0% found this document useful (0 votes)
42 views154 pages

Ccna 200-301ibcs

This document outlines the modules and topics covered in a CCNA 200-301 certification course. The course is divided into three modules: basics, routing, and switching. Module one covers networking fundamentals like OSI layers, IP addressing, routing protocols, and more. Module two focuses on practical routing skills like configuring static and dynamic routing. Module three teaches practical switching skills such as VLANs, STP, and trunking.

Uploaded by

Mohammad Ibrahim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views154 pages

Ccna 200-301ibcs

This document outlines the modules and topics covered in a CCNA 200-301 certification course. The course is divided into three modules: basics, routing, and switching. Module one covers networking fundamentals like OSI layers, IP addressing, routing protocols, and more. Module two focuses on practical routing skills like configuring static and dynamic routing. Module three teaches practical switching skills such as VLANs, STP, and trunking.

Uploaded by

Mohammad Ibrahim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 154

This Project

Organized by

IBCS-PRIMAX Software(Bangladesh) Limited


Cisco Certified Network Associate (CCNA)
200-301
Course Overview
Module : 01 (Basics)
Theory

 Introduction to Networking
 OSI Layers
 Networking Devices
 Cabling
 Ipv4 addressing and Classification
 Subnetting and VLSM
 TCP/IP protocols
Module : 02 (Practical)
Routing

 Introduction to CISCO devices and Packetracer


 Routing Introduction
 Static Route
 RIP
 EIGRP
 OSPF
 Redistribution
 TELNET
 SSH
 ACL
 NAT
 BGP
Module : 03 (Practical)
Switching

 LAN Switching
 Virtual LAN (VLAN) and Trunking
 Inter VLAN
 STP
 Etherchannel
 Port Security
 Ipv6 Basic
CCNA 200-301 Summary Outline:
Network
 Network: A set of devices (nodes) connected by communication links.
 Node: Computer, printer, or any device capable of sending and/or receiving data
 To be considered effective and efficient, a network must meet a number of
criteria
Direction of Data Flow
Data Flow
 Simplex
 Unidirectional
 As on a one-way street
 Half-duplex
 Both transmit and receive possible, but not at the same time
 Like a one-lane road with two-directional traffic
 Walkie-talkie, CB radio
 Full-duplex
 Transmit and receive simultaneously
 Like a two-way street, telephone network
 Channel capacity must be divided between two directions
Type of Connection

 Point-to-point
 Dedicated link between two devices
 The entire capacity of the channel is reserved
 Ex) Microwave link, TV remote control

 Multipoint
 More than two devices share a single link
 Capacity of the channel is either
 Spatially shared: Devices can use the link simultaneously
 Timeshare: Users take turns
Physical Topology
Mesh Topology

 Dedicated point-to-point link to every other


nodes
 A mesh network with n nodes has n(n-1)/2
links. A node has n-1 I/O ports (links)
 Advantages: No traffic problems, robust,
security, easy fault identification & isolation
 Disadvantages: Difficult
installation/reconfiguration, space, cost
Star Topology
 Dedicated point-to-point link only to a central controller, called a hub
 Hub acts as an exchange: No direct traffic between devices
 Advantages: Less expensive, robust
 Disadvantages: dependency of the whole on one single point, the hub
Bus Topology

 One long cable that links all nodes


 tap, drop line, cable end
 limit on the # of devices, distance between nodes
 Advantages: Easy installation, cheap
 Disadvantages: Difficult reconfiguration, no fault isolation, a fault or break in the bus stops all transmission
Ring Topology

 Dedicated point-to-point link only with the two nodes on each sides
 One direction, repeater
 Advantages: Easy reconfiguration, fault isolation
 Disadvantage: Unidirectional traffic, a break in the ring cab disable the entire network
Hybrid Topology

 Example: Main star topology with each branch connecting several stations in a bus
topology
 To share the advantages from various topologies
Categories of Networks
LAN
 Usually privately owned
 A network for a single office, building, or campus  a few Km
 Common LAN topologies: bus, ring, star
 An isolated LAN connecting 12 computers to a hub in a closet
MAN
 Designed to extend to an entire city
 Cable TV network, a company’s connected LANs
 Owned by a private or a public company
WAN
 Long distance transmission, e.g., a country, a continent, the world
 Enterprise network: A WAN that is owned and used by one company
Internetworking Basics :

 Internetwork is a collection of a individual networks, connected by intermediate devices,


that function as a single network.

