KEMBAR78
BASIC TO ADVANCED NETWORKING TUTORIALS | PPTX
BASICTOADVANCED
NETWORKINGTUTORIALS
PRESENTED BY-:
VARINDER SINGH WALIA
SOME BASICS
OF
NETWORKING
TOPOLOGY
Topology is the structural design of communication model depicted physically or logically.
PHYSICAL TOPOLOGY
 Physical topology is the placement of the various components of a network, including
device location and cable installation
 Example: LAN has one or more physical links to other devices in the network;
graphically mapping these links results in a geometric shape that can be used to
describe the physical topology of the network.
LOGICAL TOPOLOGY
ICMP – INTERNET CONTROL MESSAGE PROTOCOL
Used to communicate between two devices . Ping command help in implementation of
ICMP
IPx/SPx - INTERNET PACKET EXCHANGE / SEQUENCE PACKET EXCHANGE
Developed by Novell company for LAN and MAN
NET- Bios - Network Basic Input / Output System
It is a program that allows applications on different computers to communicate within a
local area network (LAN).
It was created by IBM for its early PC Network, was adopted by Microsoft, and has
since become a de facto industry standard.
Nwlink IPx/ SPx
NWLink packages data to be compatible with client/server services on NetWare
Networks.
SMTP – SIMPLE MAIL TRANSFER PROTOCOLS
It is used for electronic mailing
 POP3 - POST OFFICE PROTOCOL 3
 It is the most recent version of a standard protocol for receiving e-mail.
 POP3 is a client/server protocol in which e-mail is received and held for you by your Internet
server.
 FTP - FILE TRANSFER PROTOCOL
 It is a standard network protocol used to transfer computer files between a client and server on a
computer network.
 TFTP – TRIVIAL FILE TRANSFER PROTOCOL
 It is an Internet software utility for transferring files that is simpler to use than the File Transfer
Protocol but less capable.
 It is used where user authentication and directory visibility are not required.
 It is used as backup to recovery files
 HTTP – HYPER TEXT TRANSFER PROTOCOL
 It is an application protocol for distributed, collaborative, hypermedia information systems.
 It is the foundation of data communication for the World Wide Web.
 Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text
 HTTP functions as a request–response protocol in the client–server computing model.
 HTTPS – HYPER TEXT TRANSFER PROTOCOL SECURE
 It is advanced version of http
 DHCP – DYNAMIC HOST CONFIGURATION PROTOCOL
 It is a client/server protocol that automatically provides an Internet Protocol host with its IP
address and other related configuration information such as the Subnet Mask and Default
Gateway.
 TELNET-
 It is an application layer protocol used on the Internet or local area networks to provide a
bidirectional interactive text-oriented communication facility using a virtual terminal
connection
 SSH – SECURE SHELL PROTOCOL
 It is used for security purpose like authentication for username , password etc.
 ARP – ADDRESS RESOLUTION PROTOCOL
 It is a protocol used by the Internet Protocol to map IP network addresses to the hardware
addresses used by a data link protocol
 RARP – REVERSE ADDRESS RESOLUTION PROTOCOL
 It is used to convert MAC address to IP address
ADVANCED
NETWORKING
ROUTER
 It is a route device which defines router of data
 It reads the packet and filter them
 It works on IP address network
 It manages all traffic inside the routing
 Here we are dealing with ROUTER 2811
SWITCH
 Switch is a computer networking device that connects devices together on a computer
network, by using packet switching to receive, process and forward data to the
destination device.
 Here we are going to deal with SWITCH 2960-24T
IPADDRESSING and SUBNETTING
IPADDRESSING
 Internet Protocol address (IP address) is a numerical label assigned to each device
(e.g., computer, printer) participating in a computer network that uses the Internet
Protocol for communication.
 Types of IP address
 IPv4 – Internet Protocol version 4
 IPv6 – Internet Protocol version 6
SUBNETTING
 It is process of dividation of IPs into subparts.
 We require subnetting in order to reduce the cost
 Example: Suppose we want to buy 100 IPs and each having cost of 260
 => Total Cost = 260 *100=> 26000
 But through subnetting we need only single IP which is divided through subnetting into
different IPs as below:
 Example: 192.168.1.0 Main IP
192.168.1.1
192.168.1.2
192.168.1.3 and so on……………
CONCEPT OF CLASSES
 There are five types of classes namely A,B,C,D,E described below.
