SlideShare a Scribd company logo
BASICTOADVANCED
NETWORKINGTUTORIALS
PRESENTED BY-:
VARINDER SINGH WALIA
SOME BASICS
OF
NETWORKING
TOPOLOGY
Topology is the structural design of communication model depicted physically or logically.
PHYSICAL TOPOLOGY
 Physical topology is the placement of the various components of a network, including
device location and cable installation
 Example: LAN has one or more physical links to other devices in the network;
graphically mapping these links results in a geometric shape that can be used to
describe the physical topology of the network.
LOGICAL TOPOLOGY
ICMP – INTERNET CONTROL MESSAGE PROTOCOL
Used to communicate between two devices . Ping command help in implementation of
ICMP
IPx/SPx - INTERNET PACKET EXCHANGE / SEQUENCE PACKET EXCHANGE
Developed by Novell company for LAN and MAN
NET- Bios - Network Basic Input / Output System
It is a program that allows applications on different computers to communicate within a
local area network (LAN).
It was created by IBM for its early PC Network, was adopted by Microsoft, and has
since become a de facto industry standard.
Nwlink IPx/ SPx
NWLink packages data to be compatible with client/server services on NetWare
Networks.
SMTP – SIMPLE MAIL TRANSFER PROTOCOLS
It is used for electronic mailing
 POP3 - POST OFFICE PROTOCOL 3
 It is the most recent version of a standard protocol for receiving e-mail.
 POP3 is a client/server protocol in which e-mail is received and held for you by your Internet
server.
 FTP - FILE TRANSFER PROTOCOL
 It is a standard network protocol used to transfer computer files between a client and server on a
computer network.
 TFTP – TRIVIAL FILE TRANSFER PROTOCOL
 It is an Internet software utility for transferring files that is simpler to use than the File Transfer
Protocol but less capable.
 It is used where user authentication and directory visibility are not required.
 It is used as backup to recovery files
 HTTP – HYPER TEXT TRANSFER PROTOCOL
 It is an application protocol for distributed, collaborative, hypermedia information systems.
 It is the foundation of data communication for the World Wide Web.
 Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text
 HTTP functions as a request–response protocol in the client–server computing model.
 HTTPS – HYPER TEXT TRANSFER PROTOCOL SECURE
 It is advanced version of http
 DHCP – DYNAMIC HOST CONFIGURATION PROTOCOL
 It is a client/server protocol that automatically provides an Internet Protocol host with its IP
address and other related configuration information such as the Subnet Mask and Default
Gateway.
 TELNET-
 It is an application layer protocol used on the Internet or local area networks to provide a
bidirectional interactive text-oriented communication facility using a virtual terminal
connection
 SSH – SECURE SHELL PROTOCOL
 It is used for security purpose like authentication for username , password etc.
 ARP – ADDRESS RESOLUTION PROTOCOL
 It is a protocol used by the Internet Protocol to map IP network addresses to the hardware
addresses used by a data link protocol
 RARP – REVERSE ADDRESS RESOLUTION PROTOCOL
 It is used to convert MAC address to IP address
ADVANCED
NETWORKING
ROUTER
 It is a route device which defines router of data
 It reads the packet and filter them
 It works on IP address network
 It manages all traffic inside the routing
 Here we are dealing with ROUTER 2811
SWITCH
 Switch is a computer networking device that connects devices together on a computer
network, by using packet switching to receive, process and forward data to the
destination device.
 Here we are going to deal with SWITCH 2960-24T
IPADDRESSING and SUBNETTING
IPADDRESSING
 Internet Protocol address (IP address) is a numerical label assigned to each device
(e.g., computer, printer) participating in a computer network that uses the Internet
Protocol for communication.
 Types of IP address
 IPv4 – Internet Protocol version 4
 IPv6 – Internet Protocol version 6
SUBNETTING
 It is process of dividation of IPs into subparts.
 We require subnetting in order to reduce the cost
 Example: Suppose we want to buy 100 IPs and each having cost of 260
 => Total Cost = 260 *100=> 26000
 But through subnetting we need only single IP which is divided through subnetting into
different IPs as below:
 Example: 192.168.1.0 Main IP
192.168.1.1
192.168.1.2
192.168.1.3 and so on……………
CONCEPT OF CLASSES
 There are five types of classes namely A,B,C,D,E described below.
 But in Practical Networking we prefer CLASS C only.
S.N
O
CLASS NETWORK
BIT
HOST
BIT
RANGE SUBNET WILDMASK
1 A 8 24 1-126 255.0.0.0 0.255.2555.255
2 B 16 16 128-191 255.255.0.0 0.0.255.255
3 C 24 8 192-223 255.255.255.
0
0.0.0.255
4 D BROADCAST 224-239
5 E RESEARCH 240-255
CORPS INFORMATION SYSTEM CONTROL OFFICER
(CISCO)
 Cisco Systems is an American multinational technology company headquartered in San
Jose, California, that designs, manufactures and sells networking equipment.
 It is considered to be the biggest networking company in the world.
 It is a MNC which deals in Networking Hardware Devices.
 It provides three certifications
 CCNA – CISCO CERTIFIED NETWORK ASSOCIATE/ADMINISTRATOR
 CCNP – CISCO CERTIFIED NETWORK PROFESSIONAL
 CCIE – CISCO CERTIFIED INTERNETWORK EXPERT
NOTE: Here we are going to deal with CCNA
CISCO CERTIFIED
NETWORK
ADMINISTRATOR/
ASSOCIATE
(CCNA)
ROUTING
ROUTING
 It means allocating the suitable and appropriate path by the router to the message/packets
from source to destination i.e Tx to Rx and vice versa.
 The device used for this mechanism used is called ROUTING and the device used is called
ROUTER
 Here we are going to deal with ROUTER 2811
 CISCO Routers have four ports for inserting WIC-2T card generating two serial ports from
