0% found this document useful (0 votes)
2K views151 pages

CCNA Networking Concepts and Configurations

CCNA (Cisco Certified Network Associate) is an IT certification from Cisco that certifies associate-level networking skills. There are several certification paths such as CCENT, CCNA, CCNP, and CCIE. CCNA categories include routing and switching, data center, security, collaboration, voice, and wireless. Real Time Signals Technologies provides training for the CCNAX certification which focuses on interconnecting Cisco networking devices. The document then describes common networking devices like hubs, switches, bridges, routers, and their differences. It also covers networking topics such as transmission modes, topologies like bus, star, ring, mesh, tree, and wireless.

Uploaded by

Daya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views151 pages

CCNA Networking Concepts and Configurations

CCNA (Cisco Certified Network Associate) is an IT certification from Cisco that certifies associate-level networking skills. There are several certification paths such as CCENT, CCNA, CCNP, and CCIE. CCNA categories include routing and switching, data center, security, collaboration, voice, and wireless. Real Time Signals Technologies provides training for the CCNAX certification which focuses on interconnecting Cisco networking devices. The document then describes common networking devices like hubs, switches, bridges, routers, and their differences. It also covers networking topics such as transmission modes, topologies like bus, star, ring, mesh, tree, and wireless.

Uploaded by

Daya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Real Time Signals Technologies Pvt Ltd, [Link] or edjio.

com

CCNA
(Cisco Certified Network Associate)
CCNA (Cisco Certified Network Associate) is an information technology (IT) certification
from Cisco. CCNA certification is an associate-level Cisco Career certification.

Up gradation path
CCENT Entry Level
(Cisco Certified Entry Networking Technician)
CCNA Associate
(Cisco Certified Network Associate )
CCNP Professional
(Cisco Certified Network Professional)
CCIE Expert
(Cisco Certified Internetwork Expert)
CCAr Architect
(Cisco Certified Architect)

CCNA Categories:
CCNA Routing and Switching CCNA Data Center
CCNA Security CCNA Service Provider
CCNA Collaboration CCNA Voice
CCNA Wireless

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Certification Required
CCNAX (200-125): Interconnecting Cisco Networking Devices Accelerated

Networking devices
1. Repeater: This is used to convert weak signals into strong signals.

[Link]: It is used to connect multi devices.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

[Link]: It is same as hub but it is


smarter and faster.

Two types : Manageable and Non


Manageable Switch

Differences between Hub and


Switch:

HUB SWITCH
1. It is layer 1 device of OSI mode. 1. It is layer 2 device of OSI mode. Some
switch are layer 3 devices.

2. Max speed 10mbps. 2. Speed = 100Mbps, 1Gbps, 10Gbps, 40


Gbps.

3. Works in half duplex mode. 3. Works in full duplex mode.


4. It broadcast the packet to all its ports. [Link] the packet to its destination(one
time broadcast only)

Transmission Modes:
1) Simplex:- In this mode, the communication between sender and receiver occur only in one
direction.

That means only the sender can transmit the data to receiver but receive can’t.

2) Half- Duplex:- In this mode, the communication between sender and receiver occurs in both
the directions but, one at a time.

The sender and receiver both can transmit and receive the information but, only one is allowed
to transmit at a time.

3) Full-Duplex:- In this mode, the communication between sender and receiver can occur
simultaneously.
Sender and receiver both can transmit and receive simultaneously at the same time.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

4. Bridge:
It is same as switch but have two or three port only.

5. Router:
It is used to connect from two different networks.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Two types: Home or Office use router and Enterprise router

6. Brouter:

7. Gateway:

8. MAU (Multistation Access Unit)

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Networking Topology
It is the physical arrangement of networking devices to make a network.
Types of Topology:-
1) Bus 2) Star 3)Ring 4)Mesh 5)Tree 6)Wireless

BUS TOPOLOGY:

1. Coaxial cable is used.


2. Now it is absolute.

Advantages of Bus Topology

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

• Easy to connect a computer or peripheral to a linear bus.

• Requires less cable length than a star topology.

Disadvantages of Bus Topology

• Entire network shuts down if there is a break in the main cable.

• Terminators are required at both ends of the backbone cable.

• Difficult to identify the problem if the entire network shuts down.

• Not meant to be used as a stand-alone solution.

Star Topology:
Twisted pair cable is used.

Advantages of a Star Topology

• Easy to install and configure.


• No disruptions to the network when adding or removing devices.
• Easy to detect faults and to remove parts.

Disadvantages of a Star Topology

• Requires more cable length than a linear topology.


• If the hub or switch fails the entire network goes down.

Ring Topology
Here we require separate NIC card which supports Ring Topology.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Advantages of Ring Topology

1) This type of network topology is very organized. Each node gets to send the data when it
receives an empty token. This helps to reduces chances of collision.

2) Even when the load on the network increases, its performance is better than that of Bus
topology.
4) Additional components do not affect the performance of network.
5) Each computer has equal access to resources.

Disadvantages of Ring Topology

1) Each packet of data must pass through all the computers between source and destination.
This makes it slower than Star topology.
2) If one workstation or port goes down, the entire network gets affected.
3) Network is highly dependent on the wire which connects different components.
4) MAU’s and network cards are expensive as compared to Ethernet cards and hubs.

Mesh Topology

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

A network setup where each


computer and network device is
interconnected with one another,
allowing for most transmissions to
be distributed, even if one of the
connections go down.

Two types: Full Mesh and Partial


Mesh

Full mesh topology: Each


network node (workstation or other
device) is connected directly to each
of the others.

Partial mesh topology: Some


nodes are connected to all the others, but others are only connected to those nodes with which
they exchange the most data.

Advantages of mesh topology:

• Each connection can carry its own data load.


• Data transfer rate is high.
• A fault is diagnosed easily.
• Provides security and privacy.

Disadvantages of mesh topology:

• Installation and configuration are difficult if the connectivity gets more.


• Very very costly.
• Bulk wiring is required.
Tree Topology
It is the combination of multiple topologies.

Advantages of tree topology:

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

• Scalable as leaf nodes can accommodate more nodes in the hierarchical chain.
• A point to point wiring to the central hub as each intermediate node of a tree topology
represents a node in the bus topology
• Other hierarchical networks are not affected if one of them gets damaged.
• Easier maintenance and fault finding.

Disadvantages of tree topology:

• Huge cabling is needed.


• A lot of maintenance is needed.
• Backbone forms the point of failure.

Wireless Topology

• Wireless network topology is a logical topology.

• It shows how the computers connect and interact each other when there is no physical
connection, no cables connecting the computers.

• The computers communicate each other directly, using the wireless devices.

• Wireless networks can have infrastructure or ad hoc topology.

Ad hoc network
• The network is ad hoc because it does not rely on a pre-existing infrastructure, such
as routers in wired networks or access points in managed (infrastructure) wireless
networks.

• Wireless mobile ad hoc networks are self-configuring, dynamic networks in which nodes
are free to move.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Types of cables used for networking: cabling


1) STRAIGHT CABLES:

Straight cable is used to connect different type of devices. This type of cable will be used most of
the time and can be used to:

1) Connect a computer to a switch/hub's normal port.


2) Connect a computer to a cable/DSL modem's LAN port.
3) Connect a router's WAN port to a cable/DSL modem's LAN port.
4) Connect a router's LAN port to a switch/hub's uplink port. (normally used for expanding
network)
If you need to check how straight cable looks like, it's easy. Both side (side A and side B) of
cable have wire arrangement with same color.

2) Crossover Cable:

Crossover cable is used to connect same type of devices.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

1) Connect 2 computers directly.


2) Connect a router's LAN port to a switch/hub's normal port. (normally used for expanding
network)
3) Connect 2 switches/hubs by using normal port in both switches/hubs.

If you need to check how crossover cable looks like, both side (side A and side B) of cable
have wire arrangement with following different color .

In case you need to make a crossover cable yourself! You can use crimper to do it.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Note: If there is auto MDI/MDI-X feature support on the switch, hub, network card or other
network devices, you don't have to use crossover cable in the situation. This is because
crossover function would be enabled automatically when it's needed.

3) Rollover Cable:

• A rollover cable is a network cable that connects a computer terminal to a network


router’s console port to make programming changes to the device.
• It is also referred to as a Cisco console cable and is normally flat and light blue so as to
distinguish it from other network cable types.
• Rollover cables are also known as Yost cables or Yost Serial Device Wiring Standard
connectors.
• Pin 1 of connector A would be connected to Pin 8 of connector B.
• Pin 2 of connector A would be connected to Pin 7 of connector B and so on.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

OSI Layer
➢ Open System Interconnect (OSI) developed by ISO in 1970.
➢ Defines a networking framework to implement protocols in seven layers.
➢ Communication over network is understandable through this OSI model.
➢ OSI having 7 layers and each layers has its own responsibilities.
➢ Hardware and software work together.
➢ Troubleshooting is easier by separate networks.

Known as Layer OSI layer Format NW devices


n0. of Data used
Upper Layer Layer-7 Application Layer
or
User access Layer-6 Presentation Layer Data
Layer
Layer-5 Session Layer

Heart/Core of Layer-4 Transport layer Segment


OSI
Lower Layer Layer-3 Network layer Packet Router,
or
NW access Layer-2 Data Link Layer Frame Switch, Bridge
Layer
Layer-1 Physical Layer Bits Hub, Repeater,
Networking cable

Protocol:

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

• A protocol protocol is a set of rules in which computers communicate with each


other.
• The protocol says what part of the conversation comes at which time.
• It also says how to end the communication.

OSI Layers Associated Protocol


WWW browsers, NFS, SNMP, Telnet, HTTP, FTP
Application
ASCII, EBCDIC, TIFF, GIF, PICT, JPEG, MPEG, MIDI
Presentation
NFS, NetBios names, RPC, SQL
Session
SPX, TCP, UDP.
Transport
AppleTalk DDP, IP, IPX.
Network
PPP, FDDI, ATM, IEEE 802.3, HDLC, Frame Relay.
Data Link
Ethernet, FDDI, B8ZS, V.35, V.24, RJ45.
Physical

Physical Layer responsibilities


➢ Type of connection : Physical or Wireless
➢ Type of signal : Electrical, Light or Radio signal
➢ Types of communication mode : Simplex, Half duplex or Full duplex
➢ Transmit a bit over the electrical Signals.

Data Link Layer Responsibilities


➢ Receive bits from physical layer.
➢ Controls frame synchronization, flow control and error checking.
➢ Have two sublayer : LLC and MAC
➢ Logical Link Control (LLC) For IEEE 802, flow control, error control, and part of the
framing duties are all brought together in this LLC sub-layer.
➢ MAC layer is responsible for moving data packets to and from one Network Interface
Card (NIC) to another across a shared channel.
➢ MAC address adding( Physical addressing).

Framing : Framing is a function of the data link layer. It provides a way for a sender to
transmit a set of bits that are meaningful to the receiver.

Header Data Trailor


Source Address [Link] Parity bits and checksum
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

• Data - The packet from the Network layer


• Header - Contains control information, such as addressing, and is located at the
beginning of the PDU.
• Trailer - Contains control information added to the end of the PDU.
• PDU -Protocol Data Unit.
• Parity bits are used as the simplest form of error detecting code.
• Checksum is a method of checking for errors in a communications system.

Network Layer responsibilities


➢ Receive frame from data link layer
➢ Provides routing and switching
➢ Error handling, congestion control and packet sequencing.
➢ Do logical addressing ( IP addressing)

Transport Layer responsibilities


➢ Responsible for end-to-end error recovery and flow control.
➢ It ensures complete data transfer.
➢ Two main Protocol : TCP and UDP
➢ Data segmentation is done here

Session Layer responsibilities


➢ Establishes, manages and terminates connections between applications.
➢ It deals with session and connection coordination.
➢ Dialogue control and session management.

Presentation Layer responsibilities


➢ Encoding-decoding
➢ Encryption-decryption
➢ Compression-decompression
➢ Changing file format: jpeg, gif, midi, mpe4

Application Layer responsibilities

The layer provides an interface for the user interact with the application such as Email, HTTP,
FTP, Remote file access.

➢ Authentication
➢ File access
➢ Management

IP ADDRESSING
It is a unique address used to identify a device (like computer, smart phone, router, IP based
phone, network printer etc) in network.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

IP Address

IP v4 IP v6

Decimal Format Hexadecimal Format

32 Bits address 128 Bits address

What happened to IPv1, IPv2, IPv3 and IPv5 ?

❖ IPv1, 2, & 3 would actually be part of the TCP/IP protocols, of which there were 3
versions.

❖ IPv5 is an experimental TCP/IP protocol called the Internet Stream Protocol that never
really went anywhere because increases in bandwith made streaming over IPv4 feasible.
So IPv5 was never finalized and they skipped to IPv6.

IP V4

• It is 32 bits address divided into 4 octet.

• This 32 bits address is having Network ID and Host ID.

Example:-

192 . 168 . 1. 1
11 00 00 00 .10 10 10 00 .00 00 00 01 . 00 00 00 01
8 8 8 8
32 bits

Network ID Host ID
8 bits = 28= 256

Therefore the value we can write in each octet is from 0 – 255 only.

32-bits = 232 = Around 4.2 billions numbers.

IP v4

Classful Classless

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

1) Class A – Used for large network Subnetting

2) Class B – Used for medium network and

3) Class C – Used for small network Supernetting

4) Class D – Used for multicasting


5) Class E – Reserved for Research and Development

Q: Where we can assign the IP Address?


Ans: NIC card
Q: Which organization is responsible for managing IP addresses ?
IANA (Internet Assigned Number Authority) : IANA created some range to distribute the IP bsed on
use.

Range of IPv4

Class Starting Ending

A [Link] [Link]
B [Link] [Link]
C [Link] [Link]
D [Link] [Link]
E [Link] [Link]

Note : [Link] is reserved for local host and called loopback address.
Range: [Link] – [Link]

To Remember
Class Range
A 1 - 126
B 128 – 191
C 192 – 223
D 224 – 239
E 240 – 255

Network bits and Host bits

Class A: Network bits: 08, Host bits: 24

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Subnet Mask

Class B: Network bits : 16, Host bits: 16

Subnet Mask

Class C: Network bits : 24, Host bits: 08

Subnet Mask

Types of IP Address:

➢ Unicast Address: One to One communication


➢ Multicast Address: One-to-many communication
➢ Broadcast Address: One-to-all communication

Loop-back Address:
It is a special class A IP address ([Link]-127 [Link]),reserved for loopback or
diagnostic functions.
Link-Local Address:
DHCP is automatically assign the IP Address to a computer.

Condition for Pinging / Communicating:

Class PC-1 PC-2


Class - A A B C D A X Y Z
Class - B A B C D A B X Y
Class - C A B C D A B C X

Note:- To communicate two PC the network ID must be same in both PC.

Calculation of IP Address:
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Formula:-

No. of Network = 2n-r No. of Host Network = 2h-2

Where, n = Network bits r = Reserved bits h = Host bits

Reserved bits :

Class Reserved bits No of bits


A 0 1
B 10 2
C 110 3

1) Class - A :
n = 8, h = 24 , r = 1
No. of network = 2n-r = 28-1 = 27 = 128
No. of host /network = 2h-2 = 224-2 = 16,777,214
2) Class – B :
n = 16, h = 16 , r = 2
No. of network = 2n-r = 216-2 = 214 = 16384
No. of host /network = 2h-2 = 216-2 = 65,536-2 = 65,534

3) Class – C :
n = 24, h = 8 , r = 3
No. of network = 2n-r = 224-3 = 221 = 2,097,152
No. of host /network = 2h-2 = 28-2 = 256-2 = 254

How to configure Class-C IP address for 600 Computers ?

Ans:
[Link] Network ID
[Link]
[Link]
. Valid host = 254
.
[Link]
[Link] Broadcast ID
[Link] Network ID
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

[Link]
[Link]
. Valid host = 254
.
[Link]
[Link] Broadcast ID
[Link] Network ID
[Link]
[Link]
. Valid host = 254
.
[Link]
[Link] Broadcast ID
Therefore total valid host (Computers) = 254+254+92 = 600
Two router require to communicate all systems here.

Public IP and Private IP

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Differences between Public IP and Private IP

Public IP Private IP
Assinged by ISP Assigned by user from a given range

Used to Connect Internet Used to Share Internet Connection

It can be directly accessed through It cannot be accessed through Internet


Internet

Private IP Range:

Note:- Total IP Address = 232 = 4.2 Billions

3.7 billions used by Public IP

0.5 billions used by Private IP, Lookback address and APIPA address

Router Basics

➢ A device that forwards data packets between computer networks.


➢ Router can function on LAN and WAN both.
➢ Router can determine the best route to reach the destination.
➢ It performs “traffic directing” functions on the internet.
➢ Router works on 3rd layer of OSI Model.

Router Type

1. Wireless Router ( also called Wi-Fi router)

2. Industry use Router

Fixed Router Modular Router


Fixed router (non upgradaeble cannot Modular router (upgradeable can add

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

add and remove the Ethernet or Serial and remove interfaces as per the
interfaces) requirements)
Doesn’t have any extra slot Number of slots available depend on
the series of the router.

