SlideShare ist ein Scribd-Unternehmen logo
1 von 54
Chapter 6: 
Network Layer 
Introduction to Networks 
© 2008 Cisco Systems, Inc. All Presentation_ID rights reserved. Cisco Confidential 1
Chapter 6: Objectives 
Students will be able to: 
 Explain how network layer protocols and services 
support communications across data networks. 
 Explain how routers enable end-to-end connectivity in a 
small to medium-sized business network. 
 Determine the appropriate device to route traffic in a 
small to medium-sized business network. 
 Configure a router with basic configurations. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Chapter 6 
6.1 Network Layer Protocols 
6.2 Routing 
6.3 Routers 
6.4 Configuring a Cisco Router 
6.5 Summary 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Network Layer 
Network Layer 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Network Layer Protocols 
Network Layer in Communication 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Network Layer in Communication 
The Network Layer 
End to End Transport processes 
 Addressing end devices 
 Encapsulation 
 Routing 
 De-encapsulating 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Network Layer in Communication 
Network Layer Protocols 
Common Network Layer Protocols 
 Internet Protocol version 4 (IPv4) 
 Internet Protocol version 6 (IPv6) 
Legacy Network Layer Protocols 
 Novell Internetwork Packet Exchange (IPX) 
 AppleTalk 
 Connectionless Network Service (CLNS/DECNet) 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Characteristics of the IP protocol 
Characteristics of IP 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Characteristics of the IP protocol 
IP - Connectionless 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Characteristics of the IP protocol 
IP – Best Effort Delivery 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Characteristics of the IP protocol 
IP – Media Independent 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
IPv4 Packet 
Encapsulating IP 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
IPv4 Packet 
IPv4 Packet Header 
Version, Differentiated Services (DS), Time-to-Live 
(TTL),Protocol, Source IP Address, Destination IP Address 
Byte 1 Byte 2 Byte 3 Byte 4 
Version 
IP Header 
Length 
Differentiated Services 
Total Length 
DSCP ECN 
Identification Flag Fragment Offset 
Time To Live Protocol Header Checksum 
Source IP Address 
Destination IP Address 
Options (optional) 
Padding 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
IPv4 Packet 
IPv4 Header Fields 
Internet Header Length (IHL), Total Length, Header Checksum, 
Identification, Flags, Fragment Offset 
Byte 1 Byte 2 Byte 3 Byte 4 
Version 
IP Header 
Length 
Differentiated Services 
Total Length 
DSCP ECN 
Identification Flag Fragment Offset 
Time To Live Protocol Header Checksum 
Source IP Address 
Destination IP Address 
Options (optional) 
Padding 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
IPv4 Packet 
Sample IPv4 Headers 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Network Layer in Communication 
Limitations of IPv4 
 IP Address depletion 
 Internet routing table expansion 
 Lack of end-to-end connectivity 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Network Layer in Communication 
Introducing IPv6 
 Increased address space 
 Improved packet handling 
 Eliminates the need for NAT 
 Integrated security 
 4 billion IPv4 addresses 
4,000,000,000 
 340 undecillion IPv6 addresses 
340,000,000,000,000,000,000,000,000,000,000,000,000 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
IPv6 Packet 
Encapsulating IPv6 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
IPv6 Packet 
IPv6 Packet Header 
Byte 1 Byte 2 Byte 3 Byte 4 
Version Traffic Class Flow Label 
Payload Length 
Next 
Header 
Hop Limit 
Source IP Address 
Destination IP Address 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
IPv6 Packet 
Sample IPv6 Header 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Routing 
Host Routing Tables 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Host Routing Tables 
Host Packet Forwarding Decision 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Host Routing Tables 
Default Gateway 
Hosts must maintain their own, local, routing table to ensure 
that network layer packets are directed to the correct 
destination network. The local table of the host typically 
contains: 
 Direct connection 
 Local network route 
 Local default route 
R 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Host Routing Tables 
IPv4 Host Routing Table 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Host Routing Tables 
Sample IPv4 Host Routing Table 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Host Routing Tables 
Sample IPv6 Host Routing Table 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Router Routing Tables 
Router Packet Forwarding Decision 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Router Routing Tables 
IPv4 Router Routing Table 
192.168.10.0/24 
R2 
192.168.11.0/24 
10.1.1.0/24 
10.1.2.0/24 
209.165.200.224 /30 
.226 
.10 
.10 
.1 
.225 
S0/0/0 
G0/0 
.1 
R1 
.1 .1 
G0/1 
R1#show ip route 
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP 
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area 
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP 
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area 
* - candidate default, U - per-user static route, o - ODR 
P - periodic downloaded static route 
Gateway of last resort is not set 
10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks 
D 10.1.1.0/24 [90/2170112] via 209.165.200.226, 00:00:05, Serial0/0/0 
D 10.1.2.0/24 [90/2170112] via 209.165.200.226, 00:00:05, Serial0/0/0 
192.168.10.0/24 is variably subnetted, 2 subnets, 3 masks 
C 192.168.10.0/24 is directly connected, GigabitEthernet0/0 
L 192.168.10.1/32 is directly connected, GigabitEthernet0/0 
192.168.11.0/24 is variably subnetted, 2 subnets, 3 masks 
C 192.168.11.0/24 is directly connected, GigabitEthernet0/1 
L 192.168.11.1/32 is directly connected, GigabitEthernet0/1 
209.165.200.0/24 is variably subnetted, 2 subnets, 3 masks 
C 209.165.200.224/30 is directly connected, Serial0/0/0 
L 209.165.200.225/32 is directly connected, Serial0/0/0 
R1# 
.10 
.10 
PC1 
PC2 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Router Routing Tables 
Directly Connected Routing Table Entries 
192.168.10.0/24 
64.100.0.1 
R2 
192.168.11.0/24 
10.1.1.0/24 
10.1.2.0/24 
209.165.200.224 /30 
.226 
.10 
.10 
.1 
.1 
G0/0 
.1 
.1 
G0/1 
.225 
S0/0/0 
R1 
A B C 
.10 
.10 
C 192.168.10.0/24 is directly connected, GigabitEthernet0/0 
L 192.168.10.1/32 is directly connected, GigabitEthernet0/0 
A Identifies how the network was learned by the router. 
B Identifies the destination network and how it is connected. 
C Identifies the interface on the router connected to the destination network. 
PC1 
PC2 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Router Routing Tables 
Remote Network Routing Table Entries 
192.168.10.0/24 
64.100.0.1 
R2 
192.168.11.0/24 
10.1.1.0/24 
10.1.2.0/24 
209.165.200.224 /30 
.226 
.10 
.10 
.10 
.10 
.1 
.1 
G0/0 
.1 
.1 
G0/1 
.225 
S0/0/0 
R1 
PC1 
PC2 
D 10.1.1.0/24 [90/2170112] via 209.165.200.226, 00:00:05, Serial0/0/0 
A Identifies how the network was learned by the router. 
B Identifies the destination network. 
C Identifies the administrative distance (trustworthiness) of the route source. 
D Identifies the metric to reach the remote network. 
E Identifies the next hop IP address to reach the remote network. 
F Identifies the amount of elapsed time since the network was discovered. 
G Identifies the outgoing interface on the router to reach the destination network. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Router Routing Tables 
Next-Hop Address 
192.168.10.0/24 
64.100.0.1 
R2 
192.168.11.0/24 
10.1.1.0/24 
10.1.2.0/24 
209.165.200.224 /30 
.226 
.10 
.10 
.10 
.10 
.1 
.1 
G0/0 
.1 
.1 
G0/1 
.225 
S0/0/0 
R1 
PC1 
PC2 
R1#show ip route 
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP 
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area 
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP 
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area 
* - candidate default, U - per-user static route, o - ODR 
P - periodic downloaded static route 
Gateway of last resort is not set 
10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks 
D 10.1.1.0/24 [90/2170112] via 209.165.200.226, 00:00:05, Serial0/0/0 
D 10.1.2.0/24 [90/2170112] via 209.165.200.226, 00:00:05, Serial0/0/0 
192.168.10.0/24 is variably subnetted, 2 subnets, 3 masks 
C 192.168.10.0/24 is directly connected, GigabitEthernet0/0 
L 192.168.10.1/32 is directly connected, GigabitEthernet0/0 
192.168.11.0/24 is variably subnetted, 2 subnets, 3 masks 
C 192.168.11.0/24 is directly connected, GigabitEthernet0/1 
L 192.168.11.1/32 is directly connected, GigabitEthernet0/1 
209.165.200.0/24 is variably subnetted, 2 subnets, 3 masks 
C 209.165.200.224/30 is directly connected, Serial0/0/0 
L 209.165.200.225/32 is directly connected, Serial0/0/0 
R1# 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Routers 
Anatomy of a Router 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Anatomy of a Router 
A Router is a Computer 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Anatomy of a Router 
Router CPU and OS 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Anatomy of a Router 
Router Memory 
Memory 
Volatile / 
Non-Volatile 
Stores 
RAM Volatile 
• Running IOS 
• Running configuration file 
• IP routing and ARP tables 
• Packet buffer 
ROM Non-Volatile 
• Bootup instructions 
• Basic diagnostic software 
• Limited IOS 
NVRAM Non-Volatile • Startup configuration file 
Flash Non-Volatile 
• IOS 
• Other system files 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Anatomy of a Router 
Inside a Router 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
Anatomy of a Router 
Router Backplane 
Double-wide eHWIC slots eHWIC 0 AUX 
Two 4 GB flash card slots 
port 
LAN 
interfaces 
USB 
Ports 
Console 
RJ45 
Console 
USB Type B 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
Anatomy of a Router 
Connecting to a Router 
WAN 
Interface 
AUX 
port 
LAN 
interfaces 
Console 
RJ45 
Console 
USB Type B 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
Anatomy of a Router 
LAN and WAN Interfaces 
Serial interfaces 
LAN interfaces 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
Router Boot-up 
Cisco IOS 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
Router Boot-up 
Bootset Files 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
Router Boot-up 
Router Bootup Process 
1.Perform the POST 
bootstrap program 
2.Locate and load the 
Cisco IOS software 
3.Locate and load the 
startup configuration 
System Bootstrap, Version 15.0(1r)M15, RELEASE SOFTWARE (fc1) 
Technical Support: http://www.cisco.com/techsupport 
<output omitted> 
and load the 
file or enter setup 
mode 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
Router Boot-up 
Show Versions Output 
Router# show version 
Cisco IOS Software, C1900 Software (C1900-UNIVERSALK9-M), Version 15.2(4)M1, RELEASE SOFTWARE (fc1) 
Technical Support: http://www.cisco.com/techsupport 
Copyright (c) 1986-2012 by Cisco Systems, Inc. 
Compiled Thu 26-Jul-12 19:34 by prod_rel_team 
ROM: System Bootstrap, Version 15.0(1r)M15, RELEASE SOFTWARE (fc1) 
Router uptime is 10 hours, 9 minutes 
System returned to ROM by power-on 
System image file is "flash0:c1900-universalk9-mz.SPA.152-4.M1.bin" 
Last reload type: Normal Reload 
Last reload reason: power-on 
<Output omitted> 
Cisco CISCO1941/K9 (revision 1.0) with 446464K/77824K bytes of memory. 
Processor board ID FTX1636848Z 
2 Gigabit Ethernet interfaces 
2 Serial(sync/async) interfaces 
1 terminal line 
DRAM configuration is 64 bits wide with parity disabled. 
255K bytes of non-volatile configuration memory. 
250880K bytes of ATA System CompactFlash 0 (Read/Write) 
<Output omitted> 
Technology Package License Information for Module:'c1900' 
----------------------------------------------------------------- 
Technology Technology-package Technology-package 
Current Type Next reboot 
------------------------------------------------------------------ 
ipbase ipbasek9 Permanent ipbasek9 
security None None None 
data None None None 
Configuration register is 0x2142 (will be 0x2102 at next reload) 
Router# 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
Network Layer 