 But in Practical Networking we prefer CLASS C only.
S.N
O
CLASS NETWORK
BIT
HOST
BIT
RANGE SUBNET WILDMASK
1 A 8 24 1-126 255.0.0.0 0.255.2555.255
2 B 16 16 128-191 255.255.0.0 0.0.255.255
3 C 24 8 192-223 255.255.255.
0
0.0.0.255
4 D BROADCAST 224-239
5 E RESEARCH 240-255
CORPS INFORMATION SYSTEM CONTROL OFFICER
(CISCO)
 Cisco Systems is an American multinational technology company headquartered in San
Jose, California, that designs, manufactures and sells networking equipment.
 It is considered to be the biggest networking company in the world.
 It is a MNC which deals in Networking Hardware Devices.
 It provides three certifications
 CCNA – CISCO CERTIFIED NETWORK ASSOCIATE/ADMINISTRATOR
 CCNP – CISCO CERTIFIED NETWORK PROFESSIONAL
 CCIE – CISCO CERTIFIED INTERNETWORK EXPERT
NOTE: Here we are going to deal with CCNA
CISCO CERTIFIED
NETWORK
ADMINISTRATOR/
ASSOCIATE
(CCNA)
ROUTING
ROUTING
 It means allocating the suitable and appropriate path by the router to the message/packets
from source to destination i.e Tx to Rx and vice versa.
 The device used for this mechanism used is called ROUTING and the device used is called
ROUTER
 Here we are going to deal with ROUTER 2811
 CISCO Routers have four ports for inserting WIC-2T card generating two serial ports from
each card.
 It has two Fast Ethernet ports namely fa 0/0 and fa 0/1 used for connecting devices through
copper straight wire
 It also have 8 serial ports generated two by each WIC-2T card. These ports are used for
only serial connections through Serial DATA TRANSFER EQUIPMENT (DTE) wire
BASIC CONFIGURATION
 It is done on Router
 Router with Switch and PC
 Select Router 2811
 Double click on it and a box will appear.
 Switch Off the Power
 Insert WIC-2T Cards as per requirement .
 Each card will give rise to Two different Serial Ports like 0/0/0 ,0/1/0 etc.
 Then take Switch-2960 and connect both with Copper Straight Wire.
 At last attach PC with Switch using same wire.
 Then click on Router And Then CLI Mode.
 Then write the following configuration code on Router:
CONFIGURATION ON ROUTER
Press : no
 Router>enable
 Router # config terminal
 Router( config) #interface fastEthernet 0/0
 Router( config-if) # ip address 10.0.0.1 255.0.0.0
 Router( config-if)#no shut
 This will turn the light Green between Router And Switch
 Then click PC and provide suitable IP and then press tab which will automatically
assign a suitable subnet mask. And then close this window
 Now click command prompt and write the below command:
 Pc> ping_assigned ip of pc…..
 Then press enter
SERIAL PORT CONFIGURATION
 It is used for communication between two or more routers
 Two or more routers are attached with each other through Serial DTE wire at suitable
serial ports.
 CONFIGURATION ON BOTH ROUTERS
 Router > en
 Router # config terminal
 Router (config )# interface serial 0/0/0
 Router (config-if)# ip address 10.0.0.1 255.0.0.0
 Router (config –if)# no shut
STATIC ROUTING
 It is used where router uses manual IP configuration .
 It is used in small scale networks.
 In it we left all the directly attached network .
 Commands Used
 Router (config )# iproute_neighbor ip_subnet_via
 ADVANTAGES OF STATIC ROUTING
 Fast and Effective
 Moreover control selective path
 Less overload for router
 DISADVANTAGES OF STATIC ROUTING
 More overhead on administrator
 Load balancing is not easily possible
DEFAULT ROUTING
 It means a route for any network
 This route is specified with following syntax:
 Router (config)# ip route 0.0.0.0_0.0.0.0_via
DYNAMIC ROUTING
 It is simple and fast to implement
 In it we have to write only directly attached entire network
 Various DYNAMIC ROUTING techniques includes :
 ROUTER INFORMATION PROTOCOL(RIP)
 INTERIOR GATEWAY ROUTING PROTOCOL(IGRP)
 ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL(EIGRP)
 OPEN SHORTEST PATH FIRST(OSPF)
 BORDER GATEWAY PROTOCOL(BGP)
ROUTER INFORMATION PROTOCOL (RIP)
 It is one of the oldest distance-vector routing protocols which employ the hop count as a
routing metric.
