SlideShare a Scribd company logo
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 1:Exploring the Network
Introduction to Networks
Chapter 2:Configuring a Network OS
Chapter 3:Network Protocols and Communications
Mohammad Mamun Elahi
Assistant Professor, Department of CSE
Instructor, UIU Cisco Networking Academy
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Providing Resources in a Network
Networks of Many Sizes
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Providing Resources in a Network
Clients and Servers
Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Providing Resources in a Network
Peer-to-Peer
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs, WANs, and Internets
Components of a Network
There are three categories of network components:
 Devices
 Media
 Services
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network
Network Media
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network
Network Representations
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network
Topology Diagrams
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs and WANs
Types of Networks
The two most common types of network infrastructures are:
 Local Area Network (LAN)
 Wide Area Network (WAN).
Other types of networks include:
 Metropolitan Area Network (MAN)
 Wireless LAN (WLAN)
 Storage Area Network (SAN)
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs and WANs
Local Area Networks (LAN)
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs and WANs
Wide Area Networks (WAN)
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs, WANs, and Internets
The Internet
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Internet
Intranet and Extranet
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs, WANs, and Internets
Internet Access Technologies
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting to the Internet
Connecting Remote Users to the Internet
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting to the Internet
Connecting Businesses to the Internet
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converged Networks
The Converging Network
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Supporting Network Architecture
As networks evolve, we are discovering that there are four
basic characteristics that the underlying architectures need to
address in order to meet user expectations:
 Fault Tolerance
 Scalability
 Quality of Service (QoS)
 Security
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Fault Tolerance in Circuit Switched Network
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Packet-Switched Networks
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Scalable Networks
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Providing (QoS)
Examples of priority decisions for an organization might
include:
 Time-sensitive communication - increase priority for services
like telephony or video distribution.
 Non time-sensitive communication - decrease priority for web
page retrieval or email.
 High importance to organization - increase priority for
production control or business transaction data.
 Undesirable communication - decrease priority or block
unwanted activity, like peer-to-peer file sharing or live
entertainment
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Providing Network Security
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
Data Centers
A data center is a facility used to house computer systems and
associated components including:
 Redundant data communications connections
 High-speed virtual servers (sometimes referred to as server
farms or server clusters)
 Redundant storage systems (typically uses SAN technology)
 Redundant or backup power supplies
 Environmental controls (e.g., air conditioning, fire
suppression)
 Security devices
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Networking Technologies for the Home
Technology Trends in the Home
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Networking Technologies for the Home
Wireless Broadband
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Future of Networking
Network Security
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Security
Security Threats
The most common external threats to networks include:
 Viruses, worms, and Trojan horses
 Spyware and adware
 Zero-day attacks, also called zero-hour attacks
 Hacker attacks
 Denial of service attacks
 Data interception and theft
 Identity theft
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Security
Security Solutions
Network security components often include:
 Antivirus and antispyware
 Firewall filtering
 Dedicated firewall systems
 Access control lists (ACL)
 Intrusion prevention systems (IPS)
 Virtual Private Networks (VPNs)
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 2
2.1 IOS Bootcamp
2.2 Getting Basic
2.3 Address Schemes
2.4 Summary
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco IOS
Operating Systems
All networking equipment dependent on operating systems
 End users (PCs, laptops, smart phones, tablets)
 Switches
 Routers
 Wireless access points
 Firewalls
Cisco Internetwork Operating System (IOS)
 Collection of network operating systems used on Cisco devices
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco IOS
Operating Systems
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco IOS
Location of the Cisco IOS
IOS stored in Flash
 Non-volatile storage – not lost when power is lost
 Can be changed or overwritten as needed
 Can be used to store multiple versions of IOS
 IOS copied from flash to volatile RAM
 Quantity of flash and RAM memory determines IOS that can be used
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco IOS
IOS Functions
Major functions performed or enabled by Cisco routers and
switches include:
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Accessing a Cisco IOS Device
Console Access Method
Most common methods to access the Command Line Interface
 Console
 Telnet or SSH
 AUX port
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Accessing a Cisco IOS Device
Console Access Method
Console port
 Device is accessible even if no networking services have been
configured (out-of-band)
 Need a special console cable
 Allows configuration commands to be entered
 Should be configured with passwords to prevent unauthorized access
 Device should be located in a secure room so console port can not
be easily accessed
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Accessing a Cisco IOS Device
Telnet, SSH, and AUX Access Methods
Telnet
 Method for remotely accessing the CLI over a network
 Require active networking services and one active interface that is
configured
Secure Shell (SSH)
 Remote login similar to Telnet but utilizes more security
 Stronger password authentication
 Uses encryption when transporting data
Aux Port
 Out-of-band connection
 Uses telephone line
 Can be used like console port
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Accessing a Cisco IOS Device
Terminal Emulation Programs
Software available for
connecting to a networking
device
 PuTTY
 Tera Term
 SecureCRT
 HyperTerminal
 OS X Terminal
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Navigating the IOS
Cisco IOS Modes of Operation
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Navigating the IOS
Primary Modes
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Navigating the IOS
Global Configuration Mode and Submodes
Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Navigating the IOS
Navigating between IOS Modes
Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Navigating the IOS
Navigating between IOS Modes (cont.)
Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Command Structure
IOS Command Structure
Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Command Structure
Context Sensitive Help
Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Command Structure
Command Syntax Check
Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Command Structure
Hot Keys and Shortcuts
 Tab - Completes the remainder of a partially typed command or
keyword
 Ctrl-R - Redisplays a line
 Ctrl-A – Moves cursor to the beginning of the line
 Ctrl-Z - Exits configuration mode and returns to user EXEC
 Down Arrow - Allows the user to scroll forward through former
commands
 Up Arrow - Allows the user to scroll backward through former
commands
 Ctrl-Shift-6 - Allows the user to interrupt an IOS process such
as ping or traceroute.
 Ctrl-C - Aborts the current command and exits the configuration
mode
Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Command Structure
IOS Examination Commands
Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Command Structure
The show version Command
Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Hostnames
Why the Switch
Let’s focus on
 Creating a two PC network connected via a switch
 Setting a name for the switch
 Limiting access to the device configuration
 Configuring banner messages
 Saving the configuration
Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Hostnames
Device Names
Some guidelines for naming conventions are that names should:
 Start with a letter
 Contain no spaces
 End with a letter or digit
 Use only letters, digits, and dashes
 Be less than 64 characters in length
Without names, network
devices are difficult to
identify for configuration
purposes.
Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Hostnames
Hostnames
Hostnames allow
devices to be
identified by
network
administrators
over a network or
the Internet.
Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Hostnames
Configuring Hostnames
Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Limiting Access to Device Configurations
Securing Device Access
The passwords introduced here are:
 Enable password - Limits access to the privileged
EXEC mode
 Enable secret - Encrypted, limits access to the
privileged EXEC mode
 Console password - Limits device access using the
console connection
 VTY password - Limits device access over Telnet
Note: In most of the labs in this course, we will be
using simple passwords such as cisco or class.
Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Limiting Access to Device Configurations
Securing Privileged EXEC Access
 use the enable secret command, not the
older enable password command
 enable secret provides greater security because
the password is encrypted
Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Limiting Access to Device Configurations
Securing User EXEC Access
 Console port must be secured
• reduces the chance of unauthorized personnel physically
plugging a cable into the device and gaining device access
 vty lines allow access to a Cisco device via Telnet
• number of vty lines supported varies with the type of
device and the IOS version
Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Limiting Access to Device Configurations
Encrypting Password Display
service password-
encryption
 prevents
passwords from
showing up as
plain text when
viewing the
configuration
 purpose of this
command is to
keep unauthorized
individuals from
viewing passwords
in the configuration
file
 once applied,
removing the
encryption service
does not reverse
the encryption
Presentation_ID 58© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Limiting Access to Device Configurations
Banner Messages
 important part of
the legal process in
the event that
someone is
prosecuted for
breaking into a
device
 wording that
implies that a login
is "welcome" or
"invited" is not
appropriate
 often used for legal
notification
because it is
displayed to all
connected
terminals
Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Saving Configurations
Configuration Files
 Switch# reload
System configuration has
been modified. Save?
[yes/no]: n
Proceed with reload?
