SlideShare ist ein Scribd-Unternehmen logo
1 von 38
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
www.professordkinney.com
Building A Simple network
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Objectives
 Describe how networking works
 Host-to-host communication
 Introducing LANs
 Understanding Ethernet and Switch
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Structure
Define a network
data or information networks capable of carrying many
different types of communications
Define the components of a network
– Network components
• hardware
• software
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Structure
End Devices and their Role in the Network
– End devices form interface with human network &
communications network
– Role of end devices:
• client
• server
• both client and server
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Structure
Identify the role of an intermediary device in a data
network and be able to contrast that role with the role
of an end device
– Role of an intermediary device
• provides connectivity and ensures data flows
across network
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Structure
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Define Local Area Networks (LANs)
- A network serving a home, building or campus is
considered a Local Area Network (LAN)
Network Structure
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Define Wide Area Networks (WANs)
- LANs separated by geographic distance are connected
by a network known as a Wide Area Network (WAN)
Host-to-Host Communications
Host-to-host communications requires a consistent
model. The model addresses hardware, software, and
data transmission
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Host-to-Host Communications
The OSI reference model provides a means of
describing how data is transmitted over a network.
The model addresses hardware, software, and data
transmission.
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Host-to-Host Communications
Peer-to-Peer Communication
So that data packets can travel from the source to the
destination, each layer of the OSI model at the source must
communicate with its peer layer at the destination. This topic
describes the process of peer-to-peer communication.
During the process of peer-to-peer communication, the
protocols at each layer exchange packets of information called
protocol data units (PDUs) between peer layers.
These data packets originate at a source on a network and then
travel to a destination. Each layer depends on the OSI layer
below it to provide a service. To perform its service function, the
lower layer uses encapsulation to put the protocol data unit
(PDU) from the upper layer into lower layer data field. Each
layer then adds whatever headers the layer needs to perform its
function. As the data moves down from Layer 7 through Layer 2
of the OSI model, additional headers are added.
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Host-to-Host Communications
The network layer provides a service to the transport layer,
and the transport layer presents data to the network
subsystem. The network layer moves the data through the
Internet by encapsulating the data and attaching a header
to create a packet (the Layer 3 PDU). The header contains
information required to complete the transfer, such as
source and destination logical addresses.
The data link layer provides a service to the network layer
by encapsulating the network layer packet in a frame (the
Layer 2 PDU). The frame header contains the physical
addresses required to complete the data link functions,
and the frame trailer contains the FCS.
The physical layer provides a service to the data link layer,
encoding the data-link frame into a pattern of 1s and 0s
(bits) for transmission on the medium (usually a wire) at
Layer 1.
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Host-to-Host Communications
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Ethernet
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
OSI model layers 1 (physical) and 2 (data link)
TCP/IP model Network Access layer
Application
Presentation
Session
Transport
Network
Data link
Physical
Ethernet
Application
Transport
Internet
Network Access
Ethernet
The most common LAN technology
Different media (copper cable, optical fibre)
Different bandwidths (10, 100Mbps, Gbps, +)
Same addressing scheme
Same basic frame format
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Ethernet history
First LAN was Ethernet, designed at Xerox
1980 Ethernet standard published by DIX (Digital, Intel, Xerox)
1985 IEEE modified Ethernet standard and published as 802.3
Ethernet802.3
802.2MAC
LLC
Advantages of Ethernet
Simplicity and ease of maintenance
Ability to incorporate new technologies (e.g. fibre
optic, higher bandwidths)
Reliability
Low cost of installation and upgrade
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Ethernet Frame
Packet
Packet TrailerFrame header
Packet from
Network layer is
encapsulated
Preamble Destination
address
Start of
frame
delimiter
Source
address
Length
/type
7 1 6 6 2
Packet
Data
Frame
Check
Seq.
46-1500 4
Field size in bytes. Preamble and SFD are not counted in
frame size. Frame is 64-1518 (later 1522) bytes.
