Вы находитесь на странице: 1из 49

NETWORKING

CYBER SECURITY
1.PREVENTING
2.SECURING
3.DEFENDING

NETWORKING INCLUDES
1.MONITORING
2.DATA EJECTING (OR) ADDING
3.NETWORKING MEANS -INTERCONECTING TWO DEVICES

---------------------------
4.MAY BE WIRED (OR) WIRELESS
5.WIRED IS SECURED

DATA TRANSMISSION
1. DATA TRANSMISSION CAN BE BOTH DONE BY WIRED (OR) WIRELESS
2. WIRED-THROUGH CABLES
3. WIRELESS-THROUGH INTERNET

DATA FLOWING
1.DATA FLOWING CAN BE DONE USING SWITCH (OR) MODEM
DIFFERENCE BETWEEN WIRED AND WIRELESS
CONECTION

WIRED WIRELESS
-------------- ------ -----
1.NO INTERMEDIATE DEVICE INTERMEDIATE DEVICE
2.NO QUICK ACESS QUICK ACCES
3.COST--HIGH COST—LOW
4.SECURED UNSECURE
5.LIMITED DISTANCE UNLIMITED DISTANCE
6.SPEED--HIGH SPEED—LOW
7.NO DATA LOSS DATA LOSS POSSIBLE

NODE
1.NAME OF THE DEVICES IS CALLED*NODE*
*EX:HUB,ROUTER,PC

HOST
1. DEVICES WHICH SEND (OR) RECEIVE IS CALLED HOST
*SENDING DEVICE=HOST
*RECEIVING DEVICE=HOST

END DEVICE
1.DESTINATION (OR) RECIVING DEVICE IS CALLED END DEVICE
2.EX:HOTSPOTING MOBILE ----- RECIVING MOBILE, IN THIS CASE
RECEVING MOBILE IS END DEVICE
SWITCH
1.SWITCH IS NOTHING BUT A MULTI PORT DEVICE

--------- ---------
↓ ↓ ↓
PC-1 SWITCH PC-2

ROUTER
1.IT IS USED TO CONNECT DIFFERENT AREA NETWORK

-------- -------
↓ ↓ ↓
PC-1 SWITCH PC-2 (OR)
TO CONNECT DIFFERENT AREA NETWORK

-------------- ------------ ---------------


↓ ↓ ↓ ↓
PC-1 SWITCH ROUTER PC-2
2. WE USE ROUTER INSTEAD OF SWITCH TO CONNECT DIFFERENT
AREA NETWORK BECAUSE IP VARIES

INTERNET
1.COMONLY USED INTERNET GLOBALY (GOOGLE)

INTRANET
1.LOCAL CONNECTION (LAN), NO INTERNET, JUST COMMUNICATION

-------- --------
EXTRANET
1.EXPANSION OF INTRANET
2.NO INTERNET
3.PRIVATE
4.COMPANY (BRANCH)

------- ------- -------- ---------- ----- --- -------


↓ ↓
HEAD OFFICE BRANCH OFFICE

IEEE
1.STANDARD CODE
2.ISO – CERTIFIED
3.INSTITUTE OF ELECTRICAL ENGINERING (EXPANSION OF IEEE)
4.ITP FORMAT
5.TECHNOLOGY STANDARD CODE
6.INVENTED IN 1980 FEB, MONTH COMBINE THESE TO FORM 802
(SOME OF THE TECHNOLOGY CODE)
*WIFI – 802.11 *ETHERNET – 802.3
*BLUETTOTH – 802.15.1 *TOKEN RING – 802.5
*TRUNKING – 802.1Q

TRUNKING
1. SEPARATE AND SEND
2. EX:CABLE TV ,SINGLE CABLE BUT 200 CHANNELS
MODES OF TRANSMISSON
1.SIMPLEX – ONE WAY COMMUNICATION
*SEND ONLY ,NO RECIEVE
*EX: RADIO ,TV
2.HALF-DUPLEX – TWO WAY COMMUNICATION,BUT CAN ONLY
SEND (OR) RECEIVE AT A TIME
*EX:WALKIE TALKIE
3.FULL-DUPLEX – TWO WAY COMUNICATION
*CAN SEND AND RECEIVE AT SAME TIME
* EX:CELL PHONE

TYPES OF ETHERNET PORT


1.SIMPLEX – TYPE – 1
2.HALF-DUPLEX – TYPE – 2
3.FULL-DUPLEX – TYPE – 3 (MAXIMUM IN USE)

BIT
1.SIZE OF A DATA (SMALL)
2.SINGLE DIGIT – 0 (OR) 1

BYTE
1. 8 BIT = I BYTE
2. 8 BIT MAY BE 0 LIKE (00000000)
3. 8 BIT MAY BE 1 LIKE (11111111)
4. 8 BIT MAY BE LIKE COMBINATION OF 0 AND 1 (01010101)

BINARY
1. BINARY VALUE – NO OF 0,1
2. COMMON TERM OF BIT, BYTE

INTEGERS
1. BOTH NEGATIVE AND POSITIVE VALUE OF NUMBERS

*EX:-3,-2,-1,0,1,2,3
DECIMEL
1. POINT NUMBER
*EX:10.1

HEXA DECIMAL
1.HEXA=16
2.0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F

OCTECT
1. OCT=8
2. OCTECT NUMBERS=0,1,2,3,4,5,6,7
3. OCTECTC RANGE = 255

DECIMAL TO BINARY CONVERTION


1.BY LCM (2)
2.MAXIMUM -255

BINARY TO DECIMAL
1.ANYTHING POWER 0 =1
2.NUMBER LANE
TYPES OF DATA SPEED
1.Mb/S – MEGA BIT PER SEC (WHEN WIRELESS, SLOW)
2.MB/S – MEGA BYTE PER SEC (HIGH SPEED , WIRED,PENDRIVE)
3.Kb/S – KILO BIT PER SEC (1024 BIT EQUALS)
4.KB/S – KILO BYTE PER SEC

TYPES OF ADDRESS
1.UNICAST ADDRESS - ONE TO ONE (SEND (OR) RECIVE )
*ONE SOURCE TO ANOTHER SOURCE

--------------------------------
↓ ↓
SOURCE – 1 SOURCE – 2
2.MULTI CAST ADDRESS – ONE TO MANY
*ONE SOURCE TO MANY SOURCE

→ SOURCE – 1

↓ ↓ ↓
SOURCE – 2 SORCE-3 SOURCE – 4
3.BROAD CAST ADDRESS - ALL IP TO FIND CORRECT IP
*SWITCH (OR) ANY INTERMEDIATE DEVICE TRANSFER
DATA FROM ONE SOURCE TO ALL SOURCE AND BASED
ON IP FOUNDS CORECT SOURCE AND TRANSFER DATA
IP ADDRESS
*IP – INTERNET PROTOCAL
*A DEVICE WHICH SEND OR RECEIVE MUST HAVE IP AMD MAC
*EVERY DEVICE HAVE UNIQUE IP THAT CAN BE CHANGED
*IP ALSO CALLED – LOGICAL ADDRESS,INTERNET ADDRESS
*IP CAN BE ASSIGNED MANUALLY (OR) AUTOMATICALLY
(IP CAN BE SAME WHEN)

CHINA
INDIA

10.001 10.002 10.003 10.001 10.002 1O.OO3


(IP CAN BE SAME IN DIFFERENT NETWORK BUT IF INDIA AND CHINA
ARE INTERLINKED IN A NETWORK THEN IP COULD NOT BE SAME )
TYPES OF IP ADDRESS
1.IPV4 – DECIMAL FORMAT
2.IPV6 - HEXA DECIMAL FORMAT

