SlideShare a Scribd company logo
SUMMER TRAINING PROJECT PRESENTATION
ON
CISCO CERTIFIED NETWORK ASSOCIATE
ABOUT CCNA
 This certification builds a
foundation in and apprentice
knowledge of networking.
 CCNA certified professionals can install, configure,
and operate LAN, WAN and dail access services for
small networks (100 modes or fewer), including but
not limited to use of these protocols: IP, IGRP,
SERIAL FRAME-RELAY, IP RIP, VLANs, RIP
ETHERNET, ACCESS-LISTS.
NETWORKING DEVICES
Hubs:-
Centralized device in a topology.
Take incoming signal and repeats it out to all ports
on networks.
A multi port twisted pair hub allows several point
to point segments to be joined in to one network.
Switches:-
 Used to interconnect LAN segment in cheap and easily
configured manner.
 Reduces network traffic resuting from an excessive
number of computers.
Routers:-
Segment large number of data into smaller segments.
Acts as safety barrier between segments.
Perform complex operation, they are than Switches.
Performing path selection in WAN Technology
Open System Interconnection
reference model developed by
the International Organization for
Standardization (ISO).
OSI model describes how data
is transferred from an application
on one computer to another.
OSI model composed of seven
layers that describe the functions
of data communication
protocols.
Each Layer of OSI model
describes a particular network
function.
OSI MODEL
IP ADDRESS
An IP address is a numeric
identifier assigned to each
machine on an IP network.
It designates the specific location
of a device on the network.
IP addressing was designed to allow hosts on one network
to communicate with a host on a different network regardless
of the type of LANs the hosts are participating in.
ROUTING
The term routing is used for
taking a packet from one device
and sending it through the
network to another devices of
different network.
The logical network address of the destination host is
used to get packets to the network through a routed
network, and then the hardware address of the host is
used to deliver the packet from a router to the correct
destination host.
If a network isn’t connected to the router the router must
use one of the two ways to learn how to get to the remote
network.
Static Routing:-
Meaning that someone must hand-type all network
locations into the routing table.
Dynamic Routing:-
A protocol on one router communicates with the same
protocol running on neighbor routers.
Dynamic Routing Protocols:-
RIP (Routing Information Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)
OSPF (Open Shortest Path First)
ACCESS-LIST
Access control list are an integral part of Cisco’s Security
Solution.
The proper use and configuration of access-lists is a vital
part of router configuration because access lists are such
versatile networking accessories.
Two type of access-lists:-
Standard access lists:-
These use only the source IP address in an IP packet as the
condition test. All decisions are made based on source IP
address.
Extended access lists:-
Extended access-list can evaluate many of the other fields in
the layer 3 and layer 4 header of an IP packet.
NETWORK ADDRESS TRANSLATION
(NAT)The intention for NAT was to slow the depletion of
available IP address space by allowing many private IP
addresses to be representation by some smaller number of
public IP address.
NAT is great to have around when an organization
changes its ISP and network mangers doesn't want to
hassle of changing the internal scheme.
Three Type of NAT:-
Static NAT:-
This type of NAT is designed to allow one to one mapping
between local and global address.
Dynamic NAT:-
This version gives you to the ability to map unregistered IP
address to a register IP address fro out of a pool of register
IP addresses.
Overloading:-
This is the most popular type of NAT configuration.
Understanding that overloading really is a form of dynamic
NAT that maps multiple unregistered IP addresses to a
single registered IP address by using different ports. Its also
known as Port Address Translation (PAT).
SWITCHES
Layer 2 switching is the process o using the hardware
address of devices on LAN to segment a network.
Create a Mac-address forward/filter table in order to make
decisions on whether to forward or flood a frame.
In multiple links between switches we face multi looping
problems. To solve this problem switches run Spanning Tree
Protocol (STP).
The main purpose of STP is to prevent switching loops in a
network with redundant switched paths.
Virtual LAN (VLAN)
A VLAN is a logical grouping of network users and
resources connected to administratively defined ports on a
switched.
A group of users that need an unusually high level of
security can be put into its own VLAN so that users outside
of the VLAN can’t communicate with them. So it provide
security.
VLAN increase the number of broadcast domains while
decreasing their size.
Network adds, moves, and changes are achieved with ease
by just configuring a port into the appropriate VLAN.
VLAN Trunking Protocol (VTP)
This is created by CISCO.
Consistent VLAN configuration across all switches in the
network.
VLAN trunking over mixed networks, such as Ethernet.
Accurate tracking and monitoring of VLAN’s.
Dynamic reporting of added VLANs to all switches in the
VTP Domain.
Plug and play VLAN adding.
Three type of Mode:-
Server Mode
Client Mode
Transparent Mode
Wide Area Network (WAN)
WAN is depend upon Geographical distance.
WAN Terms:-
Customer premises equipment (CPE):-
Customer premises equipment (CPE) is equipment that’s
owned by the subscriber and located on the subscriber’s
premises.
Demarcation point:-
The demarcation point is the precise spot where the service
provider’s responsibility ends and the CPE begins.
Central office (CO):-
This point connects the customer’s network to the provider’s
switching network. Good to know is that a central office (CO)
is sometimes referred to as a point of presence (POP).
WAN Connection Types
Leased lines:-These are usually referred to as a point-to-
point or dedicated connection. When you’ve got plenty of
cash, this is really the way to go because it uses
synchronous serial lines up to 45Mbps. HDLC and PPP
encapsulations are frequently used on leased lines.
Circuit switching:-When you hear the term circuit switching,
think phone call. The big advantage is cost—you only pay
for the time you actually use. No data can transfer before an
end-to-end connection is established. Circuit switching uses
dial-up modems or ISDN and is used for low-bandwidth data
transfers.
Packet switching:-This is a WAN switching method that
allows you to share bandwidth with other companies to save
money. Frame Relay and X.25 are packet-switching
technologies with speeds that can range from 56Kbps up to
T3 (45Mbps).
Frame Relay:-
A packet-switched technology that made its debut in the early
1990s, Frame Relay is a high-performance Data Link and
Physical layer specification. An upside to Frame Relay is that
it can be more cost effective than point-to-point links, plus it
typically runs at speeds of 64Kbps up to 45Mbps (T3).
Another Frame Relay benefit is that it provides features for
dynamic bandwidth allocation and congestion control.
HDLC High-Level Data-Link Control (HDLC):-
HDLC was derived from Synchronous Data Link Control
(SDLC), which was created by IBM as a Data Link connection
protocol. HDLC works at the Data Link layer. It wasn’t
intended to encapsulate multiple Network layer protocols
across the same link.
Point-to-Point Protocol (PPP):-
PPP is a pretty famous, industry-standard protocol. Because
all multi protocol versions of HDLC are proprietary, PPP can be
used to create point-to-point links between different vendors’
equipment. It uses a Network Control Protocol field in the
Data Link header to identify the Network layer protocol and
allows authentication and multi link connections to be run over
asynchronous and synchronous links.
WIRELESS TECHNOLOGY
Transmitting a signal using the typical 802.11 specifications
works a lot like it does with a basic Ethernet hub: They’re
both two-way forms of communication, and they both use
the same frequency to both transmit and receive.
Also important to note is the fact that the 802.11
specifications were developed so that there would be no
licensing required in most countries—to ensure the user the
freedom to install and operate without any licensing or
operating fees.
Various agencies have been around for a very long time to
help govern the use of wireless devices, frequencies,
standards, and how the frequency spectrums are used.
Because WLANs transmit over radio frequencies, they’re
regulated by the same types of laws used to govern things
like AM/FM radios.
The 802.11 Standards:-
Wireless starts with 802.11, and there are various other up-
and-coming standard groups as well, like 802.16 and
802.20. And there’s no doubt that cellular networks will
become huge players in our wireless future. But for now,
we’re going to concentrate on the 802.11 standards
committee and subcommittees.
IEEE 802.11 was the first, original standardized WLAN at 1
and 2Mbps. It runs in the 2.4GHz radio frequency and was
ratified in 1997 even though we didn’t see many products
pop up until around 1999 when 802.11b was introduced.
Comparing 802.11:-
802.11b 802.11g 802.11a (h)
2.4GHz 2.4GHz 5GHz
Most common Higher throughput Highest
throughput
Up to 11Mpbs Up to 54Mbps* Up to 54Mbps
DSSS DSSS/OFDM OFDM
3 non-overlapping 3 non-overlapping channels up to 23
Channels. Non-overlapping channels.
THANK YOUTHANK YOU