Router Manufacturers
CiscoLinksysNetgear D-LinkDellDigisolAsusZTE

Cisco Router Series

1800, 1900, 2800, 2900, 3800, 3900, 4400, 7200, 10000, 12000

Router External Port


a) Power cord:
• Used to connect the power.

b) On/Off button:
• Used to switch on/off the Router.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

c) Auxiliary port:
• Used to connect modem. It is known as remote Administrative Port. Its an RJ-45
Port. A console or a rollover cable is to be used.

d) Console Port:
• It is known as local Administrative port. It is generally used for configuration,
Password recovery and local Administration of the router. It is RJ-45 port.
• For connecting one end to other Rollover cable will be used.

e) Fast Ethernet port:


• Used to connect switch to router. It is RJ-45 port.
• Used to connect different router. It is known as WAN port. It is also used for
connecting to remote locations. It is a 60 or 26 pin female connector.
• For connection one end to other end V.35 cable will be used.

Internal component of the Router:

ROM :

• Is a chip integrated on the motherboard which contains a bootstrap program which tells
how to load the IOS.

• Used to start and maintain the router. Holds the POST and the bootstrap programs, as
well as the mini-ISO.

What is POST (Power-on self-test) ?

• Stored in the microcode of the ROM, the POST is used to check the basic the basic
functionality of the router hardware and determines which interfaces are present.

What is Mini-IOS ?

• Also called the RXBOOT or boot-loader by cisco, the mini-IOS is a small IOS in ROM

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

that can be used to bring up an interface and load a cisco IOS into flash memory.

• The mini-IOS can also perform a few other maintenance operations.

DRAM :

• Used to hold the temporary config, recent packet buffers information, ARP catch, routing
tables, and also the software and data structures that allow the router to function.

• Also called as Running-config.

• The IOS is loaded in to the RAM from the Flash at the time of booting.

Flash Memory:

• Stores the Cisco IOS by default. Flash memory is not erased when the router is reloaded.

NVRAM :

• Used to hold the router and switch configuration. NVRAM is not erased when the router
or switch is reloaded.

• It will not store an IOS.

• File name : startup-config

CONFIGURATION REGISTER:
• The configuration register is a 16-bit number, represented in hexadecimal, which
controls everything from the way in which a CISCO router boots.

• By default, the configuration register on a router is set to a value of 0×2102

configuration register can be used to change router behavior such as:

➢ How the router boots (Into Rommon, NetBoot).


➢ Options while booting.
➢ Console speed.
➢ Force the router into the ROM monitor

Router Configuration Mode


User execution mode Router > En
Privilege mode Router# Conf t, sh, wr, traceroute,ping
,telnet, etc
Global Config mode Router(config)# Any new configuration
Specific config mode Router(config-if)# Selected int configuration

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

User Mode (User Execution Mode)

• User Mode is the first mode a user has access to after logging into the router.
• This mode allows the user to execute only the basic commands, such as those that show
the system's status.
• The router cannot be configured or restarted from this mode.
• The user mode can be identified as shown below :

Router>

Privileged Mode (Privileged Execution Mode)

• Privileged mode allows users to view the system configuration, restart the system, and
enter router configuration mode.
• Privileged mode also allows all the commands that are available in user mode.
• The Privileged mode can be identified as shown below:

Router#

Global Configuration Mode

• Global Configuration mode allows users to modify the running system configuration.
• From the Privileged mode a user can move to configuration mode by running the
"configure terminal" command from privileged mode.
• To exit configuration mode, the user can enter "end" command or press Ctrl-Z key
combination.
• The Global Configuration mode can be identified as shown below:

Router(config)#

• Interface mode (Router physical interface configuration mode)

Router(config-if)#

Rommon mode:-

• Use to reverting Password

• The Rommon mode can be identified as shown below:

Rommon>

Routing algorithms and metrics

➢ Different routing protocols use different algorithms to choose the port to which a packet
should be sent.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

➢ Routing algorithms use different metrics to determine the best route for the data packet.
➢ A routing algorithm generates a number called a metric value for each path through a
network.
➢ Typically, smaller metric values indicate preferred paths.

Metrics:-

• Routing metrics are values allows the routers decide the best route for the data
packets.
• Routing protocols relay on different metrics values such as hops, bandwidth, load
and cost to identify the appropriate path.

Following metrics are most commonly used by routing protocols:


1) Bandwidth:
• Bandwidth is the data capacity of a link.
• Amount of data that can travel over the network segment in a fixed amount of time.
2)Delay:
• Delay is the length of time required to move a packet along each link from a source to
adestination.
3) Load:
• Load is the amount of activity on a network resource such as a router or a link.
• The load value 255 indicates 100% traffic congestion.
• Lower value indicates moderate traffic on the link.

4) Reliability:
• Reliability is usually a reference to the error rate of each network link.
5) Hop count:
• Hop count is the number of routers that a packet must travel through before reaching its
destination.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

6) Communication cost - Operating expenses of network links.

Autonomous System Number (AS no.)

• An Autonomous system is a network or a collection of networks that are all managed and
supervised by a single entity or organization.
• Each sub-network is assigned a globally unique 16 bit identification number known as
A.S number or ASN by the Internet Assigned Number Authority (IANA).
• Autonomous System Number Range :- ( 0 – 65535 )
• For public – 1-64512For Private – 64513-65535
• Private AS: used within the same service providers
• Public AS: used in between multiple service providers

Administrative Distance(AD)

➢ AD is integer value , range(0-255)


➢ Assigned to every routing protocol.
➢ Administrative distance is the feature that routers use in order to select the best path
when there are two or more different routes to the same destination from two different
routing protocols.
➢ Lower the AD value, more reliable the routing information.

Routing Protocol Administrative distance


Directly connected interface 0

Static route out an interface 1

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

5
EIGRP(Enhanced Interior Gateway Protocol)

20
External BGP(Border Gateway Protocol)

Internal EIGRP 90

IGRP(Interior Gateway Protocol) 100

110
OSPF(Open Shortest Path First)
IS-IS 115
Routing Information Protocol (RIP) 120

Exterior Gateway Protocol (EGP) 140

External EIGRP 170

Internal BGP 200

Unknown 255

Some shortcuts of commands


[Link] Full Command Shortcut
1 Enable En
2 Configuration terminal Conf t
3 Hostname ho
4 Interface Int
5 Serial Se
6 Fast Ethernet Fa
7 Gigabyte Ethernet Gig
8 Clock rate Cl ra
9 Bandwidth Band
10 Range Ra
11 Show Sh
12 Write Wr
13 Running-config Run
14 Startup-config Start
15 Version Ver
16 Encapsulation Encap
17 Neighbor Nei

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

18 shutdown shut

Basic Router Command


R# sh run To show the configuration of DRAM
R# sh start To show the configuration of NVRAM
R# copy run start To take backup from DRAM to NVRAM
R# copy start run To copy backup from NVRAM to DRAM
R# sh ver To know the hardware detail of router
R# sh history To know the used commands
R# clock set [Link] 28 may 2017 To set new date and time
R# sh clock To check date and time
R(config)# hostname delhi To give router name
R(config)# banner motd “ ------“ To set Welcome message in console
R# sh int To know the detail of router interface
R# erase start To erase all written command in nvram

R(config)# int fa0/0

R(config)# no shut ----> To up or enable the line

R(config)# shut -----> To down or disable the line

R(config)# int fa0/0

R(config)# speed 10 or 100 or 1000 or auto

R(config)#duplex full or half or auto

Router Security

To Assigning Console Password:


Router> en

Router# conf t

Router(config) # line console 0

Router(config-line) # password 123

Router(config-line) #login

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Router(config-line) # exit

To Assigning Telnet Password:


Router> en

Router# conf t

Router(config) # line vty 0 4

Router(config-line) # password 123

Router(config-line) #login

Router(config-line) # exit

To Assigning Auxiliary Password:


Router> en

Router# conf t

Router(config) # line aux 0

Router(config-line) # password 123

Router(config-line) #login

Router(config-line) # exit

To Assigning Enable Password:


Router> en

Router# conf t

Router(config) # enable password 123

Router(config) # exit

To Assigning Enable Secret Password:


Router> en

Router# conf t

Router(config) # enable secret 123

Router(config) # exit

To Encrypt all password:


R(config)# service password-encryption

Now use:-Router#sh run (our password has been encrypted form)

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Commands to save the Configuration:

Router# copy running-config startup-config


or
Router# copy run start
or
Router# write memory
or
Router# write
To Erase NVRAM configuration:

Router# erase startup-config or Router# erase start

To check the Router Version:

Router# sh version or Router# sh ver

To break Router password:


a) Before forgetting password just note down the configuration

register file ( 0x2102) from

R# sh ver

b) After forgetting pswdreboot the router ( go to CLI mode in packet tracer)

(Press ctrl + break key)

ROMMON >confreg 0x2140 ( change last two digit only)

ROMMON > boot (or type reset if asked)

Now router will boot and no password will be asked.

To get old configuration:

R# copy start run

Cursor Movement Shortcuts

Shortcut Description
Ctrl+A Move cursor to the beginning for the line
Ctrl+E Move cursor to the end of the line
Ctrl+F Move cursor forward one character
Ctrl+B Move cursor backward
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Esc+F Moves forward one word

ROUTER CONFIGURATIONS

One router one switch

Router>en

Router#conf t

Router(config)#ho mumbai

Router(config)#int fa0/0

Router(config-if)#ip add [Link] [Link]

Router(config-if)#no shut

Router(config-if)#exit

Router(config)#int fa0/1

Router(config-if)#ip add [Link] [Link]

Router(config-if)#no shut

Router(config-if)#exit

Router(config)#do wr

Now ping two PC from different network

Dynamic Host configuration Protocol (DHCP)


➢ Use to assign or distribute IP address automatically to all client PCs in network.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

➢ Port no : 67 for DHCP Server, 68 for DHCP client

Advantages to Use DHCP Server

❖ It minimise the administrative burden.


❖ There is no chance to conflict IP address..
❖ Save Man Power.
❖ Save Time.
❖ No chance of error.

Disadvantages

❖ When client make query to DHCP server (DHCP Discover) it is UDP query it consume more
bandwidth.
❖ When DHCP server is unavailable client unable to access enterprises network.

DORA Process

• It stands for Department of Regulatory Agencies.


• When a computer or other device connects to a network, the DHCP client software sends a
broadcast query requesting the necessary information. DHCP processgoes through four
stages while assigning an IP address to the client. These stages are often abbreviated
as DORA for Discovery, Offer, Request, and Acknowledgement.

1. Discover: The client discovers the DHCP server(s).


2. Offer: The server offers an address lease to the client.
3. Request: The client picks one of the offers that it has received and requests that address
be assigned.
4. ACK: The server acknowledges the request, committing to the lease.

One router with two switch (DHCP) Configurations:

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

In all computer set IP to obtained through DHCP

In Router:
Router>en

Router#conf t

Router(config)#int fa0/0

Router(config-if)#ip add [Link] [Link]

Router(config-if)#no shut

Router(config-if)#exit

Router(config)#ip dhcp pool account

Router(dhcp-config)#network [Link] [Link]

Router(dhcp-config)#dns-server [Link]

Router(dhcp-config)#default-router [Link]

Router(dhcp-config)#do wr

Router(dhcp-config)#exit

Router(config)#int fa0/1

Router(config-if)#ip add [Link] [Link]

Router(config-if)#no shut

Router(config-if)#exit

Router(config)#ipdhcp pool admin

Router(dhcp-config)#network [Link] [Link]

Router(dhcp-config)#dns-server [Link]

Router(dhcp-config)#default-router [Link]

Router(dhcp-config)#do wr
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Router(dhcp-config)#exit

In client PC:

Open cmd mode:


➢ Ipconfig /all : to check full network address info
➢ Ipconfig/release : to release obtained ip address
➢ Ipconfig/renew : to request new IP

Routing
• Forwarding of packets from one network to another network choosing the best path from
the routing table.
• Routing makes possible for two or more different networks to communicate with each
other.
• Routing table consist of only the best routes for every destinations.

Types of Routing:
1. Static Routing
2. Default Routing
3. Dynamic Routing

Static routing

❖ It is configured manually by the Administrator.


❖ Mandatory need for the destination network ID.
❖ Used for small Organization only.
❖ Administrative distance for static router is 0 or 1.

Advantages:

• It is simple and quick to configure.


• It is supported on all routing devices and all routers.
• Static routes are easy to predict and understand in small networks.
• There is no bandwidth usage between routers.
• It adds security because the administrator can choose to allow access to certain network
only.

Disadvantages:
• Used for small network (It is not feasible in large networks)
• Each and every network has to be manually configured.
• The administrator must really understand the internetwork and how each router is
connected in order to configure routes correctly.
• Any changes in the internetwork has to be updated in all routers.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Command syntax:
R(config)# ip route <neighbour NW Add.><neighbour NW Subnet mask><via>

To add serial port in router:


• Click on router Turn off the router switch  Click on WIC 2T  Drag the icon of serial
port and paste it in router blank port place  Turn on the router.
• To connect two router serial DCEcable will be used.

Static routing with two routers:

Router 0:
Router>en

Router#conf t

Router(config)#ho delhi

delhi(config)#int fa0/0

delhi(config-if)#ip add [Link] [Link]

delhi(config-if)#no shut

delhi(config-if)#exit

delhi(config)#int se0/0/0
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

delhi(config-if)#ip add [Link] [Link]

delhi(config-if)#no shut

delhi(config-if)#cl ra 64000

delhi(config-if)#band 100

delhi(config-if)#do wr

delhi(config-if)#exit

delhi(config)#ip route [Link] [Link] [Link]

delhi(config)#do wr

Router1:
Router>en

Router#conf t

Router(config)#ho mumbai

mumbai(config)#int fa0/0

mumbai(config-if)#ip add [Link] [Link]

mumbai(config-if)#no shut

mumbai(config-if)#int se0/0/0

mumbai(config-if)#ip add [Link] [Link]

mumbai(config-if)#no shut

mumbai(config-if)#band 100

mumbai(config-if)#do wr

mumbai(config-if)#exit

mumbai(config)#ip route [Link] [Link] [Link]

mumbai(config)#do wr

Static routing with three router:

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Router0:
Router>en

Router#conf t

Router(config)#ho delhi

delhi(config)#int fa0/0

delhi(config-if)#ip add [Link] [Link]

delhi(config-if)#no shut

delhi(config-if)#exit

delhi(config)#int se0/0/0

delhi(config-if)#ip add [Link] [Link]

delhi(config-if)#no shut

delhi(config-if)#cl ra 64000

delhi(config-if)#band 100

delhi(config-if)#do wr

delhi(config-if)#exit

delhi(config)#ip route [Link] [Link] [Link]

delhi(config)#ip route [Link] [Link] [Link]

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

delhi(config)#ip route [Link] [Link] [Link]

delhi(config)#do wr

Router1:
Router>en

Router#conf t

Router(config)#ho mumbai

mumbai(config)#int fa0/0

mumbai(config-if)#ip add [Link] [Link]

mumbai(config-if)#no shut

mumbai(config-if)#int se0/0/0

mumbai(config-if)#ip add [Link] [Link]

mumbai(config-if)#no shut

mumbai(config-if)#band 100

mumbai(config-if)#int se0/0/1

mumbai(config-if)#ip add [Link] [Link]

mumbai(config-if)#no shut

mumbai(config-if)#cl ra 64000

mumbai(config-if)#band 100

mumbai(config-if)#do wr

mumbai(config-if)#exit

mumbai(config)#ip route [Link] [Link] [Link]

mumbai(config)#ip route [Link] [Link] [Link]

mumbai(config)#do wr

Router2:
Router>en
Router#conf t
Router(config)#ho chennai
chennai(config)#int fa0/0
chennai(config-if)#ip add [Link] [Link]
chennai(config-if)#no shut
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

chennai(config-if)#int se0/0/1
chennai(config-if)#ip add [Link] [Link]
chennai(config-if)#no shut
chennai(config-if)#band 100
chennai(config-if)#do wr
chennai(config-if)#exit
chennai(config)#ip route [Link] [Link] [Link]
chennai(config)#ip route [Link] [Link] [Link]
chennai(config)#ip route [Link] [Link] [Link]
chennai(config)#do wr

Default Routing
1) Default Routing is used when Network admin do not have information of entire network.
2) Generally used to communicate LAN to WAN.
3) It is like allowing communication to all.

Command Syntax:
Router(config)# ip route [Link] [Link] <next-hop-address>

Two Routers with Two Switch Configuration:

Router0:
Router>en

Router#conf t

Router(config)#ho delhi

delhi(config)#int fa0/0

delhi(config-if)#ip add [Link] [Link]

delhi(config-if)#no shut
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

delhi(config-if)#int se0/0/0

delhi(config-if)#ip add [Link] [Link]

delhi(config-if)#no shut

delhi(config-if)#cl ra 64000

delhi(config-if)#band 100

delhi(config-if)#do wr

delhi(config-if)#exit

delhi(config)#ip route [Link] [Link] [Link]

delhi(config)#do wr

Router1:
Router>en
Router#conf t
Router(config)#ho mumbai
mumbai(config)#int fa0/0
mumbai(config-if)#ip add [Link] [Link]
mumbai(config-if)#no shut
mumbai(config-if)#int se0/0/0
mumbai(config-if)#ip add [Link] [Link]
mumbai(config-if)#no shut
mumbai(config-if)#band 100
mumbai(config-if)#do wr
mumbai(config-if)#exit
mumbai(config)#ip route [Link] [Link] [Link]
mumbai(config)#do wr

Three routers with three switch Configuration:

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Router0:

Router>en

Router#conf t

Router(config)#ho delhi

delhi(config)#int fa0/0

delhi(config-if)#ip add [Link] [Link]

delhi(config-if)#no shut

delhi(config-if)#int se0/0/0

delhi(config-if)#ip add [Link] [Link]

delhi(config-if)#no shut

delhi(config-if)#cl ra 64000

delhi(config-if)#band 100

delhi(config-if)#do wr

delhi(config-if)#exit

delhi(config)#ip route [Link] [Link] [Link]

delhi(config)#do wr

Router1:

Router>en

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Router#conf t

Router(config)#ho mumbai

mumbai(config)#int fa0/0

mumbai(config-if)#ip add [Link] [Link]

mumbai(config-if)#no shut

mumbai(config-if)#int se0/0/0

mumbai(config-if)#ip add [Link] [Link]

mumbai(config-if)#no shut

mumbai(config-if)#band 100

mumbai(config-if)#do wr

mumbai(config-if)#int se0/0/1

mumbai(config-if)#ip add [Link] [Link]

mumbai(config-if)#no shut

mumbai(config-if)#cl ra 64000

mumbai(config-if)#band 100

mumbai(config-if)#do wr

mumbai(config-if)#exit

mumbai(config)#ip route [Link] [Link] [Link]

mumbai(config)#ip route [Link] [Link] [Link]

mumbai(config)#do wr

Router2:

Router>en

Router#conf t

Router(config)#ho chennai

chennai(config)#int fa0/0

chennai(config-if)#ip add [Link] [Link]

chennai(config-if)#no shut

chennai(config-if)#int se0/0/1

chennai(config-if)#ip add [Link] [Link]

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

chennai(config-if)#no shut

chennai(config-if)#band 100
chennai(config-if)#do wr
chennai(config-if)#do wr
chennai(config-if)#exit
chennai(config)#ip route [Link] [Link] [Link]
chennai(config)#do wr

Distance vector Protocol:


➢ Determine the distance and decide the best packet forwarding path.
➢ Determine the path to remote networks using hop count as the metric.
1) Interior Gateway Protocol
2) Exterior Gateway Protocol

Interior Gateway Protocol:

• Interior Gateway Protocol is a routing protocol which is used to find network path
information within an autonomus no. (A.S no.)
a) RIP
b) IGRP
c) EIGRP
d) OSPF
Routing Information Protocol (RIP):
➢ Routing Information Protocol (RIP) is a true distance-vector routing protocol.
➢ RIP uses hop count to determine the best path between two locations.
➢ Maximum allowable hop count of 15 by default.
➢ In a RIP network, each router broadcasts its entire RIP table to its neighbor routers every
30 seconds.
➢ Used in small organization only.
➢ RIP - RIP v1 ( Support classful IP only)
➢ RIP v2 (Support classful and classless both)

Command Syntax
R(config)# Router RIP

R(config)# network < directly connected nw>( for fa0/0 )

R(config)# network < directly connected nw>( for se0/0/0 )

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

R(config)# do wr

Two routers with two switch:

In Router 0:
Router>en
Router#conf t
Router(config)#ho delhi
delhi(config)#int fa0/0
delhi(config-if)#ip add [Link] [Link]
delhi(config-if)#no shut
delhi(config-if)#exit
delhi(config)#int se0/0/0
delhi(config-if)#ip add [Link] [Link]
delhi(config-if)#no shut
delhi(config-if)#cl ra 64000
delhi(config-if)#band 100
delhi(config-if)#do wr
delhi(config-if)#exit
delhi(config)#router rip
delhi(config-router)#network [Link]
delhi(config-router)#network [Link]
delhi(config-router)#do wr
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

delhi(config-router)#exit

In Router 1:
Router>en

Router#conf t

Router(config)#ho mumbai

mumbai(config)#int fa0/0

mumbai(config-if)#ip add [Link] [Link]

mumbai(config-if)#no shut

mumbai(config-if)#exit

mumbai(config)#int se0/0/0

mumbai(config-if)#ip add [Link] [Link]

mumbai(config-if)#no shut

mumbai(config-if)#band 100

mumbai(config-if)#do wr

mumbai(config-if)#exit

mumbai(config)#router rip

mumbai(config-router)#network [Link]

mumbai(config-router)#network [Link]

mumbai (config-router)#do wr

mumbai (config-router)#exit

Three routers with three Network:

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

In Router 0:
Router>en
Router#conf t
Router(config)#ho delhi
delhi(config)#int fa0/0
delhi(config-if)#ip add [Link] [Link]
delhi(config-if)#no shut
delhi(config-if)#exit
delhi(config)#int se 0/0/0
delhi(config-if)#ip add [Link] [Link]
delhi(config-if)#no shut
delhi(config-if)#cl ra 64000
delhi(config-if)#band 100
delhi(config-if)#do wr
delhi(config-if)#exit
delhi(config)#router rip
delhi(config-router)#network [Link]
delhi(config-router)#network [Link]
delhi(config-router)#do wr
delhi(config-router)#exit

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

In Router 1:
Router>en
Router#conf t
Router(config)#ho mumbai
mumbai(config)#int fa0/0
mumbai(config-if)#ip add [Link] [Link]
mumbai(config-if)#no shut
mumbai(config-if)#int se0/0/0
mumbai(config-if)#ip add [Link] [Link]
mumbai(config-if)#no shut
mumbai(config-if)#band 100
mumbai(config-if)#do wr
mumbai(config)#int se0/0/1
mumbai(config-if)#ip add [Link] [Link]
mumbai(config-if)#no shut
mumbai(config-if)#cl ra 64000
mumbai(config-if)#band 100
mumbai(config-if)#do wr
mumbai(config-if)#exit
mumbai(config)#router rip
mumbai(config-router)#network [Link]
mumbai(config-router)#network [Link]
mumbai(config-router)#network [Link]
mumbai(config-router)#do wr
mumbai(config-router)#exit

Router2:
Router>en
Router#conf t
Router(config)#ho chennai
chennai(config)#int fa0/0
chennai(config-if)#ip add [Link] [Link]
chennai(config-if)#no shut
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

chennai(config-if)#int se0/0/1
chennai(config-if)#ip add [Link] [Link]
chennai(config-if)#no shut
chennai(config-if)#band 100
chennai(config-if)#do wr
chennai(config-if)#exit
chennai(config)#router rip
chennai(config-router)#network [Link]
chennai(config-router)#network [Link]
chennai(config-router)#do wr
chennai(config-router)#exit

IGRP

(Interior Gateway Routing Protocol)


• This is Cisco Proprietary Protocol.
• This protocol is good when you have only cisco router in network.
• Maximum hop count is 255 but by default 100 only.
• Now it is no more used.

Command Syntax
R1(config)# router IGRP 10 ([Link])

R1(config)#network < directly connected>for ethernet port (Fa 0/0)

R1(config)# network <directly connected>for serial port (Se 0/0/0)

R1(config)#do wr

Hybrid Protocol (EIGRP)


➢ Enhanced Interior gateway routing protocol.
➢ Used the concept of both distance vector and link state.
➢ It can support VLSM/CIDR.
➢ Uses to update incremental updating.
➢ Cisco proprietary protocol.
➢ Used to determine the best path through bandwidth, delay of line, load etc, as metrics.
➢ Support Max hop count 255 but default is 100.
➢ Most important features of EIGRP is it uses DUAL(Diffusing Update Algorithm) means
it creates a backup route, if primary route goes down ituse backup route to send the data.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

NOTE:-

❖ EIGRP uses autonomous system number to identify the collection of routers that share
route information. Only routers that have the same autonomous system numbers share
routes.
❖ AS no should be same on all routers to become neighbors and exchange the routes.
❖ EIGRP routers that belongs to different autonomous systems don’t automatically share
routing information and they don’t become neighbors.

Disadvantage:

• Works only with cisco routers.

Command Syntax
R1(config)# router EIGRP 10 ([Link])

R1(config)#network < directly connected>for ethernet port (fa 0/0)

R1(config)# network <directly connected>for serial port (se 0/0/0)

R1(config)#do wr

R2(config)# router EIGRP 10 ([Link])

R2(config)#network < directly connected> for ethernet port (fa 0/0)

R2(config)#network <directly connected> for serial port (se 0/0/0)

R2(config)# do wr

In both router As no should be same

Two routers with two switch:

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Router0:
Router>en
Router#conf t
Router(config)#ho delhi
delhi(config)#int fa0/0
delhi(config-if)#ip add [Link] [Link]
delhi(config-if)#no shut
delhi(config-if)#int se0/0/0
delhi(config-if)#ip add [Link] [Link]
delhi(config-if)#no shut
delhi(config-if)#cl ra 64000
delhi(config-if)#band 100
delhi(config-if)#do wr
delhi(config-if)#exit
delhi(config)#router eigrp 10
delhi(config-router)#network [Link]
delhi(config-router)#network [Link]
delhi(config-router)#no auto-summary
delhi(config-router)#do wr

Router1:
Router>en
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Router#conf t
Router(config)#ho mumbai
mumbai(config)#int fa0/0
mumbai(config-if)#ip add [Link] [Link]
mumbai(config-if)#no shut
mumbai(config-if)#int se0/0/0
mumbai(config-if)#ip add [Link] [Link]
mumbai(config-if)#no shut
mumbai(config-if)#band 100
mumbai(config-if)#do wr
mumbai(config-if)#exit
mumbai(config)#router eigrp 10
mumbai(config-router)#network [Link]
mumbai(config-router)#network [Link]
mumbai(config-router)#no auto-summary
mumbai(config-router)#do wr

Open Shortest Path First(OSPF)


➢ It uses a link state routingalgorithm, operating within a single autonomous system (AS).
➢ OSPF is faster than Distance vector Routing Protocol.
➢ OSPF is for ISP environment.
➢ OSPF v2 – support IPv4
➢ OSPF v3 - support IPv6
➢ Useful when we have different manufacture routers in Network.
➢ Unlimited Hop count.
➢ Works with an algorithm called DIJKSTRA
➢ To provide scalability OSPF supports two important concepts: autonomous systems and
areas.

Advantages:
➢ It will run on most routers, since it is based on an open standard.
➢ It uses the SPF algorithm, developed by dijkstra, to provide a loop-free topology.
➢ It provides fast convergence with triggered, incremental updates via Link State
Advertisements (LSAs).
Disadvantages:
➢ It requires more memory to hold the adjacency (list of OSPF neighbors), topology and
routing tables.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

➢ It requires extra CPU processing to run the SPF algorithm


➢ It is complex to configure and more difficult to troubleshoot.

Note:- OSPF uses wild card mask.

What is wild card mask:


➢ It is just reverse of subnet mask.
➢ Off bits represents network area and ON bits represents host area.
Class A: [Link]
Class B: [Link]
Class C: [Link]

Command Syntax:
Router(config)#Router OSPF [Link]
Router(config)#Network <directly connected nw> <wild card mask> Area no.
Router(config)# do wr

Area:
1. An OSPF network is divided into areas that are logical groupings of hosts and networks.
2. An area includes its router having interfaces connected to the network.
3. Each area maintains a separate link state database
4. Areas are uniquely identified with 32-bit numbers ( 1– 65,535)
Eg: 0 – [Link] or 1 - [Link]

Several special area types:


1) Standard or Normal Areas : Backbone and Non – Backbone

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

2) Stub: Stub Area, Totally stubby area and Not So Stubby Area

Router types:
Internal router(IR):All the router in the same areas

Area border router (ABR): connect two different areas

Autonomous system boundary router (ASBR): Connect the domain which is configured in other
protocol

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Router attributes:
Designated router (DR): Master

Backup designated router (BDR): Slave

Protocol Messages
➢ Link State Request (LSR)
➢ Link State Update( LSU)
➢ Link State Acknowledgment (LS ack)

Some commands to check:


1) # sh ipospf
2) # sh ip ospf neighbor
3) #sh ip ospf database
4) #sh ip ospf protocol
5) #sh ip ospf border-router

Two routers with two switch:


All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Router0:
Router>en
Router#conf t
Router(config)#ho delhi
delhi(config)#int fa0/0
delhi(config-if)#ip add [Link] [Link]
delhi(config-if)#no shut
delhi(config-if)#int se0/0/0
delhi(config-if)#ip add [Link] [Link]
delhi(config-if)#no shut
delhi(config-if)#cl ra 64000
delhi(config-if)#band 100
delhi(config-if)#do wr
delhi(config-if)#router ospf 35
delhi(config-router)#network [Link] [Link] area 1
delhi(config-router)#network [Link] [Link] area 0
delhi(config-router)#do wr
delhi(config-router)#exit

Router1:
Router>en

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Router#conf t
Router(config)#ho mumbai
mumbai(config)#int fa0/0
mumbai(config-if)#ip add [Link] [Link]
mumbai(config-if)#no shut
mumbai(config-if)#int se0/0/0
mumbai(config-if)#ip add [Link] [Link]
mumbai(config-if)#no shut
mumbai(config-if)#do wr
mumbai(config-if)#exit
mumbai(config)#router ospf 35
mumbai(config-router)#network [Link] [Link] area 2
mumbai(config-router)#network [Link] [Link] area 0
mumbai(config-router)#do wr
mumbai(config-router)#exit

Exterior Gateway Protocol (EGP)

• Exterior Gateway Protocol is a routing protocol which is used to find network path
information between different Autonomous no. (A.S no.)
1) BGP

Border Gateway Protocol (BGP)


➢ Border Gateway protocol is a translation protocol used to exchange routing information
between different autonomous systems.
➢ BGP basically designed to manage large scale network or to configure multi-home
environment and when distribution is not possible between different protocols(RIP, OSPF,
& EIGRP).

Command Syntax:
R1(config)# router BGP 10 ([Link])

R1(config)#network < directly connected>mask <subnet mask>

R1(config)# network <directly connected>mask <subnet mask>

R1(config)#neighbor <neighbor hop address> remote-as <neighbor router AS no.>


All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

R1(config)#end

R1#wr

R2(config)# router BGP 20 ([Link])

R2(config)#network < directly connected> mask<subnet mask>

R2(config)# network <directly connected> mask<subnet mask>

R2(config)#neighbor<neighbor hop address>remote-as<neighbor router AS no.>

R2(config)#end

R1#wr

Two Routers with two switch:

Router0:
Router>en
Router#conf t
Router(config)#ho delhi
delhi(config)#int fa0/0
delhi(config-if)#ip add [Link] [Link]
delhi(config-if)#no shut
delhi(config-if)#int se0/0/0
delhi(config-if)#ip add [Link] [Link]
delhi(config-if)#no shut
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

delhi(config-if)#cl ra 64000
delhi(config-if)#band 100
delhi(config-if)#do wr
delhi(config-if)#exit
delhi(config)#router bgp 10
delhi(config-router)#network [Link] mask [Link]
delhi(config-router)#network [Link] mask [Link]
delhi(config-router)#neighbor [Link] remote-as 20
delhi(config-router)#end
delhi#wr

Router1:
Router>en
Router#conf t
Router(config)#ho mumbai
mumbai(config)#int fa0/0
mumbai(config-if)#ip add [Link] [Link]
mumbai(config-if)#no shut
mumbai(config-if)#int se0/0/0
mumbai(config-if)#ip add [Link] [Link]
mumbai(config-if)#no shut
mumbai(config-if)#band 100
mumbai(config-if)#do wr
mumbai(config-if)#exit
mumbai(config)#router bgp 20
mumbai(config-router)#network [Link] mask [Link]
mumbai(config-router)#network [Link] mask [Link]
mumbai(config-router)#neighbor [Link] remote-as 10
mumbai(config-router)#end
mumbai#wr

Telnet in Cisco Router


❖ Telnet is a user command and an underlying TCP/IP protocol for accessing remote
computers/router.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

❖ Through Telnet, an administrator or another user can access someone else's


computer/router remotely.

Router 1 ------------------------------------> Router 2

Router 1 ------------------------------------> PC 1

We have to configure this command first in every router:


In Router 1([Link])

R1>en
R1#conf t
R1(config)#ho name
R1(config)#line vty 0 4
R1(config)#password 123
R1(config)#login
R1(config)#exit
R1(config)#enable password 1234
R1(config)#do wr
After that where we want to check we go to that router (CLI mode) and type:
In Router2 ([Link])
R1>en
R# telnet [Link]
Ist - vty password
2nd - en
3rd - secret password or user password

Tracert

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

• This command only used in PC.


• This command is used to tracing the root between one device to other device.
• It is used to find the no. of router.

Procedure:
• Open any pc of N/w 1
• Open cmd mode tracert<destination n/w IP>

-------------Router 1 IP

-------------Router 2 IP

-------------Router 3 IP

• Here we can see all router between source and destination.


• Now some problems create in router 3 or power off , then
• Open cmd mode in any pc and type

Tracert<destination IP address>

---------- router 1 IP

---------- router 2 IP

---------- Timed out

• So we can know that up to router 3 N/w is ok.


• We need to check router 4.

Traceroute:
• To trace the route.
• This command used in router.
• To know the number of hops between source and destination.

Router>en

Router #traceroute<Dest-IP>

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Secure Shell (SSH)


The SSH protocol (also referred to as Secure Shell) is a method for secure remote login from one
computer to another. It provides several alternative options for strong authentication, and it
protects the communications security and integrity with strong encryption.

In Router1:

Router>en
Router#conf t
Router(config)#int fa0/0
Router(config-if)#ip add [Link] [Link]
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#do wr

In Router3:

Router>en
Router#conf t
Router(config)#int fa0/0
Router(config-if)#ip add [Link] [Link]
Router(config-if)#no shut
Router(config-if)#do wr
Router(config-if)#exit

In Router2:
Router>en
Router#conf t

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Router(config)#int fa0/0
Router(config-if)#ip add [Link] [Link]
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#int fa0/1
Router(config-if)#ip add [Link] [Link]
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#ho R2
R2(config)#enable password 1234
Router(config)#ip domain-name [Link]
R2(config)#crypto key generate rsa
How many bits in module[512]:1024
R2(config)#ipssh time-out 15
R2(config)#ipssh authentication-retries 2
R2(config)#username avinash password cisco
R2(config)#line vty 0 4
R2(config-line)#transport input ssh
R2(config-line)#login local
R2(config-line)#do wr
R2(config-line)#exit

To access SSH in (R1):


Router#ssh -l avinash [Link]
open
ssh password : cisco
R2>en
Password :1234
R2#conf t

To access SSH in (R3):

Router#ssh -l avinash [Link]


open
ssh password :cisco
R2>en
password :1234
R2#conf t

Access Control List


• ACL is a set of rules which allow or deny the specific traffic moving through the router.
• It is a layer 3 security which controls the flow of traffic from one router to another.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

• It is also called as packet filtering firewall.

Two condition: Two Directions:


Permit In
Deny Out

Two types of ACL

1) Standard AL 2) Extended AL

1) Standard AL:

• Traffic is filtered based on the source IP address


• Permit or deny 1PC or certain network
• Uses AL Number 1-99 and 1300 – 1999
• Can block a network, host and subnet
• All services are block

2) Extended AL:

• Traffic is filtered based on source IP, Destination IP, TCP or UDP, [Link] ,protocol etc.
• Provide more feature than Standard AL
• Uses AL number 100-199 and 2000-2699
• Can block a network, host, subnet and services.
• Selected services can be block.

Note: - Mainly these commands are used to block the access between two or many network.

Note:- deny any : the last line (by default given by router)

So, after writing ACL add one extra line to permit all.

Standard Access List:

Example 1:- Deny a complete Network (One network to other network)

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Q. To Deny [Link] to communicate with [Link] but they should communicate


with other network.

Sol:-

i) Configure any routing method to communicate all systems of different network.

ii) Configure Access list in Router 2

R2>en
R2#conf t
R2(config)#ip access-list extended test1
R2(config-ext-nacl)#deny ip [Link] [Link] [Link] [Link]
R2(config-ext-nacl)#permit ip any any
R2(config-ext-nacl)#exit
R2(config)#interface fa0/1
R2(config-if)#ip access-group test1 in
R2(config-if)#exit
Example 2:- Deny a specific host and permit all other host (One to many)

Q. Deny a particular host [Link] to access the network [Link] but it can access
other network.

Sol:-

i) Configure any routing method to communicate all systems of different network.

ii) Configure Access list in Router 2

R2>en
R2#conf t
R2(config)#ip access-list extended test2
R2(config-ext-nacl)#deny ip host [Link] [Link] [Link]
R2(config-ext-nacl)#permit ip any any
R2(config-ext-nacl)#exit
R2(config)#int fa0/1
R2(config-if)#ip access-group test2 in
R2(config-if)#exit

Example 3:- Permit a specific host and deny all other host (one to many)

Q. Permit a particular host [Link] where as block all hosts in network [Link]

Sol:-

i) Configure any routing method to communicate all systems of different network.

ii) Configure Access list in Router 2


All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

R2>en
R2#conf t
R2(config)#ip access-list extended test3
R2(config-ext-nacl)#permit ip host [Link] [Link] [Link]
R2(config-ext-nacl)#deny ip [Link] [Link] [Link] [Link]
R2(config-ext-nacl)#permit ip any any
R2(config-ext-nacl)#exit
R2(config)#int fa0/1
R2(config-if)#ip access-group test3 in
R2(config-if)#exit

Example 4:-

Q. Deny communication between two hosts only and permits others (one to one)

Sol:-

i) Configure any routing method to communicate all systems of different network.

ii) Configure Access list in Router 2

R2>en
R2#conf t
R2(config)#ip access-list extended test4
R2(config-ext-nacl)#deny ip host [Link] host [Link]
R2(config-ext-nacl)#permit ip any any
R2(config-ext-nacl)#exit
R2(config)#int fa0/1
R2(config-if)#ip access-group test4 in
R2(config-if)#exit

Extended Access List:


Well known port no:

FTP = 21 Telnet = 23 SSH= 24 SMTP = 25

DNS = 53 HTTP = 80 HTTPS = 443

In the same diagram add 1 server system in [Link] network.

Give Server IP = [Link]

Q. Block HTTP access of server from network [Link] network.


All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Ans:-

i)From any PC of the N/w open the PC --> Desktop --> Web browser --> then type :

[Link]

ii) Now open router 2 (where hosts are connected)

R2>en

R2# conf t

R2(config)# access-list 101 deny tcp [Link] [Link]

[Link] [Link] eq 80

R2# access-list 101 permit ip any any

R2# int se0/0/0

R2# ip access-group 101 out

R2# no shut

R2# do wr

Now open web browser of any pc [Link] N/w and open

[Link]

The website will be not open.

Q. Block HTTP access of server from any pc of all network.

Ans:-

R2>en

R2#conf t

R2(config)# access-list 101 deny tcp any any eq 80

R2# access-list 101 permit ip any any

R2# int fa0/1

R2# ip access-group 101 out

R2# no shut

R2# do wr

Here,eq means equal to and 80 is the port no. of http.

In same way we can block other services.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

NAT (Network Address Translation)


➢ Mainly used for IP translation and mapping.
➢ Convert Public IP to Private IP and vice versa
➢ It is the temporary solution to overcome the shortage of IPV4 address.
➢ Used for security purpose, saving IP address and makes network administration easier and
flexible.

Types of NAT:
1. Static–
• One to one mapping (1-private/1-public)
• This type of NAT is designed to allow one-to-one mapping between local and global address.
• Static version requires one real internet IP address (public IP) for every host on your
network.

2. Dynamic–
➢ Many to many mapping (multiple Public IP to Multiple Private IP)
➢ This version gives you the ability to map an unregistered IP ta a registered IP addressfrom
out of a pool of registered IP address.

3. Overload–
• It became PAT (Port Address Translation, (Many - 1)
• This is the most popular type of Nat configuration. Understand that overloading really is a
form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP
address-many-to-one by using different ports.
• It is also known as Port address translation (PAT), and by using (NAT overload), we get to
have thousands of users connect to the internet using only one real global IP address.
• NAT overload is the real reason we haven’t run out of valid IP address on the internet.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Configuration:

Static NAT:

In router 1
#int fa0/0
# ip add [Link] [Link]
# no shut
# exit
# int se0/0/0
#ip add [Link] [Link]
# no shut
# cl ra 64000

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

# band 100
# do wr
# exit
# int fa0/1
#ip nat inside
#exit
#int se0/0/0
#ip nat outside
#exit
# ip route [Link] [Link] [Link]
# ip nat inside source static [Link] [Link]
# do wr
# exit
Now Access the web page of Server by using Public IP ([Link]) from any client PC.
Use command = sh ip nat translation (By router)

Dynamic NAT
First configure Default routing.
# int fa0/1
#ip nat inside
#exit
#int se0/0/0
#ip nat outside
#exit
# access-list 100 permit ip any any
# ip nat Pool test1 [Link] [Link] netmask [Link]
# ip nat inside source list 100 pool test1
#do wr

PAT (Port Address Translation) or Dynamic NAT Overload:


To buy multiple public IP address is very expensive, so better to map single public IP to multiple
private IP.
First configure Default routing.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

# int fa0/1
#ip nat inside
#exit
#int se0/0/0
#ip nat outside
#exit
# access-list 100 permit [Link] [Link]
# ip nat Pool test1 [Link] [Link] netmask [Link]
# ip nat inside source list 100 pool test1 overload
#do wr

Switching
➢ Switch is a computer networking device that connects devices together on a computer
network.
➢ A network switch is a multiport network bridge that uses hardware addresses to process and
forward data at the data link layer (layer 2) of the OSI model.
➢ Two Types :Non-Manageable and Manageable

a) Non-Manageable:
➢ Unmanaged switches have less network capacity than managed switches.
➢ It's not designed to be configured, so installation is easy.

b) Manageable:
➢ A managed network switch is configurable, offering greater flexibility and
capacity than an unmanaged switch.
➢ You can monitor and adjust a managed switch locally or remotely, to give you
greater network control.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

No of ports in Switch:
4, 8, 12, 16, 24, 32, 48, 52

Some industry switches can be modified and additional card can be used to increase the no of
ports.

Switch mode
1) Half Duplex
2) Full Duplex

Switch and Hub Difference

[Link] Hub Switch


1 It is layer 1 device of OSI model It is layer 2 device of OSI model
2 Max speed 10mbps Speed=100Mbps, 1Gbps,
10Gbps, 40Gbps
3 Works in half duplex mode Works in full duplex mode
4 It broadcast the packet to all its ports Unicast the packet to its destination
(one time broadcast only)

Major Brands of Switch


Cisco Dell Digisol D link I-ball
Huawei Asus Nokia TP-link Linksys

Cisco Switch Series


2960, 3560, 3850, 4500, 6800, 9500 series

Switch Security

Enabling Security:
Switch> en

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Switch # conf t

Switch (config) # line console 0

Switch (config-line) # password 123 ------> 1st layer password

Switch (config-line) #login

Switch (config) # enable password 1234 ------> 2nd layer password

or

Switch (config) #enable secret 12345 ------> 2nd layer encrypted password

Switch (config) # do wr

Switch (config) #exit

Switch #sh run

Here 2 passwords can be seen

1) How to make all passwords encrypted?

Switch (config)# service password-encryption

Now use Switch # sh run

Disabling Security:
Switch> en

Switch # conf t

Switch (config) # line console 0

Switch (config-line) #no password

Switch (config) #exit

Switch (config) # no enable password

Switch (config) #no enable secret

Switch (config) # do wr

Switch (config) #exit

Breaking Switch Password:


Note:- Only possible with Original Switch

Process:
1) Unplug the power cable of switch
2) Plug it again and press mode button in front side

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Cisco Release the Mode button when the SYST LED blinks amber and then turns
2960, solid green. When you release the Mode button, the SYST LED blinks
2970 green.

3) This msg display:

The system has been interrupted prior to initializing the flash file system to finish

loading the operating system software:

flash-init

load-helper

boot

4) Now Type

switch: flash-init

Switch: load-helper

Switch: dir flash:

switch: rename flash:[Link]:[Link]

switch: boot

Now switch will boot and enter into console without asking password.

Switch configuration:
Switch port mode:-

i) Access (sw - pc) (use straight cable) for different device


ii) Trunk (sw - sw) (use crossover cable) for similar device
iii) Dynamic

Two switch configuration:

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Note:- For all computer of every switch having same network.

Switch0:
Switch>en

Switch#conf t

Switch(config)#intfa 0/1

Switch(config-if)#switchport mode access

Switch(config-if)#no shut

Switch(config-if)#int fa0/2

Switch(config-if)#switchport mode access

Switch(config-if)#no shut

Switch(config-if)#int fa0/3

Switch(config-if)#switchport mode trunk

Switch(config-if)#no shut

Switch(config-if)#do wr

Switch(config-if)#exit

Switch1:
Switch>en

Switch#conf t

Switch(config)#int fa0/1

Switch(config-if)#switchport mode access

Switch(config-if)#no shut
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Switch(config-if)#int fa0/2

Switch(config-if)#switchport mode access

Switch(config-if)#no shut

Switch(config-if)#int fa0/3

Switch(config-if)#switchport mode trunk

Switch(config-if)#no shut

Switch(config-if)#do wr

Switch(config-if)#exit

VLAN (Virtual LAN)


• Dividing Physical network into multiple logical network.
• VLANs are configured through software rather than hardware, which make them extremely
flexible.
• One of the biggest advantages of VLANs is that when a computer is physically moved to
another location, it can stay on the same VLAN without any hardware reconfiguration.
• IT is a configuration to divide the same network into multiple small networks.
• It works in data link layer.

When do I need a VLAN:


• When network traffic is needed to decrease in large network.
• When a group of users need secure environment to share data.

Advantages:-

• Security will increase.


• Small network is easy to maintain or control.
• Only those will communicate who require.

Configuration:

VLAN with Two Switch:

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Switch0:
Switch>en

Switch#conf t

Switch(config)#int ra fa0/1-4

Switch(config-if-range)#switchport mode access

Switch(config-if-range)#no shut

Switch(config-if-range)#int fa0/5

Switch(config-if)#switchport mode trunk

Switch(config-if)#no shut

Switch(config-if)#do wr

Switch(config-if)#exit

Switch(config)#vlan 2

Switch(config-vlan)#name sales

Switch(config-vlan)#vlan 3

Switch(config-vlan)#name account

Switch(config-vlan)#int ra fa0/1-2

Switch(config-if-range)#switchport access vlan 2

Switch(config-if-range)#int ra fa0/3-4

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Switch(config-if-range)#switchport access vlan 3

Switch(config-if-range)#do wr

Switch(config-if-range)#exit

Switch1:
Switch>en

Switch#conf t

Switch(config)#int ra fa0/1-4

Switch(config-if-range)#switchport mode access

Switch(config-if-range)#no shut

Switch(config-if-range)#int fa0/5

Switch(config-if)#switchport mode trunk

Switch(config-if)#no shut

Switch(config-if)#do wr

Switch(config-if)#exit

Switch(config)#vlan 2

Switch(config-vlan)#name sales

Switch(config-vlan)#vlan 3

Switch(config-vlan)#name account

Switch(config-vlan)#int ra fa0/1-2

Switch(config-if-range)#switchport access vlan 2

Switch(config-if-range)#int ra fa0/3-4

Switch(config-if-range)#switchport access vlan 3

Switch(config-if-range)#do wr

Switch(config-if-range)#exit

[Link] 2: Draw 4 switch such that


1 - Main switch having 3 server (Oracle, SAP, Android)

3 - other switches in different floor or diff. location having 3 clients in each switch

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Condition:-The SAP client should access SAP server only and so on..........

Inter- VLAN (I-VLAN)


• Generally VLAN group is created with different network address.
• Different VLAN cannot make communication each other.
• If we want to make communication between vlan, then inter-vlan is required.

There are two trunking protocols can be used:-

802.1q:-This is the most common trunking protocol. It is a standard and supported by many
vendors.

ISL:-This is the cisco trunking protocol. It is no supported by all switches.


Encapsulation dot1q:
To enable IEEE 802.1Q encapsulation of traffic on a specified sub-interface, use to
encapsulation dot1q command.

Configure Inter-VLAN:

IN Switch0:
Switch>en

Switch#conf t

Switch(config)#intra fa0/1-4

Switch(config-if-range)#switchport mode access

Switch(config-if-range)#no shut

Switch(config-if-range)#int fa0/5

Switch(config-if)#switchport mode trunk

Switch(config-if)#no shut
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Switch(config-if)#exit

Switch(config)#vlan 2

Switch(config-vlan)#name sales

Switch(config-vlan)#vlan 3

Switch(config-vlan)#name accounts

Switch(config-vlan)#intra fa0/1-2

Switch(config-if-range)#switchport access vlan 2

Switch(config-if-range)#intra fa0/3-4

Switch(config-if-range)#switchport access vlan 3

Switch(config-if-range)#do wr

IN Router 0:
Router>en

Router#conf t

Router(config)#int fa0/0

Router(config-if)#no shut

Router(config-if)#exit

Router(config)#int fa0/0.1

Router(config-subif)#encapsulation dot1q 2

Router(config-subif)#ip add [Link] [Link]

Router(config-subif)#exit

Router(config)#int fa0/0.2

Router(config-subif)#encapsulation dot1q 3

Router(config-subif)#ip add [Link] [Link]

Router(config-subif)#do wr

VLAN Trunk Protocol (VTP)


➢ VLAN Trunk Protocol (VTP) reduces administration in a switched network

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

➢ When you configure a new VLAN on one VTP server, the VLAN is distributed through all
switches in the domain. This reduces the need to configure the same VLAN everywhere.

➢ VTP is a Cisco-proprietary protocol

VTP version:
VTP v1 VTP v2 VTP v3
VTP Modes:

1) Server 2) Client 3) Transparent

Server Mode:
• In VTP server mode, you can create, modify, and delete VLANs and specify other
configuration.

• VTP server is the default mode.

Client Mode:

• VTP clients behave the same way as VTP servers, but we cannot create, change, or delete
VLANs on a VTP client.

Transparent Mode:

• Transparent switches do forward VTP advertisements that they receive out their trunk ports

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

VTP Pruning:

• VTP ensures that all switches in the VTP domain are aware of all VLANs. Sometimes VTP
can create unnecessary traffic
• VTP pruning is a feature that you use in order to eliminate or prune this unnecessary traffic.
• When VTP pruning is enabled on a VTP server, pruning is enabled for the entire
management domain.

VTP Password:

• If we configure a password for VTP, you must configure the password on all switches in the
VTP domain. The password must be the same password on all those switches.

Configuration

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

For Server Mode:

Switch0>en
Switch0#conf t

Switch0(config)#ho delhi

delhi(config)#int ra fa 0/0-1

delhi(config)#switchport mode access

delhi(config)#int fa 0/3

delhi(config)#switchport mode trunk

delhi(config)#vlan 10

delhi(config)#name account

delhi(config)#vlan 20

delhi(config)#name sales

delhi(config)#do wr

delhi# vtp mode server

delhi# vtp domain rts

delhi# vtp Password 123

delhi# sh vlan

For Client Mode:


Switch1>en

Switch1#conf t

Switch1(config)#ho mumbai

mumbai(config)#int ra fa 0/0-1

mumbai(config)#switchport mode access

mumbai(config)#int ra fa 0/3-4

mumbai(config)#switchport mode trunk

mumbai(config)#do wr

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

mumbai(config)# vtp mode client

mumbai(config)#vtp domain rts

mumbai(config)#vtp Password 123

mumbai(config)#do wr

mumbai(config)#sh vlan

For Transparent Mode:


Switch2>en

Switch2#conf t

Switch2(config)#ho kolkata

kolkata(config)#int ra fa 0/0-1

kolkata(config)#switchport mode access

kolkata(config)#int ra fa 0/3

kolkata(config)#switchport mode trunk

kolkata(config)#do wr

kolkata(config)#vtp mode transparent

kolkata(config)#vtp domain rts

kolkata(config)#vtp password 123

kolkata(config)#do wr

kolkata(config)#exit

To monitor the VTP operation and status, use either:

SwitchA# show vtp status

Or

SwitchA# show vtp counters

SPANNING TREE PROTOCOL

• Spanning tree protocol (STP) uses spanning tree algorithm to avoid the switching loops in
layer-2 devices (bridges or switches).
• STP works when multiple switches are used with redundant links avoiding broadcast
storms, multiple frame copies & database instability.
• First developed by DEC

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

• STP is a open standard (IEEE802.1D)


• STP is enabled by default on all Cisco catalyst switches.

STP Terminology:
BPDU

• All switches exchange information through what is called as bridge protocol data units
(BPDUs)
• BPDUs contain a lot of information to help the switches determine the topology and any
loops that result from that topology.
• BPDUs are sent every 2 sec.
Bridge ID

• Each switch has a unique identifier called a bridge ID or switch ID


• Bridge ID= priority + MAC address of the switch
• When a switch advertises a BPDU, they place their switch id in these BPDUs.
Root Bridge

• The bridge with the best (lowest) ID.


• Out of all the switches in the network, one is elected as a root bridge that becomes the focal
point in the network.
Non-Root bridge:

• All switches other than the root bridge are Non-Root Bridges.
Root port:

• The link directly connected to the root bridge, or the shortest path to the root bridge.
• Every non-root bridge looks the best way to go root-bridge.
• For every non-root bridge there is only once root port.
1. Root port with the least cost (speed) connecting to the root bridge.
2. The bridge with the best (Lowest) switch ID
3. Lowest Physical port number.
Designated port:

• A designated port will always in forward mode.


Non Designated port:

• All the port or ports which are blocked by STP to avoid switching loop.
• A Non designated port will always in blocked mode.
STP port states:

• Blocking:- 20 sec or No limits


• Listening:- 15 sec.
• Learning:- 15 sec.
• Forwarding:- No Limits.
• Disable:- No limits.
Switch - port states:

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Blocking: Won’t forward frames listen to BPDUs, All ports are in blocking states by default when
the switch is powered up.
Listening: Listens to BPDUs to make sure no loops occur on the network before passing data
frames.
Learning: Learn MAC addresses and builds a filter table but does not forward frames.
Forwarding: Sends and receives all data on the bridged port.
To verify spanning-tree behavior:

Sw-1# sh spanning-tree

Sw-2# sh spanning-tree

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Sw-3# sh spanning-tree

Sw-2(config)# int fa 0/20


Sw-2(config-if)# shutdown
Sw-3# sh spanning-tree

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Sw-2(config)# int fa 0/20


Sw-2(config-if)# no shutdown
Sw-3# sh spanning-tree

Switch Port Security


• Port security is a layer two traffic control feature on Cisco Catalyst switches.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

• It enables an administrator configure individual switch ports to allow only a specified


number of source MAC addresses in the port.

To Configure switch port for particular or fixed PC:


1) Connect Some PC in Switch and Ping all Systems.

2) PC1 (Special PC) is connected to fa0/1.

Switch>en

Switch# sh port-security

Switch# sh port-security address

Switch#conf t

Switch(config)#int fa0/1

Switch(config)# switchport mode access

Switch(config)#switchport port-security

Switch(config)# switchport port-security mac-address sticky

Switch(config)#switchport port-security maximum 1

Switch(config)#switchport port-security violation shutdown

Now ping any PC from PC1 then

Switch# sh port-security

Switch# sh port-security address

Switch# shipintbr

Switch#sh port-security int fa0/1

Now change PC in fa0/1 and check the communication

Switch#sh port-security int fa0/1

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Note:-If we change the PC1 to other PC the port will be block because the Mac-address to that PC
is not matched.

Frame Relay
• Is a packet switching telecommunication service.
• Cost efficient data transmission between LAN and endpoints in WAN.
• Connection oriented link layer service.
• With frame relay we can have a single serial interface on a router connecting into multiple
remote sites through virtual circuits.
• Avirtual circuit is a logical connection between two devices.

Advantages:

• VC’s overcome the scalability problem of leased line by providing the multiple logical
circuits over the same physical connection.
• Cheaper
• Best quality
• VC’s are full duplex

Frame Relay virtual connection types:


1) PVC (permanent virtual connection):
• Similar to the dedicated leased line.
• Permanent connection is used
• Used when constant data has to be sent to a particular destination
• Always use the same path

2) SVC (switched virtual connection):


• Virtual connection is dynamically built when data has to be sent and torn down after
use.
• It is similar to the circuit switched network like dial on demand
• Also called as semi-permanent virtual circuit
• For periodic intervals of data with small quantity

DLCI (Data link connection identifier):

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

• Address of virtual connections


• For every VC there is one DLCI number.
• Locally significant and provided by frame relay service provider.
• Inverse ARP (address resolution protocol) is used to map local DLCI to a remote IP.

LMI (Local management interface):


• LMI allows DTE (router) to send status enquiry messages (keep alive) to DLCI (frame
relay switch) to exchange status information about the virtual circuits devices for
checking the connectivity.

LMI types:

a) CISCO (default)
b) ANSI
c) Q933A

Frame Relay for Two Routers:

Router1:
Router>en

Router#conf t

Router(config)#int fa0/0

Router(config-if)#ip add [Link] [Link]

Router(config-if)#no shut

Router(config-if)#exit

Router(config)#intse0/0/0

Router(config-if)#ip add [Link] [Link]

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Router(config-if)#no shut

Router(config-if)#cl ra 64000

Router(config-if)#band 100

Router(config-if)#exit

Router(config)#router rip

Router(config-router)#network [Link]

Router(config-router)#network [Link]

Router(config-router)#do wr

Router(config-router)#exit

Router(config)#int se0/0/0

Router(config-if)#encapsulation frame-relay

Router(config-if)#ho delhi

delhi(config)#do wr

Router2:
Router>en

Router#conf t

Router(config)#int fa0/0

Router(config-if)#ip add [Link] [Link]

Router(config-if)#no shut

Router(config-if)#exit

Router(config)#int se0/0/0

Router(config-if)#ip add [Link] [Link]

Router(config-if)#no shut

Router(config-if)#cl ra 64000

Router(config-if)#band 100

Router(config-if)#exit

Router (config)#router rip

Router (config-router)#network [Link]

Router (config-router)#network [Link]

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Router (config-router)#do wr

Router (config-router)#exit

Router (config)#ho kolkatta

Kolkatta (config)#int se0/0/0

Kolkatta (config-if)#encapsulation frame-relay

Kolkatta (config-if)#do wr

******************************************

Cloud:
• Open WAN Emulation and select 1st diagram genric.
• To connect b/w router to cloud (Genric) first click on router (through DCE cable)
1. Go to interface ->

serial 0

LMI –cisco

DLCI100 Name Delhi

Then click add

Serial 1

DLCI 200 Name Kolkata

Then click add

2. Go to Connections -> frame relay

Serial 0 -> Delhi Serial 1 -> Kolkata

Then click add

Now Ping the both end.

1. What is DLCI in frame relay?

• A data link connection identifier is a frame relay 10 bit wide link local virtual circuit.
• identifier used to assign frames to a specific PVC(Permanent virtual circuit)
• Frame relay networks use DLCI s to statistically multiplex frames.
• Valid – 10 bit

DLCI address:

0- Reserved for ANSI


1- 15 - Reserved

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

16-1007 – any PVC

1008-1018 – Reserved

1019-1022 – Reserved for LMI Multicast

1023 – Reserved for LMI link mgt(Local management interface- Is a signaling standard
used between routers and frame.)

Frame relay with three router:

Router0
Router0 Router>en

Router0 Router#conf t

Router0 Router(config)#ho delhi

Router0 delhi(config)#int fa0/0

Router0 delhi(config-if)#ip add [Link] [Link]

Router0 delhi(config-if)#no shut

Router0 delhi(config-if)#int se0/0/0

Router0 delhi(config-if)#ip add [Link] [Link]

Router0 delhi(config-if)#encapsulation frame-relay

Router0 delhi(config-if)#no shut

Router0 delhi(config-if)#cl ra 64000

Router0 delhi(config-if)#band 100

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Router0 delhi(config-if)#do wr

Router0 delhi(config-if)#exit

Router0 delhi(config)#router rip

Router0 delhi(config-router)#network [Link]

Router0 delhi(config-router)#network [Link]

Router0 delhi(config-router)#do wr

Router0 delhi(config-router)#exit

Router1
Router1 Router>en

Router1 Router#conf t

Router1 Router(config)#ho chennai

Router1 chennai(config)#int fa0/0

Router1 chennai(config-if)#ip add [Link] [Link]

Router1 chennai(config-if)#no shut

Router1 chennai(config-if)#int se0/0/0

Router1 chennai(config-if)#ip add [Link] [Link]

Router1 chennai(config-if)#encapsulation frame-relay

Router1 chennai(config-if)#no shut

Router1 chennai(config-if)#cl ra 64000

Router1 chennai(config-if)#band 100

Router1 chennai(config-if)#do wr

Router1 chennai(config-if)#exit

Router1 chennai(config)#router rip

Router1 chennai(config-router)#network [Link]

Router1 chennai(config-router)#network [Link]

Router1 chennai(config-router)#do wr

Router1 chennai(config-router)#exit

Router2
Router2 Router>en

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Router2 Router#conf t

Router2 Router(config)#int fa0/0

Router2 Router(config-if)#ip add [Link] [Link]

Router2 Router(config-if)#no shut

Router2 Router(config-if)#exit

Router2 Router(config)#ho kerala

Router2 kerala(config)#int se0/0/0

Router2 kerala(config-if)#ip add [Link] [Link]

Router2 kerala(config-if)#encapsulation frame-relay

Router2 kerala(config-if)#no shut

Router2 kerala(config-if)#cl ra 64000

Router2 kerala(config-if)#band 100

Router2 kerala(config-if)#do wr

Router2 kerala(config-if)#exit

Router2 kerala(config)#router rip

Router2 kerala(config-router)#network [Link]

Router2 kerala(config-router)#network [Link]

Router2 kerala(config-router)#do wr

Router2 kerala(config-router)#exit

Cloud:
• Open WAN Emulation and select 1st diagram genric.
• To connect b/w router to cloud (Generic) first click on router (through DCE cable)

Go to interface ->

Serial 0

LMI –cisco

DLCI100 Name Delhi-Chennai

DLCI101 Name Delhi-kerla

Then click add

Serial 1

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

DLCI 200 Name Chennai-Delhi

DLCI 201 Name Chennai-kerala

Then click add

Serial 2

DLCI 300 Name Kerla-Delhi

DLCI 301 Name Kerla-Chennai

Then click add

Go to Connections -> frame relay

Serial 0 -> Delhi-Chennai Serial 1 -> Chennai-Delhi

Serial 0 -> Delhi-Kerla Serial 2 -> Kerla-Delhi

Serial 1 -> Chennai-Kerla Serial 2 -> Kerla-Chennai

Then click add

Now ping the both end

Firewall

A firewall is a network security system designed to prevent unauthorized access to or from a


private network.

Firewalls can be implemented in both hardware and software, or a combination of both.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Hardware Firewall Software Firewall


The firewall is a dedicated hardware appliance Software firewalls are installed on your
protecting all your computers, also reffered to as computer and you can customize it, allowing
a network or gateway firewall. you some control over its function and
protection features.
A hardware firewall is more secure, can protect A software firewall will protect your computer
more computers and runs on its own processing from outside attempts to control or gain access
power and so does not affect a computer's your computer, and, depending on your choice
performance. of software firewall.

Windows Firewall Rule

1) Inbound Rule
2) Outbound Rule

Inbound rules:
• These are to do with other things accessing your computer. If you are running a Web Server
on your computer then you will have to tell the Firewall that outsiders are allowed to
connect to it.
Outbound rules:
• These are so that you can let some programs use the Internet, and Block others. You will
want to let your Web Browser (Internet Explorer, Firefox, Safari, Chrome, Opera...) have
access to the Internet, so you will tell Windows Firewall that it's allowed.

Some Firewall Software:

1) Zone Alarm
2) Comodo free firewall
3) Peer Block
4) Tiny wall

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

WIRELESS NETWORK
➢ Wireless network allows to a communication between 2 or many computers without
using physical wire.

Wireless Network Categories


PAN LAN MAN WAN
Coverage Reach within a Reach within a Reach within a Reach within a
person Building or city world wide
campus
Performance Moderate high high Low
Standard IEEE 802.15 802.11 wifi Preparatory Cellular,
Bluetooth IEEE 802.16, broadband,
Wimax 2G, 3G, 4G

What is IEEE ?

➢ Institute of Electrical and Electronics Engineers


➢ Its objectives are the educational and technical advancement of electrical and electronic
engineering, telecommunications, computer engineering and allied disciplines.

IEEE 802 : IEEE 802 is a family of IEEE standards dealing with local area networks and
metropolitan area networks.

IEEE 802 Standard

802.1–Higher layer LAN protocol


802.2– LLC Link Local Control
802.3 –Ethernet
802.4 –Token bus
802.5 –Token Ring
802.6 –MAN
802.11 –Wi-Fi
802.15 –PAN
802.16 –MAN [Wimax]

IEEE 802.11 Standard

STANDARD FREQUENCY SPEED RANGE-METER


802.11 2.4 GHz 2 Mbps 20/100
802.11a 5 GHz 54 Mbps 35/120
802.11b 2.4 GHz 11 Mbps 35/140
802.11g 2.4 GHz 54 Mbps 38/140
802.11n 2.4/5 GHz 150 Mbps 70/250
802.11 ac 5 GHz 1 Gbps 35/........
802.11 ad 60 GHz 7 Gbps 60/100

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Mobile Network Generation


Generation Introduced year Technology used speed
1G 1981 NMT, AMPS 2.4 Kbps
2G 1991 GSM, CDMA, TDMA 64 Kbps
2.5 G Enhanced 2G GPRS, EDGE 115 Kbps
3G 2001 3G, WCDMA, UMTS, 2Mbps 2Mbps
It support Multimedia
video calling.
4G 2012 4G, Mobile IP, LTE 100Mbps
5G Soon Combination of broadband 1 Gbps
LAN, MAN, WAN, PAN

Full Form
NMT - Nordic Mobile Telephone

AMPS - Advance Mobile Phone System

GPRS – General Packet Radio Service


GSM – Global System for Mobile communication
CDMA– Code Division Multiple Access
TDMA - Time Division Multiple Access
WCDMA – Wide Band Code Division Multiple Access
EDGE – Enhanced Data for Global Evolution
UMTS – Universal Mobile Telecommunications Service
HSDPA – High-Speed Downlink Packet Access
LTE – Long Term Evolution

Wireless LAN Security

Wireless security is the prevention of unauthorized access or damage to computers


using wireless networks.

1) WEP (Wired Equivalent Privacy):


WEP is a weak security standard.

The password it uses can often be cracked in a few minutes with a basic laptop
computer and widely available software tools.
2) WPA (Wi-Fi Protected Access):

• WPA was a quick alternative to improve security over WEP.

3) WPA2
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

• The current standard is WPA 2, some hardware cannot support WPA2 without
firmware upgrade or replacement.
• WPA 2 uses an encryption device that encrypts the network with a 256-bit key, the
longer key length improves security over WEP.

Encryption and authentication

1) WPA2-TKIP

• TKIP is actually an older encryption protocol introduced with WPA to replace the very-
insecure WEP encryption at the time.
• TKIP is actually quite similar to WEP encryption.
• TKIP is no longer considered secure, and is now deprecated.

2) WPA2-AES

• AES is a more secure encryption protocol introduced with WPA2.


• AES isn’t some creaky standard developed specifically for Wi-Fi networks, either.
• It’s a serious worldwide encryption standard that’s even been adopted by the US
government
How to configure new wi-fi router

1) See the back side of router


IP = [Link]
User = admin
Password =admin
2) Connect router to PC directly through network cable

3) In PC configure IP address to obtain automatically

4) Check IP in PC (specially gateway address)

5) Open any web browser in PC and type -- [Link]

User =admin
Password = admin

A) Internet setup : Static IP or Dynamic IP or User/Password or Bridged

B) Wireless Security

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

SSID = RTS
Mode: 802.11n
Security option = WPA2
Encryption = AES
Pre shared key = 123456

C) LAN setting
IP = [Link]
SM= [Link]

DHCP mode Enabled


DHCP IP Pool : [Link] - [Link]
Lease time = 3600 sec

D) MAC Address filtering: To fix specific system to access Internet

E) Parental Control
-Blocking web sites
- Blocking services( like http, https, ftp etc)

F) Change router login password --This is one time work

Virtual Private Network (VPN)


• A virtual private network (VPN) is a technology that creates a safe and encrypted secure
connection over a public network, such as the internet.
• VPN technology was developed as a way to allow remote users and branch offices to
securely access corporate applications and other resources.
• To ensure safety, data travels through secure tunnels and VPN users must use
authentication methods -- including passwords, tokens and other unique identification
methods -- to gain access to the VPN.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Brief Overview of How it Works:

✓ Two connections – one is made to the Internet and the second is made to the VPN.
✓ Datagrams – contains data, destination and source information.
✓ Firewalls – VPNs allow authorized users to pass through the firewalls.
✓ Protocols – protocols create the VPN tunnels.

Tunneling:
A virtual point-to-point connection made through a public network. It transports
encapsulated datagrams.

Two types of end points:


• Remote Access
• Site-to-Site

Four Protocols used in VPN:

➢ PPTP (Point-to-Point Tunneling Protocol)- This protocol is used to connect a remote client
to a private server over the internet.

➢ L2TP (Layer 2 Tunneling Protocol)- This protocol is used to tunnel data communication
traffic between two sites over the internet.

➢ IPsec (Internet Protocol Security)- It is used to secure communications over the internet.
Ipsec traffic can use either transport mode or tunneling to encrypt data traffic in a VPN.

➢ SSL (Secure sockets layer)- Use cryptography to secure communications over the internet,
an authentication process involving certificates is used. Certificates are cryptographic key
that are stored on both the server and client.

Types of VPN:

• Intranet – Within an organization


All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

• Extranet – Outside an organization


• Remote Access – Employee to Business

Advantages:

▪ Eliminating the need for expensive long-distance leased lines


▪ Reducing the long-distance telephone charges for remote access.
▪ Transferring the support burden to the service providers
▪ Operational costs saving
▪ Flexibility of growth
▪ Efficiency with broadband technology

Remote-access VPN:

A remote-access VPN uses a public telecommunication infrastructure like the internet to provide
remote users secure access to their organization's network.

A remote-access VPN usually relies on either IPsec or Secure Sockets Layer (SSL) to secure the
connection, although SSL VPNs are often focused on supplying secure access to a single
application, rather than to the entire internal network.

Site-to-site VPN:

A site-to-site VPN uses a gateway device to connect the entire network in one location to the
network in another location, usually a small branch connecting to a data center.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

End-node devices in the remote location do not need VPN clients because the gateway handles the
connection. Most site-to-site VPNs connecting over the internet use IPsec.

Configuration:

In Router 1:

Router>en
Router#conf t
Router(config)#ho R1
R1(config)#int fa0/0
R1(config-if)#ip add [Link] [Link]
R1(config-if)#no shut
R1(config-if)#exit
R1(config)#int fa0/1
R1(config-if)#ip add [Link] [Link]
R1(config-if)#no shut
R1(config-if)#exit
R1(config)#ip route [Link] [Link] [Link]
R1(config)#do wr
R1(config)#do ping [Link]
R1(config)#int tunnel 10
R1(config-if)#ip add [Link] [Link]
R1(config-if)#tunnel source fa0/1
R1(config-if)#tunnel destination [Link]
R1(config-if)#no shut
R1(config-if)#exit
R1(config)#ip route [Link] [Link] [Link]
R1(config)#do wr

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

To Check:

R2(config)#do sh int tunnel 10

In Router 2:

Router>en
Router#conf t
Router(config)#ho R2
R2(config)#int fa0/0
R2(config-if)#ip add [Link] [Link]
R2(config-if)#no shut
R2(config-if)#exit
R2(config)#int fa0/1
R2(config-if)#ip add [Link] [Link]
R2(config-if)#no shut
R2(config-if)#exit
R2(config)#do wr

In Router 3:

Router>en
Router#conf t
Router(config)#ho R3
R3(config)#int fa0/0
R3(config-if)#ip add [Link] [Link]
R3(config-if)#no shut
R3(config-if)#exit
R3(config)#int fa0/1
R3(config-if)#ip add [Link] [Link]
R3(config-if)#no shut
R3(config-if)#exit
R3(config)#ip route [Link] [Link] [Link]
R3(config)#do wr
R3(config)#do ping [Link]
R3(config)#int tunnel 100
R3(config-if)#ip add [Link] [Link]
R3(config-if)#tunnel source fa0/0
R3(config-if)#tunnel destination [Link]
R3(config-if)#no shut
R3(config-if)#exit
R3(config)#ip route [Link] [Link] [Link]
R3(config)#do wr

To Check:

R3(config)#do sh int tunnel

To configure IPSEC site to site vpn:


Learn how to configure IPSEC site to site vpn on cisco router using cisco Packet [Link] we all
know IPsec provides secure transmission of sensetive data over unprotected networks like
internet.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

So what actually IPsec does is it acts at the network layer which means its working in network
layer of TCP/IP model and protecting sensitive data and authenticate IP packets only between
participating IPsec devices like cisco routers.

here in this IPSEC Example lab Router0 and Router1 is is participating in IPsec [Link] in this
acitivity or in this lab i will configure these two routers to support a site to site IPsec VPN for
traffic flowing from their respective LANs.

Step 1:Configuration on Router0


Router(config)#router rip
Router(config-router)#network [Link]
Router(config-router)#network [Link]
Router(config-router)#exit

Step 2. ISAKMP policy:


In this section we will Configure and decide what parameters will be used for the IKE phase 1
tunnel
Router(config)#crypto isakmp policy 10
Router(config-isakmp)#authentication pre-share
Router(config-isakmp)#encryption aes 256
Router(config-isakmp)#group 2
Router(config-isakmp)#lifetime 86400
Router(config-isakmp)#exit

Step 3. Transform Set


In this section we Configure and decide what parameters will eb used for the IKE phase 2 tunnel (aka the
IPSEC tunnel)
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Router(config)#crypto isakmp key redhat address [Link]


Router(config)#crypto ipsec transform-set TSET esp-aes esp-sha-hmac
hmac

Step 4:ACL (Access Control List


Here in this step we will Create an ACL to define what “interesting” traffic will be sent over the VPN
Router(config)#access-list 101 permit ip [Link] [Link] [Link] [Link]

Step 5. Cypto Map


Define and Configure using the previous parameters.
Router(config)#crypto map CMAP 10 ipsec-isakmp
Router(config-crypto-map)#set peer [Link]
Router(config-crypto-map)#match address 101
Router(config-crypto-map)#set transform-set TSET
Router(config-crypto-map)#exit

Step 6. Apply – Apply the cypto map to an interface.


Router(config)#int fa0/0
Router(config-if)#crypto map CMAP
Router(config-if)#do write
Building configuration...
[OK]

Configuration on Router1
Router(config)#router rip
Router(config-router)#network [Link]
Router(config-router)#network [Link]
Router(config-router)# crypto isakmp policy 10
Router(config-isakmp)#authentication pre-share
Router(config-isakmp)#hash sha
Router(config-isakmp)#encryption aes 256
Router(config-isakmp)#group 2
Router(config-isakmp)#lifetime 86400
Router(config-isakmp)#exit

Router(config)#crypto isakmp key redhat address [Link]


Router(config)#crypto ipsec transform-set TSET esp-aes esp-sha-hmac
Router(config)#access-list 101 permit ip [Link] [Link] [Link] [Link]

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Router(config)#crypto map CMAP 10 ipsec-isakmp


% NOTE: This new crypto map will remain disabled until a peer
and a valid access list have been configured.
Router(config-crypto-map)#set peer [Link]
Router(config-crypto-map)#match address 101
Router(config-crypto-map)#set transform-set TSET
Router(config-crypto-map)#exit
Router(config)#int fa0/0
Router(config-if)#crypto map CMAP
*Jan 3 [Link].785: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON
Router(config-if)#do write
Building configuration...
[OK]

Verification on Router0
Test and Verify IPSEC Configuration
Router#show crypto isakmp sa
Router# show crypto ipsec sa

Types Of Switches
1) Store and Forward Switching

➢ In Store and Forward switching, Switch copies each complete Ethernet frame into the switch
memory and computes a Cyclic Redundancy Check (CRC) for errors. If a Cyclic Redundancy
Check (CRC) error is found, the Ethernet frame is dropped and if there is no Cyclic Redundancy
Check (CRC) error, the switch forwards the Ethernet frame to the destination device.
➢ Store and Forward switching can cause delay in switching since Cyclic Redundancy Check
(CRC) is calculated for each Ethernet frame.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

2) Cut-through Switching

In cut-through switching, the switch copies into its memory only the destination MAC address (first 6
bytes of the frame) of the frame before making a switching decision. A switch operating in cut-through
switching mode reduces delay because the switch starts to forward the Ethernet frame as soon as it
reads the destination MAC address and determines the outgoing switch port.

3) Fragment-Free Switching
Fragment-free switching is also known as runtless switching and is a hybrid of cut-through and store-
and-forward switching. Fragment-free switching was developed to solve the late-collision problem
Layer 3 switching is another example of fragment-free switching.

Multilayer switching is a switching technique that switches at both the data link (OSI Layer 2) and
network (OSI Layer 3) layers. To enable multilayer switching, LAN switches must use store-and-
forward techniques because the switch must receive the entire frame before it performs any protocol
layer operations

Backup and Restore of Cisco Router and Switch

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

1) In Server Configure IP=[Link]


2) Open Server – Go to config- TFTP –just to check it should be ON

Router Backup
1) Configure some setting like password, int ,hostname etc.
2) Router# sh run
3) Now take backup
Router# copy start tftp
Address of remote host -tftp[]? [Link]
Destination File name ? rts-router-bkf

Now router configuration is saved in TFTP server

Open Server – go to config- TFTP –just to check file (rts-router-bkf) is


whether saved or not

Router Restore

Now do some changes in router or delete startup-config file.

How to restore old setting ( TFTP server to router) ?


Router# copy tftp start

Address of remote host -tftp[]? [Link]


Source File Name : rts-router-bkf
Destination File name [running-config]: press enter

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Now restart the router and check. All old setting you can see now.

Three-Layered Hierarchical Model

Layers Used for Devices used


❖ Considered the backbone of the High-end switches and
network high-speed cables such
Core Layer ❖ Does not route traffic at the as fiber cables.
LAN.
❖ This layer is concerned with
speed and ensures reliable
delivery of packets.

Distribution ❖ Ensures that packets are Layer includes LAN-


Layer properly routed between subnets based routers and layer
and VLANs in enterprise. 3 switches
❖ Layer is also called the
Workgroup layer.
Access layer ❖ Also called the desktop layer Includes hubs,switches,
❖ It focuses on connecting client PCs etc.
nodes, such as workstations to
the network
❖ Ensures that packets are
delivered to end user computers.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Networking Protocol
A protocol is set of rules that must be followed while communicating two networking devices.

Operating System Network protocol


Windows TCP/IP
Linux TCP/IP
Netware IPX/SPX
Mac os Apple talk

TCP/IP ( Transmission Control Protocol )

✓ It is the collection of protocols and also called TCP/IP protocol suite.


✓ These protocols describe the movement of data between the source and destination or the internet.
✓ It consist of 4 layers and each layer having some protocols.
✓ Each protocol works independently but some protocol works together depend on the requirement.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Application Layer Protocols:


FTP: File Transfer Protocol

This protocol allow users to download files from FTP server.

TFTP: Trivial File Transfer Protocol

Same as FTP but downloading data is divided into a small parts. Downloading is fast in TFTP.

HTTP: Hyper Text Transfer Protocol

It allows web client Browser access web server web page.

HTTPS: Hyper Text Transfer Protocol Secure

It is more secure than http.

SMTP: Simple Mail Transfer Protocol

It is used for sending mail from mail server.

POP: Post Office Protocol

It is used for receiving mail from mail server.

IMAP: Internet Message Access Protocol

It is advanced version of POP.

DHCP: Dynamic Host Configuration Protocol

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

It is used to provide IP address to client PC.

Dynamic Host

DNS: Domain Name System

It resolve name to IP and IP to name (host name).

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

NFS: Network File Service

Sharing Directory from one place to another in Linux environment

WDS: Windows Deployment Service

Installing OS in multiple client pc at a time through network .

RIS: Remote Installation Services

Same as WDS but used with windows server 2003.

Telnet: Terminal Network

It is used for accessing removed device through command mode.

SSH: Secured Shell

Same as Telnet but it is a Secured Communication.

INTERNET PROTOCOL

IP: Internet protocol

➢ It is the method or protocol by which data is sent from one computer to another on the internet.
➢ Each Computer (known as host) on the internet has at least one IP address that uniquely identifies it
from all other Computers on the internet.

ARP: Address Revolution Protocol

To collect Physical Address from the given Logical address.

RARP: Reversed Address Resolution Protocol

ICMP: Internet Control Message Protocol

Behind Ping Command ICMP Protocol Works to Check Connectivity.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

NETWORK ACCESS LAYER

(CSMA/CA). Carrier-sense multiple access with collision avoidance

In CSMA/CA, as soon as a node receives a packet that is to be sent, it checks to be sure the channel is clear
(no other node is transmitting at the time). If the channel is clear, then the packet is sent. If the channel is not
clear, the node waits for a randomly chosen period of time, and then checks again to see if the channel is
clear.

FRAME DELAY

Frame relay is a data link layer, digital packet switching network protocol technology designed to
connect Local Area Networks (LANs) and transfer data across Wide Area Networks (WANs).

It also supports variable-length packet sizes for more efficient utilization of network bandwidth.

Frame Relay operates over fiber optic or ISDN lines and can support different higher level
network protocols including Internet Protocol (IP).

Two types of connections

[Link] Virtual Circuits(PVC): For persistent connections intended to be maintained for long periods of
time even if no data is actively being transferred

[Link] Virtual Circuits (SVC): For temporary connections that last only for the duration of a single
session

FDDI: Fiber Distributed Data Interface

➢ A Higher Speed Backbone technology.


➢ Optical fiber transmission.
➢ Dual ring LAN.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

➢ Thousand stations of network Security.


➢ 100Mbps token passing.
➢ Connect Equipment to the ring over long distance.

Port Number
Network ports are provided by the TCP or UDP protocols at the Transport layer.

They are used by protocols in the upper layers of the OSI model.

Port numbers are used to determine what protocol incoming traffic should be directed to.

Port use is regulated by the Internet Corporation for Assigning Names and Numbers (ICANN).
By ICANN there are three categories for ports:

• From 0 to 1023 – well known ports assigned to common protocols and services
• From 1024 to 49151 – registered ports assigned by ICANN to a specific service
• From 49152 to 65 535 – dynamic (private, high) ports range from 49,152 to 65,535. Can
be used by any service on an ad hoc basis. Ports are assigned when a session is
established, and released when the session ends.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Port Service name Transport protocol

20, 21 File Transfer Protocol (FTP) TCP

22 Secure Shell (SSH) TCP and UDP

23 Telnet TCP

25 Simple Mail Transfer Protocol (SMTP) TCP

50, 51 IPSec

53 Domain Name Server (DNS) TCP and UDP

67, 68 Dynamic Host Configuration Protocol (DHCP) UDP

69 Trivial File Transfer Protocol (TFTP) UDP

80 HyperText Transfer Protocol (HTTP) TCP

110 Post Office Protocol (POP3) TCP

123 Network Time Protocol (NTP) UDP

135-139 NetBIOS TCP and UDP

143 Internet Message Access Protocol (IMAP4) TCP and UDP

389 Lightweight Directory Access Protocol TCP and UDP

443 HTTP with Secure Sockets Layer (SSL) TCP and UDP

Router Booting process

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

The bootup process has three stages:

1. Performing the POST and loading the bootstrap program.


2. Locating and loading the Cisco IOS software.
3. Locating and loading the startup configuration file or entering setup mode.

More about Router


INTRODUCTION TO ROUTERS
Wht is a Router ?
• Router is a device which makes communication possible between two or more different
networks present in different geographical locations.

➢ It is an internetworking device used to connect two or more different networks


➢ It works on layer 3 i.e. network layer.

• It does two basic things:-

➢ Select the best path from the routing table.


➢ Forward the packet on that path

Which Routers to buy ?

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Many companies are manufacturing Router :


Cisco Nortel Multicom Cyclades Juniper
Dlink Linksys 3Com Huwaei Nokia

But Cisco is having Monopoly in the market of Routers

Cisco’s Hierarchical Design Model

Cisco divided the Router into 3 Layers

• Access Layer Router


• Distribution Layer Router
• Core Layer Router

Access Layer Router


• Routers which are used by the Small Organization and are also known as Desktop or
Company Layer Routers.

Router Series : 800, 1900, Old ones :- 1600, 1700, 2500

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Distribution Layer Router

➢ Routers which are used by the ISPs and are also known as ISP Layer Routers
➢ Router Series : 3800, 3900 old one :- 2600, 3200, 3600, 3700

Core Layer Router

• Routers which are used by the Global


ISPs and are also known as Backbone
Routers

Router Series : 6400, 7200, 7300, 7400,


7500, 7600,10000, 12000

Router Classification

Example Modular Router

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Router Ports

Attachment Unit Interface


• AUI pin configuration is 15 pin female.
• It is known as Ethernet Port or LAN port or Default
Gateway.
• It is used for connecting LAN to the Router.
• Transceiver is used for converting 8 wires to 15
wires. i.e. RJ45 to 15 pin converter.

Serial Port

• Serial pin configuration is 60 pin configuration female (i.e. 15 pins and 4 rows) and Smart
Serial pin configuration is 26 pin configuration female.
• It is known as WAN Port
• It is used for connecting to Remote Locations
• V.35 cable is having 60 pin configuration male at one
end and on the other end 18 pin configuration male.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Console Port

• It is known as Local Administrative Port


• It is generally used for Initial Configuration, Password Recovery and Local Administration of
the Router. It is RJ45 Port
• IMP : It is the most delicate port on the Router. So make less use of the Console Port.
Console Connectivity
• Connect a rollover cable to the router
console port (RJ-45 connector).
• Connect the other end of the rollover
cable to the RJ-45 to DB-9 converter
• Attach the female DB-9 converter to a PC
Serial Port.
• Open Emulation Software

Auxiliary Port

• It is known as Remote Administrative Port.


• Used for remote administration
• Its an RJ-45 port

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

• A console or a rollover cable is to be used.

2601 Model Router

Brief Overview

o WAN interfaces
▪ Serial interface (S0, S1 etc) – 60 pin/26 pin(smart serial)
▪ ISDN interface(BRI0 etc) – RJ45
o LAN interfaces - Ethernet
▪ AUI (Attachment Unit Interface) (E0)– 15 pin
▪ 10baseT – RJ45
o Administration interfaces
▪ Console – RJ45 – Local Administration
▪ Auxiliary – RJ45 – Remote Administration

Internal Components
ROM
A bootstrap program is located here. It is same as the BIOS of the PC. Bootstrap program
current version is 11.0
Flash
Internetwork Operating System (IOS) developed by Cisco is stored here. IOS is Command
line interface.
NVRAM
Non volatile RAM, similar to Hard Disk It is also known as Permanent Storage or Startup
Configuration. Generally size of NVRAM is 32 KB.
RAM
It is also known as Temporary Storage or running Configuration. Minimum size of RAM is
2MB. The size of RAM is greater than NVRAM in the Router.
Processor
Motorola Processor 70 Mhz, RISC based processor (Reduced Instruction Set Computer)

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

More About Switch


Cisco Switch Models

L2: 2950,2960
L3: 3550,3560,3750,4500,6500,7000

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Cisco Catalyst 3750 Series Switches

Hardware Features
3750 Series Switches consume less power than their predecessors.
Get support for up to 48 PoE+ ports, Cisco UPOE (60W per port), and energy-efficient Ethernet.
Support nonstop communications with hot-swappable power supplies, cooling fans, and network
modules.
Software Features
They can provide investment protection by enabling a unified network for data, voice, and video.
IP Base software includes advanced QoS, rate limiting, ACLs, Open Shortest Path First for routed
access, and IPv6 functionality.
Protect against malicious behavior with Flexible NetFlow. Protect data confidentiality with MACsec
Layer 2 encryption. Provide identity-based access control with TrustSec.
Used Area
They are ideal access layer switches for enterprise, retail, and branch-office environments.

Cisco Catalyst 9300 Series Switches


Catalyst 9300 Series switches are the industry’s first platforms optimized for 802.11ac Wave 2 with
support for 2.5- Gbps/multigigabit downlinks and for Cisco perpetual UPOE and PoE+.
It provides support for connecting a high density of 802.11ac Wave 2 access points (48) in a single
RU box.
The Cisco Catalyst 9300 has the most flexible uplink architecture, with support for 1 Gbps,
multigigabit, 10 Gbps and 40 Gbps.
Up to 384 ports of PoE, PoE+, 60W Cisco UPOE
Trustworthy security, audio-visual bridging, service discovery, and IoT classification.
Solve problems faster, improve operational efficiency, and reduce the risk of downtime proactively

Switching Mode
Store-and-Forward: Store-and-Forward switching will wait until the entire frame has arrived prior to forwarding
it. This method stores the entire frame in memory. Once the frame is in memory, the switch checks the destination
address, source address, and the CRC. If no errors are present, the frame is forwarded to the appropriate port. This
process ensures that the destination network is not affected by corrupted or truncated frames.

Cut-Through: Cut-Through switching will begin forwarding the frame as soon as the destination address is
identified.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

The difference between this and Store-and-Forward is that Store-and-Forward receives the whole frame before
forwarding. Since frame errors cannot be detected by reading only the destination address, Cut-Through may
impact network performance by forwarding corrupted or truncated frames. These bad frames can create broadcast
storms wherein several devices on the network respond to the corrupted frames simultaneously.

Store-and-forward

• Catalyst 2960 and 2960-S


• Catalyst 3750-X and 3560-X

Cut-through

• The Cisco Nexus 5000 Series access-layer switch is an example of a low-latency cut-through single-
stage fabric implementation

Default Settings for Switching Modes


Cut-through switching is enabled by default.

Configuring Switching Modes Enabling Store-and-Forward Switching


Step 1 --> switch# configure terminal : Enters global configuration mode.
Step 2 --> switch(config) # switching-mode store-forward : Enables store-and-forward switching mode.
Step 3 --> switch(config) # do wr

Reenabling Cut-Through Switching


Step 1 --> switch# configure terminal : Enters global configuration mode.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Step 2 --> switch(config) # no switching-mode store-forward : Enables store-and-forward switching mode.


Step 3 --> switch(config) # do wr

More about STP

STP
Introduction to Spanning-Tree Protocol
Spanning-tree is a protocol that runs on our switches that helps us to solve loops.

Why do we need spanning-tree?

What is a loop and how do we get one? Let me show you an example:

In the picture above we have two switches. These switches are connected to each other with a
single cable so there is a single point of [Link] get rid of this single point of failure we will add
another cable:

With the extra cable we now have redundancy. Unfortunately for us redundancy also
brings loops. Why do we have a loop in the scenario above? Let me describe it to you:
1. H1 sends an ARP request because it’s looking for the MAC address of H2. An ARP request is
a broadcast frame.
2. SW1 will forward this broadcast frame on all it interfaces, except the interface where it received the
frame on.
3. SW2 will receive both broadcast frames.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Now what does SW2 do with those broadcast frames?

1. It will forward it out of every interface except the interface where it received the frame on.
2. This means that the frame that was received on interface Fa0/0 will be forwarded on Interface Fa1/0.
3. The frame that was received on Interface Fa1/0 will be forwarded on Interface Fa0/0.
Do you see where this is going? We have a loop! Both switches will keep forwarding over and over
again until the following happens:

• You fix the loop by disconnecting one of the cables.


• One of your switches will crash because they are overburdened with traffic.
Ethernet frames don’t have a TTL (Time to Live) value so they will loop around forever. Besides
ARP requests there are many frames that are broadcasted. For example whenever the switch
doesn’t know about a destination MAC address it will be flooded.

How spanning-tree solves loops

Spanning-tree will help us to create a loop-free topology by blocking certain interfaces. Let’s take
a look how spanning-tree works! Here’s an example:

We have three switches and as you can see we have added redundancy by connecting the
switches in a triangle, this also means we have a loop here. I have added the MAC addresses but
simplified them for this example:
• SW1: MAC AAA
• SW2: MAC BBB
• SW3: MAC CCC
Since spanning tree is enabled, all our switches will send a special frame to each other called
a BPDU (Bridge Protocol Data Unit). In this BPDU there are two pieces of information that
spanning-tree requires:
• MAC address

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

• Priority
The MAC address and the priority together make up the bridge ID. The BPDU is sent between
switches as shown in the following picture:

Spanning-tree requires the bridge ID for its calculation. Let me explain how it works:

• First of all spanning tree will elect a root bridge; this root-bridge will be the one that has the best
“bridge ID”.
• The switch with the lowest bridge ID is the best one.
• By default the priority is 32768 but we can change this value if we want.
So who will become the root bridge? In our example SW1 will become the root bridge! Priority and
MAC address make up the bridge ID. Since the priority is the same on all switches it will be the
MAC address that is the tiebreaker. SW1 has the lowest MAC address thus the best bridge ID and
will become the root bridge.

The ports on our root bridge are always designated which means they are in a forwarding state.
Take a look at the following picture:

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Above you see that SW1 has been elected as the root bridge and the “D” on the interfaces stands
for designated.

Now we have agreed on the root bridge our next step for all our “non-root” bridges (so that’s
every switch that is not the root) will have to find the shortest path to our root bridge! The
shortest path to the root bridge is called the “root port”. Take a look at my example:

I’ve put an “R” for “root port” on SW2 and SW3, their Fa0/0 interface is the shortest path to get
to the root bridge. In my example I’ve kept things simple but “shortest path” in spanning tree
means it will actually look at the speed of the interface. Each interface has a certain cost and the
path with the lowest cost will be used. Here’s an overview of the interfaces and their cost:
• 10 Mbit = Cost 100
• 100 Mbit = Cost 19
• 1000 Mbit = Cost 4
Excellent!…we have designated ports on our root bridge and root ports on our non-root bridges,
we still have a loop however so we need to shut down a port between SW2 and SW3 to break that
loop. So which port are we going to shut down? The one on SW2 or the one on SW3? We’ll look
again at the best bridge ID:

• Bridge ID = MAC address + Priority.


Lower is better, both switches have the same priority but the MAC address of SW2 is lower, this
means that SW2 will “win this battle”. SW3 is our loser here which means it will have to block its
port, effectively breaking our loop! Take a look at my example:

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

VTP VERSIONS

There are three version of VTP so far. VTP Version 2 (V2) is not much different than VTP Version 1
(V1). The major difference is that VTP V2 introduces the support for Token Ring VLANs. If you are
using Token Ring VLANs, you need to enable VTP V2. Otherwise, there is no reason to use VTP V2. VTP
version 3 differs from earlier VTP versions in that it does not directly handle VLANs. VTP version 3 is a
protocol that is only responsible for distributing a list of opaque databases over an administrative domain.
When enabled, VTP version 3 provides the following enhancements to previous VTP versions:

• Support for extended VLANs.


• Support for the creation and advertising of private VLANs.
• Improved server authentication.
• Protection from the "wrong" database accidentally being inserted into a VTP domain.
• Interaction with VTP version 1 and VTP version 2.
• Provides the ability to be configured on a per-port basis.
• Provides the ability to propagate the VLAN database another databases.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

CCNA Interview Questions & Answers


1) What is Routing?

Routing is the process of finding a path on which data can pass from source to destination. Routing is done
by a device called routers, which are network layer devices.

2) What is the purpose of the Data Link?

The job of the Data Link layer is to check messages are sent to the right device. Another function of this
layer is framing.

3) What is the key advantage of using switches?

When a switch receives a signal, it creates a frame out of the bits that was extracted from that signal. With
this process, it gains access and reads the destination address, after which it forwards that frame to the
appropriate port. This is a very efficient means of data transmission, instead of broadcasting it on all ports.

4) When does network congestion occur?

Network congestion occurs when too many users are trying to use the same bandwidth. This is especially
true in big networks that do not resort to network segmentation.

5) What is a Window in networking terms?

A Window refers to the number of segments that is allowed to be sent from source to destination before an
acknowledgement is sent back.

6) Does a bridge divide a network into smaller segments?

Not really. What a bridge actually does is to take the large network and filter it, without changing the size of
the network.

7) Which LAN switching method is used in CISCO Catalyst 5000?

This model uses the Store-and-forward switching method. It stores the entire frame to its buffers and
performs a crc check before deciding whether or not to forward that data frame.

8 ) What is the role of the LLC sublayer?

The LLC sublayer, short for Logical Link Control, can provide optional services to an application developer.
One option is to provide flow control to the Network layer by using stop/start codes. The LLC can also
provide error correction.

9) How does RIP differ from IGRP?

RIP relies on the number of hops in order to determine the best route to a network. On the other hand,
IGRP takes consideration many factors before it decides the best route to take, such as bandwidth,
reliability, MTU and hop count.

10) What are the different memories used in a CISCO router?

– NVRAM stores the startup configuration file


– DRAM stores the configuration file that is being executed
– Flash Memory – stores the Cisco IOS.

11) What is BootP?

BootP is a protocol that is used to boot diskless workstations that are connected to the network. It is short
for Boot Program. Diskless workstations also use BootP in order to determine its own IP address as well as
the IP address of the server PC.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

12) What is the function of the Application Layer in networking?

The Application Layer supports the communication components of an application and provides network
services to application processes that span beyond the OSI reference model specifications. It also
synchonizes applications on the server and client.

13) Differentiate User Mode from Privileged Mode

User Mode is used for regular task when using a CISCO router, such as to view system information,
connecting to remote devices, and checking the status of the router. On the other hand, privileged mode
includes all options that are available for User Mode, plus more. You can use this mode in order to make
configurations on the router, including making tests and debugging.

14) What is 100BaseFX?

This is Ethernet that makes use of fiber optic cable as the main transmission medium. The 100 stands for
100Mbps, which is the data speed.

15) Differentiate full-duplex from half-duplex.

In full-duplex, both the transmitting device and the receiving device can communicate simultaneously, that
is, both can be transmitting and receiving at the same time. In the case of half-duplex, a device cannot
receive while it is transmitting, and vice versa.

16) What is MTU?

MTU stands for Maximum Transmission Unit. It refers to the maximum packet size that can be sent out
onto the data line without the need to fragment it.

17) How does cut-through LAN switching work?

In Cut-Through LAN switching, as soon as the router receives the data frame, it will immediately send it out
again and forward it to the next network segment after reading the destination address.

18) What is latency?

Latency is the amount of time delay that measures the point from which a network device receives a data
frame to the time it sends it out again towards another network segment.

19) Utilizing RIP, what is the limit when it comes to number of hops?

The maximum limit is 15 hop counts. Anything higher than 15 indicates that the network is considered
unreachable.

20) What is a Frame Relay?

Frame Relay is a WAN protocol that provides connection-oriented communication by creating and
maintaining virtual circuits. It has a high performance rating and operates at the Data Link and Physical
Layers.

21) How do you configure a Cisco router to route IPX?

The initial thing to do is to enable IPX routing by using the “ipx routing” command. Each interface that is
used in the IPX network is then configured with a network number and encapsulation method.

22) What are the different IPX access lists?

There are two access lists: Standard and Extended. Standard Access List can only filter the source or
destination IP address. An Extended Access List uses the source and destination IP addresses, port,
socket and protocol when filtering a network.

23) Explain the benefits of VLANs.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

VLANs allow the creation of collision domains by groups other than just physical location. Using VLANs, it
is possible to establish networks by different means, such as by function, type of hardware, protocol,
among others. This is a big advantage when compared to conventional LANs wherein collision domains are
always tied to physical location.

24) What is subnetting?

Subnetting is the process of creating smaller networks from a big parent network. Being a part of a network,
each subnet is assigned some additional parameters or identifier to indicate its subnet number.

25) What are the advantages of a layered model in the networking industry?

A layered network offers many advantages. It allows administrators to make changes in one layer without
the need to make changes in the other layers. Specialization is encouraged, allowing the network industry
to make progress faster. A layered model also lets administrators troubleshoot problems more efficiently.

26) Why is UDP lease favored when compared to TCP?

It’s because UDP is unreliable and unsequenced. It is not capable of establishing virtual circuits and
acknowledgements.

27) What are some standards supported by the Presentation layer?

Presentation layer supports many standards, which ensures that data is presented correctly. These include
PICT, TIFF and JPEG for graphics, MIDI, MPEG and QuickTime for Video/Audio.

28) What’s the simplest way to remotely configure a router?

In cases when you need to configure a router remotely, the most convenient is to use the Cisco AutoInstall
Procedure. However, the router must be connected to the WAN or LAN through one of the interfaces.

29) What does the show protocol display?

– routed protocols that is configured on the router


– the address assigned on each interface
– the encapsulation method that was configured on each interface

30) How do you depict an IP address?

It can be done in three possible ways:


– using Dotted-decimal. For example: [Link]
– using Binary. For example: 10000010.00111011.01110010.01110011
– using Hexadecimal. For example: 82 1E 10 A1

31) How do you go to privileged mode? How do you switch back to user mode?

To access privileged mode, you enter the command “enable” on the prompt. In order to get back to user
mode, enter the command “disable”

32) What is HDLC?

HDLC is short for High Level Data Link Control protocol, and is a propriety protocol of CISCO. It is the
default encapsulation operated within CISCO routers.

33) How are internetworks created?

Internetworks are created when networks are connected using routers. Specifically, the network
administrator assigns a logical address to every network that connects to the router.

34) What is Bandwidth?

Bandwidth refers to the transmission capacity of a medium. It is a measure of how much volume a
transmission channel can handle, and is measured in Kbps.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

35) How does Hold-downs work?

Hold-downs prevent regular update messages from reinstating a downed link by removing that link from
update messages. It uses triggered updates to reset the hold-down timer.

36) What are packets?

Packets are the results of data encapsulation. These are data that has been wrapped under the different
protocols of the OSI layers. Packets are also referred to as datagrams.

37) What are segments?

Segments are sections of a data stream that comes from the upper OSI layers and ready for transmission
towards the network. Segments are the logic units at the Transport Layer.

38) Give some benefits of LAN switching.

– allows full duplex data transmission and reception


– media rate adaption
– easy and efficient migration

39) What is Route Poisoning?

Route Poisoning is the process of inserting a table entry of 16 to a route, making it unreachable. This
technique is used in order to prevent problems caused by inconsistent updates on a route.

40) How do you find valid hosts in a subnet?

The best way to go about this is to use the equation 256 minus the subnet mask. The hosts that are
considered valid are those that can be found between the subnets.

41) What is DLCI?

DLCI, or Data Link Connection Identifiers, are normally assigned by a frame relay service provider in order
to uniquely identify each virtual circuit that exists on the network.

42) Brielfly explain the conversion steps in data encapsulation.

From a data transmitter’s point of reference, data from the end user is converted to segments. Segments
are then passed on to the other layers and converted into packets or datagrams. These packets are then
converted into frames before passing on to the network interface. Finally, frames are converted to bits prior
to actual data transmission.

43) What are the different types of passwords used in securing a CISCO router?

There are actually five types of passwords that can be used. These are enable secret, enable, virtual
terminal, console, and auxiliary.

44) Why is network segmentation a good idea when managing a large network?

For a network administration, segmenting a network would help ease network traffic and ensures that high
bandwidth is made available at all times for all users. This translates to better performance especially for a
growing network.

45) What are the things that can be accessed in a CISCO router’s identifying information?

The hostname and the Interfaces. The hostname is the name of your router. The Interfaces are fixed
configurations that refer to the router ports.

46) Differentiate Logical Topology from Physical Topology

Logical Topology refers to the signal path through the physical topology. Physical Topology is the actual
layout of the network medium.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

47) What causes a triggered update to reset the router hold-down timer?

This may happen when the hold-down timer has already expired, or when the router received a processing
task that incidentally was proportional to the number of links in the internetwork.

48) In configuring a router, what command must be used if you want to delete the configuration data that is
stored in the NVRAM?

A. erase running-config
B. erase startup-config
C. erase nvram
D. delete nvram
Correct Answer: B. erase startup-config

49) Referring to the commands shown, what command must next be used on the branch router prior to traffic
being sent to the router router?

Hostname: Branch Hostname: Remote


PH# 123-6000, 123-6001 PH# 123-8000, 123-8001
SPID1: 32055512360001 SPID1: 32055512380001
SPID2: 32055512360002 SPID2: 32055512380002
isdn switch-type basic ni
username Remote password cisco
interface bri0
ip address [Link] [Link]
encapsulation ppp
ppp authentication chap
isdn spid1 41055512360001
isdn spid2 41055512360002
dialer map ip [Link] name Remote 1238001
dialer-list 1 protocol ip permit

Correct Answer: (config-if)# dialer-group 1

50) When configuring a router utilizing both physical and logical interfaces, what factor must be considered in
determining the OSPF router ID?

A. The highest IP address of any physical interface.


B. The lowest IP address of any logical interface.
C. The middle IP address of any logical interface..
D. The lowest IP address of any physical interface.
E. The highest IP address of any interface.
F. The highest IP address of any logical interface.
G. The lowest IP address of any interface.

Correct Answer: A. The highest IP address of any physical interface.

51) Mention what is the difference between the switch, hub, and router?

Hub Switch Router

Hub has single broadcast It is a device that filters and forwards packets
domain and collision between LAN segments. Switches have single
domain. Anything comes broadcast domain and multiple collision domains. It
in one port is sent out to supports any packet protocol, as such it operates at the Router is a device which transmits
the others. data link layer 2 and layer 3 data packets along networks.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

52. Mention what is the size of IP address?

Size of IP address is 32 bit for IPv4 and 128 bit for IPv6.

53. Mention what does data packets consist of?

A data packet consists of sender’s information, recipient’s information, and the data contained. It also has
the numeric identification number that defines the packet number and order. When data is send across the
network, that information is segmented into data packets. In short, data packets carry the information and
routing configuration for your transferred message.

54. Mention what is DHCP?

DHCP stands for Dynamic Host Configuration Protocol. DHCP assigns an IP address automatically to a
given workstation client. You can also make static IPS for machines like printers, servers, routers and
scanners.

55. Mention what is BOOTP?

BOOTP is a computer networking protocol used to deploy an IP address to network devices from a
configuration server.

56. Explain why is UDP lease favored when compared to TCP?

It is because UDP is un-sequenced and unreliable. It is not capable of creating virtual circuits and
acknowledgments

57. Mention what is the difference between dynamic IP and static IP addressing?

Dynamically IP addresses are provided by DHCP server and static IP address are given manually.

58. Mention what are the ranges for the private IPS?

Ranges for private IPS are

• Class A: [Link] – [Link]


• Class B: [Link] – [Link]
• Class C: [Link] – [Link]

59. In how many ways you can access router?

You can access it in three ways

• Telnet (IP)
• AUX (Telephone)
• Console (Cable)
60. Explain what is EIGRP?

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

EIGRP stands for Enhanced Interior Gateway Routing Protocol; it is a routing protocol designed by Cisco
Systems. It is availed on a router to share routes with other routers within the same autonomous system.
Unlike other routers like RIP, EIGRP only sends incremental updates, decreasing the workload on the
router and the amount of data that needs to be transferred.

61. Mention what is the matric of EIGRP protocol?

EIGRP protocol consists of

• Bandwidth
• Load
• Delay
• Reliability
• MTU
• Maximum Transmission Unit

62. Mention what does the clock rate do?

Clockrate enables the routers or DCE equipment to communicate properly.

63. Mention what command you must use if you want to delete or remove the configuration data that is stored
in the NVRAM?

Erase startup- coding is the command you must use if you want to delete the configuration data that is
stored in the NVRAM

64. Mention what is the difference between TCP and UDP?

Ans: Connection oriented and Connectionless oriented

65. Explain the difference between half-duplex and full-duplex?

Full duplex means that the communication can occur in both directions at the same time, while half duplex
means that the communication can occur in one direction at time.

66. Mention the conversion steps of data encapsulation?

Conversion steps of data encapsulation includes

• Layer one, two and Three ( Application/presentation/session) : Alphanumeric input from the user is converted
into Data
• Layer Four (Transport): Data is converted into small segments
• Layer Five (Network): Data converted into packets or datagrams and Network header is added
• Layer Six (Data Link): Datagrams or packets are built into frames
• Layer Seven (Physical): Frames are converted into bits

67. What command do we give if router IOS is stucked?

Cntrl+Shift+F6 and X is the command we give if router IOS is stucked.

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

[Link] what is route poisoning?

Route poisoning is a technique of preventing a network from transmitting packets through a route that has
become invalid.

69. What route entry will be assigned to dead or invalid route in case of RIP?

In the case of RIP table entry 16 hops will be assigned to dead or invalid route making it unreachable.

Real Time Signals Technologies ( IP Adress Test)


Topic: IP Addressing Time: 1 hour

Full Marks: 60 Pass Marks: 30

1) Write different classes of IPv4? -2M

Ans:

2) Which class is used for small network? -1M

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Ans:

3) Which class is reserved for R & D ? - 1M

Ans:

4) Write IP range for all classes. -5M

Ans: Class Starting IP Ending IP

5) What are reserved bits in each class? -2M

Ans: Class Reserved bits


A
B
C
D
E

6) Which IP is reserved and also called loopback address ? -1M

Ans:

7) Write any 3 difference between Public IP and Private IP? -3M

Ans:

Public IP Private IP

8) Write any 4 difference between IPv4 and IPv6 ? -4M

Ans:

IPV4 IPV6

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

9) Which organization is responsible for managing IP addresses? -1M

Ans:

10) What is the maximum number of host/network in Class C? -1M

Ans:

11) Fill the appropriate IP address in gap provided: 7 x 2 = 14 Marks

Classful IP Address range

Class Starting IP Address Ending IP Address


A 1 .0.0.0 126 .254.254.254
B 191. 254.254.254
C [Link]
D [Link]
E 255. 254.254.254
Private IP Address range

Class Starting IP Address Ending IP Address


A [Link]
B [Link]
C [Link]

12) Fill the blanks : 6x1=6


Marks

[Link] Class Network bits Host bits Subnet Mask


1 A 8

2 B 16 [Link]

3 C

13) Which of the following information is right or wrong: 9x1=9

a) Class B IP address range - 128 to 192 :

b) Public IP is used is to share Internet :

c) Class E IP is reserved for R & D :

d) Class A IP is used for large network:

e) IPv4 consist of 32 bytes :


All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

f) IPv6 consist 128 bits :

h) ARPAnet manages IP addressing :

i) Reserved bits of Class A and Class B is 0 and 10 resp :

h) Subnet Mask of Class C is [Link] :

14) Write the Suitable IP for 2nd and 3rd System to properly communicate with First . --10 M

PC-1 PC-2 PC-2


[Link]
[Link]
[Link]
[Link]
[Link]
15) What is Unicast, Multicast and Broadcast in IP ? Write 2 differences only .

Unicast Multicast Broadcast

Best of Luck

Subnetting Practice Set


1. 1)Represent /26 in dotted decimal format.

A-> [Link]
B-> [Link]
C-> [Link]
D-> [Link]

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

2. 2)You have an interface on a router with the IP address of [Link]/29. Including the router interface,
how many hosts can have IP addresses on the LAN attached to the router interface?
A. 6 B) 8 C) 30 D) 32

3)You need to configure a server that is on the subnet [Link]/29. The router has the first available
host address. Which of the following should you assign to the server?
A. [Link] [Link]

B. [Link] [Link]

C. [Link] [Link]

D. [Link] [Link]
3. 4)You have an interface on a router with the IP address of [Link]/29. What is the broadcast address
the hosts will use on this LAN?
A. [Link]

B. [Link]

C. [Link]

D. [Link]
4. 5)What is the subnetwork address for a host with the IP address [Link]/28?
A. [Link]

B. [Link]

C. [Link]

D. [Link]

5. 6)On a VLSM network, which mask should you use on point-to-point WAN links in order to reduce the
waste of IP addresses?
A. /27 B) /29 C) /29 D) /30

7)Which configuration command must be in effect to allow the use of 8 subnets if the Class C subnet mask
is [Link]?
A. Router(config)#ip classless B) Router(config)#no ip classful

C. Router(config)#ip unnumbered D) Router(config)#ip subnet-zero

Class C subnet mask of [Link] is 3 bits on and 5 bits off (11100000) and provides 8 subnets, each
with 30 hosts. However, if the command ip subnet-zero is not used, then only 6 subnets would be available
for use.

6.
9) A network administrator is connecting hosts A and B directly through their Ethernet interfaces, as shown
in the illustration. Ping attempts between the hosts are unsuccessful. What can be done to provide
connectivity between the hosts?

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

1. 1)A crossover cable should be used in place of the straight-through cable.


2. 2)A rollover cable should be used in place of the straight-through cable.
3. 3)The subnet masks should be set to [Link].
4. 4)A default gateway needs to be set on each host.
5. 5)The subnet masks should be set to [Link].
A. 1 only B) 2 only C) 3 and 4 only D) 1 and 5 only E) 2 and 5 only

9)What subnet mask will allow for 128 hosts on a subnet? (choose the best two answers)

A) /25 B) /24 C) [Link] D) [Link]


10) When calculating usable hosts per subnet, the following formula is used 2^bits - 2. For what reason is
two subtracted? (choose two)

A) Broadcast B) Multicast C) Unicast D) Network

11. 11)What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the
[Link] subnet mask?
A. 14 B) 15 C) 16 D) 30

12)You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet mask
would you use?
A. [Link] B) [Link]

C. [Link] D) [Link]

13. You have a network that needs 29 subnets while maximizing the number of host addresses available on
each subnet. How many bits must you borrow from the host field to provide the correct subnet mask?
A. 2 B) 3 C) 4 D) 5

No Choice Questions

14. Enter the broadcast address for the network [Link] [Link]
Answer: [Link]
Enter the last valid host on the network [Link] [Link]:
Answer: [Link]
15. What is the Subnet Mask corresponding to a shorthand of /22?
Answer: [Link]
16. What is the Subnet Mask corresponding to a shorthand of /20?
Answer: [Link]

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Enter the maximum number of valid subnets and usable hosts per subnet that you can get from the
network [Link]/22:
Answer: Subnets: 64, Hosts per subnet: 1022
What subnet mask would you use for the [Link] network, such that you can get 250 subnets and
240 hosts per subnet?
Answer: [Link]
17. Enter the valid host range for the network that the IP address [Link] [Link] is a
part of:
Answer: First Host: [Link], Last Host: [Link]
18. Enter the last valid host on the network [Link] [Link]:
Answer: [Link]

Class B Questions

19. 19)The network address of [Link]/19 provides how many subnets and hosts?
A. 7 subnets, 30 hosts each

B. 8 subnets, 8,190 hosts each

C. 8 subnets, 2,046 hosts each

D. 7 subnets, 2,046 hosts each

20. 20)If an Ethernet port on a router were assigned an IP address of [Link]/25, what would be the
valid subnet address of this host?
A. [Link]

B. [Link]

C. [Link]

D. [Link]
21. 21)What is the subnetwork number of a host with an IP address of [Link]/21?
A. [Link]

B. [Link]

C. [Link]

D. [Link]
22. 22)You have a network with a subnet of [Link]/22. Which is the valid host address?
A. [Link] [Link]

B. [Link] [Link]

C. [Link] [Link]

D. [Link] [Link]
23. 23)If a host on a network has the address [Link]/30, what is the subnetwork this host belongs
to?
A. [Link]

B. [Link]

C. [Link]

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

D. [Link]
24)What address Class does [Link]/24 belong to?

A) Class A
B) Class B
C) Class C
D) Class D

25)Based on [Link]/24, the IP address would be:

A) Class A B) Class B C) Class C D) Class D

26)How many hosts can be addressed on [Link]/16?

A) 16 B) 254 C) 65536 D) 65534

27) Which two statements describe the IP address [Link]/23?

1. 1: The subnet address is [Link] [Link].


2. 2: The lowest host address in the subnet is [Link] [Link].
3. 3: The last valid host address in the subnet is [Link] [Link].
4. 4: The broadcast address of the subnet is [Link] [Link].
A. 1 and 3 B) 2 and 4 C) 1, 2 and 4 D) 2, 3 and 4

28) Enter the first valid host on the network that the host [Link]/18 is a part of:
Answer: [Link]
29) Enter the broadcast address for the network [Link] [Link]:
Answer: [Link]
30) Enter the subnet the host [Link]/22 belongs to:
Answer: [Link]

Best of Luck

Rough Work

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Rough Work

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]

Rough Work

All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale

You might also like