This tutorial gives very good understanding on Computer Networks After completing this tutorial,You will find yourself at a moderate level of expertise in knowing Advance Networking(CCNA), from where you can take yourself to next levels.
A PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
This is Powerpoint Presentation on IP addressing & Subnet masking. This presentation describes how IP address works, what its classes and how the subnet masking works and more.
Subnet Calculation from a given IP range, using the classless Subnet mask. Calculating number of hosts in a subnet and number of subnets possible to create in a given IP range.
A PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
This is Powerpoint Presentation on IP addressing & Subnet masking. This presentation describes how IP address works, what its classes and how the subnet masking works and more.
Subnet Calculation from a given IP range, using the classless Subnet mask. Calculating number of hosts in a subnet and number of subnets possible to create in a given IP range.
Protocols And IP suite PPT
Contents are
History
TCP/IP Suite Layer
a} Network Interface
b} Internet Layer
c} Transport Layer
d} Application Layer
3.Comparison of OSI and IP
"This presentation was created through wide-ranged research and is intended specially for everyone interested in network technology".
-BRIAN S. CUNAL
KALINGA-APAYAO STATE COLLEGE
IT Instructor.
Learn Advanced Networking Course At PSK Technologies It Company Nagpur Download free syllabus :-https://www.pskitservices.com/free-internship-company-in-nagpur/
CCNA is associate level career certification. It is an International certification course. Which is helpful to improve your career path in networking field. It gives lot of opportunity for Engineers and lots of opportunity having lots of job.
But now in these days,
This International course is offered by SMS Institute of Technology, Lucknow
So ,
There is no need to go anywhere for the training on CCNA Course Certification during summer Training.
I want to give this information because lots of people think about this course. But they have no any other way like - going to the training institute that offers CCNA Training But they give the certification on Own training Institute That is invalid Because CCNA is a International course Certification and these certificate are come on the email Id.
But Now this course Certification offers by SMS Institute of Technology But the certificate are valid through out the world.
Learn more at blog : --
https://solutionbyexpert.blogspot.com/2020/08/become-expert-secret-of-success-ii.html
#coding
#coding development skill program
#java
he Associate level of Cisco Certifications can begin directly with CCNA for network installation, operations and troubleshooting or CCDA for network design. Think of the Associate Level as the foundation level of networking certification.
Marek Isalski, Faelix.net Ltd, describes the MikroTik range of routers and their applications, gives a pros and cons summary, and recommendations for budget provider edge deployment.
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
An overview of networking basics, building to more advanced networking techniques. Learn more about networking by subscribing to the Networking Motivator's weekly email at http://www.BethBridges.com
This tutorial gives very good understanding on CCNA Dynamic Routing Protocols.After completing this tutorial,You will find yourself at a moderate level of expertise in knowing Advance Networking(CCNA)
Protocols And IP suite PPT
Contents are
History
TCP/IP Suite Layer
a} Network Interface
b} Internet Layer
c} Transport Layer
d} Application Layer
3.Comparison of OSI and IP
"This presentation was created through wide-ranged research and is intended specially for everyone interested in network technology".
-BRIAN S. CUNAL
KALINGA-APAYAO STATE COLLEGE
IT Instructor.
Learn Advanced Networking Course At PSK Technologies It Company Nagpur Download free syllabus :-https://www.pskitservices.com/free-internship-company-in-nagpur/
CCNA is associate level career certification. It is an International certification course. Which is helpful to improve your career path in networking field. It gives lot of opportunity for Engineers and lots of opportunity having lots of job.
But now in these days,
This International course is offered by SMS Institute of Technology, Lucknow
So ,
There is no need to go anywhere for the training on CCNA Course Certification during summer Training.
I want to give this information because lots of people think about this course. But they have no any other way like - going to the training institute that offers CCNA Training But they give the certification on Own training Institute That is invalid Because CCNA is a International course Certification and these certificate are come on the email Id.
But Now this course Certification offers by SMS Institute of Technology But the certificate are valid through out the world.
Learn more at blog : --
https://solutionbyexpert.blogspot.com/2020/08/become-expert-secret-of-success-ii.html
#coding
#coding development skill program
#java
he Associate level of Cisco Certifications can begin directly with CCNA for network installation, operations and troubleshooting or CCDA for network design. Think of the Associate Level as the foundation level of networking certification.