More Related Content

PDF
ccna project
PPTX
ccna project on topic company infrastructure
PPTX
CCNA ppt
PPTX
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
PPTX
ccna networking ppt
PPTX
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
PPT
CCNA PPT
PPTX
Networking Course in bangalore | CCNA training Institute
ccna project
ccna project on topic company infrastructure
CCNA ppt
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
ccna networking ppt
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
CCNA PPT
Networking Course in bangalore | CCNA training Institute

What's hot (20)

PPTX
Presentation on CCNA(Networking & Troubleshooting)
PPT
ccna presentation 2013
PPTX
Ccna ppt1
PPT
CCNA SUMMER TRAINNING PPT
PPTX
summer training report on Computer network and Cisco packet tracer
PDF
acl configuration
PDF
CCNA project-report
PPT
CCNA 2
PPT
Digital network lecturer4
PPTX
CCNA PPT
PPTX
Network Design on cisco packet tracer 6.0
PPTX
CCNA Course Training Presentation
PPTX
Basic to advance protocols
PDF
CCNA Routing Protocols
PPTX
Presentation on ccna
PPTX
CCNA Training, Networking Courses Hyderabad, Cisco Certified - GolarsNetworks
PPTX
CCNA v6.0 ITN - Chapter 01
PPT
Summer training on CCNA
PDF
MPLS Presentation
Presentation on CCNA(Networking & Troubleshooting)
ccna presentation 2013
Ccna ppt1
CCNA SUMMER TRAINNING PPT
summer training report on Computer network and Cisco packet tracer
acl configuration
CCNA project-report
CCNA 2
Digital network lecturer4
CCNA PPT
Network Design on cisco packet tracer 6.0
CCNA Course Training Presentation
Basic to advance protocols
CCNA Routing Protocols
Presentation on ccna
CCNA Training, Networking Courses Hyderabad, Cisco Certified - GolarsNetworks
CCNA v6.0 ITN - Chapter 01
Summer training on CCNA
MPLS Presentation
Ad

Similar to CCNA 1 (20)

PDF
Network Concepts
PPTX
PPTX
INDUSTRIAL TRAINING PRESENTATION
PPTX
Computer Networks
DOCX
What is networking
PDF
Computer networking (nnm)
PPTX
Ccna(routing &and switching)
PPT
ITT04102 Basic Computer Networks v424_022856.ppt
PPTX
CCNA CCNP Basics for your mid term vivaa
PDF
The Evolving Internet Fndtn
PPTX
DOCX
Network hardware
PPTX
Basic Networking
DOC
76924356 synopsis-network
PPT
Lecture7 for (Computer Networks-Part1).ppt
PPT
Training Day Slides
PPTX
Networking
PPTX
Comm. & net. concepts
PPT
Basics Of Networking and routing.ppt
PPTX
The Basics of Industrial Ethernet Communications
Network Concepts
INDUSTRIAL TRAINING PRESENTATION
Computer Networks
What is networking
Computer networking (nnm)
Ccna(routing &and switching)
ITT04102 Basic Computer Networks v424_022856.ppt
CCNA CCNP Basics for your mid term vivaa
The Evolving Internet Fndtn
Network hardware
Basic Networking
76924356 synopsis-network
Lecture7 for (Computer Networks-Part1).ppt
Training Day Slides
Networking
Comm. & net. concepts
Basics Of Networking and routing.ppt
The Basics of Industrial Ethernet Communications
Ad

More from Asish Verma (13)

PPTX
Asis Verma cyber crime ppt
PPTX
Major seminar presentation Cloud Computing
DOCX
SITA LAB REPORT (XYBER CRIME)
PPT
SITA LAB PPT (XYBER CRIME)
DOC
SITA LAB REPORT (I.P)
PDF
Major pro lab synopsis
DOCX
MINOR PROZECT REPORT on WINDOWS SERVER
DOCX
Pt report(body)
DOCX
Pro lab synopsis (cert)
DOCX
Pro lab synopsis (body)
DOCX
Pt report(cert)
PPT
Asish verma
PPT
Microsoft project (msp) group 6
Asis Verma cyber crime ppt
Major seminar presentation Cloud Computing
SITA LAB REPORT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
SITA LAB REPORT (I.P)
Major pro lab synopsis
MINOR PROZECT REPORT on WINDOWS SERVER
Pt report(body)
Pro lab synopsis (cert)
Pro lab synopsis (body)
Pt report(cert)
Asish verma
Microsoft project (msp) group 6

Recently uploaded (20)

PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Encapsulation theory and applications.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Spectroscopy.pptx food analysis technology
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Getting Started with Data Integration: FME Form 101
PPT
Teaching material agriculture food technology
Encapsulation_ Review paper, used for researhc scholars
Mobile App Security Testing_ A Comprehensive Guide.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Network Security Unit 5.pdf for BCA BBA.
Encapsulation theory and applications.pdf
Machine learning based COVID-19 study performance prediction
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Spectroscopy.pptx food analysis technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Group 1 Presentation -Planning and Decision Making .pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Programs and apps: productivity, graphics, security and other tools
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Weekly Chronicles - August'25-Week II
MIND Revenue Release Quarter 2 2025 Press Release
Advanced methodologies resolving dimensionality complications for autism neur...
Spectral efficient network and resource selection model in 5G networks
Digital-Transformation-Roadmap-for-Companies.pptx
Getting Started with Data Integration: FME Form 101
Teaching material agriculture food technology

CCNA 1

  • 1. SUMMER TRAINING PROJECT PRESENTATION ON CISCO CERTIFIED NETWORK ASSOCIATE
  • 2. ABOUT CCNA  This certification builds a foundation in and apprentice knowledge of networking.  CCNA certified professionals can install, configure, and operate LAN, WAN and dail access services for small networks (100 modes or fewer), including but not limited to use of these protocols: IP, IGRP, SERIAL FRAME-RELAY, IP RIP, VLANs, RIP ETHERNET, ACCESS-LISTS.
  • 3. NETWORKING DEVICES Hubs:- Centralized device in a topology. Take incoming signal and repeats it out to all ports on networks. A multi port twisted pair hub allows several point to point segments to be joined in to one network.
  • 4. Switches:-  Used to interconnect LAN segment in cheap and easily configured manner.  Reduces network traffic resuting from an excessive number of computers. Routers:- Segment large number of data into smaller segments. Acts as safety barrier between segments. Perform complex operation, they are than Switches. Performing path selection in WAN Technology
  • 5. Open System Interconnection reference model developed by the International Organization for Standardization (ISO). OSI model describes how data is transferred from an application on one computer to another. OSI model composed of seven layers that describe the functions of data communication protocols. Each Layer of OSI model describes a particular network function. OSI MODEL
  • 6. IP ADDRESS An IP address is a numeric identifier assigned to each machine on an IP network. It designates the specific location of a device on the network. IP addressing was designed to allow hosts on one network to communicate with a host on a different network regardless of the type of LANs the hosts are participating in.
  • 7. ROUTING The term routing is used for taking a packet from one device and sending it through the network to another devices of different network. The logical network address of the destination host is used to get packets to the network through a routed network, and then the hardware address of the host is used to deliver the packet from a router to the correct destination host.
  • 8. If a network isn’t connected to the router the router must use one of the two ways to learn how to get to the remote network. Static Routing:- Meaning that someone must hand-type all network locations into the routing table. Dynamic Routing:- A protocol on one router communicates with the same protocol running on neighbor routers. Dynamic Routing Protocols:- RIP (Routing Information Protocol) EIGRP (Enhanced Interior Gateway Routing Protocol) OSPF (Open Shortest Path First)
  • 9. ACCESS-LIST Access control list are an integral part of Cisco’s Security Solution. The proper use and configuration of access-lists is a vital part of router configuration because access lists are such versatile networking accessories. Two type of access-lists:- Standard access lists:- These use only the source IP address in an IP packet as the condition test. All decisions are made based on source IP address. Extended access lists:- Extended access-list can evaluate many of the other fields in the layer 3 and layer 4 header of an IP packet.
  • 10. NETWORK ADDRESS TRANSLATION (NAT)The intention for NAT was to slow the depletion of available IP address space by allowing many private IP addresses to be representation by some smaller number of public IP address. NAT is great to have around when an organization changes its ISP and network mangers doesn't want to hassle of changing the internal scheme. Three Type of NAT:- Static NAT:- This type of NAT is designed to allow one to one mapping between local and global address.
  • 11. Dynamic NAT:- This version gives you to the ability to map unregistered IP address to a register IP address fro out of a pool of register IP addresses. Overloading:- This is the most popular type of NAT configuration. Understanding that overloading really is a form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports. Its also known as Port Address Translation (PAT).
  • 12. SWITCHES Layer 2 switching is the process o using the hardware address of devices on LAN to segment a network. Create a Mac-address forward/filter table in order to make decisions on whether to forward or flood a frame. In multiple links between switches we face multi looping problems. To solve this problem switches run Spanning Tree Protocol (STP). The main purpose of STP is to prevent switching loops in a network with redundant switched paths.
  • 13. Virtual LAN (VLAN) A VLAN is a logical grouping of network users and resources connected to administratively defined ports on a switched. A group of users that need an unusually high level of security can be put into its own VLAN so that users outside of the VLAN can’t communicate with them. So it provide security. VLAN increase the number of broadcast domains while decreasing their size. Network adds, moves, and changes are achieved with ease by just configuring a port into the appropriate VLAN.
  • 14. VLAN Trunking Protocol (VTP) This is created by CISCO. Consistent VLAN configuration across all switches in the network. VLAN trunking over mixed networks, such as Ethernet. Accurate tracking and monitoring of VLAN’s. Dynamic reporting of added VLANs to all switches in the VTP Domain. Plug and play VLAN adding. Three type of Mode:- Server Mode Client Mode Transparent Mode
  • 15. Wide Area Network (WAN) WAN is depend upon Geographical distance. WAN Terms:- Customer premises equipment (CPE):- Customer premises equipment (CPE) is equipment that’s owned by the subscriber and located on the subscriber’s premises. Demarcation point:- The demarcation point is the precise spot where the service provider’s responsibility ends and the CPE begins. Central office (CO):- This point connects the customer’s network to the provider’s switching network. Good to know is that a central office (CO) is sometimes referred to as a point of presence (POP).
  • 16. WAN Connection Types Leased lines:-These are usually referred to as a point-to- point or dedicated connection. When you’ve got plenty of cash, this is really the way to go because it uses synchronous serial lines up to 45Mbps. HDLC and PPP encapsulations are frequently used on leased lines. Circuit switching:-When you hear the term circuit switching, think phone call. The big advantage is cost—you only pay for the time you actually use. No data can transfer before an end-to-end connection is established. Circuit switching uses dial-up modems or ISDN and is used for low-bandwidth data transfers. Packet switching:-This is a WAN switching method that allows you to share bandwidth with other companies to save money. Frame Relay and X.25 are packet-switching technologies with speeds that can range from 56Kbps up to T3 (45Mbps).
  • 17. Frame Relay:- A packet-switched technology that made its debut in the early 1990s, Frame Relay is a high-performance Data Link and Physical layer specification. An upside to Frame Relay is that it can be more cost effective than point-to-point links, plus it typically runs at speeds of 64Kbps up to 45Mbps (T3). Another Frame Relay benefit is that it provides features for dynamic bandwidth allocation and congestion control. HDLC High-Level Data-Link Control (HDLC):- HDLC was derived from Synchronous Data Link Control (SDLC), which was created by IBM as a Data Link connection protocol. HDLC works at the Data Link layer. It wasn’t intended to encapsulate multiple Network layer protocols across the same link.
  • 18. Point-to-Point Protocol (PPP):- PPP is a pretty famous, industry-standard protocol. Because all multi protocol versions of HDLC are proprietary, PPP can be used to create point-to-point links between different vendors’ equipment. It uses a Network Control Protocol field in the Data Link header to identify the Network layer protocol and allows authentication and multi link connections to be run over asynchronous and synchronous links.
  • 19. WIRELESS TECHNOLOGY Transmitting a signal using the typical 802.11 specifications works a lot like it does with a basic Ethernet hub: They’re both two-way forms of communication, and they both use the same frequency to both transmit and receive. Also important to note is the fact that the 802.11 specifications were developed so that there would be no licensing required in most countries—to ensure the user the freedom to install and operate without any licensing or operating fees. Various agencies have been around for a very long time to help govern the use of wireless devices, frequencies, standards, and how the frequency spectrums are used. Because WLANs transmit over radio frequencies, they’re regulated by the same types of laws used to govern things like AM/FM radios.
  • 20. The 802.11 Standards:- Wireless starts with 802.11, and there are various other up- and-coming standard groups as well, like 802.16 and 802.20. And there’s no doubt that cellular networks will become huge players in our wireless future. But for now, we’re going to concentrate on the 802.11 standards committee and subcommittees. IEEE 802.11 was the first, original standardized WLAN at 1 and 2Mbps. It runs in the 2.4GHz radio frequency and was ratified in 1997 even though we didn’t see many products pop up until around 1999 when 802.11b was introduced.
  • 21. Comparing 802.11:- 802.11b 802.11g 802.11a (h) 2.4GHz 2.4GHz 5GHz Most common Higher throughput Highest throughput Up to 11Mpbs Up to 54Mbps* Up to 54Mbps DSSS DSSS/OFDM OFDM 3 non-overlapping 3 non-overlapping channels up to 23 Channels. Non-overlapping channels.