MAC ADDRESS
*MAC – MEDIA ACCES CONTROL
*MAC – UNIQUE IDENTITY
*COMPOLSORY ONLY ONE WORLD WIDE (DIFFERENT FROM IP)
*ALL DEVICES WHICH SEND,RECEIVE AND ALSO INTERMEDIATE
DEVICE HAVE MAC (EX: BLUETOOTH HAVE MAC BUT NOT IP)
*OTHER NAME FOR MAC – PHYSICAL ADDRESS, HARD WARE
ADDRESS,BURNED IN ADDRESS
*MAC CANNOT BE CHANGED
*WITHOUT MAC AND IP NO TRANSMISSON CAN BE DONE
COMMAND TO FIND IP
1.GO TO CMD
2.TYPE IPCONFIG (TO FIND IP)

COMMAND TO FIND MAC


1.GO TO CMD
2.TYPE IPCONFIG /ALL (TO FIND MAC ,IP AND SOME BASIC
INFORMATION OF PC)

PROTOCALS
1.SET OF RULES AND FUNCTIONALITIES
2.EVERY PROTOCAL ARE INDIVIDUVALLY ASSIGNED TO A WORK
3.SOME PROTOCALS ARE SAME BUT HAVE SOME ADVANTAGE AND
DISADVANTAGE
4.WITHOUT PROTOCAL NO FUNCTION WILL HAPPEN
TYPES OF PROTOCALS
1. TCP 10. IMAP 19. HDLC
2. IP 11. POP – 3 20. FRAME RELAY
3. FTP 12. UDP 21. SCTP
4. HTTP 13. NTP 22. DCCP
5. HTTPS 14. ICMP 23. ITU.X225
6. SMTP 15. IGMP 24. TLS
7. SSIT 16. ARP 25. XDR
8. TELNET 17. RAR 26. MIME
9. TFTP 18. PPP 27. SSI
28. NET-BIOS 34. OSPF 40. RSTP
29. DHCP 35. IGRP
30. ATM 36. EIGRP
31. DNS 37. EGP
32. SNMP 38. BGP
33. RIP 39. STP

OSI MODEL
7. APPLICATION LAYER
6. PRESENTATION LAYER
5. SESSION LAYER
4. TRANSPORT LAYER
3. NETWORK LAYER
2. DATA LINK LAYER
1. PHYSICAL LAYER
(OSI – OPEN SYSTEM INTERCONNECT)

NETWORKING DEVICES
1. REPEATER
2. HUB
3. SWITCH
4. BRIDGE
5. ROUTER
6. B-ROUTER
7. GATE WAY
8. FIREWALL
9. MODEM
10.NIC PORT

TYPES OF NETWORK
1. PAN - SINGLE PERSON (OR) PERSONAL (PERSONAL AREA
NETWORK)
2. LAN – LIMITED CONNECTION (OR) LAB (LOCAL AREA
NETWORK)
3. CAN – COMBINATION OF LAN (OR) COLLEGE (CAMPUS AREA
NETWORK)
4. MAN – ENTIRE CITY COVERAGE LAN (METROPOLITEN AREA
NETWORK)
5. WAN – COMBINATION OF LAN AND MAN (WIRED AREA
NETWORK)

BASIC
6. WLAN – WIRELESS AREA NETWORK (WIFI)
7. VPN - VIRTUVAL PRIVATE NETWORK (ENCRYPED, SECURE)
8. VLAN - VIRTUVAL LOCAL AREA NETWORK
9. SAN - STORAGE AREA NETWORK (HI SPEED)
10.EPN – ENTERPRICE PRIVATE NETWORK (ORGANISED)

TOPLOGY
*STRUCTURE OF NETWORK (HOW DEVICES ARE CONNECTED)
TYPES OF TOPOLOGY
1. PHYSICAL TOPOLOGY
2. LOGICAL TOPOLOGY
PHYSICAL TOPOLOGY
*IT SAYS ABOUT HOW THE DEVICES ARE INTERLINKED THROW
CABLES
*STRUCTURAL TOPOLOGY COMES UNDER THIS
TYPES OF PHYSICAL TOPOLOGY
1. BUS TOPOLOGY
2. STAR TOPOLOGY
3. RING TOPOLOGY
4. MESH TOPOLOGY
5. HYBRID TOPOLOGY
6. TREE TOPOLOGY

1.BUS TOPOLOGY
*PARALLEL CONNECTION OF DEVICES (SINGLE LANE OF WIRE
(OR) CABLE)
*BASIC TOPOLOGY
*NOT WORK PROPERLY
*MAY BE ZIG ZAG (OR) IN ANY FORMAT BUT SHOULD BE
CONNECTED IN SINGLE LANE OF WIRE (OR) CABLE

----------------- ----------- --------------------

---------------
2.STAR TOPOLOGY
*CENTRALISED ACCES POINT
*IF DEVICE REMOVED (OR) ADDED NO PROBLEM WILL CAUSE,
DUE TO SEPARATE PORT
*HAS INTERMEDIATE DEVICE SUCH AS SWITCH, NETWORKING
DEVICES ETC…
*DATA TRANSFER FROM (DEVICE 1 TO HUB TO DEVICE 3)

DEVICE -1
HUB
----------------------
DEVICE-2

DEVICE-4 DEVICE-3
3.RING TOPOLOGY
*EACH DEVICE SHOULD BE CONNECTED WITH TWO DEVICES
DIRECTLY
*DATA CAN MOVE CLOCK WISE (OR) ANTI CLOCK WISE BUT
ANY ONE DIRECTION AT A TIME
*INTERFACE NAME TOKEN RING
*NO INTERMEDIATE DEVICE
*IF ANY DEVICES REMOVED (OR) ADDED IT WILL AFFECT FLOW
OF DATA DUE TO RING FLOW

4.MESH TOPOLOGY
*EACH DEVICE TO CONNECT WITH ALL OTHER DEVICE
*IF ANY LINK DATA TRANSMIT IS POSSIBLE (DATA FROM
DEVICE 1 TO DEVICE 3 BY DEVICE 1 TO DEVICE 2 AND TO
DEVICE 3
*DUE TO INTERLINK OF ALL DEVICE DATA FLOW TO ALL
DEVICE , SO DATA LOSS IS POSSIBLE

DEVICE 1

DEVICE 2
DEVICE 3
5.HYBRID TOPOLOGY
*COMBINATION OF ANY TWO TOPOLOGY IS CALLED
HYBRID TOPOLOGY
*STAR TOPOLOGY WITH RING TOPOLOGY
6.TREE TOPOLOGY
*BRANCHES OF DEVICE
*SPLITS FROM ONE DEVICE TO MULTIPLE DEVICE

ROUTER
SWITCH SWITCH

HUB HUB

DEVICES

LOGICAL TOPOLGY
*CAN BE DESIGNED AND CONNECTED AS PER USER CONVINIENCE

NETWORKING CABLE
*COMES UNDER LAYER- 1 (PHYSICAL LAYER) IN OSI MODEL
*IMPORTANT ROLE IN NETWORKING
*USED TO TRANSMIT DATA FROM ONE DEVICE TO ANOTHER
TYPES OF NETWORKING CABLES
1. COAXIAL CABLE
2. FIBER OPTICAL
3. TWISTED PAIR CABLE
1.COAXIAL CABLE
*TO TRANSMIT SIGNAL FREQUENCY
*MAXIMUN NOT IN USE , USED WHILE TRANSMITING SIGNAL
*EX:TV CABLE

