0% found this document useful (0 votes)
89 views62 pages

42016022..4th Training Ccna

This document provides an overview of a CCNA (Cisco Certified Network Associate) training course on routing and switching. The training covers networking fundamentals including network components, topologies, structures, devices, cabling, protocols, IP addressing, routing, switching, access control lists, and VLANs. The training is intended to prepare students to install, configure, operate, and troubleshoot medium-sized routed and switched networks.

Uploaded by

Hazem Qaed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views62 pages

42016022..4th Training Ccna

This document provides an overview of a CCNA (Cisco Certified Network Associate) training course on routing and switching. The training covers networking fundamentals including network components, topologies, structures, devices, cabling, protocols, IP addressing, routing, switching, access control lists, and VLANs. The training is intended to prepare students to install, configure, operate, and troubleshoot medium-sized routed and switched networks.

Uploaded by

Hazem Qaed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 62

Higher Technological Institute

10th Of Ramadan City Computer Science

Summer Training Course

CCNA
(Routing & Switching)
[Training Course code FTR 430]
[company name,CCNA ‫]برنامج تدريبي بالمعهد‬
Hazem adel qaed abdelatty
42016022
Instructor: ENG.Mohmed abd elhady
Supervised by: ENG.Mohmed abd
elhady
4thTraining
AUG/ SEP 2021

I
ABSTRACT
This report introduces the phase training and gained knowledge for course
CCNA (CISCO CERTIFIED NETWORK ASSOCIATE)
This course includes basics of CCNA

- Network components
- IPV4 & IPV6
- Subnetting
- protocols
- Router
- Routing configuration
- Access control list
- Switching (VLAN)

II
Acknowledgment
At first, Thanks to ALLAH the most merciful the most gracious, for this moment
has come and this work has been accomplished. Thanks to the Higher
Technological Institute of 10th Ramdan for preparing me to be a successful
Engineer and lifting me up to achieve this training in an environment that‟s full
of encouragement and motivation. Deepest gratitude is to be delivered to
ENG.[Mohamed abd elhady], my role model in engineering. He understood the
nature of my thoughts and guided me step by step till this work brought to light.
Endless trust in my potentials guided me till the end. Thank you. Special thanks
to [Mohamed abd elhady] for his help and knowledge in the field of training.
There professional touches are sensed within every phase of this summer
training. I‟d like to thank my father, who is my motivators, visionaries and great
supporter ever since my graduation. He always pushes me up and drives me to
the success. Not to forget everyone who helped me, prayed for me, wished me
luck or pushed me forwards and beard a lot to help this work come to life.
Thanks to my colleagues, friends, labors, technaician and everyone else for
everything they did. Last but never forgotten, Thanks to my dear family, for
being supportive and always by my side. No words can express my deepest and
sincere gratitude towards the love and care you have granted me in my hardest
times. May ALLAH fill your hearts with happiness when we share this success
together.

III
USED TERMS
network Is group of devices connected with each other to make specific
service to share data
Subnetting Divide major network into smaller networks
repeater Uses to make connection between two devices that long
distance between them with the same signal from source
to destination

Subnet Used to identify the network part and host part


mask
Router Is device which choose the best path

IPv4 Is the version of the Internet protocol with 32 bits and


contains 4 octet each octet has 8 bits
IPv6 Is the latest version of the Internet protocol with 128 bits
and contains 8octet and each octet contains 4character
each 2character are 8bits

IV
LIST OF ABBREVIATION
No. Key term explanation

1 PC Personal computer

2 LAN Local area network

4 TCP/IP Transportation Control


Protocol/Internet
Protocol
5 RIP Routing information
protocol
6 EIGRP Enhanced interior
gateway routing
protocol
7 OSPF Open shortest path first

8 NIC Network interface card

9 USB Universal serial bus

10 NVRAM Non-volatile random


access memory
11 RAM Random access memory

12 ROM Read only memory

13 OSI Open system


interconnection
14 HTTP Hypertext transfer
protocol
15 HTTPS Hypertext transfer
protocol secure
16 DHCP Dynamic host
configuration protocol

V
17 DNS Domain name system

19 FTP File transfer protocol

20 TFTP Trivial File Transfer


Protocol
21 TCP Transportation transfer
protocol
22 UDP User datagram protocol

23 ICMP Internet configuration


message protocol
24 ARP Address resolution
protocol
52 ACL Access control list

52 VLAN Virtual local area


network
52 VTP VLAN Trunk protocol

VI
LIST OF FIGURES

Device Label
Hub

Switch

Router

VII
Introduction
The Cisco Certified Network Associate - Routing and Switching (CCNA - Routing
and Switching) certification title has become the leading entry level network
certification available today. The Cisco Certified Network Associate - Routing and
Switching (CCNA - Routing and Switching) certification was developed by Cisco
to test a candidate's knowledge of networking at entry level. The Cisco Certified
Network Associate - Routing and Switching (CCNA - Routing and Switching)
certification analyzes the candidate's ability to install, configure, operate, and
troubleshoot medium-size routed and switched networks.

