CISCO
CCNA
TRAINING
A comprehensive course on networking technologies
Prepared By
Habtamu Asayto
PRESENTATION OUTLINES
Assessment Question
Introduction
OSI and TCP/IP
Presentation
outlines Network Components
IOS CLI
Network Architecture
06/09/2025 2
ASSESSMENT QUESTIONS
1. Which of the following protocols are examples of TCP/IP transport layer
protocols?
TCP UDP
HTTP/HTTPS (Web) DNS (Domain Name
FTP (File Transfer) System)
SMTP (Email) DHCP (Dynamic Host
SSH (Secure Shell) Configuration Protocol)
VoIP (Voice over IP)
Online gaming and video
streaming
06/09/2025
3
ASSESSMENT QUESTIONS
2. Which of the following protocols are examples of TCP/IP data-link layer
protocols?
Ethernet
Data-link layer protocols
HTTP
Ethernet
HDLC (High-Level Data Link
PPP
Control)
HDLC (High-Level Data Link
IP
Control)
ATM (Asynchronous Transfer
Frame Relay
Mode)
ATM (Asynchronous Transfer
UDP
Mode)
SMTP
TCP
PPP
Frame Relay
06/09/2025
4
ASSESSMENT QUESTIONS
3. Which devices are operates at Layer 3 of the OSI model?
Switch Layer 3 of the OSI model
Router Router
Hub Layer 3 switch
Access Point
Layer 3 switch
06/09/2025
5
ASSESSMENT QUESTIONS
4. Which protocol resolves an IP address to a MAC address?
DNS Answer
ICMP ARP
ARP
DHCP
06/09/2025
6
ASSESSMENT QUESTIONS
5. Which of the following are valid private IP addresses?
192.168.1.10 Valid private IP addresses
172.33.5.1 192.168.1.10
172.16.0.5 172.16.0.5
8.8.8.8
10.0.0.0 – 10.255.255.255
172.16.0.0 – 172.31.255.255
192.168.0.0 – 192.168.255.255
06/09/2025
7
ASSESSMENT QUESTIONS
6. Which cabling type is used for long-distance backbone
connections?
UTP Fiber optic
STP
Coaxial
Fiber optic
06/09/2025
8
INTRODUCTION TO NETWORKING
Computer networking refers to connected computing devices
(such as laptops, desktops, servers, smartphones, and tablets)
and an ever-expanding array of IoT devices (such as cameras,
door locks, doorbells, refrigerators, audio/visual systems,
thermostats, and various sensors) that communicate with one
another.
A network is a group of connected devices that share
resources (files, printers, and internet).
06/09/2025
9
INTRODUCTION TO NETWORKING
When is computer networking started?
Researchers were looking for ways to allow computers to communicate and share
resources which is began in 1960s. The first real network is 1969 – ARPANET
(Advanced Research Projects Agency Network) was the first operational packet-
switching network which is developed by DARPA, a part of the U.S. Department of
Defense.
Types of Networks:
Which is started 1980s–90s
LAN (Local Area Network) – Small area, like a home or office.
WAN (Wide Area Network) – Large geographical area, like the internet.
MAN (Metropolitan Area Network) – City-wide networks.
06/09/2025
1
OSI & TCP/IP
OSI and TCP/IP models
The OSI Model (Open Systems Interconnection Model) started in 1970s
which is a conceptual framework used to describe functions of a
networking system. In the OSI reference model, the communications
between a computing systems are split into seven different abstraction
layers:
06/09/2025
1
OSI & TCP/IP
OSI and TCP/IP models
How Network Communication Works via OSI model?
06/09/2025
1
CONT…
OSI & TCP/IP Model Layers
TCP/IP Model (4 Layers)
OSI Model (7 Layers)
1. Application: User interface for network
1. Application: Combines OSI layers 5-7
services
functions
2. Presentation: Data translation and
2. Transport: Reliable or unreliable
encryption
transmission (TCP/UDP)
3. Session: Managing dialog between
3. Internet: Logical addressing and
devices
routing (IP)
4. Transport: Ensures data delivery and
4. Network Access: Physical hardware
error recovery
and data framing
5. Network: Routing and addressing
packets
6. Data Link: Frames data for physical
transmission 06/09/2025
1
7. Physical: Transmits raw bit stream over
CONT…
OSI & TCP/IP Model Layers
Layer 7 – Application layer
The application layer is the highest abstraction layer of the TCP/IP model that provides the interfaces
and protocols needed by the users.
