Cisco Certified Network Associate
By
Nikita Kaushal (0178EC091055)
!dustrial "rai!i!# Co$%leted at athe &C' Career eelo%$e!t Ce!ter* Bho%al as Co$%ulsory +e,uire$e!t for the de#ree of Bachelor of E!#i!eeri!# (Electro!ics a!d Co$$u!icatio! E!#i!eeri!#)
-u!e 01* .01. to -u!e /0* .01. e%art$e!t of Electro!ics a!d Co$$u!icatio! E!#i!eeri!# -ai Narai! Colle#e of "ech!olo#y cie!ce Bho%al (2343)
N"+A' "+ANN6 +E4+".01/ -ai Narai! Colle#e of "ech!olo#y cie!ce* Bho%al 13N a$eoftude!t
NikitaKaushal
.3 !iersityNu$:er
0178EC091055
/3 Na$e of "rai!i!# 4lace (!dustry !stitutio!* 6 ot3 e%art$e!t* e tc)
;3 Address of "rai!i!# 4lace with "ele%ho!e No3 a!d E$ail
53 Na$e a!d esi#!atio! of "rai!i!# !char#e (!der who$ trai!i!# wasco$%leted)
>3
"rai!i!# 4eriod
73 "rai!i!#u:@ect
&C' CC
1;/ <NE 1 24 NA6A+ * B&4A' 0755 ;09;85.
A2"&+=A"A=
-u!e 01 ? -u!e /0* .01.
CCNA
EC'A+A"N
"he !dustrial "rai!i!# o! Cisco Certified !etwork associate (CCNA) at the &C' CC* Bho%al duri!# -u!e 01* .01. to -u!e /0* .01. was co$%leted :y the u!dersi#!ed3 uri!# this %eriod* was tau#ht a:out the CCNA :y a! e%ert faculty a!d allowed to %ractice o! co$%uter with other software related to desi#!3 i!ally was #ie! a @o: for %re%ari!# a co$%lete !etworki!# 3 "hus* co$%leted the trai!i!# successfully3
333333333333333 4rofA 3 $itawaskade "rai!i!# !char#e
3 NikitaKaushal (0178EC091055)
ACKND'E6E2EN"
I feel profound to attend my major training in CCNA in HCL CDC under the guidance of Mr. Amit Shrivastav ho taught us netor!ing and relevant things. He has also given us a "rief !noledge in the training and also discuss various information to enhance our !noledge. I ould li!e to than!s my training incharge #rof. Amit Saas!ade for guiding me at the time of training and "oosting up re$uired !noledge for training time to time. I ould greatly inde"ted to #rof. Asho! Agraal% Head% Department of &lectronics and Communication &ngineering for his !een interest in this or! and time to time guidance% encouragement and providing re$uired faciliti es for training . 'e are grateful to Dr. Meghna Du"ey% #rincipal% (NC)S for his guidance and critical comments hich improved the $uality of this report. )han!s are due to Dr. * D Shu!la% Director% (NC)S for providing necessary help and time to time necessary guidance in completion of this tas!. )hen other faculty mem"ers% friends% etc% may "e added accordingly in the ac!noledgement to hich the students ant to ac!noledge for their help and guidance in the training.
Nikita Kaushal
13 N"+C"N
As the training arm of HCL Infosystems% HCL Career Development Centre +CDC, carries forth a legacy of e-cellence spanning across more than three decades. HCL CDC is an initiative that ena"les individuals and organiations to "enefit from HCL/s deep e-pertise in the I) space. Among the fastest groing I) education "rands in India% HCL CDC offers a complete spectrum of $uality training programs on softare% hardare% netor!ing as ell as glo"al certifications in association ith leading I) organiations orldide. &mpoered ith strategic alliances ith leading I) organiations in India and a"road% HCL CDC training solutions cater to diverse consumer profiles including individuals% enterprises% academic institutions and 0overnment enterprises. As the fountainhead of the most significant pursuit of human mind +I),% HCL strongly "elieves% 12nly a Leader can transform you into a Leader1. HCL CDC is a formaliation of this e-perience and credo hich has "een perfected over three decades.
=N 1)ogether e create the enterprises of tomorro1.
2N 1)o provide orld3class information technology solutions and services in order to ena"le our customers to serve their customers "etter1.
B-EC"=E 1)o fuel initiative and foster activity "y alloing individuals freedom of action and innovation in attaining defined o"jectives.1
4E4'E B-EC"=E 1)o help people in HCL Infosystems Ltd. share in the company/s successes% hich they ma!e possi"le4 to provide jo" security "ased on their performance4 to recognie their individual achievements4 and help them gain a sense of satisfaction and accomplishment from their or!.1
C+E =AE • • • •
'e shall uphold the dignity of the individual. 'e shall honor all co mmitments. 'e shall "e committed to 5uality% Innovation and 0roth in ever y endeavour. 'e shall "e responsi"le corporate citiens
6 A netor! is a system that transmits any com"ination of voice% video and7or data"eteen users. )he main field on hich e ere or!ing as netor!ing and the course as CCNA hich includes all the parts of netor!ing.
In a typical LAN% there are various types of netor! devices availa"le as outlined "elo. •
•
•
•
•
•
•
&u: 8epeat signals received on each port "y "roadcasting to all the other connected ports. +e%eaters 9sed to connect to or more &thernet segments of any media type% and to provide signal amplification for a segment to "e e-tended. In a netor! that uses repeater% all mem"ers are contending for transmission of data onto a single netor!. 'e li!e to call this single netor! a collision domain. &ffectively% every user can only enjoy a percentage of the availa"le "andidth. &thernet is su"ject to the 1:3;3<1 rule regarding repeater placement% meaning e can only have five segments connected using four repeaters ith only three segments capa"le of accommodating hosts. Brid#e A layer = device used to connect different netor!s types or netor!s of the same type. It maps the &thernet addresses of the nodes residing on each segment and allos only the necessary traffic to pass through the "ridge. #ac!et destined to the same segment is dropped. )his 1store3and3forard1 mechanism inspects the hole &thernet pac!et "efore ma!ing a decision. 9nfortunately% it cannot filter out "roadcast traffic. Also% it introduces a => to <> percent latency hen processing the frame. 2nly = netor!s can "e lin!ed ith a "ridge. witch Can lin! up four% si-% eight or even more netor!s. Cut3through sitches run faster "ecause hen a pac!et comes in% it forards it right after loo!ing at the destination address only. A store3and3forard sitch inspects the entire pac!et "efore forarding. Most sitches cannot stop "roadcast traffic. Sitches are layer = devices. +outers Can filter out netor! traffic also. Hoever% they filter "ased on the protocol addresses defined in 2SI layer <+the netor! layer,% not "ased on the &thernet pac!et addresses. Note that protocols must "e routa"le in order to pass through the routers. A router can determine the most efficient path for a pac!et to ta!e and send pac!ets around failed segments. Brouter Has the "est features of "oth routers and "ridges in that it can "e configured to pass the unrouta"le protocols "y imitating a "ridge% hile not passing "roadcast storms "y acting as a router for other protocols. 6ateway 2ften used as a connection to a mainframe or the internet. 0ateays ena"le communications "eteen different protocols% data types and environments. )his is achieved via protocol conversion% here"y the gateay strips the protocol stac! off of the pac!et and adds the appropriate stac! for the other side. 0ateays operate at all layers of
the 2SI model ithout ma!ing any forarding decisions.
= 'or! assigned as? •
)o design a coa-ial ca"le and tisted ca"le.
•
)o design a LAN.
•
)o design a 'AN.
•
)o design a MAN.
•
)o program router.
•
)o design netor!.
•
)o "rea! passord of router and sitches.
A computer netor! is a connection of to or more computers through a ca"le or ireless connection. Computer netor! ena"le computer users to share hardare% resources and information. Aside sharing information% the computer netor! ena"les users to share internet access. )he importance of netor!ing to or more computers can not "e overemphasied. Netor!ing in computer is unavoida"le. 'e need netor!s in most things e do in life. I onder hat the orld of computer ill "e ithout computer netor!s. In computing% netor!ing is a ay of connecting to or more computers together. 'hen you netor! computers together% the computers can share information and resources ith one another. Netor!ing is a very vital and delicate area in computing. 'e can not really $uantify the importance of netor!ing to or more #C. Computer netor! is very important for every "usiness% no matter ho small a "usiness may "e. Computer netor! helps in sharing resources. 'ith computer netor!% so many computers can share one printer% scanner and some other hardare% hich might "e e-pensive for a company to ac$uire for every computer user. It is $uite o"vious that computer netor! helps to save cost for an organiation. Instead of "uying all hardare for each computer% one can just share one via the computer netor! In addition to this% let us just thin! of additional space that ill "e occupied "y providing printers or scanners for each of the computers in an organiation. Netor!ing to or more computer not only saves money "ut also saves space. )his in addition ma!es the user/s environment friendly. Do e ignore the communication aspect@ No Netor!ing enhances effective communication among mem"ers of an organiation or a company. 'ith appropriate softare% each computer user can communicate ith other mem"ers or staff of an organiation or company. In addition to this%
Computer netor! gives users the opportunity to use remote programs and remote data"ases either of the same organiation or from other enterprises or pu"lic sources. )he importance of having a computer netor!s are really numerous. <. )hus% it is a necessity for every organiation or company. It ma!es effective communication possi"le and helps to eliminate unnecessary aste of time and duplication or resources. )he desire result as o"tain in every e-periments and or! as a result e made a successful netor! capa"le of strong communications. A netor! engineer handles all of the Bplum"ing for a companys computers% connecting offices ith )6 lines% hoo!ing them up to the Internet% and configuring all internal systems such as net routers and firealls. )his as very interesting field and e covered a su"ject !no as Data Communication and Netor! hich e have studied in Eth sem.
;.
.3 "+ANN6 Netor!ing are Connection3oriented1 and 1Connectionless1 communications. .
A connection oriented communication has the folloing characteristics? •
A session is guaranteed.
•
Ac!noledgements are issued and received at the transport layer% meaning if the sender does not receive an ac!noledgement "efore the timer e-pires% the pac!et is retransmitted.
•
#hrases in a connection3oriented service involves Call Setup% Data transfer and Call termination.
•
All traffic must travel along the same static path.
•
A failure along the static communication path can fail the connection.
•
A guaranteed rate of throughput occupies resources ithout the fle-i"ility of dynamic allocation.
•
8elia"le F SL2' +this is alays the case in netor!ing,.
In contrast% a connectionless communication has the folloing characteristics? •
2ften used for voice and video applications.
•
N2 guarantee nor ac!noledgement.
•
Dynamic path selection.
•
Dynamic "andidth allocation.
•
9nrelia"le F GAS).
•
)he layer hich is important for netor!ing are
.31 2odel )he 2SI model is a layered model and a conceptual standard used for defining standards to promote multi3vendor integration as ell as maintain constant interfaces and isolate changes of implementation to a single layer. It is N2) application or protocol specific. In order to pass any Cisco e-am% you need to !no the 2SI model inside and out.
)he 2SI Model consists of layers as follos?
:. 'ayer
escri%tio!
eice
4rotocol
Application
#rovides netor! access for applications% flo control and error recovery. #rovides communications services to applications "y identifying and esta"lishing the availa"ility of other computers as ell as to determine if sufficient resources e-ist for communication purposes.
0ateay
#resentation
#erforms protocol conversion% encryption and data compression
0ateay and NC#% AG#% redirectors )DI
Allos = applications to communicate over a netor! "y opening a session and synchroniing the involved computers. Handles connection
0ateay
Session
esta"lishment% data transfer and connection release
NC#% SM*% SM)#% G)#% SNM#% )elnet% Appletal!
Net*ios
)ransport
8epac!ages messages into smaller formats% provides error free delivery and error handling functions
0ateay
Net*&9I% )C#% S#% and N'Lin!
Netor!
Handles addressing% translates logical addresses and names to physical addresses% routing and traffic management.
8outer and "router
I#% I#% N'Lin!% Net*&9I
#ac!ages ra "its into frames ma!ing it transmita"le across a netor! lin! and includes a cyclical redundancy chec!+C8C,. It consists of the LLC su"layer and the MAC su"layer. )he MAC su"layer is important to remem"er% as it is Sitch% responsi"le for appending the MAC address of JJData Lin! the ne-t hop to the frame header. 2n the contrary% "ridge and "router
None
LLC su"layer uses Destination Service Access #oints and Source Service Access #oints to create lin!s for the MAC su"layers.
#hysical
#hysical layer or!s ith the physical media for transmitting and receiving data "its via certain encoding schemes. It also includes specifications for certain mechanical connection features% such as the adaptor connector.
Multiple-er and repeater
None
)a"le =.63 2SI Model
Here is an easy ay to memorie the order of the layers? All 4eople eem "o Need ata 4rocessing. )he first letter of each ord corresponds to the first letter of one of the layers. It is a little corny% "ut it or!s. )he ta"le a"ove mentions the term 1MAC Address1. A MAC address is a ;K "it address for uni$uely identifying devices on the netor!. Something li!es >>3>>36=3<<3GA3*C% e call this
ay of presenting the address a 6= he-adecimal digits format. )he first E digits specify the manufacture% hile the remainders are for the host itself. )he A8# #rotocol is used to determine the I# to MAC mapping. And of course% MAC addresses cannot "e duplicated in the netor! or pro"lems ill occur. Gor more information a"out A8# and related protocols% read 0uide )o A8#% IA8#% 8A8#% and #ro-y A8#. Data encapsulation ta!es place in the 2SI model. It is the process in hich the information in a protocol is rapped in the data section of another protocol. )he process can "e "ro!en don into the folloing steps? 9ser information 3 data 3 segments 3 pac!ets7datagrams 3 frames 3 "its.
.
'hen discussing the 2SI model it is important to !eep in mind the differences "eteen 1Connection3oriented1 and 1Connectionless1 communications. A connection oriented communication has the folloing characteristics? •
•
•
A session is guaranteed. Ac!noledgements are issued and received at the transport layer% meaning if the sender does not receive an ac!noledgement "efore the timer e-pires% the pac!et is retransmitted. #hrases in a connection3oriented service involve Call Setup% Data transfer and Call termination.
•
All traffic must travel along the same static path.
•
A failure along the static communication path can fail the connection.
•
•
A guaranteed rate of throughput occupies resources ithout the fle-i"ility of dynamic allocation. 8elia"le F SL2' +this is alays the case in netor!ing,.
In contrast% a connectionless communication has the folloing characteristics? •
2ften used for voice and video applications.
•
Neither guarantee nor ac!noledgement.
•
Dynamic path selection.
•
Dynamic "andidth allocation.
•
9nrelia"le F GAS).
A computer netor!% or simply a netor!% is a collection of computers and other hardare components interconnected "y communication channels that allo sharing of resources and information. 'here at least one process in one device is a"le to send7receive data to7from at least one process residing in a remote device% then the to devices are said to "e in a netor!. Simply% more than one computer interconnected through a communication medium for information interchange is called a computer netor!. Netor!s may "e classified according to a ide variety of characteristics% such as the medium used to transport the data% communications protocol used% scale% topology% and organiational scope. Communications protocols define the rules and data formats for e-changing information in a computer netor!% and provide the "asis for netor! programming. 'ell3!non communications protocols include &thernet% a hardare and lin! layer standard that is u"i$uitous in local area netor!s% and the Internet protocol suite% hich defines a set of protocols for internetor!ing% i.e. for data communication "eteen multiple netor!s% as ell as host3to3host data transfer% and application3specific data transmission formats. K. .3. Co$%uter !etworki!#
Computer netor!ing is sometimes considered a su"3discipline of electrical engineering% telecommunications% computer science% information technology or computer engineering% since it relies upon the theoretical and practical application of these disciplines
.3131 'ocal area !etwork A local area netor! +LAN, is a netor! that connects computers and devices in a limited geographical area such as home% school% computer la"oratory% office "uilding% or closely positioned group of "uildings. &ach computer or device on the netor! is a node. Current ired LANs are most li!ely to "e "ased on &thernet technology% although ne standards li!e I)93) 0.hn also provide a ay to create a ired LAN using e-isting home ires +coa-ial ca"les% phone lines and poer lines,
Gig =.63 LAN )ypical li"rary netor!% in a "ranching tree topology and controlled access to resources. A sample LAN is depicted in the accompanying diagram. All interconnected devices must understand the netor! layer +layer <,% "ecause they are handling multiple su"nets +the different colors,. )hose inside the li"rary% hich have only 6>76>> M"it7s &thernet connections to the user device and a 0iga"it &thernet connection to the central router% could "e called 1layer < sitches1 "ecause they only have &thernet interfaces and must understand I#. It ould "e more correct to call them access routers% here the router at the top is a distri"ution router that connects to the Internet and academic netor!s/ customer access routers. . )he defining characteristics of LANs% in contrast to 'ANs +'ide Area Netor!s,% include their higher data transfer rates% smaller geographic range and no need for leased telecommunication lines. Current &thernet or other I&&& K>=.< LAN technologies operate at data transfer rates up to 6> 0"it7s. I&&& has projects investigating the standardiation of ;> and 6>> 0"it7s. LANs can "e connected to 'ide area netor! "y using routers.
.3.3. &o$e area !etwork A home area netor! +HAN, is a residential LAN hich is used for communication "eteen digital devices typically deployed in the home% usually a small num"er of personal computers and accessories% such as printers mo"ile computing devices. An important function is the sharing of Internet access% often aand "road"and service through a ca"le ) or Digital Su"scri"er Line +DSL, provider.
.3.3/ tora#e area !etwork A storage area netor! +SAN, is a dedicated netor! that provides access to consolidated% "loc! level data storage. SANs are primarily used to ma!e storage devices% such as dis! arrays% tape li"raries% and optical ju!e"o-es% accessi"le to servers so that the devices appear li!e locally attached devices to the operating system. A SAN typically has its on netor! of storage devices that are generally not accessi"le through the local area netor! "y other devices. )he cost and comple-ity of SANs dropped in the early =>>>s to levels alloing ider adoption across "oth enterprise and small to medium sied "usiness environments.
.3.3; Ca$%us area !etwork A campus area netor! +CAN, is a computer netor! made up of an interconnection of LANs ithin a limited geographical area. )he netor!ing e$uipment +sitches% routers, and transmission media +optical fi"er% copper plant% Cat: ca"ling etc., are almost entirely oned +"y the campus tenant 7 oner? an enterprise% university% government etc.,. In the case of a university campus3"ased campus netor!% the netor! is li!ely to lin! a variety of campus "uildings including% for e-ample% academic colleges or departments% the university li"rary% and student residence halls.
.3.35 Back:o!e !etwork A "ac!"one netor! is part of a computer netor! infrastructure that interconnects various pieces of netor!% providing a path for the e-change of information "eteen different LANs or su"netor!s. A "ac!"one can tie together diverse netor!s in the same "uilding% in different "uildings in a campus environment% or over ide areas. Normally% the "ac!"one/s capacity is greater than that of the netor!s connected to it.
6>.
A large corporation hich has many locations may have a "ac!"one netor! that ties all of these locations together% for e-ample% if a server cluster needs to "e accessed "y different departments of a company hich are located at different geographical locations. )he e$uipment hich ties these departments together constitute the netor! "ac!"one. Netor! performance management including netor! congestion are critical parameters ta!en into account hen designing a netor! "ac!"one. A specific case of a "ac!"one netor! is the Internet "ac!"one% hich is the set of ide3area netor! connections and core routers that interconnect all netor!s connected to the Internet.
.3.3> 2etro%olita! area !etwork
A Metropolitan area netor! +MAN, is a large computer netor! that usually spans a city or a large campus.
O
Gig =.=3Sample N made of Grame relay 'AN connections and dialup remote access.
66.
Gig=.<3Sample #N used to interconnect < offices and remote users
.3.37 Dide area !etwork A ide area netor! +'AN, is a computer netor! that covers a large geographic area such as a city% country% or spans even intercontinental distances% using a communications channel that com"ines many types of media such as telephone lines% ca"les% and air aves. A 'AN often uses transmission facilities provided "y common carriers% such as telephone companies. 'AN technologies generally function at the loer three layers of the 2SI reference model? the physical layer% the data lin! layer % and the netor! layer.
.3.38 E!ter%rise %riate !etwork An enterprise private netor! is a netor! "uilt "y an enterprise to interconnect various company sites% e.g.% production sites% head offices% remote offices% shops% in order to share computer resources.
.3.39 =irtual %riate !etwork A virtual private netor! +#N, is a computer netor! in hich some of the lin!s "eteen nodes are carried "y open connections or virtual circuits in some larger netor! +e.g.% the Internet, instead of "y physical ires. )he data lin! layer protocols of the virtual netor! are said to "e tunneled through the larger netor! hen this is the case. 2ne common application is secure communications through the pu"lic Internet% "ut a #N need not have e-plicit security features% such as authentication or content encryption. #Ns% for e-ample% can "e used to separate the traffic of different user communities over an underlying netor! ith strong security features.#N may have "est3effort performance% or may have a defined service level agreement +SLA, "eteen the #N customer and the #N service provider. 0enerally% a #N has a topology more comple- than point3to3point. 6=.
.3.310 =irtual Network Not to "e confused ith a irtual #rivate Netor!% a irtual Netor! defines data traffic flos "eteen virtual machines ithin a hypervisor in a virtual computing environment. irtual Netor!s may employ virtual security sitches% virtual routers% virtual firealls and other virtual netor!ing devices to direct and secure data traffic.
.3.311 !ter!etwork An internetor! is the connection of multiple computer netor!s via a common routing technology using routers. )he Internet is an aggregation of many connected internetor!s spanning the &arth. .3/ "C44
)he )ransmission Control #rotocol +)C#, is one of the core protocols of the Internet #rotocol Suite. )C# is one of the to srcinal components of the suite% complementing the Internet #rotocol +I#,% and therefore the entire suite is commonly referred to as )C#7I#. )C# provides relia"le% ordered delivery of a stream of octets from a program on one computer to another program on another computer. )C# is the protocol used "y major Internet applications such as the 'orld 'ide 'e"% email% remote administration and file transfer. 2ther applications% hich do not re$uire relia"le data stream service% may use the 9ser Datagram #rotocol +9D#,% hich provides a datagram service that emphasies reduced latency over relia"ility. )he Internet protocol suite is the set of communications protocols used for the Internet and similar netor!s% and generally the most popular protocol stac! for ide area netor!s. It is commonly !non as )C#7I#% "ecause of its most important protocols? )ransmission Control #rotocol +)C#, and Internet #rotocol +I#,% hich ere the first netor!ing protocols defined in this standard. It is occasionally !non as the DoD model due to the foundational influence of the A8#AN&) in the 6>s +operated "y DA8#A% an agency of the 9nited States Department of Defense,. )C#7I# provides end3to3end connectivity specifying ho data should "e formatted% addressed% transmitted% routed and received at the destination. It has four a"straction layers% each ith its on protocols. Grom loest to highest% the layers are? •
)he lin! layer +commonly &thernet, contains communication technologies for a local netor!.
•
)he internet layer +I#, connects local netor!s% thus esta"lishing internetor!ing.
•
)he transport layer +)C#, handles host3to3host communication.
•
)he application layer +for e-ample H))#, contains all protocols for specific data communications services on a process3to3process level +for e-ample ho a e" "roser communicates ith a e" server,. 6<.
•
)he )C#7I# model and related protocols are maintained "y the Internet &ngineering )as! Gorce +I&)G,.
Gig =.;3 )C#7I#
)he term logy used in netor! for netor!ing are as follos?
6;.
.3; +"N6 )here are = main types of routing% hich are static and dynamic% the third type of routing is called Hy"rid. Static routing involves the cum"ersome process of manually configuring and maintaining route ta"les "y an administrator. Dynamic routing ena"les routers to 1tal!1 to each
other and automatically update their routing ta"les. )his process occurs through the use of "roadcasts. Ne-t is an e-planation of the various routing protocols.
.35 +4 8outing Information #rotocol+8I#, is a distance vector dynamic routing protocol. 8I# measures the distance from source to destination "y counting the num"er of hops+routers or gateays, that the pac!ets must travel over. 8I# sets a ma-imum of 6: hops and considers any larger num"er of hops unreacha"le. 8I#/s real advantage is that if there are multiple possi"le paths to a particular destination and the appropriate entries e-ist in the routing ta"le% it ill choose the shortest route. 8outers can tal! to each other% hoever% in the real routing orld% there are so many different routing technologies availa"le% that it is not as simple as just ena"ling 8outing Information #rotocol +8I#,.
.35 4 2pen Shortest #ath Girst +2S#G, is a lin!3state routing protocol that converges faster than a distance vector protocol such as 8I#. 'hat is convergence@ )his is the time re$uired for all routers to complete "uilding the routing ta"les. 8I# uses tic!s and hop counts as measurement% hile 2S#G also uses metrics that ta!es "andidth and netor! congestion into ma!ing routing decisions. 8I# transmits updates every <> seconds% hile 2S#G transmits updates only hen there is a topology change. 2S#G "uilds a complete topology of the hole netor!% hile 8I# uses second handed information from the neigh"oring routers. )o summarie% 8I# is easier to configure% and is suita"le for smaller netor!s. In contrast% 2S#G re$uires high processing poer% and is suita"le if scala"ility is the main concern. 'e can tune the netor! "y adjusting various timers. Areas that are tuna"le include? the rate at hich routing updates are sent% the interval of time after hich a route is declared invalid% the interval during hich routing information regarding "etter paths is suppressed% the amount of time that must pass "efore a route is removed from the routing ta"le% and the amount of time for hich routing updates ill "e postponed. 2f course% different setting is needed in different situation. In any case% e can use the 1sho ip route1 command to display the contents of routing ta"le as ell as ho the route as discovered. 6:.
.3> 6+4 a!d E6+4
8I# and 2S#G are considered 1open1% hile I08# and &I08# are Cisco proprietary. Interior 0ateay 8outing #rotocol+I08#, is a distance vector routing protocol for the interior netor!s% hile &nhanced Interior 0ateay 8outing #rotocol +&I08#, is a hy"rid that com"ines distance vector and lin!3state technologies. Do not confuse these ith NLS#. Lin! Services #rotocol +NLS#, is a proprietary lin!3state routing protocol used on Novell Net'are ;. to replace SA# and 8I#. Gor I08#% the metric is a function of "andidth% relia"ility% delay and load. 2ne of the characteristics of I08# is the deployment of hold don timers. A hold3don timer has a value of =K> seconds. It is used to prevent routing loops hile router ta"les converge "y preventing routers from "roadcasting another route to a router hich is off3line "efore all routing ta"les converge. Gor &I08#% separate routing ta"les are maintained for I#% I# and Apple)al! protocols. Hoever% routing update information is still forarded ith a single protocol.
.37 witch A netor! sitch or sitching hu" is a computer netor!ing device that connects netor! segments or netor! devices. )he term commonly refers to a multi3port netor! "ridge that processes and routes data at the data lin! layer +layer =, of the 2SI model. Sitches that additionally process data at the netor! layer +layer <, and a"ove are often referred to as layer-3 switches or multilayer sitches. A sitch is a telecommunication device hich receives a message from any device connected to it and then transmits the message only to the device for hich the message as meant. )his ma!es the sitch a more intelligent device than a hu" +hich receives a message and then transmits it to all the other devices on its netor!,. )he netor! sitch plays an integral part in most modern &thernet local area netor!s +LANs,. Mid3to3large sied LANs contain a num"er of lin!ed managed sitches. Small office7home office +S2H2, applications typically use a single sitch% or an all3purpose converged device such as a residential gateay to access small office7home "road"and services such as DSL or ca"le Internet. In most of these cases% the end3 user device contains a router and components that interface to the particular physical "road"and technology
6E.
Gig =.;3 Shoing the Sitch I# Address
6. <. "C2E "+ANN6 D+K A6N2EN" 1
:@ectie Descri"e the features and operation of static routing.
Gig <.63 8outer+a,
6K.
Gig <.=3router+",
6.
Gig <.<3Static routering
Gig <.;3 8outing #rotocol =>. Static routing is a concept descri"ing one ay of configuring path selection of routers in computer netor!s. It is the type of routing characteried "y the a"sence of communication "eteen routers regarding the current topology of the netor!. )his is achieved "y manually adding routes to the routing ta"le. )he opposite of static routing is dynamic routing% sometimes also referred to as adaptive routing.
In these systems% routes through a data netor! are descri"ed "y fi-ed paths +statically,. )hese routes are usually entered into the router "y the system administrator. An entire netor! can "e configured using static routes% "ut this type of configuration is not fault tolerant. 'hen there is a change in the netor! or a failure occurs "eteen to statically defined nodes% traffic ill not "e rerouted. )his means that anything that ishes to ta!e an affected path ill either have to ait for the failure to "e repaired or the static route to "e updated "y the administrator "efore restarting its journey. Most re$uests ill time out +ultimately failing, "efore these repairs can "e made. )here are% hoever% times hen static routes can improve the performance of a netor!. Some of these include stu" netor!s and default routes.
=6. D+K A6N2EN" .
:@ectie
Start a router and recognie the normal "oot se$uence.
Gig <.:3*ootup output from router.
==.
Gig <.E3Initial configuration dialog
Gig <.3 Setup Initial 0lo"al #arameters =<.
Gig <.K3 Setup Initial #rotocol Configurations
Gig <.3 Setup Script 8evie and 9se
=;.
Gig <.6>3 login to router
=:. D+K A6N2EN" /
:@ectie
Complete the initial device configuration% given a functioning router and Configure I# addresses and I# su"net mas!s on router interfaces% given a functioning router.
Gig <.663 8outer Module
=E.
Gig <.6=3 Configuring router identification.
Gig <.6=3Configurating a 8outer #assord =K.
Co!sole li!e co$$a!d
4riate co!trol sessio! ti$eout
Co!fi#uri!# a erial !terface
=.
E!a:li!# a!d disa:li!# a! i!terface
!troduci!# 4 Addresses
Gig <.6<3I# Addresses
<>.
4 Addressi!#
4 Address classes
<6.
Gig <.6;3 Host addressing
Gig <.6:3 Addressing ithout su"net <=.
Gig <.6E3 Addressing ith su"net
Gig <.63 Su"net Addressing
<<.
u:!et 2ask
<;. D+K A6N2EN" ;
:@ectie Descri"e the features and operation of &I08#
Gig <.6K3&I08#
Gig <.63 )erminology &I08#
<:.
Co!fi#uratio! E64+
Gig <.=>3&I0#8 Configuration
:@ectie Descri"e the features and operation of I08#.
Gig <.=63 I08#
Co!fi#uratio! 6+4
<.
Gig <.==3I08# Configuration
:@ectie
Descri"e the features and operation of 2S#G.
Gig <.=<3 2S#G
<.
Gig<.=;3Shortest path algorithm
Co!fi#uratio! 4
;>.
Gig <.=:3 2S#G Configuration
;6. D+K A6N2EN" 7
:@ectie
Descri"e the features and operation of 8I#
Gig <.=E3 8I#
;=.
4 +outi!# Co!fi#uratio! "ask
Gig <.=3 8outing Configuration.
y!a$ic +outi!# Co!fi#uratio!
+4 Co!fi#uratio!
;<.
P
Gig <.=K3 8I# Configuration
;;. )he a"ove or! done "y us under different classes and the folloing or! done in softare ere an artificial netor! as esta"lish. )he or! allotted as done successful ith desired results and hence % the training as "eneficial.
;:.