The CCNA - Routing and Switching certification is recognized by IT employers


when considering a fresher's profile for a vacancy or for a salary hike/promotion
for experienced employees. The Cisco Certified Network Associate - Routing and
Switching (CCNA - Routing and Switching) exam covers a broad range of
networking concepts to prepare candidates for the technologies they are likely to
work with in today’s network environments.

New version of CCNA Exam (Exam Number 200-120 CCNA Routing and
Switching) is available from March 26, 2013. The last date for CCNA examination
according to the old version (Exam Number 640-802 CCNA) is September 30,
2013. After September 30, 2013, only 200-120 CCNA Routing and Switching will
be available. Please visit Cisco official CCNA Routing and Switching web page
for more information.

CCNA exam syllabus includes TCP/IP, IP Addressing and Subnetting, Routing


Information Protocol (RIP), Routing Information Protocol V2 (RIPv2), IGRP
(Interior Gateway Routing Protocol), Enhanced Interior Gateway Routing Protocol
(EIGRP), Open Shortest Path First (OSPF), Serial Line Interface Protocol, Frame
Relay, VLANs, Ethernet, access control lists (ACLs) etc.

Thorough knowledge in Basic Networking and TCP/IP is required to continue


CCNA Routing and Switching learning. If you are new to networking, we request
you to click the following links to learn Basic Networking and TCP/IP.
The revised Cisco CCNA Routing and Switching topics as per 200-120 exam is
listed below.

VIII
Contents
 chapter 1 …………………………………………13-18
 network components ……………………13
 network topology ……………………13-16
 network structure ……………………17-18

 chapter 2 …………………………………………19-24
 network devices ……………………19-20
 network cabling ……………………21-24

 chapter 3…………………………………………25-28
 OSI models ……………………25-28

 Chapter 4 …………………………………………29-34
 MAC address………………………29
 IPv4 address………………………30-33
 IPv6 address………………………34

 Chapter 5…………………………………………35-43
 Basic configuration ………………………35
 Telnet ………………………36
 DNS ………………………37-38
 HTTP/HTTPS ………………………38-39
 TFTP ……………………40
 DHCP ………………………40-42
 APIPA ………………………42
 ARP ………………………43

 Chapter 6 …………………………………………44-54
 Routing ………………………44
 Static routing ………………………45-46
 Dynamic routing ………………………47-54

IX
 Chapter 7 …………………………………………55-56
 Access control list ……………………… 55-56
 Chapter 8 …………………………………………57-59
 VLAN ………………………57-58
 VTP………………………….59

Figures
Figure 1 bus …………………………………………………………..14
Figure 2 ring ………………………………………………………….14
Figure 3 star ……………………………………………….………….15
Figure 4 mesh ……………………………………………...………….15
Figure 5 LAN …………………………………………………………17
Figure 6 MAN ………………………………………………..……….18
Figure 7 WAN ………………………………………………………...18
Figure 8 HUP………………………………………………………….19
Figure 9 switch ……………………………………………………..…20
Figure 10 router ……………………………………………….………20
Figure 11 straight cable ……………………………………..…………22
Figure 12 cross over …………..……………….………………………23
Figure 13 fiber optical cable ……...…………………………………...23
Figure 14 single&multi optical………………………...………………24
Figure 15 layers ….…………………………………….………………26
Figure 16 MAC address ……………………………….………………29
Figure 17 IPv4 Classes…………………………………………………31

X
Figure 18 TelNet ………………………………………………………36
Figure 19 DNS …………………………………….………….………37
Figure 20 HTTP/HTTPS ………………….……….………….………39
Figure 21 DHCP………………………………….……………………41
Figure 22 DHCP relay agent ………………..…………………………42
Figure 23 Direct connected ……………………………………………44
Figure 24 Static Route …………………...……………………………45
Figure 25 Ping …………………………………………………………46
Figure 26 BGP ………………………………………………………...47
Figure 27 RIP ………………………………………………………….50
Figure 28 EIGRP ………………………………………………………52
Figure 29 OSPF ……………………………………………………….54
Figure 30 ACL …………………………………………………….…..56
Figure 31 VLAN …………………………………………………..…..57
Figure 32 VTP …………………………………………………………59

XI
Chapter 1
Network fundamentals

Network: it’s the communication between different devices in order


to share resources (data, software, hardware ….... etc.) in many
different areas.