[confirm]
 Startup configuration is
removed by using
the erase startup-config
Switch# erase startup-config
 On a switch you must
also issue the delete
vlan.dat
Switch# delete vlan.dat
Delete filename [vlan.dat]?
Delete flash:vlan.dat?
[confirm]
Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Saving Configurations
Capturing Text
Presentation_ID 61© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ports and Addresses
IP Addressing in the Large
 Each end device on a
network must be
configured with an IP
address
 Structure of an IPv4
address is called dotted
decimal
 IP address displayed in
decimal notation, with
four decimal numbers
between 0 and 255
 With the IP address, a
subnet mask is also
necessary
 IP addresses can be
assigned to both
physical ports and virtual
interfaces
Presentation_ID 62© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ports and Addresses
Interfaces and Ports
 Network communications depend on end user device interfaces,
networking device interfaces, and the cables that connect them
 Types of network media include twisted-pair copper cables, fiber-
optic cables, coaxial cables, or wireless
 Different types of network media have different features and benefits
 Ethernet is the most common local area network (LAN) technology
 Ethernet ports are found on end user devices, switch devices, and
other networking devices
 Cisco IOS switches have physical ports for devices to connect to, but
also have one or more switch virtual interfaces (SVIs - no physical
hardware on the device associated with it; created in software)
 SVI provides a means to remotely manage a switch over a network
Presentation_ID 63© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Addressing Devices
Configuring a Switch Virtual Interface
 IP address - together with subnet mask, uniquely identifies end device
on internetwork
 Subnet mask - determines which part of a larger network is used by
an IP address
 interface VLAN 1 - interface configuration mode
 ip address 192.168.10.2 255.255.255.0 - configures the IP address
and subnet mask for the switch
 no shutdown - administratively enables the interface
 Switch still needs to have physical ports configured and VTY lines to
enable remote management
Presentation_ID 64© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Addressing Devices
Manual IP Address Configuration for End Devices
Presentation_ID 65© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Addressing Devices
Automatic IP Address Configuration for End Devices
Presentation_ID 66© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Addressing Devices
IP Address Conflicts
Presentation_ID 67© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verifying Connectivity
Test the Loopback Address on an End Device
Presentation_ID 68© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verifying Connectivity
Testing the Interface Assignment
Presentation_ID 69© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verifying Connectivity
Testing End-to-End Connectivity
Presentation_ID 70© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 3
3.1 Rules of Communication
3.2 Network Protocols and Standards
3.3 Moving Data in the Network
3.4 Summary
Presentation_ID 71© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Rules
What is Communication?
Presentation_ID 72© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Rules
Message Formatting and Encapsulation
Example: Personal letter contains the following elements:
 An identifier of the recipient
 A salutation or greeting
 The message content
 A closing phrase
 An identifier of the sender
Presentation_ID 73© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Rules
Message Delivery Options
Presentation_ID 74© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Protocols
Rules that Govern Communications
Presentation_ID 75© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Protocols
Network Protocols
 How the message is formatted or structured
 The process by which networking devices share information
about pathways with other networks
 How and when error and system messages are passed
between devices
 The setup and termination of data transfer sessions
Presentation_ID 76© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Protocols
Interaction of Protocols
 Application Protocol – Hypertext Transfer Protocol (HTTP)
 Transport Protocol – Transmission Control Protocol (TCP)
 Internet Protocol – Internet Protocol (IP)
 Network Access Protocols – Data Link & Physical layers
Presentation_ID 77© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Protocol Suites
Protocol Suites and Industry Standards
Presentation_ID 78© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Protocol Suites
TCP/IP Protocol Suite and Communication
Presentation_ID 79© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reference Models
The OSI Reference Model
Presentation_ID 80© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reference Models
The TCP/IP Reference Model
Presentation_ID 81© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reference Models
Comparing the OSI and TCP/IP Models
Presentation_ID 82© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Encapsulation
Communicating the Messages
 Segmenting message benefits
Different conversations can be interleaved
Increased reliability of network communications
 Segmenting message disadvantage
Increased level of complexity
Presentation_ID 83© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Encapsulation
Protocol Data Units (PDUs)
 Data
 Segment
 Packet
 Frame
 Bits
Presentation_ID 84© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Encapsulation
Encapsulation
Presentation_ID 85© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Encapsulation
De-encapsulation
Presentation_ID 86© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Moving Data in the Network
Accessing Local Resources
Presentation_ID 87© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Accessing Local Resources
Network Addresses & Data Link addresses
 Network Address
Source IP address
Destination IP address
 Data Link Address
Source data link address
Destination data link address
Presentation_ID 88© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Accessing Local Resources
Communicating with Device / Same Network
Presentation_ID 89© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Accessing Local Resources
MAC and IP Addresses
PC1
192.168.1.110
AA-AA-AA-AA-AA-AA
PC2
192.168.1.111
BB-BB-BB-BB-BB-BB
FTP Server
192.168.1.9
CC-CC-CC-CC-CC-CC
R1
192.168.1.1
11-11-11-11-11-11
ARP
Request
S1 R1
Presentation_ID 90© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Accessing Remote Resources
Default Gateway
PC 1
192.168.1.110
AA-AA-AA-AA-AA-AA
PC 2
192.168.1.111
BB-BB-BB-BB-BB-BB
FTP Server
192.168.1.9
CC-CC-CC-CC-CC-CC
R1
192.168.1.1
11-11-11-11-11-11
R2
172.16.1.99
22-22-22-22-22-22
Web Server
172.16.1.99
AB-CD-EF-12-34-56
Presentation_ID 91© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Accessing Remote Resources
Communicating Device / Remote Network
Presentation_ID 92© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Accessing Remote Resources
Using Wireshark to View Network Traffic
Presentation_ID 93© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

PPTX
Itn instructor ppt_chapter1 exploring the network smartskills
PPTX
Ccna v5-S1-Chapter 1
PPTX
CCNA RS_NB - Chapter 9
PPTX
CCNA RS_ITN - Chapter 11
PDF
CCNAv5 - S2: Chapter1 Introsuction to switched networks
PPTX
CCNA RS_ITN - Chapter 2
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 1
PPT
IT Essentials Chapter 9
Itn instructor ppt_chapter1 exploring the network smartskills
Ccna v5-S1-Chapter 1
CCNA RS_NB - Chapter 9
CCNA RS_ITN - Chapter 11
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNA RS_ITN - Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 1
IT Essentials Chapter 9

What's hot (20)

PPTX
CCNA RS_ITN - Chapter 4
PPTX
CCNA RS_ITN - Chapter 8
PPTX
CCNA RS_NB - Chapter 1
PDF
CCNAv5 - S1: Chapter 1 Exploring The Network
PPT
ITE v5.0 - Chapter 8
PPT
CCNA Discovery 1 - Chapter 1
PDF
Routing and switching essentials companion guide
PPT
ITE v5.0 - Chapter 10
PPTX
VMware vShield - Overview
PPTX
CCNA RS_ITN - Chapter 1
PPTX
Ccna v5-S1-Chapter 4
PPTX
CCNA RS_NB - Chapter 5
PPTX
CCNA RS_NB - Chapter 8
PPT
CCNA Discovery 2 - Chapter 8
PPT
ITE v5.0 - Chapter 12
PPT
ITE v5.0 - Chapter 9
PPT
CCNA Exploration 1 - Chapter 2
PPT
CCNA Discovery 1 - Chapter 5
PPT
CCNA Icnd110 s00
PPT
ITE - Chapter 13
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 8
CCNA RS_NB - Chapter 1
CCNAv5 - S1: Chapter 1 Exploring The Network
ITE v5.0 - Chapter 8
CCNA Discovery 1 - Chapter 1
Routing and switching essentials companion guide
ITE v5.0 - Chapter 10
VMware vShield - Overview
CCNA RS_ITN - Chapter 1
Ccna v5-S1-Chapter 4
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 8
CCNA Discovery 2 - Chapter 8
ITE v5.0 - Chapter 12
ITE v5.0 - Chapter 9
CCNA Exploration 1 - Chapter 2
CCNA Discovery 1 - Chapter 5
CCNA Icnd110 s00
ITE - Chapter 13
Ad

Similar to Ccna routing and_switching_chapter-1-2-3_mme (20)

PDF
Introduction of Exploring the Network Part 1
PPTX
Chapter 1 Exploring the Network. Intoduction.pptx
PPTX
Chapter 1 : Exploring the Network
PPTX
Itninstructorpptchapter1final 141024004546-conversion-gate02
PPTX
ITN_instructorPPT_Chapter1.pptx
PPTX
ITN_instructorPPT_Chapter1.pptx
PPTX
Itn instructor ppt_chapter1 - exploring the network
PPTX
Ccna v5-S1-Chapter 2
PPTX
ITN_instructorPPT_Chapter2.pptx
PPTX
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1
PDF
ccna1 v5 cap2
PPTX
Itn6 instructor materials_chapter1
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 2
PDF
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
PPTX
Chapter 2 : Configuring a network operating system
PPTX
CCNA RS_NB - Chapter 2
PPTX
Network Security.pptx
PDF
CCNA Modulo 1 capitulo 1.pdf
PPTX
PPTX
Lecture-1.pptx
Introduction of Exploring the Network Part 1
Chapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 : Exploring the Network
Itninstructorpptchapter1final 141024004546-conversion-gate02
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
Itn instructor ppt_chapter1 - exploring the network
Ccna v5-S1-Chapter 2
ITN_instructorPPT_Chapter2.pptx
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1
ccna1 v5 cap2
Itn6 instructor materials_chapter1
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
Chapter 2 : Configuring a network operating system
CCNA RS_NB - Chapter 2
Network Security.pptx
CCNA Modulo 1 capitulo 1.pdf
Lecture-1.pptx
Ad

Recently uploaded (20)

PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
web development for engineering and engineering
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Sustainable Sites - Green Building Construction
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Welding lecture in detail for understanding
PPTX
Geodesy 1.pptx...............................................
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
DOCX
573137875-Attendance-Management-System-original
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPT
Project quality management in manufacturing
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
composite construction of structures.pdf
PPTX
OOP with Java - Java Introduction (Basics)
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
web development for engineering and engineering
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Sustainable Sites - Green Building Construction
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Operating System & Kernel Study Guide-1 - converted.pdf
Welding lecture in detail for understanding
Geodesy 1.pptx...............................................
Automation-in-Manufacturing-Chapter-Introduction.pdf
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
573137875-Attendance-Management-System-original
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Project quality management in manufacturing
CH1 Production IntroductoryConcepts.pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
composite construction of structures.pdf
OOP with Java - Java Introduction (Basics)

Ccna routing and_switching_chapter-1-2-3_mme

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 1:Exploring the Network Introduction to Networks Chapter 2:Configuring a Network OS Chapter 3:Network Protocols and Communications Mohammad Mamun Elahi Assistant Professor, Department of CSE Instructor, UIU Cisco Networking Academy
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Providing Resources in a Network Networks of Many Sizes
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Providing Resources in a Network Clients and Servers
  • 4. Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Providing Resources in a Network Peer-to-Peer
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs, WANs, and Internets Components of a Network There are three categories of network components:  Devices  Media  Services
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of a Network Network Media
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of a Network Network Representations
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of a Network Topology Diagrams
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs and WANs Types of Networks The two most common types of network infrastructures are:  Local Area Network (LAN)  Wide Area Network (WAN). Other types of networks include:  Metropolitan Area Network (MAN)  Wireless LAN (WLAN)  Storage Area Network (SAN)
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs and WANs Local Area Networks (LAN)
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs and WANs Wide Area Networks (WAN)
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs, WANs, and Internets The Internet
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential The Internet Intranet and Extranet
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs, WANs, and Internets Internet Access Technologies
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connecting to the Internet Connecting Remote Users to the Internet
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connecting to the Internet Connecting Businesses to the Internet
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Converged Networks The Converging Network
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Supporting Network Architecture As networks evolve, we are discovering that there are four basic characteristics that the underlying architectures need to address in order to meet user expectations:  Fault Tolerance  Scalability  Quality of Service (QoS)  Security
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Fault Tolerance in Circuit Switched Network
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Packet-Switched Networks
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Scalable Networks
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Providing (QoS) Examples of priority decisions for an organization might include:  Time-sensitive communication - increase priority for services like telephony or video distribution.  Non time-sensitive communication - decrease priority for web page retrieval or email.  High importance to organization - increase priority for production control or business transaction data.  Undesirable communication - decrease priority or block unwanted activity, like peer-to-peer file sharing or live entertainment
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Providing Network Security
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Trends Data Centers A data center is a facility used to house computer systems and associated components including:  Redundant data communications connections  High-speed virtual servers (sometimes referred to as server farms or server clusters)  Redundant storage systems (typically uses SAN technology)  Redundant or backup power supplies  Environmental controls (e.g., air conditioning, fire suppression)  Security devices
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Networking Technologies for the Home Technology Trends in the Home
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Networking Technologies for the Home Wireless Broadband
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Future of Networking Network Security
  • 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Security Security Threats The most common external threats to networks include:  Viruses, worms, and Trojan horses  Spyware and adware  Zero-day attacks, also called zero-hour attacks  Hacker attacks  Denial of service attacks  Data interception and theft  Identity theft
  • 29. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Security Security Solutions Network security components often include:  Antivirus and antispyware  Firewall filtering  Dedicated firewall systems  Access control lists (ACL)  Intrusion prevention systems (IPS)  Virtual Private Networks (VPNs)
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 2 2.1 IOS Bootcamp 2.2 Getting Basic 2.3 Address Schemes 2.4 Summary
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IOS Operating Systems All networking equipment dependent on operating systems  End users (PCs, laptops, smart phones, tablets)  Switches  Routers  Wireless access points  Firewalls Cisco Internetwork Operating System (IOS)  Collection of network operating systems used on Cisco devices
  • 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IOS Operating Systems
  • 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IOS Location of the Cisco IOS IOS stored in Flash  Non-volatile storage – not lost when power is lost  Can be changed or overwritten as needed  Can be used to store multiple versions of IOS  IOS copied from flash to volatile RAM  Quantity of flash and RAM memory determines IOS that can be used
  • 34. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IOS IOS Functions Major functions performed or enabled by Cisco routers and switches include:
  • 35. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Accessing a Cisco IOS Device Console Access Method Most common methods to access the Command Line Interface  Console  Telnet or SSH  AUX port
  • 36. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Accessing a Cisco IOS Device Console Access Method Console port  Device is accessible even if no networking services have been configured (out-of-band)  Need a special console cable  Allows configuration commands to be entered  Should be configured with passwords to prevent unauthorized access  Device should be located in a secure room so console port can not be easily accessed
  • 37. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Accessing a Cisco IOS Device Telnet, SSH, and AUX Access Methods Telnet  Method for remotely accessing the CLI over a network  Require active networking services and one active interface that is configured Secure Shell (SSH)  Remote login similar to Telnet but utilizes more security  Stronger password authentication  Uses encryption when transporting data Aux Port  Out-of-band connection  Uses telephone line  Can be used like console port
  • 38. Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Accessing a Cisco IOS Device Terminal Emulation Programs Software available for connecting to a networking device  PuTTY  Tera Term  SecureCRT  HyperTerminal  OS X Terminal
  • 39. Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Navigating the IOS Cisco IOS Modes of Operation
  • 40. Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Navigating the IOS Primary Modes
  • 41. Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Navigating the IOS Global Configuration Mode and Submodes
  • 42. Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Navigating the IOS Navigating between IOS Modes
  • 43. Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Navigating the IOS Navigating between IOS Modes (cont.)