2.FIBER OTICAL CABLE


*COST IS HIGHER WHEN COMPARED TO TWISTED PAIR
*COVER LONGER DISTANCE
*SPEED-HIGH
*USED IN SERVERS (HEAD OFFICE TO BRANCH OFFICE)
*ROAD SIDE SEEN
*WORLD WIDE CONNECTED THROUGH FIBER OPTICAL
(THROUGH - SEA)
*LONGER DISTANCE, HIGHER SPEED , HIGHER COST= FIBER
OPTICAL
*DATA TRANSFERS THROUGH LIGHT SOURCE ,SO HIGH SPEED
IS POSSIBLE
TYPES OF FIBER OPTICAL CABLE
A) SINGLE MODE FIBER OPTICAL CABLE
B) MULTI MODE FIBER OPTICAL CABLE
C) PLASTIC MODE FIBER OPTICAL CABLE
A) SINGLE MODE FIBER OPTICAL CABLE
*COVER HIGHER DISTANCE WHEN COMPARED TO MULTI
MODE FIBER OPTICAL CABLE
*CAN ONLY SEND (OR) RECEIVE AT A TIME (HALF-DUPLEX)
*FASTER DUE TO NO TRAFFIC BECAUSE ONLY DATA SEND (OR)
RECEIVE AT A TIME WHEN COMPARED TO MULTI MODE
FIBER OPTICAL CABLE

B) MULTI MODE FIBER OPTICAL CABLE


*COVER LOWER DISTANCE COMPARED TO SINGLE MODE
FIBER OPTICAL CABLE
*CAN SEND (OR) RECEIVE AT A TIME (FULL – DUPLEX)
*SLOWER DUE TO TRAFFIC BY TWO WAY COMMUNICATION
WHEN COMPARED TO SINGLE MODE FIBER OPTICAL CABLE
C) PLASTIC MODE FIBER OPTICAL CABLE
*GENERALLY USED IN SERVER ROOMS
3.TWISTED PAIR CABLE
*TOTALLY 8 WIRES
*PAIRED AS TWO,SO COMBINED AND FORMS 4 CABLE (BUT
SEPARATE JOIN IN JACK)
*CAN TRANSMIT UPTO A RANGE OF 100 METERE ONLY
AFTER ANY DEVICE SHOULD BE ADDED
*ALSO CALLED LAN , ETHERNET
*SLOWER, CHEAP
*TELEPHONE- 2 PAIR , RJ11 JACK , ORANGE AND WHITE
*JACK USED IN LAN – RJ45
TYPES OF TWISTED PAIR CABLE
1.UNSHIELDED (NO ALLUMINIUM COVER) TWISTED PAIR CABLE (UTP)
SHORT LIFE
2.SHIELDED (ALLUMINIUM COVERED) TWISTED PAIR CABLE (STP),
LONG LIFE
TYPES OF TWISTED PAIR CABLE (COMMON)
1. COPPER CROSSOVER
*USED TO CONNNECT TWO SAME DEVICE ,
*EX:PC TO PC , ROUTER DEVICE
2. COPPER STRAIGHT
*USED TO CONNECT TWO DIFFERENT DEVICE ,
*EX:PC TO ROUTER , SWITCH TO ROUTER
*COLOUR CODING*
COPPER STRAIGHT CABLE COPPER CROSSOVER CABLE
WHITE ORANGE 1 – ORANGE 2 WHITE GREEN 1 – GREEN 2

WHITE GREEN 3 – BLUE 4 WHITE ORANGE 3 – BLUE 4


WHITE BLUE 5 – GREEN 6 WHITE BLUE 5 – ORANGE 6
WHITE BROWN 7 – BROWN 8 WHITE BROWN 7 – BROWN 8
BOTH END SHOULD HAVE SAME BOTH END SHOULD HAVE
COLOUR CODING DIFFERENT COLOUR CODING

CATEOGORIES OF TWISTED PAIR CABLE


CAT = CATEGORIES
1.CAT 1 = 1Mb/S
2.CAT 2 = 4Mb/S
3.CAT 3 = 10Mb/S
4.CAT 4 = 16Mb/S
5.CAT 5 = 100Mb/S
6.CAT 5E = 1Gb/S
7.CAT 6
8.CAT 6A = 10Gb/S
9.CAT 7

ETHERNET
*HIGH SPEED TRANSFER
*LAYER – 2 (DATA LINK)
*USED TO HIGH SPEED CONNECTION BETWEEN TWO DEVICES
WITH IN A LAN
*EX:PC,ROUTER
*ETHERNET IS A PORT
TYPES OF ETHERNET CABLE
1.ETHERNET
2.FAST ETHERNET
3. GIGA BIT ETHERNET

1.ETHERNET
*10 BASE – T (T = TWISTED PAIR , BASE =BASEBAND)
*10Mb/S
*FULL DUPLEX – 802.3X
*HALF DUPLEX – 802.3i
*ETHERNET – 802.3
2.FAST ETHERNET
*100 BASE – T (T = TWISTED PAIR , BASE =BASEBAND)
*100Mb/S
*FAST ETHERNET – 802.3u
*TWISTED PAIR = 100 METERE
*MULTIMODE = 2 KM
*SINGLE MODE = 25 KM

3.GIGA BIT ETHERNET


*1000 BASE – T (T = TWISTED PAIR , BASE =BASEBAND)
*1000Mb/S
*GIGA BIT ETHERNET – 802.3ab
*TWISTED PAIR = 100 METERE
*MULTIMODE = 550 METERE
*SINGLE MODE = 75 KM

OSI REFERENCE MODEL


*HOW TO INTER CONNECT DEVICE AND TRANSFER OF DATA IN
NETWORKING (OR) HOW DEVICES COMMUNICATE OVER NETWORK
*EACH LAYER HAVE A OWN HEADER FILE

ENCAPSULATION DECAPSULATION
7.APPPLICATION LAYER 7.APPPLICATION LAYER
6.PRESENTATION LAYER 6.PRESENTATION LAYER
5.SESSION LAYER 5.SESSION LAYER
4.TRANSPORT LAYER 4.TRANSPORT LAYER
3.NETWORK LAYER 3.NETWORK LAYER
2. DATA LINK LAYER 2. DATA LINK LAYER
1.PHYSICAL LAYER 1.PHYSICAL LAYER

*DECAPSULATION – PROTOCAL DATA UNIT (PDU) , TO CONVERSION


OF LOWER LAYER TO UPPER LAYER

PHYSICAL LAYER
*LAYER – 1 IN OSI MODEL
*CONVERTION OF BIT
*ACTUVAL DISTANCE BETWEEN SOURCE AND DESTINTION
*DATA CONVERTED TO DATA BITS
*TYPES OF PROTOCAL
1.ETHERNET
2.FDDI – FIBER DISTRIBUTED DATA INTERFACE
*PHYSICAL LAYER SAYS ABOUT CONNECTION BETWEEN DEVICE
*TYPES OF DEVICES
1.HUB
2.REPEATER

DATA LINK LAYER


*LAYER – 2 IN OSI MODEL
*IT IS A MEDIUM PROVISION LAYER
*FUNCTION – ENCODE , DECODE IN FRAMES
*ENCODE – ADD A HEADER FILE IN SOURCE
*DECODE – REMOVING HEADER AT THE DESTINATION
*A LAYER – 2 HEADER IS ADDED IN THIS LAYER SOURCE
AND DESTINATION , MAC ADDRESS
*SO, IT IS RESPONSIBLE TO FIND THE NEXT DESTINATION IN THE
NETWORK
*THERE ARE TWO SUB – LAYER
1.UPPER – LLC (LOGICAL LINK CONTROLL)
2.LOWER – MAC ADDRESS

1. LLC (LOGICAL LINK CONTROLL)


*CONTROLL DATA FLOW
*ERROR DETECTION
*RESPONSIBLE FOR DATA TRANSMISSION ON COMPUTER (OR) DEVICES
IN NETWORKING
*TO MANAGE AND ENSURE THE INTEGRETTY OF DATA TRANSMISSION -
FUNCTION
*LLC PROVIDES LINK LAYER TO LINK SERVICES FOR THE NETWORK
LAYER PROTOCOL
*LLC HANDLES – FLOW CONTROLL, ERROR CONTROLL, FRAMING ETC…
*FCS – FRAME CHECK SEQUENCES
- POLYNOMINAL DIVISON BASED CODE GENERATION
- ONE OF THE ERRECTION (OR) ERROR DETECTION
METHOD
ALGORITHAM – CRC (CYCLIC RETENDER CHECK)
*ERROR JECKING ALGORITHAM
*USED TO CHECK HARD DRIVE , FLASH DRIVE

------------------------------------

FCS FCS
*CHECK IF CODE DOESN’T MATCH SHOWS ERROR
MAC – MEDIA ACCESS CONTROLL
*CSMA – CARRIER SELLS MULTIPLE ACESS
*CD – COLLISSON DETECTION
*SWITCH – 24 ETHERNET PORT – MAC ADDRESS (UNIQ FOR 24)
*MAC HANDLES ACCESS TO SHARED MEDIA SUCH AS ETHERNET
*UNIQUE IDENTITY OF A DEVICE
*UNIQUE IDENTITY OF NIC PORT
*MAC – 48 BITS AND 6 GROUP OF TWO HEXA DECIMAL
SEPERATED BY - , : , / ,NO SEPERATOR
EX:00: E5 :3C:7B:F2:OD
*MAC ADDRESS WAS SEPERATED BY FIRST 24 BIT , 24 BIT
*FIRST 24 BIT – OUI (ORGANISATIONAL UNIQUE IDENTIFIER
*SECOND – 24 BIT – EVI (EXTENDED UNIQUE IDENTIFIER

FRAME

-------------------------------------------------------------
FRAME
*FRAME CONTAINS – MAC , IP ,DATA, FCS
MAC 1 MAC 2 IP 1 IP 2 DATA FCS

TYPES OF MAC ADDRESS


1. PERMANENT MAC ADDRESS
2. STATIC MAC ADDRESS
3. DYNAMIC MAC ADDRESS
PERMANENT MAC
*OWN MAC ADDRESS
STATIC MAC
*SWITCH (PERMANENT MAC ) – 24 PORT (STATIC MAC)
DYNAMIC MAC
*AUTOMATIC MAC ASSIGNING WHEN SEND AND RECEIVE

PROTOCALS IN DATA LINK LAYER


1.LAN
2.WAN (INCLUDES THREE ENCAPSULATION PROTOCALS)
1.HDLC (HIGH DATA LINK CONTROLL), 2.PPP, 3.FRAMERELAY
HDLC
*ROUTER (DEFAULT)
*TRANSMISSON PROTOCAL
*BIT PROTOCAL IT SUPPORTS HALF – DUPLEX, FULL – DUPLEX,
OVER PAN TO PAN NETWORK
*HIGH DATA LINK CONTROLL
*NOT SECURE TO CONNECT ONE ROUTER TO ANOTHER
PPP
*PAN TO PAN PROTOCAL
*IT IS A COMMUNICATION PROTOCAL
*IT IS USED TO ESTABLISH DIRECT CONNECTION BETWEEN TWO
DEVICE
*SECURE TO CONNECT ONE ROUTER TO ANOTHER ROUTER
FRAME RELAY
*DESIGNED FOR ISDN – INTERGRATED SERVICE DIGITAL
NETWORK
*USED TO CONVERT MULTIPLE WAN INTERFACE INTO SINGLE
WAN INTERFACE
DEVICES IN DATA LINK LAYER
*SWITCH
*BRIDGE

NETWORK LAYER
*CONVERT DATA TO PACKETS
*NETWORKING LAYER PROTOCOLS – IP
*NETWORKING LAYER PROTOCOLS – ROUTER
*PERMIT DIFFERENT TYPE NETWORK TO INTER CONNECT

IP
*LOGICAL ADDRESS
*IP IS A UNIQUE ADDRESS IN A NETWORK
*IP IS A COMUNICATION PROTOCOL
*IT IS A THIRD LAYER
*TYPES – IPV4, IPV6

IPV4
*IT HAVE 32 BIT
*SEPERATED BY 4 OCTECT
*0 TO 255 (RANGE)
CLASSES
*CLASS – A (O – 127)
*CLASS – B (128 – 191)
*CLASS – C (192 – 223)
*CLASS – D (224 – 239)
*CLASS – E (240 – 255)
(0 , 127 ARE NOT USED BECAUSE IT WAS A LOOP BACK (CHECK)
CLASS NETWORK ADDRESS HOST
A 1 - 126 16 MILLION
B 128 - 191 65 THOUSAND
C 192 - 223 254
D 224 - 239 NOT IN USE
E 240 - 255 NOT IN USE

(255 – NETWORKS LAST ADDRESS (BROAD CAST ADDRESS))

IPV4 PORTION
*NETWORK PORTION (N/W) – ASSIGNED VALUE CANNOT BE
CHANGED
*HOST PORTION – CAN BE CHANGED
CLASS – A NETWORK HOST HOST HOST
CLASS – B NETWORK NETWORK HOST HOST
CLASS – C NETWORK NETWORK NETWORK HOST

CLASS – A SUPPORTS 16 MILLION IP PER NETWORK (TOTAL 127


NETWORKS)
CLASS – B SUPPORTS 65 THOUSAND IP PER NETWORK (TOTAL
16000 NETWORK)
CLASS – C SUPPORTS 254 IP PER NETWORK (2 MILLION
NETWORK)
CLASS – A
(256) POWER 3(NO OF HOST) – 2 = 16,777,214
CLASS – B
(256) POWER 2 (NO OF HOST) – 2 = 65534
CLASS – C
(256) POWER 1 (NO OF HOST) – 2 = 254
TYPES OF IP
*PUBLIC – USED ALL OVER (INTERNET)
*PRIVATE – CONNECTED LAN
CLASS – A = IP STARTING AT 10 ARE PRIVATE
CLASS – B = IP STARTING WITH 172.(16 – 31) ARE PRIVATE
CLASS – C = IP STARTING WITH 192.168 ARE PRIVATE

SUBNET MASK
*TO IDENTIFIY EASILY HOW MANY NETWORK PORTION AND
HOST PORTION OF PARTICULAR IP ADDRESS
*IT SAYS ABOUT THE HIGHEST PORTION OF NETWORK
QUTIENT AND LOWEST PORTION OF HOST QUTIENT
CLASS FORMAT
A NETWORK, HOST, HOST, HOST –
255.0.0.0
B NETWORK, NETWORK, HOST,
HOST – 255.255.0.0
C NETWORK, NETWORK,
NETWORK, HOST – 255. 255.
255.0

TYPES OF ADDRESS IN VALID NETWORK


*NETWORK ADDRESS
*VALID IP ADDRESS
- FIRST VALID IP ADDRESS
- LAST VALID IP ADDRESS
*BROAD CAST ADDRESS
*SUBNET MASK
EX: - CLASS – C
192.168.0.0 – NETWORK ADDRESS
192.168.0.1 – FIRST VALID IP ADDRESS
192.168.0.254 – LAST VALID IP ADRESS
192.168.0.255 – BROAD CAST ADDRESS (LAST ADDRESS OF IP)
255.255.255.0 – SUBNET MASK
(FIRST, LAST AND BETWEEN IP ADDRESS ARE TOGETHER CALLED VALID
IP)
POWER TABLE
2 POWER 1 = 2
2 POWER 2 = 4
2 POWER 3 = 8
2 POWER 4 = 16
2 POWER 5 = 32
2 POWER 6 = 64
2 POWER 7 = 128
2 POWER 8 = 256
2 POWER 9 = 512
2 POWER 10 = 1024
2 POWER 11 = 2048
2 POWER 12 = 4096
2 POWER 13 = 8192
2 POWER 14 = 16384-