Configuring a Cisco Router 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
Configure Initial Settings 
Router Configuration Steps 
192.168.10.0/24 
192.168.11.0/24 
209.165.200.224 /30 
.10 
.10 
.225 
S0/0/0 
G0/0 
.1 
R1 
.1 .1 
G0/1 
PC1 
PC2 
Router> enable 
Router# configure terminal 
Enter configuration commands, one per line. 
End with CNTL/Z. 
Router(config)# hostname R1 
R1(config)# 
R2 
10.1.1.0/24 
10.1.2.0/24 
.226 
.10 
.10 
.1 
Router> en 
Router# conf t 
Enter configuration commands, one per line. 
End with CNTL/Z. 
Router(config)# ho R1 
R2(config)# 
OR 
R1(config)# enable secret class 
R1(config)# 
R1(config)# line console 0 
R1(config-line)# password cisco 
R1(config-line)# login 
R1(config-line)# exit 
R1(config)# 
R1(config)# line vty 0 4 
R1(config-line)# password cisco 
R1(config-line)# login 
R1(config-line)# exit 
R1(config)# 
R1(config)# service password-encryption 
R1(config)# 
R1(config)# banner motd # 
Enter TEXT message. End with the character '#'. 
*********************************************** 
WARNING: Unauthorized access is prohibited! 
*********************************************** 
# 
R1(config)# 
R1# copy running-config startup-config 
Destination filename [startup-config]? 
Building configuration... 
[OK] 
R1# 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
Configure Interfaces 
Configure LAN Interfaces 
192.168.10.0/24 
R2 
192.168.11.0/24 
10.1.1.0/24 
10.1.2.0/24 
209.165.200.224 /30 
.226 
.10 
.10 
.10 
.10 
.1 
.225 
S0/0/0 
G0/0 
.1 
R1 
.1 .1 
G0/1 
PC1 
PC2 
R1# conf t 
Enter configuration commands, one per line. End with CNTL/Z. 
R1(config)# 
R1(config)# interface gigabitethernet 0/0 
R1(config-if)# ip address 192.168.10.1 255.255.255.0 
R1(config-if)# description Link to LAN-10 
R1(config-if)# no shutdown 
%LINK-5-CHANGED: Interface GigabitEthernet0/0, changed state to up 
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0, 
changed state to up 
R1(config-if)# exit 
R1(config)# 
R1(config)# int g0/1 
R1(config-if)# ip add 192.168.11.1 255.255.255.0 
R1(config-if)# des Link to LAN-11 
R1(config-if)# no shut 
%LINK-5-CHANGED: Interface GigabitEthernet0/1, changed state to up 
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1, 
changed state to up 
R1(config-if)# exit 
R1(config)# 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
Configure Interfaces 
Verify Interface Configuration 
192.168.10.0/24 
R2 
192.168.11.0/24 
10.1.1.0/24 
10.1.2.0/24 
209.165.200.224 /30 
.226 
.10 
.10 
.10 
.10 
.1 
.225 
S0/0/0 
G0/0 
.1 
R1 
.1 .1 
G0/1 
PC1 
PC2 
R1# show ip interface brief 
Interface IP-Address OK? Method Status Protocol 
GigabitEthernet0/0 192.168.10.1 YES manual up up 
GigabitEthernet0/1 192.168.11.1 YES manual up up 
Serial0/0/0 209.165.200.225 YES manual up up 
Serial0/0/1 unassigned YES NVRAM administratively down down 
Vlan1 unassigned YES NVRAM administratively down down 
R1# 
R1# ping 209.165.200.226 
Type escape sequence to abort. 
Sending 5, 100-byte ICMP Echos to 209.165.200.226, timeout is 2 seconds: 
!!!!! 
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/9 ms 
R1# 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
Configuring a Cisco Router 
Configuring the Default Gateway 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
Configuring the Default Gateway 
Default Gateway on a Host 
192.168.10.0/24 
192.168.11.0/24 
.1 
G0/0 
R1 
G0/1 
.1 
.10 
PC1 
.10 
PC2 
.10 
.10 
PC3 
PC4 
192.168.10.0/24 
192.168.11.0/24 
.1 
G0/0 
R1 
G0/1 
.1 
.10 
PC1 
.11 
PC2 
.10 
.11 
PC3 
PC4 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
Configuring the Default Gateway 
Default Gateway on a Switch 
192.168.11.0/24 
.1 
G0/1 
.1 
192.168.10.0/24 
G0/0 R1 
.10 
PC1 
.11 
PC2 
S1#show running-config 
Building configuration... 
! 
<output omitted> 
service password-encryption 
! 
hostname S1 
! 
Interface Vlan1 
ip address 192.168.10.50 
! 
ip default-gateway 192.168.10.1 
<output omitted> 
S1 
S2 
.50 
If the default gateway were not configured on S1, response 
packets from S1 would not be able to reach the 
administrator at 192.168.11.10. The administrator would not 
be able to mange the device remotely. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
Network Layer 
Summary 
In this chapter, you learned: 
 The network layer, or OSI Layer 3, provides services to allow 
end devices to exchange data across the network. 
 The network layer uses four basic processes: IP addressing 
for end devices, encapsulation, routing, and de-encapsulation. 
 The Internet is largely based on IPv4, which is still the most 
widely-used network layer protocol. 
 An IPv4 packet contains the IP header and the payload. 
 The IPv6 simplified header offers several advantages over 
IPv4, including better routing efficiency, simplified extension 
headers, and capability for per-flow processing. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51
Network Layer 
Summary 
In this chapter, you learned: 
 In addition to hierarchical addressing, the network layer is 
also responsible for routing. 
 Hosts require a local routing table to ensure that packets are 
directed to the correct destination network. 
 The local default route is the route to the default gateway. 
 The default gateway is the IP address of a router interface 
connected to the local network. 
 When a router, such as the default gateway, receives a 
packet, it examines the destination IP address to determine 
the destination network. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52
Network Layer 
Summary 
In this chapter, you learned: 
 The routing table of a router stores information about directly-connected 
routes and remote routes to IP networks. If the 
router has an entry in its routing table for the destination 
network, the router forwards the packet. If no routing entry 
exists, the router may forward the packet to its own default 
route, if one is configured, or it will drop the packet. 
 Routing table entries can be configured manually on each 
router to provide static routing or the routers may 
communicate route information dynamically between each 
other using a routing protocol. 
 In order for routers to be reachable, the router interface must 
be configured. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54

Weitere ähnliche Inhalte

Was ist angesagt?

CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5Nil Menon
 
CCNA 200-301 VOLUME 2.pdf
CCNA 200-301 VOLUME 2.pdfCCNA 200-301 VOLUME 2.pdf
CCNA 200-301 VOLUME 2.pdfbekhti
 
Basic ASA Configuration, NAT in ASA Firewall
Basic ASA Configuration,NAT in ASA FirewallBasic ASA Configuration,NAT in ASA Firewall
Basic ASA Configuration, NAT in ASA Firewall NetProtocol Xpert
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2Nil Menon
 
Configuring GRE Tunnel Through a Cisco ASA Firewall
Configuring GRE Tunnel Through a Cisco ASA FirewallConfiguring GRE Tunnel Through a Cisco ASA Firewall
Configuring GRE Tunnel Through a Cisco ASA FirewallHarris Andrea
 
101 CCNA Labs with Solutions.pdf
101 CCNA Labs with Solutions.pdf101 CCNA Labs with Solutions.pdf
101 CCNA Labs with Solutions.pdfBiVnHu1
 
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERSSITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS NetProtocol Xpert
 
Pengenalan mikrotik revisi
Pengenalan mikrotik revisiPengenalan mikrotik revisi
Pengenalan mikrotik revisiCuhendra C
 
Configuring InterVLAN Routing on Cisco Router
Configuring InterVLAN Routing on Cisco RouterConfiguring InterVLAN Routing on Cisco Router
Configuring InterVLAN Routing on Cisco RouterI Putu Hariyadi
 
Virtual Routing and Forwarding, (VRF-lite)
Virtual Routing and Forwarding, (VRF-lite)Virtual Routing and Forwarding, (VRF-lite)
Virtual Routing and Forwarding, (VRF-lite)NetProtocol Xpert
 
PLNOG 13: Krzysztof Konkowski: Cisco Access Architectures: GPON, Ethernet, Ac...
PLNOG 13: Krzysztof Konkowski: Cisco Access Architectures: GPON, Ethernet, Ac...PLNOG 13: Krzysztof Konkowski: Cisco Access Architectures: GPON, Ethernet, Ac...
PLNOG 13: Krzysztof Konkowski: Cisco Access Architectures: GPON, Ethernet, Ac...PROIDEA
 

Was ist angesagt? (20)

Vpn
VpnVpn
Vpn
 
HSRP ccna
HSRP ccna HSRP ccna
HSRP ccna
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5
 
CCNA 200-301 VOLUME 2.pdf
CCNA 200-301 VOLUME 2.pdfCCNA 200-301 VOLUME 2.pdf
CCNA 200-301 VOLUME 2.pdf
 
Mtcna mikrotik informatix
Mtcna mikrotik informatixMtcna mikrotik informatix
Mtcna mikrotik informatix
 
Tutorial VoIP
Tutorial VoIPTutorial VoIP
Tutorial VoIP
 
DMVPN
DMVPNDMVPN
DMVPN
 
IPsec vpn
IPsec vpnIPsec vpn
IPsec vpn
 
Basic ASA Configuration, NAT in ASA Firewall
Basic ASA Configuration,NAT in ASA FirewallBasic ASA Configuration,NAT in ASA Firewall
Basic ASA Configuration, NAT in ASA Firewall
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2
 
Configuring GRE Tunnel Through a Cisco ASA Firewall
Configuring GRE Tunnel Through a Cisco ASA FirewallConfiguring GRE Tunnel Through a Cisco ASA Firewall
Configuring GRE Tunnel Through a Cisco ASA Firewall
 
101 CCNA Labs with Solutions.pdf
101 CCNA Labs with Solutions.pdf101 CCNA Labs with Solutions.pdf
101 CCNA Labs with Solutions.pdf
 
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERSSITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
 
Pengenalan mikrotik revisi
Pengenalan mikrotik revisiPengenalan mikrotik revisi
Pengenalan mikrotik revisi
 
Configuring InterVLAN Routing on Cisco Router
Configuring InterVLAN Routing on Cisco RouterConfiguring InterVLAN Routing on Cisco Router
Configuring InterVLAN Routing on Cisco Router
 
Virtual Routing and Forwarding, (VRF-lite)
Virtual Routing and Forwarding, (VRF-lite)Virtual Routing and Forwarding, (VRF-lite)
Virtual Routing and Forwarding, (VRF-lite)
 
PLNOG 13: Krzysztof Konkowski: Cisco Access Architectures: GPON, Ethernet, Ac...
PLNOG 13: Krzysztof Konkowski: Cisco Access Architectures: GPON, Ethernet, Ac...PLNOG 13: Krzysztof Konkowski: Cisco Access Architectures: GPON, Ethernet, Ac...
PLNOG 13: Krzysztof Konkowski: Cisco Access Architectures: GPON, Ethernet, Ac...
 
CCNA CheatSheet
CCNA CheatSheetCCNA CheatSheet
CCNA CheatSheet
 
Router commands
Router commandsRouter commands
Router commands
 
ip-address.ppt
ip-address.pptip-address.ppt
ip-address.ppt
 

Andere mochten auch

VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2Irsandi Hasan
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4Irsandi Hasan
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5Irsandi Hasan
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3Irsandi Hasan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11Irsandi Hasan
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8Irsandi Hasan
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9Irsandi Hasan
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1Irsandi Hasan
 
CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11Irsandi Hasan
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10Irsandi Hasan
 
ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9Irsandi Hasan
 
CCNA Exploration 4 - Chapter 4
CCNA Exploration 4 - Chapter 4CCNA Exploration 4 - Chapter 4
CCNA Exploration 4 - Chapter 4Irsandi Hasan
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8Irsandi Hasan
 
CCNA Exploration 4 - Chapter 5
CCNA Exploration 4 - Chapter 5CCNA Exploration 4 - Chapter 5
CCNA Exploration 4 - Chapter 5Irsandi Hasan
 
CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7Irsandi Hasan
 
ITE v5.0 - Chapter 7
ITE v5.0 - Chapter 7ITE v5.0 - Chapter 7
ITE v5.0 - Chapter 7Irsandi Hasan
 

Andere mochten auch (20)

VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1
 
IPv6 Static Routes
IPv6 Static RoutesIPv6 Static Routes
IPv6 Static Routes
 
CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10
 
ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9
 
CCNA Exploration 4 - Chapter 4
CCNA Exploration 4 - Chapter 4CCNA Exploration 4 - Chapter 4
CCNA Exploration 4 - Chapter 4
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
 
CCNA Exploration 4 - Chapter 5
CCNA Exploration 4 - Chapter 5CCNA Exploration 4 - Chapter 5
CCNA Exploration 4 - Chapter 5
 
CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7
 
ITE v5.0 - Chapter 7
ITE v5.0 - Chapter 7ITE v5.0 - Chapter 7
ITE v5.0 - Chapter 7
 

Ähnlich wie CCNA RS_ITN - Chapter 6

CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6Irsandi Hasan
 
Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6Hamza Malik
 
Chapter 6 : Network layer
Chapter 6 : Network layerChapter 6 : Network layer
Chapter 6 : Network layerteknetir
 
Chapter 06 - Network Layer
Chapter 06 - Network LayerChapter 06 - Network Layer
Chapter 06 - Network LayerYaser Rahmati
 
CCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network LayerCCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network LayerVuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6Nil Menon
 
57798_Lectures1415.pptx
57798_Lectures1415.pptx57798_Lectures1415.pptx
57798_Lectures1415.pptxSheerazAli55
 
Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Hamza Malik
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsVuz Dở Hơi
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalFisal Anwari
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsYaser Rahmati
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8Nil Menon
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing conceptsteknetir
 
Chapter 08 - IP Addressing
Chapter 08 - IP AddressingChapter 08 - IP Addressing
Chapter 08 - IP AddressingYaser Rahmati
 
CCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip AddressingCCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip AddressingVuz Dở Hơi
 
Chapter 8 : IP addressing
Chapter 8 : IP addressingChapter 8 : IP addressing
Chapter 8 : IP addressingteknetir
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
 
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6cyberjoex
 

Ähnlich wie CCNA RS_ITN - Chapter 6 (20)

CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
Itn instructor ppt_chapter6_network_layer
Itn instructor ppt_chapter6_network_layerItn instructor ppt_chapter6_network_layer
Itn instructor ppt_chapter6_network_layer
 
Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6
 
Chapter 6 : Network layer
Chapter 6 : Network layerChapter 6 : Network layer
Chapter 6 : Network layer
 
Chapter 06 - Network Layer
Chapter 06 - Network LayerChapter 06 - Network Layer
Chapter 06 - Network Layer
 
CCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network LayerCCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network Layer
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
 
57798_Lectures1415.pptx
57798_Lectures1415.pptx57798_Lectures1415.pptx
57798_Lectures1415.pptx
 
Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_final
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing Concepts
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing concepts
 
Chapter 08 - IP Addressing
Chapter 08 - IP AddressingChapter 08 - IP Addressing
Chapter 08 - IP Addressing
 
CCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip AddressingCCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip Addressing
 
Chapter 8 : IP addressing
Chapter 8 : IP addressingChapter 8 : IP addressing
Chapter 8 : IP addressing
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6
 

Mehr von Irsandi Hasan

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10Irsandi Hasan
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9Irsandi Hasan
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1Irsandi Hasan
 

Mehr von Irsandi Hasan (15)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
 

Kürzlich hochgeladen

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 

Kürzlich hochgeladen (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

CCNA RS_ITN - Chapter 6

  • 1. Chapter 6: Network Layer Introduction to Networks © 2008 Cisco Systems, Inc. All Presentation_ID rights reserved. Cisco Confidential 1
  • 2. Chapter 6: Objectives Students will be able to:  Explain how network layer protocols and services support communications across data networks.  Explain how routers enable end-to-end connectivity in a small to medium-sized business network.  Determine the appropriate device to route traffic in a small to medium-sized business network.  Configure a router with basic configurations. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
  • 3. Chapter 6 6.1 Network Layer Protocols 6.2 Routing 6.3 Routers 6.4 Configuring a Cisco Router 6.5 Summary Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  • 4. Network Layer Network Layer Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
  • 5. Network Layer Protocols Network Layer in Communication Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
  • 6. Network Layer in Communication The Network Layer End to End Transport processes  Addressing end devices  Encapsulation  Routing  De-encapsulating Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
  • 7. Network Layer in Communication Network Layer Protocols Common Network Layer Protocols  Internet Protocol version 4 (IPv4)  Internet Protocol version 6 (IPv6) Legacy Network Layer Protocols  Novell Internetwork Packet Exchange (IPX)  AppleTalk  Connectionless Network Service (CLNS/DECNet) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
  • 8. Characteristics of the IP protocol Characteristics of IP Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
  • 9. Characteristics of the IP protocol IP - Connectionless Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
  • 10. Characteristics of the IP protocol IP – Best Effort Delivery Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
  • 11. Characteristics of the IP protocol IP – Media Independent Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
  • 12. IPv4 Packet Encapsulating IP Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
  • 13. IPv4 Packet IPv4 Packet Header Version, Differentiated Services (DS), Time-to-Live (TTL),Protocol, Source IP Address, Destination IP Address Byte 1 Byte 2 Byte 3 Byte 4 Version IP Header Length Differentiated Services Total Length DSCP ECN Identification Flag Fragment Offset Time To Live Protocol Header Checksum Source IP Address Destination IP Address Options (optional) Padding Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
  • 14. IPv4 Packet IPv4 Header Fields Internet Header Length (IHL), Total Length, Header Checksum, Identification, Flags, Fragment Offset Byte 1 Byte 2 Byte 3 Byte 4 Version IP Header Length Differentiated Services Total Length DSCP ECN Identification Flag Fragment Offset Time To Live Protocol Header Checksum Source IP Address Destination IP Address Options (optional) Padding Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
  • 15. IPv4 Packet Sample IPv4 Headers Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
  • 16. Network Layer in Communication Limitations of IPv4  IP Address depletion  Internet routing table expansion  Lack of end-to-end connectivity Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
  • 17. Network Layer in Communication Introducing IPv6  Increased address space  Improved packet handling  Eliminates the need for NAT  Integrated security  4 billion IPv4 addresses 4,000,000,000  340 undecillion IPv6 addresses 340,000,000,000,000,000,000,000,000,000,000,000,000 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
  • 18. IPv6 Packet Encapsulating IPv6 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
  • 19. IPv6 Packet IPv6 Packet Header Byte 1 Byte 2 Byte 3 Byte 4 Version Traffic Class Flow Label Payload Length Next Header Hop Limit Source IP Address Destination IP Address Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
  • 20. IPv6 Packet Sample IPv6 Header Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
  • 21. Routing Host Routing Tables Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
  • 22. Host Routing Tables Host Packet Forwarding Decision Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
  • 23. Host Routing Tables Default Gateway Hosts must maintain their own, local, routing table to ensure that network layer packets are directed to the correct destination network. The local table of the host typically contains:  Direct connection  Local network route  Local default route R Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
  • 24. Host Routing Tables IPv4 Host Routing Table Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
  • 25. Host Routing Tables Sample IPv4 Host Routing Table Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
  • 26. Host Routing Tables Sample IPv6 Host Routing Table Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
  • 27. Router Routing Tables Router Packet Forwarding Decision Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
  • 28. Router Routing Tables IPv4 Router Routing Table 192.168.10.0/24 R2 192.168.11.0/24 10.1.1.0/24 10.1.2.0/24 209.165.200.224 /30 .226 .10 .10 .1 .225 S0/0/0 G0/0 .1 R1 .1 .1 G0/1 R1#show ip route Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static route Gateway of last resort is not set 10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks D 10.1.1.0/24 [90/2170112] via 209.165.200.226, 00:00:05, Serial0/0/0 D 10.1.2.0/24 [90/2170112] via 209.165.200.226, 00:00:05, Serial0/0/0 192.168.10.0/24 is variably subnetted, 2 subnets, 3 masks C 192.168.10.0/24 is directly connected, GigabitEthernet0/0 L 192.168.10.1/32 is directly connected, GigabitEthernet0/0 192.168.11.0/24 is variably subnetted, 2 subnets, 3 masks C 192.168.11.0/24 is directly connected, GigabitEthernet0/1 L 192.168.11.1/32 is directly connected, GigabitEthernet0/1 209.165.200.0/24 is variably subnetted, 2 subnets, 3 masks C 209.165.200.224/30 is directly connected, Serial0/0/0 L 209.165.200.225/32 is directly connected, Serial0/0/0 R1# .10 .10 PC1 PC2 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
  • 29. Router Routing Tables Directly Connected Routing Table Entries 192.168.10.0/24 64.100.0.1 R2 192.168.11.0/24 10.1.1.0/24 10.1.2.0/24 209.165.200.224 /30 .226 .10 .10 .1 .1 G0/0 .1 .1 G0/1 .225 S0/0/0 R1 A B C .10 .10 C 192.168.10.0/24 is directly connected, GigabitEthernet0/0 L 192.168.10.1/32 is directly connected, GigabitEthernet0/0 A Identifies how the network was learned by the router. B Identifies the destination network and how it is connected. C Identifies the interface on the router connected to the destination network. PC1 PC2 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
  • 30. Router Routing Tables Remote Network Routing Table Entries 192.168.10.0/24 64.100.0.1 R2 192.168.11.0/24 10.1.1.0/24 10.1.2.0/24 209.165.200.224 /30 .226 .10 .10 .10 .10 .1 .1 G0/0 .1 .1 G0/1 .225 S0/0/0 R1 PC1 PC2 D 10.1.1.0/24 [90/2170112] via 209.165.200.226, 00:00:05, Serial0/0/0 A Identifies how the network was learned by the router. B Identifies the destination network. C Identifies the administrative distance (trustworthiness) of the route source. D Identifies the metric to reach the remote network. E Identifies the next hop IP address to reach the remote network. F Identifies the amount of elapsed time since the network was discovered. G Identifies the outgoing interface on the router to reach the destination network. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
  • 31. Router Routing Tables Next-Hop Address 192.168.10.0/24 64.100.0.1 R2 192.168.11.0/24 10.1.1.0/24 10.1.2.0/24 209.165.200.224 /30 .226 .10 .10 .10 .10 .1 .1 G0/0 .1 .1 G0/1 .225 S0/0/0 R1 PC1 PC2 R1#show ip route Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static route Gateway of last resort is not set 10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks D 10.1.1.0/24 [90/2170112] via 209.165.200.226, 00:00:05, Serial0/0/0 D 10.1.2.0/24 [90/2170112] via 209.165.200.226, 00:00:05, Serial0/0/0 192.168.10.0/24 is variably subnetted, 2 subnets, 3 masks C 192.168.10.0/24 is directly connected, GigabitEthernet0/0 L 192.168.10.1/32 is directly connected, GigabitEthernet0/0 192.168.11.0/24 is variably subnetted, 2 subnets, 3 masks C 192.168.11.0/24 is directly connected, GigabitEthernet0/1 L 192.168.11.1/32 is directly connected, GigabitEthernet0/1 209.165.200.0/24 is variably subnetted, 2 subnets, 3 masks C 209.165.200.224/30 is directly connected, Serial0/0/0 L 209.165.200.225/32 is directly connected, Serial0/0/0 R1# Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
  • 32. Routers Anatomy of a Router Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
  • 33. Anatomy of a Router A Router is a Computer Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
  • 34. Anatomy of a Router Router CPU and OS Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
  • 35. Anatomy of a Router Router Memory Memory Volatile / Non-Volatile Stores RAM Volatile • Running IOS • Running configuration file • IP routing and ARP tables • Packet buffer ROM Non-Volatile • Bootup instructions • Basic diagnostic software • Limited IOS NVRAM Non-Volatile • Startup configuration file Flash Non-Volatile • IOS • Other system files Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
  • 36. Anatomy of a Router Inside a Router Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
  • 37. Anatomy of a Router Router Backplane Double-wide eHWIC slots eHWIC 0 AUX Two 4 GB flash card slots port LAN interfaces USB Ports Console RJ45 Console USB Type B Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
  • 38. Anatomy of a Router Connecting to a Router WAN Interface AUX port LAN interfaces Console RJ45 Console USB Type B Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
  • 39. Anatomy of a Router LAN and WAN Interfaces Serial interfaces LAN interfaces Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
  • 40. Router Boot-up Cisco IOS Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
  • 41. Router Boot-up Bootset Files Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
  • 42. Router Boot-up Router Bootup Process 1.Perform the POST bootstrap program 2.Locate and load the Cisco IOS software 3.Locate and load the startup configuration System Bootstrap, Version 15.0(1r)M15, RELEASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport <output omitted> and load the file or enter setup mode Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
  • 43. Router Boot-up Show Versions Output Router# show version Cisco IOS Software, C1900 Software (C1900-UNIVERSALK9-M), Version 15.2(4)M1, RELEASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2012 by Cisco Systems, Inc. Compiled Thu 26-Jul-12 19:34 by prod_rel_team ROM: System Bootstrap, Version 15.0(1r)M15, RELEASE SOFTWARE (fc1) Router uptime is 10 hours, 9 minutes System returned to ROM by power-on System image file is "flash0:c1900-universalk9-mz.SPA.152-4.M1.bin" Last reload type: Normal Reload Last reload reason: power-on <Output omitted> Cisco CISCO1941/K9 (revision 1.0) with 446464K/77824K bytes of memory. Processor board ID FTX1636848Z 2 Gigabit Ethernet interfaces 2 Serial(sync/async) interfaces 1 terminal line DRAM configuration is 64 bits wide with parity disabled. 255K bytes of non-volatile configuration memory. 250880K bytes of ATA System CompactFlash 0 (Read/Write) <Output omitted> Technology Package License Information for Module:'c1900' ----------------------------------------------------------------- Technology Technology-package Technology-package Current Type Next reboot ------------------------------------------------------------------ ipbase ipbasek9 Permanent ipbasek9 security None None None data None None None Configuration register is 0x2142 (will be 0x2102 at next reload) Router# Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
  • 44. Network Layer Configuring a Cisco Router Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
  • 45. Configure Initial Settings Router Configuration Steps 192.168.10.0/24 192.168.11.0/24 209.165.200.224 /30 .10 .10 .225 S0/0/0 G0/0 .1 R1 .1 .1 G0/1 PC1 PC2 Router> enable Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# hostname R1 R1(config)# R2 10.1.1.0/24 10.1.2.0/24 .226 .10 .10 .1 Router> en Router# conf t Enter configuration commands, one per line. End with CNTL/Z. Router(config)# ho R1 R2(config)# OR R1(config)# enable secret class R1(config)# R1(config)# line console 0 R1(config-line)# password cisco R1(config-line)# login R1(config-line)# exit R1(config)# R1(config)# line vty 0 4 R1(config-line)# password cisco R1(config-line)# login R1(config-line)# exit R1(config)# R1(config)# service password-encryption R1(config)# R1(config)# banner motd # Enter TEXT message. End with the character '#'. *********************************************** WARNING: Unauthorized access is prohibited! *********************************************** # R1(config)# R1# copy running-config startup-config Destination filename [startup-config]? Building configuration... [OK] R1# Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
  • 46. Configure Interfaces Configure LAN Interfaces 192.168.10.0/24 R2 192.168.11.0/24 10.1.1.0/24 10.1.2.0/24 209.165.200.224 /30 .226 .10 .10 .10 .10 .1 .225 S0/0/0 G0/0 .1 R1 .1 .1 G0/1 PC1 PC2 R1# conf t Enter configuration commands, one per line. End with CNTL/Z. R1(config)# R1(config)# interface gigabitethernet 0/0 R1(config-if)# ip address 192.168.10.1 255.255.255.0 R1(config-if)# description Link to LAN-10 R1(config-if)# no shutdown %LINK-5-CHANGED: Interface GigabitEthernet0/0, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0, changed state to up R1(config-if)# exit R1(config)# R1(config)# int g0/1 R1(config-if)# ip add 192.168.11.1 255.255.255.0 R1(config-if)# des Link to LAN-11 R1(config-if)# no shut %LINK-5-CHANGED: Interface GigabitEthernet0/1, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1, changed state to up R1(config-if)# exit R1(config)# Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
  • 47. Configure Interfaces Verify Interface Configuration 192.168.10.0/24 R2 192.168.11.0/24 10.1.1.0/24 10.1.2.0/24 209.165.200.224 /30 .226 .10 .10 .10 .10 .1 .225 S0/0/0 G0/0 .1 R1 .1 .1 G0/1 PC1 PC2 R1# show ip interface brief Interface IP-Address OK? Method Status Protocol GigabitEthernet0/0 192.168.10.1 YES manual up up GigabitEthernet0/1 192.168.11.1 YES manual up up Serial0/0/0 209.165.200.225 YES manual up up Serial0/0/1 unassigned YES NVRAM administratively down down Vlan1 unassigned YES NVRAM administratively down down R1# R1# ping 209.165.200.226 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 209.165.200.226, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/9 ms R1# Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
  • 48. Configuring a Cisco Router Configuring the Default Gateway Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
  • 49. Configuring the Default Gateway Default Gateway on a Host 192.168.10.0/24 192.168.11.0/24 .1 G0/0 R1 G0/1 .1 .10 PC1 .10 PC2 .10 .10 PC3 PC4 192.168.10.0/24 192.168.11.0/24 .1 G0/0 R1 G0/1 .1 .10 PC1 .11 PC2 .10 .11 PC3 PC4 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
  • 50. Configuring the Default Gateway Default Gateway on a Switch 192.168.11.0/24 .1 G0/1 .1 192.168.10.0/24 G0/0 R1 .10 PC1 .11 PC2 S1#show running-config Building configuration... ! <output omitted> service password-encryption ! hostname S1 ! Interface Vlan1 ip address 192.168.10.50 ! ip default-gateway 192.168.10.1 <output omitted> S1 S2 .50 If the default gateway were not configured on S1, response packets from S1 would not be able to reach the administrator at 192.168.11.10. The administrator would not be able to mange the device remotely. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
  • 51. Network Layer Summary In this chapter, you learned:  The network layer, or OSI Layer 3, provides services to allow end devices to exchange data across the network.  The network layer uses four basic processes: IP addressing for end devices, encapsulation, routing, and de-encapsulation.  The Internet is largely based on IPv4, which is still the most widely-used network layer protocol.  An IPv4 packet contains the IP header and the payload.  The IPv6 simplified header offers several advantages over IPv4, including better routing efficiency, simplified extension headers, and capability for per-flow processing. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51
  • 52. Network Layer Summary In this chapter, you learned:  In addition to hierarchical addressing, the network layer is also responsible for routing.  Hosts require a local routing table to ensure that packets are directed to the correct destination network.  The local default route is the route to the default gateway.  The default gateway is the IP address of a router interface connected to the local network.  When a router, such as the default gateway, receives a packet, it examines the destination IP address to determine the destination network. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52
  • 53. Network Layer Summary In this chapter, you learned:  The routing table of a router stores information about directly-connected routes and remote routes to IP networks. If the router has an entry in its routing table for the destination network, the router forwards the packet. If no routing entry exists, the router may forward the packet to its own default route, if one is configured, or it will drop the packet.  Routing table entries can be configured manually on each router to provide static routing or the routers may communicate route information dynamically between each other using a routing protocol.  In order for routers to be reachable, the router interface must be configured. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53
  • 54. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54