Protocols: SMTP, HTTP, FTP, TFTP, Telnet, DNS, POP3 and etc.
This is the closest layer to the end user. It provides the interface between the applications we use
and the underlying layers.
Layer 6 – Presentation layer
This layer ensures the presentation of data, that the communications passing through are in the
appropriate form for the recipient. In general, it acts as a translator of the network which can
formats or translates data for the application layer based on the syntax or semantics that the
application accepts. It can also handle the encryption and decryption required by the application
layer
Protocols: Video (WMV, AVI…), Bitmap (JPG, BMP, PNG…), Audio (WAV, MP3, WMA…)
06/09/2025
1
CONT…
Layer 5 – Session layer
This layer manages the establishment, maintenance, and termination of
connections (sessions) between applications on different devices, ensuring a
reliable and organized flow of data.
It is also answerable for the orderly recovery from failures by implementing
appropriate check pointing mechanisms.
Protocols: SQL, RPC, NETBIOS names…
Layer 4 – Transport layer
The transport layer manages the delivery and error checking of data packets. It
regulates the size, sequencing, and ultimately the transfer of data between
systems and hosts. It can be either UTP or TCP.
06/09/2025
1
CONT…
Compare TCP and UDP
TCP (Transmission Control UDP (User Datagram Protocol)
Protocol) Connectionless protocol with low
Connection-oriented protocol overhead and no delivery
ensuring reliable data delivery. guarantee.
Establishes a connection before No handshake or guaranteed
data transfer packet order
Guarantees packet order and Faster, suitable for real-time
error checking applications
Used for web browsing, emails, Used for video streaming,
file transfers gaming, VoIP
Reference 06/09/2025
1
CONT…
Layer 3 – Network layer
This layer provides logical addresses which routers will use to determine the path to the
destination with a means of the IP addresses which is IPv4/IPv6 (including source &
destination IP addresses). Which is responsible for receiving frames from the data link layer,
and delivering them to their intended destinations among based on the addresses
contained inside the frame.
Protocols: IP, ICMP, IPX, AppleTalk
Layer 2 – Data Link Layer
It is responsible for the reliable transfer of data frames from one node to another connected
by the physical layer. It can establishes an error-free communications path between the
network nodes over the physical medium.
This layer uses Media Access Control (MAC) address, or sometimes Ethernet address,
physical address, adaptor address, hardware address, etc
06/09/2025
1
CONT…
MAC address is a 48 bits unique physical address which is burned into the NIC
card on the device by its manufacturer.The first 6 digits are the Vendor code,
(003065 belongs to Apple), and the last 6 are the individual interface's own.
Example: ab-cd-ef-12-34-56 or ab:cd-ef:12:34:56....
This layer is subdivide into 2 sub-layers: logical link control (LLC) and media
access control (MAC).
The LLC functions include:
Managing frames to upper and lower layers
Error Control
Flow control
Protocols: LAN, WAN (HDLC, PPP, Frame Relay…), 802.11 (Wi-Fi)
06/09/2025
1
CONT…
Layer 1 – Physical layer
The lowest layer of the OSI Model is concerned with transmitting individual
bits from one node to another over a physical medium. It manages the
physical relation to the structure with communication and signal
acceptance.
Devices: Network hubs, cabling, repeaters, network adapters or modems
are resources of physical layer.
Names of TCP/IP Messages - segment, packet, and frame
06/09/2025
1
CONT…
Physical interface and cabling types
It refers to the hardware-level components and standards used to connect
networking devices such as routers, switches, and end devices.
A physical interface is a hardware port on a networking device (like a router or
switch) that allows for the physical connection of cables.
