[go: up one dir, main page]

0% found this document useful (0 votes)
73 views123 pages

CCNA Course Part-1

The document provides an overview of Cisco Systems, Inc., detailing its role in developing networking hardware and software, and outlines the CCNA 200-301 certification course. It covers course objectives, target audience, prerequisites, exam topics, and various network topologies and classifications. Additionally, it discusses different types of networks, their benefits, devices, and technologies involved in networking.

Uploaded by

Aung Khaing
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views123 pages

CCNA Course Part-1

The document provides an overview of Cisco Systems, Inc., detailing its role in developing networking hardware and software, and outlines the CCNA 200-301 certification course. It covers course objectives, target audience, prerequisites, exam topics, and various network topologies and classifications. Additionally, it discusses different types of networks, their benefits, devices, and technologies involved in networking.

Uploaded by

Aung Khaing
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 123

Universe Networks Professional

Training

CCNA 200 - 301

www.everestacademy.in
Cisco Systems,
Inc

 Cisco Systems, Inc. is an American multinational company headquartered in San


Jose, California.

 Cisco develops, manufactures and sells networking hardware, software,


telecommunications equipment and other high-technology services and products.

 Cisco has many competitors such as Juniper, Huawei and HP …

www.everestacademy.in 2
Cisco Products, Solutions, and
Services

www.everestacademy.in 3
Cisco Products, Solutions, and
Services

www.everestacademy.in 4
Cisco Products, Solutions, and
Services

www.everestacademy.in 5
www.everestacademy.in 6
New Cisco Certification
Levels

Professional
Associate

Specialist

Architect
Expert
Entry

Certification Levels

www.everestacademy.in 7
www.everestacademy.in 8
www.everestacademy.in 9
CCNA 200-
301

Cisco Certified Network Associate (CCNA) v1.0

CCNA
Exam Code : 200-301

Duration : 120 minutes

Questions Number : (60 - 70


questions)
Passing Score : 800-850 out of 1000

Available Languages: English,


Japanese
Validity Period: 3 Years

www.everestacademy.in 10
Course
Objectives

 After taking this course, you should be able to:

 Identify the components of a computer network and explain their basic characteristics.

 Describe the features and functions of the Cisco IOS Software.

 Explain IPv4 and IPv6 addressing scheme.

 Configuring network components such as switches, routers, and wireless LAN controllers.

 Identify and resolve common switching and routing networking issues.

 Describe network and device architectures and explain virtualization.

 Describe the smart network management solutions like Cisco DNA Center, SD-Access and SD-WAN.

 Outline threat defense technologies.

www.everestacademy.in 11
Target
Audience

 Entry-level network engineer.

 Network administrator.

 Network support technician.

 Help desk technician.

www.everestacademy.in 12
Course
Prerequisites

 Before taking this course, you should have:

 Basic computer knowledge (CompTIA A+).

 Basic PC operating system navigation skills (CompTIA A+).

 Basic Internet usage skills (CompTIA Network +).

 Basic IP address knowledge (CompTIA Network +).

www.everestacademy.in 13
CCNA Exam Topics

Exam Topics

www.everestacademy.in 14
Examination Score
Report

www.everestacademy.in 15
CCNA Certificate
Sample

: 01/01/2021
: 01/01/2024

www.everestacademy.in 16
Questions

Multiple-Choice Single Answer

www.everestacademy.in 17
Questions

Multiple-Choice Multiple Answer

www.everestacademy.in 18
Questions

Order of Operations

www.everestacademy.in 19
Questions

Drag and Drop

www.everestacademy.in 20
Questions

No More Simulation Question

www.everestacademy.in 21
Exam
Price

www.everestacademy.in 22
Book
s

www.everestacademy.in 23
Book
s

www.everestacademy.in 24
Network Simulation
Tool

www.everestacademy.in 25
Network Simulation
Tool

www.everestacademy.in 26
Module 1
Session 1
Target
Audience

Entry-level network engineer.

Network administrator.

Network support technician.

Help desk technician.


Computer
Network
 A computer network is a set of computers connected
together for the purpose of sharing resources such as
internet connection, a printer, a file server and others.
Internet
Switch/Router
 Applications of Computer Networks:

 File Transfer.
 Web/Internet. PC1 PC2
 Email.
 Video Conferencing.
 Remote Access.
Server
 Printer
Network Printer.
 Network Server.
Smallest and Largest Computer
Network

 The Smallest Computer Network is made up  The Largest Computer Network is the internet.
by two computers or a computer and a mobile.

PC1 PC2

Internet

PC3 PC4
Wired
network
 A Wired network is a computer network that
uses cables to transfer data between connected
devices.
Internet
Switch/Router

PC1 PC2
 Copper cable

Server
Printer

 Fiber optic cable


Wireless
Network
 Wireless network uses radio signal frequency to transfer data between connected devices

Internet

Server
PC3
Network
Topologies
 A Network Topology is the arrangement with which computer systems or network
devices are connected to each other.

