slide for sharing

Embed Size (px)

Citation preview

  • 8/7/2019 slide for sharing

    1/65

    Exploring the FunctionsExploring the Functions of Networkingof Networking

    What Is a Network?

    ICND1 volume 1

  • 8/7/2019 slide for sharing

    2/65

    Common Physical Components of a NetworkCommon Physical Components of a Network

  • 8/7/2019 slide for sharing

    3/65

    Interpreting a Network DiagramInterpreting a Network Diagram

  • 8/7/2019 slide for sharing

    4/65

    ResourceResource--Sharing FunctionsSharing Functions andand BenefitsBenefits

    Data and applications

    Resources

    Network storage

    Backup devices

  • 8/7/2019 slide for sharing

    5/65

    Impact of User Applications on the NetworkImpact of User Applications on the Network

    Impact of User Applications on the

    Network

    Batch applications

    FTP, TFTP, inventory updates No direct human interaction

    Bandwidth important, but not critical

    Interactive applications

    Inventory inquiries, database updates.

    Human-to-machine interaction.

    Because a human is waiting for a

    response, response time is important

    but not critical, unless the wait

    becomes excessive.

    Real-time applications

    VoIP, video

    Human-to-human interaction

    End-to-end latency critical

    Impact of User Applications on the Network

  • 8/7/2019 slide for sharing

    6/65

    Understanding theUnderstanding the HostHost--toto--HostHostCommunicationsCommunications ModelModel

    Older model

    Proprietary

    Application and combinations software

    controlled by one

    vendor Standards-based model

    Multivendor software

    Layered approach

    Understanding Host-to-Host Communications

  • 8/7/2019 slide for sharing

    7/65

    The OSI Reference ModelThe OSI Reference Model

    Reduces complexity

    Standardizes interfaces Facilitates modular engineering

    Ensures interoperable Technology

    Accelerates evolution

    Simplifies teaching and learning

    Why a Layered Network Model?

  • 8/7/2019 slide for sharing

    8/65

    Layer 1:The Physical LayerLayer 1:The Physical LayerThe Seven Layers of the OSI Model

  • 8/7/2019 slide for sharing

    9/65

    Layer 2:The Data Link LayerLayer 2:The Data Link Layer

  • 8/7/2019 slide for sharing

    10/65

    Layer 3:The Network LayerLayer 3:The Network Layer

  • 8/7/2019 slide for sharing

    11/65

    Layer 4:TheTransport LayerLayer 4:TheTransport Layer

  • 8/7/2019 slide for sharing

    12/65

    Layer 5:The Session LayerLayer 5:The Session Layer

  • 8/7/2019 slide for sharing

    13/65

    Layer 6:The Presentation LayerLayer 6:The Presentation LayerThe Seven Layers of the OSI Model (Cont.)

  • 8/7/2019 slide for sharing

    14/65

    Layer 7:The Application LayerLayer 7:The Application Layer

    The Seven Layers of the OSI Model (Cont.)

  • 8/7/2019 slide for sharing

    15/65

    Encapsulation and DeEncapsulation and De--EncapsulationEncapsulation

    Data Encapsulation

  • 8/7/2019 slide for sharing

    16/65

    Encapsulation and DeEncapsulation and De--EncapsulationEncapsulation

    Data De-Encapsulation

  • 8/7/2019 slide for sharing

    17/65

    PeerPeer--toto--Peer CommunicationPeer Communication

    Peer-to-Peer Communication

  • 8/7/2019 slide for sharing

    18/65

    TCP/IP SuiteTCP/IP Suite

    Defines four layers

    Uses different names for Layers 1 through 3

    Combines Layers 5 through 7 into single

    application layer

    TCP/IP Stack

  • 8/7/2019 slide for sharing

    19/65

    TCP/IP Stack vs. the OSI ModelTCP/IP Stack vs. the OSI Model

  • 8/7/2019 slide for sharing

    20/65

    Understanding the TCP/IPUnderstanding the TCP/IP

    Internet LayerInternet LayerIP Address Format: Dotted Decimal Notation

    The binary-to-decimal and decimal-to binary conversion will be

    detailed later in this course.

  • 8/7/2019 slide for sharing

    21/65

    IP Address Classes:The FirstIP Address Classes:The First

    OctetOctet

  • 8/7/2019 slide for sharing

    22/65

    IP Address RangesIP Address Ranges

    *127 (01111111) is a Class A address reserved for loopback testing

    and cannot be assigned to a network.

    IP Address Ranges

  • 8/7/2019 slide for sharing

    23/65

    Dynamic Host ConfigurationDynamic Host ConfigurationProtocol (DHCP)Protocol (DHCP)

    DHCP

  • 8/7/2019 slide for sharing

    24/65

    Understanding EthernetUnderstanding Ethernet

    Local Area Network

  • 8/7/2019 slide for sharing

    25/65

    Ethernet Frame AddressingEthernet Frame Addressing

    Communicating Within the LAN

  • 8/7/2019 slide for sharing

    26/65

    Ethernet LAN SegmentsEthernet LAN Segments

    Signals degrade with transmission distance.

    Each Ethernet type has a maximum segment length

    LAN Segment Limitations

  • 8/7/2019 slide for sharing

    27/65

    Extending a LAN SegmentExtending a LAN Segment

    Shares bandwidth

    Extends cable distances

    Repeats or amplifies signal

    Extending LAN Segments

  • 8/7/2019 slide for sharing

    28/65

    CollisionsCollisions

  • 8/7/2019 slide for sharing

    29/65

    Multiple Collision DomainsMultiple Collision Domains

    Multiple Collision Domains

  • 8/7/2019 slide for sharing

    30/65

    Typical Causes of Network CongestionTypical Causes of Network Congestion

    Network Congestion

  • 8/7/2019 slide for sharing

    31/65

    BridgesBridgesEarly Solutions to NetworkEarly Solutions to NetworkCongestionCongestion

    Bridges

    Operate at Layer 2 of the OSI model

    Forward, filter, or flood frames

    Have few ports

    Are slow

  • 8/7/2019 slide for sharing

    32/65

    Switches vs. BridgesSwitches vs. Bridges

  • 8/7/2019 slide for sharing

    33/65

    How Switches Segment the EthernetHow Switches Segment the Ethernet

    NetworkNetwork

    Switches Supersede Bridges

    Operate at Layer 2 of the OSI model

    Forward, filter, or flood frames

    Have many ports

    Are fast

  • 8/7/2019 slide for sharing

    34/65

    Switching in ActionSwitching in Action

  • 8/7/2019 slide for sharing

    35/65

    LANs Using SwitchedTechnologyLANs Using SwitchedTechnology

    Users grouped by physical location

    More switches added to networks

    Switches connected by high-speed links

    LANsToday

  • 8/7/2019 slide for sharing

    36/65

    VLAN OverviewVLAN Overview

    Segmentation

    Flexibility

    Security

    VLAN Overview

    VLAN = Broadcast Domain = Logical Network (Subnet)

  • 8/7/2019 slide for sharing

    37/65

    Cisco IOS Software Features andCisco IOS Software Features and

    FunctionsFunctions

    Cisco IOS Software

    Features to carry the chosen network protocols and functions Connectivity for high-speed traffic between devices

    Security to control access and prohibit unauthorized network use

    Scalability to add interfaces and capability as needed for network Growth

    Reliability to ensure dependable access to networked resources

  • 8/7/2019 slide for sharing

    38/65

    Cisco IOS Software FeaturesCisco IOS Software Features

    and Functionsand Functions

    An Overview of Cisco Device Startup

  • 8/7/2019 slide for sharing

    39/65

    External Configuration SourcesExternal Configuration Sources

    Configurations can come from many sources.

    Configurations will act in device memory.

    - Personal computer (PC) or equivalent with communications softwareconfigured with the following settings:

    Speed: 9600 b/s

    Data bits: 8

    Parity: None

    Stop bit: 1

    Flow control: None

  • 8/7/2019 slide for sharing

    40/65

    Cisco IOS CommandCisco IOS Command--Line InterfaceLine InterfaceFunctionsFunctions

    CLI is used to enter commands.

    Operations vary on different

    internetworking devices. Users type or paste entries in the console

    command modes.

    Command modes have distinctive

    prompts.

    Enter key instructs device to parse and

    execute the command.Two primary EXEC modes are user mode

    and privileged mode.

    Cisco IOS User Interface Functions

  • 8/7/2019 slide for sharing

    41/65

    Entering the EXEC ModesEntering the EXEC Modes

    There are two main EXEC modes for entering commands.

    Cisco IOS Software EXEC Mode (User)

  • 8/7/2019 slide for sharing

    42/65

    Entering the Privilege ModesEntering the Privilege Modes

    Cisco IOS Software EXEC Mode

    (Privileged)

  • 8/7/2019 slide for sharing

    43/65

    Keyboard Help in the CLIKeyboard Help in the CLI

    Switch Command-Line Help Facilities

  • 8/7/2019 slide for sharing

    44/65

    ContextContext--Sensitive HelpSensitive Help

  • 8/7/2019 slide for sharing

    45/65

    ContextContext--Sensitive Help (Cont.)Sensitive Help (Cont.)

  • 8/7/2019 slide for sharing

    46/65

    Enhanced Editing CommandsEnhanced Editing Commands

  • 8/7/2019 slide for sharing

    47/65

    Viewing the ConfigurationViewing the Configuration

  • 8/7/2019 slide for sharing

    48/65

    show runningshow running--configconfig and showand show

    startupconfigstartupconfig CommandsCommands

    Displays the current and saved configuration

  • 8/7/2019 slide for sharing

    49/65

    Logging In to the SwitchLogging In to the Switch

    Logging In to the Switch and Entering the Privileged EXECMode

  • 8/7/2019 slide for sharing

    50/65

    Configuring a Switch from theConfiguring a Switch from the

    Command LineCommand Line

    Configuration modes: Global configuration mode

    SwitchX#configure terminalSwitchX(config)#

    Interface configuration mode

    SwitchX(config)#interface fa0/1

    SwitchX(config-if)#

    Configuring the Switch

  • 8/7/2019 slide for sharing

    51/65

    Configuring Switch IdentificationConfiguring Switch Identification

    Sets the local identity for the switch

  • 8/7/2019 slide for sharing

    52/65

    Configuring the Switch IPConfiguring the Switch IP

    AddressAddress

    SwitchX(config)#interface vlan 1SwitchX(config-if)#ip address {ip address} {mask}

    Example:

    SwitchX(config)#interface vlan 1SwitchX(config-if)#ip address 10.5.5.11 255.255.255.0

    SwitchX(config-if)#no shutdown

    Note: It is necessary to use the no shutdown command to maketheinterface operational.

  • 8/7/2019 slide for sharing

    53/65

    Configuring the Switch DefaultConfiguring the Switch Default

    GatewayGateway

    SwitchX(config)#ip default-gateway {ip address}

    SwitchX(config)#ip default-gateway 172.20.137.1

    Example:

  • 8/7/2019 slide for sharing

    54/65

    Saving ConfigurationsSaving Configurations

    SwitchX

    SwitchX copy running-config startup-configDestination filename [startup-config]?

    Building configurationSwitchX

    Copies the current configuration to NVRAM

  • 8/7/2019 slide for sharing

    55/65

    Showing the Switch Initial StartupShowing the Switch Initial Startup

    StatusStatus

    Showing Switch Initial Startup Status

    SwitchX#show version

    Displays the configuration of the system hardware, software version, names and

    sources of configuration files, and boot images

    SwitchX#show running-config

    SwitchX#show interfaces

    Displays the current active configuration file of the switch

    Displays statistics for all interfaces configured on the

    switch

  • 8/7/2019 slide for sharing

    56/65

    Switch show version CommandSwitch show version Command

  • 8/7/2019 slide for sharing

    57/65

    Switch show interfaces CommandSwitch show interfaces Command

  • 8/7/2019 slide for sharing

    58/65

    MAC AddressTable ManagementMAC AddressTable Management

    Catalyst 2960 Series

    Managing the MAC AddressTable

  • 8/7/2019 slide for sharing

    59/65

    Understanding Switch SecurityUnderstanding Switch Security

    Configuring a Switch Password

  • 8/7/2019 slide for sharing

    60/65

    Configuring the Login BannerConfiguring the Login Banner

    SwitchX# banner login " Access for authorized users only. Please enter your

    username and password. "

    Defines and enables a customized banner to be displayed before

    the username and password login prompts.

    Configuring the Login Banner

  • 8/7/2019 slide for sharing

    61/65

    Telnet vs. SSH AccessTelnet vs. SSH Access

    Telnet

    Most common access method

    Insecure

    SSH-encrypted

  • 8/7/2019 slide for sharing

    62/65

    Port Security ConfigurationPort Security Configuration

    Cisco Catalyst 2960 Series

    Configuring Port Security

  • 8/7/2019 slide for sharing

    63/65

    Verifying Port SecurityVerifying Port Security

    on the Catalyst 2960 Serieson the Catalyst 2960 Series

  • 8/7/2019 slide for sharing

    64/65

    Verifying Port SecurityVerifying Port Security

    on the Catalyst 2960 Series (Cont.)on the Catalyst 2960 Series (Cont.)

  • 8/7/2019 slide for sharing

    65/65