors
because both devices can transmit and receive simultaneously.

06/09/2025
2
CONTENTS IN NETWORK FUNDAMENTAL
Network Components with its role and function

Router Switch Firewall Access point


forwards data Connects controls Enables wireless
packets devices within incoming and devices to
between the same outgoing connect to the
different network. network traffic wired network.
networks for security.
06/09/2025
2
CONTENTS IN NETWORK FUNDAMENTAL
Network Components with its role and function

06/09/2025
2
NETWORK COMPONENTS

Network Components

 Router – Connects different networks, routes traffic.

 Cisco 800 and 1941 series, 2911, 2921, 3945, ASR1000 series, ASR1006,

ASR1001-X

Router hardware components

 Power Supply

 CPU

 Memory (RAM , NVRAM ,ROM ,Flash )

 System bus

 Interfaces
06/09/2025
2
CONT…

06/09/2025
2
CONT…
 Router external connections

 Port - normally means one of the management ports used for


administrative access
 Interface normally refers to interfaces that are capable of sending and
receiving user traffic.
 Console port - Most common of the management ports, Used to connect
06/09/2025
3
a terminal,
CONT…
Types of memory in router - four types of memory:

1. Read-Only Memory (ROM): ROM stores the router’s bootstrap startup


program, operating system software, and power-on diagnostic test programs
(POST).

2. Flash Memory: Generally referred to simply as “flash”, the IOS images


are held here. Flash is erasable and reprogrammable ROM. Flash memory
content is retained by the router on reload.

3. Random-Access Memory (RAM): Stores operational information such


as routing tables and the running configuration file. RAM contents are lost
when the router is powered down or reloaded.

4. Non-volatile RAM (NVRAM): NVRAM holds the router’s startup


06/09/2025
3
configuration file. NVRAM contents are not lost when the router is powered
IOS CLI

Network device access methods

1. Directly using the console port


 No configuration needed on the router

2. Telnet – over the network


 Network connection

 Network configuration on both ends (IP address, subnet mask, etc.)

 Telnet password configured on router

3. Modem (AUX.PORT on the router)

4. Web access

06/09/2025
3
IOS CLI

Router> User mode

Router# Privileged mode (Exec mode)

Router(config)# Configuration mode

Router(config-if)# Interface level (within configuration mode)

Router(config-router)# Routing engine level (within configuration mode)

Router(config-line)# Line level (vty, tty, async) within configuration


mode
User mode (Unprivileged mode)
 allows only a limited number of basic monitoring commands.
 not allow any commands that might change the configuration of the router
 The user EXEC mode can be identified by the > prompt.
06/09/2025
3
IOS CLI

Privileged modes
 The privileged EXEC mode provides access to all router commands.

 can be identified by the # prompt

Configuration mode

 Also called the Global Configuration mode, this mode is entered from the

Privileged mode and supplies the complete command set for configuring
the router. In this mode you can access interface level, routing engine
level, line level…

06/09/2025
3
IOS CLI
Interface level

 In some books, this level is also referred as “interface configuration mode” or

“interface mode”. In fact, it is a level inside Configuration mode (or sub-mode of


Configuration mode) so you can see the “configuration” part in its prompt (config-if).
This level can be accessed by typing a specific interface in Configuration mode. For
example:

 Router(config)#interface fa0/0

 Router(config-if)#

 But notice that the prompt doesn’t give you information about which interface is being

configured so be careful with this level while you are configuring! This lack of
information can make you configure wrong interface easily.
Routing engine level
 This is the level where we configure dynamic routing protocols (RIP, OSPF, EIGRP…).
06/09/2025
3
IOS CLI
Line level

 In this level we can configure Telnet, Console, AUX port parameters. Also

notice that the prompt (config-line) is used for all “lines” on the router so
you must be careful about which line you are configuring!

06/09/2025
3
IOS CLI

06/09/2025
3
NETWORK TOPOLOGY ARCHITECTURE

Network topology architecture

 Large networks can be extremely complicated, so the hierarchical network

model provides a modular view of a network, making it easier to design


and build a deterministic scalable infrastructure. Network Architecture is
the design and structure of a computer network. It defines how devices
and services are organized, how they communicate, and how the network
is managed and secured.

Enterprise Network Architecture

 Used in businesses, campuses, and organizations.

 Structured in tiers/layers.

06/09/2025
3
NETWORK TOPOLOGY ARCHITECTURE
The Cisco hierarchical network structure is composed of:
 access - Provides a connection point (access) for end-user devices. Does not forward

 Frames between two other access switches under normal circumstances.

 distribution - Provides an aggregation point for access switches, providing connectivity

 To the rest of the devices in the LAN, forwarding frames between switches, but not

connecting

 Directly to end-user devices.

 core layers -Aggregates distribution switches in very large campus LANs, providing very
high
 Forwarding rates for the larger volume of traffic due to the size of the network.

 Each layer has its own functions, which are used to develop a hierarchical design.