 Bus Topology

 Ring Topology

 Star Topology

 Point to Point Topology

 Point to Multipoint Topology

 Full Mesh Topology

 Partial Mesh Topology


Bus
Topology
 All the nodes are connected to a single cable.

 Advantages PC2

• Very easy to connect a computer.

• It works well for small networks.

• If one node fails, it does not affect the


whole network.

• It is easy to extend by joining cable with


connector or repeater.

 Disadvantages

• The entire network shuts down if there is


a break in the main cable. Printer
Server
• Collisions occur in the network resulting in
packet loss.

• It is difficult to isolate faults in the network.


Ring
Topology
 All the nodes are connected together as a ring using Media Access Unit (MAU) device.

PC1
 Advantages

• All data flows in one direction, reducing


the chance of packet collisions.
PC2
• Data can transfer between workstations at
high speeds.
Token
• Additional workstations can be added 01010
without impacting performance 1

 Disadvantages MA
U
• All data being transferred over the network must
pass through each workstation on the network.
• The entire network will be impacted if one
workstation shuts down.
Star
Topology
 All nodes are individually connected to a central device, like a Hub or a Switch.

Internet
 Advantages
Switch/Router
• Centralized management of the network,
through the use of the central hub or switch.
• Easy to add another computer to the network.
• If one computer on the network fails, the rest of the PC1 PC2
network continues to function normally.

 Disadvantages
Server
Printer
• The central network device determines the performance
and number of nodes the network can handle.

• If the central device fails, the entire network goes down


and all computers are disconnected from the network.
Full and Partial Mesh
Topology
Full Mesh Partial Mesh

• Every node has a direct connection to every • Some nodes doesn’t have a direct connection
other node in a network. to every other node in a network.

RouterA RouterB RouterA RouterB

RouterC RouterE RouterC RouterE

Number of cables = N∗(N−1) / 2 N is the number of nodes


Logical vs Physical Topology

 Physical Topology

• Refers to the physical layout of the wires in a


network.
Switch

Router

PC2
PC1
 Logical Topology

• Refers to how data moves through the


network.
Classification of Network

Local Area Network Campus Area Network


01 02
(LAN) (CAN)

Metropolitan Area Wide Area Network


03 Classification of 04
Network (MAN) Network (WAN )

05 Internet
Local Area Network (LAN)

 Local Area Network (LAN) is a computer network that interconnects computers within a limited area such
as home, school, and office.

 LAN’s Benefits  LAN’s Cables

• Sharing files and folders. • Copper cables (UTP and STP cable).

• Sharing printers. • Optical fiber cables (MMF cable).

• Connecting to servers.

• Using a single internet connection.

 LAN’s Devices  LAN’s Ownership

• Computers, Printers ,Servers, Switches, Routers, • Owned, controlled, and managed by a single
Access pointes and Firewalls. person or organization.

 LAN’s Technology  LAN’s Bandwidth

• Ethernet and Wireless LAN (WLAN). • High bandwidth is available for transmission.
Local Area Network
(LAN)

41
Campus Area Network
(CAN)
 A Campus Area Network is a network of multiple interconnected local area networks (LAN) within a
limited area such as an university, an enterprise and a corporate buildings.

 CAN’s Benefits  CAN’s Bandwidth

• Connecting multiple LANs together • High bandwidth is available for


within a limited area. transmission.

 CAN’s Devices  CANs Technology

• Computers, Printers ,Servers, Switches, • Ethernet and Wireless LAN (WLAN).


Routers, Access pointes and Firewalls.

 CAN’s Cables  CAN’s Ownership

• Copper cables (UTP and STP cable). • Owned, controlled, and managed by
an organization.
• Fiber-Optic cable (MMF cable).

42
Campus Area Network
(CAN)
Building3
Main Building
Building2

 Campus Network

Building1

43
Metropolitan Area Network
(MAN)
 A Metropolitan Area Network is a network that interconnects LANs in a geographic region
of the size of a metropolitan area.

 MAN’s Benefits  MAN’s Bandwidth

• Connecting multiple LANs together • High bandwidth (10 Gbps ).


within a limited area.

 MAN’s Devices  MANs Technology

• Multilayer switches and routers. • Metro Ethernet, FDDI, ATM and


SMDS

 MAN’s Cables  MAN’s Ownership

• Fiber-Optic cable (SMF cable). • Service Provider.

44
Metropolitan Area Network
(MAN)
Ban
k
Mal
Mal l
l

Towe
Hote r
l

Ban
k Ban
k
Hote
l

45
Wide Area Network
( WAN )
 A Wide Area Network ( WAN ) is a form of telecommunication networks that exists over a large-scale
geographical area such as a network of bank cash dispensers and network of a company with several
branch offices geographically distant.

 WAN Benefits  WAN’s Bandwidth

• Connecting multiple LANs and MANs • High bandwidth (100 Gbps ).


together.

 WAN’s Devices  WANs Technology

• Routers • SD-WAN, Leased line and MPLS.

 WAN’s Cables  WAN’s Ownership

• Fiber-Optic cables (SMF cable). • Service Provider and


Telecommunication Companies.

46
Wide Area Network
(WAN)
City-A

MAN

City-B City-C

WA
MAN N

47
Intern
et
 Internet is the network of networks that consists of private, public, academic, business, and government
networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking
technologies.

Wirele
ss

Teleco
DSL m
Router Towe
r

4
G

Cable
Modem

48
Peer-to-Peer (P2P)
Network
 A Peer-to-Peer (P2P) Network has decentralized resources and doesn’t have a dedicated server. every
computer can serve as both a server and a client. One computer might assume the role of server for one
transaction while acting as a client for another transaction.

Switch/Router
Internet
PC1

PC1 PC2

PC
3 PC
4

49
Peer-to-Peer (P2P)
Network
BitTorrent Applications

Uploader

PC4

50
Client/Server
Network
 In Client/Server Network servers provide network services to the other computers (Clients).

Switch/Router
File Sharing Server

Mail Server

Web Server

Application Server PC1

FTP Server

Print Server
PC2

DNS Server

Database Server

51
Module 1
Session 2
Network
Devices
 Network Devices are electronic devices which are required for communication and interaction between
devices on a computer network.

 Computer Server
Repeater
 Server
Internet
 Repeater

 Modem Hub Modem


Switch

 Ethernet Hub

 Ethernet Switch
Router

 Router
Firewall
 Access Point
Access Point

 Firewall
Data-Transfer Rate
(DTR)
 Data-transfer rate is the average number of bits per second passing through a communication link between
two network devices.

0
1

10 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 0
0 1 0 1 0 1 0 1
0 1
Bit Rates

Bit (b) per second 1 bit/s or 1 bps

kilobit (K) per second 1 Kbit/s or 1 Kbps = 1000 bps

Megabit (M) per second 1 Mbit/s or 1 Mbps = 1000 Kbps

Gigabit (G) per second 1 Gbit/s or 1 Gbps = 1000 Mbps

Terabit (T) per second 1 Tbit/s or 1 Tbps = 1000 Gbps


Data-Transfer Rate
(DTR)

Server
Repeater

Internet
1 Gbps
10 Mbps

Hub Switch

Modem

10 Mbps
20 Mbps
150 Mbps 100 Mbps
100 Mbps Router

Firewall 100 Mbps

Access Point
Computer
(Client)
 A computer is a system that runs a user-friendly operating system and desktop applications to perform a task.

 Operating Systems (OS)

Windows 10
macOS
Linux

 Desktop Applications

MS Office
Photoshop
VLC

56
Serve
r
 A Server is dedicated computer for a specific purpose, It provide services and functionality to other computers.
 A server has a motherboard that supports many processors and uses special RAMs called ECC rams
(Error correcting ram) for error checking and correction.
 A Server has redundant power supply contains two (or more) power supply units inside it.

2 Powerful
Tower
 Operating Systems (OS) Server Processors

Windows Server 2019


macOS Server
Linux Server

 Services

Hot Swappable
Web service Hard Drive
Rack Server
File Service
Mail Service
Database
Service
57
Ethernet
Hub
 A Hub is a network hardware device for connecting multiple Ethernet devices together and making them act
as a single network segment.
 If a hub receives a signal at any port it resend it out of every port except that port.
 A Hub works at the physical layer (layer 1).  A Hub transfers data at a maximum of 10 Mb/sec.

 A Hub has been replaced by network switches .  A Hub has multiple ports.

Hub
Sender Receiver

PC1 PC3

PC2

 
58
Ethernet
Bridge
 A network bridge is a device that creates a single aggregate network from two network segments.

 A bridge works at the physical layer (layer 1) and the data link layer (layer 2 ).

 A bridge forwards the frame passed on the destination MAC address.

Segment A Segment B
Hub Bridge Hub
Sender Receive
r
PC1
PC3

PC2 PC4

 

59
Ethernet
Bridge

Segment A Segment B

Hub Bridge Hub


Sender

PC1
 PC3

Receiver
PC2 PC4

60
Ethernet
Switch
 Ethernet Switch is a network hardware device for connecting multiple devices together.

 Each port of the ethernet switch is considered as a segment.

 A switch forwards the frame passed on the destination MAC address.

 A switch works at the physical layer (layer 1) and the data link layer (layer 2 ).

 A switch transfers data at a maximum of 10 Gb/sec.

Sender Switch Receiver

PC3

PC4

61
Route
r
 A router is a networking device that forwards data packets between different networks.

 Each port of the router is considered as a network.

 A router forwards the packet passed on the destination IP address.

 A router works at the physical layer (Layer 1), the data link layer (Layer 2 ) and the network layer (Layer 3).

Network A Network B
Receiver
Sender

Switch
Router Switch 

62
Repeater
(deprecated )
 Repeater is an electronic device that receives a signal and retransmits it at a higher level or higher power, so
that the signal can cover longer distances

Switch
Ethernet Repeater

100 meters
100 meters

Wireless Repeater
Access Point

63
Mode
m
 Modem is short for “Modulator-Demodulator “ It converts or "modulates" an analog signal from a telephone
or cable wire to digital data (1s and 0s) that a computer can recognize.

Modem Modem

Digital Signal Analog Signal Digital Signal


Access
Point
 A access point (AP) is a networking hardware device that allows wireless devices to connect together and
communicate with a wired computer network .

Wireless LAN Wired LAN

Access
Point Switch

65
Firewal
l
 A firewall is a network security system that monitors and controls incoming and outgoing network traffic
based on predetermined security rules.

 There are two types of firewalls : Inside Network Outside Network

1. Network-based Firewalls
(Hardware). Internet
2. Host-based Firewall (Software).

Sender
 A firewall filters data at :
Switch

1. Application layer .

2. Transport Layer. Firewall

3. Network Layer.
Network Interface Card
(NIC)
 Network Interface Card (NIC) is a computer hardware component that connects a computer to a
computer network.

 Also known as :

1. Network Interface Controller.

2. Network Adapter.

3. LAN Adapter .

4. Physical Network Interface .


8P8C Female Plug
 There are many types of NIC :

1. Built-in to Motherboard.

2. PCI Adapter.

3. USB Adapter.

 NIC Speed : 8P8C Connector,


Modern RJ45 connector
10/100/1000 Mbps

67
Fiber Network Interface
Card
 Fiber Network Interface Card is connected to a fiber optic cable and used to connect servers with switches.

 Also known as :

1. Fiber LAN card.

2. Fiber Server Adapter.


Fiber Optic Cable
 Fiber Network Interface Card
Speed : Comput
1. 1000 Mbps ( 1 Gbps)
er
2. 10 Gbps.
Serv
3. 25 Gbps.
er
4. 40 Gbps.

68
Wireless Network Interface Controller
(WNIC)
 A wireless network interface controller (WNIC) is a network interface controller which connects to a
wireless radio-based computer network,

PCI WNIC

Internal WNIC

USB WNIC
Access Point

69
Data Transmission Media /
Medium

 A transmission medium is the channel through which data is sent from one place to another.

 In data communication terminology, a  The Transmission media is classified into


transmission medium is a physical path two types namely wired media (Guided
between the transmitter and the receiver. Transmissio Media) & wireless media (Unguided Media).
n Media

Guided Unguided
Media Media

Twisted Optical Fiber


Coaxial cable Radio wave Microwave Infrared
pair cable
cable

70
Bandwidth, Throughput and
Speed
 Bandwidth is the maximum amount of the data
that can be passed from one point to another
within a given time (Unit : Bits/sec).

 Throughput is the actual amount of the data


that is able to move through the media within a
given time.

 Speed is the rate of data transfer across the


transmission path within a given time.

 Bandwidth is a measurement of how much data


can be transferred at a time while speed is a
measurement of how fast things are done.
Transmission
Modes
Simplex Mode
 Simplex mode : the communication is unidirectional,
as on a one-way street. Only one of the two devices
on the media can transmit, the other can only
receive..

 Half-duplex mode : each station can both transmit Half-Duplex Mode


and receive, but not at the same time. When one
device is sending, the other can only receive, and vice
versa.

Full-Duplex Mode
 Full-duplex mode : both stations can transmit and
receive simultaneously by using two physically
separate transmission paths or by dividing the
capacity between signals travelling in both directions.
MAC ADDRESS

A Unique Identifier assigned to network interfaces


Work at the data link layer
Also be known as Hardware Address or Physical Address
48-bit address
12 Hexadecimal digits, grouped in 6 pairs.

Example: 00 03 47 6F 5A 38

Organizationally Unique Universally Administered


Identifier (OUI) Addresses (UAA)
TCP and UDP Protocols

Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) is a transportation protocol that
is one of the core protocols of the Internet protocol suite. Both TCP and UDP work at transport layer
TCP/IP model.
Difference between TCP and UDP Internet Protocols.
TCP UDP

Connection-Oriented Connectionless

Reliable Unreliable

Protocol number 6 Protocol number 17

Supports full duplex Does not support full duplex

Acknowledge segments No acknowledgement


TCP/UDP Port Numbers

The port number = 16bits number


Maximum possible value = 65535
The port numbers are divided into three ranges:

Port Number Range Port Group


0 to 1023 Well Known Ports
1024 to 49151 Registered Ports
49152 to 65535 Private or Dynamic Ports
Common TCP/UDP Protocols and Ports

Application Protocol Port Numbers


FTP Data/Control TCP 20,21
SSH Remote Login Protocol TCP 22
Telnet TCP 23
Simple Mail Transfer Protocol (SMTP) TCP 25
Domain Name System (DNS) TCP/UDP 53
Dynamic Host Configuration Protocol (DHCP) UDP 67,68
Trivial File Transfer Protocol (TFTP) UDP 69
Hyper Text Transfer Protocol (HTTP) TCP 80
Post Office Protocol (POP3) TCP 110
Common TCP/UDP Protocols and
Ports

Application Protocol Port Numbers

Network Time Protocol (NTP) UDP 123

NetBIOS TCP/UDP 137-139

Internet Message Access Protocol (IMAPv4) TCP 143

Simple Network Management Protocol (SNMP) UDP 161

Border Gateway Protocol (BGP) TCP/UDP 179

Apple Talk TCP/UDP 201

Lightweight Directory Access Protocol (LDAP) TCP 389

Hypertext Transfer Protocol over SSL/TLS (HTTPS) TCP 443

Microsoft DS (SMB) TCP 445


Common TCP/UDP Protocols and Ports

Application Protocol Port Numbers

Remote Shell (RSH) TCP 514

DHCPv6 UDP 546,547

LDAP over SSL/TLS TCP/UDP 636

FTP over SSL/TLS TCP 989/990

IMAPv4 over SSL/TLS TCP 993

POP3 over SSL/TLS TCP 995

Microsoft Terminal Server (RDP) TCP/UDP 3389

HTTP Proxy TCP 8080

VMware Server TCP 8200


IP HISTORY AND
MANAGEMENT
The early years: 1981 –
1992
The boom years: 1992 –
2001

1992:
“It has become clear that … these problems are likely to become critical
within the next one to three years.” (RFC1366)

“…it is [now] desirable to consider delegating the registration function to an


organization in each of those geographic areas.” (RFC 1338)
Recent years: 2002 –
2009

2004:
Establishment of the
Number Resource Organisation
Address Management
Today
IETF
IP
IANA

Allocation
RIR*
IETF : Internet Engineering Task Force
IANA : Internet Assigned Numbers Authority
Allocation
ISP

RIR : Representative of ISP Assignment


User
RIR (Regional Internet

Registries
A regional Internet registry (RIR) is an organization overseeing the
allocation and registration of Internet Number resources within a
particular region of the world. Resources include IP addresses.

There are currently five RIRs in operation:

 American Registry for Internet Numbers (ARIN) for North America and
parts of the Caribbean
 RIPE Network Coordination Centre (RIPE NCC) for Europe, the Middle East
and Central Asia
 Asia-Pacific Network Information Centre (APNIC) for Asia and the
Pacific region
 Latin American and Caribbean Internet Addresses Registry (LACNIC) for
Latin America and parts of the Caribbean region
 African Network Information Centre (AfriNIC) for Africa
Introduction to TCP/IP
 What is TCP/IP?

TCP/IP is a standard protocol used between computers and network


devices for communication.
TCP/IP Addressing
 IP Address is logical address given to each and every device in the
network defined by IANA.
 Resides at OSI Layer-3 address (Network Layer).

 Two Versions of IP:


 IP version 4 (IPv4)
 IP version 6 (IPv6)
IPv4 Address Structure
 32-bit addressing system.
 IPv4 addresses are comprised of 4 octets.
 Dotted decimal notation is used to segment the octet.
 Each section contains a number between 0 and 255.
 Examples : 10.1.12.1, 172.16.1.1, 192.168.1.254
 Total number of IPv4 Address Space = 4,294,967,296 (4.3 Billions)
Classes of IP Addresses
Classes Range Binary

Class A 0.0.0.0 - 127.255.255.255 0xxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx

Class B 128.0.0.0 - 191.255.255.255 10xxxxxx xxxxxxxx xxxxxxxx xxxxxxxx

Class C 192.0.0.0 -223.255.255.255 110xxxxx xxxxxxxx


xxxxxxxx xxxxxxxx

Class D 224.0.0.0 - 239.255.255.255 1110xxxx xxxxxxxx


xxxxxxxx xxxxxxxx

Class E 240.0.0.0 - 255.255.255.255 1111xxxx xxxxxxxx


xxxxxxxx xxxxxxxx
Subnet Mask
 A subnet mask separates the IP address into the network and
host addresses.
 Subnetting further divides the host part of an IP address into a
subnet and host address.
 It is called a subnet mask because it is used to identify
network address of an IP address by perfoming bitwise AND
operation on the netmask.
Subnet Mask

Helps identify network and host portion of network.

Default subnet masks:


Address Class Dotted Decimal Prefix

Class A 255.0.0.0 /8

Class B 255.255.0.0 /16

Class C 255.255.255.0 /24

Class D 255.255.255.255 /32

Class E None None


Network and Host Portions

 IP address is divided into Network and Host Portion.


8 bits 24 bits
 Class A Network Host Host Host

16 bits 16 bits
 Class B
Network Network Host Host

24 bits 8 bits
 Class C
Network Network Network Host
High-Order Bits
 Class addresses specified by the high-order bits:

 Class A (0)

 Class B (10)

 Class C (110)
Assignable IP Addresses
The number of assignable IP addresses in the various classes of IP addresses
shown in table.
Classes Range Binary Total number of Total number of
networks host

Class A 0.0.0.0 - 127.255.255.255 0xxxxxxx xxxxxxxx 128 16777216


xxxxxxxx xxxxxxxx
Class B 128.0.0.0 - 191.255.255.255 10xxxxxx xxxxxxxx 16384 65536
xxxxxxxx xxxxxxxx

Class C 192.0.0.0 -223.255.255.255 110xxxxx xxxxxxxx 2097152 256


xxxxxxxx xxxxxxxx

Class D 224.0.0.0 - 239.255.255.255 1110xxxx xxxxxxxx Reserved for Reserved for


xxxxxxxx xxxxxxxx Multicasting Multicasting

Class E 240.0.0.0 - 255.255.255.255 1111xxxx xxxxxxxx Reserved for Reserved for


xxxxxxxx xxxxxxxx Research and Research and
Development Development
Valid and Invalid IP
 When all the HOSTID portion bits of an IP address are zero’s then it is called Network Address.

class A 10.0.0.0
class B 172.16.0.0
class C 192.168.10.0

 When all the HOSTID portion bits of an IP address are one’s then it is called Broadcast Address.

class A 10.255.255.255
class B 172.16.255.255
class C 192.168.10.255

 When all the NETID as well as HOSTID portion bits of an IP address are 0’s then it is used for Default
Routing (CISCO Routers)

Address 0.0.0.0

 Loopback Addresses (Self Testing)

Address 127.0.0.0 255.0.0.0

 APIPA or Link Local Address

169.254.0.0/16
IPv4 Addresses: Public & Private

Private IP Public IP
Used with the LAN or within the Used on public network (Internet)
organization.

Not recognized on internet Recognized on internet

Given by the administrator Given by the service provider

Unique within the network Globally unique

Free of charge Pay to service provider

Unregistered IP Registered IP
Range of Private IP Address

 Defined in RFC 1918


 For internal use only
 Cannot be routed through the internet

Class Private IP Addresses CIDR Block Total Hosts


A 10.0.0.0 to 10.255.255.255 /8 16,777,216
B 172.16.0.0 to 172.31.255.255 /12 1,048,576
C 192.168.0.0 to 192.168.255.255 /16 65,536
Subnetting
Subnetting : A network is divided into several smaller networks with each subnetwork
(or subnet) having its subnetwork address
 Reasons:-
 Provides addressing flexibility for the network administrator.
-Each LAN must have its own network or subnetwork address.
 Provides some security since access to other subnets is only available through the
services of a router.
 Reduce the Wastage of IP Addresses
 Reduce network traffic
Types of Subnetting

 FLSM (FIXED LENGTH SUBNET MASK)


 VLSM (VARIABLE LENGTH SUBNET MASK)
IP-SUBNET ZERO OR FLSM
 Subnetting is based up on NETID portion bits.
 In this case we need to borrow some bits from Host ID portion that depends up on the
number of subnets
 For e.g 192.168.10.0/26

Step 1: Identify the total number of subnets (how many)?


2n = number of subnets
22 = 4
Where n are the number of borrowed bits from hostId portion.

Step 2: Identify the the total number of hosts for each subnets (how many)?
2m - 2 = number of valid hosts
26 – 2 = 62
Where m are remaining number of bits in hostid portion.

Step 3: Calculate Subnet Mask and Range.


11111111 11111111 11111111 11000000
255 .255 .255 .192
Range:256 - 192 = 64
VLSM
 Subnetting is based up HostId portion bits.

 In this case we reserve some bits in hostid portion rest of the


bits will be in Netid portion bits.
 Subnet Mask vary for each subnet.
VLSM

Need 10 addresses /28. Give them 16.

Need 200 addresses /24. Give them 256.

Need 500 addresses /23. Give them 512.

Need 1000 addresses /22. Give them 1024.

Need 4000 addresses /20. Give them 4096.


Before VLSM
Need 10 addresses Class C. Give them
256.
Need 200 addresses Class C. Give them
256.
Need 500 addresses Class B. Give them
65,536.
Need 1000 addresses Class B. Give them
65,536.
Need 4000 addresses Class B. Give them
65,536.
Open Systems Interconnection model (OSI
Model)

 OSI model is a conceptual model which provides standards and 7. Application


enables divers communication systems to communicate with each other. Protocols

6. Presentation
 OSI model created by the International Organization for Standardization (ISO). Protocols

5. Session
 OSI model was published in 1984. Protocols

4. Transport
 OSI model partitions a communication system into 7 abstraction layers. Protocols

3. Network
 A layer serves the layer above it and is served by the layer below it. Protocols

2. Data Link
Protocols
 Each layer has a set of protocols.
1. Physical
Protocols

www.everestacademy.in 10
4
Network
Protocol
 A network protocol is an established set of rules that determine how data is  List of Network Protocols :
transmitted between different devices in the same network. It allows connected
devices to communicate with each other, regardless of any differences in their
• Communication
internal processes, structure or design.
• Network management
 A protocol suite is a collection of protocols that are designed to work together.
• Security

   

Luccy
Alix Hi.. Hi..
Alix
Hello. Hello.
. .
Luccy

01010
Sen
d
1 010101 Sen
d

www.everestacademy.in 10
5
TCP/IP
Model
 TCP/IP stands for Transmission Control Protocol/Internet Protocol.

 TCP/IP Model was designed in 1970s.


4. Application
Protocols

 TCP/IP Model is a set of communications protocols


used for communicating computers over the Internet.
3. Transport
Protocols
 TCP/IP Model is named from two of the most important
protocols in it : the Transmission Control Protocol (TCP)
and the Internet Protocol (IP). 2. Internet
Protocols
 The original TCP/IP Model consists of four layers.

1. Network Interface
 TCP/IP Model known as Internet Protocol Suite (TCP/IP).
Protocols

www.everestacademy.in 10
6
Comparison of TCP/IP and OSI
Layering
OSI Model

7. Application
Original TCP/IP Model Updated TCP/IP Model
Protocols

6. Presentation 4. Application 5. Application


Protocols Protocols Protocols

5. Session
Protocols

4. Transport 3. Transport 4. Transport


Protocols Protocols Protocols

3. Network 2. Internet 3. Network


Protocols Protocols Protocols

2. Data Link 2. Data Link


Protocols 1. Network Interface Protocols

Protocols
1. Physical 1. Physical
Protocols Protocols
www.everestacademy.in 10
7
Layer 7 (Application
Layer)
 The Application Layer contains a variety of protocols that are commonly needed by applications.

 Hypertext Transfer Protocol (HTTP).

 Hypertext Transfer Protocol Secure (HTTPS)


Chrome FileZilla Telne Outlook Internet µTorren
t t
 File Transfer Protocol (FTP).
Dat
a
 Teletype Network (Telnet).

 Simple Mail Transfer Protocol (SMTP).

 Domain Name System (DNS).

Protocols
 BitTorrent (BT)

www.everestacademy.in 10
8
Layer 6 (Presentation
Layer)
 The Presentation layer is responsible for the formatting and delivery of information to the application layer
for further processing or display.

ABCD

Character Encoding
Chrome FileZilla Telne Outlook Internet µTorren
ASCII, UTF-8, UTF-16 01100 t t
11010

Data
Compression
JPEG, MPEG, MP3 01100 Protocols
11010 Data

Encryption/
Decryption
SSL 01100
11010
Protocols

www.everestacademy.in 10
9
Layer 5 (Session
Layer)
 The Session Layer provides the mechanism for opening, closing and managing a session between end-user
application processes.

 Services :

Authentication Authorization

user  read
Protocols

********
 write Data Flows

 Protocols : Dat
a
• Remote procedure call protocol (RPC)

• Point-to-Point Tunneling Protocol (PPTP)

• Session Control Protocol (SCP) Protocols : RPC, PPTP, SCP, SDP

• Session Description Protocol (SDP).


Layer 4 (Transport
Layer)
 The Transport Layer provides the communication services directly to the application processes running on
different hosts.

Data Flows
 Protocols :

• Transmission Control Protocol (TCP) .

• User Datagram Protocol (UDP) . Protocols

 Services : Data Segmentation

Segment
• Connection-oriented network (TCP) .

• Connectionless network (UDP) .

• Segmentation and reassembly .

• Errer Recovery .

Protocols ( TCP, UDP )

www.everestacademy.in 11
1
Layer 3 (Network
Layer)
 The Network layer is responsible for packet forwarding between different networks through intermediate
routers.

 Services :  Protocols :
• Host addressing. Network B • IPv4/IPv6.
• Packet forwarding. SwitchB • ICMP

• IPsec
PC2

Network A Network C

SwitchA SwitchC

Packet
PC1
PC3
Protocols: IPv4, IPv6
3. Network Layer

www.everestacademy.in 11
2
Layer 2 (Data Link
Layer)
 The Data Link Layer transfers data between adjacent network nodes in WAN, MAN and LAN.

 Services :

• Encapsulation of packets into frames. Frames


• Frame synchronization. Ethernet Switch
• Flow control.
• Physical addressing.
• Frame Switching.
• Error detection and correction. Protocols: Ethernet, ATM, CDP, LLDP, PPP, MPLS, HDLC

 Protocols :

• Ethernet. • Point-to-Point Protocol (PPP).


• Asynchronous Transfer Mode (ATM). • Multiprotocol Label Switching (MPLS).
• Cisco Discovery Protocol (CDP) . • High-Level Data Link Control (HDLC).
• Link Layer Discovery Protocol (LLDP).

www.everestacademy.in 11
3
Layer 2 (Data Link Layer) -
Sublayers
 The Data Link Layer is an interface between the network and physical layer. It is further subdivided into two
protocol sublayers medium access control (MAC) and logical link control (LLC).

Frame
s (LLC) sublayer
2. Data Link Layer Protocols

Protocols
(MAC) sublayer

Protocols

 The medium access control (MAC) sublayer.  The logical link control (LLC) sublayer.

• Prepend/remove preamble. • Synchronization.


• Append/remove/check FCS. • Flow control.
• Discard malformed frames. • Error management.
• Moving data frames from one NIC to another.
• Control for accessing the transmission medium.

www.everestacademy.in 11
4
Layer 1 (Physical
Layer)
 The Physical Layer converts data link layer frames into bits and puts them on the network medium.

Frame Frame

• Electrical signals ( Analog or Digital).


Frame Protocols
s

0011001101 0011001101
• Wi-Fi signals.
bit Protocols : Media, Signal, Binary Transmission.
s

• LED Light or Laser pulses.

www.everestacademy.in 11
5
Data Encapsulation (OSI
model)
 Data Encapsulation is the process of putting headers or trailers to the data supplied by the higher layer.

 The header and data at each layer are called Protocol Data Unit (PDU).

7. Application Data L7 Header L7 PDU


Protocols

6. Presentation Data L6 Header L6 PDU


Protocols

5. Session Data L5 Header L5 PDU


Protocols

4. Transport Data L4 PDU


L4 Header
Protocols

3. Network Data L3 Header L3 PDU


Protocols

2. Data Link L2 Trailer Data L2 Header L2 PDU


Protocols

1. Physical 010110101000101110100101101110001010101100010101101100100
Protocols
www.everestacademy.in 11
6
Data De-encapsulation (OSI
model)
 Data De-encapsulation is the process of removing the header and the trailer from the PDU before
passing it up to the higher layer.

7. Application Data L7 Header L7


Protocols PDU

6. Presentation Data L6 Header L6 PDU


Protocols

5. Session Data L5 Header L5 PDU


Protocols

4. Transport Data L4 Header L4 PDU


Protocols

3. Network Data L3 Header L3 PDU


Protocols

2. Data Link L2 Trailer Data L2 Header L2 PDU


Protocols

1. Physical 010110101000101110100101101110001010101100010101101100100
Protocols
Data Encapsulation and De-encapsulation
(TCP/IP model)
PC1 PC2

Data Encapsulation Data De-encapsulation

5. Application Data Data 5. Application


Protocols Protocols

4. Transport Header Data Header Data 4. Transport


Protocols Protocols

3. Network Header Segment Header Segment 3. Network


Protocols Protocols

2. Data Link Header Packe Traile Header Packe Traile 2. Data Link
Protocols t r t r Protocols

1. Physical Frame Frame


1. Physical
Protocols
010110101000101110100101101 010110101000101110100101101 Protocols

www.everestacademy.in 11
8
Data Encapsulation and De-encapsulation
(TCP/IP model)

PC1 Switch Router Switch PC2

www.everestacademy.in 11
9
Data Encapsulation and De-encapsulation
(TCP/IP model)
PC1 Switch

Data Encapsulation Data De-encapsulation

5. Application Data
Protocols

4. Transport Header Data


Protocols

3. Network Header Segment


Protocols

2. Data Link Header Packe Traile Header Packe Traile 2. Data Link
Protocols t r t r Protocols

1. Physical Frame Frame


1. Physical
Protocols
010110101000101110100101101 010110101000101110100101101 Protocols

www.everestacademy.in 12
0
Data Encapsulation and De-encapsulation
(TCP/IP model)
Switch Router

Data Encapsulation Data De-encapsulation

Header Segment 3. Network


Protocols

2. Data Link Header Packe Traile Header Packe Traile 2. Data Link
Protocols t r t r Protocols

1. Physical Frame Frame


1. Physical
Protocols
010110101000101110100101101 010110101000101110100101101 Protocols

www.everestacademy.in 12
1
Data Encapsulation and De-encapsulation
(TCP/IP model)
Switch
Router

Data Encapsulation Data De-encapsulation

3. Network Header Segment


Protocols

2. Data Link Header Packe Traile Header Packe Traile 2. Data Link
Protocols t r t r Protocols

1. Physical Frame Frame


1. Physical
Protocols
010110101000101110100101101 010110101000101110100101101 Protocols

www.everestacademy.in 12
2
Data Encapsulation and De-encapsulation
(TCP/IP model)
Switch PC2

Data Encapsulation Data De-encapsulation

Data 5. Application
Protocols

Header Data 4. Transport


Protocols

Header Segment 3. Network


Protocols

2. Data Link Header Packe Traile Header Packe Traile 2. Data Link
Protocols t r t r Protocols

1. Physical Frame Frame


1. Physical
Protocols
010110101000101110100101101 010110101000101110100101101 Protocols

www.everestacademy.in 12
3

You might also like