CIDR VALUE
EXPANSION = CLASLESS INTER DOMAIN ROUTING
*CIDR IS BASSICALY CONVERSION OF IP TO BINARY AND VALUE OF
ONE
CIDR VALUES

/8 255.0.0.0 1A 16,777,214
/9 255.128.0.0 128 B 8,388,352
/ 255.192.0.0 64 B 4,194,176
10
/ 255.224.0.0 32 B 2,097,088
11
/ 255.240.0.0 16 B 1,048,544
12
/ 255.248.0.0 8B 524,272
13
/ 255.252.0.0 4B 262,136
14
/ 255.254.0.0 2B 131,068
15
/ 255.255.0.0 1B 65,534
16
/ 255.255.128.0 128 C 32,512
17
/ 255.255.192.0 64 C 16,256
18
/ 255.255.224.0 32 C 8,128
19
/ 255.255.240.0 16 C 4,064
20
/ 255.255.248.0 8C 2,032
21
/ 255.255.252.0 4C 1,016
22
/ 255.255.254.0 2C 508
23
/ 255.255.255.0 1C 254
24
/ 255.255.255.128 2 subnets 124
25
/ 255.255.255.192 4 subnets 62
26
/ 255.255.255.224 8 subnets 30
27
/ 255.255.255.240 16 subnets 14
28
/ 255.255.255.248 32 subnets 6
29
/ 255.255.255.252 64 subnets 2
30
SUBNETTING
*TO REDUCE WASTAGE OF IP
TYPES OF SUBNETTING
*FLSM – FIXED LENGTH SUBNET MASK
*VLSM – VARIABLE NET SUBNET MASK
FLSM
*EQUAL NO OF HOST
*EX: IF DIVIDED INTO 4 PARTS ALL PARTS SHOULD HAVE EQUAL NO OF
HOST

VLSM
*UN EQUAL NO HOST
*EX: IF DIVIDED INTO 4 PARTS ALL PARTS DO NOT HAVE EQUAL
NO OF HOST

CLASLESS ADDRESSING
*NETWORK PORTION WHICH FOLLOWS THE NETWORK RULES
IS CALLED – CLASSFULL ADDRESS
*NETWORK PORTION WHICH DOES NOT FOLLOWS NETWORK
RULES IS CALLED – CLASLESS ADDRESS

TRANSPORT LAYER
*CONVERT PACKETS INTO SEGMENTS
*END TO END COMMUNICATION OVER A NETWORK
*SEGMENTING, FLOW CONTROLL, ERROR CONTROLL
*TWO WAY OF CONNECTION
- CONNECTION ORIENTED TANSMISSION
- CONECTIONLESS TRANSMISSION
CONNECTION ORIENTED TRANSMISSION
*ACCURATE DELIVERY OF PACKETS
*FLOW CONTROLL
*ACKNOWLIDGEMENT PROCESSING
*SECURE
*SEQUENCE OF TRANSMISSION
*ORIENTED TRANSMISSION

CONNECTIONLESS TRANSMISSION
*UN RELLIABLE DATA TRANSMISSION
*BASED ON UDP
*PACKET MAY BE LOSS
*ACKNOWLIDGEMENT NOT PROCESSED
*UN SECURE
*UN SEQUENCE
TCP – THREE WAY HAND SHAKING
*SINKORIZATION (SEND)
*SINKORAIZATION ACKNOWLEDGEMENT (RESPONSE)
*ACKNOWLEDGMENT (RECEIVING)

SYNCORIZATION REQUEST ACKNOWLEDGEMEN

ACKNOWLIDGEMENT
FIVE FUNCTION OF TRANSPORT
*SEGMENTATION
*CONNECTION MANAGEMENT
*FLOW CONTROLL
*CONNECTION MULTIPLEXING
PORT NUMBER
*RANGE OF PORT NUMBER – 65535
*CLASIFICATION OF PORT NUMBER
*SYSTEM PORT (OR) WELL KNOWN PORT = (0 TO 1023)
*USER PORT (OR) REGISTER PORT = (1024 TO 49151)
*PRIVATE PORT (OR) DYNAMIC PORT = (49152 TO 65535)

TCP UDP TCP/UDP


FTP – 20, 21 TFTP - 69 DNS – 53
SSH - 22 RIP - 520 SNMP – 161
TELNET – 23 DHCP – 67
HTTP – 80
HTTPS – 443
SMTP – 25
POP 3 – 110
NTP - 123
IMAP - 110
CORE LAYER PROTOCOLS – TCP, UDP
DEVICES IN TRANSPORT LAYER PROTOCOL – GATE WAY, FIREWALL

SESSION LAYER
*MANAGE AND CONTROLLS CONNECTION BETWEEN PC
*IT ESTABLISHES, MANAGES AND TERMINATES THE
CONNECTION BETWEEN LOCAL AND REMOTE APP
*THIS LAYER IS MAINLY RESPONSIBLE FOR COMMUNICATION
BETWEEN ANY TWO DEVICES
*3 WAY HAND SHAKING METHOD WIDELY USED TO ESTABLISH
AND END CONNECTION
*PROTOCOLS - ITV X225

PRESENTATION LAYER
*ENCRYPTION AND DECRYPTION
*TRANSLATION
*COMPRESSION ARE THE FUNCTIONS
*THIS LAYER ENCRYPTS AND DECRYPTS
*IT CONVERT DATA INTO READBLE FORMAT FOR APPLICATION
LAYER
*PROTOCOLS – XDR, TLS, SSL, MIME

APPLICATION LAYER
*THIS LAYER IS RESPONSIBLE FOR PROVIDING SERVICES FOR
*VISUVAL
*PROTOCOLS – DNS, STP, HTTP, SMTP, TELNET

TCP/IP
*CONSIST OF 4 LAYER
*REALTIME OSI MODEL

IPV6
*LATEST VERSION
*CONSIST OF 128 BITS
*IT WAS DIVIDED BY 8 GROUPS
*EACH GROUP CONSIST OF 16 BIT
*IT IS IN THE HEXA DECIMAL FORMAT
*INCREASED ADDRESS SPACE
*SIMPLIFIED CONFIGURATION
*BACKWARD COMPAITABILITY WITH IPV4
*INTERGRATED SECURITY (IP SEC)
RULES
*MULTIPLE 0 CAN BE WRITTEN AS : (OR) 1
*IT IS SEPERATED BY FIRST 64 AND LAST 64
*FIRST 64 BIT IS SEPERATED BY 48 BIT (NETWORK ADDRESS)
AND 16 BIT (SUBNET)
PREFIX VALUES
 8
 32
 64
TYPES OF IPV6 ADRESS
*GLOBAL UNICAST ADDRESS – (2000::/3)
*LINK – LOCAL ADDRESS – (FE80::/0)
*SITE LOCAL ADDRESS – (FC00::/7)
*MULTICAST – (FF00::/8)
*ANY CAST – (FFO2::/64)
*LOOP BACK – (;:1/128)

MODES OF INTERFACE IN SWITCHING


*USER MODE
*ENABLE (OR) PREVIELGING MODE
*GLOBAL CONFIGURATION MODE
*INTERFACE CONFIGURATION MODE (SUBLAYER OF GLOBAL)
*LINE INTERFACE CONFIGURATION MODE
(ROUTER – PACKET, SWITCH – FRAME)

COMMAND
*COMMAND USED HEAR IN CISCO PACKET TRACER INSTEAD OF
CMD
*TO BACK FROM ANY LAYER TO PREVILEGE LAYER PRESS CTRL+Z
*TO BACK ONE STEP #EXIT, END TO RETURN TO PREVIELGING
*NOT CASE SENSITIVE (MAY BE CAPS OR SMALL)
*PING ONE OF THE COMMAND TO CHECK,(ARP USED TO FIND
MAC USING IP ) , FIRST GO TO CL

COMMAND TO CONFIGURE IP IN ROUTER (CISCO PACKET TRACER)


*ROUTER > ENABLE
*ROUTER# CONFIGURE TERMINAL
*ROUTER(CONFIG)# INTERFACE GIGABITETHERNET0/0/0
*ROUTER(CONFIG – IF)# IP ADDRESS 192.168.10.0 255.255.255.1
*ROTER(CONFIG – IF)# NO SHUTDOWN
COMMAND TO CONFIGURE IP IN SWITCH (CISCO PACKET TRACER)
*SWITCH> ENABLE
*SWITCH# CONFIGURE TERMINAL
*SWITCH(CONFIG)# INTERFACE VLAN 1
*SWITCH(CONFIG – IF)# IP ADDRESS 192.168.10.2 255.255.255.0
*SWITCH(CONFIG – IF)# NO SHUTDOWN
*SWITCH(CONFIG)# IP DEFAULT – GATE WAY 192.168.10.1

-------- ROUTER
---------SWITCH

PC 1--------------- ---------------- PC 2
COMMAND TO CHANGE HOSTNAME
*ROUTER >ENABLE
*ROUTER(CONFIG)#HOSTNAME CCNA (ANYTHING CAN BE )
*CCNA(CONFIG)#
COMMAND TO BANNER (INTIMATION)
*ROUTER(CONFIG)#BANNER MOTD “WELCOME” (CAN BE ANY)
(GLOBAL CONFIGURE MODE) , (MESSASGE OF THE DAY MOTD)
COMMAND TO REMOVE IP
*ROUTER(CONFIG)# NO IP
COMMAND TO SAVE PERMANENTLY (TEMPORVARY TO PERMANT)
*ROUTER# COPY RUNNING – CONFIG STARTUP – CONFIG
(PREVIELIGING MODE)
COMMAND TO SAVE CLOCK
*ROUTER# CLOCK SET (TIME) 10:45:00 11FEB 2020 (DAY)
(PREVIELIGING MODE)
COMMAND TO PASSWORD
*ROUTER(CONFIG)# ENABLE PASSWORD 123(CAN BE ANY)
(GLOBAL MODE)
COMMAND TO ASSIGN DHCP (AUTO ASIGN IP TO ALL DEVIECE)
(AFTER SETTING IP TO ROUTER ,SUBNET MASK SHOULD BE SAME)
*ROUTER(CONFIG)# IP DHCP POOL CISCO
*ROUTER(DHCP - CONFIG)#NETWORK 192.168.10.1 255.255.
255.0 (IP SHOULD BE IN ORDER AND SUBNET MASK SHOULD
BE SAME)
*ROUTER(DHCP – CONFIG) #DEFAULT-ROTER 192.168.10.1
*ROUTER(DHCP – CONFIG)#DNS – SERVER 8.8.8.8 (DNS
INSTEAD OF SERVER NOT IN USE IP)
*ROUTER(CONFIG)#IP DHCP EXCLUDE – ADDRESS 192.168.10.2
(IF YOU WANT THIS IP SHOULD NOT BE ASSIGNED)
(SUBNET MASK SHOULD BE SAME IN IP CONFIGURATION AND
DHCP COMMANDS)

COMMAND TO TELNET (REMOTE ACCES A DEVICE)


(AFTER APPLYING IP TO ALL DEVICE)
*ROUTER(CONFIG)#LINE VTY 0 4 ( 0,4 ARE NO OF DEVICES CAN
USE REMOTE ACCES)
*ROUTER(CONFIG – LINE)# PASSWORD 123 (CAN BE ANY)
*ROUTER(CONFIG – LINE)#LOGIN
*ROUTER(CONFIG-LINE)#EXIT
*ROUTER(CONFIG)# ENABLE PASSWORD NETWORK (CAN BE
ANY)
(TO ACCES REMOTE OPEN ANY PC AND OPEN CMD TYPE
TELNET 192.168.10.1 (IP OF DEVICE WHICH TYPEN ABOVE
COMMAND)
COMMAND TO PASSWORD TO CONSOLE PORT
*ROUTER(CONFIG)# LINE CONSOLE 0
*ROUTER(CONFIG – LINE)# PASSWORD 123(ANY PWD)
*ROUTER(CONFIG – LINE)# LOGIN
*ROUTER(CONFIG – LINE)#EXIT
*ROUTER(CONFIG)#

CONTINUED
COMMAND TO SSH (REMOTE ACCES SECURELY )
(AFTER ASSIGNING IP TO ALL DEVICE)
*IF HOST NAME IS NOT CHANGED SSH WILL NOT WORK
*ROUTER(CONFIG)#HOSTNAME CEH (CAN BE ANY)
*CEH(CONFIG)#IP DOMAIN – NAME CISCO (CAN BE ANY)
*CEH(CONFIG)#USERNAME CCNA (CAN BE ANY) PASSWORD
(CAN BE ANY)
*CEH(CONFIG)#CRYPTO KEY GENERATE RSA
*1024 (ANYTHING CAN BE ASSIGNEND IN GIVEN RANGE)
*CEH(CONFIG)#IP SSH VERSION 2
*CEH(CONFIG)#LINE VTY 0 15 (NUMBER OF USERS CAN ACCES
REMOTE)
*CEH(CONFIG – LINE)#LOGIN LOCAL
*CEH(CONFIG – LINE)#TRANSPORT INPUT SSH
*CEH(CONFIG – LINE)#EXIT
*CEH(CONFIG)#ENABLE SECRET 123 (CAN BE ANY THING)
(TO CHECK OPEN ANY PC AND OPEN CMD TYPE SSH -L CCNA
(USERNAME) 192.168.10.1 (IP))
COMMAND TO ERASE CONFIGURATION
(CANNOT WORK BEFORE SAVING PERMANENTLY)
*CEH(CONFIG)# ERASE RUNNING – CONFIG
(GLOBAL MODE)

SOME PROTOCALS EXPANSION


FTP
*The File Transfer Protocol (FTP) is a standard network
protocol used for the transfer of computer files between a client and
server on a computer network.
FTP is built on a client-server model architecture using separate control
and data connections between the client and the server.[1] FTP users
may authenticate themselves with a clear-text sign-in protocol,
normally in the form of a username and password, but can connect
anonymously if the server is configured to allow it. For secure
transmission that protects the username and password, and encrypts
the content, FTP is often secured with SSL/TLS (FTPS) or replaced
with SSH File Transfer Protocol (SFTP).
SSH
*Secure Shell (SSH) is a cryptographic network protocol for
operating network services securely over an unsecured network. ... The
standard TCP port for SSH is 22. SSH is generally used to access Unix-
like operating systems, but it can also be used on Microsoft Windows.
Windows 10 uses OpenSSH as its default SSH client.
* REMOTE ACCES LIKE TELNET BUT SECURED
TELNET
*IT IS A PROTOCAL USED TO REMOTE ACCES A DEVICE
HTTP
*HTTP means HyperText Transfer Protocol. HTTP is the underlying
protocol used by the World Wide Web and this protocol defines how
messages are formatted and transmitted, and what actions Web
servers and browsers should take in response to various commands
HTTPS
*IT IS A TYPE OF HTTP
*IT ADDS SECURITY BY TRANSMITTING DAT THROUGH (SSL)
SECURE SOCKET LAYER AND (TLS) TRANSPORT LAYER SECURITY
SMTP
*Simple Mail Transfer Protocol (SMTP) is the standard protocol for
email services on a TCP/IP network. SMTP provides the ability to send
and receive email messages. SMTP is an application-layer protocol that
enables the transmission and delivery of email over the Internet.

IMAP
*IMAP (Internet Message Access Protocol) is a standard email
protocol that stores email messages on a mail server, but allows the
end user to view and manipulate the messages as though they were
stored locally on the end user's computing device(s)
POP -3
*Post Office Protocol version 3 (POP3) is a standard mail protocol
used to receive emails from a remote server to a local email
client. POP3 allows you to download email messages on your local
computer and read them even when you are offline.
NTP
*The Network Time Protocol (NTP) is a networking protocol for
clock synchronization between computer systems over packet-
switched, variable-latency data networks. In operation since before
1985, NTP is one of the oldest Internet protocols in current
use. NTP was designed by David L.
TFTP
*Trivial File Transfer Protocol (TFTP) is an Internet software
utility for transferring files that is simpler to use than the File Transfer
Protocol (FTP) but less capable. It is used where user authentication
and directory visibility are not required.
RIP
*Routing Information Protocol (RIP) is a dynamic routing
protocol which uses hop count as a routing metric to find the best path
between the source and the destination network. It is a distance vector
routing protocol which has AD value 120 and works on the application
layer of OSI model. RIP uses port number 520.
DHCP
*Dynamic Host Configuration Protocol (DHCP) is
a protocol for assigning dynamic IP addresses to devices
on a network. With dynamic addressing, a device can
have a different IP address every time it connects to
the network. In some systems, the device's IP address
can even change while it is still connected .

DNS
*Domain Name Servers (DNS) are the Internet's equivalent
of a phone book. They maintain a directory of domain names and
translate them to Internet Protocol (IP) addresses. This is necessary
because, although domain names are easy for people to
remember, computers or machines, access websites based on IP
addresses.

SNMP
*Simple Network Management Protocol (SNMP) is a set of
protocols for network management and monitoring. These protocols
are supported by many typical network devices such as routers, hubs,
bridges, switches, servers, workstations, printers, modem racks and
other network components and devices.

VLAN
*VIRTUAL LOCAL AREA NETWORK, VIEWED A GROUP OF DEVICE ON
DIFFERENT PHYSICAL LAN CAN COMMUNICATE WITH EACH OTHER AS
IF THEY WERE ALL ON THE SAME PHYSICAL LAN
*VLAN IS NOTHING BUT COMMUNICATION BETWEEN LAN USING
SWITCH
VLAN RANGE
*VLAN RANGE 1 TO 1005
* VLAN 1 TO 1002 - CAN BE USED (1 IS RESERVED VLAN)
*VLAN 1002 TO 1003 – UNUSED VLAN (USED IN SWITCH INSIDE)

TRUNKING PORT
*IT IS USED TO CONNECT MULTIPLE VLANS INTO A SINGLE INTERFACE
*IT IS USED TO ONLY SWITCH TO SWITCH CONNECTION

ACCESS PORT
*SWITCH PORT TO CONNECT WITH SYSTEM CONNECTION IS CALLED
ACCESS PORT

TAGGING
*IT IS A METHOD THROUGH WHICH MORE THAN ONE VLAN IN
HANDLED ON A PORT VLAN TAFGGING IS USED TO TELL WHICH PACKET
BELONGS TO WHICH VLAN ON THE OTHER SIDE

DIIFFRENT TYPES OF VLAN


1. DEFAULT VLAN
2. RESERVED VLAN
3. MANAGEMENT VLAN
4. PRUNING VLAN
5. NATIVE VLAN
6. DATA VLAN
7. VOICE VLAN
DEFAULT VLAN
*VLAN 1 IS A DEFAULT VLAN
RESERVED VLAN
*1002 – 1005 ARE UNUSED VLAN (OR) RESERVED VLAN
MANAGEMENT VLAN
*ONE SWITCH TO ANOTHER SWITCH MANAGE (OR) CONNECTION
*ONE SWITCH TO ANY SYSTEM TO MANAGE (OR) COMMUNICATE
PRUNING VLAN
*PRUNING HELPS IN IMPROVING PROPER ALLOCATION AND USE OF
NETWORK BANDWITH BY REDUCING UNNECESSARY FLOODED TRAFFIC
SUCH AS BROADCAST, MULTICAST, UNKNOWN AND FLOODED UNICAST
PACKET
NATIVE VLAN
*THE NATIVE VLAN IS THE ONLY VLAN WHICH IS NOT TAGGED IN A
TRUNK, IN OTHER WORDS,NATIVE VLAN FRAMES ARE TRANSMIITED
UNCHANGED

DATA VLAN
*THE DATA VLAN IS A VLAN THAT IS CONFIGURED TO CARRY USES –
GENERATED TRAFFIC
*A VLAN CARRYING VOICE (OR) MANGEMENT TRAFFIC COULD NOT BE
PART OF DATA VLAN
VOICE VLAN
*VOICE LAN FEAUTURE ENABLES ACCESS PORTS TO CARRY IP VOICE
TRAFFIC FROM AN IP PHONE
*VOIP – VOICE OVER INTERNET PROTOCAL

-------SWITCH NO 1 -----------SWITCH NO 2

TRUNKING PORT

ACCESS PORT
VLAN 10 VLAN 20 VLAN 10 VLAN 20
(VLAN ONLY WORK ON SWITCH)
(VLAN SHOULD BE SAME IN SWITCH ONE AND TWO)

COMMAND TO VLAN DIAGRAM

-----------------------------------------------------------------------

VLAN 10 VLAN 20 VLAN 30 VLAN 10 VLAN 20 VLAN 30

COMMAND TO VLAN
SWITCH – 1
*SWITCH>ENABLE
*SWITCH#CONFIGURE TERMINAL
*SWITCH(CONFIG)#VLAN 10 (VLAN CAN BE ANY UNDER RANGE)
*SWITCH(CONFIG-VLAN)#NAME COMPUTER (CAN BE ANY NAME)
*SWITCH(CONFIG-VLAN)#EXIT
*SWITCH(CONFIG)#VLAN 20
*SWITCH(CONFIG-VLAN)#NAME BIO (CAN BE ANY NAME)
*SWITCH(CONFIG-VLAN)#EXIT
*SWITCH(CONFIG)#VLAN 30
*SWITCH(CONFIG-VLAN)#NAME IT (CAN BE ANY NAME)
*SWITCH(CONFIG-VLAN)#EXIT
*SWITCH(CONFIG)#EXIT
*SWITCH# WRITE
*SWITCH# SHOW VLAN BRIEF
*SWITCH#CONFIGURE TERMINAL
*SWITCH(CONFIG)#INTERFACE FA0/1 (NO OF PC, EX IT IS PC NO 1)
*SWITCH(CONFIG-IF)#SWITCHPORT MODE ACCESS
*SWITCH(CONFIG-IF)#SWITCHPORT ACCESS VLAN 10
*SWITCH(CONFIG-IF)#EXIT
*SWITCH(CONFIG)#INTERFACE FA0/2 (NO OF PC,EX IT IS PC NO 2)
*SWITCH(CONFIG-IF)#SWITCHPORT MODE ACCESS
*SWITCH(CONFIG-IF)#SWITCHPORT ACCESS VLAN 20
*SWITCH(CONFIG-IF)#EXIT
*SWITCH(CONFIG)#INTERFACE FA0/3 (NO OF PC, EX IT IS PC NO 3)
*SWITCH(CONFIG-IF)#SWITCHPORT MODE ACCESS
*SWITCH(CONFIG-IF)#SWITCHPORT ACESS VLAN 30
*SWITCH(CONFIG-IF)#EXIT
*SWITCH(CONFIG)#EXIT
*SWITCH#WRITE
*SWITCH# CONFIGURE TERMINAL
*SWITCH(CONFIG)#INTERFACE FA0/4 (NO OF SWITCH OTHERS ARE
ACESS PORT)
*SWITCH(CONFIG-IF)#SWITCHPORT MODE TRUNK
*SWITCH(CONFIG-IF)#EXIT
*SWITCH(CONFIG)#EXIT
*SWITCH# SHOW INTERFACES TRUNK

SWITCH – 2
*SWITCH>ENABLE
*SWITCH#CONFIGURE TERMINAL
*SWITCH(CONFIG)#VLAN 10 (VLAN CAN BE ANY UNDER RANGE)
*SWITCH(CONFIG-VLAN)#NAME COMPUTER (CAN BE ANY NAME)
*SWITCH(CONFIG-VLAN)#EXIT
*SWITCH(CONFIG)#VLAN 20
*SWITCH(CONFIG-VLAN)#NAME BIO (CAN BE ANY NAME)
*SWITCH(CONFIG-VLAN)#EXIT
*SWITCH(CONFIG)#VLAN 30
*SWITCH(CONFIG-VLAN)#NAME IT (CAN BE ANY NAME)
*SWITCH(CONFIG-VLAN)#EXIT
*SWITCH(CONFIG)#EXIT
*SWITCH# WRITE
*SWITCH# SHOW VLAN BRIEF
*SWITCH#CONFIGURE TERMINAL
*SWITCH(CONFIG)#INTERFACE FA0/1 (NO OF PC, EX IT IS PC NO 1)
*SWITCH(CONFIG-IF)#SWITCHPORT MODE ACCESS
*SWITCH(CONFIG-IF)#SWITCHPORT ACCESS VLAN 10
*SWITCH(CONFIG-IF)#EXIT
*SWITCH(CONFIG)#INTERFACE FA0/2 (NO OF PC,EX IT IS PC NO 2)
*SWITCH(CONFIG-IF)#SWITCHPORT MODE ACCESS
*SWITCH(CONFIG-IF)#SWITCHPORT ACCESS VLAN 20
*SWITCH(CONFIG-IF)#EXIT
*SWITCH(CONFIG)#INTERFACE FA0/3 (NO OF PC, EX IT IS PC NO 3)
*SWITCH(CONFIG-IF)#SWITCHPORT MODE ACCESS
*SWITCH(CONFIG-IF)#SWITCHPORT ACESS VLAN 30
*SWITCH(CONFIG-IF)#EXIT
*SWITCH(CONFIG)#EXIT
*SWITCH#WRITE
*SWITCH# CONFIGURE TERMINAL
*SWITCH(CONFIG)#INTERFACE FA0/4 (NO OF SWITCH OTHERS ARE
ACESS PORT)
*SWITCH(CONFIG-IF)#SWITCHPORT MODE TRUNK
*SWITCH(CONFIG-IF)#EXIT
*SWITCH(CONFIG)#EXIT
*SWITCH# SHOW INTERFACES TRUNK
(CHECK OPEN ANY DEVICE AND GO TO CMD AND TYPE PING (IP))
(SUBNET MASK SHOULD BE SAME IN DEVICE 1 IN SWITCH AND DEVICE
2 IN SWITCH 2 , IP SHOULD BE IN SAME RANGE THROUT THE CONNECT)

TO FIND SUBNET MASK OF IP


*HOST IS REQUIRED
*EX
HOST = 30,AND SUBNET MASK = 30 COMES IN RANGE (2POWER
TABLE) OF 32 SO 32-2 = 30 AND ALL THE VALUES FROM 32 TO 128 ARE
ONE AND BELOW 32 ARE 0 SO WE NEED TO FIND CIDR VALUE TO FIND
SUBNET MASK, SO CIDR VALUE 11111111.1111111.11111111.111
255.255.255.(SINSE VALUE 111 IS 224) SO CIDR VALUE = 27
SUBNET MASK = 255.255.255.(254 – 30 = 224)

ROUTING
*RIP – ROUTING INFORMATION PROTOCAL
*RIP COMES IN 2 (OR) 3 DIFFERENT VERSIONS
VERSION – 1 DISTANCE VECTOR PROTOCAL
VERSION – 2 HYBRID PROTOCAL
*RIPV-1 (OLDER ROUTER)
*SUPPORTS ONLY CLASSFULL ROUTING (DOES NOT SUPPORT VLSM)
*NO AUTHENTICATION
*RIPV-1 USES BROADCAST
*RIPV-2
*SUPPORTS ONLY CLASSLESS ROUTING
*AUTHENTICATION IS AVAILABLE
*RIPV-2 USES MULTICAST INSTEAD OF BROADCAST

METHOD OF ROUTING
*STATIC ROUTING
*DEFAULT ROUTING
*DYNAMIC ROUTING

STATIC ROUTING
*IT IS ROUTE THAT IS MANUVALLY CONFIGURE ON THE ROUTER STATIC
ROUTER THAT IS CREATED MANUVALLY BY A NETWORK THIS IS A
METHOD FOR SMALL NETWORK IT IS NOT ADVISABLE FOR LARGER
NETWORK

DEFAULT ROUTING
*THIS IS A METHOD IN WHICH ALL ROUTERS ARE CONFIGURED TO
SEND ALL PACKETS TOWARD A SINGLE ROUTER THIS IS VERY USEFULL
IN SMALL NETWORK USED TO ADDING STATIC AND DYNAMIC ROUTING

DYNAMIC ROUTING
*THIS IS THE METHOD WHERE PROTOCAL AND ALGORITHAMS ARE
USED TO AUTOMATICALLY PROPAGATE ROUTING INFORMATION
*THIS IS MOST COMMAN METHOD AND MOST COMPLEX METHOD OF
ROUTING

SERIAL CABLE
*CONNECT TWO ROUTERS
*CABLE HAVE TWO INTERFACES THEY ARE DTE (DATA TERMINAL
EQUIPMENT , DCE (DATA CIRCUIT TERMINATION EQUIPMENT)
*CLOCK RATE IS SET TO CONTROLL THE SPEED OF TRANSACTION IN
CABLE
*ROUTER DO NOT HAVE SERIAL PORT IT SHOULD BE ADDED BY
TURNING OFF THE SWITCH AND DRAGING HWIC-2T PORT

ROUTING PROTOCAL
*IT IS A PROTOCAL USED TO COMMUNICATION BETWEEN TWO
ROUTER
COMMAND FOR CONNECTION AND SETTING CLOCKRATE,IP
*ROUTER>ENABLE
*ROUTER# CONFIG TERMINAL
*ROUTER(CONFIG)# INTERFACE (CONNECTED INTERFACE)
*ROUTER(CONFIG-IF)#IP ADDRESS 192.168.10.1 255.255.255.0
*ROUTER(CONFIG-IF)#NO SHUTDOWN
*ROUTER(CONFIG-IF)#EXIT
*ROUTER(CONFIG)#CLOCKRATE (USE QUESTION MARK TO KNOW
CLOCK SPEED (OR) TYPE CLOCK RATE 64000)
(CONFIGURE CLOCK RATE ONLY IN PORT WHICH SHOWS CLOCK
SYMBOL)
STATIC ROUTING PROTOCAL CONFIGURING COMMANDS
*RI(CONFIG)# IP ROUTE (IP) (SUBNETMASK) (IP)
DEFAULT ROUTING PROTOCAL CONFIGURING COMMANDS
*RI(CONFIG)# IP ROUTE 0.0.0.0 0.0.0.0 (TARGET IP)
ALL COMMMANDS HAVE EXAMPLE REFER CEH FILE

Вам также может понравиться