06/09/2025
3
NETWORK TOPOLOGY ARCHITECTURE

06/09/2025
4
NETWORK TOPOLOGY ARCHITECTURE
Two-tier (Spine-Leaf) architecture (Data Center Network
Architecture)

Spine-leaf architecture is a modern network topology widely used in data


centers and cloud environments. It’s designed to offer improved scalability,
high availability, and consistent low-latency communication. Unlike
traditional three-tiered hierarchical networks (core, distribution, access
layers), the spine-leaf architecture consists of only two layers of switches:
spine and leaf switches.

06/09/2025
4
NETWORK TOPOLOGY ARCHITECTURE
 The spine layer consists of switches that perform routing and work as the core of

the network. The leaf layer involves access switches that connect to servers,
storage devices, and other end-users. This structure helps data center networks
reduce hop count, reduce network latency and prevent bottlenecks, which are
main issues of three-tier architecture.

Components of Spine-Leaf Architecture

 The spine-leaf architecture consists of only two layers of switches: spine and leaf

switches.

 Spine Switches: These are high-speed switches that form the backbone of the

architecture. Each spine switch is connected to every leaf switch in the network.
The main function of spine switches is to interconnect the leaf switches and ensure
data can travel between any two leaf switches with low latency.
06/09/2025
4
NETWORK TOPOLOGY ARCHITECTURE
 Leaf Switches: Leaf switches connect directly to the endpoints (servers,

storage devices, routers…) and to every spine switch. Endpoints communicate


with each other via leaf switches, and traffic between endpoints on different
leaf switches passes through one or more spine switches. Leaf switches are
typically deployed at the top of the rack (TOR).

The following rules must be applied to spine-left architecture of each site:


 Each leaf switch must connect to every spine switch.

 Each spine switch must connect to every leaf switch.

 Leaf switches cannot connect to each other.

 Spine switches cannot connect to each other.

 Endpoints connect only to the leaf switches.


06/09/2025
4
NETWORK TOPOLOGY ARCHITECTURE
Benefits of Spine-Leaf Architecture

 To overcome short come of 3-tier (traditional networks) is Bandwidth

oversubscription / bandwidth hungry over time.

 Scalability: Since each leaf switch connects to every spine switch, adding more

leaf switches (and thus more endpoints) doesn’t affect the performance. More
spine switches can be added to increase bandwidth and support higher loads.

 Predictable Latency: The architecture is non-blocking, meaning that every

packet between any two endpoints takes the same number of hops (usually two
hops: from leaf to spine, and back to leaf), so latency is lower and predictable.

 High Availability: The full mesh connectivity between leaf and spine ensures

redundancy. If one spine switch fails, traffic can still be routed through other spine
switches.
06/09/2025
4
NETWORK TOPOLOGY ARCHITECTURE

Benefits of Spine-Leaf Architecture

 Efficient Use of Bandwidth: The architecture uses Layer 3 routing such

as equal-cost multipath (ECMP) routing so STP is no longer required,


allowing multiple paths for traffic to be used simultaneously, balancing the
load and preventing bottlenecks.

06/09/2025
4
NETWORK TOPOLOGY ARCHITECTURE
ACI is SDN (software defined networking), controller based, agile, highly
programmable.

 Is two-tier spine-leaf architecture.

 Policy driven-infrastructure.

 Every leaf connects to every spine.

 Leaf switches are the attachment point for all servers.

 Optimize east-west traffic forwarding.

 It is implemented on cisco Nexus 9K products.

06/09/2025
4
NETWORK TOPOLOGY ARCHITECTURE
How can we manage ACI datacenter?

APIC (cisco application policy infrastructure controller) - the brain and central
management point of the entire fabric.

 It is the server

 A set of 3 specialized servers that are connects to leaf switches that provide

management, policy programming, application deployment, Health monitoring


for an ACI fabric.
Why ACI
 security

 Topology (spine-leaf or two tier) without STP.

 Has simplified/centralized management through APIC

06/09/2025
4
NETWORK TOPOLOGY ARCHITECTURE
ACI Datacenter types

06/09/2025
4
NETWORK TOPOLOGY ARCHITECTURE
ACI Datacenter types
Multi-pod fabric is managed by a single APIC cluster.

06/09/2025
4
CONT…
The multi-site design is yet another design that covers multiple separate
sites. Each fabric has its own APIC cluster.

06/09/2025
5
CON….
Categories of Leafs swishes

 Border leafs switches - provide layer 2 and layer 3 connectivity between

ACI fabric and outside the world.

 Service leaf switches - connect to Layer 4–7 services appliances, such

as -and load balancers.

 Compute leaf switches - are ACI leaf switches that connect to servers.

 IP storage leaf switches - are ACI leaf switches that connect to IP

storage systems.

 Transit leaf switches - is a leaf switch that provides connectivity between

two sites in a stretched fabric design and are connect to spine switches in
both sites. 06/09/2025
5
CONT…

Other network architectures

Cloud Network Architecture

 Hosted by providers like AWS, Azure, GCP.

 Uses virtualized resources and software-defined networking (SDN).

 Focuses on scalability and multi-region redundancy.

Software-Defined Network (SDN) Architecture

 Separates the control plane (logic) from the data plane (forwarding).

 Uses a central controller (like Cisco DNA Center or OpenDaylight).

 Makes networks more programmable and flexible.


06/09/2025
5

You might also like