Network components: it’s the devices that makes the connection


with each other in network.
1- computers.

(Host, Server, workstation)

2- networking devices.

(Switch, Hub, Bridge, Repeater, Router)

3- medium.
(Wired [cables] or Wireless[waves])

Network Topology: it’s the way of connection between


network devices.
1-physical topology: How devices are physically connected.
2-logical topology: How devices communicate internally with each
other (OSI model).

XII
1-Bus Topology
All devices are connected through one coaxial cable and each end of devices has
terminator if the network needed to spread more use [SPLITTER] to get 2
branches from one coaxial cable.

Figure 1

2-Ring Topology
data are transmitted from device to device around a closed loop in one direction
only using [TOKEN RING] which behave like a carrier for data needed to
transfer and when the token is sending data any devices can’t send any data
until the token is empty and ready to carry the data again.

Figure 2

3-Star Topology
All end devices are connected to a central device [HUP OR SWITCH] and this
device is responsible for transferring the data from device to another one.

XIII
Figure 3

4-Mesh Topology
Each device is connected to serve other devices. No of Connection = n * (n-1) / 2

Figure 4

XIV
Types of Data Transmission:

1- Unicast: Unique to one node on a network.

2- Multicast: A group of but not all nodes on a network.

3- Broadcast: all nodes on a network.

Modes of Data Transmission:

1-Simplex: transmission in one direction only.

Ex: mouse, keyboard, touchpad

2- Half duplex: transmission in the two directions but not at the same time.

Ex: woki-toki

3- Full duplex: transmission in the two directions at the same time.

Ex: mobile

XV
Network structure: it’s the way of connecting between
network and devices depending on the geographical area (LAN,
MAN, WAN).

1- LAN (local area network): is a group of computers and


network devices connected together, usually within the same
building.

Figure 5

2-MAN (metropolitan area network): is a larger


network that
connect several buildings in the same city or town MAN is often to
bypass local telephone companies when accessing long-distance
service.

XVI
Figure 6

3-WAN (wide area network): is not restricted to a


geographical location it Covers a wide geographical area, such as a
state or a country.
Types :
DSL, leased line, frame relay

Figure 7

XVII
Chapter 2
Network devices

Network devices (HUBs & Routers & Switches): it’s the


devices that allow user to connect between different types of host
along the network.

HUP: its un intelligence device that connect the host with ports
inside the device each port has a (NIC) connected to it and it send
message from one device to another by making broadcast to all
devices on network so they can see what data are transferred between
those devices.

Figure 8

XVIII
SWITCH: its intelligence device that connect between different
LANS and transfer data from node to another without being sent to
any other host on the network and it depend on MAC address to send
data.

Figure 9

ROUTER: it’s the most intelligence devices that send data depend
on the best path to go through it and uses the IPv4 & IPv6 to different
between path and each node on it and it responsible to connect
between different networks from different regions and can access the
internet .

Figure 10

XIX
Network cabling: it’s the process of connecting between
network hosts with each other or with network devices.

Coaxial cable:
Single copper conductor in the center surrounded by a plastic layer for
insulation and a braided metal outer shield used for connection of TV
transmission and network implementations.

Uses
 tv
 long distance telephone transmission
 Lan

Twisted pair cable:


It’s the Four pairs of wires twisted to certain specifications and
Available in shielded and unshielded versions and use 2 pair for
sending and 2 pair for receiving.
Un shielded twisted pair

Shielded twisted pair

XX
Unshielded twisted Cable:
it’s cheaper and flexible than STP but more attenuation and electromagnetic
interference.

shielded twisted Cable:


it Provides the extra shielding by using an insulating material wrapped around
the wire and are less attenuation and electromagnetic interference.

Types of twisted pair:


1-straight
Its responsible to connect different devices with each other like (pc
with router) or (router with switch) or (switch with pc).

2-crossover
Figure 11

XXI
2-Cross over
Its responsible to connect similar devices with each other like (pc with
pc) or (switch with switch) or (router with router).

Figure 12

Fiber optical cable:


Fiber-optic - A cable, consisting of a center glass core surrounded by layers of
plastic, that transmits data using light rather than electricity and uses reflection
of light through glass fiber or plastic to transfer light beam of data.

Figure 13

XXII
Multimode: is cheaper than Single Mode Fiber
Single Mode can support much higher data rates
than Multimode has short distance transfer
range.

Single mode is for long haul networks and has


more data transfer rate with long distance
transfer range.

Figure 14

XXIII
Chapter3
Open system interconnection(OSI)

Open System Interconnection (OSI) :it’s the logical way


of transferring data through whole network from desktop application
phase to cables phase( Reference Model to describe how information is
transferred from one machine to another).

 at the sender, the data comes from layer 7(application) to layer


1 (physical)

XXIV
 at the receiver, the data comes layer 1 (physical) to 7
(application)

Figure 15

Application Layer
It’s the interface that a person uses to interact with the application.
This interface can be command-line-based (Command Line Interface) or
graphics-based (Graphical User Interface).

Examples: HTTP, FTP, TFTP, SMTP and telnet.

HTTP: Hyper Text Transfer Protocol


FTP: File Transfer Protocol
TFTP: Trivial File Transfer Protocol
SMTP: Simple Mail Transfer protocol
ex:

XXV
Google, Facebook, yahoo messenger …...etc.
Presentation Layer

It’s for defining how information is presented to the user.


Its uses file organization for formatting of data encapsulation & de encapsulation
and encoding and decoding (defines how various forms of text, graphics, video,
and audio ……etc.).

Example: NFS
NFS: network file system

session layer
Is responsible for setting up and tearing down network connections and set a
logical connection between different applications and defines the type of
communication (simple, half duplex, full duplex)

Example: NETBOIS

Transport Layer
its responsible for transferring the data from one device to another one and Data
are converted into segments and Header are added to this layer to deliver to the
same layer to be captured then when deliver the header is removed.

Example: TCP & UDP


TCP: transmission control protocol (use 3way hand-shake)
UDP: user datagram protocol

Network Layer
Its responsible for routing the data and giving it the suitable IP to be routed and
received correctly and Segment are converted into packets through router to be
sent.

Example: IPv4 & IPv6


Routing: RIP, EIGRP, OSPF

XXVI
Data Link Layer
Is responsible for Physical Addressing (MAC) and Its responsible for making
PACKETS into FRAMES so that it can be showed by the network card in devices.

Example: MAC
MAC: media access control

Physical Layer
Its responsible for transmitting data through the transition medium (wires) and
Frames are converted into bits to be send through cables.

Example: ETHERNET

Data Encapsulation: The application creates the data, then


the transport layer wraps that data inside its format, then the
network layer wraps the data, and finally the link (ethernet) layer
encapsulates the data and transmits it

Data de Encapsulation: when the data gets to the first layer


in receiver case the data is DE encapsulation and each header area
removed in each layer used the header

XXVII
Chapter 4
MAC & IP addressing
Mac address: it’s a number that burned to the (NIC) and can’t
be changed and used for internal communication of DATA LINK layer
using switch

Standard:
Byte = 8bits (10101010)
Octet = byte (10101010)

Specification of MAC address:


 48 bits
 24 bits for vendor (constant standard for company)
 24 bits for pc (random for every pc)

XXVIII
 Use hexadecimal for addressing (A, B, C, D, E, F)
 Consists of 6 octets

Figure 16

IP addressing: it’s the naming of the all host or nodes connected


to all the network to route the data between them easily The Internet
Protocol (IP) is a network-layer (Layer 3) protocol that contains
addressing information and some control information that enables
packets to be routed.

IPv4 specification:
 IPv4 are 32 bits
 Use decimal system
 Consists of 4 octets
 33 bits are divided for network and hosts
 Divided into 5 classes (A, B, C, D, E)
 Each class has a standard range for hosts
 Each class has a constant range for network
 Class D & E are for scientific use

XXIX
 The first network is for network and last network for broadcast

IP ranges:
1) A from 0-126
2) 127.0.0.1 is loopback IP no used for addressing
3) B from 128-191
4) C from 192-223

Figure 17

Subnet mask: it’s the definition of what range the IP belongs to.