Common types of physical interfaces:
1. Ethernet interfaces (RJ-45 ports): Used for LAN connections
2. Serial interfaces: Used for WAN links (less common now)
3. Fiber-optic interfaces (SFP, SFP+): High-speed connections over longer
distances
4. Console ports: For initial device configuration (usually an RJ-45 to serial cable
or USB) 06/09/2025
2
CONT…
Cabling Types
a. Twisted Pair Cables (Copper)
UTP (Unshielded Twisted Pair) – Most common in LAN (e.g., Cat5e, Cat6)
STP (Shielded Twisted Pair) – Used in environments with high interference
Types of Ethernet cables
Straight-through cable – Connects different device types (e.g., PC to
switch)
Crossover cable – Connects similar devices (e.g., switch to switch)
Rollover cable – For console access (Cisco proprietary)
Fiber Optic Cables - These are used with transceivers like SFP, SFP+, and
GBIC
Single-mode fiber (SMF): Long-distance, narrow core, laser-based
06/09/2025
2
CONT…
Cabling Types
06/09/2025
2
CONT…
Cable Arrangement in Networking
There are two main types of Ethernet cable arrangements (wiring standards) used for
RJ-45 connectors
Pin | Wire Color
1. TIA/EIA-568A Standard ----|-------------
1 | White/Green
2 | Green
3 | White/Orange
4 | Blue
5 | White/Blue
6 | Orange
7 | White/Brown
8 | Brow
Pin | Wire Color
2. TIA/EIA-568B Standard - most widely used
----|-------------
1 | White/Orange
2 | Orange
3 | White/Green
4 | Blue
5 | White/Blue
6 | Green
7 | White/Brown
8 | Brown
06/09/2025
2
INTERFACE AND CABLE ISSUES
Collision, Errors, Mismatch duplex, speed
Collision occurs when two devices transmit data at the same time over a
shared network medium, leading to a data packet clash. Which is common in
half-duplex Ethernet configurations (older hubs, older NICs).
Symptoms
Slow Network Performance - Packets are retransmitted after a collision,
causing delays.
Excessive Network Traffic - Collisions cause devices to use backoff
algorithms (like CSMA/CD) to retry, consuming bandwidth.
Unstable Connection - Devices may repeatedly lose connection if the
collision rate is high.
06/09/2025
2
INTERFACE AND CABLE ISSUES
Collision, Errors, Mismatch duplex, speed
Error messages - High CRC (Cyclic Redundancy Check) errors and FCS
(Frame Check Sequence) errors in logs and "Network cable unplugged"
warnings or link may goes down which is caused by:
Incorrect IP Address
Misconfiguration of DHCP settings or static IP address conflicts.
The DHCP server or router may be down or not properly connected.
Solved by Full-duplex communication with same speed (preferably auto-
negotiation on modern NICs/switches can eliminates collisions and errors
because both devices can transmit and receive simultaneously.
06/09/2025
2
CONTENTS IN NETWORK FUNDAMENTAL
Network Components with its role and function
Router Switch Firewall Access point
forwards data Connects controls Enables wireless
packets devices within incoming and devices to
between the same outgoing connect to the
different network. network traffic wired network.
networks for security.
06/09/2025
2
CONTENTS IN NETWORK FUNDAMENTAL
Network Components with its role and function
06/09/2025
2
NETWORK COMPONENTS
Network Components
Router – Connects different networks, routes traffic.
Cisco 800 and 1941 series, 2911, 2921, 3945, ASR1000 series, ASR1006,
ASR1001-X
Router hardware components
Power Supply
CPU
Memory (RAM , NVRAM ,ROM ,Flash )
System bus
Interfaces
06/09/2025
2
CONT…
06/09/2025
2
CONT…
Router external connections
Port - normally means one of the management ports used for
administrative access
Interface normally refers to interfaces that are capable of sending and
receiving user traffic.
Console port - Most common of the management ports, Used to connect
06/09/2025
3
a terminal,
CONT…
Types of memory in router - four types of memory:
1. Read-Only Memory (ROM): ROM stores the router’s bootstrap startup
program, operating system software, and power-on diagnostic test programs
(POST).
2. Flash Memory: Generally referred to simply as “flash”, the IOS images
are held here. Flash is erasable and reprogrammable ROM. Flash memory
content is retained by the router on reload.
3. Random-Access Memory (RAM): Stores operational information such
as routing tables and the running configuration file. RAM contents are lost
when the router is powered down or reloaded.
4. Non-volatile RAM (NVRAM): NVRAM holds the router’s startup
06/09/2025
3
configuration file. NVRAM contents are not lost when the router is powered
IOS CLI
Network device access methods
1. Directly using the console port
No configuration needed on the router
2. Telnet – over the network
Network connection
Network configuration on both ends (IP address, subnet mask, etc.)
Telnet password configured on router
3. Modem (AUX.PORT on the router)
4. Web access
06/09/2025
3
IOS CLI
Router> User mode
Router# Privileged mode (Exec mode)
Router(config)# Configuration mode
Router(config-if)# Interface level (within configuration mode)
Router(config-router)# Routing engine level (within configuration mode)
Router(config-line)# Line level (vty, tty, async) within configuration
mode
User mode (Unprivileged mode)
allows only a limited number of basic monitoring commands.
not allow any commands that might change the configuration of the router
The user EXEC mode can be identified by the > prompt.
06/09/2025
3
IOS CLI
Privileged modes
The privileged EXEC mode provides access to all router commands.
can be identified by the # prompt
Configuration mode
Also called the Global Configuration mode, this mode is entered from the
Privileged mode and supplies the complete command set for configuring
the router. In this mode you can access interface level, routing engine
level, line level…
06/09/2025
3
IOS CLI
Interface level
In some books, this level is also referred as “interface configuration mode” or
“interface mode”. In fact, it is a level inside Configuration mode (or sub-mode of
Configuration mode) so you can see the “configuration” part in its prompt (config-if).
This level can be accessed by typing a specific interface in Configuration mode. For
example:
Router(config)#interface fa0/0
Router(config-if)#
But notice that the prompt doesn’t give you information about which interface is being
configured so be careful with this level while you are configuring! This lack of
information can make you configure wrong interface easily.
Routing engine level
This is the level where we configure dynamic routing protocols (RIP, OSPF, EIGRP…).
06/09/2025
3
IOS CLI
Line level
In this level we can configure Telnet, Console, AUX port parameters. Also
notice that the prompt (config-line) is used for all “lines” on the router so
you must be careful about which line you are configuring!
06/09/2025
3
IOS CLI
06/09/2025
3
NETWORK TOPOLOGY ARCHITECTURE
Network topology architecture
Large networks can be extremely complicated, so the hierarchical network
model provides a modular view of a network, making it easier to design
and build a deterministic scalable infrastructure. Network Architecture is
the design and structure of a computer network. It defines how devices
and services are organized, how they communicate, and how the network
is managed and secured.
Enterprise Network Architecture
Used in businesses, campuses, and organizations.
Structured in tiers/layers.
06/09/2025
3
NETWORK TOPOLOGY ARCHITECTURE
The Cisco hierarchical network structure is composed of:
access - Provides a connection point (access) for end-user devices. Does not forward
Frames between two other access switches under normal circumstances.
distribution - Provides an aggregation point for access switches, providing connectivity
To the rest of the devices in the LAN, forwarding frames between switches, but not
connecting
Directly to end-user devices.
core layers -Aggregates distribution switches in very large campus LANs, providing very
high
Forwarding rates for the larger volume of traffic due to the size of the network.
Each layer has its own functions, which are used to develop a hierarchical design.
06/09/2025
3
NETWORK TOPOLOGY ARCHITECTURE
06/09/2025
4
NETWORK TOPOLOGY ARCHITECTURE
Two-tier (Spine-Leaf) architecture (Data Center Network
Architecture)
Spine-leaf architecture is a modern network topology widely used in data
centers and cloud environments. It’s designed to offer improved scalability,
high availability, and consistent low-latency communication. Unlike
traditional three-tiered hierarchical networks (core, distribution, access
layers), the spine-leaf architecture consists of only two layers of switches:
spine and leaf switches.
06/09/2025
4
NETWORK TOPOLOGY ARCHITECTURE
The spine layer consists of switches that perform routing and work as the core of
the network. The leaf layer involves access switches that connect to servers,
storage devices, and other end-users. This structure helps data center networks
reduce hop count, reduce network latency and prevent bottlenecks, which are
main issues of three-tier architecture.
Components of Spine-Leaf Architecture
The spine-leaf architecture consists of only two layers of switches: spine and leaf
switches.