 Such environments were implemented both IBM system networks Architecture (SNA) and
Digital’s network Architecture.
Internetwork
 Internetwork (internet) : two or more networks are
connected by internetworking devices
 Internetworking devices: router, gateway, etc.
 The Internet: a specific worldwide network
Internetworking devices :
Cisco Router :
Cisco Router internal components:

Cisco Router :
Branch Routers Model :
Service Provider Routers :
Small Business Routers :
Industrial & Data Center :
Cisco Switch :
Cisco Hub :
Internet Today

• ISP (Internet service


providers)
• NISP (national ISP)
• NAP (network
access point)
Protocols

 Protocol : rule
 A set of rules that govern data communication
 For communication to occur, entities must agree upon a protocol
 Key elements of a protocol
 Syntax: structure or format of data
 Semantics: meaning of each section in the structure
 Timing: when and how fast data should be sent
Transmission Types :

 Unicast
Broadcast :
Multicast :
Internet Standards

 IETF (Internet Engineering Task Force)


 Internet Draft
 working document with no official status
 with a 6-month lifetime
 RFC (Request for Comment)
 Edited, assigned a number, and made available to all interested parties
The DOD Model and OSI Model :
The OSI reference model has the Following seven layers:
Application layer (layer 7)
Presentation layer (layer 6)
Session layer (layer 5)
Transport layer (layer 4)
Network layer (layer 3)
Data Link layer (layer 2)
Physical layer (layer 1)
The Application Layer

 File transfers
 Email
 Enabling remote access
 Network management activities
 Client/server processes
 Information location
The Presentation Layer

 Data compression
 Decompression
 Encryption and
 Decryption
The Session Layer

 Setting up
 Managing and
 Dismantling sessions
The Transport Layer

 Two protocol suite in Transport Layer

 TCP (Transmission control protocol)


 UDP(User datagram protocol)
Compare between TCP and UDP
Key protocols that use TCP and UDP
Connection-Oriented Communication
Windowing
Flow Control
Transport layer reliable delivery
Network Layer:
 Logical addressing
and routing
The Data Link Layer
The Physical Layer
OSI layer functions :
Data Encapsulation
Data Encapsulation
TCP/IP and OSI Model
TCP/IP Protocol Suite
 Host-to-network : Physical and data link layer
 No specific protocol
 Network layer
 IP(Internet Protocol), ARP(Address Resolution Protocol),
RARP(Reverse ARP), ICMP(Internet Control Message Protocol),
IGMP(Internet Group Message Protocol)
 Transport layer
 TCP(Transmission Control Protocol), UDP(User Datagram
Protocol), SCTP(Stream Control Transmission Protocol),
 Application Layer
 Combined session, presentation, and application layers
Address Resolution Protocol (ARP)
The Cisco three-Layer Hierarchical Model
Ethernet Cabling :

 The Category 5: Enhanced Unshielded Twisted Pair(UTP).


 Shielded Twisted Pair(STP).
Unshielded Twisted Pair(UTP).
Unshielded Twisted Pair(UTP) Cable
connection with RJ45
Three types of cables:

 Straight-through cable
 Crossover cable
 Rolled cable / Console cable
Straight-through cable
Straight-through cable

 The straight-through cable is used to connect the following devices:

 Host to switch or hub


 Router to switch or hub
Crossover cable:
Crossover Ethernet cable :

 The crossover cable can be used to connect the following devices:


 Switch to switch
 Hub to hub
 Host to host
 Hub to switch
 Router direct to host
Rolled Cable:
Rolled Cable

 Console Connection with router or switch


Using straight-through and crossover cable :
Collision Domain
Collision Domain
Broadcast Domain
Router ports :
Basic Configuration :
Console port password

Thanks
AUX and VTY port password :
IP Addressing
IP Addressing

 Basic Addressing
 Working with Addresses
 Summarization & Subnets
 VLSM
 Working with VLSM Networks
 Classful Addressing
 Working with Classful Addressing
Basic Addressing

 IP addresses are written in


Dots separate the sections
dotted decimal format.
 Four sections are 10.1.1.1
separated by dots.
 Each section contains a
number between 0 and Each section
255. contains a number
between 0 and 255
Basic Addressing

 Why is each section a number


between 0 and 255? Dots separate the sections
• Computers operate in binary,
humans operate in decimal.
• Computers treat IP addresses 10.1.1.1
as a single large 32 digit
binary number, but this is hard
for people to do.
• So, we split them up into four
smaller sections so we can Each section
remember and work with them contains a number
better! between 0 and 255
Why????
Basic Addressing

