You are on page 1of 23

SEMINAR

REPORT

ON

CCNA

© 2003, Cisco Systems, Inc. All rights reserved.


Networking Device Icons

2
Router
Routers have all capabilities of the previous devices. Routers
can regenerate signals, concentrate multiple connections,
convert data transmission formats, and manage data
transfers.They can also connect to a WAN, which allows them
to connect LANs that are separated by great distances.

3
Physical Topologies

4
The OSI Reference Model
7 Application The OSI Model will be
used throughout your
6 Presentation
entire networking
5 Session career!
4 Transport
3 Network
Memorize it!
2 Data Link
1 Physical

5
Serial Implementation of DTE & DCE
When connecting directly to a service provider, or to a
device such as a CSU/DSU that will perform signal clocking,
the router is a DTE and needs a DTE serial cable.
This is typically the case for routers.

6
MAC Address
MAC address is 48 bits in length and expressed as twelve hexadecimal
digits.MAC addresses are sometimes referred to as burned-in addresses
(BIA) because they are burned into read-only memory (ROM) and are
copied into random-access memory (RAM) when the NIC initializes.

7
Address Class Prefixes
To accommodate different size networks and aid in classifying these networks, IP
addresses are divided into groups called classes.This is classful addressing.

8
IP Address Ranges

The graphic below shows the IP address range of the first octet
both in decimal and binary for each IP address class.

9
Introduction to Subnetting
Subnetting a network means to use the subnet mask to divide the
network and break a large network up into smaller, more efficient and
manageable segments, or subnets.

With subnetting, the network is not limited to the default Class A, B, or


C network masks and there is more flexibility in the network design.

Subnet addresses include the network portion, plus a subnet field and
a host field.The ability to decide how to divide the original host portion
into the new subnet and host fields provides addressing flexibility for
the network administrator.

10
The 32-Bit
Binary IP Address

11
Introduction to Routers
A router is a special type of computer. It has the same basic components as a
standard desktop PC. However, routers are designed to perform some very specific
functions. Just as computers need operating systems to run software applications,
routers need the Internetwork Operating System software (IOS) to run configuration
files. These configuration files contain the instructions and parameters that control the
flow of traffic in and out of the routers. The many parts of a router are shown below:

12
Router User Interface Modes
The Cisco command-line interface (CLI) uses a hierarchical structure. This
structure requires entry into different modes to accomplish particular tasks.

Each configuration mode is indicated with a distinctive prompt and allows


only commands that are appropriate for that mode.

As a security feature the Cisco IOS software separates sessions into two
access levels, user EXEC mode and privileged EXEC mode. The privileged
EXEC mode is also known as enable mode.

13
Router Modes

14
Configuring Interfaces
An interface needs an IP Address and a Subnet Mask to be configured.
All interfaces are “shutdown” by default.
The DCE end of a serial interface needs a clock rate.

Router#config t
Router(config)#interface serial 0/1
Router(config-if)#ip address 200.100.50.75 255.255.255.240
Router(config-if)#clock rate 56000 (required for serial DCE only)

Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#int f0/0
Router(config-if)#ip address 150.100.50.25 255.255.255.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#exit
Router#

On older routers, Serial 0/1 would be just Serial 1 and f0/0 would be e0.
s = serial e = Ethernet f = fast Ethernet 15
RIPv1
Distance Vector Routing Protocol,
classful

Distribution of Routing Tables via broadcast


to adjacent routers

Fig. 59 Properties of RIPv1 (TI1332EU02TI_0004 The Network Layer, 81)


Only one kind of metric:
Number of Hops

Connections with different


bandwidth can not be weighted

Routing loops can occur


-> bad convergence in case of a failure

Count to infinity problem


(infinity = 16)

Maximum network size is limited


by the number of hops 16
Router Configuration
The router command starts a routing process.

The network command is required because it enables the


routing process to determine which interfaces participate in the
sending and receiving of routing updates.

An example of a routing configuration is:

GAD(config)#router rip
GAD(config-router)#network 172.16.0.0

The network numbers are based on the network class


addresses, not subnet addresses or individual host addresses.
17
IGRP
Interior Gateway Routing Protocol (IGRP) is a proprietary
protocol developed by Cisco.

Some of the IGRP key design characteristics emphasize


the following:
• It is a distance vector routing protocol.
• Routing updates are broadcast every 90 seconds.
• Bandwidth, load, delay and reliability are used to
create a composite metric.

18
EIGRP
Enhanced Interior Gateway Routing Protocol (EIGRP) is a Cisco-
proprietary routing protocol based on Interior Gateway Routing Protocol
(IGRP).

Unlike IGRP, which is a classful routing protocol, EIGRP supports CIDR


and VLSM.

Compared to IGRP, EIGRP boasts faster convergence times, improved


scalability, and superior handling of routing loops.

Furthermore, EIGRP can replace Novell Routing Information Protocol


(RIP) and AppleTalk Routing Table Maintenance Protocol (RTMP),
serving both IPX and AppleTalk networks with powerful efficiency.

EIGRP is often described as a hybrid routing protocol, offering the best


of distance vector and link-state algorithms.
19
OSPF is a Link-State Routing
Protocols
– Link-state (LS) routers recognize much more information
about the network than their distance-vector
counterparts,Consequently LS routers tend to make more accurate
decisions.

– Link-state routers keep track of the following:


• Their neighbours
• All routers within the same area
• Best paths toward a destination

20
ACLs
ACLs are lists of conditions that are applied to traffic traveling
across a router's interface. These lists tell the router what types
of packets to accept or deny. Acceptance and denial can be
based on specified conditions.

ACLs can be created for all routed network protocols, such as


Internet Protocol (IP) and Internetwork Packet Exchange (IPX).

ACLs can be configured at the router to control access to a


network or subnet.

Some ACL decision points are source and destination addresses,


protocols, and upper-layer port numbers.

ACLs must be defined on a per-protocol, per direction, or per port


21
basis.
VTP Protocol Features
– Advertises VLAN configuration information
– Maintains VLAN configuration consistency throughout a
common administrative domain
– Sends advertisements on trunk ports only

22
THANK YOU

23

You might also like