Spine Switches: These are high-speed switches that form the backbone of the
architecture. Each spine switch is connected to every leaf switch in the network.
The main function of spine switches is to interconnect the leaf switches and ensure
data can travel between any two leaf switches with low latency.
06/09/2025
4
NETWORK TOPOLOGY ARCHITECTURE
Leaf Switches: Leaf switches connect directly to the endpoints (servers,
storage devices, routers…) and to every spine switch. Endpoints communicate
with each other via leaf switches, and traffic between endpoints on different
leaf switches passes through one or more spine switches. Leaf switches are
typically deployed at the top of the rack (TOR).
The following rules must be applied to spine-left architecture of each site:
Each leaf switch must connect to every spine switch.
Each spine switch must connect to every leaf switch.
Leaf switches cannot connect to each other.
Spine switches cannot connect to each other.
Endpoints connect only to the leaf switches.
06/09/2025
4
NETWORK TOPOLOGY ARCHITECTURE
Benefits of Spine-Leaf Architecture
To overcome short come of 3-tier (traditional networks) is Bandwidth
oversubscription / bandwidth hungry over time.
Scalability: Since each leaf switch connects to every spine switch, adding more
leaf switches (and thus more endpoints) doesn’t affect the performance. More
spine switches can be added to increase bandwidth and support higher loads.
Predictable Latency: The architecture is non-blocking, meaning that every
packet between any two endpoints takes the same number of hops (usually two
hops: from leaf to spine, and back to leaf), so latency is lower and predictable.
High Availability: The full mesh connectivity between leaf and spine ensures
redundancy. If one spine switch fails, traffic can still be routed through other spine
switches.
06/09/2025
4
NETWORK TOPOLOGY ARCHITECTURE
Benefits of Spine-Leaf Architecture
Efficient Use of Bandwidth: The architecture uses Layer 3 routing such
as equal-cost multipath (ECMP) routing so STP is no longer required,
allowing multiple paths for traffic to be used simultaneously, balancing the
load and preventing bottlenecks.
06/09/2025
4
NETWORK TOPOLOGY ARCHITECTURE
ACI is SDN (software defined networking), controller based, agile, highly
programmable.
Is two-tier spine-leaf architecture.
Policy driven-infrastructure.
Every leaf connects to every spine.
Leaf switches are the attachment point for all servers.
Optimize east-west traffic forwarding.
It is implemented on cisco Nexus 9K products.
06/09/2025
4
NETWORK TOPOLOGY ARCHITECTURE
How can we manage ACI datacenter?
APIC (cisco application policy infrastructure controller) - the brain and central
management point of the entire fabric.
It is the server
A set of 3 specialized servers that are connects to leaf switches that provide
management, policy programming, application deployment, Health monitoring
for an ACI fabric.
Why ACI
security
Topology (spine-leaf or two tier) without STP.
Has simplified/centralized management through APIC
06/09/2025
4
NETWORK TOPOLOGY ARCHITECTURE
ACI Datacenter types
06/09/2025
4
NETWORK TOPOLOGY ARCHITECTURE
ACI Datacenter types
Multi-pod fabric is managed by a single APIC cluster.
06/09/2025
4
CONT…
The multi-site design is yet another design that covers multiple separate
sites. Each fabric has its own APIC cluster.
06/09/2025
5
CON….
Categories of Leafs swishes
Border leafs switches - provide layer 2 and layer 3 connectivity between
ACI fabric and outside the world.
Service leaf switches - connect to Layer 4–7 services appliances, such
as -and load balancers.
Compute leaf switches - are ACI leaf switches that connect to servers.
IP storage leaf switches - are ACI leaf switches that connect to IP
storage systems.
Transit leaf switches - is a leaf switch that provides connectivity between
two sites in a stretched fabric design and are connect to spine switches in
both sites. 06/09/2025
5
CONT…
Other network architectures
Cloud Network Architecture
Hosted by providers like AWS, Azure, GCP.
Uses virtualized resources and software-defined networking (SDN).
Focuses on scalability and multi-region redundancy.
Software-Defined Network (SDN) Architecture
Separates the control plane (logic) from the data plane (forwarding).
Uses a central controller (like Cisco DNA Center or OpenDaylight).
Makes networks more programmable and flexible.
06/09/2025
5