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Hub and Switch
Shared medium
Shared bandwidth
Collisions
Point to point links
Dedicated bandwidth
Use full duplex – no collisions
Hub
Switch
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Switching table
Switch builds a switching table
matching its port numbers to the
MAC addresses of devices connected
to them.
When a frame arrives, it reads the
destination MAC address, looks it
up in the table, finds the right port
and forwards the frame.
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Flooding
If the switch does not find the destination address in
its table then it floods the frame through all ports
except the incoming port.
Broadcast messages are flooded.
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Learning addresses
The switch learns addresses by looking at the source
MAC address of an incoming frame.
It then matches the address to the port where the
frame came in and puts the information in its table.
Entries are time stamped and removed from the table
when the time runs out.
They can be refreshed when another frame comes in
from the same host.
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
ARP table
A host wants to send a message.
It knows the destination IP address and puts it in the
packet header.
It looks in its ARP table and finds the corresponding
MAC address.
It puts the MAC address in the frame header.
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Internetwork Operating System
Most Cisco devices use the Cisco IOS.
Details vary with the device and feature set.
Normal access through a command line.
Stored in flash memory and can be upgraded.
Usually copied into RAM when the device is powered
on, and run from RAM.
Router prompts
User EXEC mode
Privileged EXEC mode
Global Configuration mode
Specific Configuration modes
Router>
Router#
Router(config)#
Router(config-if)#
and others
EXEC modes
You log in to User EXEC mode
Router>
You can give basic monitoring commands but cannot
change the configuration
Enter enable to go to Privileged EXEC mode
Router#
Password may be used for security
You can give more commands and can go to
configuration modes
Configuration modes
Start in privileged EXEC mode and enter the
configure terminal (config t) command
Router# config t
Router(config)#
The prompt changes
This is global configuration mode
Additional commands take you to interface
configuration, router configuration etc.
Console password
Paris(config)#line con 0
Paris(config-line)#password cisco
Paris(config-line)#login
Paris(config-line)#exit
Restricts access via the console
Use cisco as the password in labs.
Use a proper strong password on production
networks
Vty password for Telnet
Paris(config)#line vty 0 4
Paris(config-line)#password cisco
Paris(config-line)#login
Paris(config-line)#exit
Allows and restricts access via 5 vty lines
Use cisco as the password in labs.
Use a proper strong, different password on
production networks
Enable and enable secret
Paris(config)#enable secret class
The password class is needed when you type enable
to enter privileged exec mode
This password is encrypted
Paris(config)#enable password cisco
Not encrypted, used on older routers
If you configure both, then only the enable secret is
used.
Back up to TFTP server
Start TFTP server software on host
Paris#copy running-config tftp
Remote host []? 172.16.1.1
Name of configuration file to write [Paris-config]?
Paris12Oct07
Write file Paris12Oct07 to 172.16.1.1? [confirm] y
Writing Paris12Oct07 ! ! ! ! ! ! [OK]
Erase startup configuration
Paris#erase NVRAM:startup-config
Paris#erase startup-config
Paris#erase start
If you reload, then the router starts up with the
default configuration. No passwords, no IP addresses
etc.
Caution if you get this command wrong then you
could erase something else, e.g. IOS
Restore file from TFTP server
Router#copy tftp running-config
You will be prompted for IP address and file name.
Configuration is copied into RAM and takes effect at
once.
Save to NVRAM.
Configure a router interface
Paris(config)#interface FastEthernet 0/0
Paris(config-if)#ip address 172.16.1.1 255.255.0.0
Paris(config-if)#no shutdown
Paris(config-if)#exit
Interface names vary, depending on whether the
router is modular and on the bandwidth.
E.g. interface Ethernet 0 on an older router
Configure a router interface
Paris(config)#interface serial 0/0
Paris(config-if)#ip address 192.168.4.1 255.255.255.0
(Paris(config-if)#clock rate 64000)
Paris(config-if)#no shutdown
Paris(config-if)#exit DCE only
Switch IP address
The switch IP address goes on a virtual interface, not
a real one, normally VLAN1.
SwA(config)#interface VLAN1
SwA(config-if)#ip address 172.16.255.1 255.255.0.0
SwA(config-if)#no shutdown
SwA(config-if)#exit
Interface – show commands
show interfaces states whether up or down, gives
some protocol information and statistics about
interface use.
show ip interface gives IP addresses and much
more.
show ip interface brief gives summary of IP
addresses and whether up/down. Very useful
command.
Summary
Network communications using peer to peer hos
communication example.
Explains how LAN works .
Ethernet and switch how it works.
Cisco IOS commands.
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group

Weitere ähnliche Inhalte

Was ist angesagt?

TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Modelfarhan516
 
Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layerSerious_SamSoul
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and ProtocolsSachii Dosti
 
Networking Ethernet
Networking EthernetNetworking Ethernet
Networking EthernetSSG1631
 
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyNetworrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyAvishek Maitra
 
Networking Basics
Networking BasicsNetworking Basics
Networking BasicsCarlo Fonda
 
TCP/IP Training Basic Concepts.
TCP/IP Training Basic Concepts.TCP/IP Training Basic Concepts.
TCP/IP Training Basic Concepts.Amir Panahi
 
Network infrastructure - TCP/IP
Network infrastructure - TCP/IPNetwork infrastructure - TCP/IP
Network infrastructure - TCP/IPraymondkao
 
Presentation 4 for students of professordkinney.com
Presentation 4 for students of professordkinney.comPresentation 4 for students of professordkinney.com
Presentation 4 for students of professordkinney.comArnold Derrick Kinney
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )AAKASH S
 
wired lans
wired lanswired lans
wired lanshoadqbk
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)Tutun Juhana
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IPMannu Khani
 

Was ist angesagt? (20)

TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
 
Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layer
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
 
Tcpip tutorial
Tcpip tutorialTcpip tutorial
Tcpip tutorial
 
Networking Ethernet
Networking EthernetNetworking Ethernet
Networking Ethernet
 
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyNetworrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
TCP/IP Training Basic Concepts.
TCP/IP Training Basic Concepts.TCP/IP Training Basic Concepts.
TCP/IP Training Basic Concepts.
 
CCNA
CCNACCNA
CCNA
 
Network infrastructure - TCP/IP
Network infrastructure - TCP/IPNetwork infrastructure - TCP/IP
Network infrastructure - TCP/IP
 
Presentation 4 for students of professordkinney.com
Presentation 4 for students of professordkinney.comPresentation 4 for students of professordkinney.com
Presentation 4 for students of professordkinney.com
 
Ethernet
EthernetEthernet
Ethernet
 
Iap final
Iap finalIap final
Iap final
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
 
1834902097 class note 3
1834902097 class note 31834902097 class note 3
1834902097 class note 3
 
wired lans
wired lanswired lans
wired lans
 
Mohanccna
MohanccnaMohanccna
Mohanccna
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IP
 

Andere mochten auch

Computer networking short_questions_and_answers
Computer networking short_questions_and_answersComputer networking short_questions_and_answers
Computer networking short_questions_and_answersTarun Thakur
 
MikroTik Basic Training Class - Online Moduls - English
 MikroTik Basic Training Class - Online Moduls - English MikroTik Basic Training Class - Online Moduls - English
MikroTik Basic Training Class - Online Moduls - EnglishAdhie Lesmana
 
similarity measure
similarity measure similarity measure
similarity measure ZHAO Sam
 
MICAI 2013 Tutorial Slides - Measuring the Similarity and Relatedness of Conc...
MICAI 2013 Tutorial Slides - Measuring the Similarity and Relatedness of Conc...MICAI 2013 Tutorial Slides - Measuring the Similarity and Relatedness of Conc...
MICAI 2013 Tutorial Slides - Measuring the Similarity and Relatedness of Conc...University of Minnesota, Duluth
 
Day 5.3 configuration of router
Day 5.3 configuration of routerDay 5.3 configuration of router
Day 5.3 configuration of routerCYBERINTELLIGENTS
 
Router configuration
Router configurationRouter configuration
Router configuration97148881557
 
Teacher management system guide
Teacher management system guideTeacher management system guide
Teacher management system guidenicolasmunozvera
 
Day 25 cisco ios router configuration
Day 25 cisco ios router configurationDay 25 cisco ios router configuration
Day 25 cisco ios router configurationCYBERINTELLIGENTS
 
Cisco router command configuration overview
Cisco router command configuration overviewCisco router command configuration overview
Cisco router command configuration overview3Anetwork com
 
Router configuration in packet tracer
Router configuration in packet  tracerRouter configuration in packet  tracer
Router configuration in packet tracerAnabia Anabia
 
3 Router Configuration - Cisco Packet Tracer
3 Router Configuration - Cisco Packet Tracer 3 Router Configuration - Cisco Packet Tracer
3 Router Configuration - Cisco Packet Tracer Rajan Kasodariya
 
Initial Configuration of Router
Initial Configuration of RouterInitial Configuration of Router
Initial Configuration of RouterKishore Kumar
 

Andere mochten auch (19)

Redes cisco
Redes ciscoRedes cisco
Redes cisco
 
College Network
College NetworkCollege Network
College Network
 
Computer networking short_questions_and_answers
Computer networking short_questions_and_answersComputer networking short_questions_and_answers
Computer networking short_questions_and_answers
 
E s switch_v6_ch01
E s switch_v6_ch01E s switch_v6_ch01
E s switch_v6_ch01
 
MikroTik Basic Training Class - Online Moduls - English
 MikroTik Basic Training Class - Online Moduls - English MikroTik Basic Training Class - Online Moduls - English
MikroTik Basic Training Class - Online Moduls - English
 
Day 11 eigrp
Day 11 eigrpDay 11 eigrp
Day 11 eigrp
 
similarity measure
similarity measure similarity measure
similarity measure
 
MICAI 2013 Tutorial Slides - Measuring the Similarity and Relatedness of Conc...
MICAI 2013 Tutorial Slides - Measuring the Similarity and Relatedness of Conc...MICAI 2013 Tutorial Slides - Measuring the Similarity and Relatedness of Conc...
MICAI 2013 Tutorial Slides - Measuring the Similarity and Relatedness of Conc...
 
Day 5.3 configuration of router
Day 5.3 configuration of routerDay 5.3 configuration of router
Day 5.3 configuration of router
 
Router configuration
Router configurationRouter configuration
Router configuration
 
Ir 08
Ir   08Ir   08
Ir 08
 
Teacher management system guide
Teacher management system guideTeacher management system guide
Teacher management system guide
 
Day 25 cisco ios router configuration
Day 25 cisco ios router configurationDay 25 cisco ios router configuration
Day 25 cisco ios router configuration
 
Cisco router command configuration overview
Cisco router command configuration overviewCisco router command configuration overview
Cisco router command configuration overview
 
Troubleshooting basic networks
Troubleshooting basic networksTroubleshooting basic networks
Troubleshooting basic networks
 
Router configuration in packet tracer
Router configuration in packet  tracerRouter configuration in packet  tracer
Router configuration in packet tracer
 
3 Router Configuration - Cisco Packet Tracer
3 Router Configuration - Cisco Packet Tracer 3 Router Configuration - Cisco Packet Tracer
3 Router Configuration - Cisco Packet Tracer
 
10 More Quotes for Entrepreneurs
10 More Quotes for Entrepreneurs10 More Quotes for Entrepreneurs
10 More Quotes for Entrepreneurs
 
Initial Configuration of Router
Initial Configuration of RouterInitial Configuration of Router
Initial Configuration of Router
 

Ähnlich wie Lesson 1 slideshow

pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxzeyadosama505
 
Emmanuel impraim computer networks
Emmanuel impraim computer networksEmmanuel impraim computer networks
Emmanuel impraim computer networksEmmanuelImpraim1
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfskknowledge
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxgadisaAdamu
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networkingisma ishak
 
OSI model (7 layer )
OSI model (7 layer ) OSI model (7 layer )
OSI model (7 layer ) dimuthu22
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2Sohail Gohir
 
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdfNguynTy5
 
640 802-study-guide-sample
640 802-study-guide-sample640 802-study-guide-sample
640 802-study-guide-samplerickybcool
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesVamsi Krishna Kalavala
 

Ähnlich wie Lesson 1 slideshow (20)

pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Emmanuel impraim computer networks
Emmanuel impraim computer networksEmmanuel impraim computer networks
Emmanuel impraim computer networks
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 
OSI model (7 layer )
OSI model (7 layer ) OSI model (7 layer )
OSI model (7 layer )
 
layering.ppt
layering.pptlayering.ppt
layering.ppt
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2
 
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
 
Osi model
Osi modelOsi model
Osi model
 
OSI TCP.pptx
OSI TCP.pptxOSI TCP.pptx
OSI TCP.pptx
 
640 802-study-guide-sample
640 802-study-guide-sample640 802-study-guide-sample
640 802-study-guide-sample
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 

Mehr von Arnold Derrick Kinney (15)

Windows 7 configuration
Windows 7 configurationWindows 7 configuration
Windows 7 configuration
 
Network device management
Network device managementNetwork device management
Network device management
 
Implementing a scalable ospf based solution
Implementing a scalable ospf based solutionImplementing a scalable ospf based solution
Implementing a scalable ospf based solution
 
Implementing an EGIRP Based Solution
Implementing an EGIRP Based SolutionImplementing an EGIRP Based Solution
Implementing an EGIRP Based Solution
 
Wan networks
Wan networksWan networks
Wan networks
 
Building a medium sized network
Building a medium sized networkBuilding a medium sized network
Building a medium sized network
 
Vlan configuration in medium sized network
Vlan configuration in medium sized networkVlan configuration in medium sized network
Vlan configuration in medium sized network
 
Basics of unix
Basics of unixBasics of unix
Basics of unix
 
IPV6
IPV6 IPV6
IPV6
 
Managing Network Device Security
Managing Network Device SecurityManaging Network Device Security
Managing Network Device Security
 
Mastering Binary For IPV4
Mastering Binary For IPV4Mastering Binary For IPV4
Mastering Binary For IPV4
 
Cisco data center
Cisco data centerCisco data center
Cisco data center
 
Ccnp route
Ccnp routeCcnp route
Ccnp route
 
Presentation 3 for Students of professordkinney.com
Presentation 3 for Students of professordkinney.comPresentation 3 for Students of professordkinney.com
Presentation 3 for Students of professordkinney.com
 
Lesson 2 slideshow
Lesson 2 slideshowLesson 2 slideshow
Lesson 2 slideshow
 

Kürzlich hochgeladen

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Kürzlich hochgeladen (20)

