Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
23 views33 pages

Ccna

The document provides an overview of networking concepts, including types of networks based on host, geography, and participation, as well as communication modes and network components. It also covers IP addressing, the OSI model, TCP/IP model, and various protocols such as HTTP, FTP, and DHCP. Additionally, it discusses routing types and the DORA process in DHCP, emphasizing the importance of addressing, routing, and network security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views33 pages

Ccna

The document provides an overview of networking concepts, including types of networks based on host, geography, and participation, as well as communication modes and network components. It also covers IP addressing, the OSI model, TCP/IP model, and various protocols such as HTTP, FTP, and DHCP. Additionally, it discusses routing types and the DORA process in DHCP, emphasizing the importance of addressing, routing, and network security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

Networking

Network:-

Group of two or more devices that connect together to share


the information between each other.

Networking:-

It is a connection of two or more devices that connect to each


other and share the information and get the acknowledgement. It is called
networking.

Types of Network
On the base of Host

• Client - That request for the service, client cannot provide the service.
• Server - That provides the service cannot request for the service.

• Peer - A device which can request and respond to a service at the


same time. data is not centralized and data can be downloaded only
when the other peer is available.

On the base of Geographical

• LAN (Local area Network):-

LAN is a local area Network which we can deploy


in small geographical areas.

Ex = Home,office etc.

• WAN (Wide area Network):-

Wide area Network which we can deploy in a Long


Geographical Network. ex = ISP Network
• CAN (Campus area Network)
• MAN (Metropolitan area network)

On the base of Participation

• V.P.N: A Logical network which is connected to physical thought ISP. A


Private network over a public network.
• Private Network: Where data is shared only for authorized users. Network
which can be used by authorized users.
• Public Network: Network which can be used by authorized and
unauthorized users.
Types of communications
• Unicast – one to one communication.

• Multicast – one to many (selected user) communications.

• Broadcast – one to all user communications.


Modes of communications

• Simplex: One-way communication for example (Television & Radio)

• Half Duplex: Two-way communication, but not at the same time. for
example (walkie talkie & hub)

• Full Duplex: two way communication between hosts.communication can


travel in both directions at the same time.

Ex- mobile phone,telephones.

Network Components
● NIC Card: Network Interface card (used in connect the network)

Wireless -

Wired -

• Transmission Media:

Wireless -

Wired -

Protocols

• Logical instruction

• Rules or standards that define how communication will or should take place.

Network Topologies

• Design of a network: How devices are connected

• Physical topologies: How devices are physical connected

• Logical topologies: How data flows between the devices.


• Bus: it's a specific kind of network topology in which all of the various
devices in the network are connected to a single cable.

• Ring: it's a network configuration where device connections create a


circle data path.each network devices are connected two others ,like
points on a circle,together devices in a ring topology.

Most commonly used in routing and switching


● • Star: a star topology uses a centralized device (hub/switch) to
concentrate all network connections to a single physical location.
● Most commonly used in switching

• Extended Star: a star network which has been extended to include an


additional hub or hubs.

● Most commonly used in switching.


• Mesh:in mesh topology all computers are connected to each one of the
devices in the network with a separate cable.

● Most commonly used in routing


● Devices

• Hub -

1. It doesn't have any memory.

2. It works on Half Duplex.

3. It is a Physical Layer device.

4. It broadcasts the signal.

5. It has multiple ports to connect many devices.

6. It is used in LAN.

• Switch -

It has memory to store mac address and form mac table according,

• Its layer two devices

• It has multiple port so that we can connect many devices

• It is use to connect single network device

• Most commonly used for LAN connectivity.

• Router - it is used to connect two diff-2 LAN

• Routers can be used in LAN but most commonly used in WAN

• Router work in IP Address, Router is layer 3 device

• Bridge - Only have two ports

• it has small memory it is work in mac address table


• Firewall - it is used to control inbound and outbound traffic to protect your
network

• it is work on network layer3, it works on IP and MAC address, it


is work on layer7(user interface)

IP Addressing

Internet Protocol Address is a unique or logical identifier of each machine in a network.