 RIP prevents routing loops by implementing a limit on the number of hops allowed in a
path from source to destination.
 The maximum number of hops allowed for RIP is 15, which limits the size of networks
that RIP can support.
 A hop count of 16 is considered an infinite distance and the route is considered
unreachable.
 In it we have to write only directly attached networks.
 Command used :
 Router (config)# router rip
 Router (config-router)# network_required network IP
ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL
(EIGRP)
 EIGRP (Enhanced Interior Gateway Routing Protocol) is a network protocol that lets
routers exchange information more efficiently than with earlier network protocols
 It has characteristics of both distance vector and link state protocols
 EIGRP will route the same protocols that IGRP route .
 SYNTAX :
 Router (config)# router eigrp_PROCESS ID ( )
 Router (config-router)# network _ required network IP
NOTE: All Routers has same Process ID
OPEN SHORTEST PATH FIRST (OSPF)
 Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks.
 It uses a link state routing algorithm and falls into the group of interior routing protocols,
operating within a single autonomous system (AS).
 It uses the concept of WILD CARD MASK , which is complement of subnet
 It also uses the Process ID and Area
 NOTE: All routers have same Area but different Process ID
 SYNTAX:
 Router (config )# router ospf_ PID(range 1-65535)
 Router (config –router)# network_requires network IP_ wildcard mask_area_any value(range
0-4294967295)
BRODER GATEWAY PROTOCOL (BGP)
 Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed
to exchange routing and reachability information among autonomous systems (AS) on
the Internet.
 The protocol is often classified as a path vector protocol but is sometimes also classed
as a distance-vector routing protocol.
 This protocol use the ip of neighbor point for communication
 SYNTAX:
 Router (config)#router bgp_PID1
 Router (config –router)# neighbor_ip of end point_remote-as_PID2
 NOTE 1: Before applying this command apply Dynamic routing on each router
 NOTE 2: Each router has different Process ID
 NOTE 3:Do not write directly attached IP of network. All except directly attached IP
will be treated as neighbor
 NOTE 4: PID will be of current router only.
REDISTRIBUTION B/W RIP,STATIC,EIGRP AND OSPF
ROUTING
 Commands Used:
Router (config)#router rip
Router(config-router)#redistribute ospf 10 metric 10
Router(config-router)#redistribute eigrp 10 metric 10
Router(config-router)#redistribute static metric 10
Router (config-router)# router ospf 10
Router(config-router)#redistribute rip metric 10 subnets
Router(config-router)#redistribute eigrp 10 metric 10 subnets
Router(config-router)#redistribute static metric 10 subnets
Router(config-router)#router eigrp 10
Router(config-router)#redistribute rip metric 100 100 100 100 100
Router(config-router)#redistribute static metric 100 100 100 100 100
Router(config-router)#redistribute ospf 10 metric 100 100 100 100 100
Router(config-router)#do wr
Router(config-router)#exit
TELECOMMUNICATION
(VOIP)
INTODUCTION TO VOIP
 VOIP is an acronym for Voice Over Internet Protocol, or in more common terms phone
service over the Internet.
 If you have a reasonable quality Internet connection you can get phone service
delivered through your Internet connection instead of from your local phone company.
BASIC IDEA OF VOIP
 Continuously sample audio.
 Convert each sample to digital form.
 Send the resulting digitized stream accross an IP network in packets.
 Convert the stream back to analog for playback.
 Before the procedure above, the system must handle call setup.
 Phone number to IP.
ADVANTAGES OF VOIP
 Low call costs. ...
 Low cost of performing moves, ads and changes on a business VOIP phone system.
 Increased functionality and integration with other IT business systems.
 Ability to have your land-line phone number follow you anywhere.
 Low infrastructure costs. ...
 Future proof.
DISADVANTAGES OF VOIP
 Loss of service during outages.
 Without power VOIP phones are useless, so in case of emergencies during power
cuts it can be a major disadvantage.
 With VOIP emergency calls, it is hard to locate you and send help in time.
 Some times during calls, there may be periods of silence when data is lost while it
is being unscrambled.
 Latency and traffic.