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Lesson 1 slideshow

  • 1. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 www.professordkinney.com
  • 2. Building A Simple network 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 3. Objectives  Describe how networking works  Host-to-host communication  Introducing LANs  Understanding Ethernet and Switch 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 4. Network Structure Define a network data or information networks capable of carrying many different types of communications Define the components of a network – Network components • hardware • software 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 5. Network Structure End Devices and their Role in the Network – End devices form interface with human network & communications network – Role of end devices: • client • server • both client and server 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 6. Network Structure Identify the role of an intermediary device in a data network and be able to contrast that role with the role of an end device – Role of an intermediary device • provides connectivity and ensures data flows across network 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 7. Network Structure 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group Define Local Area Networks (LANs) - A network serving a home, building or campus is considered a Local Area Network (LAN)
  • 8. Network Structure 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group Define Wide Area Networks (WANs) - LANs separated by geographic distance are connected by a network known as a Wide Area Network (WAN)
  • 9. Host-to-Host Communications Host-to-host communications requires a consistent model. The model addresses hardware, software, and data transmission 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 10. Host-to-Host Communications The OSI reference model provides a means of describing how data is transmitted over a network. The model addresses hardware, software, and data transmission. 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 11. Host-to-Host Communications Peer-to-Peer Communication So that data packets can travel from the source to the destination, each layer of the OSI model at the source must communicate with its peer layer at the destination. This topic describes the process of peer-to-peer communication. During the process of peer-to-peer communication, the protocols at each layer exchange packets of information called protocol data units (PDUs) between peer layers. These data packets originate at a source on a network and then travel to a destination. Each layer depends on the OSI layer below it to provide a service. To perform its service function, the lower layer uses encapsulation to put the protocol data unit (PDU) from the upper layer into lower layer data field. Each layer then adds whatever headers the layer needs to perform its function. As the data moves down from Layer 7 through Layer 2 of the OSI model, additional headers are added. 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 12. Host-to-Host Communications The network layer provides a service to the transport layer, and the transport layer presents data to the network subsystem. The network layer moves the data through the Internet by encapsulating the data and attaching a header to create a packet (the Layer 3 PDU). The header contains information required to complete the transfer, such as source and destination logical addresses. The data link layer provides a service to the network layer by encapsulating the network layer packet in a frame (the Layer 2 PDU). The frame header contains the physical addresses required to complete the data link functions, and the frame trailer contains the FCS. The physical layer provides a service to the data link layer, encoding the data-link frame into a pattern of 1s and 0s (bits) for transmission on the medium (usually a wire) at Layer 1. 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 14. Ethernet 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group OSI model layers 1 (physical) and 2 (data link) TCP/IP model Network Access layer Application Presentation Session Transport Network Data link Physical Ethernet Application Transport Internet Network Access
  • 15. Ethernet The most common LAN technology Different media (copper cable, optical fibre) Different bandwidths (10, 100Mbps, Gbps, +) Same addressing scheme Same basic frame format 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 16. Ethernet history First LAN was Ethernet, designed at Xerox 1980 Ethernet standard published by DIX (Digital, Intel, Xerox) 1985 IEEE modified Ethernet standard and published as 802.3 Ethernet802.3 802.2MAC LLC
  • 17. Advantages of Ethernet Simplicity and ease of maintenance Ability to incorporate new technologies (e.g. fibre optic, higher bandwidths) Reliability Low cost of installation and upgrade 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 18. Ethernet Frame Packet Packet TrailerFrame header Packet from Network layer is encapsulated Preamble Destination address Start of frame delimiter Source address Length /type 7 1 6 6 2 Packet Data Frame Check Seq. 46-1500 4 Field size in bytes. Preamble and SFD are not counted in frame size. Frame is 64-1518 (later 1522) bytes. 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 19. Hub and Switch Shared medium Shared bandwidth Collisions Point to point links Dedicated bandwidth Use full duplex – no collisions Hub Switch 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 20. Switching table Switch builds a switching table matching its port numbers to the MAC addresses of devices connected to them. When a frame arrives, it reads the destination MAC address, looks it up in the table, finds the right port and forwards the frame. 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 21. Flooding If the switch does not find the destination address in its table then it floods the frame through all ports except the incoming port. Broadcast messages are flooded. 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 22. Learning addresses The switch learns addresses by looking at the source MAC address of an incoming frame. It then matches the address to the port where the frame came in and puts the information in its table. Entries are time stamped and removed from the table when the time runs out. They can be refreshed when another frame comes in from the same host. 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 23. ARP table A host wants to send a message. It knows the destination IP address and puts it in the packet header. It looks in its ARP table and finds the corresponding MAC address. It puts the MAC address in the frame header. 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 24. Internetwork Operating System Most Cisco devices use the Cisco IOS. Details vary with the device and feature set. Normal access through a command line. Stored in flash memory and can be upgraded. Usually copied into RAM when the device is powered on, and run from RAM.
  • 25. Router prompts User EXEC mode Privileged EXEC mode Global Configuration mode Specific Configuration modes Router> Router# Router(config)# Router(config-if)# and others
  • 26. EXEC modes You log in to User EXEC mode Router> You can give basic monitoring commands but cannot change the configuration Enter enable to go to Privileged EXEC mode Router# Password may be used for security You can give more commands and can go to configuration modes
  • 27. Configuration modes Start in privileged EXEC mode and enter the configure terminal (config t) command Router# config t Router(config)# The prompt changes This is global configuration mode Additional commands take you to interface configuration, router configuration etc.
  • 28. Console password Paris(config)#line con 0 Paris(config-line)#password cisco Paris(config-line)#login Paris(config-line)#exit Restricts access via the console Use cisco as the password in labs. Use a proper strong password on production networks
  • 29. Vty password for Telnet Paris(config)#line vty 0 4 Paris(config-line)#password cisco Paris(config-line)#login Paris(config-line)#exit Allows and restricts access via 5 vty lines Use cisco as the password in labs. Use a proper strong, different password on production networks
  • 30. Enable and enable secret Paris(config)#enable secret class The password class is needed when you type enable to enter privileged exec mode This password is encrypted Paris(config)#enable password cisco Not encrypted, used on older routers If you configure both, then only the enable secret is used.
  • 31. Back up to TFTP server Start TFTP server software on host Paris#copy running-config tftp Remote host []? 172.16.1.1 Name of configuration file to write [Paris-config]? Paris12Oct07 Write file Paris12Oct07 to 172.16.1.1? [confirm] y Writing Paris12Oct07 ! ! ! ! ! ! [OK]
  • 32. Erase startup configuration Paris#erase NVRAM:startup-config Paris#erase startup-config Paris#erase start If you reload, then the router starts up with the default configuration. No passwords, no IP addresses etc. Caution if you get this command wrong then you could erase something else, e.g. IOS
  • 33. Restore file from TFTP server Router#copy tftp running-config You will be prompted for IP address and file name. Configuration is copied into RAM and takes effect at once. Save to NVRAM.
  • 34. Configure a router interface Paris(config)#interface FastEthernet 0/0 Paris(config-if)#ip address 172.16.1.1 255.255.0.0 Paris(config-if)#no shutdown Paris(config-if)#exit Interface names vary, depending on whether the router is modular and on the bandwidth. E.g. interface Ethernet 0 on an older router
  • 35. Configure a router interface Paris(config)#interface serial 0/0 Paris(config-if)#ip address 192.168.4.1 255.255.255.0 (Paris(config-if)#clock rate 64000) Paris(config-if)#no shutdown Paris(config-if)#exit DCE only
  • 36. Switch IP address The switch IP address goes on a virtual interface, not a real one, normally VLAN1. SwA(config)#interface VLAN1 SwA(config-if)#ip address 172.16.255.1 255.255.0.0 SwA(config-if)#no shutdown SwA(config-if)#exit
  • 37. Interface – show commands show interfaces states whether up or down, gives some protocol information and statistics about interface use. show ip interface gives IP addresses and much more. show ip interface brief gives summary of IP addresses and whether up/down. Very useful command.
  • 38. Summary Network communications using peer to peer hos communication example. Explains how LAN works . Ethernet and switch how it works. Cisco IOS commands. 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group