Versions

Ipv4 Ipv6

32 bits 128 bits

Decimal Hexadecimal

Two type of IP

Private Ip Public Ip

LAN WAN
Ipv4 dividing into 5 class

Class A 0-126

Class B 128-191

Class C 192-223

Class D 224-239 (Multicasting)

Class E 240-255 (Research)

IANA: Define the range

0.0.0.0 Reserved for default routing

127.0.0.0 Reserved for loopback which is used to check self-testing


Private IP Address

Class A 10.0.0.0 – 10.255.255.255

Class B 172.16.0.0 – 172.31.255.255

Class C 192.168.0.0 – 192.168.255.255

Class A N.H.H.H [N(Network)- 8bit,


H(Host)-8bit]

Class B N.N.H.H [255.255.0.0/16]

Class C N.N.N.H [255.255.255.0/24]

Subnetting: It is a combination of network bit and host.

Subnet Range
Class A A = Slash 8 – 15

Class B B = Slash 16 – 23

Class C C = Slash 24 – 31

Broadcast: All bits define in 255.255.255.255

Number System

Binary (Base = 2) 0,1

Decimal (Base = 10)0,1,2,3,4,5,6,7,8,9

Hexadecimal (Base = 16)0-9 A, B, C, D, E, F

Binary to decimal 128,64,32,16,8,4,2,1- Value


1,2,3,4,5,6,7,8,

Class A 10.0.0.0/8- CIDR

H value: 32 minus slash value


Class C 192.168.0.1/27

Number of hosts 2h - 2

Subnet 255.255.255.224

block size 256 - 224

No of network 2n

Class B 172.18.0.1/22

Number of hosts 2h - 2

Subnet 255.255.252.0

block size 256 - 252

No of network 2n
Class A 64.122.0.0/14

Number of hosts 2h-2

Subnet 255.252.0.0

block size 256 - 252

No of network 2n

Osi model
Open system interconnection

:OSI MODEL WAS CREATED BY THE INTERNATIONAL ORGANIZATION FOR


STANDARDIZATION (ISO),AN INTERNATIONAL STANDARD SETTING-BODY.

:IT WAS DESIGNED TO BE A REFERENCE MODEL FOR DESCRIBING THE


FUNCTION OF A COMMUNICATION SYSTEM.
THERE ARE SEVEN LAYERS IN OSI.

7:- APPLICATION LAYER

6:- PRESENTATION LAYER

5:- SESSION LAYER

4:- TRANSPORT LAYER

3:- NETWORK LAYER

2:- DATA LINK LAYER

1:- PHYSICAL LAYER

These seven layers are further divided into two more categories for
the sake of simplicity.

UPPER LAYER :- CLOSE TO THE USERS

LOWER LAYER :- CLOSE TO THE NETWORK

APPLICATION LAYER :- it provides you user interface.


: It's also provide you set of protocols to get connected with actual application

FOR EXAMPLES:-

WEB SERVICES:- HTTP,HTTPS


REMOTE SERVICES:- TELNET SSH

PRESENTATION LAYER:- It's converting your data into standard format and also
performs encryption and decryption.
SESSION LAYER:- session layer is responsible for creating, managing and
terminating the session.it decides modes of communication.

TRANSPORT LAYER:- Transport layer provides end to end reachability with the help of
two protocols TCP and UDP.

TCP:- TRANSMISSION CONTROL PROTOCOL


UDP:- USER DATAGRAM PROTOCOL

TCP UDP

Transmission control protocol port number 6 User datagram protocol port number 17

It is a connection-oriented protocol It is a connection less protocol

It is performed three-way handshake It does not perform three-way handshake

It is a reliable protocol(acknowledge) it is an unreliable protocol

it is slow protocol as compare UDP It is a fast protocol as compare to TCP

TCP performs retransmission of data. UDP does not perform retransmission of the
data.

Segmentation: It is basically dividing the huge amount of data which we get from the top
three layers into small chunks of segments.
Sequence: sequence is basically to reassemble the data way it has been sent.

NETWORK LAYER:- It is responsible for giving ip addresses.

DATA LINK LAYER:- it is responsible for the mac address.