 1: represent network bits.


 0: represent host bits.
 8-bits (Class A)
 16-bits (Class B)
 24-bits (Class C)

XXX
Subnetting: it’s the process of Dividing major network into
smaller networks Done by taking part of host bits to add it to network
part.

Rules:
 if ask for the number of subnet network use
 2^N
 Where N is the number of (zero’s) will change to 1

 If ask for the number of hosts in network use


 2^N-2

XXXI
 Where N is the number of zero’s will be remaindered

KEY NUMBER (128, 64, 32, 16, 8, 4, 2, 1)


Example:
 Need 4 subnet mask

Solution:
1) 2^ (2) =4
2) 192.168.1.0 255.255.255.0
3) 192.168.1.00000000
4) use magic number 128,64,32,16,8,4,2,1
5) Then take the last zero and use it to make standard to jump
using it(64).
6) Add the zeros will change to 1 to the subnet mask
 192.168.1.0/26
 192.168.1.64/26
 192.168.1.128/26
 192.168.1.192/26

Subnetting:

Example:
need 13 hosts

XXXII
Solution:
7) 2^ (4) -2 =14
8) 192.168.1.0 255.255.255.0
9) 192.168.1.00000000
10) use magic number 128,64,32,16,8,4,2,1
11) Then take the last zero and use it to make standard to jump
using it (16).
12) Add the zeros will change to 1 to the subnet mask
 192.168.1.0/28
 192.168.1.1/28
 192.168.1.2/28
 192.168.1.2/28
 192.168.1.3/28
 192.168.1.4/28
 192.168.1.6/28
 192.168.1.8/28
 192.168.1.9/28
 192.168.1.10/28
 192.168.1.12/28
 192.168.1.13/28
 192.168.1.14/28
 192.168.1.15/28
 192.168.1.16/28

IPv6: it’s the naming of the all host or nodes connected to all the
network to route the data between them easily The Internet
Protocol (IP) is a network-layer (Layer 3) protocol that contains
addressing information and some control information that enables
packets to be routed but more larger in space than IPv4.

IPv6 specification:
 IPv6 are 128 bits
 Use hexadecimal system

XXXIII
 It has 8 sections
 Each section consists of 4 characters
 Each 2 pair of characters are equal 1 byte
 Divided into 64 bits for (mac address [48] and another 16 bits
[FFFE])
 Another 64 bits is for addressing
 Has two types (global unicast[2000-3fff] & link local[fe8o])
 Zeros are removed if in first of section and if section is all zero is
removed
 Has all feature of IPv4

Chapter 5
Basic router configuration
COMMAND USE

Enable Go to privilege mode (#)

Configure terminal Go to global mode

Hostname To name the router

Enable secret (password) To make encrypted password for


privilege mode

Enable password (password) To make normal password for privilege


mode

Service password-encryption To make all password of router encrypted

WR To save all configuration

Show running-config To show the current configuration for


router

Show startup-config To show all current configuration on the


NVRAM

XXXIV
show IP interface brief To show all information about interfaces
and their state

No shutdown To open the closed ports of router

Show IP route To show all IPS are defined to the router

Banner motd #msg# To make message at the entrance of


router

Interface (f0/0) To enter a particular port in router to


configure it

IP address (IP)+(mask) To add IP for the port of router

telnet: it’s the protocol that provide remote connection from


normal devices with the router but its un secured so any one can sniff
the packets sent and configuration.

 Practical

Go to the port
1-line vty 0 4
Give it password
2-password (pass)
Make it require password when login the router from another
device
3-login
Enable the secret password for privilege mode
4-enable secret (pass)

XXXV
Figure 18

DNS: it’s a domain name server protocol that provide naming the
hosts on the network instead of using IP which is hard to remember.
 Practical

1-put a server to in the network and add IP address to the server


manually
2-then go to server and activate DNS service
3-then add name to the hosts on the network
4-give each host the IP of the DNS
 at configuration

XXXVI
Figure 19

 After pc2 ping pc1 with name not IP


 All packets are received from pc2 to pc1

HTTP/HTTPS: it’s the hypertext transfer protocol which responsible for


browsing of internet.

XXXVII
 practical

1-put server in the network


2-activate the HTTP/HTTPS
2-name the server with DNS by adding new record for the server then
name it any website name like (google, Facebook, LinkedIn ….etc.)
3- then go to browser from any normal device and type the name of
website that the server has and it will open the server.

XXXVIII
Figure 20

TFTP: it’s the protocol that provide file transferring and saving for
setting and its more abstraction than FTP protocol and it use UDP so it
doesn’t use authentication through connection.

 Practical
To set the server which contains TFTP service by giving the IP
address and the file name

1-copy run TFTP

Close the router and open it again and identify the interface
which the server is in and to get the data back

2-copy TFTP run

XXXIX
DHCP: it’s a dynamic host configuration protocol responsible for
dynamic IP addressing for host in the network.

Types of DHCP:
1-DHCP stand alone
2-DHCP relay agent

DHCP stand alone: it’s the DHCP that activated on the server
and give IPS for all hosts on the network.

 practical

Go to the server and activate the DHCP service


1-Create a new pool for the network with the range of IP and the pool
name and the subnet mask default getaway

XL
Figure 21

DHCP relay agent: it’s the DHCP that activated on the


router.

 practical
First add the IP address that reversed on this network
1-ip DHCP excluded-address (IP)
The define the pool name which contains the range of IP available
2-ip DHCP pool (name)
Then define the range of the IPS and their subnet mask
3-network (IP) + (subnet mask)
Then define the router IP of the gateway
4-default-router (IP)

XLI
Figure 22

APIPA: it’s the automatic private IP addressing which gives IPS to


devices on the network if there wasn’t any static addressing or DHCP.

XLII
IP range:
 169.254.0.1 169.254.255.254

 Has 65,534 available hosts

ARP: it’s the address resolution protocol that responsible for


resolving IP address to MAC address as when someone send packets to
a device so the packet has the source IP and destination IP and source
MAC but don’t has the destination MAC then need to send broadcast
ARP message to all host to see who has the destination MAC to
compare it with destination IP.

XLIII
Chapter 6
Routing
Routing: it’s the finding of the best path to send data through it.
Types of routing:
 Static route
 Dynamic route

Static route
1- Direct Connected Route:

- Symbol in routing table is “C“.


- Automatic without configuration.

-The router learn the Network IP address of its direct connected Networks.

Figure 23

XLIV
2- Static Route:
- Symbol in routing table is “S “.

- Manually configured.

- To define certain output interface that data can go through to


reach a certain destination.

 Practical
To identify the router the network on the other router
1-ip route (destination IP) + (subnet mask) + (the IP of input interface of
the destination network)

Figure 24

XLV
After ping the host on other network

Figure 25

3- Default Route:
-Symbol in routing table is “ S* “.

-Manually configured.

-Used in stub networks.

- Called (Gateway of last resort)

- To define certain output interface that data can go through to


reach any unknown destination .
 Practical
Type all ranges of network and subnet mask
1-ip route (0.0.0.0) + (0.0.0.0) + (the IP of input interface of the
destination network)

XLVI
Dynamic Routing

Types of Dynamic Routing:

Interior Gateway Protocol ( IGP ):


Handles routing within same Autonomous System (AS).
 Autonomous System is a group of routers under the control of a single
authority.

1-Distance Vector (RIP, IGRP).


2-Link State (OSPF)
3-Hybrid (EIGRP)

Exterior Gateway Protocol ( EGP ):


Handles routing between different Autonomous System (AS).
 Autonomous System is a group of routers under the control of a single
authority.

BGP (Border Gateway Protocol)

XLVII
Figure 26

Routing Terminology: it’s the way of measuring the best path


depend on each protocol

Autonomous System (AS):


Area or domain that works under single administrative control

and using same routing protocol.

Metric:
Define how good the route path is.

(Hop count, Bandwidth, Delay, ……. )

XLVIII
Administrative Distance (AD):
Number between 0 & 255 that indicate the believability of the

routing protocol (Priority).

Each time interval, every router will send full routing table

updates to all its interfaces.

Routing Information Protocol ( RIP )

•Updates every 30 Sec.

•Hold down timer 180 Sec.

•Metric = Hop Count.

•Symbol in routing table is “R “.

•Max Hop count = 15 (Infinite Metric value = 16)

•Administrative Distance = 120.

RIP V1
1-classful protocol: doesn’t support subnetting

2-broadcast (255.255.255.255)

RIP V2
1-Classless protocol
2-Multicast Updates (224.0.0.9)

XLIX
 practical

go to each router and assign each network attached to the router .


1-router rip
2-network (IP)

Feature:
Type (version 1or 2) to choose between rip version

Figure 27

L
Enhanced Interior Gateway Routing Protocol ( EIGRP
)
• Cisco proprietary protocol.

• Classless protocol.

• Send packets on multicast address (224.0.0.10).

• Administrative Distance = 90.

• Symbol in routing table is “D”.

• Metric = Bandwidth & Delay.

• Max Hop count = 224. (Default = 100 ).

• Support equal & non-equal load sharing

• Compatible with IGRP (Same AS number).

EIGRP Terminology
• Neighbor Table: Table Contain all neighbors.

• Topology Table: All routes to all networks

• Routing Table: Best routes to all networks.

• Feasible Successor (FS): Backup Route.

• Successor stored in the Routing Table & Topology Table.

• Feasible Successor stored in the Topology Table only.

LI
 Practical
Go to each router and apply the EIGRP
1-router EIGRP (number)
Identify each network attached to the router
2-network (IP) + (wild card)

Figure 28

LII
Open Shortest Path First ( OSPF )

• Standard Protocol.

• Classless Protocol.

• Loop free topology.

• Symbol in routing table is “O “.

• Send packets on multicast address (224.0.0.5 & 224.0.0.6).

• Administrative Distance = 110.

• Metric = Cost = 100 000 000 / Bandwidth.

• Hop count is unlimited (Support hierarchical design).

Hello Protocol: it’s a message send to OSPF NE to show updates to


the router if there are any changes.

Hello interval every 10 Sec.

Dead interval every 40 Sec.

 Practical

Go to router and apply OSPF


1-router OSPF (number)
The identify all network attached to the router
2-network (IP) + (wildcard) + (area)
Then identify the router ID
3-router-ID (LIKE IP)

LIII
Figure 29

LIV
Chapter 7
ACCESS CONTROL LIST

Access control list (ACL):


– ACL are basically set of commands that is grouped under certain
Name or Number to control traffic flow.
– ACL can do one of two actions: Permit or Deny.
– ACL Configurations : 1- Create ACL.
2- Apply ACL to a certain Interface.
– Maximum Number of ACL can be applied on each interface per
protocol = 2
( 1 per direction ) ( 1 Inbound & 1 Outbound ).
– In an Inbound ACL, Packets are processed Before they are routed
to an
outbound interface.
– In an Outbound ACL, Packets are processed After they are routed
to an
outbound interface.

LV
Types of routing:
 Numbered (standard&extended)
 Named (standard&extended)

Difference between numbered &named:


In Numbered ACL
We can’t delete a certain statement. Only we can delete the whole ACL.
In Named ACL
We can delete certain statement inside the ACL.

Figure 30

LVI
Chapter 8
Switching

Virtual local area network(VLAN):


Properties:
Each VLAN is a single broadcast domain.
Even Unicast or Broadcast can’t be forward in the other VLAN.
VLAN logically divide a switch into multiple , independent switches at layer2.
VLAN can span on multiple Switches.

Figure 31

LVII
VLAN connection types:
1- ACCESS Port :
It is a port which is member in only one VLAN.
By default, all of the switch ports are access ports because it is member in VLAN
1.
( VLAN 1 = Default VLAN ) It is mainly a port that is connected to a PC.
( Because it is unlogical to waste 2 ports for cable for each VLAN between
Switches).
2- TRUNK Port :
It is a port which is member in all VLANs.Trunk Port used to interswitch VLAN
Communication.

LVIII
VLAN Trunk Protocol (VTP):
VTP is a Cisco Proprietary Protocol that transmit VLAN information across
Trunk ports. Switches must have the same VTP domain name to share messages.

VTP Modes:
1-server
2-client
3-transparent

Figure 32

LIX
Project
The project is for connecting between different networks in different places
using the (EIGRP) to identify and make neighboring with networks each
other

LX
Gained Experience

This is my first time to study something networks. I interested in this work a


lot and I will continue in this section to gain more about network and how to
build network, how to fix it up, in this course I learned what are layer of
network and its protocol and how to make virtual LAN and its modes

This course qualified me to continue in my future career IT and DATA


CENTER administrator.

LXI
CONCLUTION

This course includes important basics in network field


-IP
-LAN
-WAN
-Router
-Switch

References
1-www.wikipedia.com
2-www.cicso.com
3-www.google.com

books: -
1-how to master CCNA.pdf
2-CCNA 100-105 ICND 1 v3.pdf
3-CCNA 200-105 ICND 2 V3.pdf

LXII

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy