SlideShare ist ein Scribd-Unternehmen logo
1 von 55
COMPUTER NETWORKS-
ROUTING & SWITCHING
[CCNA]
COMPANY PROFILE: TCIT-IT
 Telecommunications Consultants India Ltd (TCIL) is a leading ISO - 9001:2000 certified public sector
undertaking.
 TCIL, a premier telecommunication consultancy and engineering company with a strong base in
Telecommunication & Information Technology (IT).
 It was incorporated in 1978 by Department of Telecommunications (DOT), Government of India under
the aegis of Ministry of Communications, headed by Minister of Communications and Information
Technology.
 The Organizational Structure is formed with the objectives of providing globally world-class technology
and Indian expertise in all fields of Telecommunications and to provide total Quality management &
excellence in project execution.
 TCIL-IT is managed by ICSIL (Intelligent Communication Systems India Ltd.), a Joint Venture of TCIL
(Telecommunication Consultants India Ltd), a Govt. of India Enterprise and DSIIDC (Delhi State Industrial
Infrastructure Development Corporation Ltd).
 TCIL-IT has tie-up with many government agencies to impart computer education for career advancement.
 There are a number of PSUs under DoT. TCIL is one of them. Some other major companies are
1. Bharat Sanchar Nigam Limited (BSNL)
2. Mahanagar Telephone Nigam Limited (MTNL)
3. ITI Limited
 TCIL has its presence in almost 45 Countries mainly in Middle East Africa, South-East Africa, South-East Asia
Asia and Europe.
COMPUTER NETWORKS
Computer network : A collection of computing devices that are connected in various ways in
order to communicate and share resources.
Usually, the connections between computers in a network are made using physical wires or
cables. However, some connections are wireless, using radio waves or infrared signals.
The purpose of a network is to share resources-
A resource may be:
-A file
-A folder
-A printer
-A disk drive
-Or just about anything else that exists on a computer.
1. Network design
 a. Peer-to-peer
 b. Server/Client
2. Area network
 PAN(Personal Area Network)
 LAN(Local area network)
 W-LAN(Wireless LAN)
 CAN(Campus Area network)
 SAN(Storage data area network)
 GAN(Global area network)
Components of Networks
Network topology
 Star Topology:
 Ring Topology
 Mesh Topology
 Tree Topology
 Hybrid Topology
3.3.iv. Network Protocols
3.3.v. Wired and wireless
1. Network Design
Peer-to-Peer:
 a peer-to-peer or P2P network, the tasks are allocated among all the members of the network.
There is no real hierarchy among the computers, and all of them are considered equal. This is
also referred to as a distributed architecture or workgroup without hierarchy.
 A peer-to-peer network does not use a central computer server that controls network activity.
Instead, every computer on the network has a special software running that allows for
communications between all the computers.
Server – Client:
 In a client/server network, a number of network clients or workstations request resources or
services from the network. One or more network servers manage and provide these
or services.
 The clients are computers that depends on the server for data and software. Network
are also referred to as computer servers or simply servers. Sometimes a server is described in
terms of the specific service it provides, such as e-mail server, print server or storage server.
2. Types of Networking
1. LAN – It stands for local area network.
Location:
In a building or individual rooms or floors of buildings or connecting nearby buildings together like a
campus wide network like a college or university.
2. MAN – It stands for metropolitan area network.
Location:
network connecting various cities.
3. WAN – It stands for wide area network. This communication system links LANs between cities, countries
and continents. The main difference between a MAN and a WAN is that the WAN uses Long Distance
Carriers rather than Local Exchange carriers.
Location:
City to city, across a country or across a continent. Wide Area Networks (WANs) connect LANs together
between cities or across a country.
3. Network Topology
 a) BUS Topology: All the nodes (file server, workstations, and peripherals) on a bus topology are
connected by one single cable.
Advantages of Bus Topology
• It is Cheap, easy to handle and implement.
• Require less cable
• It is best suited for small networks.
 Disadvantages of Bus Topology
• The cable length is limited. This limits the number of stations that can be connected.
• This network topology can perform well only for a limited number of nodes.
b) RING Topology
• In a ring network, every device has exactly two neighbors for communication purposes.
• All messages travel through a ring in the same direction.
• A failure in any cable or device breaks the loop and can take down the entire network.
 Advantage of Ring Topology
• Very orderly network where every device has access to the token and the opportunity to transmit.
• Easier to Manage than a Bus Network.
• Good Communication over long distances.
• Handles high volume of traffic.
 Disadvantages of Ring Topology
• The failure of a single node of the network can cause the entire network to fail.
• The movement or changes made to network nodes affects the performance of the entire network.
c) STAR Topology
• In a star network, each node (file server, workstations, and peripherals) is connected to a central
called a hub.
• The hub takes a signal that comes from any node and passes it along to all the other nodes in the
network.
• Data on a star network passes through the hub, switch, or concentrator before continuing to its
destination.
 Advantages of Star Topology
• Easy to manage
• Easy to locate problems (cable/workstations)
• Easier to expand than a bus or ring topology.
• Easy to install and wire.
• Easy to detect faults and to remove parts.
 Disadvantages of Star Topology
• Requires more cable length than a linear topology.
• If the hub or concentrator fails, nodes attached are disabled.
• More expensive because of the cost of the concentrators.
d) TREE Topology
• A tree topology (hierarchical topology) can be viewed as a collection of star networks arranged in a
hierarchy.
• This tree has individual peripheral nodes which are required to transmit to and receive from one other
only and are not required to act as repeaters or regenerators
 Advantages of a Tree Topology
• Point-to-point wiring for individual segments.
• Supported by several hardware and software vendors.
• All the computers have access to the larger and their immediate networks.
 Disadvantages of a Tree Topology
• Overall length of each segment is limited by the type of cabling used.
• If the backbone line breaks, the entire segment goes down.
• More difficult to configure and wire than other topologies.
e) MESH Topology
• In this topology, each node is connected to every other node in the network.
• Implementing the mesh topology is expensive and difficult.
• In this type of network, each node may send message to destination through multiple paths.
Advantage of Mesh Topology
• No traffic problem as there are dedicated links.
• It has multiple links, so if one route is blocked then other routes can be used for data
communication.
• Points to point links make fault identification easy.
Disadvantage of Mesh Topology
• There is mesh of wiring which can be difficult to manage.
• Installation is complex as each node is connected to every node.
• Cabling cost is high.
f) HYBRID Topology
• A combination of any two or more network topologies.
• A hybrid topology always accrues when two different basic network topologies are connected.
• It is a mixture of above mentioned topologies. Usually, a central computer is attached with sub-
controllers which in turn participate in a variety of topologies.
 Advantages of a Hybrid Topology
• It is extremely flexible.
• It is very reliable.
 Disadvantages of a Hybrid Topology
• Expensive
NETWORKING DEVICES
 HUB
The hubs used on UTP Ethernet networks are repeaters as well, but they can have many RJ45 ports
instead of just two BNC connectors. When data enters the hub through any of its ports, the hub
amplifies the signal and transmits it out through all of the other ports.
 BRIDGES
A bridge is used to join two network segments together, it allows computers on
either segment to access resources on the other. They can also be used to
divide large networks into smaller segments.
 ROUTERS
Routers are networking devices used to extend or segment networks by forwarding packets from
one logical network to another. Routers are most often used in large internetworks that use the
TCP/IP protocol suite and for connecting TCP/IP hosts and local area networks (LANs) to the Internet
using dedicated leased lines.
 BROUTERS
Brouters are a combination of router and bridge. This is a special type of equipment
for networks that can be either bridged or routed, based on the protocols being
forwarded. Brouters are complex, fairly expensive pieces of equipment and
such are rarely used.
 NICs (Network Interface Card)
Network Interface Card, or NIC is a hardware card installed in a computer
can communicate on a network.
 WAPs (Wireless Access Point)
Access points act as wireless hubs to link multiple wireless NICs into a single
subnet. Access points also have at least one fixed to allow the wireless
network to be bridged to a traditional wired Ethernet network.
►MODEMS
A modem is a device that makes it possible for computers communicate over
telephone lines. The word modem comes from Modulate and Demodulate.
 SWITCHES
Switches are a special type of hub that offers an additional
of intelligence to basic, physical-layer repeater hubs.
NETWORKING CABLES► Coaxial Cable
Coaxial cable is braided-grounded strands of wire that can provide some shielding and noise immunity;
however, the installation and the termination of the cable itself can be costly. Coaxial cabling, which uses
connectors called BNC (Bayonet Nut Connector) is known as, in forms of Ethernet, thick net and thin net,
in the older LAN technology, ARC net, and cable TV.
► Fiber Optic
Fiber optic cabling carries signals, which have been
converted from electrical to optical (pulses of light) form. It
consists of the core, either an extremely thin cylinder of
glass or optical quality plastic, which is surrounded by a
second glass or plastic layer called the cladding.
The interface between the core and cladding can
trap light signals by a process called Total Internal
Reflection (TIR), resulting in the optical fiber acting as a light pipe.
► Unshielded Twisted Pair (UTP)
Unshielded Twisted Pair (UTP) is a set of three or four pairs of wires with each wire in each pair twisted
around the other to prevent electromagnetic interference. UTP cabling uses RJ-45, RJ-11, RS232, and RS-
449 connectors. Because it is less expensive and easier to install, UTP is more popular than Shielded
Twisted Pair (STP) or Coaxial Cabling.
► Shielded Twisted Pair (STP)
Shielded Twisted Pair (TP), like UTP, also has four pairs of wires with each wire in each pair twisted
together. However, the difference is that STP is surrounded with a foil shield and copper braided around
the wires that allows more protection from any external electromagnetic interference.
UTP cable
Straight UTP cable Cross UTP cable Crossover UTP cable
TYPES OF UTP cable
1. Straight Cable
Usually use straight cable to connect different type of devices.
1) Connect a computer to a switch/hub's normal port.
2) Connect a computer to a cable/DSL modem's LAN port.
2. Crossover Cable
It is usually used to connect same type of devices.
1) Connect two computers directly.
2) Connect a router's LAN port to a switch/hub's normal port.
► Rollover cable
A rollover cable is a network cable that connects a
computer terminal to network router’s console port.
IP Addresses
 IP" stands for Internet Protocol, so an IP address is an Internet Protocol address. It is a fascinating product
of modern computer technology designed to allow one computer (or other digital device) to
communicate with another via the Internet.
 There are broadly two types of IPs
o Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP),
the communications protocol that provides an identification and location system for computers on
networks and routes traffic across the Internet.
o Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol.
TYPES OF IP ADDRESSES
► Public IP Address
A public IP address is assigned to every computer that connects to the Internet where each IP is
unique. In this case, there cannot exist two computers with the same public IP address all over the
Internet.
► Public IP address
An IP address is considered private if the IP number falls within one of the IP address ranges reserved
for private networks such as a Local Area Network (LAN).
 Automatic Private IP Addressing (APIPA)
Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems that
enables a computer to automatically assign itself an IP address when there is no Dynamic Host
Configuration Protocol (DHCP) server available to perform that function. APIPA serves as a DHCP
server failover mechanism and makes it easier to configure and support small local area networks
(LANs). The computer selects an IP address from a range of addresses
from 169.254.0.0 - 169.254.255.255) reserved by the Internet Assigned Numbers Authority (IANA)
► Cisco Certified Network Associate[CCNA] is a popular industry certification program in computer