  • 44. Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential The Command Structure IOS Command Structure
  • 45. Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential The Command Structure Context Sensitive Help
  • 46. Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential The Command Structure Command Syntax Check
  • 47. Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential The Command Structure Hot Keys and Shortcuts  Tab - Completes the remainder of a partially typed command or keyword  Ctrl-R - Redisplays a line  Ctrl-A – Moves cursor to the beginning of the line  Ctrl-Z - Exits configuration mode and returns to user EXEC  Down Arrow - Allows the user to scroll forward through former commands  Up Arrow - Allows the user to scroll backward through former commands  Ctrl-Shift-6 - Allows the user to interrupt an IOS process such as ping or traceroute.  Ctrl-C - Aborts the current command and exits the configuration mode
  • 48. Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential The Command Structure IOS Examination Commands
  • 49. Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential The Command Structure The show version Command
  • 50. Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Hostnames Why the Switch Let’s focus on  Creating a two PC network connected via a switch  Setting a name for the switch  Limiting access to the device configuration  Configuring banner messages  Saving the configuration
  • 51. Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Hostnames Device Names Some guidelines for naming conventions are that names should:  Start with a letter  Contain no spaces  End with a letter or digit  Use only letters, digits, and dashes  Be less than 64 characters in length Without names, network devices are difficult to identify for configuration purposes.
  • 52. Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Hostnames Hostnames Hostnames allow devices to be identified by network administrators over a network or the Internet.
  • 53. Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Hostnames Configuring Hostnames
  • 54. Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Limiting Access to Device Configurations Securing Device Access The passwords introduced here are:  Enable password - Limits access to the privileged EXEC mode  Enable secret - Encrypted, limits access to the privileged EXEC mode  Console password - Limits device access using the console connection  VTY password - Limits device access over Telnet Note: In most of the labs in this course, we will be using simple passwords such as cisco or class.
  • 55. Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Limiting Access to Device Configurations Securing Privileged EXEC Access  use the enable secret command, not the older enable password command  enable secret provides greater security because the password is encrypted
  • 56. Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Limiting Access to Device Configurations Securing User EXEC Access  Console port must be secured • reduces the chance of unauthorized personnel physically plugging a cable into the device and gaining device access  vty lines allow access to a Cisco device via Telnet • number of vty lines supported varies with the type of device and the IOS version
  • 57. Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Limiting Access to Device Configurations Encrypting Password Display service password- encryption  prevents passwords from showing up as plain text when viewing the configuration  purpose of this command is to keep unauthorized individuals from viewing passwords in the configuration file  once applied, removing the encryption service does not reverse the encryption
  • 58. Presentation_ID 58© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Limiting Access to Device Configurations Banner Messages  important part of the legal process in the event that someone is prosecuted for breaking into a device  wording that implies that a login is "welcome" or "invited" is not appropriate  often used for legal notification because it is displayed to all connected terminals
  • 59. Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Saving Configurations Configuration Files  Switch# reload System configuration has been modified. Save? [yes/no]: n Proceed with reload? [confirm]  Startup configuration is removed by using the erase startup-config Switch# erase startup-config  On a switch you must also issue the delete vlan.dat Switch# delete vlan.dat Delete filename [vlan.dat]? Delete flash:vlan.dat? [confirm]
  • 60. Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Saving Configurations Capturing Text
  • 61. Presentation_ID 61© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ports and Addresses IP Addressing in the Large  Each end device on a network must be configured with an IP address  Structure of an IPv4 address is called dotted decimal  IP address displayed in decimal notation, with four decimal numbers between 0 and 255  With the IP address, a subnet mask is also necessary  IP addresses can be assigned to both physical ports and virtual interfaces
  • 62. Presentation_ID 62© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ports and Addresses Interfaces and Ports  Network communications depend on end user device interfaces, networking device interfaces, and the cables that connect them  Types of network media include twisted-pair copper cables, fiber- optic cables, coaxial cables, or wireless  Different types of network media have different features and benefits  Ethernet is the most common local area network (LAN) technology  Ethernet ports are found on end user devices, switch devices, and other networking devices  Cisco IOS switches have physical ports for devices to connect to, but also have one or more switch virtual interfaces (SVIs - no physical hardware on the device associated with it; created in software)  SVI provides a means to remotely manage a switch over a network
  • 63. Presentation_ID 63© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Addressing Devices Configuring a Switch Virtual Interface  IP address - together with subnet mask, uniquely identifies end device on internetwork  Subnet mask - determines which part of a larger network is used by an IP address  interface VLAN 1 - interface configuration mode  ip address 192.168.10.2 255.255.255.0 - configures the IP address and subnet mask for the switch  no shutdown - administratively enables the interface  Switch still needs to have physical ports configured and VTY lines to enable remote management
  • 64. Presentation_ID 64© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Addressing Devices Manual IP Address Configuration for End Devices
  • 65. Presentation_ID 65© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Addressing Devices Automatic IP Address Configuration for End Devices
  • 66. Presentation_ID 66© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Addressing Devices IP Address Conflicts
  • 67. Presentation_ID 67© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verifying Connectivity Test the Loopback Address on an End Device
  • 68. Presentation_ID 68© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verifying Connectivity Testing the Interface Assignment
  • 69. Presentation_ID 69© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verifying Connectivity Testing End-to-End Connectivity
  • 70. Presentation_ID 70© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 3 3.1 Rules of Communication 3.2 Network Protocols and Standards 3.3 Moving Data in the Network 3.4 Summary
  • 71. Presentation_ID 71© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential The Rules What is Communication?
  • 72. Presentation_ID 72© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential The Rules Message Formatting and Encapsulation Example: Personal letter contains the following elements:  An identifier of the recipient  A salutation or greeting  The message content  A closing phrase  An identifier of the sender
  • 73. Presentation_ID 73© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential The Rules Message Delivery Options
  • 74. Presentation_ID 74© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Protocols Rules that Govern Communications
  • 75. Presentation_ID 75© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Protocols Network Protocols  How the message is formatted or structured  The process by which networking devices share information about pathways with other networks  How and when error and system messages are passed between devices  The setup and termination of data transfer sessions
  • 76. Presentation_ID 76© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Protocols Interaction of Protocols  Application Protocol – Hypertext Transfer Protocol (HTTP)  Transport Protocol – Transmission Control Protocol (TCP)  Internet Protocol – Internet Protocol (IP)  Network Access Protocols – Data Link & Physical layers
  • 77. Presentation_ID 77© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Protocol Suites Protocol Suites and Industry Standards
  • 78. Presentation_ID 78© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Protocol Suites TCP/IP Protocol Suite and Communication
  • 79. Presentation_ID 79© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reference Models The OSI Reference Model
  • 80. Presentation_ID 80© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reference Models The TCP/IP Reference Model
  • 81. Presentation_ID 81© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reference Models Comparing the OSI and TCP/IP Models
  • 82. Presentation_ID 82© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Encapsulation Communicating the Messages  Segmenting message benefits Different conversations can be interleaved Increased reliability of network communications  Segmenting message disadvantage Increased level of complexity
  • 83. Presentation_ID 83© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Encapsulation Protocol Data Units (PDUs)  Data  Segment  Packet  Frame  Bits
  • 84. Presentation_ID 84© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Encapsulation Encapsulation
  • 85. Presentation_ID 85© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Encapsulation De-encapsulation
  • 86. Presentation_ID 86© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Moving Data in the Network Accessing Local Resources
  • 87. Presentation_ID 87© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Accessing Local Resources Network Addresses & Data Link addresses  Network Address Source IP address Destination IP address  Data Link Address Source data link address Destination data link address
  • 88. Presentation_ID 88© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Accessing Local Resources Communicating with Device / Same Network
  • 89. Presentation_ID 89© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Accessing Local Resources MAC and IP Addresses PC1 192.168.1.110 AA-AA-AA-AA-AA-AA PC2 192.168.1.111 BB-BB-BB-BB-BB-BB FTP Server 192.168.1.9 CC-CC-CC-CC-CC-CC R1 192.168.1.1 11-11-11-11-11-11 ARP Request S1 R1
  • 90. Presentation_ID 90© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Accessing Remote Resources Default Gateway PC 1 192.168.1.110 AA-AA-AA-AA-AA-AA PC 2 192.168.1.111 BB-BB-BB-BB-BB-BB FTP Server 192.168.1.9 CC-CC-CC-CC-CC-CC R1 192.168.1.1 11-11-11-11-11-11 R2 172.16.1.99 22-22-22-22-22-22 Web Server 172.16.1.99 AB-CD-EF-12-34-56
  • 91. Presentation_ID 91© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Accessing Remote Resources Communicating Device / Remote Network
  • 92. Presentation_ID 92© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Accessing Remote Resources Using Wireshark to View Network Traffic
  • 93. Presentation_ID 93© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential