Ccna1v3 mod10


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Ccna1v3 mod10

  1. 1. CCNA 1 v3.0 Module 10Routing Fundamentals andSubnets
  2. 2. Purpose of This PowerPoint This PowerPoint primarily consists of the Target Indicators (TIs) of this module in CCNA version 3.0. It was created to give instructors a PowerPoint to take and modify as their own. This PowerPoint is:  NOT a study guide for the module final assessment.  NOT a study guide for the CCNA certification exam. Please report any mistakes you find in this PowerPoint by using the Academy Connection Help link.
  3. 3. To Locate Instructional ResourceMaterials on Academy Connection: Go to the Community FTP Center to locate materials created by the instructor community Go to the Tools section Go to the Alpha Preview section Go to the Community link under Resources See the resources available on the Class home page for classes you are offering Search Contact your parent academy!
  4. 4. Objectives Routed protocol IP routing protocols The mechanics of subnetting
  5. 5. Routed Protocol
  6. 6. Routable and RoutedProtocolsA routed protocol allows the router to forwarddata between nodes on different networks.In order for a protocol to be routable, it mustprovide the ability to assign a network numberand a host number to each individual device.These protocols also require a network maskin order to differentiate the two numbers.The reason that a network mask is used is toallow groups of sequential IP addresses to betreated as a single unit.
  7. 7. IP as a Routed ProtocolIP is aconnectionless,unreliable, best-effortdelivery protocol.As information flowsdown the layers of theOSI model; the datais processed at eachlayer.IP accepts whateverdata is passed downto it from the upperlayers.
  8. 8. Packet Propagation andSwitching Within a Router
  9. 9. Packet Propagation andSwitching Within a RouterAs a frame is received at a router interface.The MAC address is checked to see if theframe is directly addressed to the routerinterface, or a broadcast.The frame header and trailer are removedand the packet is passed up to Layer 3.The destination IP address is compared tothe routing table to find a match.The packet is switched to the outgoinginterface and given the proper frame header.The frame is then transmitted.
  10. 10. Internet Protocol (IP): ConnectionlessThe Internet is a gigantic, connectionless networkin which all packet deliveries are handled by IP.TCP adds Layer 4, connection-oriented reliabilityservices to IP.
  11. 11. Telephone Calls: Connection-orientedA connection is established between thesender and the recipient before any data istransferred.
  12. 12. Anatomy of an IP PacketWhile the IP source and destinationaddresses are important, the other headerfields have made IP very flexible.The header fields are the information thatis provided to the upper layer protocolsdefining the data in the packet.
  13. 13. IP Routing Protocols
  14. 14. Routing OverviewA router is a network layer device that uses one ormore routing metrics to determine the optimal path.Routing metrics are values used in determining theadvantage of one route over another.Routing protocols use various combinations ofmetrics for determining the best path for data.
  15. 15. Routing Versus SwitchingThis distinction is routing and switchinguse different information in the process ofmoving data from source to destination.
  16. 16. Routing Versus Switching
  17. 17. Routed Versus RoutingA routed protocol:  Includes any network protocol suite that provides enough information in its network layer address to allow a router to forward it to the next device and ultimately to its destination.  Defines the format and use of the fields within a packet.A routing protocol:  Provides processes for sharing route information.  Allows routers to communicate with other routers to update and maintain the routing tables.
  18. 18. Path DeterminationPath determination enables a router to comparethe destination address to the available routes inits routing table, and to select the best path.
  19. 19. Routing TablesRouters keep track of the following: Protocol type Destination/next-hop associations Routing metric Outbound interfaces
  20. 20. Routing Algorithms andMetricsRouting protocols have one or more of thefollowing design goals:  Optimization  Simplicity and low overhead  Robustness and stability  Flexibility  Rapid convergence
  21. 21. IGP and EGPIGPs route data within an autonomous system.  RIP, RIPv2, IGRP, EIGRP, OSPF, IS-ISEGPs route data between autonomous systems  Border Gateway Protocol (BGP)
  22. 22. Link State and DistanceVector Examples of distance-vector protocols:  Routing Information Protocol (RIP)  Interior Gateway Routing Protocol (IGRP)  Enhanced IGRP (EIGRP) Examples of link-state protocols:  Open Shortest Path First (OSPF)  Intermediate System-to-Intermediate System (IS-IS)
  23. 23. Routing ProtocolsRIPRIP v2IGRPEIGRPOSPFIS-ISBGP
  24. 24. Mechanics of Subnetting
  25. 25. Classes of Network IPAddresses
  26. 26. Introduction to SubnettingHost bits mustare reassigned(or “borrowed”) 3 bits borrowed allows 23-2 or 6 subnetsas networkbits.The startingpoint is always 5 bits borrowed allows 25-2 or 30 subnetsthe leftmosthost bit. 12 bits borrowed allows 212-2 or 4094 subnets
  27. 27. Reasons for SubnettingProvides addressing flexibility for thenetwork administrator.  Each LAN must have its own network or subnetwork address.Provides broadcast containment and low-level security on the LAN.Provides some security since access toother subnets is only available through theservices of a router.
  28. 28. Establishing the Subnet Mask AddressDetermines which part of an IP address is the networkfield and which part is the host field.Follow these steps to determine the subnet mask: 1. Express the subnetwork IP address in binary form. 2. Replace the network and subnet portion of the address with all 1s. 3. Replace the host portion of the address with all 0s. 4. Convert the binary expression back to dotted-decimal notation.
  29. 29. Establishing the Subnet MaskAddressTo determine the number of bits to be used, thenetwork designer needs to calculate how manyhosts the largest subnetwork requires and thenumber of subnetworks needed.The “slash format” is a shorter way ofrepresenting the subnet mask: /25 represents the 25 one bits in the subnet mask
  30. 30. Establishing the Subnet MaskAddress
  31. 31. Subnetting Class A and BNetworksThe available bits for assignment to thesubnet field in a Class A address is 22 bitswhile a Class B address has 14 bits.
  32. 32. Calculating the Subnetwork With ANDing ANDing is a binary process by which the router calculates the subnetwork ID for an incoming packet.  1 AND 1 = 1; 1 AND 0 = 0; 0 AND 0 = 0 The router then uses that information to forward the packet across the correct interface. 11000000.10101000.00001010.0Packet Address 00001 10 11111111.11111111.11111111.1Subnet Mask 00000 11 11000000.10101000.00001010.0Subnetwork Address 00000 10