networking developed by Cisco Systems.
► The CCNA program began in 1998 with one core certification focused on network Routing and
Switching, obtainable by passing a single 75-minute written exam.
► In 2013, Cisco began expanding the program to cover many other facets of computer networking
and network administration
► Some of the modules under the CCNA course comprise of basic router configuration, IP routing,
NAT/PAT, virtual LAN, catalyst switch operation, IP traffic management with ACL, etc.
► Those who specialize in the various courses offered by CCNA have better job opportunities.
CISCO Certification
Software used: CISCO Packet Tracer
 Packet Tracer is a cross-platform visual simulation program designed by Cisco Systems that allows
users to create network topologies and imitate modern computer networks.
 Packet Tracer allows users to create simulated network topologies by dragging and dropping routers,
switches and various other types of network devices. A physical connection between devices is
represented by a "cable" item .
 Packet Tracer supports an array of simulated Application Layer protocols, as well as basic routing
with RIP, OSPF, EIGRP,BDP, to the extents required by the current CCNA curriculum.
 Packet Tracer is a cross-platform network simulator designed by Cisco Systems to run on Mac OS,
Linux and Microsoft Windows.
A router is a networking device that forwards data packets between computer networks.
• Broadband Routers
Broadband routers can do different types of things. Broadband routers can be used to
connect computers or to connect to the Internet.
• Wired & Wireless Routers
Wired router has physical connection whereas wireless routers create a wireless signal home or office. So,
any PC within range of Wireless routers can connect it and use your Internet.
• Edge Router
This type of router are placed at the edge of the ISP network, they are normally configured to
external protocol like BGP (Border gateway protocol) to another BGP of other ISP or large organization.
• Inter-provider Border Router
This type of router is for Interconnecting ISPs, this is a BGP speaking router that maintains BGP sessions
with other BGP speaking routers in other providers' Assess.
TYPES
Fig. Router
ROUTER COMMANDS
i) Basic Router Commands
 ii) ROUTING COMMANDS : To Show
 Cisco router copy commands
PASSWORD COMMANDS FOR ROUTERS
(i) Console Port
Cisco devices allow password protection of console access. This tech-recipe describes configuring the use of a password to protect
console of a Cisco switch.
Router(config)#line console 0
Router(config)#password CCNA
Router(config)#login
Router(config)#exit
(ii) Auxiliary port
Router(config)#line aux 0
Router(config)#password CCNA
Router(config)#login
Router(config)#exit
(iii) Enable password
Router(config)#enable password CCNA
Router(config)#exit
Router(config)#service password-encryption
To assign IP ADDRESS to Routers
Router 1
Router(config)#interface serial 0/0/0
Router(config)#ip address 11.0.0.1 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface fast ethernet 0/0
Router(config)#ip address 10.0.0.1 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router 2
Router(config)#interface serial 0/0/0
Router(config)#ip address 11.0.0.2 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface fast ethernet 0/0
Router(config)#ip address 20.0.0.1 255.0.0.0
Router(config-if)#no shutdown
ROUTING
Routing is the process of moving a packet of data from source to destination. Routing is usually
performed by a dedicated device called a router.
PING: Ping is a network diagnostic tool used primarily to test the connectivity between two nodes or devices. To
ping a destination node, an Internet Control Message Protocol (ICMP) echo request packet is sent to that node.
1. Static routing
Static routing is a form of routing that occurs when a router uses a manually-configured routing entry, rather than
information from a dynamic routing traffic. In many cases, static routes are manually configured by a network
administrator by adding in entries into a routing table.
2. Default Routing
Default route is a setting on a computer that defines the packet forwarding rule to use when no specific route can
be determined for a given Internet Protocol (IP) destination address.
Router(config)#ip route 0.0.0.0 0.0.0.0 11.0.0.2
Router(config)#ip route 0.0.0.0 0.0.0.0 12.0.0.2
Route(config)#ip route 0.0.0.0 0.0.0.0 12.0.0.1
Route(config)#ip route 0.0.0.0 0.0.0.0 13.0.0.1
Route(config) #ip route 0.0.0.0 0.0.0.0 14.0.0.2
Router(config)# IP route network ID subnet mask Next IP address
3. Dynamic Routing
Dynamic routing, also called adaptive routing, describes the capability of a system, through which routes are
characterized by their destination, to alter the path that the route takes through the system in response to a
change in conditions.
There are three types of Routing Protocols:
• Distance vector
• Linc state
• Hybrid
Router metrics: Metric is a measure used to decide which route is better (lower number is better). Each
routing protocol uses its own metric. For example, RIP uses hop counts as a metric, while OSPF uses cost.
1. Distance-vector Routing Protocols: Distance-vector Routing Protocols use simple algorithms that calculate a
cumulative distance value between routers based on hop count.
.
• RIP (Routing Info. Protocol)
• IGRP(Interior Gateway Routing Protocol)
Administrative Distance
Administrative distance number is used by routers to find out which route is better (lower number is better).
RIP(Routing Information Protocol
Router(config)# Router RIP
Router(config)#Version 2
Network 11.0.0.0
Network 10.0.0.0
Routing Information Protocol Version 2 (RIPv2)
• Distance-Vector protocol which some characteristics of Link State routing protocols. RIPv2 is classless
routing, which allows us to use subnetted networks also RIPv2 has the option for sending network mask in
the update to allow classless routing.
• RIPv2 support VLSM (Variable Length Subnet Masking).
• RIPv2 support maximum metric (hop count) value of 15. Any router farther than 15 hops away is
considered as unreachable.
• RIPv2 supports triggered updates.
2. Link-state Routing Protocols: Link-state Routing Protocols use sophisticated algorithms that maintain a
complex database of internetwork topology.
OSPF
OSPF(Open Shortest Path First)
 OSPF officially was documented in 1989 by the Internet Engineering Task Force (IETF) to address many
of the limitations of distance vector protocols, such as RIP and IGRP.
 OSPF become the standard open routing protocol.
 The word open is used because the algorithm that drives OSPF, Dijkstra's Shortest Path First (SPF)
algorithm, isn't proprietary to any vendor or organization.
 This allows for mainframes such as IBM, Unisys, and DEC, as well as other manufacturers' routers, to
run OSPF.
FEATURES
• Fast convergence
• Support for VLSM, super netting, and summarization
• Support for large network diameters.
• Stub area routing— Large networks are supported because stub-area routing reduces the routing
table.
• Fully classless routing protocol
Commands
Router 1
Router(config)#router OSPF 100
Router(config)#Network 10.0.0.0 0.255.255.255 area 0
Router(config)#Network 192.168.1.0 0.0.0.255 area 0
Router 2
Router(config)#router OSPF 100
Router(config)#Network 10.0.0.0 0.255.255.255 area 0
Router(config)#Network 11.0.0.0 0.255.255.255 area 1
Router(config)#Network 192.168.2.0 0.0.0.255 area 0
Router 3
Router(config)#router OSPF 100
Router(config)#Network 11.0.0.0 0.255.255.255 area 0
Router(config)#Network 192.168.3.0 0.0.0.255 area 1
3. Hybrid Routing Protocols: Hybrid Routing Protocols use a combination of distance-vector and link-state methods
that tries to incorporate the advantages of both and minimize their disadvantages.
EIGRP
Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance-vector routing protocol that is used on
a computer network for automating routing decisions and configuration.
• Maximum hop count =224
• Administrator distance=90
• Supports subnet+VLSM
Commands
Router(config)#Router EIGRP 500
Router(config)#network 11.0.0.0
Router(config)#No auto-summary
EIGRP
ACL
Access control lists (ACLs) provide a means to filter packets by allowing a user to permit or
deny IP packets from crossing specified interfaces.
(i) Extended ACL (Destination based)
Extended Access Control Lists (ACLs) allow you to permit or deny traffic from specific IP addresses to a
specific destination IP address and port. It also allows you to specify different types of traffic such as
ICMP, TCP, UDP, etc. Needless to say, it is very granular and allows you to be very specific.
Commands
Router (config)#access-list 100 deny tcp host ip 20.0.0.2 host 10.0.0.3 EQ 80
Router(config)#access-list 100 permit tcp any host 10.0.0.3 EQ 80
Router(config)#access-list 100 permit IP any any
Router(config)#interface fast Ethernet 0/0
Router(config)#ip access-group100 in
(ii) Standard ACL (Number based)
Commands
Router(config)#access-list N deny 20.0.0.2
Router(config)#access-list N permit any
Router(config)#interface Se0/0/0
Router(config)#ip access-group N in
(iii) Standard ACL (Name based)
Router(config)#IP access-list standard abc
Router(config)#deny 20.0.0.2
Router(config)#permit any
Router(config)#exit
Router(config)#interface Se0/0/0
Router(config)#ip access-group abc in
 Switching is process to forward packets coming in from one port to a port leading towards
the destination.
VLAN
A local area network, or LAN, provides the nodes connected to it with direct (Layer 2) access to one another
Commands to create VLAN
Switch(config)#VLAN 2
Switch (config)#name Sales
To assign Ports in VLAN
Switch(config)#interface fastethernet0/1
Switch (config) #switch port mode access
Switch (config) #switch port access VLAN 2
VTP (Virtual Trunking Port)
VTP) is a protocol created by Cisco to create and manage VLANs for a large network with many interconnected
switches and to maintain consistency throughout the network.
A network switch, which is participating in VLAN Trunking Protocol (VTP), can have three different modes.
• Server Mode
• Client Mode
• Transparent Mode
PORT SECURITY
Method-I
Switch(config)#interface fastethernet 0/11
Switch(config)#switchport mode access
Switch(config)#switchport port security mac 21.13.8.1
Remove pc and again connect to give the following command
Switch(config)#interface fast Ethernet 0/11
Switch(config)#shutdown
Switch(config)#no shutdown
Method II
Switch(config)#interface fast Ethernet 0/11
Switch(config)#Switch port port-security
Switch(config)#switch port port-security mac-address sticky
Switch(config)#switch port port-security max-2
Switch(config)#switch port port-security violation shutdown
NAT
Network Address Translation (NAT) is the process where a network device, usually a firewall,
assigns a public address to a computer (or group of computers) inside a private network.
The main use of NAT is to limit the number of public IP addresses an organization or company must use,
for both economy and security purposes. The most common form of network translation involves a large
private network using addresses .
Types of NAT
1.Static NAT (Network Address Translation)
Static NAT (Network Address Translation) is one-to-one mapping of a private IP address to a public IP
address.
COMMANDS
Switch(config)#IP NAT inside source static 10.0.0.2 122.122.100.10
Switch(config)#IP nat inside source static 10.0.0.3 122.122.100.11
Switch(config)#interface fastethernet 0/0
Switch(config)#IP nat inside exit
Switch(config)#interface serial 0/0/0
Switch(config)#IP nat outside
2.Dynamic NAT (Network Address Translation)
Dynamic NAT can be defined as mapping of a private IP address to a public IP address from a group of
public IP address.
COMMANDS
Switch(config)#interface fast Ethernet 0/0
Switch(config)#IP Nat inside
Switch(config)#exit
Switch(config)#interface serial 0/0/0
Switch(config)#IP nat outside
Switch(config)#exit
Switch(config)#access-list 10 permit 10.0.0.0 0.255.255.255.255
Switch(config)#IP nat pool abc 122.122.200.10 122.122.200.10 netmask 255.255.255.0
Switch(config)#IP Nat inside source list 10 pool abc
3. PAT (Port Address Translation)
Port Address Translation (PAT) is another type of dynamic NAT which can map multiple private IP addresses to a
public IP address by using a technology known as Port Address Translation.
Commands
Switch(config)#access-list 10 permit 10.0.0.0 0.255.255.255
Switch(config)#IP nat pool abc 122.122.200.20 122.122.200.20 net mask 255.255.255.0
Switch(config)#IP nat inside source list 10 pool abc overloads
Switch(config)#interface fast Ethernet 0/0
Switch(config)IP Nat inside
Switch(config)#exit
Switch(config)#interface serial 0/0/0
Switch (config)#IP Nat outside
Subnetting is a process of dividing large network into the smaller networks based on layer 3 IP address.
Every computer on network has an IP address that represent its location on network. Two version of IP
addresses are available IPv4 and IPv6.
Class A addresses range from 1-126
Class B addresses range from 128-191
Class C addresses range from 192-223
Class D addresses range from 224-239
Class E addresses range from 240-254
Subnet mask
Subnet mask is a 32 bits long address used to distinguish between network address and host address in
IP address. Subnet mask is always used with IP address. Subnet mask has only one purpose, to identify
which part of an IP address is network address and which part is host address.

Class Subnet Mask Format
A 255.0.0.0 Network.Host.Host.Host
B 255.255.0.0 Network.Network.Host.Host
C 255.255.255.0 Network.Network.Network.Host
 A computer network or data network is a telecommunications network which
allows computers to exchange data.
 In computer networks, networked computing devices exchange data with each other using
a data link. The connections between nodes are established using either cable
media or wireless media. The best-known computer network is the Internet.
 Computer networks support an enormous number of applications and services such as access
to the World Wide Web, digital video, digital audio, shared use of application and storage
servers, printers, and fax machines, and use of email and instant messaging applications as well
as many others.
 In most cases, application-specific communications protocols are layered (i.e. carried
as payload) over other more general communications protocols.
Textbooks:
[1] Goleniewski, L. (2006) Telecommunications Essentials, Addison Wesley Professional. )
[2 ]Kurose, J.F. and K.W. Ross (2003) Computer Networking: A Top Down Approach Featuring the Internet,
Addison Wesley. )
[3] Mir, N.F. (2006) Computer and Communication Networks, Prentice Hall.
[4]“Computer Networks” by Andrew S. Tanenbaum
[5] “Internetworking with TCP/IP, Volume 1” by Douglas Comer.
[6] Sam Halabi & Danny McPherson, Internet Routing Architectures.
[7 ]Christian Huitema, Routing in the Internet.
Research Papers:
[8][3ComWHITE] 3Com, "Understanding IP Addressing: Everything You Ever wanted to Know," White Paper,
May 2001.
[9][Cisco IP] Cisco, "Internet Protocols," Internetworking Technology Handbook.
[10][Cisco Routing] Cisco, "Routing Basics," Internetworking Technology Handbook.
Ccna(routing &and switching)
Ccna(routing &and switching)

Weitere ähnliche Inhalte

Was ist angesagt?

CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTNishant Goel
 
Networking devices
Networking devicesNetworking devices
Networking devicesfrestoadi
 
SET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMSET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMEILLEN IVY PORTUGUEZ
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing NetworksDsunte Wilson
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSKABILESH RAMAR
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccnaHoneyKumar34
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)nnmaurya
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training PresentationRohit Singh
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101Rohan Reddy
 
Types of Computer Network
Types of Computer NetworkTypes of Computer Network
Types of Computer NetworkMohit Dasariya
 

Was ist angesagt? (20)

CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Routing ppt
Routing pptRouting ppt
Routing ppt
 
SET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMSET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEM
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccna
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
 
Computer networks
Computer networksComputer networks
Computer networks
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
 
Types of Computer Network
Types of Computer NetworkTypes of Computer Network
Types of Computer Network
 
Presentation on router
Presentation on routerPresentation on router
Presentation on router
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
 
Router switch and hub
Router switch and hubRouter switch and hub
Router switch and hub
 
Networking devices
Networking devicesNetworking devices
Networking devices
 

Andere mochten auch

Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routingDeepak John
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routingr123027
 
Cisco CCNA-Standard Access List
Cisco CCNA-Standard Access ListCisco CCNA-Standard Access List
Cisco CCNA-Standard Access ListHamed Moghaddam
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routingAshraf Uddin
 
Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPFarpit
 
CCNA Routing and Switching IT Certifications
CCNA Routing and Switching  IT CertificationsCCNA Routing and Switching  IT Certifications
CCNA Routing and Switching IT CertificationsMuhammad Qasim
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmfarimoin
 
Distance vector routing algorithm
Distance vector routing algorithmDistance vector routing algorithm
Distance vector routing algorithmGaurav Rawat
 

Andere mochten auch (17)

Routing
RoutingRouting
Routing
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routing
 
Ccna1v3 Mod02 Class
Ccna1v3 Mod02 ClassCcna1v3 Mod02 Class
Ccna1v3 Mod02 Class
 
Sem 1 Ch 3
Sem 1 Ch 3Sem 1 Ch 3
Sem 1 Ch 3
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routing
 
Cisco CCNA-Standard Access List
Cisco CCNA-Standard Access ListCisco CCNA-Standard Access List
Cisco CCNA-Standard Access List
 
DYNAMIC SOURCE ROUTING (DSR)
DYNAMIC SOURCE ROUTING  (DSR)DYNAMIC SOURCE ROUTING  (DSR)
DYNAMIC SOURCE ROUTING (DSR)
 
Modes of router
Modes of routerModes of router
Modes of router
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routing
 
Cisco CCNA- DHCP Server
Cisco CCNA-  DHCP ServerCisco CCNA-  DHCP Server
Cisco CCNA- DHCP Server
 
Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPF
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
CCNA Routing and Switching IT Certifications
CCNA Routing and Switching  IT CertificationsCCNA Routing and Switching  IT Certifications
CCNA Routing and Switching IT Certifications
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Distance vector routing algorithm
Distance vector routing algorithmDistance vector routing algorithm
Distance vector routing algorithm
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
 

Ähnlich wie Ccna(routing &and switching)

Ähnlich wie Ccna(routing &and switching) (20)

Introduction of network
Introduction of networkIntroduction of network
Introduction of network
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
COMPUTER NETWORK seminar.pptx
COMPUTER NETWORK seminar.pptxCOMPUTER NETWORK seminar.pptx
COMPUTER NETWORK seminar.pptx
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
 
Unit_1.pptx
Unit_1.pptxUnit_1.pptx
Unit_1.pptx
 
networking.ppt
networking.pptnetworking.ppt
networking.ppt
 
networking
networkingnetworking
networking
 
Networks
NetworksNetworks
Networks
 
Networking HMT-1
Networking HMT-1Networking HMT-1
Networking HMT-1
 
An Introduction to Networking
An Introduction to Networking An Introduction to Networking
An Introduction to Networking
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 
Computer Network ssss ppt.pptx
Computer Network ssss ppt.pptxComputer Network ssss ppt.pptx
Computer Network ssss ppt.pptx
 
Computer Network Introduction full
Computer Network Introduction fullComputer Network Introduction full
Computer Network Introduction full
 
What is networking
What is networkingWhat is networking
What is networking
 
Unit 2B.pdf
Unit 2B.pdfUnit 2B.pdf
Unit 2B.pdf
 
Networking hard copy (1)
Networking  hard copy (1)Networking  hard copy (1)
Networking hard copy (1)
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
presentation on type of toplogy and network
presentation on type of toplogy and networkpresentation on type of toplogy and network
presentation on type of toplogy and network
 
Networking / Internet and Web Technologies
Networking / Internet and Web TechnologiesNetworking / Internet and Web Technologies
Networking / Internet and Web Technologies
 
7 topology ethernet
7 topology ethernet7 topology ethernet
7 topology ethernet
 

Kürzlich hochgeladen

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Kürzlich hochgeladen (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Ccna(routing &and switching)

  • 1. COMPUTER NETWORKS- ROUTING & SWITCHING [CCNA]
  • 2. COMPANY PROFILE: TCIT-IT  Telecommunications Consultants India Ltd (TCIL) is a leading ISO - 9001:2000 certified public sector undertaking.  TCIL, a premier telecommunication consultancy and engineering company with a strong base in Telecommunication & Information Technology (IT).  It was incorporated in 1978 by Department of Telecommunications (DOT), Government of India under the aegis of Ministry of Communications, headed by Minister of Communications and Information Technology.  The Organizational Structure is formed with the objectives of providing globally world-class technology and Indian expertise in all fields of Telecommunications and to provide total Quality management & excellence in project execution.
  • 3.  TCIL-IT is managed by ICSIL (Intelligent Communication Systems India Ltd.), a Joint Venture of TCIL (Telecommunication Consultants India Ltd), a Govt. of India Enterprise and DSIIDC (Delhi State Industrial Infrastructure Development Corporation Ltd).  TCIL-IT has tie-up with many government agencies to impart computer education for career advancement.  There are a number of PSUs under DoT. TCIL is one of them. Some other major companies are 1. Bharat Sanchar Nigam Limited (BSNL) 2. Mahanagar Telephone Nigam Limited (MTNL) 3. ITI Limited  TCIL has its presence in almost 45 Countries mainly in Middle East Africa, South-East Africa, South-East Asia Asia and Europe.
  • 4. COMPUTER NETWORKS Computer network : A collection of computing devices that are connected in various ways in order to communicate and share resources. Usually, the connections between computers in a network are made using physical wires or cables. However, some connections are wireless, using radio waves or infrared signals. The purpose of a network is to share resources- A resource may be: -A file -A folder -A printer -A disk drive -Or just about anything else that exists on a computer.
  • 5. 1. Network design  a. Peer-to-peer  b. Server/Client 2. Area network  PAN(Personal Area Network)  LAN(Local area network)  W-LAN(Wireless LAN)  CAN(Campus Area network)  SAN(Storage data area network)  GAN(Global area network) Components of Networks
  • 6. Network topology  Star Topology:  Ring Topology  Mesh Topology  Tree Topology  Hybrid Topology 3.3.iv. Network Protocols 3.3.v. Wired and wireless
  • 7. 1. Network Design Peer-to-Peer:  a peer-to-peer or P2P network, the tasks are allocated among all the members of the network. There is no real hierarchy among the computers, and all of them are considered equal. This is also referred to as a distributed architecture or workgroup without hierarchy.  A peer-to-peer network does not use a central computer server that controls network activity. Instead, every computer on the network has a special software running that allows for communications between all the computers.
  • 8. Server – Client:  In a client/server network, a number of network clients or workstations request resources or services from the network. One or more network servers manage and provide these or services.  The clients are computers that depends on the server for data and software. Network are also referred to as computer servers or simply servers. Sometimes a server is described in terms of the specific service it provides, such as e-mail server, print server or storage server.
  • 9. 2. Types of Networking 1. LAN – It stands for local area network. Location: In a building or individual rooms or floors of buildings or connecting nearby buildings together like a campus wide network like a college or university. 2. MAN – It stands for metropolitan area network. Location: network connecting various cities. 3. WAN – It stands for wide area network. This communication system links LANs between cities, countries and continents. The main difference between a MAN and a WAN is that the WAN uses Long Distance Carriers rather than Local Exchange carriers. Location: City to city, across a country or across a continent. Wide Area Networks (WANs) connect LANs together between cities or across a country.
  • 10. 3. Network Topology  a) BUS Topology: All the nodes (file server, workstations, and peripherals) on a bus topology are connected by one single cable. Advantages of Bus Topology • It is Cheap, easy to handle and implement. • Require less cable • It is best suited for small networks.  Disadvantages of Bus Topology • The cable length is limited. This limits the number of stations that can be connected. • This network topology can perform well only for a limited number of nodes. b) RING Topology • In a ring network, every device has exactly two neighbors for communication purposes. • All messages travel through a ring in the same direction. • A failure in any cable or device breaks the loop and can take down the entire network.
  • 11.  Advantage of Ring Topology • Very orderly network where every device has access to the token and the opportunity to transmit. • Easier to Manage than a Bus Network. • Good Communication over long distances. • Handles high volume of traffic.  Disadvantages of Ring Topology • The failure of a single node of the network can cause the entire network to fail. • The movement or changes made to network nodes affects the performance of the entire network. c) STAR Topology • In a star network, each node (file server, workstations, and peripherals) is connected to a central called a hub. • The hub takes a signal that comes from any node and passes it along to all the other nodes in the network. • Data on a star network passes through the hub, switch, or concentrator before continuing to its destination.
  • 12.  Advantages of Star Topology • Easy to manage • Easy to locate problems (cable/workstations) • Easier to expand than a bus or ring topology. • Easy to install and wire. • Easy to detect faults and to remove parts.  Disadvantages of Star Topology • Requires more cable length than a linear topology. • If the hub or concentrator fails, nodes attached are disabled. • More expensive because of the cost of the concentrators. d) TREE Topology • A tree topology (hierarchical topology) can be viewed as a collection of star networks arranged in a hierarchy. • This tree has individual peripheral nodes which are required to transmit to and receive from one other only and are not required to act as repeaters or regenerators
  • 13.  Advantages of a Tree Topology • Point-to-point wiring for individual segments. • Supported by several hardware and software vendors. • All the computers have access to the larger and their immediate networks.  Disadvantages of a Tree Topology • Overall length of each segment is limited by the type of cabling used. • If the backbone line breaks, the entire segment goes down. • More difficult to configure and wire than other topologies. e) MESH Topology • In this topology, each node is connected to every other node in the network. • Implementing the mesh topology is expensive and difficult. • In this type of network, each node may send message to destination through multiple paths.
  • 14. Advantage of Mesh Topology • No traffic problem as there are dedicated links. • It has multiple links, so if one route is blocked then other routes can be used for data communication. • Points to point links make fault identification easy. Disadvantage of Mesh Topology • There is mesh of wiring which can be difficult to manage. • Installation is complex as each node is connected to every node. • Cabling cost is high. f) HYBRID Topology • A combination of any two or more network topologies. • A hybrid topology always accrues when two different basic network topologies are connected. • It is a mixture of above mentioned topologies. Usually, a central computer is attached with sub- controllers which in turn participate in a variety of topologies.
  • 15.  Advantages of a Hybrid Topology • It is extremely flexible. • It is very reliable.  Disadvantages of a Hybrid Topology • Expensive
  • 16. NETWORKING DEVICES  HUB The hubs used on UTP Ethernet networks are repeaters as well, but they can have many RJ45 ports instead of just two BNC connectors. When data enters the hub through any of its ports, the hub amplifies the signal and transmits it out through all of the other ports.  BRIDGES A bridge is used to join two network segments together, it allows computers on either segment to access resources on the other. They can also be used to divide large networks into smaller segments.  ROUTERS Routers are networking devices used to extend or segment networks by forwarding packets from one logical network to another. Routers are most often used in large internetworks that use the TCP/IP protocol suite and for connecting TCP/IP hosts and local area networks (LANs) to the Internet using dedicated leased lines.
  • 17.  BROUTERS Brouters are a combination of router and bridge. This is a special type of equipment for networks that can be either bridged or routed, based on the protocols being forwarded. Brouters are complex, fairly expensive pieces of equipment and such are rarely used.  NICs (Network Interface Card) Network Interface Card, or NIC is a hardware card installed in a computer can communicate on a network.  WAPs (Wireless Access Point) Access points act as wireless hubs to link multiple wireless NICs into a single subnet. Access points also have at least one fixed to allow the wireless network to be bridged to a traditional wired Ethernet network. ►MODEMS A modem is a device that makes it possible for computers communicate over telephone lines. The word modem comes from Modulate and Demodulate.
  • 18.  SWITCHES Switches are a special type of hub that offers an additional of intelligence to basic, physical-layer repeater hubs.
  • 19. NETWORKING CABLES► Coaxial Cable Coaxial cable is braided-grounded strands of wire that can provide some shielding and noise immunity; however, the installation and the termination of the cable itself can be costly. Coaxial cabling, which uses connectors called BNC (Bayonet Nut Connector) is known as, in forms of Ethernet, thick net and thin net, in the older LAN technology, ARC net, and cable TV. ► Fiber Optic Fiber optic cabling carries signals, which have been converted from electrical to optical (pulses of light) form. It consists of the core, either an extremely thin cylinder of glass or optical quality plastic, which is surrounded by a second glass or plastic layer called the cladding. The interface between the core and cladding can trap light signals by a process called Total Internal Reflection (TIR), resulting in the optical fiber acting as a light pipe. ► Unshielded Twisted Pair (UTP) Unshielded Twisted Pair (UTP) is a set of three or four pairs of wires with each wire in each pair twisted around the other to prevent electromagnetic interference. UTP cabling uses RJ-45, RJ-11, RS232, and RS- 449 connectors. Because it is less expensive and easier to install, UTP is more popular than Shielded Twisted Pair (STP) or Coaxial Cabling.
  • 20. ► Shielded Twisted Pair (STP) Shielded Twisted Pair (TP), like UTP, also has four pairs of wires with each wire in each pair twisted together. However, the difference is that STP is surrounded with a foil shield and copper braided around the wires that allows more protection from any external electromagnetic interference. UTP cable Straight UTP cable Cross UTP cable Crossover UTP cable TYPES OF UTP cable
  • 21. 1. Straight Cable Usually use straight cable to connect different type of devices. 1) Connect a computer to a switch/hub's normal port. 2) Connect a computer to a cable/DSL modem's LAN port. 2. Crossover Cable It is usually used to connect same type of devices. 1) Connect two computers directly. 2) Connect a router's LAN port to a switch/hub's normal port.
  • 22. ► Rollover cable A rollover cable is a network cable that connects a computer terminal to network router’s console port.
  • 23. IP Addresses  IP" stands for Internet Protocol, so an IP address is an Internet Protocol address. It is a fascinating product of modern computer technology designed to allow one computer (or other digital device) to communicate with another via the Internet.  There are broadly two types of IPs o Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. o Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol. TYPES OF IP ADDRESSES ► Public IP Address A public IP address is assigned to every computer that connects to the Internet where each IP is unique. In this case, there cannot exist two computers with the same public IP address all over the Internet.
  • 24. ► Public IP address An IP address is considered private if the IP number falls within one of the IP address ranges reserved for private networks such as a Local Area Network (LAN).
  • 25.  Automatic Private IP Addressing (APIPA) Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function. APIPA serves as a DHCP server failover mechanism and makes it easier to configure and support small local area networks (LANs). The computer selects an IP address from a range of addresses from 169.254.0.0 - 169.254.255.255) reserved by the Internet Assigned Numbers Authority (IANA)
  • 26. ► Cisco Certified Network Associate[CCNA] is a popular industry certification program in computer networking developed by Cisco Systems. ► The CCNA program began in 1998 with one core certification focused on network Routing and Switching, obtainable by passing a single 75-minute written exam. ► In 2013, Cisco began expanding the program to cover many other facets of computer networking and network administration ► Some of the modules under the CCNA course comprise of basic router configuration, IP routing, NAT/PAT, virtual LAN, catalyst switch operation, IP traffic management with ACL, etc. ► Those who specialize in the various courses offered by CCNA have better job opportunities.
  • 28. Software used: CISCO Packet Tracer  Packet Tracer is a cross-platform visual simulation program designed by Cisco Systems that allows users to create network topologies and imitate modern computer networks.  Packet Tracer allows users to create simulated network topologies by dragging and dropping routers, switches and various other types of network devices. A physical connection between devices is represented by a "cable" item .  Packet Tracer supports an array of simulated Application Layer protocols, as well as basic routing with RIP, OSPF, EIGRP,BDP, to the extents required by the current CCNA curriculum.  Packet Tracer is a cross-platform network simulator designed by Cisco Systems to run on Mac OS, Linux and Microsoft Windows.
  • 29. A router is a networking device that forwards data packets between computer networks. • Broadband Routers Broadband routers can do different types of things. Broadband routers can be used to connect computers or to connect to the Internet. • Wired & Wireless Routers Wired router has physical connection whereas wireless routers create a wireless signal home or office. So, any PC within range of Wireless routers can connect it and use your Internet. • Edge Router This type of router are placed at the edge of the ISP network, they are normally configured to external protocol like BGP (Border gateway protocol) to another BGP of other ISP or large organization. • Inter-provider Border Router This type of router is for Interconnecting ISPs, this is a BGP speaking router that maintains BGP sessions with other BGP speaking routers in other providers' Assess. TYPES
  • 30. Fig. Router ROUTER COMMANDS i) Basic Router Commands
  • 31.  ii) ROUTING COMMANDS : To Show
  • 32.  Cisco router copy commands
  • 33. PASSWORD COMMANDS FOR ROUTERS (i) Console Port Cisco devices allow password protection of console access. This tech-recipe describes configuring the use of a password to protect console of a Cisco switch. Router(config)#line console 0 Router(config)#password CCNA Router(config)#login Router(config)#exit (ii) Auxiliary port Router(config)#line aux 0 Router(config)#password CCNA Router(config)#login Router(config)#exit (iii) Enable password Router(config)#enable password CCNA Router(config)#exit Router(config)#service password-encryption
  • 34. To assign IP ADDRESS to Routers Router 1 Router(config)#interface serial 0/0/0 Router(config)#ip address 11.0.0.1 255.0.0.0 Router(config-if)#no shutdown Router(config-if)#exit Router(config)#interface fast ethernet 0/0 Router(config)#ip address 10.0.0.1 255.0.0.0 Router(config-if)#no shutdown Router(config-if)#exit Router 2 Router(config)#interface serial 0/0/0 Router(config)#ip address 11.0.0.2 255.0.0.0 Router(config-if)#no shutdown Router(config-if)#exit Router(config)#interface fast ethernet 0/0 Router(config)#ip address 20.0.0.1 255.0.0.0 Router(config-if)#no shutdown
  • 35. ROUTING Routing is the process of moving a packet of data from source to destination. Routing is usually performed by a dedicated device called a router. PING: Ping is a network diagnostic tool used primarily to test the connectivity between two nodes or devices. To ping a destination node, an Internet Control Message Protocol (ICMP) echo request packet is sent to that node. 1. Static routing Static routing is a form of routing that occurs when a router uses a manually-configured routing entry, rather than information from a dynamic routing traffic. In many cases, static routes are manually configured by a network administrator by adding in entries into a routing table. 2. Default Routing Default route is a setting on a computer that defines the packet forwarding rule to use when no specific route can be determined for a given Internet Protocol (IP) destination address. Router(config)#ip route 0.0.0.0 0.0.0.0 11.0.0.2 Router(config)#ip route 0.0.0.0 0.0.0.0 12.0.0.2 Route(config)#ip route 0.0.0.0 0.0.0.0 12.0.0.1 Route(config)#ip route 0.0.0.0 0.0.0.0 13.0.0.1 Route(config) #ip route 0.0.0.0 0.0.0.0 14.0.0.2 Router(config)# IP route network ID subnet mask Next IP address
  • 36. 3. Dynamic Routing Dynamic routing, also called adaptive routing, describes the capability of a system, through which routes are characterized by their destination, to alter the path that the route takes through the system in response to a change in conditions. There are three types of Routing Protocols: • Distance vector • Linc state • Hybrid
  • 37. Router metrics: Metric is a measure used to decide which route is better (lower number is better). Each routing protocol uses its own metric. For example, RIP uses hop counts as a metric, while OSPF uses cost. 1. Distance-vector Routing Protocols: Distance-vector Routing Protocols use simple algorithms that calculate a cumulative distance value between routers based on hop count. . • RIP (Routing Info. Protocol) • IGRP(Interior Gateway Routing Protocol) Administrative Distance Administrative distance number is used by routers to find out which route is better (lower number is better).
  • 38. RIP(Routing Information Protocol Router(config)# Router RIP Router(config)#Version 2 Network 11.0.0.0 Network 10.0.0.0 Routing Information Protocol Version 2 (RIPv2) • Distance-Vector protocol which some characteristics of Link State routing protocols. RIPv2 is classless routing, which allows us to use subnetted networks also RIPv2 has the option for sending network mask in the update to allow classless routing. • RIPv2 support VLSM (Variable Length Subnet Masking). • RIPv2 support maximum metric (hop count) value of 15. Any router farther than 15 hops away is considered as unreachable. • RIPv2 supports triggered updates. 2. Link-state Routing Protocols: Link-state Routing Protocols use sophisticated algorithms that maintain a complex database of internetwork topology. OSPF
  • 39. OSPF(Open Shortest Path First)  OSPF officially was documented in 1989 by the Internet Engineering Task Force (IETF) to address many of the limitations of distance vector protocols, such as RIP and IGRP.  OSPF become the standard open routing protocol.  The word open is used because the algorithm that drives OSPF, Dijkstra's Shortest Path First (SPF) algorithm, isn't proprietary to any vendor or organization.  This allows for mainframes such as IBM, Unisys, and DEC, as well as other manufacturers' routers, to run OSPF. FEATURES • Fast convergence • Support for VLSM, super netting, and summarization • Support for large network diameters. • Stub area routing— Large networks are supported because stub-area routing reduces the routing table. • Fully classless routing protocol
  • 40. Commands Router 1 Router(config)#router OSPF 100 Router(config)#Network 10.0.0.0 0.255.255.255 area 0 Router(config)#Network 192.168.1.0 0.0.0.255 area 0 Router 2 Router(config)#router OSPF 100 Router(config)#Network 10.0.0.0 0.255.255.255 area 0 Router(config)#Network 11.0.0.0 0.255.255.255 area 1 Router(config)#Network 192.168.2.0 0.0.0.255 area 0 Router 3 Router(config)#router OSPF 100 Router(config)#Network 11.0.0.0 0.255.255.255 area 0 Router(config)#Network 192.168.3.0 0.0.0.255 area 1
  • 41. 3. Hybrid Routing Protocols: Hybrid Routing Protocols use a combination of distance-vector and link-state methods that tries to incorporate the advantages of both and minimize their disadvantages. EIGRP Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance-vector routing protocol that is used on a computer network for automating routing decisions and configuration. • Maximum hop count =224 • Administrator distance=90 • Supports subnet+VLSM Commands Router(config)#Router EIGRP 500 Router(config)#network 11.0.0.0 Router(config)#No auto-summary EIGRP
  • 42. ACL Access control lists (ACLs) provide a means to filter packets by allowing a user to permit or deny IP packets from crossing specified interfaces. (i) Extended ACL (Destination based) Extended Access Control Lists (ACLs) allow you to permit or deny traffic from specific IP addresses to a specific destination IP address and port. It also allows you to specify different types of traffic such as ICMP, TCP, UDP, etc. Needless to say, it is very granular and allows you to be very specific. Commands Router (config)#access-list 100 deny tcp host ip 20.0.0.2 host 10.0.0.3 EQ 80 Router(config)#access-list 100 permit tcp any host 10.0.0.3 EQ 80 Router(config)#access-list 100 permit IP any any Router(config)#interface fast Ethernet 0/0 Router(config)#ip access-group100 in (ii) Standard ACL (Number based) Commands Router(config)#access-list N deny 20.0.0.2 Router(config)#access-list N permit any Router(config)#interface Se0/0/0 Router(config)#ip access-group N in
  • 43. (iii) Standard ACL (Name based) Router(config)#IP access-list standard abc Router(config)#deny 20.0.0.2 Router(config)#permit any Router(config)#exit Router(config)#interface Se0/0/0 Router(config)#ip access-group abc in
  • 44.  Switching is process to forward packets coming in from one port to a port leading towards the destination. VLAN A local area network, or LAN, provides the nodes connected to it with direct (Layer 2) access to one another
  • 45. Commands to create VLAN Switch(config)#VLAN 2 Switch (config)#name Sales To assign Ports in VLAN Switch(config)#interface fastethernet0/1 Switch (config) #switch port mode access Switch (config) #switch port access VLAN 2 VTP (Virtual Trunking Port) VTP) is a protocol created by Cisco to create and manage VLANs for a large network with many interconnected switches and to maintain consistency throughout the network. A network switch, which is participating in VLAN Trunking Protocol (VTP), can have three different modes. • Server Mode • Client Mode • Transparent Mode
  • 46. PORT SECURITY Method-I Switch(config)#interface fastethernet 0/11 Switch(config)#switchport mode access Switch(config)#switchport port security mac 21.13.8.1 Remove pc and again connect to give the following command Switch(config)#interface fast Ethernet 0/11 Switch(config)#shutdown Switch(config)#no shutdown Method II Switch(config)#interface fast Ethernet 0/11 Switch(config)#Switch port port-security Switch(config)#switch port port-security mac-address sticky Switch(config)#switch port port-security max-2 Switch(config)#switch port port-security violation shutdown
  • 47. NAT Network Address Translation (NAT) is the process where a network device, usually a firewall, assigns a public address to a computer (or group of computers) inside a private network. The main use of NAT is to limit the number of public IP addresses an organization or company must use, for both economy and security purposes. The most common form of network translation involves a large private network using addresses . Types of NAT 1.Static NAT (Network Address Translation) Static NAT (Network Address Translation) is one-to-one mapping of a private IP address to a public IP address. COMMANDS Switch(config)#IP NAT inside source static 10.0.0.2 122.122.100.10 Switch(config)#IP nat inside source static 10.0.0.3 122.122.100.11 Switch(config)#interface fastethernet 0/0 Switch(config)#IP nat inside exit Switch(config)#interface serial 0/0/0 Switch(config)#IP nat outside
  • 48. 2.Dynamic NAT (Network Address Translation) Dynamic NAT can be defined as mapping of a private IP address to a public IP address from a group of public IP address. COMMANDS Switch(config)#interface fast Ethernet 0/0 Switch(config)#IP Nat inside Switch(config)#exit Switch(config)#interface serial 0/0/0 Switch(config)#IP nat outside Switch(config)#exit Switch(config)#access-list 10 permit 10.0.0.0 0.255.255.255.255 Switch(config)#IP nat pool abc 122.122.200.10 122.122.200.10 netmask 255.255.255.0 Switch(config)#IP Nat inside source list 10 pool abc 3. PAT (Port Address Translation) Port Address Translation (PAT) is another type of dynamic NAT which can map multiple private IP addresses to a public IP address by using a technology known as Port Address Translation.
  • 49. Commands Switch(config)#access-list 10 permit 10.0.0.0 0.255.255.255 Switch(config)#IP nat pool abc 122.122.200.20 122.122.200.20 net mask 255.255.255.0 Switch(config)#IP nat inside source list 10 pool abc overloads Switch(config)#interface fast Ethernet 0/0 Switch(config)IP Nat inside Switch(config)#exit Switch(config)#interface serial 0/0/0 Switch (config)#IP Nat outside
  • 50. Subnetting is a process of dividing large network into the smaller networks based on layer 3 IP address. Every computer on network has an IP address that represent its location on network. Two version of IP addresses are available IPv4 and IPv6. Class A addresses range from 1-126 Class B addresses range from 128-191 Class C addresses range from 192-223 Class D addresses range from 224-239 Class E addresses range from 240-254 Subnet mask Subnet mask is a 32 bits long address used to distinguish between network address and host address in IP address. Subnet mask is always used with IP address. Subnet mask has only one purpose, to identify which part of an IP address is network address and which part is host address. 
  • 51. Class Subnet Mask Format A 255.0.0.0 Network.Host.Host.Host B 255.255.0.0 Network.Network.Host.Host C 255.255.255.0 Network.Network.Network.Host
  • 52.  A computer network or data network is a telecommunications network which allows computers to exchange data.  In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media. The best-known computer network is the Internet.  Computer networks support an enormous number of applications and services such as access to the World Wide Web, digital video, digital audio, shared use of application and storage servers, printers, and fax machines, and use of email and instant messaging applications as well as many others.  In most cases, application-specific communications protocols are layered (i.e. carried as payload) over other more general communications protocols.
  • 53. Textbooks: [1] Goleniewski, L. (2006) Telecommunications Essentials, Addison Wesley Professional. ) [2 ]Kurose, J.F. and K.W. Ross (2003) Computer Networking: A Top Down Approach Featuring the Internet, Addison Wesley. ) [3] Mir, N.F. (2006) Computer and Communication Networks, Prentice Hall. [4]“Computer Networks” by Andrew S. Tanenbaum [5] “Internetworking with TCP/IP, Volume 1” by Douglas Comer. [6] Sam Halabi & Danny McPherson, Internet Routing Architectures. [7 ]Christian Huitema, Routing in the Internet. Research Papers: [8][3ComWHITE] 3Com, "Understanding IP Addressing: Everything You Ever wanted to Know," White Paper, May 2001. [9][Cisco IP] Cisco, "Internet Protocols," Internetworking Technology Handbook. [10][Cisco Routing] Cisco, "Routing Basics," Internetworking Technology Handbook.