Академический Документы
Профессиональный Документы
Культура Документы
1)
Introduction
2)
3)
Network Devices
4)
Types of Communication
Cards
LAN & WAN Concept
IPv4
IPv6
Subneting
Superneting
Variable Length Subnet Scheme (VLSM)
And Operation
5)
C.D.P
6)
7)
IP Routing
8)
IOS
Upgrading
Dual (Booting)
Static Route
RIP (Routing Information Protocol)
IGRP (Internet Gateway Routing Protocol)
EIGRP (Enhance Internet Gateway Routing Protocol)
OSPF (Open Shortest Path First)
Switching
9)
10)
11)
Frame Relay
12)
13)
14)
15)
Cabling
1) Introduction
CCNA (Cisco Certified Network Associate)
Cisco
Cisco is company name, in course. Company may any, there are many companies i.e.
Cisco, Motorola, Simons, Microsoft, but configurations are same. Cisco has 87% shares
on infrastructure of IP. It is said that if you send any small information on Internet, this is
impossible that this information do not pass through the Cisco Devices.
Our purpose is not reading about any product or any company but only with technology.
Certified
Practically you know what you study.
Associate
This is a level in this line. Associate is the first level.
Network
Our whole lab is around the one word i.e. Network.
Connectivity of two or more than two devices so that you can communicate with
each other, you can exchange the sources or share the information is called
networking. It has two parts:
1. Connectivity
2. Communication
Medium may any (copper, wire and wave) for the connectivity and communication.
Connectivity is due to the Hardware and communication is due to the Software.
Example
There is a telephone line connected to your home telephone set from PTCL exchange. Is
this a network? No, because there is only connectivity but not communication. If an other
person talks with you, it is communication. Here the both parts fulfil the definition. Now,
you can say the Network.
Q: The signals from telephone exchange are analog signals. If you think
that I have digital telephone set in home then why would these signals
analog?
Ans:
In old days when a number is dialed then the exchange had a mechanical
arm. You can listen the sound of that arm as the sound of typewriter on every digits of
your number. But there is no sound now a day, only this process is converted into digital.
But the signals pass through media as analog.
Modem
The basic purpose of modem is modulation and demodulation.
OSI
OSI stands for Open System Interconnection.
The other part of the definition The connectivity of two or more than two devices
devices mean it can be a router, switch, computer, modem or any other device.
Example
Using your Internet, when you send an email or chat with other by MSN Messenger,
there is not a condition that those only those people can send emails or chat with each
other that had the same machines both sides. Machines may be of any vendor i.e.
IBM, Compaq or Dell.
You can use any media, any venders computer and any operating system for
connectivity and sharing resources. So it is known as Open i.e. open for every one.
If the OSI System was as Close System then it means, Internet will use the people
that have only Compaq machines.
OSI Model is a Layered Approach (Structured Approach), which is made to
understand the Internet or network.
e.g. if you see There is no dial tone then you will check the telephone not correct
the password.
Net Workers divide the Internet theory to maximum seven layers. They said there are
seven layers may not be eight layers but may be six, five. You can remember the
seven layers with this line
All People Seems to Need Data Processing.
Layers
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
You can say this model as Data Flow Chart. The purpose of this model to
understand the flow of data on the network, understanding the steps during moving
the data in network.
7. Application Layer
Computer applications like MS Word, MS Excel etc. If we want to chat on Internet
then we run MS Messenger (which is Application), without opening of any
application on your computer you cannot make any work.
The first step for doing any work, to run application.
You send HELLO to other computer there is compulsory that same applications are
running on both computers that want to communicate. If there are not running same
applications on both computers then this HELLO not to be seen on computer screen.
6. Presentation Layer
Our language is English and computer learns that language is machine. This layer
converts the data from one form to another form. It converts the data into machine
language.
5. Session Layer
This layer is most critical and most conceptual. This layer creates virtual session.
Virtual Session means to check the availability of other side. Sessions are of two
kinds:
i.
ii.
Remember the word HELLO is not for our machine but it is another machine.
4. Transport Layer
If other machine is available then this layer is responsible to transport the data on
network. For the transport of data fragmentation is made. The conversion of data
into small pieces is called fragmentation or permutation. E.g. HELLO is converted
as:
H
3. Network Layer
Its major function is sorting and distribution. For understanding you consider this
layer as a Post Office and Router as Post Box. On this layer a device is used
called as Router. The pieces of HELLO are sent to a device called Router, which
acts as sorting and distribution. In Post Office there is sorting is done, like all mails of
Islamabad, Lahore etc. is separated for the distribution to their destinations.
In old days when you send a letter to any one, which is called mail. There are two
possibilities, the mail reached at exact location or do not reach.
Network
Data Link
Physical
1)
2)
There is MAC address exist, MAC address have used many devices like switches and
LAN card.
As you know that data travel in form of 0 & 1 (these are the voltage level not
mathematical and other number ), every device may contain different voltage, its
means there is the involvement of voltage. If you have 3 or 5 voltage and its parallel
there is line of any high voltage, then it may harm your data.
e.g.
During watching TV, you some time see lining on your TV set, this is why with any
high voltage.
Same like above, if there is any data cable contains 3 volts but its parallel a high 5
volts is passing then it is very possible that any bit of your data changes (i.e. 0 to 1).
Example
During the chatting on messenger a person asked what is your age, he writes answer
25 and sends. During the data traveling its only one bit changes and your information
will be changed as 65.
In reality no any system is so week, so to resolve this problem a layer is introduced
called Data Link Layer. Its main function is the deduction of error.
Example
If we have data 25 (5 5) and generators of link side are 5. That generator will divide
the 5 / 5 and remainder will 0. When you send 25 on Internet then not only 25 is
passing but the footers (tailors) also. Due to some error the word 26 (5 5 1) instead of
25 is changed, on the other machine there will be attached a CRC Algorithm again to
check the both checksum. If there is any different then there is any error in that data
which you sent. If there is an error then your system (Receiver) will not correct that
error but it will say to the sender to correct.
Retransmission is faster as compared to error correction.
There are two sources for errors:
a) Errors within the Machine or System (i.e. Computers, Routers, Modems etc)
b) Errors from outside the Machine (i.e. in media when data is sent)
According to the research there is 99% probability of error when data travels on
Media. The error in system is very rare, if may occur then system recover or restore
from its own cache.
1. Physical Layer:
After all the layers exist on a cable is attached to your computer, this cable works on
which level is called physical layer.
Example
If you make a file and give to a peon for send to another place. The peon will move
physically for the delivery of that file. The work of peon is to carry the data as it is.
Above you sent the word HELLO to other machine, this word travels on all layers by
sequence, but if there is an error between the layers then the chances of data to be
corrupted.
There is another Data Link Layer to the other side of Computer. From
sender, the algorithm is attached with the data and will re verify by other side.
Switch, NIC Card (LAN Card) work on Data Link Layer.
Data Encapsulation
Application
Presentation
Session
Upper-Layer Data
TCP Header
Transport
Upper-Layer Data
IP Header
Data
LLC Header
Data
FCS
MAC Header
Data
FCS
0101110101001000010
PDU
Segment
Network
Packet
Data-Link
Frame
Physical
Bits
There are all opposite works are done to other side of machine.
Concept
1. Protocols
2. Headers
3. Encapsulation
4. Software
1. Protocols
Protocol is a same set of rules and regulations for the communication between
two different machines on the same layer level.
Example
Company A
Company B
1. G.M (Application)
2. Secretary (Session)
3. Peon (Physical)
G.M (Application)
Secretary (Session)
Peon (Physical)
According to rules, is there possible that the G.M of Company A call to the Peon
of Company B everyday?
By above definition of Protocols, the relation of these companies will as under:
G.M
G.M
Secretary
Secretary
Peon
Peon
2. Header
When you write HELLO and send, then the data will move to down as
Presentation Layer. On this layer the header of presentation layer is attached with the
data. On one step down there is another header of session layer is attached with, and so
on.
Example
If I write a letter (Data) and saved in my draws without any receivers address then this
letter will not reach on any destination. Because this letter contains no any address and
media (LCS or TCS etc).
On the other hand if this letter contains the complete address of receiver and also
specified the courier then letter will reach at desired location. With out header data
cannot move. Header is the method for communication. Header is an overhead.
Example
There are students in class, there said the students to pass outside the class and passing
rate of data is one student per one man. 10 students will pass out in 10 seconds. But if
there are 2 bodyguards (as over heads) with these then total 12 students, now these will
pass in 12 seconds. This time consuming due to the overhead. When you use overhead
on network then it decreases the speed.
3. Encapsulation
Example
If there is a patient and you give a white powder (medicine) to eat, that patient will not
take because he does not know about that medicine so he refused. (There is No
Communication). If he receives that medicine then it is said communication is done.
On the other hand if I put that medicine in a capsule (Encapsulation) and I said eat it,
then he will not eat. I write the name of medicine in French on capsule then he will
not eat because he does not understand French language. If I wrote in English i.e.
Amoxil then he eat immediately because he knows and understand that language.
(There is communication is done).
For the communication same set of rules and regulations is required. If one machine
knows the French then other machine must know that language (Protocol), otherwise
communication will not take place. Due to this Protocol (language) forces the patient to
take medicine.
4. Software
Protocols, headers and encapsulation are software.
As you know about Transport Layer, controls the flow of data.
Flow control because of the:
i.
ii.
iii.
iv.
v.
Connection Awaiting
Connection Less
TCP
Connection Oriented
UDP
Flow Control
Example
The water (Data) is coming from hand pump (Sender) to a glass (Receiver), after a
short time the glass will full and then it will be overflow (Wastage of Data). If you want
to reserve the wastage of data then you will have to apply a phenomenon is called flow
control. There are two possibilities to control the flow of data:
a) You will stop the working of hand pump (to decrease the speed of
sender)
b) Or you will start the usage of the water (to increase the speed of
receiver)
On the Internet the process of Flow Control is automatic. On the back a process is
working called Speed Utilization which means that equalizes the speed of sender and
receiver.
Connection Oriented
Connection Oriented (Reliable)
In this type of communication, an acknowledgment receipt is generated. This is slow
but most reliable.
Example
Slow: the machine will not go ahead whenever he does not understand the data.
Reliable: it is 100% sure that if machine receives the information then go ahead,
otherwise not.
3) Network Devices
There is a line of network devices like Hub, Repeater, Generator, Bridges, Switch,
Multinet Switch, Routers Derouter, Fixed Firewall etc. these are all devices included in
your course.
But the devices that are related your course are Hub, Switch and Router.
1) HUB
A central part of any network is known as Hub. There is no any abbreviation used for
Hub. Hub is a broadcast device and same data to all ports. Hub works on Physical Layer.
2) Switch
Switch works on Data Link Layer and has software ASIC (Application Specific
Integrated Circuit). It is the combination of software and hardware. The software of
Switch is known as Switching Table. There are switches of LAN and also of WAN.
Note: Controller for specific work
Processor for multiple works
Example
If there are three devices like A, B and C. A wants to talk with B then data from A reaches
to the switch. Data will stay in switch for a moment if Hub was present then the data
would not stay. Hub contains IC (Integrated Circuit). initially there is no Switching Table
(Software) in ASIC(Application Specific Integrated Circuit) . As you know that if there is
no software on device then it is called Hub, so switch acts as Hub initially.
So first time the switch will broadcast the data, if the entry of destination is not available
in Switching Table. Otherwise if the entry of the destination is available in Switching
Table then the switch will do Unicast.
Switch will be doing broadcast till the entry of destination and source is not available
in the Switching Table.
Destination Entry Available then Unicast
Destination Entry Not Available then Boradcast
3) Router
Router is layer three device, There are routing table.Router is a unicast device, nonbroadcast device. Router has two ports written as Serial 0, Serial 1. Ethernet or LAN also
printed. The word Serial means this port is for WAN and Ethernet means for port of
LAN.
So Router is a device, which integrates (merge) WAN and LAN.
Destination entry available then unicast
Destination entry not available then Drops
Cards
NIC Card (Network Interface Card)
Types of communication
There are three types of communication
1)
Unicast
2)
Multicast
3)
Broadcast
1) Unicast
Unicast means one to one communication. In this kind of communication only one person
listen and that person give answer. Traffic always sent to fix destination.
2) Multicast
One to many communication.In case of Multicast there is no specific or fix destination.
Destination can be changed. Multicast sent from the source (Spread around the source).
One destination (System) can be one and more than one Multicast member at a time
Example
If we divided a class in two groups one group A and other group B. Teacher talks
group A. Multicast means one to any specific group
3) Broadcast
One to all communication or Broadcast means to all devices
Example
A teacher in class speaks and all the students listen that sound. The bulletin is
broadcasting.
Broadcast is divided into two categories:
1. Directed Broadcast
2. Flooded Broadcast
In a room when a teacher said that Roll no 1 hands up, listen that comment all people but
replay only Roll no 1, this is specific broadcast.
1.
Directed Broadcast
In class if teacher ask a question from one student then all the students are listening but
only that student answers the question to teacher.
2.
