Академический Документы
Профессиональный Документы
Культура Документы
CYBER SECURITY
1.PREVENTING
2.SECURING
3.DEFENDING
NETWORKING INCLUDES
1.MONITORING
2.DATA EJECTING (OR) ADDING
3.NETWORKING MEANS -INTERCONECTING TWO DEVICES
---------------------------
4.MAY BE WIRED (OR) WIRELESS
5.WIRED IS SECURED
DATA TRANSMISSION
1. DATA TRANSMISSION CAN BE BOTH DONE BY WIRED (OR) WIRELESS
2. WIRED-THROUGH CABLES
3. WIRELESS-THROUGH INTERNET
DATA FLOWING
1.DATA FLOWING CAN BE DONE USING SWITCH (OR) MODEM
DIFFERENCE BETWEEN WIRED AND WIRELESS
CONECTION
WIRED WIRELESS
-------------- ------ -----
1.NO INTERMEDIATE DEVICE INTERMEDIATE DEVICE
2.NO QUICK ACESS QUICK ACCES
3.COST--HIGH COST—LOW
4.SECURED UNSECURE
5.LIMITED DISTANCE UNLIMITED DISTANCE
6.SPEED--HIGH SPEED—LOW
7.NO DATA LOSS DATA LOSS POSSIBLE
NODE
1.NAME OF THE DEVICES IS CALLED*NODE*
*EX:HUB,ROUTER,PC
HOST
1. DEVICES WHICH SEND (OR) RECEIVE IS CALLED HOST
*SENDING DEVICE=HOST
*RECEIVING DEVICE=HOST
END DEVICE
1.DESTINATION (OR) RECIVING DEVICE IS CALLED END DEVICE
2.EX:HOTSPOTING MOBILE ----- RECIVING MOBILE, IN THIS CASE
RECEVING MOBILE IS END DEVICE
SWITCH
1.SWITCH IS NOTHING BUT A MULTI PORT DEVICE
--------- ---------
↓ ↓ ↓
PC-1 SWITCH PC-2
ROUTER
1.IT IS USED TO CONNECT DIFFERENT AREA NETWORK
-------- -------
↓ ↓ ↓
PC-1 SWITCH PC-2 (OR)
TO CONNECT DIFFERENT AREA NETWORK
INTERNET
1.COMONLY USED INTERNET GLOBALY (GOOGLE)
INTRANET
1.LOCAL CONNECTION (LAN), NO INTERNET, JUST COMMUNICATION
-------- --------
EXTRANET
1.EXPANSION OF INTRANET
2.NO INTERNET
3.PRIVATE
4.COMPANY (BRANCH)
IEEE
1.STANDARD CODE
2.ISO – CERTIFIED
3.INSTITUTE OF ELECTRICAL ENGINERING (EXPANSION OF IEEE)
4.ITP FORMAT
5.TECHNOLOGY STANDARD CODE
6.INVENTED IN 1980 FEB, MONTH COMBINE THESE TO FORM 802
(SOME OF THE TECHNOLOGY CODE)
*WIFI – 802.11 *ETHERNET – 802.3
*BLUETTOTH – 802.15.1 *TOKEN RING – 802.5
*TRUNKING – 802.1Q
TRUNKING
1. SEPARATE AND SEND
2. EX:CABLE TV ,SINGLE CABLE BUT 200 CHANNELS
MODES OF TRANSMISSON
1.SIMPLEX – ONE WAY COMMUNICATION
*SEND ONLY ,NO RECIEVE
*EX: RADIO ,TV
2.HALF-DUPLEX – TWO WAY COMMUNICATION,BUT CAN ONLY
SEND (OR) RECEIVE AT A TIME
*EX:WALKIE TALKIE
3.FULL-DUPLEX – TWO WAY COMUNICATION
*CAN SEND AND RECEIVE AT SAME TIME
* EX:CELL PHONE
BIT
1.SIZE OF A DATA (SMALL)
2.SINGLE DIGIT – 0 (OR) 1
BYTE
1. 8 BIT = I BYTE
2. 8 BIT MAY BE 0 LIKE (00000000)
3. 8 BIT MAY BE 1 LIKE (11111111)
4. 8 BIT MAY BE LIKE COMBINATION OF 0 AND 1 (01010101)
BINARY
1. BINARY VALUE – NO OF 0,1
2. COMMON TERM OF BIT, BYTE
INTEGERS
1. BOTH NEGATIVE AND POSITIVE VALUE OF NUMBERS
*EX:-3,-2,-1,0,1,2,3
DECIMEL
1. POINT NUMBER
*EX:10.1
HEXA DECIMAL
1.HEXA=16
2.0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F
OCTECT
1. OCT=8
2. OCTECT NUMBERS=0,1,2,3,4,5,6,7
3. OCTECTC RANGE = 255
BINARY TO DECIMAL
1.ANYTHING POWER 0 =1
2.NUMBER LANE
TYPES OF DATA SPEED
1.Mb/S – MEGA BIT PER SEC (WHEN WIRELESS, SLOW)
2.MB/S – MEGA BYTE PER SEC (HIGH SPEED , WIRED,PENDRIVE)
3.Kb/S – KILO BIT PER SEC (1024 BIT EQUALS)
4.KB/S – KILO BYTE PER SEC
TYPES OF ADDRESS
1.UNICAST ADDRESS - ONE TO ONE (SEND (OR) RECIVE )
*ONE SOURCE TO ANOTHER SOURCE