 No standard protocol is applicable
VOICE OVER INTERNET PROTOCOL
(VOIP)
(VOIP)
SWITCHING
SWITCHING
VIRTUAL LOCALAREA NETWORK (VLAN)
 It is a smart device
 It divides switch into multiple parts in order to maintain security.
 Basic Configuration:
 Switch(config)#vlan ID(1-1005)
#vlan 10
#name ABC
#vlan 20
#name XYZ
#do show vlan
#do wr
#exit
 SWITCH TO SWITCH PROGRAMMIG
Switch#interface fa 0/0
#switchport access vlan 10
interface fa 0/3
# switchport access vlan 10
# interface fa 0/2
#switchport access vlan 20
# interface fa 0/4
#switchport access vlan 20
#do wr
#exit
:-> NOW apply the following commands:
Switch(config)# interface fa 0/24
#switchport mode trunk
#do wr
#exit
PER- VLAN SPANNING TREE
 Per-VLAN Spanning Tree (PVST) maintains a spanning tree instance for each VLAN
configured in the network.
 It uses ISL Trunking and allows a VLAN trunk to be forwarding for some VLANs while
blocking for other VLANs.
 Since PVST treats each VLAN as a separate network, it has the ability to load balance
traffic (at layer-2) by forwarding some VLANs on one trunk and other Vlans on another
trunk without causing a Spanning Tree loop.
 Commands for PVST on router:
Router(config)#interface fa 0/0
#no shut
Router(config)#int fa 0/0.10(10 is Ip of given PC’s)
#encapsulation_dot1Q_10
#ip_add_pc virtual IP_subnet
NOTE: Add similar above commands of number of even PC’s attached.
SECURITY
SECURITY
It is the network device protection in order to secure our network with help of
CCNA technology
 TYPES OF SECURITY :
 ACCESS CONTROL LIST : It is type of security in which we filter inbound
and outbound traffic
 Types of ACL:
1. STANDARD ACL : It is a type of ACL in which we block all the protocols
in our network.
 Commands for STANDARD ACL
Router(config)# ip_access-list standard_abc_deny_IP of n/w to be blocked_wildcard mask
#permit_any
#do wr
#exit
Router(config)# interface fa 0/0
#ip_access-group_abc
2. EXTENDED ACL : It is a type of ACL in which we block a particular protocol as
well as particular IP
 Commmands for Extended ACL:
 Router(config) # ip_access-list_extended_abc
#deny_icmp_destination IP_wildcard mask_source IP_wildcard
mask
#permit_ip_any_any
#do wr
#exit
 Router(config)# interface fa 0/0
#ip_access-group_abc
#do wr
#exit
VIRTUAL TERMINAL TYPE (VTY)
 It is protocol used for remotely connection with other connection.
 REQUIREMENT
1. Client Side: There are two password used that are ON ENABLE and ON LINE
CONSOLE
• Commands on CLIENT SIDE:
Router>en
Router#telnet_10.0.0.1
#do show ip interface brief
2. MASTER SIDE:
• Commands on MASTER SIDE:
Router(config)# enable_password_123
#line_vty_0 15
#password 1234
# do wr
# exit
VIRTUAL PRIVATE NETWORK (VPN)
 VPN is a technology that creates an encrypted connection over a less secure network
 In this basically TUNNEL is made to keep data secure , through which only source and
destination clients can get the data.
 Commands for VPN:
Router(config)# interface_tunnel_number
# ip_address_virtual IP_subnet
# tunnel_source_serial_of router itself
#tunnel_destination_IP of end router
# do wr
# exit
NOTE: Also share the virtual ip on both end router with rip command.
NETWORK ADDRESS TRANSLATOR
 It is type of security in which we convert our private address into public address
 It is a part of ethical hacking in which there is use of fake IP
 TYPES Of NAT:
1. STATIC NAT: It is a type of NAT in which the client will fetch only single
fake IP everytime.
Commands for STATIC NAT:
Router(config)# ip_nat_inside_source_static_IP of pc of router
# interface fa 0/0
#ip_nat_inside
#interface serial 0/0/0
#ip_nat_outside
#do wr
#exit
2.DYNAMIC NAT : It is a type of security in which we create a pool of fake IP’s
,because of which the user will receive a different fake IP
everytime within the range of given IP pool.
 Commands for DYANMIC NAT:
Router(config)# access-list_10_permit_actual router IP_wildcard mask
# ip_nat_pool_abc_50.0.0.3_50.0.0.10_netmask_subnet
# ip_nat_inside_source_list_10_pool_abc
#interface_fa_0/0
#ip_nat_inside
#interface_serial_port of router
#ip_nat-outside
#do_wr
#exit
3. Overload / NATPAD : It means that the single public IP assigned to your router can be used
by multiple internal hosts concurrently. This is done by translating source UDP/TCP ports in the
packets and keeping track of them within the translation table kept in the router .

BASIC TO ADVANCED NETWORKING TUTORIALS

  • 1.
  • 2.
  • 3.
    TOPOLOGY Topology is thestructural design of communication model depicted physically or logically. PHYSICAL TOPOLOGY  Physical topology is the placement of the various components of a network, including device location and cable installation  Example: LAN has one or more physical links to other devices in the network; graphically mapping these links results in a geometric shape that can be used to describe the physical topology of the network.
  • 4.
    LOGICAL TOPOLOGY ICMP –INTERNET CONTROL MESSAGE PROTOCOL Used to communicate between two devices . Ping command help in implementation of ICMP IPx/SPx - INTERNET PACKET EXCHANGE / SEQUENCE PACKET EXCHANGE Developed by Novell company for LAN and MAN NET- Bios - Network Basic Input / Output System It is a program that allows applications on different computers to communicate within a local area network (LAN). It was created by IBM for its early PC Network, was adopted by Microsoft, and has since become a de facto industry standard. Nwlink IPx/ SPx NWLink packages data to be compatible with client/server services on NetWare Networks. SMTP – SIMPLE MAIL TRANSFER PROTOCOLS It is used for electronic mailing
  • 5.
     POP3 -POST OFFICE PROTOCOL 3  It is the most recent version of a standard protocol for receiving e-mail.  POP3 is a client/server protocol in which e-mail is received and held for you by your Internet server.  FTP - FILE TRANSFER PROTOCOL  It is a standard network protocol used to transfer computer files between a client and server on a computer network.  TFTP – TRIVIAL FILE TRANSFER PROTOCOL  It is an Internet software utility for transferring files that is simpler to use than the File Transfer Protocol but less capable.  It is used where user authentication and directory visibility are not required.  It is used as backup to recovery files  HTTP – HYPER TEXT TRANSFER PROTOCOL  It is an application protocol for distributed, collaborative, hypermedia information systems.  It is the foundation of data communication for the World Wide Web.  Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text  HTTP functions as a request–response protocol in the client–server computing model.
  • 6.
     HTTPS –HYPER TEXT TRANSFER PROTOCOL SECURE  It is advanced version of http  DHCP – DYNAMIC HOST CONFIGURATION PROTOCOL  It is a client/server protocol that automatically provides an Internet Protocol host with its IP address and other related configuration information such as the Subnet Mask and Default Gateway.  TELNET-  It is an application layer protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection  SSH – SECURE SHELL PROTOCOL  It is used for security purpose like authentication for username , password etc.  ARP – ADDRESS RESOLUTION PROTOCOL  It is a protocol used by the Internet Protocol to map IP network addresses to the hardware addresses used by a data link protocol  RARP – REVERSE ADDRESS RESOLUTION PROTOCOL  It is used to convert MAC address to IP address
  • 7.
  • 8.
    ROUTER  It isa route device which defines router of data  It reads the packet and filter them  It works on IP address network  It manages all traffic inside the routing  Here we are dealing with ROUTER 2811
  • 9.
    SWITCH  Switch isa computer networking device that connects devices together on a computer network, by using packet switching to receive, process and forward data to the destination device.  Here we are going to deal with SWITCH 2960-24T
  • 10.
    IPADDRESSING and SUBNETTING IPADDRESSING Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication.  Types of IP address  IPv4 – Internet Protocol version 4  IPv6 – Internet Protocol version 6
  • 11.
    SUBNETTING  It isprocess of dividation of IPs into subparts.  We require subnetting in order to reduce the cost  Example: Suppose we want to buy 100 IPs and each having cost of 260  => Total Cost = 260 *100=> 26000  But through subnetting we need only single IP which is divided through subnetting into different IPs as below:  Example: 192.168.1.0 Main IP 192.168.1.1 192.168.1.2 192.168.1.3 and so on……………
  • 12.
    CONCEPT OF CLASSES There are five types of classes namely A,B,C,D,E described below.  But in Practical Networking we prefer CLASS C only. S.N O CLASS NETWORK BIT HOST BIT RANGE SUBNET WILDMASK 1 A 8 24 1-126 255.0.0.0 0.255.2555.255 2 B 16 16 128-191 255.255.0.0 0.0.255.255 3 C 24 8 192-223 255.255.255. 0 0.0.0.255 4 D BROADCAST 224-239 5 E RESEARCH 240-255
  • 13.
    CORPS INFORMATION SYSTEMCONTROL OFFICER (CISCO)  Cisco Systems is an American multinational technology company headquartered in San Jose, California, that designs, manufactures and sells networking equipment.  It is considered to be the biggest networking company in the world.  It is a MNC which deals in Networking Hardware Devices.  It provides three certifications  CCNA – CISCO CERTIFIED NETWORK ASSOCIATE/ADMINISTRATOR  CCNP – CISCO CERTIFIED NETWORK PROFESSIONAL  CCIE – CISCO CERTIFIED INTERNETWORK EXPERT NOTE: Here we are going to deal with CCNA
  • 14.
  • 16.
  • 17.
    ROUTING  It meansallocating the suitable and appropriate path by the router to the message/packets from source to destination i.e Tx to Rx and vice versa.  The device used for this mechanism used is called ROUTING and the device used is called ROUTER  Here we are going to deal with ROUTER 2811  CISCO Routers have four ports for inserting WIC-2T card generating two serial ports from each card.  It has two Fast Ethernet ports namely fa 0/0 and fa 0/1 used for connecting devices through copper straight wire  It also have 8 serial ports generated two by each WIC-2T card. These ports are used for only serial connections through Serial DATA TRANSFER EQUIPMENT (DTE) wire
  • 18.
    BASIC CONFIGURATION  Itis done on Router  Router with Switch and PC  Select Router 2811  Double click on it and a box will appear.  Switch Off the Power  Insert WIC-2T Cards as per requirement .  Each card will give rise to Two different Serial Ports like 0/0/0 ,0/1/0 etc.  Then take Switch-2960 and connect both with Copper Straight Wire.  At last attach PC with Switch using same wire.  Then click on Router And Then CLI Mode.  Then write the following configuration code on Router:
  • 19.
    CONFIGURATION ON ROUTER Press: no  Router>enable  Router # config terminal  Router( config) #interface fastEthernet 0/0  Router( config-if) # ip address 10.0.0.1 255.0.0.0  Router( config-if)#no shut  This will turn the light Green between Router And Switch  Then click PC and provide suitable IP and then press tab which will automatically assign a suitable subnet mask. And then close this window  Now click command prompt and write the below command:  Pc> ping_assigned ip of pc…..  Then press enter
  • 20.
    SERIAL PORT CONFIGURATION It is used for communication between two or more routers  Two or more routers are attached with each other through Serial DTE wire at suitable serial ports.  CONFIGURATION ON BOTH ROUTERS  Router > en  Router # config terminal  Router (config )# interface serial 0/0/0  Router (config-if)# ip address 10.0.0.1 255.0.0.0  Router (config –if)# no shut
  • 21.
    STATIC ROUTING  Itis used where router uses manual IP configuration .  It is used in small scale networks.  In it we left all the directly attached network .  Commands Used  Router (config )# iproute_neighbor ip_subnet_via  ADVANTAGES OF STATIC ROUTING  Fast and Effective  Moreover control selective path  Less overload for router  DISADVANTAGES OF STATIC ROUTING  More overhead on administrator  Load balancing is not easily possible
  • 22.
    DEFAULT ROUTING  Itmeans a route for any network  This route is specified with following syntax:  Router (config)# ip route 0.0.0.0_0.0.0.0_via
  • 23.
    DYNAMIC ROUTING  Itis simple and fast to implement  In it we have to write only directly attached entire network  Various DYNAMIC ROUTING techniques includes :  ROUTER INFORMATION PROTOCOL(RIP)  INTERIOR GATEWAY ROUTING PROTOCOL(IGRP)  ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL(EIGRP)  OPEN SHORTEST PATH FIRST(OSPF)  BORDER GATEWAY PROTOCOL(BGP)
  • 24.