Flooded Broadcast
In class of teacher ask a question from all students then all the students answer that
question to the teacher.
Disadvantages of Broadcast:
There is no security in broadcasting because all persons are listening. There is software
Cains use the connection Cable Internet, you can listen the chatting on MSN messenger
of all your neighbors. This software catches the packets of IP and decodes them, and you
can listen the sounds of your neighbors.
ATM Machine
ATM Machine is the example of online banking, using this machine you can withdraw
money from any ATM of any bank.
During defining the definitions of LAN WAN, there must not be criteria Distance.
LAN
Computers are connected using the LAN Standard Cable / LAN Standard Port.
WAN
Computers are connected using the WAN Standard Cable / WAN Standard Port.
The WAN and LAN both have their own switches separately. The
examples of WAN Switches are follows:
Ethernet
Supports to LAN
X.25:
Running on Mobilink
ATM:
Running on PTCL
Frame Relay: Running on remaining Lahore.
(Supports to WAN)
(Supports to WAN)
(Support to WAN)
What is IP Addressing
Ans:
130.5.5.25
Each of the decimal numbers represents a string of eight binary digits. Thus, the above IP
address really is this string of 0s and 1s:
Binary Digit :0-1
MAC Address
Hardware Address
Physical Address
None configurable Address
Layer 2 address
Hardcode Address
48 Bit Address
IP Address
Software Address
Logical Address
Configurable Address
Layer 3 Address
32 Bit Address
Remember that 95% communication on MAC base and 5% IP base, because LAN
communication faster than WAN. LAN mostly devices have MAC Address and WAN
work on IP Address. MAC developed core relation with IP, only one time IP called then
every time MAC called.
Data Link
Physical
MAC Address
Media Access Control
Network
Data Link
Physical
IP Address
Internet Protocol
Example
In America use flat addressing scheme. White house # 1 then # 2 and so on . But in
your mind no # 1 address in America ,every no different than other.
2)
Example
In Pakistan use hierarchal scheme. Block Z have many time use, but every time
Block Z hierarchy are different. If we go to Block Z first of all we know about what
is your Province, City, Area and then Block.
IP Address Classes
IP addresses can be one of several classes, each determining how many bits represent the
network number and how many represent the host number. The most common class used
by large organizations (Class A) allows 8 bits for the network number and 24 for the host
number.
Class A
1 127
Class B
128 191
10000000 .00000000.00000000.00000000
Class C
192 223
11000000.00000000.00000000.00000000
Network .
Network .
Network .
Class D
Class E
224 239
240 255
Host .
Network .
Network .
Host .
Host
Host .
Network .
00000000=0
01111111=127
B Class
10000000=128
10111111=191
C Class
11000000=192
11011111=223
D Class
11000000=224
11011111=239
E Class
11000000=240
11011111=255
Class
No of Network
Default Route
Loopback Testing
No of Host/Network No of Host/Class
Host
Host
Class A
2 8-1
2 24
27
x
27
Class B
2 24
2 16-2
2 16
2 14
x
2 14
Class C
2 16
2 24-3
2
28
2 21
x
21
28
10.0.0.0
172.16.0.0
192.168.0.0
to
to
to
10.255.255.255
172.31.255.255
192.168.255.255
This in you mind if recognized that what is your class then we see only first octets (Octal
is 8 word combination) of the IP Address 192.168.1.1 (also called doted decimal
notation)
. 168 . 30 . 24
128
1
. 64 .
1
32 .
0
16 . 8 .
0
0
4 .
0
2 . 1
0
0
192
. 64 .
0
32 .
1
16 . 8 .
0
1
4 .
0
2 . 1
0
0
168
Third Octet
128
0
. 64 .
0
32 .
1
16 . 8 .
0
0
4 .
0
2 . 1
0
0
30
. 64 .
0
32 .
0
16 . 8 .
1
1
4 .
0
2 . 1
0
0
24
First Octet
128
1
. 64 .
1
32 .
0
16 . 8 .
0
1
4 .
1
2 . 1
0
0
204
. 64 .
0
32 .
0
16 . 8 .
1
1
4 .
1
2 . 1
1
0
30
Third Octet
128
0
. 64 .
0
32 .
1
16 . 8 . 4 .
1
1
1
2 . 1
1
1
63
. 64 .
0
32 .
0
16 . 8 .
1
1
2 . 1
0
0
28
4 .
1
Subneting
Q
What is subnetting?
Compromise in the host portion and addition in the network portion is called
subnetting Logically dividing the networks .
Example
A latter posted which address is that IMTIAZ AHMED Corvit 14/C Gulbarg III. A
post man takes latter and gives to IMTIAZ AHMED, letter reach the correct
destination (This is one IP Address and communication with default subnet mask.)
Letter
Name : Imtiaz Ahmed
Address: Corvit 14/C
Gulbarg III
Corvit
IMTIAZ
AHMED
But two same name person IMTIAZ AHMED leave or work in corvit then latter could
not reach correct destination and data will loss.
Letter
Name : Imtiaz Ahmed
Address: Corvit 14/C
Gulbarg III
Corvit
IMTIAZ
AHMED
IMTIAZ
AHMED
There should be some addition here for save data. Then address is that IMTIAZ
AHMED Training Section Corvit 14/C Gulbarg III A post man takes letter and going
to Corvit then Training Section and gives letter IMTIAZ AHMED, letter reaches the
Letter
Name : Imtiaz Ahmed
Address: Corvit Tranning Section 14/C
Gulbarg III
correct destination (This is one IP Address and communication with Customize subnet
mask.)
Corvit
IMTIAZ
AHMED
Formula
Total Subnets
2
4
8
16
32
64
128
256
IMTIAZ
AHMED
Class
1st bit
2nd bit
3rd bit
4th bit
5th bit
6th bit
7th bit
8th bit
A
B
C
Result
/8
/16
/24
0
/9
/17
/25
128
/10
/18
/26
192
/11
/19
/27
224
/12
/20
/28
240
/13
/21
/29
248
/14
/22
/30
252
/15
/23
/31
254
Net ID
Broadcast ID
Mask
Network ID or Net ID
And Operation
0 AND 0 = 0
0 AND 1 = 0
1 AND 0 = 0
1 AND 1 = 1
IP Address
192
168
01100100
11111111
10
IP Address
11000000 .
10101000
Subnet Mask
11111111 .
11111111 .
Network ID
11000000 .
10101000
01100100
00000000
Network ID
192
168
100
100
00001010
00000000
192.1.1.100/24
Net ID
192.1.1.0
Broadcat ID 192.168.1.255
Mask
255.255.255.0
1) Example of Subnetting
Chiniot Local
Router
Karachi Remote
Router
Lahore Remote
Router
Q: If we have two remote site then judge that how many bits
Subnetting and how many subnets available?
Ans: Remember that these things.
1)
Class C
2)
24
3)
4)
255
.255
.255
.0
11111111 .11111111 .11111111 .0 0000000
That Bit
Subnet
(Subnetting)
5)
We have two remote sits then we see that table for subnetting and chose bits.
Bits
1
2
3
4
5
6
7
8
Formula
Total Subnets
2
6)
23
1 Bit subnetting
&
2 Subnets Available
192. 168. 1.
00000000
=0
10000000
=128
16
25
OR
32
26
64
27
128
28
=0
256
=128
7)
255
8)
Net ID
192.168.1.0
Valid Range
192.168.1.1
To
192.168.1.126
Broad Cast ID
192.168.1.127
Net ID
192.168.1.128
Valid Range
192.168.1.129
To
192.168.1.254
Broad Cast ID
9)
C
Result
192.168.1.255
/25
128
/26
192
/25
&
Subnets Mask is 128
/27
224
/28
240
/29
248
/30
252
/31
254
10) How many hosts (28-1 =27) Total Hosts(128-2) Usable Hosts(126)
2) Example of Subnetting
Chiniot Local
Router
Lahore
Vehari
Karachi
Sargodha
Isalamabad
Faisalabad
Jhang
Peshawar
Q: If we have two remote site then judge that how many bits
Subnetting and how many subnets available?
Ans: Remember that these things.
1)
Class A
2)
3)
4)
255
.0
.0
.0
11111111 .000 00000 .00000000 .00000000
5)
These Bits
Subnet
(Subnetting)
We have two remote labs then we see that table for subnetting and chose bits.
Bits
Formula
Total Subnets
21
22
2
3
4
5
6
7
8
6)
3 Bit subnetting
&
8 Subnets Available
8
16
32
64
128
256
Possible combination
10.
0.
0.
0 0 0 0 0 0 0 0 =0
0 0 1 0 0 0 0 0 =32
0 1 0 0 0 0 0 0 =64
0 1 1 0 0 0 0 0 =96
1 0 0 0 0 0 0 0 =128
1 0 1 0 0 0 0 0 =160
1 1 0 0 0 0 0 0 =192
1 1 1 0 0 0 0 0 =224
OR
Farmula called Block Size 256-224=32
=0
=32
=64
=96
=128
=160
=192
=224
7)
255
8)
.224 .0
.0
Net ID
10.0.0.0
Valid Range
10.1.0.0
To
10. 30.0.0
Broad Cast ID
10. 31.255.255
Net ID
10. 32.0.0
Valid Range
10. 33.0.0
To
10. 62.0.0
Broad Cast ID
10. 63.255.255
Net ID
10. 64.0.0
Valid Range
10. 65.0.0
To
10. 94.0.0
Broad Cast ID
10. 95.255.255
Net ID
10. 96.0.0
Valid Range
10. 97.0.0
To
10. 126.0.0
Broad Cast ID
10. 127.255.255
Net ID
10. 128.0.0
Valid Range
10. 129.0.0
To
10. 158.0.0
Broad Cast ID
10. 159.0.0
Net ID
10. 160.0.0
Valid Range
10. 161.0.0
To
10. 190.0.0
Broad Cast ID
10. 191.0.0
Net ID
10. 192.0.0
Valid Range
10. 193.0.0
To
10. 222.0.0
Broad Cast ID
10. 223.0.0
Net ID
10. 224.0.0
Valid Range
10. 225.0.0
To
10. 254.0.0
Broad Cast ID
9)
10. 255.0.0
A
Result
/8
0
/9
128
/10
192
/11
224
/12
240
/13
248
/14
252
/15
254
/11
&
Subnets Mask is 224
10) How many hosts (224-3 =221) Total Hosts(2097152-2) Usable Hosts(2097150)
3) Example of Subnetting
Total Remote Brunches are 2048
IP Address Available 172.10.0.0
Q: If we have 2048 remote site then judge that how many bits
Subnetting and how many subnets available?
Ans: Remember that these things.
1)
Class B
2)
16
3)
2048
4)
255
Bits
Formula
1
2
3
4
5
6
7
8
9
10
11
21
2
.0
.0
Total Subnets
2
23
2
.255
5)
16
25
26
27
28
29
2
10
11
32
64
128
256
512
1024
2048
11 Bit subnetting
&
2048 Subnets Available
11
These Bits
Subnet
(Subnetting)
6)
Possible combination
172.
10.
0.
.0
00000000
00000000
00000000
00000000
00000000
00000000
00100000
01000000
01100000
10000000
00000000
00000000
1 0 1 0 0 0 0 0 =0. 160
1 1 0 0 0 0 0 0 =0. 192
00000000
00000001
00000001
00000001
11100000
00000000
00100000
01000000
OR
Farmula called Block Size 256-224=32
=0. 0
=0. 32
=0. 64
=0. 96
=0. 128
=0. 160
=0. 192
=0. 224
=1. 0
=1. 32
=1. 64
7)
255
8)
Net ID
172.10.0.0
Valid Range
172.10.1.0
=0. 0
=0. 32
=0. 64
=0. 96
=0. 128
=0. 224
=1. 0
=1. 32
=1. 64
To
172. 10.30.0
Total Address 30
Broad Cast ID
172. 10.31.255
Net ID
172. 10.32.0
Valid Range
172. 10.33.0
To
172. 10.62.0
Broad Cast ID
9)
Total Address 30
172. 10.63.255
B
Result
/16
0
/17
128
/18
192
/19
224
/20
240
/21
248
/22
252
/23
254
B
Result
/24
0
/25
128
/26
192
/27
224
/28
240
/29
248
/30
252
/31
254
/27
&
Subnets Mask is
255.224
10) How many hosts (216-11 =25) Total Hosts(32) Usable Hosts(30)
A Waste of Space
Q:
Networking Scheme
Mumbai 192.168.10.64/27
28
192.168.10.128/30
WAN 192.198.10.133 and 134
192.168.10.132/30
WAN 192.198.10.137 and 138
192.168.10.136/30
62
12
Example of VLSM
Address 192.168.1.0.
28
Singapore 192.168.10.112/28
Subnets
Hosts
60
32
15
64
62
192.168.1.0/26
TO
192.168.1.63/26
64
62
192.168.1.0/26
TO
192.168.1.63/26
7) IP Routing
Encapsulation Topic
64
64
line protocol is up
Int in up,
Int in down
line protocol is up
Int in down
Protocol
A uniform set of rules that enable two devices to connect and transmit data to one
another. Protocols determine how data are transmitted between computing devices and
over networks. They define issues such as error control and data compression methods.
The protocol determines the following: type of error checking to be used, data
compression method (if any), how the sending device will indicate that it has finished a
message and how the receiving device will indicate that it has received the message. Also
called protocol is a language.
Encapsulation Protocol
By default encapsulation protocol is HDLC(High level Data Link). We can change
protocol but that is in your mind if we want to communication between two routers then
both protocols is same.
A>Enable
A#Configure Terminal
A(config)#Interface Serial 0/0
A(config-if)#Encapsulation PPP
A(config-if)# Exit
A(config)#Exit
A#Show Enterface Serial 0
Then we will see
Int in up ,line protocol is down
OR
A#Ping 10.0.0.1
!!!!!
A>Enable
A#Configure Terminal
A(config)#Interface Serial 0/0
A(config-if)#No Encapsulation
A(config-if)# Exit
A(config)#Exit
A#Show Interface Serial 0/0
Then we will see
Int in up ,line protocol is up
OR
A#Ping 10.0.0.1
!!!!!
A#Ping 10.0.0.1
!!!!!
If we can not understand the problem completely or new on the job. Then we type the 4
commands. These commands will magically work and all problems will solve if physical
Layer error not exist. Because that error is router internal error.
1)
A(config-if)# No Shutdown
2)
A(config-if)# No Encapsulation
3)
A(config-if)# Keepalive
4)
One important point keep in your mind clock rate always configure in DCE end. Because
when we connect to two routers then which cable work is one side DTE and second
side DCE. If we configure Clock rate 64000 command then IOS(Internetworking
Operating System) message that This is DET end and not configure that command and
Some IOS (Internetworking Operating System) accept that Clock rate 64000 command
on DTE end but no work at all.
IP Routing Topic
Purpose
Completion of routing table (every intelligent device have table, Router Routing table
Switch Switching table).Routing table complete called convergence
A # Show IP Route
That command show ip routing table.
C
C
C word mentions that system directly connected to network. A pin point is that there is
only show network IDs not display IP address.
There is two ways to complete routing table.
1)
2)
1)
We will define one static route define. Entry will be mentioned character S in routing
table
10.0.0.1
20.0.0.1
Serial 0/0
Serial 0/0
B
192.168.0.1
192.168.1.1
Fasteathernet 0/0
Fasteathernet 0/0
Method:
Missing Ether net
A(config)# ip route
20.0.0.1
255.0.0.0
Missing Router
10.0.0.0
Missing Router
255.255.255.0
20.0.0.0
A# show ip route
C
S
S
C
This is Static route, but only method not practical in these days. If 100 network then we
add separate 100 entries that is not possible now a days and in routing table entry show
with S character.
1)
Dynamic Method
That is method of latest technology. There are if we complete the routing table then we
will define the routing protocol. These are given below
1)
2)
3)
4)
RIP
IGRP
EIGRP
OSPF
Properties
Protocol
RIP
IGRP
EIGRP
OSPF
Protocol Category
AD
Distance
Vector
120
Distance
Vector
100
Hybrid
90/170
Link
State
110
(Administrative Distance)
Meaning: This is preference criteria (if we two protocol configure then which protocol
shows in the routing table)
Presentation
In
R
I
D
O
Routing table
Meaning: Display in Routing Table
Composite
Composite
1) Band Width
1) Band Width
Cost
Matric
Hop Count
2) Delay
2) Delay
1
3) Reliability
3) Reliability
Band width
4) Loading
4) Loading
5) MTN
5) MTN
Meaning: Decision Criteria
Configuration
1)
10.0.0.2
Serial 0/0
Serial 0/0
B
192.168.0.1
192.168.1.1
Fasteathernet 0/0
Fasteathernet 0/0
A> Enable
A# Configuration Terminal
A(config)# Router RIP
A(config-router)# Network 10.0.0.1
A(config-router)# Network 192.168.0.1
A(config-router)# Exit
A(config)# Exit
A# Show IP Route
C
C
R
A# Ping 10.0.0.2
!!!!!
B# ping 10.0.0.1
!!!!!
3)
10.0.0.2
Serial 0/0
Serial 0/0
B
192.168.0.1
192.168.1.1
Fasteathernet 0/0
Fasteathernet 0/0
A> Enable
A# Configuration Terminal
A(config)# Router IGRP 1
A# Ping 10.0.0.2
!!!!!
B# Ping 10.0.0.1
!!!!!
3)
10.0.0.2
Serial 0/0
Serial 0/0
B
192.168.0.1
192.168.1.1
Fasteathernet 0/0
Fasteathernet 0/0
A> Enable
A# Configuration Terminal
A(config)# Router EIGRP 1
A# Ping 10.0.0.2
!!!!!
B# Ping 10.0.0.1
!!!!!
4)
When we configure RIP IGRP EIGRP or other protocols then these protocol run
all interfaces of the router but OSPF is that protocol run only one interface if we run.
OSPF is very secure protocol. If we use RIP protocol then main disadvantage is that
after 30 second put routing table and send for updates(Live environment that is very big
disadvantage of that protocol because there normally data size consist on 1000 MB and
particular work waste 2 and 3 second every updates.). In world 85 % use OSPF 13 %
BGP and 2% other.
OSPF can be configuring single interface, single link, single network and single subnets.
OSPF have powered by dint of WILDCARD MASK
What is WILDCARD MASK?
Which of the following network commands , following the 'router ospf 1' command,
tells the router to start using OSPF on interfaces whose ip addresses are 10.1.1.1,
10.1.100.1, and 10.1.120.1?
A) network 10.1.1.0 255.0.0.0 area 0
B) network 10.0.0.0 0.255.255.0 area 0
C) network 10.0.0.0 255.0.0.0 area 0
D) network 0.0.0.0 255.255.255.255 area 0
In Binary Form
11000000.10101000.00000001.00000001
11000000.10101000.00000010.00000001
11000000.10101000.00000011.00000001
11000000.10101000.00000100.00000001
___________________________________
00000000.00000000.00000111.00000000
___________________________________
Rule
0 Must Match
1 Dont Care
192 .168 . 1 . 1
Wildcard Mask
0.0.7.0
Wildcard Mask
0.0.0.0
10.0.0.1
10.0.0.2
Serial 0/0
Serial 0/0
B
192.168.0.1
192.168.1.1
Fasteathernet 0/0
Fasteathernet 0
A> Enable
A# Configuration Terminal
A(config)# Router OSPF 1
(Range 1 to 65335)
A(config-router)# Network 10.0.0.1 0.0.0.0 area 0
A(config-router)# Network 192.168.0.1 0.0.0.0 area 0
A(config-router)# Exit
A(config)# Exit
A# Show IP Route
C
C
O
A# Ping 10.0.0.2
!!!!!
B# Ping 10.0.0.1
!!!!!
10.0.0.1
Serial 0/0
FastEathernet0/0
192.168.0.1
10.0.0.2
Serial 0/0
B
Serial 0/1
20.0.0.1
FastEathernet 0/0
192.168.1.1
172.16.0.1
FastEathernet 0/0
C
Serial 0/1
20.0.0.2
A> Enable
A# Configuration Terminal
A(config)# Router OSPF 1
(Range 1 to 65335)
A(config-router)# Network 10.0.0.1 0.0.0.0 area 0
A(config-router)# Network 20.0.0.1 0.0.0.0 area 1
A(config-router)# Network 192.168.0.1 0.0.0.0 area 0
A(config-router)# Exit
A(config)# Exit
A# Show IP Route
C
C
O
C
O
A# Ping 10.0.0.2
!!!!!
Second Router
B> Enable
B # Configuration Terminal
B(config)# Router OSPF 1
(Range 1 to 65335)
B (config-router)# Network 10.0.0.2 0.0.0.0 area 0
B (config-router)# Network 192.168.1.1 0.0.0.0 area 0
B (config-router)# Exit
B(config)# Exit
B # Show IP Route
C
O
O
O
C
B# Ping 10.0.0.1
!!!!!
Third Router
C> Enable
C # Configuration Terminal
C(config)# Router OSPF 1
(Range 1 to 65335)
C (config-router)# Network 20.0.0.2 0.0.0.0 area 1
C (config-router)# Network 172.16.0.1 0.0.0.0 area 1
C (config-router)# Exit
C(config)# Exit
C # Show IP Route
O
C
C
O
O
C# Ping 10.0.0.1
!!!!!
WAN
192.1
Banga
Mumb
Sing
Sydn
60
12
28
2
192.198
192.168
68.10.
lore
ai
apor
ey
.10.137
.10.133
.10.129
132/3
136/3
128/3
192.1
and
138
134
e 130
192.
N
et
0
68.10.
192.
168.
Link State
OSPF(Open Shortest Path First)ISIS(Intermediate System to Intermediate System)