--------------------------------
↓ ↓
SOURCE – 1 SOURCE – 2
2.MULTI CAST ADDRESS – ONE TO MANY
*ONE SOURCE TO MANY SOURCE
→ SOURCE – 1
↓ ↓ ↓
SOURCE – 2 SORCE-3 SOURCE – 4
3.BROAD CAST ADDRESS - ALL IP TO FIND CORRECT IP
*SWITCH (OR) ANY INTERMEDIATE DEVICE TRANSFER
DATA FROM ONE SOURCE TO ALL SOURCE AND BASED
ON IP FOUNDS CORECT SOURCE AND TRANSFER DATA
IP ADDRESS
*IP – INTERNET PROTOCAL
*A DEVICE WHICH SEND OR RECEIVE MUST HAVE IP AMD MAC
*EVERY DEVICE HAVE UNIQUE IP THAT CAN BE CHANGED
*IP ALSO CALLED – LOGICAL ADDRESS,INTERNET ADDRESS
*IP CAN BE ASSIGNED MANUALLY (OR) AUTOMATICALLY
(IP CAN BE SAME WHEN)
CHINA
INDIA
MAC ADDRESS
*MAC – MEDIA ACCES CONTROL
*MAC – UNIQUE IDENTITY
*COMPOLSORY ONLY ONE WORLD WIDE (DIFFERENT FROM IP)
*ALL DEVICES WHICH SEND,RECEIVE AND ALSO INTERMEDIATE
DEVICE HAVE MAC (EX: BLUETOOTH HAVE MAC BUT NOT IP)
*OTHER NAME FOR MAC – PHYSICAL ADDRESS, HARD WARE
ADDRESS,BURNED IN ADDRESS
*MAC CANNOT BE CHANGED
*WITHOUT MAC AND IP NO TRANSMISSON CAN BE DONE
COMMAND TO FIND IP
1.GO TO CMD
2.TYPE IPCONFIG (TO FIND IP)
PROTOCALS
1.SET OF RULES AND FUNCTIONALITIES
2.EVERY PROTOCAL ARE INDIVIDUVALLY ASSIGNED TO A WORK
3.SOME PROTOCALS ARE SAME BUT HAVE SOME ADVANTAGE AND
DISADVANTAGE
4.WITHOUT PROTOCAL NO FUNCTION WILL HAPPEN
TYPES OF PROTOCALS
1. TCP 10. IMAP 19. HDLC
2. IP 11. POP – 3 20. FRAME RELAY
3. FTP 12. UDP 21. SCTP
4. HTTP 13. NTP 22. DCCP
5. HTTPS 14. ICMP 23. ITU.X225
6. SMTP 15. IGMP 24. TLS
7. SSIT 16. ARP 25. XDR
8. TELNET 17. RAR 26. MIME
9. TFTP 18. PPP 27. SSI
28. NET-BIOS 34. OSPF 40. RSTP
29. DHCP 35. IGRP
30. ATM 36. EIGRP
31. DNS 37. EGP
32. SNMP 38. BGP
33. RIP 39. STP
OSI MODEL
7. APPLICATION LAYER
6. PRESENTATION LAYER
5. SESSION LAYER
4. TRANSPORT LAYER
3. NETWORK LAYER
2. DATA LINK LAYER
1. PHYSICAL LAYER
(OSI – OPEN SYSTEM INTERCONNECT)
NETWORKING DEVICES
1. REPEATER
2. HUB
3. SWITCH
4. BRIDGE
5. ROUTER
6. B-ROUTER
7. GATE WAY
8. FIREWALL
9. MODEM
10.NIC PORT
TYPES OF NETWORK
1. PAN - SINGLE PERSON (OR) PERSONAL (PERSONAL AREA
NETWORK)
2. LAN – LIMITED CONNECTION (OR) LAB (LOCAL AREA
NETWORK)
3. CAN – COMBINATION OF LAN (OR) COLLEGE (CAMPUS AREA
NETWORK)
4. MAN – ENTIRE CITY COVERAGE LAN (METROPOLITEN AREA
NETWORK)
5. WAN – COMBINATION OF LAN AND MAN (WIRED AREA
NETWORK)
BASIC
6. WLAN – WIRELESS AREA NETWORK (WIFI)
7. VPN - VIRTUVAL PRIVATE NETWORK (ENCRYPED, SECURE)
8. VLAN - VIRTUVAL LOCAL AREA NETWORK
9. SAN - STORAGE AREA NETWORK (HI SPEED)
10.EPN – ENTERPRICE PRIVATE NETWORK (ORGANISED)
TOPLOGY
*STRUCTURE OF NETWORK (HOW DEVICES ARE CONNECTED)
TYPES OF TOPOLOGY
1. PHYSICAL TOPOLOGY
2. LOGICAL TOPOLOGY
PHYSICAL TOPOLOGY
*IT SAYS ABOUT HOW THE DEVICES ARE INTERLINKED THROW
CABLES
*STRUCTURAL TOPOLOGY COMES UNDER THIS
TYPES OF PHYSICAL TOPOLOGY
1. BUS TOPOLOGY
2. STAR TOPOLOGY
3. RING TOPOLOGY
4. MESH TOPOLOGY
5. HYBRID TOPOLOGY
6. TREE TOPOLOGY
1.BUS TOPOLOGY
*PARALLEL CONNECTION OF DEVICES (SINGLE LANE OF WIRE
(OR) CABLE)
*BASIC TOPOLOGY
*NOT WORK PROPERLY
*MAY BE ZIG ZAG (OR) IN ANY FORMAT BUT SHOULD BE
CONNECTED IN SINGLE LANE OF WIRE (OR) CABLE
---------------
2.STAR TOPOLOGY
*CENTRALISED ACCES POINT
*IF DEVICE REMOVED (OR) ADDED NO PROBLEM WILL CAUSE,
DUE TO SEPARATE PORT
*HAS INTERMEDIATE DEVICE SUCH AS SWITCH, NETWORKING
DEVICES ETC…
*DATA TRANSFER FROM (DEVICE 1 TO HUB TO DEVICE 3)
DEVICE -1
HUB
----------------------
DEVICE-2
DEVICE-4 DEVICE-3
3.RING TOPOLOGY
*EACH DEVICE SHOULD BE CONNECTED WITH TWO DEVICES
DIRECTLY
*DATA CAN MOVE CLOCK WISE (OR) ANTI CLOCK WISE BUT
ANY ONE DIRECTION AT A TIME
*INTERFACE NAME TOKEN RING
*NO INTERMEDIATE DEVICE
*IF ANY DEVICES REMOVED (OR) ADDED IT WILL AFFECT FLOW
OF DATA DUE TO RING FLOW
4.MESH TOPOLOGY
*EACH DEVICE TO CONNECT WITH ALL OTHER DEVICE
*IF ANY LINK DATA TRANSMIT IS POSSIBLE (DATA FROM
DEVICE 1 TO DEVICE 3 BY DEVICE 1 TO DEVICE 2 AND TO
DEVICE 3
*DUE TO INTERLINK OF ALL DEVICE DATA FLOW TO ALL
DEVICE , SO DATA LOSS IS POSSIBLE
DEVICE 1
DEVICE 2
DEVICE 3
5.HYBRID TOPOLOGY
*COMBINATION OF ANY TWO TOPOLOGY IS CALLED
HYBRID TOPOLOGY
*STAR TOPOLOGY WITH RING TOPOLOGY
6.TREE TOPOLOGY
*BRANCHES OF DEVICE
*SPLITS FROM ONE DEVICE TO MULTIPLE DEVICE
ROUTER
SWITCH SWITCH
HUB HUB
DEVICES
LOGICAL TOPOLGY
*CAN BE DESIGNED AND CONNECTED AS PER USER CONVINIENCE
NETWORKING CABLE
*COMES UNDER LAYER- 1 (PHYSICAL LAYER) IN OSI MODEL
*IMPORTANT ROLE IN NETWORKING
*USED TO TRANSMIT DATA FROM ONE DEVICE TO ANOTHER
TYPES OF NETWORKING CABLES
1. COAXIAL CABLE
2. FIBER OPTICAL
3. TWISTED PAIR CABLE
1.COAXIAL CABLE
*TO TRANSMIT SIGNAL FREQUENCY
*MAXIMUN NOT IN USE , USED WHILE TRANSMITING SIGNAL
*EX:TV CABLE
ETHERNET
*HIGH SPEED TRANSFER
*LAYER – 2 (DATA LINK)
*USED TO HIGH SPEED CONNECTION BETWEEN TWO DEVICES
WITH IN A LAN
*EX:PC,ROUTER
*ETHERNET IS A PORT
TYPES OF ETHERNET CABLE
1.ETHERNET
2.FAST ETHERNET
3. GIGA BIT ETHERNET
1.ETHERNET
*10 BASE – T (T = TWISTED PAIR , BASE =BASEBAND)
*10Mb/S
*FULL DUPLEX – 802.3X
*HALF DUPLEX – 802.3i
*ETHERNET – 802.3
2.FAST ETHERNET
*100 BASE – T (T = TWISTED PAIR , BASE =BASEBAND)
*100Mb/S
*FAST ETHERNET – 802.3u
*TWISTED PAIR = 100 METERE
*MULTIMODE = 2 KM
*SINGLE MODE = 25 KM
ENCAPSULATION DECAPSULATION
7.APPPLICATION LAYER 7.APPPLICATION LAYER
6.PRESENTATION LAYER 6.PRESENTATION LAYER
5.SESSION LAYER 5.SESSION LAYER
4.TRANSPORT LAYER 4.TRANSPORT LAYER
3.NETWORK LAYER 3.NETWORK LAYER
2. DATA LINK LAYER 2. DATA LINK LAYER
1.PHYSICAL LAYER 1.PHYSICAL LAYER
PHYSICAL LAYER
*LAYER – 1 IN OSI MODEL
*CONVERTION OF BIT
*ACTUVAL DISTANCE BETWEEN SOURCE AND DESTINTION
*DATA CONVERTED TO DATA BITS
*TYPES OF PROTOCAL
1.ETHERNET
2.FDDI – FIBER DISTRIBUTED DATA INTERFACE
*PHYSICAL LAYER SAYS ABOUT CONNECTION BETWEEN DEVICE
*TYPES OF DEVICES
1.HUB
2.REPEATER
------------------------------------
FCS FCS
*CHECK IF CODE DOESN’T MATCH SHOWS ERROR
MAC – MEDIA ACCESS CONTROLL
*CSMA – CARRIER SELLS MULTIPLE ACESS
*CD – COLLISSON DETECTION
*SWITCH – 24 ETHERNET PORT – MAC ADDRESS (UNIQ FOR 24)
*MAC HANDLES ACCESS TO SHARED MEDIA SUCH AS ETHERNET
*UNIQUE IDENTITY OF A DEVICE
*UNIQUE IDENTITY OF NIC PORT
*MAC – 48 BITS AND 6 GROUP OF TWO HEXA DECIMAL
SEPERATED BY - , : , / ,NO SEPERATOR
EX:00: E5 :3C:7B:F2:OD
*MAC ADDRESS WAS SEPERATED BY FIRST 24 BIT , 24 BIT
*FIRST 24 BIT – OUI (ORGANISATIONAL UNIQUE IDENTIFIER
*SECOND – 24 BIT – EVI (EXTENDED UNIQUE IDENTIFIER
FRAME
-------------------------------------------------------------
FRAME
*FRAME CONTAINS – MAC , IP ,DATA, FCS
MAC 1 MAC 2 IP 1 IP 2 DATA FCS
NETWORK LAYER
*CONVERT DATA TO PACKETS
*NETWORKING LAYER PROTOCOLS – IP
*NETWORKING LAYER PROTOCOLS – ROUTER
*PERMIT DIFFERENT TYPE NETWORK TO INTER CONNECT
IP
*LOGICAL ADDRESS
*IP IS A UNIQUE ADDRESS IN A NETWORK
*IP IS A COMUNICATION PROTOCOL
*IT IS A THIRD LAYER
*TYPES – IPV4, IPV6
IPV4
*IT HAVE 32 BIT
*SEPERATED BY 4 OCTECT
*0 TO 255 (RANGE)
CLASSES
*CLASS – A (O – 127)
*CLASS – B (128 – 191)
*CLASS – C (192 – 223)
*CLASS – D (224 – 239)
*CLASS – E (240 – 255)
(0 , 127 ARE NOT USED BECAUSE IT WAS A LOOP BACK (CHECK)
CLASS NETWORK ADDRESS HOST
A 1 - 126 16 MILLION
B 128 - 191 65 THOUSAND
C 192 - 223 254
D 224 - 239 NOT IN USE
E 240 - 255 NOT IN USE
IPV4 PORTION
*NETWORK PORTION (N/W) – ASSIGNED VALUE CANNOT BE
CHANGED
*HOST PORTION – CAN BE CHANGED
CLASS – A NETWORK HOST HOST HOST
CLASS – B NETWORK NETWORK HOST HOST
CLASS – C NETWORK NETWORK NETWORK HOST
SUBNET MASK
*TO IDENTIFIY EASILY HOW MANY NETWORK PORTION AND
HOST PORTION OF PARTICULAR IP ADDRESS
*IT SAYS ABOUT THE HIGHEST PORTION OF NETWORK
QUTIENT AND LOWEST PORTION OF HOST QUTIENT
CLASS FORMAT
A NETWORK, HOST, HOST, HOST –
255.0.0.0
B NETWORK, NETWORK, HOST,
HOST – 255.255.0.0
C NETWORK, NETWORK,
NETWORK, HOST – 255. 255.
255.0
CIDR VALUE
EXPANSION = CLASLESS INTER DOMAIN ROUTING
*CIDR IS BASSICALY CONVERSION OF IP TO BINARY AND VALUE OF
ONE
CIDR VALUES
/8 255.0.0.0 1A 16,777,214
/9 255.128.0.0 128 B 8,388,352
/ 255.192.0.0 64 B 4,194,176
10
/ 255.224.0.0 32 B 2,097,088
11
/ 255.240.0.0 16 B 1,048,544
12
/ 255.248.0.0 8B 524,272
13
/ 255.252.0.0 4B 262,136
14
/ 255.254.0.0 2B 131,068
15
/ 255.255.0.0 1B 65,534
16
/ 255.255.128.0 128 C 32,512
17
/ 255.255.192.0 64 C 16,256
18
/ 255.255.224.0 32 C 8,128
19
/ 255.255.240.0 16 C 4,064
20
/ 255.255.248.0 8C 2,032
21
/ 255.255.252.0 4C 1,016
22
/ 255.255.254.0 2C 508
23
/ 255.255.255.0 1C 254
24
/ 255.255.255.128 2 subnets 124
25
/ 255.255.255.192 4 subnets 62
26
/ 255.255.255.224 8 subnets 30
27
/ 255.255.255.240 16 subnets 14
28
/ 255.255.255.248 32 subnets 6
29
/ 255.255.255.252 64 subnets 2
30
SUBNETTING
*TO REDUCE WASTAGE OF IP
TYPES OF SUBNETTING
*FLSM – FIXED LENGTH SUBNET MASK
*VLSM – VARIABLE NET SUBNET MASK
FLSM
*EQUAL NO OF HOST
*EX: IF DIVIDED INTO 4 PARTS ALL PARTS SHOULD HAVE EQUAL NO OF
HOST
VLSM
*UN EQUAL NO HOST
*EX: IF DIVIDED INTO 4 PARTS ALL PARTS DO NOT HAVE EQUAL
NO OF HOST
CLASLESS ADDRESSING
*NETWORK PORTION WHICH FOLLOWS THE NETWORK RULES
IS CALLED – CLASSFULL ADDRESS
*NETWORK PORTION WHICH DOES NOT FOLLOWS NETWORK
RULES IS CALLED – CLASLESS ADDRESS
TRANSPORT LAYER
*CONVERT PACKETS INTO SEGMENTS
*END TO END COMMUNICATION OVER A NETWORK
*SEGMENTING, FLOW CONTROLL, ERROR CONTROLL
*TWO WAY OF CONNECTION
- CONNECTION ORIENTED TANSMISSION
- CONECTIONLESS TRANSMISSION
CONNECTION ORIENTED TRANSMISSION
*ACCURATE DELIVERY OF PACKETS
*FLOW CONTROLL
*ACKNOWLIDGEMENT PROCESSING
*SECURE
*SEQUENCE OF TRANSMISSION
*ORIENTED TRANSMISSION
CONNECTIONLESS TRANSMISSION
*UN RELLIABLE DATA TRANSMISSION
*BASED ON UDP
*PACKET MAY BE LOSS
*ACKNOWLIDGEMENT NOT PROCESSED
*UN SECURE
*UN SEQUENCE
TCP – THREE WAY HAND SHAKING
*SINKORIZATION (SEND)
*SINKORAIZATION ACKNOWLEDGEMENT (RESPONSE)
*ACKNOWLEDGMENT (RECEIVING)
ACKNOWLIDGEMENT
FIVE FUNCTION OF TRANSPORT
*SEGMENTATION
*CONNECTION MANAGEMENT
*FLOW CONTROLL
*CONNECTION MULTIPLEXING
PORT NUMBER
*RANGE OF PORT NUMBER – 65535
*CLASIFICATION OF PORT NUMBER
*SYSTEM PORT (OR) WELL KNOWN PORT = (0 TO 1023)
*USER PORT (OR) REGISTER PORT = (1024 TO 49151)
*PRIVATE PORT (OR) DYNAMIC PORT = (49152 TO 65535)
SESSION LAYER
*MANAGE AND CONTROLLS CONNECTION BETWEEN PC
*IT ESTABLISHES, MANAGES AND TERMINATES THE
CONNECTION BETWEEN LOCAL AND REMOTE APP
*THIS LAYER IS MAINLY RESPONSIBLE FOR COMMUNICATION
BETWEEN ANY TWO DEVICES
*3 WAY HAND SHAKING METHOD WIDELY USED TO ESTABLISH
AND END CONNECTION
*PROTOCOLS - ITV X225
PRESENTATION LAYER
*ENCRYPTION AND DECRYPTION
*TRANSLATION
*COMPRESSION ARE THE FUNCTIONS
*THIS LAYER ENCRYPTS AND DECRYPTS
*IT CONVERT DATA INTO READBLE FORMAT FOR APPLICATION
LAYER
*PROTOCOLS – XDR, TLS, SSL, MIME
APPLICATION LAYER
*THIS LAYER IS RESPONSIBLE FOR PROVIDING SERVICES FOR
*VISUVAL
*PROTOCOLS – DNS, STP, HTTP, SMTP, TELNET
TCP/IP
*CONSIST OF 4 LAYER
*REALTIME OSI MODEL
IPV6
*LATEST VERSION
*CONSIST OF 128 BITS
*IT WAS DIVIDED BY 8 GROUPS
*EACH GROUP CONSIST OF 16 BIT
*IT IS IN THE HEXA DECIMAL FORMAT
*INCREASED ADDRESS SPACE
*SIMPLIFIED CONFIGURATION
*BACKWARD COMPAITABILITY WITH IPV4
*INTERGRATED SECURITY (IP SEC)
RULES
*MULTIPLE 0 CAN BE WRITTEN AS : (OR) 1
*IT IS SEPERATED BY FIRST 64 AND LAST 64
*FIRST 64 BIT IS SEPERATED BY 48 BIT (NETWORK ADDRESS)
AND 16 BIT (SUBNET)
PREFIX VALUES
8
32
64
TYPES OF IPV6 ADRESS
*GLOBAL UNICAST ADDRESS – (2000::/3)
*LINK – LOCAL ADDRESS – (FE80::/0)
*SITE LOCAL ADDRESS – (FC00::/7)
*MULTICAST – (FF00::/8)
*ANY CAST – (FFO2::/64)
*LOOP BACK – (;:1/128)
COMMAND
*COMMAND USED HEAR IN CISCO PACKET TRACER INSTEAD OF
CMD
*TO BACK FROM ANY LAYER TO PREVILEGE LAYER PRESS CTRL+Z
*TO BACK ONE STEP #EXIT, END TO RETURN TO PREVIELGING
*NOT CASE SENSITIVE (MAY BE CAPS OR SMALL)
*PING ONE OF THE COMMAND TO CHECK,(ARP USED TO FIND
MAC USING IP ) , FIRST GO TO CL
-------- ROUTER
---------SWITCH
PC 1--------------- ---------------- PC 2
COMMAND TO CHANGE HOSTNAME
*ROUTER >ENABLE
*ROUTER(CONFIG)#HOSTNAME CCNA (ANYTHING CAN BE )
*CCNA(CONFIG)#
COMMAND TO BANNER (INTIMATION)
*ROUTER(CONFIG)#BANNER MOTD “WELCOME” (CAN BE ANY)
(GLOBAL CONFIGURE MODE) , (MESSASGE OF THE DAY MOTD)
COMMAND TO REMOVE IP
*ROUTER(CONFIG)# NO IP
COMMAND TO SAVE PERMANENTLY (TEMPORVARY TO PERMANT)
*ROUTER# COPY RUNNING – CONFIG STARTUP – CONFIG
(PREVIELIGING MODE)
COMMAND TO SAVE CLOCK
*ROUTER# CLOCK SET (TIME) 10:45:00 11FEB 2020 (DAY)
(PREVIELIGING MODE)
COMMAND TO PASSWORD
*ROUTER(CONFIG)# ENABLE PASSWORD 123(CAN BE ANY)
(GLOBAL MODE)
COMMAND TO ASSIGN DHCP (AUTO ASIGN IP TO ALL DEVIECE)
(AFTER SETTING IP TO ROUTER ,SUBNET MASK SHOULD BE SAME)
*ROUTER(CONFIG)# IP DHCP POOL CISCO
*ROUTER(DHCP - CONFIG)#NETWORK 192.168.10.1 255.255.
255.0 (IP SHOULD BE IN ORDER AND SUBNET MASK SHOULD
BE SAME)
*ROUTER(DHCP – CONFIG) #DEFAULT-ROTER 192.168.10.1
*ROUTER(DHCP – CONFIG)#DNS – SERVER 8.8.8.8 (DNS
INSTEAD OF SERVER NOT IN USE IP)
*ROUTER(CONFIG)#IP DHCP EXCLUDE – ADDRESS 192.168.10.2
(IF YOU WANT THIS IP SHOULD NOT BE ASSIGNED)
(SUBNET MASK SHOULD BE SAME IN IP CONFIGURATION AND
DHCP COMMANDS)
CONTINUED
COMMAND TO SSH (REMOTE ACCES SECURELY )
(AFTER ASSIGNING IP TO ALL DEVICE)
*IF HOST NAME IS NOT CHANGED SSH WILL NOT WORK
*ROUTER(CONFIG)#HOSTNAME CEH (CAN BE ANY)
*CEH(CONFIG)#IP DOMAIN – NAME CISCO (CAN BE ANY)
*CEH(CONFIG)#USERNAME CCNA (CAN BE ANY) PASSWORD
(CAN BE ANY)
*CEH(CONFIG)#CRYPTO KEY GENERATE RSA
*1024 (ANYTHING CAN BE ASSIGNEND IN GIVEN RANGE)
*CEH(CONFIG)#IP SSH VERSION 2
*CEH(CONFIG)#LINE VTY 0 15 (NUMBER OF USERS CAN ACCES
REMOTE)
*CEH(CONFIG – LINE)#LOGIN LOCAL
*CEH(CONFIG – LINE)#TRANSPORT INPUT SSH
*CEH(CONFIG – LINE)#EXIT
*CEH(CONFIG)#ENABLE SECRET 123 (CAN BE ANY THING)
(TO CHECK OPEN ANY PC AND OPEN CMD TYPE SSH -L CCNA
(USERNAME) 192.168.10.1 (IP))
COMMAND TO ERASE CONFIGURATION
(CANNOT WORK BEFORE SAVING PERMANENTLY)
*CEH(CONFIG)# ERASE RUNNING – CONFIG
(GLOBAL MODE)
IMAP
*IMAP (Internet Message Access Protocol) is a standard email
protocol that stores email messages on a mail server, but allows the
end user to view and manipulate the messages as though they were
stored locally on the end user's computing device(s)
POP -3
*Post Office Protocol version 3 (POP3) is a standard mail protocol
used to receive emails from a remote server to a local email
client. POP3 allows you to download email messages on your local
computer and read them even when you are offline.
NTP
*The Network Time Protocol (NTP) is a networking protocol for
clock synchronization between computer systems over packet-
switched, variable-latency data networks. In operation since before
1985, NTP is one of the oldest Internet protocols in current
use. NTP was designed by David L.
TFTP
*Trivial File Transfer Protocol (TFTP) is an Internet software
utility for transferring files that is simpler to use than the File Transfer
Protocol (FTP) but less capable. It is used where user authentication
and directory visibility are not required.
RIP
*Routing Information Protocol (RIP) is a dynamic routing
protocol which uses hop count as a routing metric to find the best path
between the source and the destination network. It is a distance vector
routing protocol which has AD value 120 and works on the application
layer of OSI model. RIP uses port number 520.
DHCP
*Dynamic Host Configuration Protocol (DHCP) is
a protocol for assigning dynamic IP addresses to devices
on a network. With dynamic addressing, a device can
have a different IP address every time it connects to
the network. In some systems, the device's IP address
can even change while it is still connected .
DNS
*Domain Name Servers (DNS) are the Internet's equivalent
of a phone book. They maintain a directory of domain names and
translate them to Internet Protocol (IP) addresses. This is necessary
because, although domain names are easy for people to
remember, computers or machines, access websites based on IP
addresses.
SNMP
*Simple Network Management Protocol (SNMP) is a set of
protocols for network management and monitoring. These protocols
are supported by many typical network devices such as routers, hubs,
bridges, switches, servers, workstations, printers, modem racks and
other network components and devices.
VLAN
*VIRTUAL LOCAL AREA NETWORK, VIEWED A GROUP OF DEVICE ON
DIFFERENT PHYSICAL LAN CAN COMMUNICATE WITH EACH OTHER AS
IF THEY WERE ALL ON THE SAME PHYSICAL LAN
*VLAN IS NOTHING BUT COMMUNICATION BETWEEN LAN USING
SWITCH
VLAN RANGE
*VLAN RANGE 1 TO 1005
* VLAN 1 TO 1002 - CAN BE USED (1 IS RESERVED VLAN)
*VLAN 1002 TO 1003 – UNUSED VLAN (USED IN SWITCH INSIDE)
TRUNKING PORT
*IT IS USED TO CONNECT MULTIPLE VLANS INTO A SINGLE INTERFACE
*IT IS USED TO ONLY SWITCH TO SWITCH CONNECTION
ACCESS PORT
*SWITCH PORT TO CONNECT WITH SYSTEM CONNECTION IS CALLED
ACCESS PORT
TAGGING
*IT IS A METHOD THROUGH WHICH MORE THAN ONE VLAN IN
HANDLED ON A PORT VLAN TAFGGING IS USED TO TELL WHICH PACKET
BELONGS TO WHICH VLAN ON THE OTHER SIDE
DATA VLAN
*THE DATA VLAN IS A VLAN THAT IS CONFIGURED TO CARRY USES –
GENERATED TRAFFIC
*A VLAN CARRYING VOICE (OR) MANGEMENT TRAFFIC COULD NOT BE
PART OF DATA VLAN
VOICE VLAN
*VOICE LAN FEAUTURE ENABLES ACCESS PORTS TO CARRY IP VOICE
TRAFFIC FROM AN IP PHONE
*VOIP – VOICE OVER INTERNET PROTOCAL
-------SWITCH NO 1 -----------SWITCH NO 2
TRUNKING PORT
ACCESS PORT
VLAN 10 VLAN 20 VLAN 10 VLAN 20
(VLAN ONLY WORK ON SWITCH)
(VLAN SHOULD BE SAME IN SWITCH ONE AND TWO)
-----------------------------------------------------------------------
COMMAND TO VLAN
SWITCH – 1
*SWITCH>ENABLE
*SWITCH#CONFIGURE TERMINAL
*SWITCH(CONFIG)#VLAN 10 (VLAN CAN BE ANY UNDER RANGE)
*SWITCH(CONFIG-VLAN)#NAME COMPUTER (CAN BE ANY NAME)
*SWITCH(CONFIG-VLAN)#EXIT
*SWITCH(CONFIG)#VLAN 20
*SWITCH(CONFIG-VLAN)#NAME BIO (CAN BE ANY NAME)
*SWITCH(CONFIG-VLAN)#EXIT
*SWITCH(CONFIG)#VLAN 30
*SWITCH(CONFIG-VLAN)#NAME IT (CAN BE ANY NAME)
*SWITCH(CONFIG-VLAN)#EXIT
*SWITCH(CONFIG)#EXIT
*SWITCH# WRITE
*SWITCH# SHOW VLAN BRIEF
*SWITCH#CONFIGURE TERMINAL
*SWITCH(CONFIG)#INTERFACE FA0/1 (NO OF PC, EX IT IS PC NO 1)
*SWITCH(CONFIG-IF)#SWITCHPORT MODE ACCESS
*SWITCH(CONFIG-IF)#SWITCHPORT ACCESS VLAN 10
*SWITCH(CONFIG-IF)#EXIT
*SWITCH(CONFIG)#INTERFACE FA0/2 (NO OF PC,EX IT IS PC NO 2)
*SWITCH(CONFIG-IF)#SWITCHPORT MODE ACCESS
*SWITCH(CONFIG-IF)#SWITCHPORT ACCESS VLAN 20
*SWITCH(CONFIG-IF)#EXIT
*SWITCH(CONFIG)#INTERFACE FA0/3 (NO OF PC, EX IT IS PC NO 3)
*SWITCH(CONFIG-IF)#SWITCHPORT MODE ACCESS
*SWITCH(CONFIG-IF)#SWITCHPORT ACESS VLAN 30
*SWITCH(CONFIG-IF)#EXIT
*SWITCH(CONFIG)#EXIT
*SWITCH#WRITE
*SWITCH# CONFIGURE TERMINAL
*SWITCH(CONFIG)#INTERFACE FA0/4 (NO OF SWITCH OTHERS ARE
ACESS PORT)
*SWITCH(CONFIG-IF)#SWITCHPORT MODE TRUNK
*SWITCH(CONFIG-IF)#EXIT
*SWITCH(CONFIG)#EXIT
*SWITCH# SHOW INTERFACES TRUNK
SWITCH – 2
*SWITCH>ENABLE
*SWITCH#CONFIGURE TERMINAL
*SWITCH(CONFIG)#VLAN 10 (VLAN CAN BE ANY UNDER RANGE)
*SWITCH(CONFIG-VLAN)#NAME COMPUTER (CAN BE ANY NAME)
*SWITCH(CONFIG-VLAN)#EXIT
*SWITCH(CONFIG)#VLAN 20
*SWITCH(CONFIG-VLAN)#NAME BIO (CAN BE ANY NAME)
*SWITCH(CONFIG-VLAN)#EXIT
*SWITCH(CONFIG)#VLAN 30
*SWITCH(CONFIG-VLAN)#NAME IT (CAN BE ANY NAME)
*SWITCH(CONFIG-VLAN)#EXIT
*SWITCH(CONFIG)#EXIT
*SWITCH# WRITE
*SWITCH# SHOW VLAN BRIEF
*SWITCH#CONFIGURE TERMINAL
*SWITCH(CONFIG)#INTERFACE FA0/1 (NO OF PC, EX IT IS PC NO 1)
*SWITCH(CONFIG-IF)#SWITCHPORT MODE ACCESS
*SWITCH(CONFIG-IF)#SWITCHPORT ACCESS VLAN 10
*SWITCH(CONFIG-IF)#EXIT
*SWITCH(CONFIG)#INTERFACE FA0/2 (NO OF PC,EX IT IS PC NO 2)
*SWITCH(CONFIG-IF)#SWITCHPORT MODE ACCESS
*SWITCH(CONFIG-IF)#SWITCHPORT ACCESS VLAN 20
*SWITCH(CONFIG-IF)#EXIT
*SWITCH(CONFIG)#INTERFACE FA0/3 (NO OF PC, EX IT IS PC NO 3)
*SWITCH(CONFIG-IF)#SWITCHPORT MODE ACCESS
*SWITCH(CONFIG-IF)#SWITCHPORT ACESS VLAN 30
*SWITCH(CONFIG-IF)#EXIT
*SWITCH(CONFIG)#EXIT
*SWITCH#WRITE
*SWITCH# CONFIGURE TERMINAL
*SWITCH(CONFIG)#INTERFACE FA0/4 (NO OF SWITCH OTHERS ARE
ACESS PORT)
*SWITCH(CONFIG-IF)#SWITCHPORT MODE TRUNK
*SWITCH(CONFIG-IF)#EXIT
*SWITCH(CONFIG)#EXIT
*SWITCH# SHOW INTERFACES TRUNK
(CHECK OPEN ANY DEVICE AND GO TO CMD AND TYPE PING (IP))
(SUBNET MASK SHOULD BE SAME IN DEVICE 1 IN SWITCH AND DEVICE
2 IN SWITCH 2 , IP SHOULD BE IN SAME RANGE THROUT THE CONNECT)
ROUTING
*RIP – ROUTING INFORMATION PROTOCAL
*RIP COMES IN 2 (OR) 3 DIFFERENT VERSIONS
VERSION – 1 DISTANCE VECTOR PROTOCAL
VERSION – 2 HYBRID PROTOCAL
*RIPV-1 (OLDER ROUTER)
*SUPPORTS ONLY CLASSFULL ROUTING (DOES NOT SUPPORT VLSM)
*NO AUTHENTICATION
*RIPV-1 USES BROADCAST
*RIPV-2
*SUPPORTS ONLY CLASSLESS ROUTING
*AUTHENTICATION IS AVAILABLE
*RIPV-2 USES MULTICAST INSTEAD OF BROADCAST
METHOD OF ROUTING
*STATIC ROUTING
*DEFAULT ROUTING
*DYNAMIC ROUTING
STATIC ROUTING
*IT IS ROUTE THAT IS MANUVALLY CONFIGURE ON THE ROUTER STATIC
ROUTER THAT IS CREATED MANUVALLY BY A NETWORK THIS IS A
METHOD FOR SMALL NETWORK IT IS NOT ADVISABLE FOR LARGER
NETWORK
DEFAULT ROUTING
*THIS IS A METHOD IN WHICH ALL ROUTERS ARE CONFIGURED TO
SEND ALL PACKETS TOWARD A SINGLE ROUTER THIS IS VERY USEFULL
IN SMALL NETWORK USED TO ADDING STATIC AND DYNAMIC ROUTING
DYNAMIC ROUTING
*THIS IS THE METHOD WHERE PROTOCAL AND ALGORITHAMS ARE
USED TO AUTOMATICALLY PROPAGATE ROUTING INFORMATION
*THIS IS MOST COMMAN METHOD AND MOST COMPLEX METHOD OF
ROUTING
SERIAL CABLE
*CONNECT TWO ROUTERS
*CABLE HAVE TWO INTERFACES THEY ARE DTE (DATA TERMINAL
EQUIPMENT , DCE (DATA CIRCUIT TERMINATION EQUIPMENT)
*CLOCK RATE IS SET TO CONTROLL THE SPEED OF TRANSACTION IN
CABLE
*ROUTER DO NOT HAVE SERIAL PORT IT SHOULD BE ADDED BY
TURNING OFF THE SWITCH AND DRAGING HWIC-2T PORT
ROUTING PROTOCAL
*IT IS A PROTOCAL USED TO COMMUNICATION BETWEEN TWO
ROUTER
COMMAND FOR CONNECTION AND SETTING CLOCKRATE,IP
*ROUTER>ENABLE
*ROUTER# CONFIG TERMINAL
*ROUTER(CONFIG)# INTERFACE (CONNECTED INTERFACE)
*ROUTER(CONFIG-IF)#IP ADDRESS 192.168.10.1 255.255.255.0
*ROUTER(CONFIG-IF)#NO SHUTDOWN
*ROUTER(CONFIG-IF)#EXIT
*ROUTER(CONFIG)#CLOCKRATE (USE QUESTION MARK TO KNOW
CLOCK SPEED (OR) TYPE CLOCK RATE 64000)
(CONFIGURE CLOCK RATE ONLY IN PORT WHICH SHOWS CLOCK
SYMBOL)
STATIC ROUTING PROTOCAL CONFIGURING COMMANDS
*RI(CONFIG)# IP ROUTE (IP) (SUBNETMASK) (IP)
DEFAULT ROUTING PROTOCAL CONFIGURING COMMANDS
*RI(CONFIG)# IP ROUTE 0.0.0.0 0.0.0.0 (TARGET IP)
ALL COMMMANDS HAVE EXAMPLE REFER CEH FILE