PHYSICAL LAYER:- bits/byte


MSS: Maximum Segmentation Size

MSS – 1460 bytes

1 byte 8bits

8bit 1 byte

1024 bit 1MB (Megabytes)

1024MB 1GB (Gigabytes)

1024GB 1TB (Terabytes)

1024 TB 1PB (Petabytes)

1024 PB 1EB (Exabytes)

1024EB 1ZB (Zettabytes)

1024ZB 1YB (Yottabytes)

Protocols
Protocol HTT HTTP Telne SS SMT FTP DHC TFT DNS
s P S t H P P P

TCP TCP TCP TCP TCP TCP UDP UDP UDP/TC


P

Port 80 443 23 22 25 20/21 67/68 69 53


Number
s

TCP/IP MODEL
TCP :- TRANSMISSION CONTROL PROTOCOL

IP:- INTERNET PROTOCOL

: TCP / IP model was created in the 1970s by the DEFENSE ADVANCE RESEARCH
PROJECT AGENCY (DARPA) as an open,vendor-natural,public networking model.

Application layer Application layer


Transport layer Host to Host

Network layer Internet layer

Data link layer Network Access layer

Physical layer

The protocol that make up TCP/IP define:-

* How data is transmitted across a network

* How data should be formatted so that the network system can


understand it.

Two key TCP/IP features support Decentralization:-

1. End Node Verification:- The two endpoints of any data transfer are
responsible for making sure it was successful.

* no centralized control( system.


2. Dynamic routing:- End nodes can transfer data on multiple paths
and the n/w choose the best path for individual data transfer.

Network issues:-

1. Addressing

2. Routing

3. Name resolution

4. Flow & Error Control

5. Interoperability

MSS: Maximum Segmentation Size

MSS – 1460 bytes


1 byte 8bits

8bit 1 byte

1024 byte 1MB (Megabytes)

1024MB 1GB (Gigabytes)

1024GB 1TB (Terabytes)

1024 TB 1PB (Petabytes)

1024 PB 1EB (Exabytes)

1024EB 1ZB (Zettabytes)

1024ZB 1YB (Yottabytes)


Icmp(Internet control messaging protocol):-

* Is used to verify connectivity b/w source and destination.

* Utilities/ tools:-

ping = packet internet groper.

Traceroute = Tracing the path b/w source to


destination.

Massages:- --- Query = echo request

Echo reply

User ---- Windows - 5 sec timeout == 4 time

Cisco - 2sec timeout === 5 time

Arp(Address resolution protocol):-

* Arp finds the mac address of a host from its known ip address.

* It is layer 2 protocol.

* Arp request is a broadcast but arp response is a unicast.

* The arp concept is used only in IPv4.

* Arp is never generated for the device of another network.

Arp is four types:-

1. ARP
2. Proxy Arp

3. Reverse Arp

4. Gratuitous

HTTP(Hypertext transfer protocol):-

* To exchange web pages b/w client to server.

* Encapsulates in TCP with port no 80.

* It is not encrypted or secure.

* All data is sent in cleartext form.

HTTPS( Secure):-

* Encapsulates in TCP with port no 443.

* All data is encrypted.

* Encryption for https will be done by the presentation layer.

FTP(File Transfer Protocol):-

* It is used to transfer data b/w client to server.

* Encapsulates in TCP with port no 20,21

* Data is unsecured.
7 * We can browse through files and folders.

* you can not download or copy folder but only file and that to one
by one.

TFTP(Trivial FTP):-

* Encapsulated in UDP Port no 69.

* No Authentication.

* Data is unsecured and cannot be secured in any way.

* In order to secure any file, it is recommended to align a typical

file name.

APIPA (Automatic private IP address):-

==> 169.254.0.1 ------ 169.254.255.254

==> Inbuilt feature

Advantage:-

* It works the same as DHCP server.

* It stops unwanted broadcasting.


DNS (Domain name server/service/system)

• It is used to translate IP into domain names.

• It is used for 53 protocol numbers.

• It works on the application layer.