Marek Isalski, Faelix.net Ltd, describes the MikroTik range of routers and their applications, gives a pros and cons summary, and recommendations for budget provider edge deployment.
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
An overview of networking basics, building to more advanced networking techniques. Learn more about networking by subscribing to the Networking Motivator's weekly email at http://www.BethBridges.com
This tutorial gives very good understanding on CCNA Dynamic Routing Protocols.After completing this tutorial,You will find yourself at a moderate level of expertise in knowing Advance Networking(CCNA)
Department Of computer Application- Advanced computer network
Main office:
Remote locations
Branch offices:
Home offices:
Mobile users
Resource-Sharing Functions and Benefits
Network User Applications
Characteristics of a Network
Foundation
Advance Internet working
Congestion Control & Resource Allocation
Network Security
Symmetric Key Encryption
Cryptographic Building Blocks
This tutorial gives very good understanding on Protocols.After completing this tutorial,You will find yourself at a moderate level of expertise in Protocols port Number.
This tutorial gives very good understanding on CCNA (VOIP). After completing this tutorial.You will find yourself at a moderate level of expertise in knowing Advance Networking(CCNA)
A computer network is defined as the interconnection of two or more computers. It is done to enable the computers to communicate and share available resources.
Components of computer network
Network benefits
Disadvantages of computer network
Classification by their geographical area
Network classification by their component role
Types of servers
This tutorial gives very good understanding on Computer Networks protocols After completing this tutorial, You will find yourself at a moderate level of expertise in knowing Advance Networking protocols (, from where you can take yourself to next levels.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
3. TOPOLOGY
Topology is the structural design of communication model depicted physically or logically.
PHYSICAL TOPOLOGY
Physical topology is the placement of the various components of a network, including
device location and cable installation
Example: LAN has one or more physical links to other devices in the network;
graphically mapping these links results in a geometric shape that can be used to
describe the physical topology of the network.
4. LOGICAL TOPOLOGY
ICMP – INTERNET CONTROL MESSAGE PROTOCOL
Used to communicate between two devices . Ping command help in implementation of
ICMP
IPx/SPx - INTERNET PACKET EXCHANGE / SEQUENCE PACKET EXCHANGE
Developed by Novell company for LAN and MAN
NET- Bios - Network Basic Input / Output System
It is a program that allows applications on different computers to communicate within a
local area network (LAN).
It was created by IBM for its early PC Network, was adopted by Microsoft, and has
since become a de facto industry standard.
Nwlink IPx/ SPx
NWLink packages data to be compatible with client/server services on NetWare
Networks.
SMTP – SIMPLE MAIL TRANSFER PROTOCOLS
It is used for electronic mailing
5. POP3 - POST OFFICE PROTOCOL 3
It is the most recent version of a standard protocol for receiving e-mail.
POP3 is a client/server protocol in which e-mail is received and held for you by your Internet
server.
FTP - FILE TRANSFER PROTOCOL
It is a standard network protocol used to transfer computer files between a client and server on a
computer network.
TFTP – TRIVIAL FILE TRANSFER PROTOCOL
It is an Internet software utility for transferring files that is simpler to use than the File Transfer
Protocol but less capable.
It is used where user authentication and directory visibility are not required.
It is used as backup to recovery files
HTTP – HYPER TEXT TRANSFER PROTOCOL
It is an application protocol for distributed, collaborative, hypermedia information systems.
It is the foundation of data communication for the World Wide Web.
Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text
HTTP functions as a request–response protocol in the client–server computing model.
6. HTTPS – HYPER TEXT TRANSFER PROTOCOL SECURE
It is advanced version of http
DHCP – DYNAMIC HOST CONFIGURATION PROTOCOL
It is a client/server protocol that automatically provides an Internet Protocol host with its IP
address and other related configuration information such as the Subnet Mask and Default
Gateway.
TELNET-
It is an application layer protocol used on the Internet or local area networks to provide a
bidirectional interactive text-oriented communication facility using a virtual terminal
connection
SSH – SECURE SHELL PROTOCOL
It is used for security purpose like authentication for username , password etc.
ARP – ADDRESS RESOLUTION PROTOCOL
It is a protocol used by the Internet Protocol to map IP network addresses to the hardware
addresses used by a data link protocol
RARP – REVERSE ADDRESS RESOLUTION PROTOCOL
It is used to convert MAC address to IP address
8. ROUTER
It is a route device which defines router of data
It reads the packet and filter them
It works on IP address network
It manages all traffic inside the routing
Here we are dealing with ROUTER 2811
9. SWITCH
Switch is a computer networking device that connects devices together on a computer
network, by using packet switching to receive, process and forward data to the
destination device.
Here we are going to deal with SWITCH 2960-24T
10. IPADDRESSING and SUBNETTING
IPADDRESSING
Internet Protocol address (IP address) is a numerical label assigned to each device
(e.g., computer, printer) participating in a computer network that uses the Internet
Protocol for communication.
Types of IP address
IPv4 – Internet Protocol version 4
IPv6 – Internet Protocol version 6
11. SUBNETTING
It is process of dividation of IPs into subparts.
We require subnetting in order to reduce the cost
Example: Suppose we want to buy 100 IPs and each having cost of 260
=> Total Cost = 260 *100=> 26000
But through subnetting we need only single IP which is divided through subnetting into
different IPs as below:
Example: 192.168.1.0 Main IP
192.168.1.1
192.168.1.2
192.168.1.3 and so on……………
12. CONCEPT OF CLASSES
There are five types of classes namely A,B,C,D,E described below.
But in Practical Networking we prefer CLASS C only.
S.N
O
CLASS NETWORK
BIT
HOST
BIT
RANGE SUBNET WILDMASK
1 A 8 24 1-126 255.0.0.0 0.255.2555.255
2 B 16 16 128-191 255.255.0.0 0.0.255.255
3 C 24 8 192-223 255.255.255.
0
0.0.0.255
4 D BROADCAST 224-239
5 E RESEARCH 240-255
13. CORPS INFORMATION SYSTEM CONTROL OFFICER
(CISCO)
Cisco Systems is an American multinational technology company headquartered in San
Jose, California, that designs, manufactures and sells networking equipment.
It is considered to be the biggest networking company in the world.
It is a MNC which deals in Networking Hardware Devices.
It provides three certifications
CCNA – CISCO CERTIFIED NETWORK ASSOCIATE/ADMINISTRATOR
CCNP – CISCO CERTIFIED NETWORK PROFESSIONAL
CCIE – CISCO CERTIFIED INTERNETWORK EXPERT
NOTE: Here we are going to deal with CCNA
17. ROUTING
It means allocating the suitable and appropriate path by the router to the message/packets
from source to destination i.e Tx to Rx and vice versa.
The device used for this mechanism used is called ROUTING and the device used is called
ROUTER
Here we are going to deal with ROUTER 2811
CISCO Routers have four ports for inserting WIC-2T card generating two serial ports from
each card.
It has two Fast Ethernet ports namely fa 0/0 and fa 0/1 used for connecting devices through
copper straight wire
It also have 8 serial ports generated two by each WIC-2T card. These ports are used for
only serial connections through Serial DATA TRANSFER EQUIPMENT (DTE) wire
18. BASIC CONFIGURATION
It is done on Router
Router with Switch and PC
Select Router 2811
Double click on it and a box will appear.
Switch Off the Power
Insert WIC-2T Cards as per requirement .
Each card will give rise to Two different Serial Ports like 0/0/0 ,0/1/0 etc.
Then take Switch-2960 and connect both with Copper Straight Wire.
At last attach PC with Switch using same wire.
Then click on Router And Then CLI Mode.
Then write the following configuration code on Router:
19. CONFIGURATION ON ROUTER
Press : no
Router>enable
Router # config terminal
Router( config) #interface fastEthernet 0/0
Router( config-if) # ip address 10.0.0.1 255.0.0.0
Router( config-if)#no shut
This will turn the light Green between Router And Switch
Then click PC and provide suitable IP and then press tab which will automatically
assign a suitable subnet mask. And then close this window
Now click command prompt and write the below command:
Pc> ping_assigned ip of pc…..
Then press enter
20. SERIAL PORT CONFIGURATION
It is used for communication between two or more routers
Two or more routers are attached with each other through Serial DTE wire at suitable
serial ports.
CONFIGURATION ON BOTH ROUTERS
Router > en
Router # config terminal
Router (config )# interface serial 0/0/0
Router (config-if)# ip address 10.0.0.1 255.0.0.0
Router (config –if)# no shut
21. STATIC ROUTING
It is used where router uses manual IP configuration .
It is used in small scale networks.
In it we left all the directly attached network .
Commands Used
Router (config )# iproute_neighbor ip_subnet_via
ADVANTAGES OF STATIC ROUTING
Fast and Effective
Moreover control selective path
Less overload for router
DISADVANTAGES OF STATIC ROUTING
More overhead on administrator
Load balancing is not easily possible
22. DEFAULT ROUTING
It means a route for any network
This route is specified with following syntax:
Router (config)# ip route 0.0.0.0_0.0.0.0_via
23. DYNAMIC ROUTING
It is simple and fast to implement
In it we have to write only directly attached entire network
Various DYNAMIC ROUTING techniques includes :
ROUTER INFORMATION PROTOCOL(RIP)
INTERIOR GATEWAY ROUTING PROTOCOL(IGRP)
ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL(EIGRP)
OPEN SHORTEST PATH FIRST(OSPF)
BORDER GATEWAY PROTOCOL(BGP)
24. ROUTER INFORMATION PROTOCOL (RIP)
It is one of the oldest distance-vector routing protocols which employ the hop count as a
routing metric.
RIP prevents routing loops by implementing a limit on the number of hops allowed in a
path from source to destination.
The maximum number of hops allowed for RIP is 15, which limits the size of networks
that RIP can support.
A hop count of 16 is considered an infinite distance and the route is considered
unreachable.
In it we have to write only directly attached networks.
Command used :
Router (config)# router rip
Router (config-router)# network_required network IP
25. ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL
(EIGRP)
EIGRP (Enhanced Interior Gateway Routing Protocol) is a network protocol that lets
routers exchange information more efficiently than with earlier network protocols
It has characteristics of both distance vector and link state protocols
EIGRP will route the same protocols that IGRP route .
SYNTAX :
Router (config)# router eigrp_PROCESS ID ( )
Router (config-router)# network _ required network IP
NOTE: All Routers has same Process ID
26. OPEN SHORTEST PATH FIRST (OSPF)
Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks.
It uses a link state routing algorithm and falls into the group of interior routing protocols,
operating within a single autonomous system (AS).
It uses the concept of WILD CARD MASK , which is complement of subnet
It also uses the Process ID and Area
NOTE: All routers have same Area but different Process ID
SYNTAX:
Router (config )# router ospf_ PID(range 1-65535)
Router (config –router)# network_requires network IP_ wildcard mask_area_any value(range
0-4294967295)
27. BRODER GATEWAY PROTOCOL (BGP)
Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed
to exchange routing and reachability information among autonomous systems (AS) on
the Internet.
The protocol is often classified as a path vector protocol but is sometimes also classed
as a distance-vector routing protocol.
This protocol use the ip of neighbor point for communication
SYNTAX:
Router (config)#router bgp_PID1
Router (config –router)# neighbor_ip of end point_remote-as_PID2
NOTE 1: Before applying this command apply Dynamic routing on each router
NOTE 2: Each router has different Process ID
NOTE 3:Do not write directly attached IP of network. All except directly attached IP
will be treated as neighbor
NOTE 4: PID will be of current router only.
30. INTODUCTION TO VOIP
VOIP is an acronym for Voice Over Internet Protocol, or in more common terms phone
service over the Internet.
If you have a reasonable quality Internet connection you can get phone service
delivered through your Internet connection instead of from your local phone company.
BASIC IDEA OF VOIP
Continuously sample audio.
Convert each sample to digital form.
Send the resulting digitized stream accross an IP network in packets.
Convert the stream back to analog for playback.
Before the procedure above, the system must handle call setup.
Phone number to IP.
31. ADVANTAGES OF VOIP
Low call costs. ...
Low cost of performing moves, ads and changes on a business VOIP phone system.
Increased functionality and integration with other IT business systems.
Ability to have your land-line phone number follow you anywhere.
Low infrastructure costs. ...
Future proof.
DISADVANTAGES OF VOIP
Loss of service during outages.
Without power VOIP phones are useless, so in case of emergencies during power
cuts it can be a major disadvantage.
With VOIP emergency calls, it is hard to locate you and send help in time.
Some times during calls, there may be periods of silence when data is lost while it
is being unscrambled.
Latency and traffic.
No standard protocol is applicable
34. SWITCHING
VIRTUAL LOCALAREA NETWORK (VLAN)
It is a smart device
It divides switch into multiple parts in order to maintain security.
Basic Configuration:
Switch(config)#vlan ID(1-1005)
#vlan 10
#name ABC
#vlan 20
#name XYZ
#do show vlan
#do wr
#exit
35. SWITCH TO SWITCH PROGRAMMIG
Switch#interface fa 0/0
#switchport access vlan 10
interface fa 0/3
# switchport access vlan 10
# interface fa 0/2
#switchport access vlan 20
# interface fa 0/4
#switchport access vlan 20
#do wr
#exit
:-> NOW apply the following commands:
Switch(config)# interface fa 0/24
#switchport mode trunk
#do wr
#exit
36. PER- VLAN SPANNING TREE
Per-VLAN Spanning Tree (PVST) maintains a spanning tree instance for each VLAN
configured in the network.
It uses ISL Trunking and allows a VLAN trunk to be forwarding for some VLANs while
blocking for other VLANs.
Since PVST treats each VLAN as a separate network, it has the ability to load balance
traffic (at layer-2) by forwarding some VLANs on one trunk and other Vlans on another
trunk without causing a Spanning Tree loop.
Commands for PVST on router:
Router(config)#interface fa 0/0
#no shut
Router(config)#int fa 0/0.10(10 is Ip of given PC’s)
#encapsulation_dot1Q_10
#ip_add_pc virtual IP_subnet
NOTE: Add similar above commands of number of even PC’s attached.
38. SECURITY
It is the network device protection in order to secure our network with help of
CCNA technology
TYPES OF SECURITY :
ACCESS CONTROL LIST : It is type of security in which we filter inbound
and outbound traffic
Types of ACL:
1. STANDARD ACL : It is a type of ACL in which we block all the protocols
in our network.
Commands for STANDARD ACL
Router(config)# ip_access-list standard_abc_deny_IP of n/w to be blocked_wildcard mask
#permit_any
#do wr
#exit
Router(config)# interface fa 0/0
#ip_access-group_abc
39. 2. EXTENDED ACL : It is a type of ACL in which we block a particular protocol as
well as particular IP
Commmands for Extended ACL:
Router(config) # ip_access-list_extended_abc
#deny_icmp_destination IP_wildcard mask_source IP_wildcard
mask
#permit_ip_any_any
#do wr
#exit
Router(config)# interface fa 0/0
#ip_access-group_abc
#do wr
#exit
40. VIRTUAL TERMINAL TYPE (VTY)
It is protocol used for remotely connection with other connection.
REQUIREMENT
1. Client Side: There are two password used that are ON ENABLE and ON LINE
CONSOLE
• Commands on CLIENT SIDE:
Router>en
Router#telnet_10.0.0.1
#do show ip interface brief
2. MASTER SIDE:
• Commands on MASTER SIDE:
Router(config)# enable_password_123
#line_vty_0 15
#password 1234
# do wr
# exit
41. VIRTUAL PRIVATE NETWORK (VPN)
VPN is a technology that creates an encrypted connection over a less secure network
In this basically TUNNEL is made to keep data secure , through which only source and
destination clients can get the data.
Commands for VPN:
Router(config)# interface_tunnel_number
# ip_address_virtual IP_subnet
# tunnel_source_serial_of router itself
#tunnel_destination_IP of end router
# do wr
# exit
NOTE: Also share the virtual ip on both end router with rip command.
42. NETWORK ADDRESS TRANSLATOR
It is type of security in which we convert our private address into public address
It is a part of ethical hacking in which there is use of fake IP
TYPES Of NAT:
1. STATIC NAT: It is a type of NAT in which the client will fetch only single
fake IP everytime.
Commands for STATIC NAT:
Router(config)# ip_nat_inside_source_static_IP of pc of router
# interface fa 0/0
#ip_nat_inside
#interface serial 0/0/0
#ip_nat_outside
#do wr
#exit
43. 2.DYNAMIC NAT : It is a type of security in which we create a pool of fake IP’s
,because of which the user will receive a different fake IP
everytime within the range of given IP pool.
Commands for DYANMIC NAT:
Router(config)# access-list_10_permit_actual router IP_wildcard mask
# ip_nat_pool_abc_50.0.0.3_50.0.0.10_netmask_subnet
# ip_nat_inside_source_list_10_pool_abc
#interface_fa_0/0
#ip_nat_inside
#interface_serial_port of router
#ip_nat-outside
#do_wr
#exit
3. Overload / NATPAD : It means that the single public IP assigned to your router can be used
by multiple internal hosts concurrently. This is done by translating source UDP/TCP ports in the
packets and keeping track of them within the translation table kept in the router .