each card.
 It has two Fast Ethernet ports namely fa 0/0 and fa 0/1 used for connecting devices through
copper straight wire
 It also have 8 serial ports generated two by each WIC-2T card. These ports are used for
only serial connections through Serial DATA TRANSFER EQUIPMENT (DTE) wire
BASIC CONFIGURATION
 It is done on Router
 Router with Switch and PC
 Select Router 2811
 Double click on it and a box will appear.
 Switch Off the Power
 Insert WIC-2T Cards as per requirement .
 Each card will give rise to Two different Serial Ports like 0/0/0 ,0/1/0 etc.
 Then take Switch-2960 and connect both with Copper Straight Wire.
 At last attach PC with Switch using same wire.
 Then click on Router And Then CLI Mode.
 Then write the following configuration code on Router:
CONFIGURATION ON ROUTER
Press : no
 Router>enable
 Router # config terminal
 Router( config) #interface fastEthernet 0/0
 Router( config-if) # ip address 10.0.0.1 255.0.0.0
 Router( config-if)#no shut
 This will turn the light Green between Router And Switch
 Then click PC and provide suitable IP and then press tab which will automatically
assign a suitable subnet mask. And then close this window
 Now click command prompt and write the below command:
 Pc> ping_assigned ip of pc…..
 Then press enter
SERIAL PORT CONFIGURATION
 It is used for communication between two or more routers
 Two or more routers are attached with each other through Serial DTE wire at suitable
serial ports.
 CONFIGURATION ON BOTH ROUTERS
 Router > en
 Router # config terminal
 Router (config )# interface serial 0/0/0
 Router (config-if)# ip address 10.0.0.1 255.0.0.0
 Router (config –if)# no shut
STATIC ROUTING
 It is used where router uses manual IP configuration .
 It is used in small scale networks.
 In it we left all the directly attached network .
 Commands Used
 Router (config )# iproute_neighbor ip_subnet_via
 ADVANTAGES OF STATIC ROUTING
 Fast and Effective
 Moreover control selective path
 Less overload for router
 DISADVANTAGES OF STATIC ROUTING
 More overhead on administrator
 Load balancing is not easily possible
DEFAULT ROUTING
 It means a route for any network
 This route is specified with following syntax:
 Router (config)# ip route 0.0.0.0_0.0.0.0_via
DYNAMIC ROUTING
 It is simple and fast to implement
 In it we have to write only directly attached entire network
 Various DYNAMIC ROUTING techniques includes :
 ROUTER INFORMATION PROTOCOL(RIP)
 INTERIOR GATEWAY ROUTING PROTOCOL(IGRP)
 ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL(EIGRP)
 OPEN SHORTEST PATH FIRST(OSPF)
 BORDER GATEWAY PROTOCOL(BGP)
ROUTER INFORMATION PROTOCOL (RIP)
 It is one of the oldest distance-vector routing protocols which employ the hop count as a
routing metric.
 RIP prevents routing loops by implementing a limit on the number of hops allowed in a
path from source to destination.
 The maximum number of hops allowed for RIP is 15, which limits the size of networks
that RIP can support.
 A hop count of 16 is considered an infinite distance and the route is considered
unreachable.
 In it we have to write only directly attached networks.
 Command used :
 Router (config)# router rip
 Router (config-router)# network_required network IP
ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL
(EIGRP)
 EIGRP (Enhanced Interior Gateway Routing Protocol) is a network protocol that lets
routers exchange information more efficiently than with earlier network protocols
 It has characteristics of both distance vector and link state protocols
 EIGRP will route the same protocols that IGRP route .
 SYNTAX :
 Router (config)# router eigrp_PROCESS ID ( )
 Router (config-router)# network _ required network IP
NOTE: All Routers has same Process ID
OPEN SHORTEST PATH FIRST (OSPF)
 Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks.
 It uses a link state routing algorithm and falls into the group of interior routing protocols,
operating within a single autonomous system (AS).
 It uses the concept of WILD CARD MASK , which is complement of subnet
 It also uses the Process ID and Area
 NOTE: All routers have same Area but different Process ID
 SYNTAX:
 Router (config )# router ospf_ PID(range 1-65535)
 Router (config –router)# network_requires network IP_ wildcard mask_area_any value(range
0-4294967295)
BRODER GATEWAY PROTOCOL (BGP)
 Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed
to exchange routing and reachability information among autonomous systems (AS) on
the Internet.
 The protocol is often classified as a path vector protocol but is sometimes also classed
as a distance-vector routing protocol.
 This protocol use the ip of neighbor point for communication
 SYNTAX:
 Router (config)#router bgp_PID1
 Router (config –router)# neighbor_ip of end point_remote-as_PID2
 NOTE 1: Before applying this command apply Dynamic routing on each router
 NOTE 2: Each router has different Process ID
 NOTE 3:Do not write directly attached IP of network. All except directly attached IP
will be treated as neighbor
 NOTE 4: PID will be of current router only.
REDISTRIBUTION B/W RIP,STATIC,EIGRP AND OSPF
ROUTING
 Commands Used:
Router (config)#router rip
Router(config-router)#redistribute ospf 10 metric 10
Router(config-router)#redistribute eigrp 10 metric 10
Router(config-router)#redistribute static metric 10
Router (config-router)# router ospf 10
Router(config-router)#redistribute rip metric 10 subnets
Router(config-router)#redistribute eigrp 10 metric 10 subnets
Router(config-router)#redistribute static metric 10 subnets
Router(config-router)#router eigrp 10
Router(config-router)#redistribute rip metric 100 100 100 100 100
Router(config-router)#redistribute static metric 100 100 100 100 100
Router(config-router)#redistribute ospf 10 metric 100 100 100 100 100
Router(config-router)#do wr
Router(config-router)#exit
TELECOMMUNICATION
(VOIP)
INTODUCTION TO VOIP
 VOIP is an acronym for Voice Over Internet Protocol, or in more common terms phone
service over the Internet.
 If you have a reasonable quality Internet connection you can get phone service
delivered through your Internet connection instead of from your local phone company.
BASIC IDEA OF VOIP
 Continuously sample audio.
 Convert each sample to digital form.
 Send the resulting digitized stream accross an IP network in packets.
 Convert the stream back to analog for playback.
 Before the procedure above, the system must handle call setup.
 Phone number to IP.
ADVANTAGES OF VOIP
 Low call costs. ...
 Low cost of performing moves, ads and changes on a business VOIP phone system.
 Increased functionality and integration with other IT business systems.
 Ability to have your land-line phone number follow you anywhere.
 Low infrastructure costs. ...
 Future proof.
DISADVANTAGES OF VOIP
 Loss of service during outages.
 Without power VOIP phones are useless, so in case of emergencies during power
cuts it can be a major disadvantage.
 With VOIP emergency calls, it is hard to locate you and send help in time.
 Some times during calls, there may be periods of silence when data is lost while it
is being unscrambled.
 Latency and traffic.
 No standard protocol is applicable
VOICE OVER INTERNET PROTOCOL
(VOIP)
(VOIP)
SWITCHING
SWITCHING
VIRTUAL LOCALAREA NETWORK (VLAN)
 It is a smart device
 It divides switch into multiple parts in order to maintain security.
 Basic Configuration:
 Switch(config)#vlan ID(1-1005)
#vlan 10
#name ABC
#vlan 20
#name XYZ
#do show vlan
#do wr
#exit
 SWITCH TO SWITCH PROGRAMMIG
Switch#interface fa 0/0
#switchport access vlan 10
interface fa 0/3
# switchport access vlan 10
# interface fa 0/2
#switchport access vlan 20
# interface fa 0/4
#switchport access vlan 20
#do wr
#exit
:-> NOW apply the following commands:
Switch(config)# interface fa 0/24
#switchport mode trunk
#do wr
#exit
PER- VLAN SPANNING TREE
 Per-VLAN Spanning Tree (PVST) maintains a spanning tree instance for each VLAN
configured in the network.
 It uses ISL Trunking and allows a VLAN trunk to be forwarding for some VLANs while
blocking for other VLANs.
 Since PVST treats each VLAN as a separate network, it has the ability to load balance
traffic (at layer-2) by forwarding some VLANs on one trunk and other Vlans on another
trunk without causing a Spanning Tree loop.
 Commands for PVST on router:
Router(config)#interface fa 0/0
#no shut
Router(config)#int fa 0/0.10(10 is Ip of given PC’s)
#encapsulation_dot1Q_10
#ip_add_pc virtual IP_subnet
NOTE: Add similar above commands of number of even PC’s attached.
SECURITY
SECURITY
It is the network device protection in order to secure our network with help of
CCNA technology
 TYPES OF SECURITY :
 ACCESS CONTROL LIST : It is type of security in which we filter inbound
and outbound traffic
 Types of ACL:
1. STANDARD ACL : It is a type of ACL in which we block all the protocols
in our network.
 Commands for STANDARD ACL
Router(config)# ip_access-list standard_abc_deny_IP of n/w to be blocked_wildcard mask
#permit_any
#do wr
#exit
Router(config)# interface fa 0/0
#ip_access-group_abc
2. EXTENDED ACL : It is a type of ACL in which we block a particular protocol as
well as particular IP
 Commmands for Extended ACL:
 Router(config) # ip_access-list_extended_abc
#deny_icmp_destination IP_wildcard mask_source IP_wildcard
mask
#permit_ip_any_any
#do wr
#exit
 Router(config)# interface fa 0/0
#ip_access-group_abc
#do wr
#exit
VIRTUAL TERMINAL TYPE (VTY)
 It is protocol used for remotely connection with other connection.
 REQUIREMENT
1. Client Side: There are two password used that are ON ENABLE and ON LINE
CONSOLE
• Commands on CLIENT SIDE:
Router>en
Router#telnet_10.0.0.1
#do show ip interface brief
2. MASTER SIDE:
• Commands on MASTER SIDE:
Router(config)# enable_password_123
#line_vty_0 15
#password 1234
# do wr
# exit
VIRTUAL PRIVATE NETWORK (VPN)
 VPN is a technology that creates an encrypted connection over a less secure network
 In this basically TUNNEL is made to keep data secure , through which only source and
destination clients can get the data.
 Commands for VPN:
Router(config)# interface_tunnel_number
# ip_address_virtual IP_subnet
# tunnel_source_serial_of router itself
#tunnel_destination_IP of end router
# do wr
# exit
NOTE: Also share the virtual ip on both end router with rip command.
NETWORK ADDRESS TRANSLATOR
 It is type of security in which we convert our private address into public address
 It is a part of ethical hacking in which there is use of fake IP
 TYPES Of NAT:
1. STATIC NAT: It is a type of NAT in which the client will fetch only single
fake IP everytime.
Commands for STATIC NAT:
Router(config)# ip_nat_inside_source_static_IP of pc of router
# interface fa 0/0
#ip_nat_inside
#interface serial 0/0/0
#ip_nat_outside
#do wr
#exit
2.DYNAMIC NAT : It is a type of security in which we create a pool of fake IP’s
,because of which the user will receive a different fake IP
everytime within the range of given IP pool.
 Commands for DYANMIC NAT:
Router(config)# access-list_10_permit_actual router IP_wildcard mask
# ip_nat_pool_abc_50.0.0.3_50.0.0.10_netmask_subnet
# ip_nat_inside_source_list_10_pool_abc
#interface_fa_0/0
#ip_nat_inside
#interface_serial_port of router
#ip_nat-outside
#do_wr
#exit
3. Overload / NATPAD : It means that the single public IP assigned to your router can be used
by multiple internal hosts concurrently. This is done by translating source UDP/TCP ports in the
packets and keeping track of them within the translation table kept in the router .

More Related Content

What's hot

ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
Er. Anmol Bhagat
 
basic networking
basic networkingbasic networking
basic networkingAnmol Bagga
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentationbcdran
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
Bry Cunal
 
Advance Networking Course Details PPT
Advance Networking Course Details PPTAdvance Networking Course Details PPT
Advance Networking Course Details PPT
PSK Technolgies Pvt. Ltd. IT Company Nagpur
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
Rohit Singh
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
Reetesh Gupta
 
OSI Model
OSI ModelOSI Model
OSI Model
Rahul Bandhe
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
Shashank Asthana
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajendra Dangwal
 
CCNA
CCNACCNA
Internet Protocol version 6
Internet Protocol version 6Internet Protocol version 6
Internet Protocol version 6
Rekha Yadav
 
MikroTik & RouterOS
MikroTik & RouterOSMikroTik & RouterOS
MikroTik & RouterOS
Faelix Ltd
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
AIRTEL
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer NetworksGhaffar Khan
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
Tarun Khaneja
 

What's hot (20)

ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
 
basic networking
basic networkingbasic networking
basic networking
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentation
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
 
Advance Networking Course Details PPT
Advance Networking Course Details PPTAdvance Networking Course Details PPT
Advance Networking Course Details PPT
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
 
ipv6 ppt
ipv6 pptipv6 ppt
ipv6 ppt
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
OSI Model
OSI ModelOSI Model
OSI Model
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
CCNA
CCNACCNA
CCNA
 
Internet Protocol version 6
Internet Protocol version 6Internet Protocol version 6
Internet Protocol version 6
 
Subnetting
SubnettingSubnetting
Subnetting
 
MikroTik & RouterOS
MikroTik & RouterOSMikroTik & RouterOS
MikroTik & RouterOS
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
 

Viewers also liked

Basic To Advanced Networking
Basic To Advanced NetworkingBasic To Advanced Networking
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
Varinder Singh Walia
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer network
Trinity Dwarka
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentalsjpprakash
 
Well known protocols port numbers
Well known  protocols port numbersWell known  protocols port numbers
Well known protocols port numbers
Varinder Singh Walia
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
Varinder Singh Walia
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Ashita Agrawal
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer NetworkingHj Habib
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
Shovan Mandal
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
Rajesh Sadhukha
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1CAVC
 
Computer networking
Computer networkingComputer networking
Computer networking
tdsparks3
 
20 common ports and their purposes
20 common ports and their purposes20 common ports and their purposes
20 common ports and their purposes
Owlishes
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingKhan Rahimeen
 
20 common port numbers and their purposes
20 common port numbers and their purposes 20 common port numbers and their purposes
20 common port numbers and their purposes
salamassh
 
The 20 Common ports
The 20 Common portsThe 20 Common ports
The 20 Common portsRKabbaniFTW
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
selvakumar_b1985
 
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2
Nil Menon
 

Viewers also liked (20)

Basic To Advanced Networking
Basic To Advanced NetworkingBasic To Advanced Networking
Basic To Advanced Networking
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer network
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
Well known protocols port numbers
Well known  protocols port numbersWell known  protocols port numbers
Well known protocols port numbers
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Computer networking
Computer networkingComputer networking
Computer networking
 
20 common ports and their purposes
20 common ports and their purposes20 common ports and their purposes
20 common ports and their purposes
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
20 common port numbers and their purposes
20 common port numbers and their purposes 20 common port numbers and their purposes
20 common port numbers and their purposes
 
The 20 Common ports
The 20 Common portsThe 20 Common ports
The 20 Common ports
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
 
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2
 

Similar to BASIC TO ADVANCED NETWORKING TUTORIALS

Networking
NetworkingNetworking
Networking
Tarun Jaiswal
 
ccna project on topic company infrastructure
ccna project on topic company infrastructureccna project on topic company infrastructure
ccna project on topic company infrastructure
Prince Gautam
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesVamsi Krishna Kalavala
 
Introduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptxIntroduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptx
ShehanMarasinghe1
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slides
adam_merritt
 
Tcp
TcpTcp
DCHP,NAT,forwarding of ip packets
DCHP,NAT,forwarding of ip packetsDCHP,NAT,forwarding of ip packets
DCHP,NAT,forwarding of ip packets
rajshreemuthiah
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2githe26200
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Vanitha Joshi
 
Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01
amit singh
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
Deepak Singh
 
Basic Introduction to Technology (networking).pdf
Basic Introduction to Technology (networking).pdfBasic Introduction to Technology (networking).pdf
Basic Introduction to Technology (networking).pdf
tthind
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
ssuserf7cd2b
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
AKHIL969626
 
Ccna1 presentation
Ccna1 presentationCcna1 presentation
Ccna1 presentation
Shantnu Matharoo
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
Varinder Singh Walia
 
Networking
NetworkingNetworking
NetworkingRashmi
 
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdfAutomation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
Gandhibabu8
 

Similar to BASIC TO ADVANCED NETWORKING TUTORIALS (20)

Networking
NetworkingNetworking
Networking
 
ccna project on topic company infrastructure
ccna project on topic company infrastructureccna project on topic company infrastructure
ccna project on topic company infrastructure
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
Introduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptxIntroduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptx
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slides
 
CCNA FUNDAMENTAL
CCNA FUNDAMENTALCCNA FUNDAMENTAL
CCNA FUNDAMENTAL
 
Tcp
TcpTcp
Tcp
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
DCHP,NAT,forwarding of ip packets
DCHP,NAT,forwarding of ip packetsDCHP,NAT,forwarding of ip packets
DCHP,NAT,forwarding of ip packets
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
 
Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
Basic Introduction to Technology (networking).pdf
Basic Introduction to Technology (networking).pdfBasic Introduction to Technology (networking).pdf
Basic Introduction to Technology (networking).pdf
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
Ccna1 presentation
Ccna1 presentationCcna1 presentation
Ccna1 presentation
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
 
Networking
NetworkingNetworking
Networking
 
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdfAutomation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

BASIC TO ADVANCED NETWORKING TUTORIALS

  • 3. TOPOLOGY Topology is the structural design of communication model depicted physically or logically. PHYSICAL TOPOLOGY  Physical topology is the placement of the various components of a network, including device location and cable installation  Example: LAN has one or more physical links to other devices in the network; graphically mapping these links results in a geometric shape that can be used to describe the physical topology of the network.
  • 4. LOGICAL TOPOLOGY ICMP – INTERNET CONTROL MESSAGE PROTOCOL Used to communicate between two devices . Ping command help in implementation of ICMP IPx/SPx - INTERNET PACKET EXCHANGE / SEQUENCE PACKET EXCHANGE Developed by Novell company for LAN and MAN NET- Bios - Network Basic Input / Output System It is a program that allows applications on different computers to communicate within a local area network (LAN). It was created by IBM for its early PC Network, was adopted by Microsoft, and has since become a de facto industry standard. Nwlink IPx/ SPx NWLink packages data to be compatible with client/server services on NetWare Networks. SMTP – SIMPLE MAIL TRANSFER PROTOCOLS It is used for electronic mailing
  • 5.  POP3 - POST OFFICE PROTOCOL 3  It is the most recent version of a standard protocol for receiving e-mail.  POP3 is a client/server protocol in which e-mail is received and held for you by your Internet server.  FTP - FILE TRANSFER PROTOCOL  It is a standard network protocol used to transfer computer files between a client and server on a computer network.  TFTP – TRIVIAL FILE TRANSFER PROTOCOL  It is an Internet software utility for transferring files that is simpler to use than the File Transfer Protocol but less capable.  It is used where user authentication and directory visibility are not required.  It is used as backup to recovery files  HTTP – HYPER TEXT TRANSFER PROTOCOL  It is an application protocol for distributed, collaborative, hypermedia information systems.  It is the foundation of data communication for the World Wide Web.  Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text  HTTP functions as a request–response protocol in the client–server computing model.
  • 6.  HTTPS – HYPER TEXT TRANSFER PROTOCOL SECURE  It is advanced version of http  DHCP – DYNAMIC HOST CONFIGURATION PROTOCOL  It is a client/server protocol that automatically provides an Internet Protocol host with its IP address and other related configuration information such as the Subnet Mask and Default Gateway.  TELNET-  It is an application layer protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection  SSH – SECURE SHELL PROTOCOL  It is used for security purpose like authentication for username , password etc.  ARP – ADDRESS RESOLUTION PROTOCOL  It is a protocol used by the Internet Protocol to map IP network addresses to the hardware addresses used by a data link protocol  RARP – REVERSE ADDRESS RESOLUTION PROTOCOL  It is used to convert MAC address to IP address
  • 8. ROUTER  It is a route device which defines router of data  It reads the packet and filter them  It works on IP address network  It manages all traffic inside the routing  Here we are dealing with ROUTER 2811
  • 9. SWITCH  Switch is a computer networking device that connects devices together on a computer network, by using packet switching to receive, process and forward data to the destination device.  Here we are going to deal with SWITCH 2960-24T
  • 10. IPADDRESSING and SUBNETTING IPADDRESSING  Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication.  Types of IP address  IPv4 – Internet Protocol version 4  IPv6 – Internet Protocol version 6
  • 11. SUBNETTING  It is process of dividation of IPs into subparts.  We require subnetting in order to reduce the cost  Example: Suppose we want to buy 100 IPs and each having cost of 260  => Total Cost = 260 *100=> 26000  But through subnetting we need only single IP which is divided through subnetting into different IPs as below:  Example: 192.168.1.0 Main IP 192.168.1.1 192.168.1.2 192.168.1.3 and so on……………
  • 12. CONCEPT OF CLASSES  There are five types of classes namely A,B,C,D,E described below.  But in Practical Networking we prefer CLASS C only. S.N O CLASS NETWORK BIT HOST BIT RANGE SUBNET WILDMASK 1 A 8 24 1-126 255.0.0.0 0.255.2555.255 2 B 16 16 128-191 255.255.0.0 0.0.255.255 3 C 24 8 192-223 255.255.255. 0 0.0.0.255 4 D BROADCAST 224-239 5 E RESEARCH 240-255
  • 13. CORPS INFORMATION SYSTEM CONTROL OFFICER (CISCO)  Cisco Systems is an American multinational technology company headquartered in San Jose, California, that designs, manufactures and sells networking equipment.  It is considered to be the biggest networking company in the world.  It is a MNC which deals in Networking Hardware Devices.  It provides three certifications  CCNA – CISCO CERTIFIED NETWORK ASSOCIATE/ADMINISTRATOR  CCNP – CISCO CERTIFIED NETWORK PROFESSIONAL  CCIE – CISCO CERTIFIED INTERNETWORK EXPERT NOTE: Here we are going to deal with CCNA
  • 15.
  • 17. ROUTING  It means allocating the suitable and appropriate path by the router to the message/packets from source to destination i.e Tx to Rx and vice versa.  The device used for this mechanism used is called ROUTING and the device used is called ROUTER  Here we are going to deal with ROUTER 2811  CISCO Routers have four ports for inserting WIC-2T card generating two serial ports from each card.  It has two Fast Ethernet ports namely fa 0/0 and fa 0/1 used for connecting devices through copper straight wire  It also have 8 serial ports generated two by each WIC-2T card. These ports are used for only serial connections through Serial DATA TRANSFER EQUIPMENT (DTE) wire
  • 18. BASIC CONFIGURATION  It is done on Router  Router with Switch and PC  Select Router 2811  Double click on it and a box will appear.  Switch Off the Power  Insert WIC-2T Cards as per requirement .  Each card will give rise to Two different Serial Ports like 0/0/0 ,0/1/0 etc.  Then take Switch-2960 and connect both with Copper Straight Wire.  At last attach PC with Switch using same wire.  Then click on Router And Then CLI Mode.  Then write the following configuration code on Router:
  • 19. CONFIGURATION ON ROUTER Press : no  Router>enable  Router # config terminal  Router( config) #interface fastEthernet 0/0  Router( config-if) # ip address 10.0.0.1 255.0.0.0  Router( config-if)#no shut  This will turn the light Green between Router And Switch  Then click PC and provide suitable IP and then press tab which will automatically assign a suitable subnet mask. And then close this window  Now click command prompt and write the below command:  Pc> ping_assigned ip of pc…..  Then press enter
  • 20. SERIAL PORT CONFIGURATION  It is used for communication between two or more routers  Two or more routers are attached with each other through Serial DTE wire at suitable serial ports.  CONFIGURATION ON BOTH ROUTERS  Router > en  Router # config terminal  Router (config )# interface serial 0/0/0  Router (config-if)# ip address 10.0.0.1 255.0.0.0  Router (config –if)# no shut
  • 21. STATIC ROUTING  It is used where router uses manual IP configuration .  It is used in small scale networks.  In it we left all the directly attached network .  Commands Used  Router (config )# iproute_neighbor ip_subnet_via  ADVANTAGES OF STATIC ROUTING  Fast and Effective  Moreover control selective path  Less overload for router  DISADVANTAGES OF STATIC ROUTING  More overhead on administrator  Load balancing is not easily possible
  • 22. DEFAULT ROUTING  It means a route for any network  This route is specified with following syntax:  Router (config)# ip route 0.0.0.0_0.0.0.0_via
  • 23. DYNAMIC ROUTING  It is simple and fast to implement  In it we have to write only directly attached entire network  Various DYNAMIC ROUTING techniques includes :  ROUTER INFORMATION PROTOCOL(RIP)  INTERIOR GATEWAY ROUTING PROTOCOL(IGRP)  ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL(EIGRP)  OPEN SHORTEST PATH FIRST(OSPF)  BORDER GATEWAY PROTOCOL(BGP)
  • 24. ROUTER INFORMATION PROTOCOL (RIP)  It is one of the oldest distance-vector routing protocols which employ the hop count as a routing metric.  RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from source to destination.  The maximum number of hops allowed for RIP is 15, which limits the size of networks that RIP can support.  A hop count of 16 is considered an infinite distance and the route is considered unreachable.  In it we have to write only directly attached networks.  Command used :  Router (config)# router rip  Router (config-router)# network_required network IP
  • 25. ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL (EIGRP)  EIGRP (Enhanced Interior Gateway Routing Protocol) is a network protocol that lets routers exchange information more efficiently than with earlier network protocols  It has characteristics of both distance vector and link state protocols  EIGRP will route the same protocols that IGRP route .  SYNTAX :  Router (config)# router eigrp_PROCESS ID ( )  Router (config-router)# network _ required network IP NOTE: All Routers has same Process ID
  • 26. OPEN SHORTEST PATH FIRST (OSPF)  Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks.  It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS).  It uses the concept of WILD CARD MASK , which is complement of subnet  It also uses the Process ID and Area  NOTE: All routers have same Area but different Process ID  SYNTAX:  Router (config )# router ospf_ PID(range 1-65535)  Router (config –router)# network_requires network IP_ wildcard mask_area_any value(range 0-4294967295)
  • 27. BRODER GATEWAY PROTOCOL (BGP)  Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet.  The protocol is often classified as a path vector protocol but is sometimes also classed as a distance-vector routing protocol.  This protocol use the ip of neighbor point for communication  SYNTAX:  Router (config)#router bgp_PID1  Router (config –router)# neighbor_ip of end point_remote-as_PID2  NOTE 1: Before applying this command apply Dynamic routing on each router  NOTE 2: Each router has different Process ID  NOTE 3:Do not write directly attached IP of network. All except directly attached IP will be treated as neighbor  NOTE 4: PID will be of current router only.
  • 28. REDISTRIBUTION B/W RIP,STATIC,EIGRP AND OSPF ROUTING  Commands Used: Router (config)#router rip Router(config-router)#redistribute ospf 10 metric 10 Router(config-router)#redistribute eigrp 10 metric 10 Router(config-router)#redistribute static metric 10 Router (config-router)# router ospf 10 Router(config-router)#redistribute rip metric 10 subnets Router(config-router)#redistribute eigrp 10 metric 10 subnets Router(config-router)#redistribute static metric 10 subnets Router(config-router)#router eigrp 10 Router(config-router)#redistribute rip metric 100 100 100 100 100 Router(config-router)#redistribute static metric 100 100 100 100 100 Router(config-router)#redistribute ospf 10 metric 100 100 100 100 100 Router(config-router)#do wr Router(config-router)#exit
  • 30. INTODUCTION TO VOIP  VOIP is an acronym for Voice Over Internet Protocol, or in more common terms phone service over the Internet.  If you have a reasonable quality Internet connection you can get phone service delivered through your Internet connection instead of from your local phone company. BASIC IDEA OF VOIP  Continuously sample audio.  Convert each sample to digital form.  Send the resulting digitized stream accross an IP network in packets.  Convert the stream back to analog for playback.  Before the procedure above, the system must handle call setup.  Phone number to IP.
  • 31. ADVANTAGES OF VOIP  Low call costs. ...  Low cost of performing moves, ads and changes on a business VOIP phone system.  Increased functionality and integration with other IT business systems.  Ability to have your land-line phone number follow you anywhere.  Low infrastructure costs. ...  Future proof. DISADVANTAGES OF VOIP  Loss of service during outages.  Without power VOIP phones are useless, so in case of emergencies during power cuts it can be a major disadvantage.  With VOIP emergency calls, it is hard to locate you and send help in time.  Some times during calls, there may be periods of silence when data is lost while it is being unscrambled.  Latency and traffic.  No standard protocol is applicable
  • 32. VOICE OVER INTERNET PROTOCOL (VOIP) (VOIP)
  • 34. SWITCHING VIRTUAL LOCALAREA NETWORK (VLAN)  It is a smart device  It divides switch into multiple parts in order to maintain security.  Basic Configuration:  Switch(config)#vlan ID(1-1005) #vlan 10 #name ABC #vlan 20 #name XYZ #do show vlan #do wr #exit
  • 35.  SWITCH TO SWITCH PROGRAMMIG Switch#interface fa 0/0 #switchport access vlan 10 interface fa 0/3 # switchport access vlan 10 # interface fa 0/2 #switchport access vlan 20 # interface fa 0/4 #switchport access vlan 20 #do wr #exit :-> NOW apply the following commands: Switch(config)# interface fa 0/24 #switchport mode trunk #do wr #exit
  • 36. PER- VLAN SPANNING TREE  Per-VLAN Spanning Tree (PVST) maintains a spanning tree instance for each VLAN configured in the network.  It uses ISL Trunking and allows a VLAN trunk to be forwarding for some VLANs while blocking for other VLANs.  Since PVST treats each VLAN as a separate network, it has the ability to load balance traffic (at layer-2) by forwarding some VLANs on one trunk and other Vlans on another trunk without causing a Spanning Tree loop.  Commands for PVST on router: Router(config)#interface fa 0/0 #no shut Router(config)#int fa 0/0.10(10 is Ip of given PC’s) #encapsulation_dot1Q_10 #ip_add_pc virtual IP_subnet NOTE: Add similar above commands of number of even PC’s attached.
  • 38. SECURITY It is the network device protection in order to secure our network with help of CCNA technology  TYPES OF SECURITY :  ACCESS CONTROL LIST : It is type of security in which we filter inbound and outbound traffic  Types of ACL: 1. STANDARD ACL : It is a type of ACL in which we block all the protocols in our network.  Commands for STANDARD ACL Router(config)# ip_access-list standard_abc_deny_IP of n/w to be blocked_wildcard mask #permit_any #do wr #exit Router(config)# interface fa 0/0 #ip_access-group_abc
  • 39. 2. EXTENDED ACL : It is a type of ACL in which we block a particular protocol as well as particular IP  Commmands for Extended ACL:  Router(config) # ip_access-list_extended_abc #deny_icmp_destination IP_wildcard mask_source IP_wildcard mask #permit_ip_any_any #do wr #exit  Router(config)# interface fa 0/0 #ip_access-group_abc #do wr #exit
  • 40. VIRTUAL TERMINAL TYPE (VTY)  It is protocol used for remotely connection with other connection.  REQUIREMENT 1. Client Side: There are two password used that are ON ENABLE and ON LINE CONSOLE • Commands on CLIENT SIDE: Router>en Router#telnet_10.0.0.1 #do show ip interface brief 2. MASTER SIDE: • Commands on MASTER SIDE: Router(config)# enable_password_123 #line_vty_0 15 #password 1234 # do wr # exit
  • 41. VIRTUAL PRIVATE NETWORK (VPN)  VPN is a technology that creates an encrypted connection over a less secure network  In this basically TUNNEL is made to keep data secure , through which only source and destination clients can get the data.  Commands for VPN: Router(config)# interface_tunnel_number # ip_address_virtual IP_subnet # tunnel_source_serial_of router itself #tunnel_destination_IP of end router # do wr # exit NOTE: Also share the virtual ip on both end router with rip command.
  • 42. NETWORK ADDRESS TRANSLATOR  It is type of security in which we convert our private address into public address  It is a part of ethical hacking in which there is use of fake IP  TYPES Of NAT: 1. STATIC NAT: It is a type of NAT in which the client will fetch only single fake IP everytime. Commands for STATIC NAT: Router(config)# ip_nat_inside_source_static_IP of pc of router # interface fa 0/0 #ip_nat_inside #interface serial 0/0/0 #ip_nat_outside #do wr #exit
  • 43. 2.DYNAMIC NAT : It is a type of security in which we create a pool of fake IP’s ,because of which the user will receive a different fake IP everytime within the range of given IP pool.  Commands for DYANMIC NAT: Router(config)# access-list_10_permit_actual router IP_wildcard mask # ip_nat_pool_abc_50.0.0.3_50.0.0.10_netmask_subnet # ip_nat_inside_source_list_10_pool_abc #interface_fa_0/0 #ip_nat_inside #interface_serial_port of router #ip_nat-outside #do_wr #exit 3. Overload / NATPAD : It means that the single public IP assigned to your router can be used by multiple internal hosts concurrently. This is done by translating source UDP/TCP ports in the packets and keeping track of them within the translation table kept in the router .