    ROUTER INFORMATION PROTOCOL(RIP)  It is one of the oldest distance-vector routing protocols which employ the hop count as a routing metric.  RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from source to destination.  The maximum number of hops allowed for RIP is 15, which limits the size of networks that RIP can support.  A hop count of 16 is considered an infinite distance and the route is considered unreachable.  In it we have to write only directly attached networks.  Command used :  Router (config)# router rip  Router (config-router)# network_required network IP
  • 25.
    ENHANCED INTERIOR GATEWAYROUTING PROTOCOL (EIGRP)  EIGRP (Enhanced Interior Gateway Routing Protocol) is a network protocol that lets routers exchange information more efficiently than with earlier network protocols  It has characteristics of both distance vector and link state protocols  EIGRP will route the same protocols that IGRP route .  SYNTAX :  Router (config)# router eigrp_PROCESS ID ( )  Router (config-router)# network _ required network IP NOTE: All Routers has same Process ID
  • 26.
    OPEN SHORTEST PATHFIRST (OSPF)  Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks.  It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS).  It uses the concept of WILD CARD MASK , which is complement of subnet  It also uses the Process ID and Area  NOTE: All routers have same Area but different Process ID  SYNTAX:  Router (config )# router ospf_ PID(range 1-65535)  Router (config –router)# network_requires network IP_ wildcard mask_area_any value(range 0-4294967295)
  • 27.
    BRODER GATEWAY PROTOCOL(BGP)  Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet.  The protocol is often classified as a path vector protocol but is sometimes also classed as a distance-vector routing protocol.  This protocol use the ip of neighbor point for communication  SYNTAX:  Router (config)#router bgp_PID1  Router (config –router)# neighbor_ip of end point_remote-as_PID2  NOTE 1: Before applying this command apply Dynamic routing on each router  NOTE 2: Each router has different Process ID  NOTE 3:Do not write directly attached IP of network. All except directly attached IP will be treated as neighbor  NOTE 4: PID will be of current router only.
  • 28.
    REDISTRIBUTION B/W RIP,STATIC,EIGRPAND OSPF ROUTING  Commands Used: Router (config)#router rip Router(config-router)#redistribute ospf 10 metric 10 Router(config-router)#redistribute eigrp 10 metric 10 Router(config-router)#redistribute static metric 10 Router (config-router)# router ospf 10 Router(config-router)#redistribute rip metric 10 subnets Router(config-router)#redistribute eigrp 10 metric 10 subnets Router(config-router)#redistribute static metric 10 subnets Router(config-router)#router eigrp 10 Router(config-router)#redistribute rip metric 100 100 100 100 100 Router(config-router)#redistribute static metric 100 100 100 100 100 Router(config-router)#redistribute ospf 10 metric 100 100 100 100 100 Router(config-router)#do wr Router(config-router)#exit
  • 29.
  • 30.
    INTODUCTION TO VOIP VOIP is an acronym for Voice Over Internet Protocol, or in more common terms phone service over the Internet.  If you have a reasonable quality Internet connection you can get phone service delivered through your Internet connection instead of from your local phone company. BASIC IDEA OF VOIP  Continuously sample audio.  Convert each sample to digital form.  Send the resulting digitized stream accross an IP network in packets.  Convert the stream back to analog for playback.  Before the procedure above, the system must handle call setup.  Phone number to IP.
  • 31.
    ADVANTAGES OF VOIP Low call costs. ...  Low cost of performing moves, ads and changes on a business VOIP phone system.  Increased functionality and integration with other IT business systems.  Ability to have your land-line phone number follow you anywhere.  Low infrastructure costs. ...  Future proof. DISADVANTAGES OF VOIP  Loss of service during outages.  Without power VOIP phones are useless, so in case of emergencies during power cuts it can be a major disadvantage.  With VOIP emergency calls, it is hard to locate you and send help in time.  Some times during calls, there may be periods of silence when data is lost while it is being unscrambled.  Latency and traffic.  No standard protocol is applicable
  • 32.
    VOICE OVER INTERNETPROTOCOL (VOIP) (VOIP)
  • 33.
  • 34.
    SWITCHING VIRTUAL LOCALAREA NETWORK(VLAN)  It is a smart device  It divides switch into multiple parts in order to maintain security.  Basic Configuration:  Switch(config)#vlan ID(1-1005) #vlan 10 #name ABC #vlan 20 #name XYZ #do show vlan #do wr #exit
  • 35.