 Each device on a network is


assigned an IP address. 10.1.1.1
 Each IP address has two
fundamental parts:
00001010 00000001 00000001 00000001
• The network portion, which
describes the physical wire the

Network

Host
device is attached to.
• The host portion, which
identifies the host on that wire.
• How can we tell the difference
between the two sections?
Basic Addressing

 The network mask shows us 10.1.1.1


where to split the network and
host sections.
00001010 00000001 00000001 00000001
 Each place there is a 1 in the
network mask, that binary digit

Network

Host
belongs to the network portion
of the address.
 Each place there is a 0 in the
network mask, that binary digit 11111111 11111111 11111111 00000000
belongs to the host portion of
the address.
255.255.255.0
Basic Addressing

 An alternative set of 10.1.1.1


terminology is:
• The network portion of the 00001010 00000001 00000001 00000001
address is called the prefix.
• The host portion of the address

Prefix

Host
is called the host.
• The network mask is
expressed as a prefix length,
which is a count of the number
of 1’s in the subnet mask. 11111111 11111111 11111111 00000000

8 + 8 + 8 = 24

10.1.1.1/24
Basic Addressing

10.1.1.1
 32/4 == 8.
00001010 00000001 00000001 00000001
 28 = 256. 8 8 8 8
 But, computers number 32
starting at 0, so to make a
space of 256 numbers, we Each 8 digit group represents
a number between 0 and 255
number from 0 to 255.
IP Addressing :
Bit value :
Network Address Range :
Classful Addressing
Network Class Beginning Natural Range of Example Major
Digits in Prefix Addresses Networks
Binary Length
Class A 10XX 8 1.0.0.0/8 11.0.0.0/8
through 100.0.0.0/8
126.0.0.0/8 120.0.0.0/8
Class B 110X 16 128.0.0.0/16 130.1.0.0/16
through 148.45.0.0/16
191.0.0.0/16 190.100.0.0/16
Class C 1110 24 192.0.0.0/24 193.1.3.0/24
through 193.1.4.0/24
223.0.0.0/24 192.2.5.0/24
The reserved private addresses
Summarization & Subnets

10.1.1.8
10.1.1.7
10.1.1.4
10.1.1.2
 A single network address
(prefix!) represents a set of hosts
attached to a wire.
 We can abstract this, and simply
say that a prefix represents a set
of reachable addresses.
 We can say that we’ve
“summarized” information about 10.1.1.0/26
the hosts attached to the physical
wire by referring to the entire
group as a single network.
Summarization & Subnets

10.1.1.2/32 These host


 In effect, we’ve shortened the network10.1.1.4/32 addresses
part of the address (prefix!), and 10.1.1.7/32 are
lengthened the host portion of the described
address, in effect describing more 10.1.1.8/32
by this
hosts (destinations) in a single address.
network
 If we can shorten the prefix length to
describe multiple hosts with a single 10.1.1.0/26
network address, why can’t we shorten10.1.1.64/26
the prefix length so a single network These
address describes two networks? networks
 We can! It’s called address 10.1.1.0/25 are
summarization, or just summarization. described
by this
network
Summarization & Subnets
10.1.1.0 through 00001010 00000001 00000001 00000000
10.1.1.31. 10 1 1 0
11111111 11111111 11111111 11000000

10.1.1.32 through 00001010 00000001 00000001 01000000


10.1.1.63. 10 1 1 64
11111111 11111111 11111111 11000000
10.1.1.0 through 00001010 00000001 00000001 00000000
10.1.1.63, so it’s the 10 1 1 0
same space!
11111111 11111111 11111111 10000000
Changing the mask bit from 1 to 0, which shortens the prefix
length, means the bit in the two networks that distinguish them
from one another are now considered host bits!
Summarization & Subnets

10.1.1.2/32 These host


 A network which is a part of 10.1.1.4/32 addresses
another network is called a 10.1.1.7/32 are subnets
subnet. 10.1.1.8/32 of this
network
 There is another term, the
supernet, but it’s definition
depends on whether you are 10.1.1.0/26
using VLSM subnetting, or 10.1.1.64/26
calssful subnetting, so it will be These
defined in the next two sections. networks
10.1.1.0/25 are subnets
of this
network
VLSM

 VLSM: Variable Length Subnet


10.1.1.0/24
Masking 10.1.2.0/25
 It simply means that the entire IP 10.1.2.128/26
10.1.2.192/27
address space is treated as one
flat address space.
 Any prefix length is allowed in
All of these are valid in the
the network at any point. same network!
VLSM

