07-03-2011, 11:42 AM
Presented By:
Agam Jain
NETWORK & ITS TROUBLESHOOTING IN CCNA
training.ppt (Size: 3.97 MB / Downloads: 111)
CEG Industry Partners
Some features of CEG are:
• To promote interaction between the Government, Technical Institutes and the Industries.
• To provide conducive environment for learning by doing in colleges.
• To promote the dissemination of knowledge fostering the innovative thoughts of the Students.
• To empower students living in the rural areas so as to bridge the urban - Rural gap.
• To organize seminars and lectures of eminent professionals and scientists.
• To produce readily employable graduates by imparting industry grade skills.
• To produce industry ready IT professionals.
• To help in updating the Curriculum as per the needs of the Industries.
• To perform such other functions and to carry out such other duties as the society may deem proper or as may be assigned to it by the State Government from time to time
Aims and Objectives of CEG are:
• Campus Placement Mission (CPM)
• Campus Placement Related Skills (CPRS)
• Graduate Placement Mission (GPM)
• Training for Students
• Training for Faculty
Awards & Recognition
Awarded No.1 CISCO-Academy Of Whole Asia Region
Mr. Arvind Sharma Selected For Best Instructor In Asia
How Networks Impact Daily Life
The benefits of instantaneous communication and how it supports and improves our lives.
How Networks Impact Daily Life
The ways communication over a network changes the way we work
Network Architecture Characteristics
Basic measures to secure data networks
– Ensure confidentiality through use of
• User authentication
• Data encryption
– Maintain communication integrity through use of
• Digital signatures
– Ensure availability through use of
• Firewalls
• Redundant network
architecture
• Hardware without a single
point of failure
Network Structure
Network media and criteria for making a network media choice
Network media
this is the channel over which a message travels
Network Types
Define Local Area Networks (LANs)
- A network serving a home, building or campus is considered a Local Area Network (LAN)
Network Types
Define Wide Area Networks (WANs)
- LANs separated by geographic distance are connected by a network known as a Wide Area Network (WAN)
Network Types
Layers with TCP/IP and OSI Model
Compare OSI and TCP/IP model
Addressing and Naming Schemes
Explain how labels in encapsulation headers are used to manage communication in data networks
Addressing and Naming Schemes
Explain how labels in encapsulation headers are used to manage communication in data networks
SUBNETTING
IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network.
An IP address is a 32 bit binary number usually represented as 4 decimal values, each representing 8 bits
range 0 to 255 (known as octets)
Example:
140 .179 .220 .200 10001100.10110011.11011100.11001000
IPv4 Address
Default subnet masks
Class A - 255.0.0.0 11111111.00000000.00000000.00000000
Class B - 255.255.0.0 11111111.11111111.00000000.00000000
Class C - 255.255.255.0
11111111.11111111.11111111.00000000
Features, Operation, and Use of TCP/IP Application Layer Services
Describe the features of the DNS protocol and how this protocol supports DNS services
Features, Operation, and Use of TCP/IP Application Layer Services
Describe the features of the HTTP protocol and how this protocol supports the delivery of web pages to the client
Features, Operation, and Use of TCP/IP Application Layer Services
Describe the features of the POP and SMTP protocols, and how these protocols support e-mail services
Grouping Devices into Networks and Hierarchical Addressing
Describe the purpose of further subdividing networks into smaller networks
Types of Connections in a LAN
Identify the correct cable to use in connecting intermediate and end devices in a LAN.
Types of Connections in a LAN
Identify the pinout of the straight-through and cross-over cables
Role of Internetwork Operating System (IOS)
Define the purpose of startup config.
Role of Internetwork Operating System (IOS)
Identify the basic command structure for IOS commands
Role of Internetwork Operating System (IOS)
Use the CLI to access various IOS configuration modes on a device
Router as a Computer
Describe the basic purpose of a router
-Computers that specialize in sending packets over the data network. They are responsible for interconnecting networks by selecting the best path for a packet to travel and forwarding packets to their destination
Routers are the network center
-Routers generally have 2 connections:
-WAN connection (Connection to ISP)
-LAN connection
Router as a Computer
Router components and their functions”
CPU - Executes operating system instructions
Random access memory (RAM) - Contains the running copy of configuration file. Stores routing table. RAM contents lost when power is off
Read-only memory (ROM) - Holds diagnostic software used when router is powered up. Stores the router’s bootstrap program.
Non-volatile RAM (NVRAM) - Stores startup configuration. This may include IP addresses (Routing protocol, Hostname of router)
Flash memory - Contains the operating system (Cisco IOS)
Interfaces - There exist multiple physical interfaces that are used to connect network. Examples of interface types:
-Ethernet / fast Ethernet interfaces
-Serial interfaces
-Management interfaces
Router as a Computer
Router Interface is a physical connector that enables a router to send or receive packets
Each interface connects to a separate network
Consist of socket or jack found on the outside of a router
Types of router interfaces:
-Ethernet
-Fastethernet
-Serial
-DSL
-ISDN
-Cable
Routing Protocols
Best path
Most efficient route from one node to another
Dependent on:
Number of hops between nodes
Current network activity
Unavailable link
Network transmission speed
Topology
Determined by routing protocol
Routing Protocols (cont’d.)
Routing protocol
Router communication
Collects current network status data
Contribute to best path selection
Routing table creation
Router convergence time
Time router takes to recognize best path
Change or network outage event
Distinguishing feature
Overhead; burden on network to support routing protocol
Distance-Vector: RIP, RIPv2, BGP
Distance-vector routing protocols
Determine best route based on distance to destination
Factors
Hops, latency, network traffic conditions
RIP (Routing Information Protocol)
Only factors in number of hops between nodes
Limits 15 hops
Interior routing protocol
Slow and less secure
Distance-Vector: RIP, RIPv2, BGP (cont’d.)
RIPv2 (Routing Information Protocol Version 2)
Generates less broadcast traffic, more secure
Cannot exceed 15 hops
Less commonly used
BGP (Border Gateway Protocol)
Communicates using BGP-specific messages
Many factors determine best paths
Configurable to follow policies
Most complex (choice for Internet traffic)
Link-State: OSPF, IS-IS
Link-state routing protocol
Routers share information
Each router independently maps network, determines best path
OSPF (Open Shortest Path First)
Interior or border router use
No hop limit
Complex algorithm for determining best paths
Each OSPF router
Maintains database containing other routers’ links
Link-State: OSPF, IS-IS (cont’d.)
IS-IS (Intermediate System to Intermediate System)
Codified by ISO
Interior routers only
Less common than OSPF
Key Learnings
Conclusion