     SWITCH TOSWITCH PROGRAMMIG Switch#interface fa 0/0 #switchport access vlan 10 interface fa 0/3 # switchport access vlan 10 # interface fa 0/2 #switchport access vlan 20 # interface fa 0/4 #switchport access vlan 20 #do wr #exit :-> NOW apply the following commands: Switch(config)# interface fa 0/24 #switchport mode trunk #do wr #exit
  • 36.
    PER- VLAN SPANNINGTREE  Per-VLAN Spanning Tree (PVST) maintains a spanning tree instance for each VLAN configured in the network.  It uses ISL Trunking and allows a VLAN trunk to be forwarding for some VLANs while blocking for other VLANs.  Since PVST treats each VLAN as a separate network, it has the ability to load balance traffic (at layer-2) by forwarding some VLANs on one trunk and other Vlans on another trunk without causing a Spanning Tree loop.  Commands for PVST on router: Router(config)#interface fa 0/0 #no shut Router(config)#int fa 0/0.10(10 is Ip of given PC’s) #encapsulation_dot1Q_10 #ip_add_pc virtual IP_subnet NOTE: Add similar above commands of number of even PC’s attached.
  • 37.
  • 38.
    SECURITY It is thenetwork device protection in order to secure our network with help of CCNA technology  TYPES OF SECURITY :  ACCESS CONTROL LIST : It is type of security in which we filter inbound and outbound traffic  Types of ACL: 1. STANDARD ACL : It is a type of ACL in which we block all the protocols in our network.  Commands for STANDARD ACL Router(config)# ip_access-list standard_abc_deny_IP of n/w to be blocked_wildcard mask #permit_any #do wr #exit Router(config)# interface fa 0/0 #ip_access-group_abc
  • 39.
    2. EXTENDED ACL: It is a type of ACL in which we block a particular protocol as well as particular IP  Commmands for Extended ACL:  Router(config) # ip_access-list_extended_abc #deny_icmp_destination IP_wildcard mask_source IP_wildcard mask #permit_ip_any_any #do wr #exit  Router(config)# interface fa 0/0 #ip_access-group_abc #do wr #exit
  • 40.
    VIRTUAL TERMINAL TYPE(VTY)  It is protocol used for remotely connection with other connection.  REQUIREMENT 1. Client Side: There are two password used that are ON ENABLE and ON LINE CONSOLE • Commands on CLIENT SIDE: Router>en Router#telnet_10.0.0.1 #do show ip interface brief 2. MASTER SIDE: • Commands on MASTER SIDE: Router(config)# enable_password_123 #line_vty_0 15 #password 1234 # do wr # exit
  • 41.
    VIRTUAL PRIVATE NETWORK(VPN)  VPN is a technology that creates an encrypted connection over a less secure network  In this basically TUNNEL is made to keep data secure , through which only source and destination clients can get the data.  Commands for VPN: Router(config)# interface_tunnel_number # ip_address_virtual IP_subnet # tunnel_source_serial_of router itself #tunnel_destination_IP of end router # do wr # exit NOTE: Also share the virtual ip on both end router with rip command.
  • 42.
    NETWORK ADDRESS TRANSLATOR It is type of security in which we convert our private address into public address  It is a part of ethical hacking in which there is use of fake IP  TYPES Of NAT: 1. STATIC NAT: It is a type of NAT in which the client will fetch only single fake IP everytime. Commands for STATIC NAT: Router(config)# ip_nat_inside_source_static_IP of pc of router # interface fa 0/0 #ip_nat_inside #interface serial 0/0/0 #ip_nat_outside #do wr #exit
  • 43.
    2.DYNAMIC NAT :It is a type of security in which we create a pool of fake IP’s ,because of which the user will receive a different fake IP everytime within the range of given IP pool.  Commands for DYANMIC NAT: Router(config)# access-list_10_permit_actual router IP_wildcard mask # ip_nat_pool_abc_50.0.0.3_50.0.0.10_netmask_subnet # ip_nat_inside_source_list_10_pool_abc #interface_fa_0/0 #ip_nat_inside #interface_serial_port of router #ip_nat-outside #do_wr #exit 3. Overload / NATPAD : It means that the single public IP assigned to your router can be used by multiple internal hosts concurrently. This is done by translating source UDP/TCP ports in the packets and keeping track of them within the translation table kept in the router .