 At this point, you pretty much already know VLSM! You


already know how to find the network address, broadcast
address, and number of hosts in a network.
 Two other common problems in working with VLSM
networks remain:
• Building summary addresses from groups of networks. We won’t
cover this here (maybe later in routing).
• Building network addressing schemes from a given number of hosts
and networks.
Working with VLSM Networks

 You have 5 subnets with the following numbers of hosts on them: 58, 14,
29, 49, 3
• You are given the address space 10.1.1.0/24.
• Determine what subnets you could use to fit these hosts into it.
• How to solve this:
• Start with the chart!
• Order the networks from the largest to the smallest.
• Find the smallest number in the chart that will fit the number of the largest
number of hosts + 2.
• Continue through each space needed until you either run out of space, or you
finish.
Working with VLSM Networks

 58, 14, 29, 49, 3: reorder to 58, 49, 8 7 6 5 4 3 2 1


29, 14, 3. Start with 58.
1 2 4 8 16 32 64 128
 Smallest number larger than (58 + 2)
is 64. 64 is 2 bits.
 24 bits of prefix length in the 32 < (58 + 2) < 64
address space given, add 2 for 26. 24 + 2 == 26
 First network is 10.1.1.0/26.
10.1.1.0/26 takes
 The next network is 10.1.1.0 + 64,
care of the first 58
so we start the next “round” at
10.1.1.64. hosts
Start the next block at
10.1.1.64
Working with VLSM Networks

 Next block is 49 hosts. 8 7 6 5 4 3 2 1


 Smallest number larger than (49 + 2) 1 2 4 8 16 32 64 128
is 64. 64 is 2 bits.
 24 bits of prefix length in the
address space given, add 2 for 26. 32 < (49 + 2) < 64
 We start this block at 10.1.1.64, so 24 + 2 == 26
network is 10.1.1.64/26.
10.1.1.64/26 takes
 The next network is 10.1.1.64 + 64,
care of the next 49
so we start the next “round” at
10.1.1.128. hosts
Start the next block at
10.1.1.128
Working with VLSM Networks

 Next block is 29 hosts. 8 7 6 5 4 3 2 1


 Smallest number larger than (29 + 2) 1 2 4 8 16 32 64 128
is 32. 32 is 3 bits.
 24 bits of prefix length in the
address space given, add 3 for 27. 16 < (29 + 2) < 32
 We start this block at 10.1.1.128, so 24 + 3 == 27
network is 10.1.1.128/27.
10.1.1.128/27 takes
 The next network is 10.1.1.128 + 32,
care of the next 29
so we start the next “round” at
10.1.1.160. hosts
Start the next block at
10.1.1.160
Working with VLSM Networks

 Next block is 14 hosts. 8 7 6 5 4 3 2 1


 Smallest number larger than (14 + 1 2 4 8 16 32 64 128
2) is 16. 16 is 4 bits (actually equal,
but it still works!).
 24 bits of prefix length in the (14 + 2) == 16
address space given, add 4 for 28. 24 + 4 == 28
 We start this block at 10.1.1.160, so
network is 10.1.1.160/27. 10.1.1.160/28 takes
care of the next 14
 The next network is 10.1.1.160 +
hosts
16, so we start the next “round” at
10.1.1.176. Start the next block at
10.1.1.176
Working with VLSM Networks

 Last block is 3 hosts. 8 7 6 5 4 3 2 1


 Smallest number larger than (3 + 2) 1 2 4 8 16 32 64 128
is 8. 8 is 5 bits.
 24 bits of prefix length in the
address space given, add 5 for 29. 4 < (5 + 2) < 8
 We start this block at 10.1.1.176, so 24 + 5 == 29
network is 10.1.1.176/29.
10.1.1.176/29 takes
 This is the last block of hosts, so
care of the next 14
we’re done!
hosts
Private addresses :
Working with VLSM Networks

 58, 14, 29, 49, 3: reorder to 58, 49, 8 7 6 5 4 3 2 1


29, 14, 3. Start with 58.
1 2 4 8 16 32 64 128
 Smallest number larger than (58 + 2)
is 64. 64 is 2 bits.
 24 bits of prefix length in the 32 < (58 + 2) < 64
address space given, add 2 for 26. 24 + 2 == 26
 First network is 10.1.1.0/26.
10.1.1.0/26 takes
 The next network is 10.1.1.0 + 64,
care of the first 58
so we start the next “round” at
10.1.1.64. hosts
Start the next block at
10.1.1.64
Configuration Interface :

 Fast Ethernet Interface


EX : f0/0, f0/1

 Serial Interface
EX : S0/0/0, S0/0/1
Configuration Interface :
Static Configuration :
Verifying Static Configuration :
Characteristics of RIP(Routing information protocols)
Dynamic Routing :
Verifying RIP Configuration :
Characteristics of EIGRP(Enhanced interior
gateway routing protocol)
 Metric value……………………. 5K value(10100 -Default)
 Information shearing …………… Multicast (224.0.0.10)
 Convergence…………………….. Very Fast
 Administrative Value …………… LAN-90, WAN-170
 Maximum Hop ………………….. 100 (Default)
 Standard ………………………... Partially Open Standard
 Hello timer ……………………. LAN- 5sec WAN–40 sec
 Hold timer ……………………..LAN- 15 sec WAN- 120 s
Enhanced IGRP (EIGRP)
Cost Formula :
EIGRP Neighbors Conditions :

 Same AS(Autonomous System Number)


 Same 5K(10100) value
 password (If configured)
Eigrp Neighbors :
Eigrp Topology :
Characteristics of OSPF (open shortest path
fast)
 Metric value…………………….. Bandwidth
 Information shearing …………… Multicast (224.0.0.5,
224.0.0.6)
 Convergence…………………….. Fast
 Administrative Value …………… 110
 Maximum Hop ………………….. Unlimited
 Standard ………………………... Open Standard
 Hello timer ……………………. LAN- 10sec WAN–30 sec
 Hold timer ……………………..LAN- 40sec WAN- 120 s
OSPF Neighbors Conditions :

 Same Area
 Same Hello timer and Hold timer
 password (If configured)
OSPF Neighbors Table :

 Down: no OSPF neighbors detected at this moment.


 Init: Hello packet received.
 Two-way: own router ID found in received hello packet.
 Exstart: master and slave or DR and BDR roles determined.
 Exchange: database description packets (DBD) are sent.
 Loading: exchange of LSRs (Link state request) and LSUs (Link
state update) packets.
 Full: OSPF routers now have an adjacency.
OSPF TOPOLOGY :

 LSA Type 1: Router LSA.


 LSA Type 2: Network LSA.
 LSA Type 3: Summary LSA.
 LSA Type 4: Summary ASBR LSA.
 LSA Type 5: Autonomous system external LSA.
Access-list (ACL)
Protocols port number :
Configuration Interface :

 Fast Ethernet Interface


EX : f0/0, f0/1

 Serial Interface
EX : S0/0/0, S0/0/1
Switching
 Switches are devices capable of creating temporary
connections between two or more devices linked to the
switch
Functions at Layer 2
CAM Table :
Switching Loops
Spanning Tree Protocol (STP)
Spanning Tree Protocol (STP)
Spanning Tree Protocol (STP)
Spanning Tree Protocol (STP)
Spanning Tree Protocol (STP)
Spanning Tree Protocol (STP)
Spanning Tree Protocol (STP)
Spanning Tree Protocol (STP)
Spanning Tree Protocol (STP)
Spanning Tree Protocol (STP)
Spanning-tree Port States

 Blocking : 20s
 Listening : 15s
 Learning: 15s
 Forwarding:
Port Types :

 Root port
 Designated port
 Alternate Port
Five administrative mode :

 1. Dynamic Desirable
 2.Dynamic Auto (default)
 3.Access
 4.Trunk
 5.Negotiate
Operational Mode :

 1. Static Access
 2. Trunk
VLAN(Virtual LAN)

VLAN benefits :
 Increased performance
 Improved manageability
 Simplification of software configurations
 Increased security options
VLAN :
Port Security:
Port Security:
Switch(config)#int f0/1
Switch(config-if)#switchport mode access
Switch(config-if)#switchport port-security
Switch(config-if)#switchport port-security maximum 1
Switch(config-if)#switchport port-security violation
shutdown/protect
VLAN Trunk Protocol (VTP)
VLAN Trunk Protocol (VTP)
VTP MODE :
 Server :vlan create, vlan delete, vlan edit, update receive, update own
 Client : no vlan create, no vlan delete, no vlan edit, update receive, update own.
 Transparent :vlan create, vlan delete, vlan edit, update receive, but not update own.
EtherChannel :
EtherChannel :
EtherChannel protocol

 PAgP This is a Cisco proprietary port channel negotiation protocol.

 LACP (802.3ad) This has the exact same purpose as PAgP, but is nonproprietary.
Question and Answer Session :
Thanks

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy