SlideShare a Scribd company logo
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
www.professordkinney.com
Building A Simple network
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Objectives
 Describe how networking works
 Host-to-host communication
 Introducing LANs
 Understanding Ethernet and Switch
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Structure
Define a network
data or information networks capable of carrying many
different types of communications
Define the components of a network
– Network components
• hardware
• software
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Structure
End Devices and their Role in the Network
– End devices form interface with human network &
communications network
– Role of end devices:
• client
• server
• both client and server
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Structure
Identify the role of an intermediary device in a data
network and be able to contrast that role with the role
of an end device
– Role of an intermediary device
• provides connectivity and ensures data flows
across network
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Structure
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Define Local Area Networks (LANs)
- A network serving a home, building or campus is
considered a Local Area Network (LAN)
Network Structure
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Define Wide Area Networks (WANs)
- LANs separated by geographic distance are connected
by a network known as a Wide Area Network (WAN)
Host-to-Host Communications
Host-to-host communications requires a consistent
model. The model addresses hardware, software, and
data transmission
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Host-to-Host Communications
The OSI reference model provides a means of
describing how data is transmitted over a network.
The model addresses hardware, software, and data
transmission.
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Host-to-Host Communications
Peer-to-Peer Communication
So that data packets can travel from the source to the
destination, each layer of the OSI model at the source must
communicate with its peer layer at the destination. This topic
describes the process of peer-to-peer communication.
During the process of peer-to-peer communication, the
protocols at each layer exchange packets of information called
protocol data units (PDUs) between peer layers.
These data packets originate at a source on a network and then
travel to a destination. Each layer depends on the OSI layer
below it to provide a service. To perform its service function, the
lower layer uses encapsulation to put the protocol data unit
(PDU) from the upper layer into lower layer data field. Each
layer then adds whatever headers the layer needs to perform its
function. As the data moves down from Layer 7 through Layer 2
of the OSI model, additional headers are added.
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Host-to-Host Communications
The network layer provides a service to the transport layer,
and the transport layer presents data to the network
subsystem. The network layer moves the data through the
Internet by encapsulating the data and attaching a header
to create a packet (the Layer 3 PDU). The header contains
information required to complete the transfer, such as
source and destination logical addresses.
The data link layer provides a service to the network layer
by encapsulating the network layer packet in a frame (the
Layer 2 PDU). The frame header contains the physical
addresses required to complete the data link functions,
and the frame trailer contains the FCS.
The physical layer provides a service to the data link layer,
encoding the data-link frame into a pattern of 1s and 0s
(bits) for transmission on the medium (usually a wire) at
Layer 1.
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Host-to-Host Communications
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Ethernet
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
OSI model layers 1 (physical) and 2 (data link)
TCP/IP model Network Access layer
Application
Presentation
Session
Transport
Network
Data link
Physical
Ethernet
Application
Transport
Internet
Network Access
Ethernet
The most common LAN technology
Different media (copper cable, optical fibre)
Different bandwidths (10, 100Mbps, Gbps, +)
Same addressing scheme
Same basic frame format
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Ethernet history
First LAN was Ethernet, designed at Xerox
1980 Ethernet standard published by DIX (Digital, Intel, Xerox)
1985 IEEE modified Ethernet standard and published as 802.3
Ethernet802.3
802.2MAC
LLC
Advantages of Ethernet
Simplicity and ease of maintenance
Ability to incorporate new technologies (e.g. fibre
optic, higher bandwidths)
Reliability
Low cost of installation and upgrade
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Ethernet Frame
Packet
Packet TrailerFrame header
Packet from
Network layer is
encapsulated
Preamble Destination
address
Start of
frame
delimiter
Source
address
Length
/type
7 1 6 6 2
Packet
Data
Frame
Check
Seq.
46-1500 4
Field size in bytes. Preamble and SFD are not counted in
frame size. Frame is 64-1518 (later 1522) bytes.
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Hub and Switch
Shared medium
Shared bandwidth
Collisions
Point to point links
Dedicated bandwidth
Use full duplex – no collisions
Hub
Switch
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Switching table
Switch builds a switching table
matching its port numbers to the
MAC addresses of devices connected
to them.
When a frame arrives, it reads the
destination MAC address, looks it
up in the table, finds the right port
and forwards the frame.
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Flooding
If the switch does not find the destination address in
its table then it floods the frame through all ports
except the incoming port.
Broadcast messages are flooded.
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Learning addresses
The switch learns addresses by looking at the source
MAC address of an incoming frame.
It then matches the address to the port where the
frame came in and puts the information in its table.
Entries are time stamped and removed from the table
when the time runs out.
They can be refreshed when another frame comes in
from the same host.
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
ARP table
A host wants to send a message.
It knows the destination IP address and puts it in the
packet header.
It looks in its ARP table and finds the corresponding
MAC address.
It puts the MAC address in the frame header.
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group
Internetwork Operating System
Most Cisco devices use the Cisco IOS.
Details vary with the device and feature set.
Normal access through a command line.
Stored in flash memory and can be upgraded.
Usually copied into RAM when the device is powered
on, and run from RAM.
Router prompts
User EXEC mode
Privileged EXEC mode
Global Configuration mode
Specific Configuration modes
Router>
Router#
Router(config)#
Router(config-if)#
and others
EXEC modes
You log in to User EXEC mode
Router>
You can give basic monitoring commands but cannot
change the configuration
Enter enable to go to Privileged EXEC mode
Router#
Password may be used for security
You can give more commands and can go to
configuration modes
Configuration modes
Start in privileged EXEC mode and enter the
configure terminal (config t) command
Router# config t
Router(config)#
The prompt changes
This is global configuration mode
Additional commands take you to interface
configuration, router configuration etc.
Console password
Paris(config)#line con 0
Paris(config-line)#password cisco
Paris(config-line)#login
Paris(config-line)#exit
Restricts access via the console
Use cisco as the password in labs.
Use a proper strong password on production
networks
Vty password for Telnet
Paris(config)#line vty 0 4
Paris(config-line)#password cisco
Paris(config-line)#login
Paris(config-line)#exit
Allows and restricts access via 5 vty lines
Use cisco as the password in labs.
Use a proper strong, different password on
production networks
Enable and enable secret
Paris(config)#enable secret class
The password class is needed when you type enable
to enter privileged exec mode
This password is encrypted
Paris(config)#enable password cisco
Not encrypted, used on older routers
If you configure both, then only the enable secret is
used.
Back up to TFTP server
Start TFTP server software on host
Paris#copy running-config tftp
Remote host []? 172.16.1.1
Name of configuration file to write [Paris-config]?
Paris12Oct07
Write file Paris12Oct07 to 172.16.1.1? [confirm] y
Writing Paris12Oct07 ! ! ! ! ! ! [OK]
Erase startup configuration
Paris#erase NVRAM:startup-config
Paris#erase startup-config
Paris#erase start
If you reload, then the router starts up with the
default configuration. No passwords, no IP addresses
etc.
Caution if you get this command wrong then you
could erase something else, e.g. IOS
Restore file from TFTP server
Router#copy tftp running-config
You will be prompted for IP address and file name.
Configuration is copied into RAM and takes effect at
once.
Save to NVRAM.
Configure a router interface
Paris(config)#interface FastEthernet 0/0
Paris(config-if)#ip address 172.16.1.1 255.255.0.0
Paris(config-if)#no shutdown
Paris(config-if)#exit
Interface names vary, depending on whether the
router is modular and on the bandwidth.
E.g. interface Ethernet 0 on an older router
Configure a router interface
Paris(config)#interface serial 0/0
Paris(config-if)#ip address 192.168.4.1 255.255.255.0
(Paris(config-if)#clock rate 64000)
Paris(config-if)#no shutdown
Paris(config-if)#exit DCE only
Switch IP address
The switch IP address goes on a virtual interface, not
a real one, normally VLAN1.
SwA(config)#interface VLAN1
SwA(config-if)#ip address 172.16.255.1 255.255.0.0
SwA(config-if)#no shutdown
SwA(config-if)#exit
Interface – show commands
show interfaces states whether up or down, gives
some protocol information and statistics about
interface use.
show ip interface gives IP addresses and much
more.
show ip interface brief gives summary of IP
addresses and whether up/down. Very useful
command.
Summary
Network communications using peer to peer hos
communication example.
Explains how LAN works .
Ethernet and switch how it works.
Cisco IOS commands.
08/02/13
Instructional Design-Computer Networking -
Bridges Educational Group

More Related Content

What's hot

TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
farhan516
 
Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layer
Serious_SamSoul
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
Sachii Dosti
 
Tcpip tutorial
Tcpip tutorialTcpip tutorial
Tcpip tutorial
Rajeshbabu88
 
Networking Ethernet
Networking EthernetNetworking Ethernet
Networking Ethernet
SSG1631
 
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyNetworrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Avishek Maitra
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
Carlo Fonda
 
TCP/IP Training Basic Concepts.
TCP/IP Training Basic Concepts.TCP/IP Training Basic Concepts.
TCP/IP Training Basic Concepts.
Amir Panahi
 
CCNA
CCNACCNA
Network infrastructure - TCP/IP
Network infrastructure - TCP/IPNetwork infrastructure - TCP/IP
Network infrastructure - TCP/IP
raymondkao
 
Presentation 4 for students of professordkinney.com
Presentation 4 for students of professordkinney.comPresentation 4 for students of professordkinney.com
Presentation 4 for students of professordkinney.com
Arnold Derrick Kinney
 
Ethernet
EthernetEthernet
Iap final
Iap finalIap final
Iap final
GLIM Digital
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
AAKASH S
 
1834902097 class note 3
1834902097 class note 31834902097 class note 3
1834902097 class note 3
MehediHassan468099
 
wired lans
wired lanswired lans
wired lans
hoadqbk
 
Mohanccna
MohanccnaMohanccna
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
Tutun Juhana
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
Sangeetha Rangarajan
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IP
Mannu Khani
 

What's hot (20)

TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
 
Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layer
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
 
Tcpip tutorial
Tcpip tutorialTcpip tutorial
Tcpip tutorial
 
Networking Ethernet
Networking EthernetNetworking Ethernet
Networking Ethernet
 
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyNetworrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
TCP/IP Training Basic Concepts.
TCP/IP Training Basic Concepts.TCP/IP Training Basic Concepts.
TCP/IP Training Basic Concepts.
 
CCNA
CCNACCNA
CCNA
 
Network infrastructure - TCP/IP
Network infrastructure - TCP/IPNetwork infrastructure - TCP/IP
Network infrastructure - TCP/IP
 
Presentation 4 for students of professordkinney.com
Presentation 4 for students of professordkinney.comPresentation 4 for students of professordkinney.com
Presentation 4 for students of professordkinney.com
 
Ethernet
EthernetEthernet
Ethernet
 
Iap final
Iap finalIap final
Iap final
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
 
1834902097 class note 3
1834902097 class note 31834902097 class note 3
1834902097 class note 3
 
wired lans
wired lanswired lans
wired lans
 
Mohanccna
MohanccnaMohanccna
Mohanccna
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IP
 

Viewers also liked

Redes cisco
Redes ciscoRedes cisco
Redes cisco
german choque
 
College Network
College NetworkCollege Network
College Network
Prince Kumar
 
Computer networking short_questions_and_answers
Computer networking short_questions_and_answersComputer networking short_questions_and_answers
Computer networking short_questions_and_answers
Tarun Thakur
 
E s switch_v6_ch01
E s switch_v6_ch01E s switch_v6_ch01
E s switch_v6_ch01
gon77gonzalez
 
MikroTik Basic Training Class - Online Moduls - English
 MikroTik Basic Training Class - Online Moduls - English MikroTik Basic Training Class - Online Moduls - English
MikroTik Basic Training Class - Online Moduls - English
Adhie Lesmana
 
Day 11 eigrp
Day 11 eigrpDay 11 eigrp
Day 11 eigrp
CYBERINTELLIGENTS
 
similarity measure
similarity measure similarity measure
similarity measure
ZHAO Sam
 
MICAI 2013 Tutorial Slides - Measuring the Similarity and Relatedness of Conc...
MICAI 2013 Tutorial Slides - Measuring the Similarity and Relatedness of Conc...MICAI 2013 Tutorial Slides - Measuring the Similarity and Relatedness of Conc...
MICAI 2013 Tutorial Slides - Measuring the Similarity and Relatedness of Conc...
University of Minnesota, Duluth
 
Day 5.3 configuration of router
Day 5.3 configuration of routerDay 5.3 configuration of router
Day 5.3 configuration of router
CYBERINTELLIGENTS
 
Router configuration
Router configurationRouter configuration
Router configuration
97148881557
 
Ir 08
Ir   08Ir   08
Teacher management system guide
Teacher management system guideTeacher management system guide
Teacher management system guide
nicolasmunozvera
 
Day 25 cisco ios router configuration
Day 25 cisco ios router configurationDay 25 cisco ios router configuration
Day 25 cisco ios router configuration
CYBERINTELLIGENTS
 
Cisco router command configuration overview
Cisco router command configuration overviewCisco router command configuration overview
Cisco router command configuration overview
3Anetwork com
 
Troubleshooting basic networks
Troubleshooting basic networksTroubleshooting basic networks
Troubleshooting basic networks
Arnold Derrick Kinney
 
Router configuration in packet tracer
Router configuration in packet  tracerRouter configuration in packet  tracer
Router configuration in packet tracer
Anabia Anabia
 
3 Router Configuration - Cisco Packet Tracer
3 Router Configuration - Cisco Packet Tracer 3 Router Configuration - Cisco Packet Tracer
3 Router Configuration - Cisco Packet Tracer
Rajan Kasodariya
 
10 More Quotes for Entrepreneurs
10 More Quotes for Entrepreneurs10 More Quotes for Entrepreneurs
10 More Quotes for Entrepreneurs
National Entrepreneurship Network
 
Initial Configuration of Router
Initial Configuration of RouterInitial Configuration of Router
Initial Configuration of Router
Kishore Kumar
 

Viewers also liked (19)

Redes cisco
Redes ciscoRedes cisco
Redes cisco
 
College Network
College NetworkCollege Network
College Network
 
Computer networking short_questions_and_answers
Computer networking short_questions_and_answersComputer networking short_questions_and_answers
Computer networking short_questions_and_answers
 
E s switch_v6_ch01
E s switch_v6_ch01E s switch_v6_ch01
E s switch_v6_ch01
 
MikroTik Basic Training Class - Online Moduls - English
 MikroTik Basic Training Class - Online Moduls - English MikroTik Basic Training Class - Online Moduls - English
MikroTik Basic Training Class - Online Moduls - English
 
Day 11 eigrp
Day 11 eigrpDay 11 eigrp
Day 11 eigrp
 
similarity measure
similarity measure similarity measure
similarity measure
 
MICAI 2013 Tutorial Slides - Measuring the Similarity and Relatedness of Conc...
MICAI 2013 Tutorial Slides - Measuring the Similarity and Relatedness of Conc...MICAI 2013 Tutorial Slides - Measuring the Similarity and Relatedness of Conc...
MICAI 2013 Tutorial Slides - Measuring the Similarity and Relatedness of Conc...
 
Day 5.3 configuration of router
Day 5.3 configuration of routerDay 5.3 configuration of router
Day 5.3 configuration of router
 
Router configuration
Router configurationRouter configuration
Router configuration
 
Ir 08
Ir   08Ir   08
Ir 08
 
Teacher management system guide
Teacher management system guideTeacher management system guide
Teacher management system guide
 
Day 25 cisco ios router configuration
Day 25 cisco ios router configurationDay 25 cisco ios router configuration
Day 25 cisco ios router configuration
 
Cisco router command configuration overview
Cisco router command configuration overviewCisco router command configuration overview
Cisco router command configuration overview
 
Troubleshooting basic networks
Troubleshooting basic networksTroubleshooting basic networks
Troubleshooting basic networks
 
Router configuration in packet tracer
Router configuration in packet  tracerRouter configuration in packet  tracer
Router configuration in packet tracer
 
3 Router Configuration - Cisco Packet Tracer
3 Router Configuration - Cisco Packet Tracer 3 Router Configuration - Cisco Packet Tracer
3 Router Configuration - Cisco Packet Tracer
 
10 More Quotes for Entrepreneurs
10 More Quotes for Entrepreneurs10 More Quotes for Entrepreneurs
10 More Quotes for Entrepreneurs
 
Initial Configuration of Router
Initial Configuration of RouterInitial Configuration of Router
Initial Configuration of Router
 

Similar to Lesson 1 slideshow

pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
zeyadosama505
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
Dwi Yulianto
 
Ccna day1
Ccna day1Ccna day1
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
darulquthni
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
Sanjeev Jain
 
Emmanuel impraim computer networks
Emmanuel impraim computer networksEmmanuel impraim computer networks
Emmanuel impraim computer networks
EmmanuelImpraim1
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
Mukesh Gautam
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
skknowledge
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
gadisaAdamu
 
Network Layer
Network LayerNetwork Layer
Network Layer
Rishabh Shukla
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
shucaybcabdi
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
isma ishak
 
OSI model (7 layer )
OSI model (7 layer ) OSI model (7 layer )
OSI model (7 layer )
dimuthu22
 
layering.ppt
layering.pptlayering.ppt
layering.ppt
Rashmin Tanna
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2
Sohail Gohir
 
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
NguynTy5
 
Osi model
Osi modelOsi model
Osi model
dhawal mehta
 
OSI TCP.pptx
OSI TCP.pptxOSI TCP.pptx
OSI TCP.pptx
computerScience920885
 
640 802-study-guide-sample
640 802-study-guide-sample640 802-study-guide-sample
640 802-study-guide-sample
rickybcool
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
Vamsi Krishna Kalavala
 

Similar to Lesson 1 slideshow (20)

pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Emmanuel impraim computer networks
Emmanuel impraim computer networksEmmanuel impraim computer networks
Emmanuel impraim computer networks
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 
OSI model (7 layer )
OSI model (7 layer ) OSI model (7 layer )
OSI model (7 layer )
 
layering.ppt
layering.pptlayering.ppt
layering.ppt
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2
 
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
 
Osi model
Osi modelOsi model
Osi model
 
OSI TCP.pptx
OSI TCP.pptxOSI TCP.pptx
OSI TCP.pptx
 
640 802-study-guide-sample
640 802-study-guide-sample640 802-study-guide-sample
640 802-study-guide-sample
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 

More from Arnold Derrick Kinney

Windows 7 configuration
Windows 7 configurationWindows 7 configuration
Windows 7 configuration
Arnold Derrick Kinney
 
Network device management
Network device managementNetwork device management
Network device management
Arnold Derrick Kinney
 
Implementing a scalable ospf based solution
Implementing a scalable ospf based solutionImplementing a scalable ospf based solution
Implementing a scalable ospf based solution
Arnold Derrick Kinney
 
Implementing an EGIRP Based Solution
Implementing an EGIRP Based SolutionImplementing an EGIRP Based Solution
Implementing an EGIRP Based Solution
Arnold Derrick Kinney
 
Wan networks
Wan networksWan networks
Wan networks
Arnold Derrick Kinney
 
Building a medium sized network
Building a medium sized networkBuilding a medium sized network
Building a medium sized network
Arnold Derrick Kinney
 
Vlan configuration in medium sized network
Vlan configuration in medium sized networkVlan configuration in medium sized network
Vlan configuration in medium sized network
Arnold Derrick Kinney
 
Basics of unix
Basics of unixBasics of unix
Basics of unix
Arnold Derrick Kinney
 
IPV6
IPV6 IPV6
Managing Network Device Security
Managing Network Device SecurityManaging Network Device Security
Managing Network Device Security
Arnold Derrick Kinney
 
Mastering Binary For IPV4
Mastering Binary For IPV4Mastering Binary For IPV4
Mastering Binary For IPV4
Arnold Derrick Kinney
 
Cisco data center
Cisco data centerCisco data center
Cisco data center
Arnold Derrick Kinney
 
Ccnp route
Ccnp routeCcnp route
Presentation 3 for Students of professordkinney.com
Presentation 3 for Students of professordkinney.comPresentation 3 for Students of professordkinney.com
Presentation 3 for Students of professordkinney.com
Arnold Derrick Kinney
 
Lesson 2 slideshow
Lesson 2 slideshowLesson 2 slideshow
Lesson 2 slideshow
Arnold Derrick Kinney
 

More from Arnold Derrick Kinney (15)

Windows 7 configuration
Windows 7 configurationWindows 7 configuration
Windows 7 configuration
 
Network device management
Network device managementNetwork device management
Network device management
 
Implementing a scalable ospf based solution
Implementing a scalable ospf based solutionImplementing a scalable ospf based solution
Implementing a scalable ospf based solution
 
Implementing an EGIRP Based Solution
Implementing an EGIRP Based SolutionImplementing an EGIRP Based Solution
Implementing an EGIRP Based Solution
 
Wan networks
Wan networksWan networks
Wan networks
 
Building a medium sized network
Building a medium sized networkBuilding a medium sized network
Building a medium sized network
 
Vlan configuration in medium sized network
Vlan configuration in medium sized networkVlan configuration in medium sized network
Vlan configuration in medium sized network
 
Basics of unix
Basics of unixBasics of unix
Basics of unix
 
IPV6
IPV6 IPV6
IPV6
 
Managing Network Device Security
Managing Network Device SecurityManaging Network Device Security
Managing Network Device Security
 
Mastering Binary For IPV4
Mastering Binary For IPV4Mastering Binary For IPV4
Mastering Binary For IPV4
 
Cisco data center
Cisco data centerCisco data center
Cisco data center
 
Ccnp route
Ccnp routeCcnp route
Ccnp route
 
Presentation 3 for Students of professordkinney.com
Presentation 3 for Students of professordkinney.comPresentation 3 for Students of professordkinney.com
Presentation 3 for Students of professordkinney.com
 
Lesson 2 slideshow
Lesson 2 slideshowLesson 2 slideshow
Lesson 2 slideshow
 

Recently uploaded

Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 

Lesson 1 slideshow

  • 1. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 www.professordkinney.com
  • 2. Building A Simple network 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 3. Objectives  Describe how networking works  Host-to-host communication  Introducing LANs  Understanding Ethernet and Switch 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 4. Network Structure Define a network data or information networks capable of carrying many different types of communications Define the components of a network – Network components • hardware • software 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 5. Network Structure End Devices and their Role in the Network – End devices form interface with human network & communications network – Role of end devices: • client • server • both client and server 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 6. Network Structure Identify the role of an intermediary device in a data network and be able to contrast that role with the role of an end device – Role of an intermediary device • provides connectivity and ensures data flows across network 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 7. Network Structure 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group Define Local Area Networks (LANs) - A network serving a home, building or campus is considered a Local Area Network (LAN)
  • 8. Network Structure 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group Define Wide Area Networks (WANs) - LANs separated by geographic distance are connected by a network known as a Wide Area Network (WAN)
  • 9. Host-to-Host Communications Host-to-host communications requires a consistent model. The model addresses hardware, software, and data transmission 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 10. Host-to-Host Communications The OSI reference model provides a means of describing how data is transmitted over a network. The model addresses hardware, software, and data transmission. 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 11. Host-to-Host Communications Peer-to-Peer Communication So that data packets can travel from the source to the destination, each layer of the OSI model at the source must communicate with its peer layer at the destination. This topic describes the process of peer-to-peer communication. During the process of peer-to-peer communication, the protocols at each layer exchange packets of information called protocol data units (PDUs) between peer layers. These data packets originate at a source on a network and then travel to a destination. Each layer depends on the OSI layer below it to provide a service. To perform its service function, the lower layer uses encapsulation to put the protocol data unit (PDU) from the upper layer into lower layer data field. Each layer then adds whatever headers the layer needs to perform its function. As the data moves down from Layer 7 through Layer 2 of the OSI model, additional headers are added. 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 12. Host-to-Host Communications The network layer provides a service to the transport layer, and the transport layer presents data to the network subsystem. The network layer moves the data through the Internet by encapsulating the data and attaching a header to create a packet (the Layer 3 PDU). The header contains information required to complete the transfer, such as source and destination logical addresses. The data link layer provides a service to the network layer by encapsulating the network layer packet in a frame (the Layer 2 PDU). The frame header contains the physical addresses required to complete the data link functions, and the frame trailer contains the FCS. The physical layer provides a service to the data link layer, encoding the data-link frame into a pattern of 1s and 0s (bits) for transmission on the medium (usually a wire) at Layer 1. 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 14. Ethernet 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group OSI model layers 1 (physical) and 2 (data link) TCP/IP model Network Access layer Application Presentation Session Transport Network Data link Physical Ethernet Application Transport Internet Network Access
  • 15. Ethernet The most common LAN technology Different media (copper cable, optical fibre) Different bandwidths (10, 100Mbps, Gbps, +) Same addressing scheme Same basic frame format 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 16. Ethernet history First LAN was Ethernet, designed at Xerox 1980 Ethernet standard published by DIX (Digital, Intel, Xerox) 1985 IEEE modified Ethernet standard and published as 802.3 Ethernet802.3 802.2MAC LLC
  • 17. Advantages of Ethernet Simplicity and ease of maintenance Ability to incorporate new technologies (e.g. fibre optic, higher bandwidths) Reliability Low cost of installation and upgrade 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 18. Ethernet Frame Packet Packet TrailerFrame header Packet from Network layer is encapsulated Preamble Destination address Start of frame delimiter Source address Length /type 7 1 6 6 2 Packet Data Frame Check Seq. 46-1500 4 Field size in bytes. Preamble and SFD are not counted in frame size. Frame is 64-1518 (later 1522) bytes. 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 19. Hub and Switch Shared medium Shared bandwidth Collisions Point to point links Dedicated bandwidth Use full duplex – no collisions Hub Switch 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 20. Switching table Switch builds a switching table matching its port numbers to the MAC addresses of devices connected to them. When a frame arrives, it reads the destination MAC address, looks it up in the table, finds the right port and forwards the frame. 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 21. Flooding If the switch does not find the destination address in its table then it floods the frame through all ports except the incoming port. Broadcast messages are flooded. 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 22. Learning addresses The switch learns addresses by looking at the source MAC address of an incoming frame. It then matches the address to the port where the frame came in and puts the information in its table. Entries are time stamped and removed from the table when the time runs out. They can be refreshed when another frame comes in from the same host. 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 23. ARP table A host wants to send a message. It knows the destination IP address and puts it in the packet header. It looks in its ARP table and finds the corresponding MAC address. It puts the MAC address in the frame header. 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 24. Internetwork Operating System Most Cisco devices use the Cisco IOS. Details vary with the device and feature set. Normal access through a command line. Stored in flash memory and can be upgraded. Usually copied into RAM when the device is powered on, and run from RAM.
  • 25. Router prompts User EXEC mode Privileged EXEC mode Global Configuration mode Specific Configuration modes Router> Router# Router(config)# Router(config-if)# and others
  • 26. EXEC modes You log in to User EXEC mode Router> You can give basic monitoring commands but cannot change the configuration Enter enable to go to Privileged EXEC mode Router# Password may be used for security You can give more commands and can go to configuration modes
  • 27. Configuration modes Start in privileged EXEC mode and enter the configure terminal (config t) command Router# config t Router(config)# The prompt changes This is global configuration mode Additional commands take you to interface configuration, router configuration etc.
  • 28. Console password Paris(config)#line con 0 Paris(config-line)#password cisco Paris(config-line)#login Paris(config-line)#exit Restricts access via the console Use cisco as the password in labs. Use a proper strong password on production networks
  • 29. Vty password for Telnet Paris(config)#line vty 0 4 Paris(config-line)#password cisco Paris(config-line)#login Paris(config-line)#exit Allows and restricts access via 5 vty lines Use cisco as the password in labs. Use a proper strong, different password on production networks
  • 30. Enable and enable secret Paris(config)#enable secret class The password class is needed when you type enable to enter privileged exec mode This password is encrypted Paris(config)#enable password cisco Not encrypted, used on older routers If you configure both, then only the enable secret is used.
  • 31. Back up to TFTP server Start TFTP server software on host Paris#copy running-config tftp Remote host []? 172.16.1.1 Name of configuration file to write [Paris-config]? Paris12Oct07 Write file Paris12Oct07 to 172.16.1.1? [confirm] y Writing Paris12Oct07 ! ! ! ! ! ! [OK]
  • 32. Erase startup configuration Paris#erase NVRAM:startup-config Paris#erase startup-config Paris#erase start If you reload, then the router starts up with the default configuration. No passwords, no IP addresses etc. Caution if you get this command wrong then you could erase something else, e.g. IOS
  • 33. Restore file from TFTP server Router#copy tftp running-config You will be prompted for IP address and file name. Configuration is copied into RAM and takes effect at once. Save to NVRAM.
  • 34. Configure a router interface Paris(config)#interface FastEthernet 0/0 Paris(config-if)#ip address 172.16.1.1 255.255.0.0 Paris(config-if)#no shutdown Paris(config-if)#exit Interface names vary, depending on whether the router is modular and on the bandwidth. E.g. interface Ethernet 0 on an older router
  • 35. Configure a router interface Paris(config)#interface serial 0/0 Paris(config-if)#ip address 192.168.4.1 255.255.255.0 (Paris(config-if)#clock rate 64000) Paris(config-if)#no shutdown Paris(config-if)#exit DCE only
  • 36. Switch IP address The switch IP address goes on a virtual interface, not a real one, normally VLAN1. SwA(config)#interface VLAN1 SwA(config-if)#ip address 172.16.255.1 255.255.0.0 SwA(config-if)#no shutdown SwA(config-if)#exit
  • 37. Interface – show commands show interfaces states whether up or down, gives some protocol information and statistics about interface use. show ip interface gives IP addresses and much more. show ip interface brief gives summary of IP addresses and whether up/down. Very useful command.
  • 38. Summary Network communications using peer to peer hos communication example. Explains how LAN works . Ethernet and switch how it works. Cisco IOS commands. 08/02/13 Instructional Design-Computer Networking - Bridges Educational Group