Telnet (Teletype Network)

• It is using for the remote access of other devices

• It is using port no 23

• All the data that is transmitted through telnet is in cleartext format

• encapsulates in TCP protocol

SSH (Secure shell)

• Almost same as telnet

• All data is encrypted and secure

• It is using port number - 22

• Encapsulates in TCP protocol

DHCP
( Dynamic host configuration protocol)
● It is used for the IP implementation -> Statically and dynamically
• It is automatically assigned an IP address to the DHCP client.
• It is based on client server model
• DHCP work at application layer
• IP address assigned is known as dynamic IP address
• DHCP IP address range is called scope.
• DHCP is dynamic boot up
• It is use UDP 67/68 Ports in transport layer (67 for server 68 is used for client)

DHCP server provide service


• IP Address
• Subnet Mask
• Default gateway
• Domain name
• DNS server address

DORA PROCESS
DORA: Discover, offer, request, Acknowledgement): it is type of message in DHCP
Discover/client (68): UDP broadcast from DHCP client to local available server

• Layer 2 Broadcast =

• Layer 3 Broadcast =255.255.255.255

Offer/server (67): DHCP server to client in response to DHCP discover with offer of
configuration parameters (IP ADDRESS of DHCP server offer IP, MAC address of client
subnet mask).

Request/client (68): Client then broadcasts to the server a DHCP request message asking
for the offered IP.

Acknowledgement/Server (67): server to client with configuration parameters including


connect network address.

Routing Part

Ip Routing: To identify the path from on network to another network

Types of routing:

Static Routing:

• with using next hop address

• with using exit interface

• with using exit interface and next hop address

As number (automounts system number): Group of devices or network within a


single administrator. It is a 16 bit decimal number. Range = 0-66535

Dynamics routing: Routing in which solute are calculated automatically


Routes automatically exchange the routes b/w each other

Some packets are there for each protocol which are advertised by routing protocols

Types of dynamics routing:

IGP – Interior gateway protocol

EGP – Exterior gateway protocol

IGP - Routing protocols that shares routes among some autonomous system
(Exp: EIGRP, OSPF)

EGP – Routing protocol that shares routes b/w will rent autonomous system
(Exp: BGP)

ACL(Access control list):-


* ACL is a set of rules which will allow or deny the specific traffic
moving through the router.

* It is layer 3 security which controls the flow of traffic from one router to another.

* It is also called a packet filtering firewall.

Type of ACL:- 1. Standard

2. Extended
Standard Access list Extended access list

* The access-list number range is 1 - 99 * The access-list number range is

100-199.

* Can block a network, Host and subnet. * Can block a network , host,

Subnet and service

* Two way communication is stopped. * Implemented closest to the

source.

* All services are blocked. * One way Communication is

Stopped.

* Implemented closest to the destination. * Selected services can be Blocked.

* Filtering is done based on only source ip

address

NAT (Network Address Translation):-


Network Address Translation is a process
of changing the source and destination IP addresses and ports. Address translation
reduces the need for IPv4 public addresses and hides private network address ranges.
This process is usually done by routers or firewalls.

Three types of address translation:-

Static NAT – Translates one private IP address to a public one. The public IP
address is always the same.

Dynamic NAT – Private IP addresses are mapped to the pool of public IP


addresses.

Port Address Translation (PAT) – One public IP address is used for all internal
devices, but a different port is assigned to each private IP address. Also known as NAT
Overload.

VLAN virtual local area network:-

➢ To break broadcast domain at layer2 we use vlan and one

vlan.defines one broadcast domain.


➢ vlan identify by a number and it is in 12 bits.

➢ range of vlan from 0 to 4095 (normal=1to1005,extended=1006

to 4094).

➢ default vlan is vlan1.

➢ vlan database save in vlan.dat file in flash memory.

how to create vlan:-


➢ switch(config)#vlan 10

➢ switch(config-vlan)#name sales

➢ switch#show vlan brief

how to assign port to any vlan:-

Static vlan assignment:

➢ switch(config-if)# switchport access vlan 10

➢ switch#show vlan brief

➢ switch#show vlan id 10

Dynamic vlan assign:-

➢ VMPS VLan Management Policy Server

➢ AAA Authentication, Authorization and Accounting.

Switchport:-
a switch which has capability to do layer2 address switching

➢ Access port- carry single vlan data

➢ Trunk port - carry multiple vlan data

You might also like