Cisco CCNA Command Guide 3 in 1 - Beginner - Stuart Nicholas
Cisco CCNA Command Guide 3 in 1 - Beginner - Stuart Nicholas
This document is geared towards providing exact and reliable information in regards to the topic and
issue covered. The publication is sold with the idea that the publisher is not required to render
accounting, officially permitted or otherwise qualified services. If advice is necessary, legal or
professional, a practiced individual in the profession should be ordered.
From a Declaration of Principles which was accepted and approved equally by a Committee of the
American Bar Association and a Committee of Publishers and Associations.
In no way is it legal to reproduce, duplicate, or transmit any part of this document in either electronic
means or in printed format. Recording of this publication is strictly prohibited, and any storage of this
document is not allowed unless with written permission from the publisher. All rights reserved.
The information provided herein is truthful and consistent, in that any liability, in terms of inattention
or otherwise, by any usage or abuse of any policies, processes, or directions contained within is the
solitary and utter responsibility of the recipient reader. Under no circumstances will any legal
responsibility or blame be held against the publisher for any reparation, damages, or monetary loss
due to the information herein, either directly or indirectly.
Respective authors own all copyrights not held by the publisher.
The information herein is offered for informational purposes solely and is universal as so. The
presentation of the information is without a contract or any type of guarantee assurance.
The trademarks that are used are without any consent, and the publication of the trademark is without
permission or backing by the trademark owner. All trademarks and brands within this book are for
clarifying purposes only and are owned by the owners themselves, not affiliated with this document.
Table of Contents
Introduction
Chapter 1 : Fundamentals of Computer Networks
Components
Network Architecture
Communication Protocols
Most Important TCP / IP Services
Types of Networks
Chapter 4 : TCP / IP
The Internet Protocol (IP)
Classification of IP Addresses
Router and the Subnet Mask
Classless Inter-Domain Routing
The IP Packet
Transmission Control Protocol (TCP)
TCP and UDP Ports in the Automation
Communication Via TCP (UDP) / IP
Endpoint and Internet Socket
Conclusion
References
Introduction
Conclusion
References
Introduction
Chapter Six : Open Shortest Path Protocol (OSPF) Single Area and
Multiarea Configuration
Single Area OSPF Configuration
Multi-area OSPF
OSPF Configuration
Multiarea OSPF Configuration
Loopback Interfaces
Router ID
Configuration: OSPF Single Area
OSPF Single Area Configuration
Conclusion
References
CISCO CCNA
COMMAND GUIDE
STUART NICHOLAS
Introduction
Protocols of Communication
In our relationships in society, daily, use the protocol of good manners, how
to respond "OK" or "more or less" when someone asks us "as you are?".
This is the concept of protocol, preset messages, and responses that can be
used both by individuals or computers to conduct communication.
In a computer network, we use communication protocols to define how the
data will be transmitted.
We may use various protocols to establish a single communication:
one for the definitions of which physical medium is used;
another for what types of information to be exchanged;
another to define how they will be dealt with communication
errors.
In just one simple connection between two computers, they can be used
multiple protocols as needed.
Classification of Networks
Computer networks are physically classified according to their type and
scope. When we connect only two computers or devices, we have a link
point-to-point, such as used during a telephone connection between two
people.
Now, when we have more than two computers, we have a link type
multipoint, as used in telephone meetings between several people.
Regarding its geographical coverage, networks are classified in three ways:
LAN (Local Area Network) - Known as local networks are
limited to the same continuous physical space such as a room, a
building, a company, a condo, or even an industrial complex.
MAN (Metropolitan Area Network) - These are networks that
span one or more nearby cities and share the same physical
medium. Making a strategy with the telephone system, area
code (DDD) represents a MAN network, and it has a
metropolitan scope.
WAN (Wide Area Network) - are networks of scattered
connections over large geographical distances, such as the
interconnection of the array of em- arrested in the capital with
its subsidiaries inside or interconnection from one country to
another.
These interconnections form the WAN may be the most varied possible
connections between LAN and MAN networks.
Now it's your turn!
1. Noting the concepts of the intranet, extranet, and Internet,
which companies use to structure the sharing sensitive
information with its internal public?
2. Cite examples of the links multipoint type.
Physical Topologies
The physical topology of a network is how your devices or computers and a
network are physically connected, with three possible structures (See the
below Table):
Summary of Physical Topologies
bus Ring Star
Computers are The signal circulates The signal is
connected to a single between the computers distributed to
cable linearly. connected in only one computers through a
direction. hub device.
Bus
In the bus topology, all computers are connected to a single cable. In this
way, the network can be expanded easily as it is only necessary to extend
the cable to insert a new computer on the network.
However, there is a big problem that virtually withdrew this topology
strategy of use: if you have a break problem in any part of the cable, all
computers will be without the network.
Ring
In the ring topology, the signal circulating between the computers in one
direction (Figure below). This enables the network to be deterministic, i.e.,
after the computers know how long it takes to pass the signal from its
neighbors, it is possible to know the total time a signal takes to go through
all computers in the ring. However, if there are many stations in the
network, it will be slower.
Star
The star networks require hub equipment (explained in more detail below)
which distributes the signal between computers. Its disadvantage is the need
for a unique cable for each computer, which increases the costs of
deployment, but at the same time brings a great advantage in case of rupture
of a cable, only one prospect computed will be out of network, not all as
occurs in topologies and backslash ring. As a result, the star topology
networks are the majority among the existing local networks today, using
the Ethernet standard in its structure.
To Know More
The Ethernet standard refers to the physical and data-link connections to a
network, such as electrical signals, access protocols in half and speed.
These characteristics influence the definition of physical devices and
cabling. The definition of this and other standards used in computer
networks comes from the Institute of Electrical and Electronics Engineers -
IEEE (Institute of Engineers Electrical and Electronics).
Media
A computer network requires necessarily a means of communication for the
establishment of a connection. The means defining the communication to be
used is the distance desired connection speed and whether or not mobility
(Table below).
Components
When the software component in a network is referred to, reference is made
to the programs necessary to manage the devices that are interconnected by
physical means (hardware). But it is important to emphasize that first, the
physical components are required so that software or logic ones are
installed on them. Software
Components, they are the programs or controllers required to establish
communications between physical components, and enable interoperability
between devices through communication protocols (see Communication
protocols). An excellent example of these components is the network
operating systems and the controllers of each of the physical components.
Operating Systems
The main functions performed by a network operating system are to create,
share, store and retrieve files from the network, as well as transmit data
through the network and its multiple connected computers.
As for the hardware, it is the necessary equipment and primary basis for the
creation of a network. Within these teams, the most representative is the
following:
• Work stations: Computers connected to the network that allows
users to access all the resources of the network (database, printer,
scanner, etc.).
• Servers: Servers are responsible for providing services to
workstations connected to the network. Within these services are
email, printers, and databases.
• Repeaters: Repeaters are devices that amplify the signal emitted by a
segment from one network to another, to increase the reach of the
same networks.
• Bridges: Bridges interconnect two different network segments. One
of its main functions is to restrict the sending of information to
equipment belonging to the same segment, allowing the passage of
those that are directed to different segments and whose MAC address
is within the bridge registration table.
• Routers: Routers enable the routing of information packets in a
network and consist mainly of a routing table, where the routes to the
different devices connected in the network are registered.
• Brouters: Brouters combine the functionality of a router and a bridge
by increasing it. René Montesano Brand, Development of web
applications, write SUA, Plan 2005, School of Accounting and
Administration.
• Hubs: Hubs are electronic devices whose purpose is to increase the
reach of a network and serve as a signal distribution point, by
concentrating in them a link input cable to the network or main server
with several output cables that link to the stations of work. There are
several types of concentrators, from the simplest ones, which function
as a common and current electrical extension, to the intelligent ones,
which have a microprocessor and memory integrated and work with
the SNMP communication protocol (simple network management
protocol), which gives them the ability to detect collisions and control
and diagnose the state of the network.
• Switching hub or Ethernet switch: They divide the network into
several segments, limiting traffic to one or more of them, instead of
allowing packets to be broadcast across all ports. Within the switches,
there is a circuit that works like a traffic light: it creates a series of
address tables where each packet is examined and identifies to which
segment of the network an address belongs and allows it to pass
through it.
It is important to emphasize that, apparently, the previous devices seem the
same, but it is not so; each one does and offers very specific functions; In
addition, some devices include several of the functions of the hubs, such as
router (router) and bridge ( bridge ) in the same device, for example.
In addition, for the correct installation of a network, inputs such as cables,
RJ-45 connectors, jacks, punching pliers, gutters, covers, belts, cable
testers, etc. are needed.
So, to choose the hardware components of a network, it is necessary to
consider the needs that said network must cover. In this order, the questions
to be answered are: what network topology? What is the scope of the
network? What the number of machines and other peripherals that will
connect to the network? What level of security should the network have?
Will it be wired or wireless? What is the transmission speed? And so on.
Topologies
Topologies refer to the way a network is physically structured; that is, how
each component of a network connects with the others. There are several
topologies, each with decisive advantages and disadvantages for network
performance.
To a large extent, the establishment of a topology depends on the following
factors:
Number of Computers
Amount of wiring required
Ease of installation
Way and speed with which data travels on the network
Easy to detect and repair faults that may occur etcetera
It may be that a network is formed by the union of more than one topology,
which is known as hybrid topology, and requires software and hardware, as
the central device (hub), bridges (bridges), routers (routers) or doors link
(gateways).
When selecting the topology that will have a network, two important
aspects should be considered:
1. The physical topology or actual arrangement of the network
components.
2. The logical topology or architecture of the network: the way
machines communicate within the network.
Advantage:
Ease of incorporating or removing devices from the network.
Less wiring is required than in other topologies.
Disadvantages:
The wiring break causes all communication within the network
to be broken.
Network Architecture
The architecture of a network is the standard that defines how the
transmission of electrical signals is carried out. These architectures were
created by the manufacturers of the network cards and the means or wiring
required.
The most common architectures are Ethernet and token ring. Token Ring
Architecture is applied in networks with ring-star topology; the wiring is
arranged in the form of a star, but the signals travel in the form of a ring.
When a computer transmits data to another, it must wait for permission
called a token (witness).
This permit passes from device to device until it reaches one that requires a
transmission. When this happens, the address of the sending device, the
address of the receiving device, and the data to be sent are incorporated into
the token, and so it goes from device to device until it reaches its
destination.
The Ethernet architecture can be used in networks with channel, star, and
star-channel topologies. This architecture is based on the following
premises:
1. All devices have the same right, possibility, or priority to
transmit packets or groups of data.
2. To transmit, you must "listen" until the moment when no device
is making a transmission, and then you can do it.
3. Check that while doing a transmission, no other device tries to
transmit something, to avoid a collision.
Premises
There are several ways to establish a network; these depend on the selected
topology and architecture, the possibility of growth or expansion and
updating, and the speed that is required to make transmissions.
Installing a Wireless Network (WLAN)
To communicate different devices, each of them must have a wireless
network card installed.
Each access point can serve 20 teams or more. The amount is limited for the
use made of the band act; that is, the more devices are running
simultaneously, the slower the transmission will be.
Communication Protocols
For data transmission to be successful, the sender and receiver must follow
certain communication rules for the exchange of information, known as line
protocols.
When different types of microcomputers are connected in a network, the
protocol can become extremely complex. So, for the connections to work,
the network protocols must conform to certain standards.
Originally, the protocols were relatively simple; for example, on which
simple computer-terminal networks were supported, and that was contained
in other computer application programs, such that, in addition to its main
processing function, the computer would be controlling the line
transmission between it and the associated terminals, and other peripheral
equipment.
IBM put into circulation the first set of business standards, which he called
Systems Network Architecture(SNA, systems network architecture), but
only operated with IBM's own team. As the networks became sophisticated,
many computer accessories (equipment from different manufacturers) were
incompatible.
To stop this situation, the concept of layer protocols was developed to
separate all telecommunications functions to form a set of sub-functions by
layers. In a short time, the International Standards Organization (ISO)
defined a series of communications protocols called Open Systems
Interconnection (OSI, open systems interconnection), whose purpose is to
identify the functions provided by any network, taking up the concept of
working in layers, with the idea of establishing global design standards for
all telecommunications data protocols, so that all the equipment produced is
compatible.
In this protocol scheme, each layer would develop a different and self-
sufficient task but would be dependent on the sub-layers. Thus, complex
tasks would comprise several layers, while simple ones only some. The
simple function of each layer would imply simple implementation of
circuitry and logistics and would be independent of the functions of other
layers so that they could be changed, either the functions or the realization
of a functional layer, with minimal impact on logistics and circuitry of the
other layers.
Currently, most commonly used data transfer protocols employ an array of
layer protocols. It is important to study this arrangement to get an accurate
idea of the full range of functions necessary for successful data transfer. In
this order, it is essential to consider the functions of each protocol layer
established in the OSI model (in Spanish, ISA), which is not in itself a set
of protocols but rather fulfills the function of carefully defining the division
of the functional layers, with which it is expected to integrate all modern
protocols.
The principle of the open systems interconnection model states that as long
as the layers interact in a “paired” manner and the interface between the
function of a layer and its immediate upper and lower layer is not affected,
how the function of that individual layer is carried out is not important.
This model subdivides data communication into seven “paired” layers that,
in descending order, are as follows:
Physical layer (layer 1)
Send the data about the medium. It is a combination of material and
logistics that converts the data bits required by the data link layer into
electrical pulses, modem tones, optical signals, or any other entity that will
transmit the data. It ensures that the data is sent over the link and presented
at both ends of the data link layer in the standard form.
Regarding the format that the data must have to be handled by the
protocols, the key is to use headers. Each protocol layer adds a header that
contains information for its own use; thus, the entire message is longer than
the one received from the highest layer (layer 7)
Data link layer (layer 2)
The datalink layer operates only within the individual links of a connection,
handling the transmission of data so that the individual bits are sent over
those links without error.
Network Layer (Layer 3)
It establishes the end-to-end connection through a real network and
determines what permutation of individual links is used (routing functions).
Transport layer (layer 4)
The transport service is responsible for the end-to-end data relay in the
communication session; In addition, it establishes the network connection
that best suits the session requirements in terms of quality of service, data
unit size, flow control, and data mail needs. You must also supply the
network addresses to the network layer for the correct delivery of the
message.
Session Layer (Layer 5)
The session protocol includes commands, for example, start, interrupt,
resume, and end, to manage a communication (conversation) session
between devices in an appropriate and orderly manner.
Presentation layer (layer 6)
Your task is to negotiate a mutually consistent technique for coding and
scoring data (data syntax) and takes care of any necessary conversations
between different code formats or data arrays so that the application layer
receives the type it recognizes.
Application layer (layer 7)
It provides communication services to satisfy all types of data transfer
between cooperating computers.
In reality, most OSI protocol layers exist only in software and can’t be
identified as physical elements; however, not all protocol layers demand to
be instrumented within the same computer program or carried out by the
same part of the team.
Another aspect of the ISO model is that it provides great possibilities and
guarantees the development of very sophisticated networks. It may be that
very complex functions are not needed; in this case, the model allows the
use of null protocols.
For example, in a network that uses similar terminal devices, the syntax
conversion possibilities of the presentation layer are unnecessary. In this
way, it is avoided to implement functions that could increase the cost and
volume of the administration.
Today, the network that connects thousands of networks and millions of
users around the world is the Internet, a huge cooperative community
without central ownership. In itself, the Internet is the conduit for
transporting data between computers. Whoever has access to the Internet
can exchange text, data files, and programs with any other user.
But this would not be possible if each computer connected to the Internet
did not use the same set of rules and procedures (protocols) to control the
synchronization and format of the data. In this order, the set of commands
and synchronization specifications used by the Internet is called the
transmission control protocol / Internet protocol or TCP / IP.
This protocol allows linking any type of computer regardless of the
operating system used or the manufacturer, and the IP system allows
networks to send an email, transfer files and interact with other computers,
no matter where they are located, as long as they have access to the
Internet.
TCP / IP protocols include specifications that identify individual computers
and exchange data between computers. They also include rules for various
categories of application programs. In this way, programs that run on
different types of computers can communicate with each other.
To understand the operation of TCP / IP protocols, the architecture they
propose to communicate networks must be taken into account. Such
architecture considers all networks to be the same when connected,
regardless of their size, whether local or wide coverage.
Likewise, although TCP / IP software may appear different on different
types of computers, it always looks the same to the network; however, all
networks that exchange information must be connected to the same
computer or processing equipment (equipped with communication devices);
that is, routers or bridges. Based on this, Internet activity is understood as
an activity of computers that communicate with other computers through
the use of TCP / IP.
In addition, so that in a network two computers communicate with each
other, both will be accurately identified, since the computer that originates a
transaction will identify with a unique address the destination to which it is
directed; Therefore, on the Internet, each computer has a numerical address
consisting of four parts, known as the Internet protocol address or IP
address. This address identifies both the network to which a computer
belongs and itself within that network because it has routing information.
Types of Networks
Next, the different types of real networks used for sending data will be
reviewed, starting with simple point-to-point technology to WAN networks.
The point to point networks, involving nothing more interconnecting two
teams, are relatively simple to establish and may employ either digital lines
or analog modem lines. Whenever the protocols at both ends of the link
match, the data terminal equipment (DTE) easily dialogue.
In its simplest form, a point-to-point network can be worked in
asynchronous mode, character by character. This is a common method of
connecting remote terminals to a computer. This technique considerably
reduces the complexity and cost of the material and logistics needed at
remote computer terminals.
This kind of connection does not match the ISO ideal since only computer
terminals of this type, and a few manufacturers can be used with third-party
computers, but a disadvantage of the ISO model is the volume of equipment
and logistics indispensable in each transmission and reception device.
Local Networks (LAN network)
LAN networks (Local Area Network) are small, usually tens of meters; for
example, those constituted by the PCs that we find in offices and homes.
These types of networks connect a limited number of equipment (printers,
PCs, scanners, faxes, etc.), and the connectivity between the elements is
ensured through the same wiring. The most used protocol in these networks
is the 10/100/1000 Mbit / s Ethernet.
Metropolitan Networks (MAN Network)
MAN (Metropolitan Area Network) networks are produced as an extension
of LAN to the most geographically extensive areas and generally cover
several kilometers. For example, a company with several branches in the
same city would have several LANs in its buildings, and if it were
connected through rented lines and equipment that would manage the
exchange of information between the networks, it would together form a
MAN.
The protocols and network equipment used in the MAN are adapted to
work with several devices and a transmission capacity for equipment far
superior to local area networks. The most used protocols in this type of
networks are FDDI (fo), token ring (Fo), X25, and frame relay.
Wide or Global Networks (WAN NETWORK)
WAN networks (Wide Area Network) or distributed networks are the
extensions of the concept of MAN or several regions or geographically
remote areas. The most used protocols for these networks are TCP / IP.
ATM and frame relay.
It is important to mention that the main functions of computer networks are
very accessible in this computing medium, to share necessary and detailed
information among users; On the other hand, in the structure of the
topologies, it is necessary to know the type and its characteristics, to select
the type of network that is most suitable for daily use.
Chapter 2
Basic Architecture
of Computer Networking
Data Communication
As Forouzan (2006), data communication is the exchange of information
between two devices through a communication medium such as a wire pair.
A basic data communication system consists of five elements:
1. Message: the information to be transmitted. It may consist of
text, numbers, pictures, audio, and video - or any combination
of these elements;
2. Transmitter: is the device that sends the data message. It can be
a computer, a workstation, a phone, a video camera, among
others;
3. Receiver: it is the device that receives the message. It can be a
computer, a workstation, a phone, a video camera, etc .;
4. Medium: is the physical path through which travels a message
addressed to the receiver;
5. Protocol: is a set of rules governing the communication of da-.
It is an agreement between devices that communicate.
Streaming Data
According to Torres (2004), there are three types of data transmission:
1. Simplex: In this type of data transmission, one device is the
transmitter, and the other is the receiver. Simplex data
transmission is therefore unidirectional;
2. Half-duplex: This type of data transmission is bidirectional, but
because they share the same communication channel, the
devices do not transmit and receive data at the same time;
3. Full-duplex: it is true two-way communication. A and B may
transmit and receive data at the same time.
History
As Morimoto (2008c), the networks have gone through a long process of
evolution before they reach the standards currently used. The first computer
networks were also created during the 60s, as a way to transfer information
from one computer to another.
A brief timeline shows some important moments of developing computer
networks, as can be seen below.
60 - The Beginning
From 1969 to 1972, it was created ARPANET, the embryo of the Internet
we know today. The network went live in December 1969, initially with
only four of us, who responded by SRI names, UCLA, UCSB and Utah and
were hosted, respectively, at the Stanford Research Institute, the University
of California, the University of Santa Barbara and the University of Utah,
all of them in the US. They were linked by 50 kbps links created using
dedicated phone lines, adapted for use as a data link (MORIMOTO, 2008b,
[unpaged]).
The main ARPANET network characteristics were:
a) terminals "dumb" (without processor);
b) communication with a central computer;
c) consolidation of data communication principles;
d) modem appearance;
e) perception by the industry that the use of remote computers would
be decisive in the following decades;
f) individual investment of each manufacturer to develop its own
teleprocessing technology;
g) the huge growth of teleprocessing networks;
h) geographic expansion;
i) variety of applications;
j) the emergence of the need for users of an access system applied
from other systems;
k) interconnection teleprocessing systems;
l) computer networking.
Project ARPA
In 1974, TCP / IP emerged, which became the vo definitive protocol for use
on ARPANET and later the Internet. A network linking several universities
allowed free traffic information, leading to the development of resources
that we USA- today, such as e-mail, telnet, and FTP, that allowed connected
users to exchange information, access other computers remotely, and share
files. At the time, mainframes with good processing power were rare and
incredibly expensive, so they ended up being com- shared between several
researchers and technicians who could be located anywhere on the network
(MORIMOTO, 2008b, [unpaged]).
The main features of this network were:
a) the early era of computer network technology;
b) distributing applications across multiple interconnected computers;
c) the teleprocessing systems continued to exist; however, each
network computer had its own teleprocessing structure;
d) packet switching;
e) the division into several functional layers of the communication
tasks between different computer applications;
f) creating the basic concept of Computer Network Architecture;
g) creating transport protocols;
h) elaboration of mechanisms for flow control, reliability, and routing;
i) development and operation of the first application protocols:
FTP - File Transfer Protocol;
TELNET - Virtual Terminal;
Network Concept
According to Sousa (1999), "computer network is a set of interconnected
devices to exchange information and share resources such as recorded data
files, printers, modems, software, and other equipment."
Classification of Networks
According to Dantas (2002), one of the features most used for classifying
networks is their geographic coverage. Thus, it is conventionally divided
the classification of local networks - LANs (Local Area Networks),
metropolitan - MANs (Metropolitan Area Networks) and wide-area - WANs
(Wide-Area Networks).
LAN
According to Das ([SD], p 246.) The local area network - LAN "is a fa-
mobility communication that provides a high-speed connection between
processors, peripherals, communication terminals, and devices in general in
a single building or campus.”
LAN is the technology that has a good answer for inter-connecting devices
with relatively small distances and with considerable bandwidth.
MAN
Metropolitan networks can be understood as those that provide the
interconnection of local area networks in a metropolitan area of a given
region.
WAN
When the distances involved in the interconnection of computers are
superiors to a metropolitan area and may be geographically dispersed as
large as the distance between continents, the correct approach is the
geographically distributed network (WAN).
Topologies
Topology can be understood as how communication links and switching
devices are interconnected, effectively providing signal transmission
between network nodes. [...]
We can say that the physical topology of a local network comprises the
physical linkages of the computational elements of the network, while the
logical topology of the network refers to how the signal is effectively
transmitted between one computer and another.
Bus
In this type of topology, all PCs are physically attached to the same cable,
with it, any computer can use it as communication is being made.
Star
The star topology uses a peripheral hub, usually a hub, connecting all
machines on the network.
Ring
In this topology, each computer, following a given direction, is connected to
the neighbor computer, which in turn tam- well and connected to the
neighbor and so on, forming a ring.
Broadcast Media
According to Tanembaum (1997), several physical media can be used for
transmission of data. Each has its own niche in terms of bandwidth, delay,
cost, and ease of installation and maintenance. The physical resources are
grouped into guided media such as copper wire and fiber optics, and
unguided media, such as radio waves and laser beams transmitted through
the air.
Coaxial Cable
According to Tanembaum (1997), a coaxial cable consisting of a copper
wire stretched in the central part, surrounded by an insulating material. The
insulation is protected by a cylindrical conductor, usually a strong
interknitted loop. The outer conductor is covered by a protective plastic
layer.
Twisted Pair
According to Torres (2004), the twisted pair is the most used network cable
type currently. There are basically two types of twisted pair: Unshielded,
also called UTP (Unshielded Twisted Pair), and shielding, also called STP
(Shielded Twisted Pair). The difference between them is precisely the
existence in the shielded twisted pair, a mesh around the cable shielding it
against electromagnetic interference.
Categories
According to Morimoto (2008a, [nonpaged]), there are cables of category 1
to category 7:
a) Categories 1 and 2: These two cable categories are no longer
recognized by the TIA (Telecommunications Industry Association),
which is responsible for defining the wiring patterns. They were
used in the past in telephone installations, and category two cables
came to be used in Arcnet networks 2.5 megabits and Token Ring 4
megabits but are not suitable for use in Ethernet networks.
b) Category 3: This was the first pair of wires twisted pattern
developed especially for use in networks. The pattern signal is
certified for up to 16 MHz, allowing its use in 10BASE-T standard,
which is the standard Ethernet network of 10 megabits for cable pair
transitional Cado. Still existed a pattern of 100 megabits to
Category 3 cable, 100BASE-T4, but it is rarely used and is not
supported by all network cards.
c) Category 4: This category cable has a quality slightly superior and
is certified for signal up to 20 MHz. They were used in Token Ring
networks of 16 megabits and could also be used in Ethernet
networks to replace the category three cables. But in practice, this is
unusual. As the categories 1 and 2, the category 4 is no longer
recognized by the TIA and cables are no longer manufactured,
instead of Category 3 cable, which is still being used in telephone
systems.
d) Category 5: the category five cables are the minimum requirement
for 100BASE-TX and 1000BASE-T networks, which are,
respectively, network standards 100 and 1000 megabits currently
used. The Cat 5 cables follow much stricter manufacturing
standards and support frequencies up to 100 MHz, which is a big
jump from the cat ropes 3.
e) Category 6: this category of cable was originally developed for use
in Gigabit Ethernet, but with development of the standard cable
category five adoptions ended up being delayed because, although
the cables category six offer superior quality, the range continues it
is only 100 meters, so that, although the best quality cat six cables is
always desirable, not just existing Tindo gain much in practice.
f) There are also cables category seven that may be used in the
standard 100 gigabits, which is in the early stages of development.
As the cables category five are sufficient for both networks 100 megabits as
1000, they are the most common and cheaper, but the cables Category 6 and
Category 6a are very popular and should replace them over the next few
years. The cables are sold originally at 300 meters boxes, or 1000 feet
(equivalent to 304.8 meters).
Optical Fiber
According to Torres (2001), "the optical fiber transmits information through
light signals instead of electrical signals." The optical fiber is totally
immune to noise; therefore, communication is faster.
According to Morimoto (2008c), natural successors of the twisted pair
cables are fiber optic cables that support even higher speeds and allow for
forward virtually unlimited distances with the use of repeaters. The fiber
optic cables are used to create the backbone routers that connect the internet
key. Without them, the large network would be much slower and much
more expensive access.
According to Das (2002), the optical fibers used in networks are classified
according to the way light travels in the cable, these being the monomode
and multimode.
Singlemode
In a singlemode class, a single light signal is carried directly in the cable
core. The signal can reach distances greater without repetition. This form of
light traffic compared with the transmission fiber in the second class
(Dantas, 2002).
Multimodal
The multimode fiber is characterized by a light beam that travels along its
path, making different refractions in the walls of the cable core (Dantas,
2002).
Layer description
This layer, network access, is the first TCP / IP
network interface model; its function is to support the network
(network access) layer, attract the physical and logical access
services to the physical environment.
The level inter-network (Internet) is responsible
for sending
Inter-network datagrams from one computer to any
(Internet) another computer, regardless of their locations
on the network.
The transport layer is responsible for providing
support to reliably application layer (or not),
Transport
whether the services offered by the network
interface layers and inter-network.
The fourth layer of the TCP / IP is called the
Application application layer. In this layer, the protocols are
that support user applications.
Data Communication Protocol
According to Torres (2004), a protocol is the "language" used by devices on
a network so that they can understand, that is, exchange information with
each other. A protocol is a set of rules governing the communication data
(Forouzan, 2006).
Types of Protocols
There are several types of protocols. Next, described are the main ones:
a) HTTP - HyperText Transfer Protocol - is mainly used for access
SAR data on the World Wide Web This protocol allows the transfer
of data in the form of simple text, hypertext, audio, video and many
others (Forouzan, 2006).
b) SMTP - Simple Mail Transfer Protocol - This protocol is the
default e-mail mechanism internet (Forouzan, 2006);
c) FTP - File Transfer Protocol - FTP file transfer protocol is the
standard mechanism offered by the internet to copy a file from one
host to another (Forouzan, 2006);
d) SNMP - Simple Network Management Protocol - is an Internet
management protocol (Dantas, 2002);
e) DNS - Domain Name Server - this application protocol is fun- to
identify IP addresses and maintain a table with the ways of the
addresses of some networks on the Internet (Dantas, 2002);
f) TCP - Transmission Control Protocol - the feature of this protocol
is to provide a reliable service between applications (Dantas, 2002);
g) UDP - User Datagram Protocol - is known for the characteristic of
being an optimistic protocol, i.e., it sends all its packages,
accredited ing they arrive smoothly and sequentially to the recipient
(Dantas, 2002);
h) IP - Internet Protocol - is the main protocol inter-network level in
the TCP / IP architecture (Dantas, 2002);
i) ICMP - Internet Control Message Protocol - this protocol is to ob-
PURPOSE provides control messages in the communication
between nodes in a network environment TCP / IP (Dantas, 2002);
j) ARP - Adress Resolution Protocol - the protocol that maps an IP
address in its MAC address (Forouzan, 2006);
k) RARP - Reverse Resolution Protocol - the protocol that maps a
MAC address to an IP address (Forouzan, 2006).
IP Addresses
As Morimoto (2006 [unpaged]), "the IP address is divided into two parts.
The first identifies the network to which the computer is the connection,
and the second identifies the host within the network. "
Classes Address
According to Morimoto (2006 [unpaged]), to improve the utilization of
addresses available, developers - TPC / IP shared the IP address into five
classes, called A, B, C, D, and E, and [that] the first three are used for
addressing purposes, and the last two are reserved for future expansions.
Each class reserves a different number of bytes for addressing the network.
In class A, only the first octet identifies the network; in class, B is used the
first two octets, and class C has the first three octets reserved for the
network, and only the latter reserved for the identification of hosts within
the network.
What differentiates a class of addresses of the other is the value of the first
octet. If a number between 1 and 126, have a Class A address A. If the
value of the first octet is a number between 128 and 191, then we have a
class B address, and finally, if the first octet is a number between 192 and
223, will have a class C address.
Wireless Networks
A wireless network refers to a computer network without the need to use
cables. [...] Their classification is based on the area of coverage: personal or
short networks (WPAN), local area networks (WLAN), metropolitan area
networks (WMAN), and geographically distributed networks or long-
distance (WWAN).
WPAN
Wireless Personal Area Network (WPAN) or personal wireless network,
normally [is] used to connect electronic devices physically near you, which
you do not want to be detected at a distance (WIKIPEDIA). According to
Torres (2004), the main equipment used in this network is Bluetooth and
infrared.
Bluetooth
Bluetooth is an open standard for wireless communication, developed by
the Bluetooth Special Interest Group - SIG, which includes several
companies, including Sony, IBM, Intel, Toshiba, and Nokia.
Unlike Wi-Fi standard, which includes the 802.11b, 802.11a, and 802.11g,
used in wireless networks, Bluetooth aims to replace the cables, allowing
mobile phones, palmtops, mouses, headsets, etc., exchange data with each
other and the PC without cables (MORIMOTO, 2007 [unpaged]).
Infra-Red
The infrared is used in wireless LANs, especially those where you need to
connect notebooks.
There are two methods for data transmission using infrared light: direct
transmission and diffuse transmission. [...] Indirect transmission, the
transmitting and receiving devices have a small opening angle, [so they
need to be aligned to transmit the data]. In diffuse transmission, infrared
signals are sent in all directions.
WLAN
Wireless LAN or Wireless Local Area Network (WLAN) "is a local
network that uses radio waves to make an Internet connection or from a
network."
Radio
There are two basic modes of data transmission via radio on- (Figure
Below). The non-directional antennas located where the fingertips region of
radio waves from the transmitting antenna can capture the transmitted data.
[...] This system is widely used in buildings, to connect machines or
networks together without cable. The directional transmission, using small
satellite dishes, [...] only two networks can communicate. This system has a
great advantage, only to transmit data to the receiver (no scattering radio
waves to other antennas).
WMAN
Wireless Metropolitan Area Network (WMAN) means metropolitan
wireless networks. They enable communication of two nodes distant
(MAN) as if they were part of the same local network.
WAN
The Wide Area Network (WAN), wide area network, or long-distance
network, also known as the geographically distributed network, is a
computer network covering a large geographic area (generally you a
country or continent).
Chapter 3
Basic of Ethernet
MAC sublayer:
Coaxial cable for Thick Ethernet has every 2.5 m on a marker to the
correction te ensure positioning of the 10Base5 transceiver (or mouse).
These transceivers are required to stations on the network to connect. They
may only be placed every 2.5 m, to avoid signal reflections, which lead to a
deterioration of the transmission quality.
This implementation form was quickly overtaken. After a short time, the
rigid and thick yellow coax cable was replaced by a black, flexible,
resulting in the implementation of thin Ethernet (10Base2). The connection
of the various stations is accomplished by T-shaped BNC connector pieces,
whereby a maximum segment length of about 200 m is possible to apply.
Many bus technologies an important detail is to be noted for wiring: The
terminating resistor (terminator) - a small and inexpensive component that
must be installed on all ends of the coaxial cable used in Ethernet. A
terminating resistor consists of a resistor that is connected to the central
conductor of the cable to the shield. When an electrical signal reaches the
termination resistor, it is neutralized newly. For the correct operation of a
network of the terminating resistor is indispensable Lich, since electric
signals of light are reflected at a mirror on the ends of a non-terminated
cable as shown.
Fast Ethernet
UTP1 cable, z. B. CAT52 UTP supports data rates up to 100 Mbit / s. The
cable consists of 8 conductors, which are arranged in 4 pairs. The four pairs
can be identified by the fact that the ladder is always fully colored, while
the other conductor of the pair has the same color with white interruptions.
Of the four pairs, 100Base-T 2 are merely used (pair 2: orange/white and
orange, as well as pair 3: green/white and green) at 10 /.
The IEEE specification for 10 / 100Base-T Ethernet determines that the one
pair of pins 1 and 2 of the connector used to be connected, while the second
pair with the pins 3 and 6 are connected. The remaining, unused pairs are
connected to pins 4 and 5 and 7 and 8.
Pin code color function
1 green white + TD
2 green -TD
3 orange / white + RD
4 blue unused
5 Blue White unused
6 orange -RD
7 brown / white unused
8th brown unused
The above table shows the pinout for 10 / 100Base-T. TD stands for
Transmitted Data, RD for Received Data. The plus and minus signs indicate
that the signal is sent over the wrong sign two data lines.
Straight cable, also called patch cables, are those in which at both ends of
the cable pair 2 with pins 1 and 2 and pair 3 with pins 3 is connected and 6.
This cable may be used to make connections between a patch panel or a PC
and a hub/switch, or between the PC and the wall jack. Generally, these
cables are used for the connection between a structural element and a
terminal.
A crossover cable is required to connections between two PCs (connecting
two check circuit devices) and to produce between a hub/switch and another
Hub / Switch (connection structure of two elements). For producing across
cable, the pairs used must be exchanged with each other: At one end of the
cable pair, 2 is connected to pins 3 and 6 and pair 3 with the pins 1 and 2.
Current Ethernet ports dominate the so-called autocrossing. This
automatically detected, which cable is used and internally made, if
necessary, the intersection.
As an extension of the 10-BaseT standard, the IEEE has defined the Fast
Ethernet (100Base-T). Features of Fast Ethernet are:
Data transmission at a speed of 100 Mbit / s
Full-duplex operation
Switched Ethernet
Gigabit Ethernet
Gigabit Ethernet aims at a data rate of 1000 Mbit / s. If for doing so. B.
CAT5 Ethernet cable to be used, there is a problem, as they only support a
clock frequency to 125 MHz. Therefore, should technology adapt?
First, with 1000Base-T two bits per clock pulse (00, 01, 10, and 11)
encoding, to which four voltage levels are used.
In addition, in 1000Base-T, all four data line pairs are used for the Ethernet
cable. The four pairs are used here bidirectional: on all four pairs of data are
transmitted and received.
So Gigabit Ethernet still uses the 100Base-T / Cat5 clock rate of 125 MHz.
Since at each clock signal over each of the four data line pairs, 2 bits are
processed, a data transmission rate of 1000 Mbit / s in total. This
Modulation server is called as 4D PAM5 called and currently uses five
different voltage levels. The fifth level is used for the failure mechanism.
The table below shows the pin assignments for the Gigabit Ethernet. While
BI is bidirectional; DA, DB, DC, and DD, respectively for data A, data B,
data C and D.
Wireless LAN
IEEE802.11
The IEEE defined under IEEE802.11 different standards for wireless LAN.
The Radio connections in a wireless LAN, see the 2.4 GHz band (the so-
called ISM3 band) or the 5 GHz band instead. For this, no licenses are
required. A wireless LAN comparable applied the so- called spread
spectrum (Spread Spectrum). This technique is specifically designed for
fault-prone transmission channels. This is particularly the processing of
importance because the frequency bands used (especially 2.4 GHz) and
numerous other systems, eg. Bluetooth is used.
A wireless network is generally slower than a hard-wired. Its great
advantage is flexibility.
As a physical implementation provides IEEE802.11 infrastructure and ad
hoc configuration.
The infrastructure configuration, a wireless access point, is used to a wire-
wireless LAN to connect to a wired. The Wireless Access Point acts as a
Zen trail to route all wireless traffic. Wirelessly operating computers are
received in an infrastructure mode, forming a Basic Service Set (BSS)-
called te group. It may each be a maximum of 64 individual computers at
the same time part of a BSS, as the capacity of the wireless access points 64
on clients is limited. The entire wireless network has been called a unique
SSID (Service Set Identifier), also net- kName. This name refers only to the
wireless network.
Under Ad-hoc or peer-to-peer wireless configuration is understood to be
directly communicated with each participant with others. A real
organization of the network is not possible, therefore. An ad-hoc wireless
network consists of several devices which are equipped with a wireless
adapter. These are connected directly via radio signals and thus form an
independent wireless LAN.
WLAN Standards
As part of the IEEE802.11 different standards are defined. These standards
use different modulation techniques to the transmission speeds to optimize
reindeer. The table below shows an overview of the various standards.
default frequency band transfer rate
IEEE802.11b 2.4 GHz 11 Mbit / s
IEEE802.11g 2.4 GHz 54 Mbit / s
IEEE802.11a 5 GHz 54 Mbit / s
IEEE802.11h 5 GHz 54 Mbit / s
IEEE802.11n 5 GHz and / or 2.4 GHz 600 Mbit / s
IEEE802.11b / g
IEEE802.11b / g using the 72 MHz wide portion of the 2.4 GHz band.
Following the regulations of the FCC defined therein, 11 channels with a
width of 22 MHz theoretically would be a bandwidth of these 11 channels
of 242 Mbit / s (11x22 Mbit / s) possible. In practice, this value is not
achieved by far, since the channels greatly overlap. The figure below shows
that only three channels do not mutually overlap each other: Channel 1, 6,
and 11.
The ETSI defines a slightly larger frequency band with 13 channels wide,
each with 22 MHz band. Therefore, generally, 4 to each other hardly-
overlapping channels (namely 1, 5, 9, and 13) are used.
IEEE802.11b supports a maximum speed of 11 Mbit / s. With
IEEE802.11b, a maximum speed of 54 Mbit / s is possible. A poor
connection or distance to the access point, the speed is dynamically
reduced.
IEEE802.11a / h
IEEE802.11a uses the entire 5-GHz band. By applying the OFDM
(orthogonal Frequency Division Multiplexing), IEEE802.11a reaches a
(theoretical) top speed of 54 Mbit / s. The figure below shows the different
channels in the 5 GHz band. This means that on the two lowest bands of the
5 GHz UNII band 8, one other non-overlapping channels with a bandwidth
of 20 MHz are available.
The use of the 5 GHz band is subject to fluctuations compared to the US
numerous restrict-. Therefore IEEE802.11a has been adjusted, which led to
IEEE802.11h.
DCS (Dynamic Channel Selection): The AP will automatically
search for another channel if it finds that another application
already uses a particular channel.
TPC (Transmit Power Control): The transmission power is not
greater than necessary: If two participants have contact with
each other, the AP controls the transmission power to the small
most adequate value.
IEEE802.11n
This new standard uses the MIMO (Multiple Input - Multiple Output),
which by use of multiple transmit and receive antennas data wirelessly at a
speed of up to 600 Mbit / s can be transmitted if 4 channels with a
bandwidth of each 40 MHz be used.
Bluetooth
The standard for the basic technology (the two lowest layers of the OSI
model) is defined in the IEEE802.15.1. It also defined the Bluetooth SIG
(Special Interest Group) different application profiles, including for serial
communication and the transmission of Ethernet data frames.
Bluetooth uses the license-free 2.4 GHz ISM band. In contrast to the
wireless data to be transmitted will not be spread over a wider frequency
band, but it is used for the so-called FHSS (Frequency Hopping Spread
Spectrum). Here, the 2.4 GHz band is divided into 79 channels at 1 MHz.
The figure below shows the operation of FHSS. There are carried out in
1600 frequency hops per second. Each data frame is in each case sent on a
different frequency. In this way, different logical channels can be active
together.
CSMA / CD
Ethernet CSMA / CD protocol used (Carrier Sense Multiple Access /
Collision Detect). With CSMA / CD, two or more stations can create a
common transmission medium groove- a data frame waiting to be sent must
be a station on one idle period "means the inactivity of the bus, sends data
in which no participant will then be sent a message, receive the other
participants if a second participant simultaneous wants to send a message
that a collision is detected the participant who realizes the first collision,
sends an error frame (error frame).
A collision domain is a multi-segment configuration in the CSMA / CD
protocol, is formed during the collision when two participants in the
segment at the same time send a data frame.
A CSMA / CD shows flowchart will send a participant that data must first
check the network for the presence of a carrier or a station; the counter
sends data. If an active carrier is detected, the data is maintained with the
consignors.
Becomes no active carrier is over a period of time greater or equal to the
interframe gap, is detected, the station sending the message can begin.
During transmission of the message of the participants must continue to
check for collisions the medium. Therefore, a network interface must
simultaneously send data and listen to the media. If a collision is detected,
the transmission is immediately interrupted, and a 32-bit long jam signal
transmitted. If the collision is very early detection, the preamble of the
frame is first transmitted completely before the jamming signal is
transmitted. This jam signal is necessary to ensure that the length of the
collision is sufficiently large that all participants can see them. After
sending the jamming signal from the user, it waits a random amount of time
before a new attempt is made. This is called the backoff.
Some other important definitions:
InterFrame Gap: Ethernet stations need two frames between
sending a certain inactive minimum time Idle Period stops. The
inter-frame gap lasts as long as the transfer of 96 bits (9.6
microseconds at 10 Mbit / s, 960 ns at 100 Mbit / s, and 96 ns
in Gigabit Ethernet.).
Slot time: This parameter is defined as 512-bit times for 10 and
100 Mbit / s, while Gigabit Ethernet is the 4096-bit times. The
transmission time for a satisfactory data frame must be a
minimum amount to time slot one. The time that is required
until all participants must detect a collision, more than one slot
time, respectively.
CSMA / CA
When wireless Ethernet CSMA / can not be used the wired Ethernet CD
technology. This standard describes half-duplex radio signals: While DA
sent ten, it can not be checked whether any conflicts exist. Remedy creates
another technology: CSMA / CA. Instead, collisions to realize they are
avoided: CA stands for Collision Avoidance.
The probability of collisions is shortly after a medium was occupied
greatest. There are, therefore, defined waiting times and an access phase.
The next figure shows some important parameters related to the waiting
times for access to the medium. All parameters are dependent on the time
slot, which in turn is derived from the medium caused by the propagation
delay. These parameters are:
SIFS (Short InterFrame Spacing): This is the shortest waiting
time for access to the medium (the highest priority). The access
point uses this waiting time for sending ACK messages.
PIFS (PCF InterFrame Spacing): This time is for polling an
access point comparable uses (medium priority).
DIFS (DCF InterFrame Spacing): This is the lowest priority for
access to the medium and applies to a normal subscriber in the
wireless segment.
If the medium is busy, the system waits until the sending participants the
transmission process has completed are then must wait DIFS respected. The
access point has to comply with a higher priority and must, therefore, only
the waiting time SIFS. If the medium is still free after the DIFS, the access
phase starts in which each host that wants to send data, a random back-off
timer starts. The participant whose backoff timer expires first can take the
initiative to send data over the medium.
The Hub
The maximum segment length of a LAN is determined by the medium used
and to those used access mechanism. To remove the restriction on the
length, it was within a short time element with finding methods for
coupling, and several segments started together. The first and easiest
method here is the use of a repeater. A repeater is a signal amplifier that
packets are regardless of their content transparent. With a repeater, two or
more Ethernet segments can be connected together. As seen in the figure, a
repeater coupling according to ISO / OSI, find definitions on the bit
transmission layer instead.
The transmission media of the segments can be different. Thus, as a
10Base-T segment is coupled using a repeater to an optical fiber segment.
Another important feature of a coupling with a repeater is that not only the
data bits but also checks for collisions and signal errors are passed. Network
segments, which are interconnected via a repeater, are therefore sensitive
learning situations for fault: A in one of the segments occurring error is also
continued in all the other segments. In modern local area networks based on
Ethernet repeaters to interconnect segments of different media are used
mainly. Thus, for example. B. backbone segments (fiber) always via optical
repeaters to department segments with twisted-pair cabling connected.
A hub is actually a multiport repeater: He is an incoming signal to all ports
On the other reindeer on, as shown in Figure above to see. All segments
interconnected via a hub form a collision domain.
Hubs are available in many different versions. They differ in the number of
ports supported media types and extensibility.
An important feature of modern hubs is the ability to network management.
Hubs may comprise at least arrival ports or off, and detect faults around. To
ask choices available, modern hub with an SNMP agent feature, which is
managed by a management station.
The Switch
One of the ways LAN segments with higher intelligence to be connected
with each other is to use a bridge. A bridge is more than just a medium for
the WEI Pass on of data such as the repeater. A bridge examined before
passing a packet from one segment to another, the MAC address, and
decides, depending on whether the transport takes place in the other
segment or not.
A bridge can have two network ports more. In this case, the designation is
needed voltage switch. For each port, the MAC address table is maintained
by software. This table is filled in, in which the switch's MAC addresses
that the sender addresses the participants as waste use registered. Each
address is maintained for a limited time in the table and then deleted when a
certain time, the aging time has elapsed. In this way, prevents stations no
longer recognized or inactive stations are addressed.
The use of a switch for coupling of segments in a local network has overall
genüber the use of a repeater or hub some advantages. Thus, for example.
B. not charged with the use of switch segments with frames that are
addressed to other segments. This feature of the bridge, therefore, reduces
the load per segment. Likewise, error situations will not be because the
switch also checks the correct assembly of the frame. Finally, it is also
prevented by the bridge that piston is passed between frames from one
segment to another. Each port on a switch so concludes a collision domain.
If each participant is connected directly to the port of a switch, though
created many collision domains, but each of them contains only a single
subscriber. Therefore, no collisions can occur. It will be discussed in more
detail elsewhere on the switch.
PSE
The device, which provides the supply voltage for the PoE available is
called PSE (Power Sourcing Equipment). The provided by the PSE
available nominal voltage is 48 V (44-57 V). Each port of a PSE must at 44
V to provide a current of 350 mA is available (15.4 W).
There are two different types:
End Point PSE: a PoE switch replaces the standard Ethernet
switch
Mid clamping PSE: this device is inserted factory participants
between the conventional switch and the network (only possible
with alternative B, see below)
PD
Network stations that receive their power via the Ethernet cable, advertising
the PD (Powered Device) called. To prevent damage from reverse polarity,
PDs are equipped with reverse polarity protection. A PD, according to the
standard, must Alternative A or B supported (see below).
The standard specifies that a PSE affords at least 15.4 W, and a PD at most
12.95 W may commence. The difference is necessary for covering losses in
the twisted pair compensate. A 100 m long cable has an electrical resistance
which provides a voltage drop along the line.
To protect equipment against unexpected stresses, is in preparing the
conjunction, an identification process is performed:
If nothing is connected to the PSE, the port is idle.
A device reports k with a resistance of 25Ω on.
The PSE applies a voltage of 10.1 V and measures the current.
If the current flow is less than the minimum current, the voltage
supply is interrupted.
To determine in detail the class (0 to 3), the PSE applies a
voltage of 20.5 V. After determining the class, the PSE applies
a voltage of 48 V. We distinguish the following performance
categories:
Alternative A
Here, the voltage is transmitted via the data lines. The voltage is supplied
via transformers with center available and to pins 1-2 and 3-6 connected so
that it is invisible to the data stream. This method is suitable for 10/100 /
1000Base-T.
Alternative B
Here, the energy is transmitted via the data that are not used in a UTP cable
for data transmission wires. The pairs 4-5 and 7-8 are used in parallel to the
chip to minimize voltage drop along the line. Plus lies at pins 4 and 5 to
pins 7 and 8.
This method can only be applied when the pairs 1 and 4 are available STE
hen (certain industrial Ethernet cable contains only the pairs 2 and 3), and
they are not used (at 1000Base-T; therefore, the application is not possible).
VLAN
A VLAN or Virtual Local Area Network is a group of participants in a
larger network that forms a logical way, a separate network. In this way,
multiple logical groups can be created in a larger physical network. A
VLAN form a separate broadcast domain. Data packets are only within a
VLAN forwarded. All participants must be physically located in a common
men network, and this network can be using VLANs then divided into
logical segments. Some examples of the division into a network:
by department: one VLAN for the sales department, another for the
engineering and another for automation
by hierarchies: one VLAN for the management, another for the
manager and WEI teres for workers
to use: one VLAN for users who use e-mail services, another
for multimedia users
Benefits of VLANs
The biggest advantage of VLANs is the segmentation of the network. Other
benefits include improved security and the ability to network load
balancing.
Mobility of devices: devices can be implemented within the
network easier to advertising. In a traditional network, cabling
must be adjusted if a user moves from one subnet to another.
Moving from one VLAN to another, however, does not require
any changes in the wiring: It means only an adjustment be
made to the switch. So a station in the sales department can be
implemented at a network port of Engineering. For this, the port
must the engineering VLANs are configured as a member;
however, new cabling is unnecessary.
Additional safety: devices of a VLAN can communicate only
with other devices of the same VLAN. If it wants to
communicate a device of the sales VLAN with the VLAN
automation, it must link set in a router advertising the.
Restriction of traffic on the network: In a traditional network
can broadcast network congestion care. Devices often receive
broadcast messages that they do not need. VLANs limit this
problem as VLANs own broadcast domains form.
Trunking
Trunking (bundling) is exchanging different method VLANs to data
between two switches provided. For this, only one port is needed per
device. There are various methods for carrying out the metal trunking:
ISL: Inter-Switch Link, a widely used proprietary protocol from
Cisco
802.1Q: one of many switch manufacturers supported standard
When trunking a small piece of code (one day) added in which is recorded,
from which VLAN the transmitted packet. Through this system, the
benefits of VLAN remain. The VLANs remain separated, even if they are
spread over separate switches. To still allow traffic between different
VLANs, a router is needed.
Types VLANs
VLANs can be divided into two types: static and dynamic VLANs.
Static VLANs are port-based. The user belongs according to the port to
which it connects his device, for one or another VLAN.
Benefits:
easy to configure
Everything happens in the switch, and the user hardly notices
anything about it. Cons:
If a user's PC to the wrong port connects, the administrators
need tor a reconfiguration is performed.
If at one belonging to a given VLAN port, a second switch is
connected, include all computers that are connected to that
switch automatically to this VLAN.
Dynamic VLANs: These are not based on the ports of a switch, but to the
address of the user or the protocol used.
Advantage: No matter is a computer connected to which port, he is always
on the correct VLAN.
Disadvantage: The cost of this VLAN type is higher because special
hardware is needed.
Network Redundancy
Under Network redundancy, the integration of hardware and software is
meant to ensure that remains the failure of a single point of failure network.
The communication system, the network is the heart of every modern
automation project. To absorb network error, different protocols can be
integrated into structural elements. There are three main groups:
1) STP / RSTP (Rapid) Spanning Tree Protocol. in meshed topologies
that can be locked applies.
2) MRP: Media Redundancy Protocol, exclusively for ring topologies.
3) PRP: Parallel Redundancy Protocol
The figure above shows a network with five different structural elements. It
created various dene redundant connections. Thus impermissible loops may
occur that will bring the network quickly into saturation. The RSTP
converts this topology by switching off some ports into a tree structure.
Here, one of the Structural elements is configured as root. From this root of
all switches via a single path can be reached. If a network failure occurs, a
new active path is created.
Important Supplements
LLDP
The IEEE802.1AB protocol (Link Layer Discovery Protocol, LLDP) is a
standard that can be solved with the configuration problems for large LAN
structures. The protocol defines a standard way for switches, routers,
wireless access points, etc. to transmit information about themselves to
other network participants and to store information about neighboring
participants. LLDP is possible with all 802 media. It operates at the data
link layer.
A switch that supports LLDP can other participants that also support this
protocol, perform topology detection. Benefits:
Improved detection of network failures
Aid in the replacement of modules
Better network configuration and better network management
EEE 802.1x
IEEE802.1X is a security standard for authentication on each individual
port switches. The authentication takes place before the participant can
access the network. The detection of an authorized subscriber, therefore,
occurs at layer 2 of the OSI model, and that - depending on the hardware
used - both in wireless and wire-bound in networks.
IEEE802.1X uses a protocol for exchanging information with
participants/devices to permission to access the network via a port request.
The Messages contain a user name and password. The switch performs an
authenticated notification of itself but depends, in turn, a request to a
RADIUS authentication server on the network. This server processes the
request and notifies the switch which port to open for the participant.
As part of the protocol, there are three important players:
The user or client, it is referred to in the report as SSupplicant
";
The access hardware (a switch or access point) acts as
Äuthenticator ";
RADIUS infrastructure is the controlling authority: the
Äuthentication Server. "
The current LAN technologies see data rates before 10, 100, and 1000
Mbps. With link aggregation, if necessary, intermediate values can be
achieved. By bundling of several 1000-Mbps paths and high-speed
connections can be made.
Link aggregation is possible in several ways:
The link between two switches
The connection between the switch and terminal
The connection between two terminals
The figure above shows, such as switches is connected via two 100 Mbps
lines. If one of these compounds is omitted, assumes the other of the Link
Aggregation Group.
The IEEE 802.3ad standard currently describes the Link Aggregation. In
this method, one or more compounds to a so-called link-aggregation Ag
Group can be bundled. A MAC client can use this group then as if it were a
single compound (IEEE 802.3 standard, Edition 2000).
The IEEE802.3ad standard also describes the use of the LACP (Link
Aggregation Control Protocol) to exchange simple way configuration
information between the different systems. In this way, an automatic
configuration is also possible Lich like surveillance of all link aggregation
groups. The exchange of information happens over those described in the
standard LACP frames.
Industrial Ethernet
In recent years, the Ethernet is turning more and more reasonable in
industrial environments. The differences between office and industrial
environments are great. The term Industrial Ethernet refers to the use of
industrial products, to satisfy the specific requirements of the industry.
Chapter 4
TCP / IP
The Internet Protocol (IP) is (the OSI model layer 3) applies reasonable at
the network layer. This layer is responsible for providing and transporting
information across different networks. For this purpose, a uniform
Addressing of need: the IP address.
As long as the information transfer takes place within the same network, the
DIE function can be disregarded. The connection between different
networks is made together by routers. If different networks into a larger
whole connectedness to, then you have also any network at a unique
address identifiable. Therefore, each network is assigned a unique network
address. Based on this network address to each subscriber of the network
will be assigned a unique address within half this network address space.
The uniform addressing is based on this principle. The address is defined on
the IP layer and IP address called.
The IP Address
Generally, An IP address consists of 32 bits or 4 bytes, which are
represented by 4 separated by a point decimal number.
Each network has a name (Net ID), and each network device is assigned a
unique number (host ID) within this network.
Classification of IP Addresses
IP addresses are divided into different classes. The Figure below shows an
overview.
The table below shows the characteristics of the classes A, B, and C. Class
D was added to send multicast messages easily. Class E is still unused at
present.
The number of bytes distinguishes the classes A, B, and C, respectively
used for the Net ID one hand, and the host id other. The most significant
bits of the IP address which class an IP address belongs to.
class A Net ID Byte 1, the first bit is 0, (0 xxxxxxx) 126 possible network
addresses
Host ID
Byte 2 Byte 3 + + byte 4
range example 16777214 possible hosts per network
The addressing of CIDR also allows the Summary of the Route (Route
Aggregation "). This can represent table routing one parent Route numerous
minor routes in a global. In this way, a complete hierarchical structural
created structure associated with the allocation of compared telephone
numbers in local networks advertising the can.
Examples
Show that the server with the IP addresses or 203.125.72.28/28
203.125.72.34/28 does not belong to the same network.
The IP address of a host is 192.168.100.102/27.
The IP Packet
The information that needs to be transmitted is moved to the Internet layer
from the transport layer. The information is packed by the internet layer
packs in the field of data and then includes the IP header. This IP packet is
then passed layer for further processing of the mediation. Sending data to
the protocol is done based on the IP packets.
If a router gets a packet of IPv4 that is too large for the network into which
the packet is to be forwarded, the router separates the packet into several
smaller packets that fit into the data frames of the subnet concerned. When
these packets reach their final destination, the IPv4 protocol of the target
host reassembles these packets in the original order. When splitting a
package:
Each package gets its own IP header.
All part messages belonging to the same original message, save
the original identification field. The flag more fragments flag
indicates that there are more fragments. The last fragment of
this flag is not set.
The fragment offset field in there, at which point the fragment
in question has the original message.
01hICMP
06h TCP
11hUDP
Header Checksum: Each router recomputes this checksum for
the IP header.
Source IP Address: IP address of the sending station.
Destination IP Address: IP address of the receiving party.
Options: additional network information in the IP header can be
accommodated. If the option data does not end with a 32-bit
word, the rest is filled with zeros.
IPv6
Generally, the most recent previously discussed in this chapter IP protocol
has version number 4 (IPv4). However, a new version is necessary due to
the huge success of the IP protocol. There is a clear lack of IP addresses.
Also, new features need to integrate multiple switches. Also, a new version
of the IP protocol can also provide higher performance.
The introduction of IPv6 also brings a practical problem: How can the
Internet accessible to the public, which so far is working on the basis of
IPv4, switch to IPv6? The easiest way is the so-called dual-stack approach.
Here is implemented in knots, both IPv6 and IPv4. These nodes can
process; therefore, both IPv4 and IPv6 datagrams.
In the field of industrial automation is not working at the time on the
integration of IPv6.
The following are some features of IPv6 are described briefly. There are,
however, as far as possible, the characteristics that have made IPv4 so
successful considered.
IP Address
IPv6 provides IP addresses before with a length of 128 bits. This creates
extensive addressing. The 128 bits long addresses are recorded in 8 separate
from each other by colons groups of 4 hexadecimal digits:
2000: 0000: 0000: 0FED: CBA9: 8765: 4321
2000 :: FED: CBA9: 8765: 4321
IPv4 addresses: 192.32.20.46
IPv6 header has been changed extensively. It is now used as a simpler basic
header, which provides the ability to integrate optional headers and
processing time header ensures to offer a substantial reduction of the router.
Some IPv4 fields there are not more or available only as an option. The
fields in the IPv6 header:
To identify a 20-bit identification number to a packet in a data
stream: flow label.
Hop Limit: The maximum number of routers that can pass
through a particular package.
Next Header: Defines the type of the first optional header.
Version field: This 4-bit field specifies the IP version number.
For IPv6, this value is the sixth
Payload Length: This 16-bit number is an unsigned integer
value, specifying the number of bytes in the IPv6 datagram,
which follows after the 40-byte standard header.
Since the protocols of the transport layer (TCP and UDP) and
link layer (z. B. ethernet) calculate the Internet checksum were
the IPv6 developers, believe that in the Internet layer no
checksum is needed
Reliability is Guaranteed
TCP is a library of routines that can be used by applications when they want
to add a reliable communication with another participant or host.
To ensure complete reliability, TCP uses a variety of techniques.
Resending datagrams: If TCP receives data, it sends an acknowledgment
(Acknowledgement) back to the sender. Every time the TCP sends data, a
timer is started. If the timer expires before the acknowledgment is received,
the data is sent again (see also the next Figure).
Window mechanism for data stream control: When a connection is
established, each of the two communication partner reserved connection of
a buffer for incoming and outgoing data, and notifies the respective another
end of the size of this buffer with. The available buffer size at any given
time is called Window, shares the so-called Window Size Window
Advertisement. The receiver sends along with each receipt a window
advertisement. If the receiving application can read the data as fast as they
are received, it transmits a positive Window Advertisement along with any
confirmation. If the data but faster when the receiving end they can read,
the receiver buffer is full at some point. The receiver then reports a window
size of zero (SZERO window ").
Three-way handshake: To ensure that connections are established reliably
and terminated, the TCP uses a three-way handshake is exchanged in which
three messages. TCP uses the term synchronization segment (SYN
segment) for messages in a three-way handshake used for stable
connections. Called FIN segment messages are named for terminating a call
in a three-way handshake.
To give a clear idea of the functions of the TCP protocol, the TCP header is
explained in more detail below. The Figure above shows the various fields
in the TCP header. The header consists of 20 bytes.
Source Port and Destination Port: TCP is accessible via
different port numbers for the applications in upper layers.
Ports are unique 16-bit addresses. The combination of a port
having an Internet address according to the originally called
socket as per ARPA definition 1971. The use of port numbers is
important for establishing communication between different
applications. It will be discussed further later in this chapter,
even closer to it. The table below provides an overview of
commonly used in automation ports.
Sequence Number: The TCP each byte is assigned a number.
The sequence number (SSE sequence Number ") is the number
of first data byte in the TCP segment after the TCP header.
Acknowledgment Number: This field contains the next number
of sequences from the partner as the expected sequence number.
UDP
The protocol suite of the Internet, namely, also includes a connectionless
transport protocol, UDP (User Data Protocol). With the UDP applications
can send IP packets without having to establish a connection. Many client-
server applications that include a request and a response using UDP instead
of having to connect and later quit again. UDP is described in RFC 768
pixels.
UDP is almost a null protocol: The only services that it provides are a
checksum for the data and multiplexing applications using port numbers.
The UDP header is, therefore, much easier than that of the TCP.
A UDP segment consists of a header having a size of eight bytes followed
by the data.
The header consists of:
Source port (2 bytes): port number of the sender, if no port is
used, the value is zero.
Destination port (2 bytes): Port of the application for which the
message is intended.
Length (2 bytes): The length of the UDP header and the
encapsulated data in bytes.
Checksum (2 bytes)
Endpoint
The term endpoint sometimes leads to confusion with the term socket.
According to ARPANET originally defined in the socket, the combination
of an IP address with the port number. This combination is now called the
endpoint. Describes an endpoint, over which logical way an application is
accessible in a network.
Internet Socket
The term socket is now a pure software concept. A socket provides for the
MAP ping, linking an application with an endpoint. Thus, the term
intervention arises net socket, also known as a network socket. An Internet
socket or short socket is a bidirectional communication endpoint for a
process-to-process connection and is determined by:
The protocol
Local IP address
The port number of local protocol
Remote IP address
The port number of remote protocol
ARP
The IP address is virtual, which is processed via software. LAN or WAN
hardware is unable to detect a connection between the net ID of a network
and an IP address and or between a host and the IP address of a host ID. To
transport an IP packet, the data must be encapsulated in a frame that can be
delivered from the local hardware at the receiver. Therefore, this frame
must contain the hardware address of the receiver and the sender.
Introduction
When starting hosts, some configurations must be made before the host can
actively participate in the network traffic. Each host has an IP address, and
the subnet mask applied reasonable, the IP address of the default gateway
(this is the router that connects the local network to other networks, the
Internet, etc.) and possibly data on the DNS server ( see the further section
in this chapter) below. This data statically defined in a host or as may be
determined dynamically. This section is about how certain settings can be
performed automatically at startup. This boot is also known under the name
of bootstrapping.
BootP
The bootstrap protocol is the TCP / IP suite added to some dynamic
Configuration before in a single step to unite. The BootP protocol sends out
a broadcast request to obtain configuration information. A BOOTP server
knows this message and responds with a BootP reply that contains all the
necessary information. BootP uses IP packets, even though the participants
do not already have IP addresses. As the destination address, a broadcast
address is used, which consists exclusively of send inputs, the source
address is all zeros. The BootP server can use the hardware address, send
his answer to the configuration is simplified by BootP, but the problem
remains that a BootP server receives its information from a database that is
performed as before by an administrator must manually.
DHCP
For further automatic configuration has developed the IETF Dynamic Host
Configuration Protocol (DHCP). DHCP is a protocol that can join a new
network without manual intervention by an administrator a host. DHCP is a
client-server protocol. The client is a new host, the requesting IP
information one or more DHCP servers may exist that can assign these data
per network.
For a new host is the DHCP protocol consists of four steps:
DHCP Discover: A client sends an encapsulated in an IP packet
UDP message using port 67 to search for a DHCP server. A
broadcast destination address (255.255.255.255) and the source
address (0.0.0.0) is used.
DHCP offer: the response from a DHCP server to the client.
This response contains an IP address, subnet mask, and release
time for the IP address.
DHCP request: The host selects the different address offers and
responds to the selected server with a request that contains the
configuration parameters.
DHCP ACK: The server responds with an acknowledgment.
ICMP
In IP communication service data packets can be lost, their delivery can be
greatly delayed, or they can be delivered in the wrong order. IP is not a
reliable communication service but tried to avoid mistakes and to report if
necessary, the occurrence of problems. A typical example of error detection
is the header checksum. Whenever a data packet is received, the checksum
is controlled to ensure that the header is intact. If a checksum is detected
errors, the message is deleted immediately. This can’t be reported because
the source address is deleted along with the message. However, other, less
important term problems can be reported.
ICMP Message
The ICMP protocol is used to support the IP protocol. So it also uses IP
packets to send messages. The figure below shows how an ICMP message
to a data frame is encapsulated.
An ICMP error message is always processed in response to a specific IP
packet and sent back to its source.
The various fields in the ICMP header are:
TYPE:
Code:
checksum:
Identifier:
Sequence Number:
IGMP
IGMP (Internet Group Management Protocol) is the protocol for IP
multicast applications in TCP / IP networks. This standard is defined in
RFC 1112th. In addition to a definition of address and host extensions for
supporting multicasting by IP, hosts correspond to this keeps RFC also a
definition of version 1 of IGMP. The IGMP Version 2 is defined in RFC
2236th. Both versions IGMP provide a protocol available to the information
on the membership of a host on specific multicast groups exchanged and
can be edited.
Multicast messages are sent to a single address (multicast IP address) but
processed by multiple hosts. The group of participants who respond to a
particular multicast IP address is called a multicast group. Some Important
control features of multicasting:
Belonging to a group is dynamic: hosts can always leave the group or join a
group.
Hosts can subside- KISSING by sending IGMP messages
multicast groups.
Group size is not limited. The various participants can be
distributed across multiple networks, provided that the
intervening router IGMP sub base.
Hosts can also send IP messages to a particular group if they
are not part of this group.
IGMP Messages
IGMP describes how the information on the membership status between
routers and the various participants of multicast groups to be replaced.
Examples of IGMP messages:
Host Membership Report: When a host member of a multicast
group is all, it sends a host membership report and informs all
other members of the group. A router stores these reports,
ensuring the administration of the multicast group.
Host Membership Query: is sent by routers to gather
information about group members in a network periodically.
All members of a group respond again with a membership
report. Routers store all the information and ensure that
multicast messages are not sent in networks where there are no
group members.
Leave group: is the last host that the factory segment leaves a
group in a particular network, sent.
IGMP Snooping
A switch that connects a member of a multicast group with a router can
read IGMP snooping IGMP messages and evaluate using. IGMP Snooping
translates multicast IP addresses to multicast MAC addresses. In this way, a
switch can store multicast MAC addresses in its multicast filter table and
send as multicast messages only to the correct ports.
This ensures that multicast messages prevent a Network unnecessarily
burden. This method is known under the name switches in dynamic
multicasting, in contrast to the static multicasting, in which the groups must
be manually configured in all switches and for all ports.
Multicast Addresses
Multicast IP addresses are addresses in the range between 224.0.0.0 and
239.255.255.255 (Class D). For private networks, it is generally
recommended to use the range 239.xxx for multicast IP addresses.
The addresses in the range 224.0.0.1 to 224.0.0.255 include reserved for
multicast applications within a network. The time-to-live value of such IP
packets is set to 1, so they can not leave the network.
There are also multicast MAC addresses reserved. All addresses whose first
byte is 01h, STE hen for multicasting are available. Addresses starting with
01: 00: 5E: 0 starts are multicast MAC addresses used for IP multicasting.
This transformation requires an explanation. The most significant bit of the
second byte overall belongs to a multicast address to the identification code
and is therefore not mapped with. Thus, the multicast IP address is
228.30.117.216 into the multicast MAC address 01: converted D8: 00: 5E:
1E: 75 miles. The multicast IP address 228158117216 is, however, in the
multicast MAC address 01: converted D8: 00: 5E: 1E: 75 miles.
GMRP
IEEE 802.1p
Corporate networks are becoming ever larger and more complex. It is,
therefore, important that the growing traffic can be managed efficiently.
Here, the "Quality of convenience I represent an important tool with which
it can be ensured that the most critical data is transmitted predictably. Using
the IEEE 802.1p protocol kön- nen switches data on the network preferably
be delivered. This will improve the predictability and reliability of
improved traffic.
IEEE 802.1 defines a 3-bit field, which can be assigned to the data to be
transmitted a priority from 0 to 7 within tagged Ethernet frames.
The IEEE 802.1 standard also provides for measures for filtering multicast
packets so that they do not unnecessarily spread over Layer 2 networks.
One of these measures is the GMRP (GARP Multicast Registration
Protocol). GMRP and GARP are of the IEEE 802.1-defined industrial
protocols.
DNS
There are two main ways to identify a host on the Internet: In addition to
the previously mentioned IP address, there is also the possibility of a
subscriber a hostname (a plain text names) allocated to facilitate the use in
general.
Hostname, such as www.google.be (Search engine) or
www.phoenixcontact.com read- sen easier to remember and, therefore,
more user-friendly. A hostname has not enough information to be able to
locate the host on the Internet. Since the application of preferring the
hostname, the TCP / IP protocols, however, are based on IP address, must
be a mapping between hostnames and IP addresses made. This is done by
the Domain Name System (DNS), by Dr. Paul V. Mockapetris and Jon
Postel was invented. In 1983 she presented the DNS architecture found in
RFC882 and 883rd
In summary, DNS stands for:
a distributed database that is implemented in a hierarchy of
DNS servers;
a protocol at the application layer, with the hosts and DNS
servers, can communicate with each other to the conversion of
IP addresses to hostnames and be able to make vice versa.
The DNS servers are often UNIX machines on which software such as
Berkeley Internet Name Domain (BIND) or Microsoft DNS is running. The
DNS protocol uses UDP and uses port 53rd
SNMP
SNMPv1: The SNMP protocol defined in RFC 1157 1990th SNMP stands
for Simple Network Management Protocol. This protocol describes a
structured method for monitoring and managing specific network
infrastructure. It was quickly applied extensively in commercial products
and became the de facto standard for network management. SNMP is a
simple protocol.
SNMPv2: The experience with the protocol led in 1993 to an improved
version of SNMP, described in RFC 1441 and RFC 1452 (coexistence of v1
and v2), and eventually became the standard on the Internet.
SNMPv3: The third version of the standard Management Framework
(SNMPv3) is based on the previous versions of SNMPv1 and SNMPv2.
SNMPv3 is basically SNMPv2 supplemented by security and
administration. Key features of SNMPv3 include:
safety
Administration
Structure of SNMP
The SNMP consists of three main parts:
MIB (Management Information Base (RFC1213)): description
of all variables of a certain network element;
SMI (Structure of Management Information (RFC 1155)):
Structure for storing network information;
SNMP: protocol for communication between the manager and a
network device (RFC1157).
There are several MIBs. First, the global MIBs (z. B. MIB2 in RFC1213)
have been described in RFCs. These MIBs must that is supported by all
SNMP-incompatible device. Furthermore, there are also manufacturer-
specific MIB objects.
SNMP Protocol
The SNMP normally operates so that the management station sends a
request to an agent in which it requests information, or it prompts you to
change its state to a certain way. Ideally, the agent responds only to the
reasonably requested information or confirms that he has his condition
changed as desired. The SNMP settles different messages which could be
sent.
message description
Get request Queries the value of one or more variables
Get next request Queries which the following current variable from
Get bulk request Asks a piece of large group information from
Set request Change one or more variables
Inform request The message between different managers to describe
the local MIB
In one particular case, the agent can take the initiative and send a message,
namely when it detects the occurrence of a critical event. Managed nodes
can fail and restart, and network segments can fail and go back into service,
etc. Every relevant event is defined in a MIB module. When an agent
determines that a relevant event has occurred, it reports this immediately all
management stations in his configuration list. This message is called an
SNMP trap. However, it is usually only the occurrence of an event. It is the
task of the management station to carry out requests to get the details.
message description
SNMP trap Agent to the Manager reports an event
The table shows that SNMP messages the UDP protocol to use, and which
ports here for use are for the next image.
TLS / SSL
The Transport Layer Security (TLS), the successor to the Secure Sockets
Layer (SSL), encryption is an encryption protocol that allows a secure data
channel is created on an unsecured network such as the Internet.
Both protocols work a layer deeper than the application protocols, such as
HTTP, SMTP, FTP, etc., but above the transport protocol TCP. They are part
of protocol family TCP / IP. One of its main objectives is to back up
client/server applications.
On the transmitter, the side encrypts the TLS layer data of the application
and transmits it to the correct TCP port. At the receiver side, TLS reads the
data from the correct TCP port, decrypts it and forwards it to the
application. The through locks, the data is up to the recording layer.
TLS provides the following security features for client/server applications
over TCP / IP:
Authentication: This allows an application to verify the identity
of another application with which it communicates.
Privacy: Between the applications submitted, data is protected
from access or misuse.
Integrity: applications can determine if data has been modified
in transit.
The techniques used are based on concepts such as public keys and
certification skating.
If an application SSL / TLS uses a handshake process is started, first, in
which the encryption algorithm and the agreed key to use and the server to
be verified by the client. Following that procedure, all application data is
encrypted.
HTTP
It defines the exact format of the requests (requests) of a web browser to the
server and the format of the responses (responses) that can give to the Web
server. Each request contains a URL pointing to a network component or a
static object (eg., A Web page) points. The HTTP protocol uses port 80th
Each HTTP URL starts with "http: //".
HTTP is insecure and vulnerable to man-in-the-middle attacks and
eavesdropping practices.
HTTPS
HTTPS (Hypertext Transfer Protocol Secure) is an extension of the HTTP
protocol, which is used for the secure exchange of data. When using
HTTPS, the data is encrypted form, making it impossible for an outsider to
intercept the data. HTTPS is basically HTTP, with the addition of SSL /
TLS is used to send the data to clauses scrambling system and to verify the
server.
Each HTTPS URL begins with "https: //". The protocol uses TCP port
443rd
FTP
FTP (File Transfer Protocol) is a protocol that allows the exchange is
simplified files between different hosts. It allows the transmission of any
files and create directories as well as rename or delete directories and files.
The protocol hides the details of an individual computer system from the
user, making it ideal for heterogeneous situations. The protocol can transfer
files between any system.
TFTP
TFTP (Trivial File Transfer Protocol) is to provide a simplified FTP version
that is often used by devices such as routers, switches, etc. with firmware
and configurations.
NTP
NTP (Network Time Protocol) is a protocol that can synchronize with your
computer in a network their internal clock with the other computers. NTP is
based on the predictability of the network caused by the delay. The
computer network is doing here- divided hierarchically, with the computer
with the most accurate time as SStratum 0 "is referred to. The computer
systems that bring about NTP directly from their time there are, by
definition, SStratum 1. "
The protocol has some smart features. Thus, for. B. make an NTP client use
of multiple NTP servers and decide for themselves which of the server
works best. Using some decision criteria, an NTP client selects a server and
synchronizes it with it. Small-time differences between server and client are
resolved by the client, in which he leaves something to run faster or slower
his watch. In this way, the time difference can be compensated without time
jumps.
SSH
Secure Shell is located at the application layer of the TCP / IP protocol.
SSH replaces old protocols such as Telnet and Rlogin by a secured variant.
The protocol uses TCP port 22nd
SSH is a secure login on another computer and the execution of loading
missing possible on a computer at a different location within a shell. The
encryption used makes it difficult for foreigners to read the original
commands.
An important advantage of SSH is the ability to authenticate with an
asymmetric encryption method. This allows SSH applications automatically
be set once, without having to be stored in that code a password. The
private key is to log on to any system that uses the corresponding public
key, which is possible.
The Switch
The grounding is done on the DIN rail on which the device is mounted on
the current: 600 mA (15 W)
Dimensions without configuration memory: 128 mm (W) x 110
mm (H) and 69 mm (T); Weight 650 g
Operating temperature: 0 ◦C to 55 ◦C; Storage temperature: -40
◦C to 85 ◦C
Humidity: between 10 and 95% (non-condensing)
Air pressure: mu in operation 80-108 kPa at 2000th NN;
Storage 70-108 at 3000P. NN
Chapter 7
The Router
Message Routing
Different routers must process it, a message to be sent from one computer to
another over a network. First, a transmitter sends the IP packet to a first
router. To this end, the sender encapsulates the IP packet in a frame and
adds a header, as is the physical network in which stations and routes are
predetermined.
If the frame reaches the router, it removes the content and examines the IP
packet. The router needs to know which port the message must end. To
determine the correct output port, the router looks up the destination
address of the packet to be routed in the routing table when TCP / IP
protocol is a routing table from a table of IP addresses and clustered IP
addresses (subnet) and the respective next nodes (Next Hop).
If the destination address is found in the routing table and therefore can be
routed, the router the output port sets where the thus found node. The
reroute captured IP packet will be sent to the output port. The router
encapsulates to the IP packet, again and again, adds a header as is the
physical network that the two routers are connected to each other,
predetermined. The above figure shows that an IP packet is always
encapsulated in a frame that matches the respective physical network.
A router for each port has an IP address belonging to the network area of
the Net-ID, to which the router is connected. Each port has its own MAC
address.
A router is considered as a monitor. A data packet may not normally happen
only limited by the TTL (time to live) of the packet number of routers
before it reaches its final destination.
Router Types
There are many different types of routers. They can be based on their
shapes, the connections, and the necessary additional functions (e.g.,
modem, firewall or switch) differ.
Further can be distinguished software and hardware router. Using special
software is used as a conventional router, equipped with two network
interface PC. A hardware router, however, is a separate device, actually a
small, simple computer that has been specially developed for routing.
Commercial routers for home use are often combined with a switch, have a
modem, and a wireless AP so that only a single device is required to
connect to a small home network with the Internet.
There are also switches me router function on the market. The name Layer
3 Switch "is often used for these devices.
The remainder of this chapter focuses on industrial routers. In its simplest
form, such a router to a LAN and a WAN interface. Herewith an industrial
network can be connected to a corporate network or the Internet. The
industrial router can also optionally include a firewall so that they can be
used as a full-fledged security module for the connection of industrial to
corporate networks.
Layer 3 Switch
As already explained, the OSI model switches operate at layer 2, while the
routers operate at layer 3. A Layer 3 switch, however, is a powerful device
for routing in the network.
Layer 3 switches differ little from ordinary network routers. Both process
the incoming packets and choose on the basis referred to in these addresses
dynamically via the forwarding of these packets (routing). They have their
origin in demand for routers that easily in large networks, for themselves
leave as company intranets use.
The main difference between a Layer 3 switch and an ordinary routing is to
build the hardware. In a Layer 3 switch, the hardware is one switch
provided combined with a router to ensure better performance when routing
in large LAN infrastructures. The Layer typically used for intranets 3
switches usually have no WAN ports and usually support no typical WAN
applications.
IP NAT
NAT: IP Masquerading
Network Address Translation (NAT) is a protocol that enables networks
with unregistered IP addresses (private networks, 1597 correspond to the
RFC) advertising connected to the Internet. The router recorded as
described above in each message that is sent from the private network to the
Internet, always its external IP address as the source address.
Each answer word that is directed from the Internet to a PC on the private
network goes to the external IP address of the router but contains as TCP
destination port a port number from the NAT table of the router. In this way,
the router for which end the respective message is intended white.
Practically speaking, NAT a protocol of a network translates an IP address
into a valid in other network IP addresses. One network is called Inside, the
other outside. Generally, a company translates its local internal IP addresses
in one or multiple global external IP addresses and translates incoming
messages from global IP addresses.
NAT makes it, therefore, possible that operation only a single global IP
address used for its communication with the outside world, the Internet.
This contributes to the safety concept, as all outgoing and incoming are
subject to the news an address translation.
The below Figure shows the operation of the NAT protocol. Here, the NAT
protocol is used dynamically. This use is also dynamic NAT.
Port Forwarding
The static use of the NAT protocol is known as port forwarding or port
forwarding. If there is the private network server that must be accessed
directly from the Internet, the endpoints of these servers can be static port
numbers are assigned in the NAT table of the router to these servers from
the Internet.
to achieve must be connected as the endpoint of the external IP address of
the router with the port number of the NAT table. The router translates in
for the special Server On outgoing messages from the endpoint to the
correct endpoint of the server. This is an additional form of security. The
exact IP data of the server must not be published, and any hackers know
nothing about the architecture of the network are the servers in the. The
next Figure shows the configuration for port forwarding or port forwarding.
1: 1 NAT
At 1: 1 NAT is an IP address translated to another without changing the
TCP / UDP ports used.
If a router on the LAN side to the network 192.168.1.0/24 and via the WAN
port is connected to the network 10.1.0.0/16 and has as external IP address
10.1.1.0/16, then using the 1: 1 NAT LAN nodes with the IP address
192.168.1.100 accessible on the WAN side through the IP address of
10.1.1.100.
1: 1 NAT offers interesting possibilities for the automation world:
Different subnets can be connected together; in all subnet zen
same IP address is used.
No need additional routes are defined in the corporate network.
An ARP demon on the mGuard processes the ARP request
from the external network.
Systems subnetworks can be addressed via the IP mapping
directly from the corporate network. In this mapping, the host
ID is retained; only the net ID is adjusted.
It's hard to talk about routers, switches, wireless connectivity, and other
networking technologies without remembering Cisco. World leader in
networking and internet device solutions, the company is also the fastest
growing in the worldwide server market. In 2015, for example, while
competitors were growing 6 percent, Cisco was up to 32 percent.
Given this fact, as well as about 85 percent of Internet data runs on US
multinational solutions, it is not so complicated to understand the
importance of IT professionals in getting Cisco certification.
With the high dollar, the increasing degree of difficulty of the tests
(formulated by Pearson Vue), and the 3-year validity of certificates, many
wonder if it's worth having an official Cisco qualification. If you are one of
these people, we strongly recommend following this article to the end!
In the IT field, certification is a formal procedure in which a company
ratifies that a particular professional has particular knowledge or skills. This
seal reinforces its credibility with the market, a fact that invariably results in
higher pay and a higher chance of career advancement.
For example, taking a Cisco Certified Network Associate (CCNA)
certification means assuring the market that you have the necessary
networking installation and support skills.
At the Cisco Expert level, a Cisco Certified Design Expert (CCDE)
certification signals that you are an expert with the ability to design
infrastructure solutions for large enterprise environments.
Some research shows that having IT certifications raises pay by about 30%.
There is, however, a Forbes study that shows that, in some cases, these
changes in your professional skills may even double your monthly earnings.
The point is that, no matter how good your home university, you will be
introduced to the market with general knowledge about the most diverse
technologies. The business world is pleased with this versatility but will
also expect specialization in some routines.
After all, the learning curve required for a network professional to
understand all the nuances of Cisco equipment takes time, something that
organizations definitely don't have. This is why many CIOs prefer to pay
higher salaries to those who already have certifications, rather than
undergoing the extensive learning time of an employee not so familiar with
specific technologies.
Cisco works with dozens of certifications at various levels, starting at entry-
level, intermediate, specialist and expert, to the maximum degree of
knowledge, called “architect.”
In addition to levels, certifications are also divided into “careers.” The most
important are Routing and Switching, Security, Design, and Collaboration
(collaboration - telephony, voice, and video over IP).
Imagine you have Cisco official recognition of all these areas, on many
levels! Clearly, with such vast know-how in Cisco technologies, their
possibilities for promotion are greatly expanded.
According to IDC, in the first quarter of 2017, Cisco took the lead in the
Brazilian x86 blade server market, with 37.3% market share in the segment.
With a universe of products spread across the world's top companies, can
you assume the added value that Cisco certification can bring to your
working life?
Know the most diverse network protocols (CCNA), troubleshoot local and
wide area networks (CCNP), be able to plan and design a business strategy-
bound IT infrastructure (CCAR)): Many doors open to those with these
skills, especially since they are stamped by none other than Cisco itself!
Few segments change as fast as Information Technology. Thus, keeping up
to date on databases, servers, network management tools, among other
platforms, is essential to remain competitive in the market.
If you dream of living abroad and working for a large company abroad,
Cisco certification is a must.
According to Salary Survey 2016 data from Certification Magazine, 61%
of certified professionals reported that obtaining official qualification was a
key factor in raising their salary and opening new career growth
opportunities, including in other countries.
The first step is to understand your journey. Cisco certifications include the
following identifications:
Cisco Certified Entry Networking Technician (CCENT);
Cisco Certified Technician (CCT);
Cisco Certified Network Associate (CCNA);
Cisco Certified Design Associate (CCDA);
Cisco Certified Network Professional (CCNP);
Cisco Certified Professional Designer (CCDP);
Cisco Certified Internetwork Expert (CCIE);
Cisco Certified Design Expert (CCDE);
Cisco Certified Architect (CCAR).
So your initial step is to start with CCENT, also known as ICND-1. This
certification is a prerequisite for associate-level qualifications such as
CCNA and is indispensable for you to gain marketability as a network
technician or help desk (earning above your peers who do not have this
official recognition).
The exam (which is face to face) has between 45 and 55 questions to be
solved in 90 minutes. The value of the investment currently circulates
around the US $ 165.00 (ICND-1).
To take the ICND-1 test, it is highly recommended to take a specialized
course. (Cisco official), which will cover all the content required by the
company in the configuration of switches, routers, WAN network
connections, Cisco Discovery Protocol (CDP), deployment of security
features, among other key topics.
Passing this assessment is paramount to pursuing other certificates (such as
ICND-2) and further advancing your certification portfolio.
Now that after completing this book, you know what to do next with your
Cisco certification journey. Good luck!
References
http://www.ciscopress.com/store/ccna-200-301-portable-command-guide-
9780135937822
https://www.mouser.com
https://dl.acm.org/citation.cfm?id=1207049
https://www.cisco.com/c/en/us/td/docs/ios/fundamentals/command/referenc
e/cf_book.pdf
https://www.scribd.com/document/21011643/IP-Subnet-Cheatsheet
https://www.slideshare.net/minariyahi5/chapter-3-52210471
https://www.academia.edu/34123026/Introduction_to_TCP_IP
http://ijssst.info/Vol-17/No-33/paper13.pdf
https://www.academia.edu/35544352/CCNA_Routing_And_Switching_Por
table_Command_Guide_-_3rd_Edition
CISCO CCNA
COMMAND GUIDE
STUART NICHOLAS
Introduction
Every company these days works on hiring new network administrators and
engineers who can optimize and improve the existing systems. These
employees also work toward reducing any costs that will eventually
increase the productivity of other employees in the organization. If you are
looking to improve your capabilities and want to become a routing and
switching engineer, you should appear for the CCNA Routing and
Switching examination.
This book is designed to guide you to help you understand what CCNA is
and how it came about. We will also look at the different requirements you
will need to fulfill to apply for the CCNA Routing and Switching
examination. Apart from this, you will also gather some information on
Cisco and the products offered by the company. It includes questions
regarding the content of the exam, why you need a certification, what the
different CCNA exams are, how to attain certification for each, and what
exams can be taken to get the certification. You will learn more about the
CCNA Routing and Switching examination and gather some information on
the different topics covered in the examination. We will also look at the
history of the examination. This will help you understand how Cisco made
changes to the curriculum over time. You will notice that Cisco has done its
best to incorporate the changes and developments in technology into the
new curriculum.
If you follow the tips mentioned in this book, you can ensure that you will
pass the examination in your first attempt. This book will answer all the
questions you may have about CCNA Routing and Switching. This book
also includes some tips that will help you ace the examination. It is
important to remember that you cannot expect to clear the examination in
your first attempt if you do not study ready for it. It is only when your
concepts are strong that you can ensure that you ace the examination on the
first attempt.
Having said that, it is okay if you do not clear the examination in your first
attempt. All you need to do is use your experience to help you understand
where you went wrong and correct your studying method. Once you clear
the examination, you will attend interviews, and there are some employers
who like to throw trick questions at their candidates. This book also sheds
some light on the different questions you can be asked during an interview
for the role of a networking engineer or professional.
I wish you luck on your examination and hope you obtain the certification
in your first attempt.
Chapter 1
An Introduction to Cisco
Cisco was founded in the year 1984 by two Stanford employees - Sandra
Lerner and Leonard Bosack. The two graduated in the year 1981, and they
worked at Stanford before they founded Cisco. They worked as Computer
scientists at Stanford and used the router at Stanford to communicate with
each other. Lerner and Bosack learned that they could communicate with
one another using the router, and also expand the technology to include
multiple systems to the network. This was when they realized that they
could develop a large-scale, profitable business that would include router
and networking services. That is when in the year 1984, the couple founded
a company called Cisco Systems. It was only in the year 1986 that Cisco
obtained the rights to the network and routing systems at Stanford. Cisco is
what it is today because of the products and services that were offered by
the business. These products and services are what made the company the
largest leader in the industry. We will look at the different products and
services offered by Cisco in the following chapter.
Networking
Cisco gives every company numerous choices for its networking needs.
Some of these choices have been listed in the section below. Cisco designed
the products mentioned below to meet the changing needs of companies and
to improve data storage, access points, and servers that are used in the
organization.
Any organization can be certain of the smooth flow of information and
smooth business transactions if the network in the company is maintained
well. There are numerous networking options that an organization can
choose from. These options allow an organization now only to automate the
network but also to decrease the cost of a Wide Area Network, thereby
improving the business's ability to scale. These networking options also
ensure that the network performs very well. These networks are built with
enough detail that will help it to detect any imminent threat and protect the
organization from any damages.
VPN Security Clients
A threat can occur through numerous attack vectors, and it is for this reason
that every company must identify a way to secure active protection and
connectivity for every endpoint in the network. On average, when others
can detect threats in 100 days, Cisco can provide such details on threats in
just 4.6 hours and process about 1.5 million malware per day.
Switching
It is important to find the right switch for your company. This is because
data is extremely critical for the company in today's world. It is essential to
select the right switch to avoid threats faced by the company - now and also
in the future. Companies can always use Cisco products to simplify and
manage their requirements for IoT, cloud, data center, and mobility.
Routing
Cisco's routing product, another networking product, can only be used for
LAN, WAN, and cloud. It includes integrated security, application
optimization, automated provisioning, and advanced analytics that deliver a
complete and proven solution to your organizational requirements. A
company can now automate all of its processes using these routers. These
routers also offer application and intelligent path selection, which needs
minimal control through customization and programming. A high
performing router will always streamline any networking operation, thereby
reducing the cost, increasing the speed, and the deployment of the network
more agile. Regardless of whether the business is large or small, the Cisco
Networking solutions will offer a wide range of products and services that
can fit any business model.
Wireless
In today's digital world, one can access any network through a wireless
mode. It is imperative that every business has a wireless network since,
without that, it is hard for a business to communicate with its customers. It
is also hard for an employee to work. If a business does not have the right
network, its data is privy to attackers. By using Cisco Wireless Enterprise
Technology and Mobility products, you can be assured to get the state-of-
the-art access points and top of the line WAN and LAN connections. Cisco
offers some of the best products and services in this area, and these products
are designed to provide high-end security and performance. The best part of
it all is that these can fit any small and medium-sized enterprises to large-
scale businesses.
Wireless Controllers
As the world is geared up to go wireless, Cisco developed the Wireless
Controllers to provide networking options that are secure. These
networking options also allow the network to be segmented, thereby
decreasing the number of threats. They are easy to access and can be
enabled even on the cloud. A wireless controller was designed by Cisco to
provide faster insights, troubleshoot any problems quickly, and deliver a
personalized business. These are also designed to have easy upgrading
without any interruptions.
Conferencing
WebEx and other conferencing tools are open platforms that enable
companies to integrate different features into their workflow. They can
communicate with teams across the globe. These conferencing tools make it
easier for companies to communicate, collaborate, and work together. You
can communicate with someone in India or Australia in a matter of seconds,
and these tools are encrypted. This will ensure that the work you share is
safe. Cisco offers numerous such tools that allow companies to work
seamlessly so they can share, create, and meet virtually.
Unified Communications
People from all over the world work together on a project, and they use
different tools to collaborate. For example, they can use the web and video
conferencing, IP telephones for Voice calling, mobility desktop sharing,
voicemail, instant messaging, and more. Through the unified solutions
offered by Cisco, a company can choose to integrate different tools to
improve user experience. This will enable teams to work together
effectively. The tools offer real-time communication methods to different
companies anywhere in the world. Services like messaging, conferencing,
and chat options are also included in these tools. Unified communications
offer on-premise, partner-hosted solutions, or as a service, which is called
UC SaaS from the cloud provider.
Advanced Malware Protection
There are multiple threats to a network, and hacking is one of the most
common threats. Through advanced malware protection, Cisco offers
companies products that will enable them to block malware and protect
their data. These tools also offer global threat intelligence that will protect
the network from any breaches. Since most companies cannot prevent
threats alone, Cisco removes threats to the network and system by
analyzing every file, quickly detecting any threats, containing and removing
those threats from the system.
Web Security
There are many threats that hide in plain sight, even on legitimate websites.
These threats come up in the form of advertisements or links. The clients
and employees may threaten their data if they click on any of these links or
advertisements. This will lead to some issues with data integrity. WSA Web
Security Appliances, powered by Cisco Talos, protect you by automatically
blocking risky sites.
Access Points
The need for security has increased since the growth of mobility and IoT
devices. The Cisco Catalyst 910 access point exceeds the new W1-Fi 6
wireless standards and provides radio frequency excellence to high–density
environments. These access points help to increase the productivity of
employees since it allows data to be transmitted at high speed. This efficient
data transmission will help businesses upgrade to new technologies in no
time.
Business Collaborations (Collaboration Endpoints)
Cisco is the pioneer in networking and routing technology, and this enables
the company to connect different businesses across the globe using this
technology. Over time, Cisco has worked on developing numerous solutions
that can enable teams from across the globe to work together towards a
common goal. These tools enable employees to communicate with each
other with less effort. These products include Cisco WebEx Board, Cisco
Headset 500 Series, and Cisco WebEx Room Series. Choose the product
that suits your company's needs, and you are good to go.
Interfaces and Modules
Cisco uses numerous modules and interfaces to deploy advanced
networking capabilities. These help every business deliver a new service,
which will lower the cost to the company.
Networking Management
Cisco uses leading products and services to reduce downtime and improve
operational efficiency in businesses. Its products and services also manage
the network of the enterprise. These products and services have been
designed to fit an organization of any size and also provide access to
numerous digital systems and processes. Through these products and
services, Cisco provides opportunities to automate policy-based application
profiles, which allow the IT team to respond quickly to new business
opportunities.
Security
Since the world is data-driven, the safety of the consumer's data is of utmost
priority. Cisco offers numerous solutions that have changed the face of data
protection. Every company faces a major threat because of hacking and lack
of cybersecurity. Hackers have become smarter and dangerous over the
years. With Cisco's integrated portfolio and industry threat intelligence, you
get the scope, scale, and capability to keep up with the complexity of every
kind of threat.
Advanced Email Security Protection
Most hackers rely on emails to hack a system. They send spam emails
through which they can spread malware and other threats. Every business
should maintain the right security solutions. This is the only way they can
prevent any threats. Companies can use Cisco's email security to defend
systems from compromising business emails, ransomware, and phishing.
This product also enables companies to update their security every five
minutes using Cisco Talos. This tool protects the system from any malware
attachments or any malicious links that hackers send via emails. It is always
essential that a business secures the data in the emails that are sent from one
system to another, either within or outside the organization. Cisco's email
security ensures that there is no loss of data and encrypts all the information
in emails. This helps to safeguard sensitive information.
Outdoor and Industrial Access
An outdoor and industrial access product will allow you not only to access
data anywhere but also access WiFi outdoors. It also helps people stay
connected in numerous locations, which makes it easy for companies to
continue their operations with ease. Since these access points are resistant
to both extreme cold and heat, it makes it easier for businesses to transmit
data through these access points.
Customer Collaborations
A consumer can acquire almost anything in today's digital world. With this
comes the need for an organization to respond to all its customers' queries
and issues and also provide them with a few personalized services. The
mantra 'one size fits all' does not hold up in today's world, and it is for this
reason that there are no contact centers any longer. Organizations now try to
provide their customers with the right care, and this is no longer an
exception but a rule. Cisco has developed products such as Cisco Packaged
Contact Center Enterprise and Cisco Unified Contact Express to enable
ease of service.
Product by Company Type
There are numerous medium-sized companies and new businesses that have
been set up in the US in the recent past. One of the aims of Cisco is to
empower these firms to do better in the market. This goes to show that the
concept of 'one estimate doesn't fit all' works perfectly for Cisco. It is for
this reason that Cisco has produced some items as per the wants of the
organization, hence allowing organizations to work on personalizing their
operations and help them stand out when compared to the other companies.
Services
Apart from the numerous products listed above, Cisco also provides
companies, big or small, with the services necessary to install necessary
hardware and software and also to train their employees to maintain that
installed software. Cisco also works as an advisor and helps organizations
and companies implement some IT solutions in their firm. It also helps a
company optimize the performance of the company that improves both
efficiency and productivity. Cisco also works on managing the assets of the
company. It also takes care of the cloud services. Cisco also sends
professionals to train employees to learn more about the digital shift in the
market and also provides the necessary assistance that will help in the
growth of the company.
Chapter 3
FAQ
What changes have been made to the associate-level certification programs
offered by Cisco?
Cisco declared on March 26, 2013, that it was planning to update or
redesign the associate-level certification programs. This includes the CCNA
and Cisco CCENT certifications. Cisco works on restructuring these
courses to ensure that the course material is aligned with the changes in the
technology in the routing and switching industry. The course material for
these courses also includes advanced switching and routing technologies,
including security, remote, and voice. This certification was previously
called the CCNA Certification and has now been broken down into multiple
segments, and one segment is the routing and switching certification.
Additionally, most associate-level examinations, including the CCNA
Voice, CCNA SP Operations, CCNA Security, and CCNA Wireless
examinations, consider the CCENT Certification as a prerequisite. You
should visit the Cisco Learning Network to learn more about these
associate-level certifications. This network will also help you learn more
about the numerous changes that are made to the syllabus.
Are there changes being made to the CCNA Routing and Switching Exam?
Cisco has split the CCNA certification into the ICND1 and ICND2
examinations. Cisco has included the following topics in the syllabus for
the certification: IPv6, investigating, and the most recent Cisco routing and
switching technology and software. Cisco, as mentioned earlier, always
includes newer concepts in the syllabus since improvements and
advancements are being made in this industry. The exams 640-816 ICND2,
640-822, and 640-802 will now be replaced by the 200-101 ICND2, 100-
101 ICND1, and 200-120 CCNA respectively.
Why have so many new topics been included in the CCNA and CCENT
Routing and Switching exams?
Numerous Cisco clients across the globe have affirmed that they require
every employee with a Cisco certification, especially a CCNA certification,
to have better abilities and knowledge. To accommodate this request, Cisco
has moved a few subjects from the ICND2 certification to the ICND1
certification examination. If you pass the ICND1 test now, you will
undoubtedly have better skills and more knowledge when compared to a
student who passed the previous ICND1 examination. The new syllabus
will now help you learn more about the different topics covered in this
examination. Ensure that you clear this examination before you appear for
the ICND2 examination. This addition made to the syllabus is indeed
slightly difficult for most students to comprehend, but it is always a good
idea to clear these examinations if you want to have the edge over your
competition.
If I want to obtain the CCNA Routing and Switching Certification, what are
the necessary requirements that I need to adhere to?
If you want to obtain the CCNA Routing and Switching Certification, you
must clear the following exams:
- 200-125 CCNAX Composite Exam
OR
- 100-105 ICND1
- 200-105 ICND2
Is there a formal training course that I will need to attend to obtain the
certification?
There is no necessity to attend any formal training if you want to appear for
these examinations. That being said, it is always a good idea for you just
take up a few instructor-led sessions while you are preparing for the
examination. These sessions will give you the chance to learn more about
the subject.
Where should I register to take up an instructor-led training course?
It is imperative to keep in mind that only those Learning Partners who are
authorized by Cisco are allowed to provide instructor-led sessions. These
sessions will always be given by those instructors who have been certified
by Cisco. You should visit the Learning Partner Locator on the Cisco site to
identify the centers that are the closest to you.
Should I meet any prerequisites before I appear for the CCNA Routing and
Switching certification examination?
Cisco has not laid out any prerequisites for the CCNA Routing and
Switching examination. It is always a good idea to have some experience in
this field before you appear for the examination.
What job roles can I apply for once I obtain the CCNA Routing and
Switching Certification?
You can apply for the following jobs or roles when you obtain the
certification:
- Network Analyst
- Network Support Engineer
- Network Specialist
- Network Engineer Associate
- Network Administrator
How soon must I recertify my certification?
As with every other certification offered by Cisco, the CCNA routing and
switching certification are valid only for a specific period, which is three
years. You must recertify yourself once the period is over. To learn more
about the recertification process, read through chapter six.
Is there any self-study material that I can use to prepare for the
certification?
You can use different self-study material available on the Cisco website to
prepare for the examination. Some of these options are:
- E-learning courses
- Cisco Certification Practice Exams
- Cisco Learning Labs
- Cisco Press
Myths About CCNA
An issue with the Internet is that it gives some people the power to spread
incorrect information about anything. The Internet also allows rumors and
incorrect information to spread quickly. The fact is that the story is always
exaggerated as it moves from one platform to the next, and the CCNA
examinations are no exception to this. There are a few myths about the
CCNA and CCNP examinations that have been covered in this section.
The questions you are asked in the exam are based on the survey that you
fill out at the start of the exam.
Every student is required to complete a survey before he or she begins the
test. This survey will ask the candidates about the different topics they are
comfortable with and also talks about some technologies that they are
comfortable with. It is difficult to rate yourself ISDN, Frame Relay, and
other technologies since you are about to take an examination that covers
those topics. Therefore, it is possible that you may worry about how the
questions will impact your examination. The truth is that your answers to
the questions in the survey do not matter. There are some forums and posts
on the Internet, which will tell you that you must always rate yourself
excellent on any topic that is being asked. This is because they believe that
the questions asked from that topic will be easy for one to cover. If you
lower the rating, the difficulty of the questions asked from that topic will
increase. Cisco has debunked this myth, and you mustn't read too much into
the questions asked in the survey. You should not worry too much when you
are filling out the survey.
When you answer a question incorrectly, the exam will ask you questions
from that topic until you get one answer right.
Cisco does not follow the pattern of adaptive testing in any of the
certification examinations that it conducts. All the questions asked during
the examination will be taken from a large question base. If you have
appeared for the Novell examination or the GMAT, you will understand
what I mean by adaptive testing. Therefore, CCNA examinations are not
nerve-wracking.
Your answer will be marked wrong for the simulator questions if you
include an extra command.
Both the CCNA and CCNP examinations use the simulator engine. This
engine will only act like a router or a switch. Therefore, you can use some
extra commands during the examination. You will be given instructions and
information about the engine that you are using before the exam.
Remember to relax and try to configure the switch the same way you did
when you were practicing your labs.
Once you walk into the examination room with a combination of the
required knowledge, the troubleshooting skills, theoretical and practical
knowledge, and hands-on experience, you can pass your exam. Do not let
what some people believe about the examination deter you from applying.
Exam Objectives
This section covers the objectives of the CCNA Routing and Switching
examination.
Network fundamentals
This is the first module that is covered in the syllabus, and it includes
fundamental topics like TCP/IP protocols, firewalls, etc. and others related
to networks. Ipv4, Ipv6 address details are also included. Let us look at
some of the topics covered in this module:
● Compare and contrast OSI and TCP/IP models
● Compare and contrast TCP and UDP protocols
● Describe the impact of infrastructure components in an enterprise
network
- Firewalls
- Access points
- Wireless controllers
● Describe the effects of cloud resources on enterprise network architecture
- Traffic path to internal and external cloud services
- Virtual services
- Basic virtual network infrastructure
● Traffic path to internal and external cloud services
● Virtual services
● Compare and contrast collapsed core and three-tier architectures
● Configure and verify IPv6 address types
● Selection of the appropriate cabling type based on implementation
requirements
● Compare and contrast Ipv4 address types
- Unicast
- Broadcast
- Multicast
● Comparison and contrast of network topologies
- Star
- Mesh
- Hybrid
● Configuration verification and troubleshooting Ipv6 addressing
● Compare and contrast of Ipv6 address types
- Global unicast
- Unique local
- Link-local
- Multicast
- Modified EUI 64
- Autoconfiguration
- Any cast
IP Addressing – Ipv4 and IPv6
● Identifying the addressing scheme for IPv6 to satisfy the addressing
methods in the WAN or LAN environment
● Identifying the appropriate addressing scheme for IPv4 using
summarization and VLSM to satisfy any addressing requirements in the
WAN or LAN environment
● Describe the necessity and operation of using both public and private IP
addresses for IPv4 addressing
● Describe the requirements to run IPv6 and IPv4 together as a dual-stack
network
● Describe IPv6 addresses
IP Services
● Configure and verify DHCP (IOS ROUTER)
● Configure and verify ACLs in a network environment
● Configure and verify NAT for given network requirements
● Configure and verify NTP as a client
● Configure and Verify Syslog
● Describe the types, features, and applications of ACLs
● Recognize high availability (FHRP)
● Identify the basic operation of NAT
● Describe SNMP v2 and v3
Network devises Security
● Verify the network device security feature and configure it
● Verify the ACLs to limit the SSH and telnet access for a machine to a
router
● Verify and configure the security features for a switch port
● Verify and configure the ACLs to filter any network
LAN Switching Technologies
You will learn more about different switching concepts in a network like
inter-switch connectivity, STP protocols, configuring a network, and more.
Some of the topics included in this module are:
● Configure and verify initial switch configuration including remote access
management
● Determine the technology and media access control method for Ethernet
networks
● Verify network status and switch operation using basic utilities such as
PING, TELNET, and SSH
● Identify the basic switching concepts and operation of Cisco switches
● Identify enhanced switching technologies
● Configure and verify VLANs
● Configure and verify trunking on Cisco switches
● Configure and verify PVSTP operation
● Describe how VLANs create logically separate networks and the need for
routing between them
● Troubleshoot interface and cable issues (collisions, errors, duplex, speed)
● Describe and verify switching concepts
● Configure and verify troubleshoot VLANs (normal/extended range)
spanning multiple switches
● Describe the benefits of switch stacking and chassis aggregation
Routing Technologies
This module covers the basics of routing technology and also includes
concepts about routing and the routing table. This module provides
information on the types of routing like static and dynamic, routing
protocols both interior and exterior, and some others like OSPFv2 for Ipv4.
Some of the topics included in this topic are:
● Describe the basic routing concepts
● Describe the boot process of Cisco IOS routers
● Differentiate methods of routing and routing protocols
● Configure and verify operation status of a device interface, both serial
and Ethernet
● Configure and verify utilizing the CLI to set basic router configuration
● Configure and verify routing configuration for a static or default route
given specific routing requirements
● Configure and verify OSPF (single area)
● Configure and verify EIGRP (single AS)
● Configure and verify interVLAN routing (Router on a stick)
● Configure SVI interfaces
● Manage Cisco IOS FILES
● Verify router configuration and network connectivity
● Interpret the components of a routing table
● Troubleshoot basic layer3 end to end connectivity issues
WAN Technologies
This module includes a detailed study of the PPP and MLPPP configuration
and verification on WAN interfaces. It also talks about the PPPoE client-
side interfaces that use local authentication. Options for WAN connectivity
and basic QoS concepts are also included. Some of the topics included in
this module are:
● Identify different WAN technologies
● Configuration and verification of PPP and MLPPP using local
authentication on WAN interfaces
● ·Describe WAN connectivity options
○ MPLS
○ Metro Ethernet
○ Broadband PPPoE
○ Internet VPN
● Configure and verify a basic WAN serial connection
● Implement and troubleshoot PPPoE
● Configure and verify frame relay on Cisco routers
● Configure and Verify PPP connection between Cisco routers
● Describe WAN topology options
● Describe the basic QoS concepts
● Marking
● Device trust
● Prioritization
● Shaping
● Policing
● Congestion Management
Infrastructure Services
Topics in this module include DNS loop operation, client connectivity issue
troubleshooting, DHCP configuration, and verification on routers, HSRP
basics, etc. Some of the topics included in this module are:
● Description of DNS lookup operation
● Troubleshooting client connectivity issues involving DNS
● Configuration and verification of DHCP on router
○ Server
○ Relay
○ Client
○ TFTP, DNS, Gateway options
● Troubleshooting client and router-based DHCP connection issues
● Configuration verification and troubleshooting basic HSRP
○ Priority
○ Preemption
○ Version
● Configuration verification and troubleshooting inside source NAT
○ Static
○ Pool
○ PAT
● Configuration and verification of NTP operating in client or server mode
Infrastructure Security
The topics that are covered in this module include port security, mitigation
techniques for common access layer threats, traffic filtering, etc. This
module also covers some information on the configuration, verification, and
troubleshooting of issues that may arise during device hardening. The topics
included in this module are:
● Configuration, verification and troubleshooting port-security
○ Static
○ Dynamic
○ Sticky
○ Max MAC addresses
○ Violation actions
○ Err-disable recovery
● Description of common access layer threat mitigation techniques
○ 802.1x
○ DHCP snooping
○ Non-Default native VLAN
● Configuration, verification, and troubleshooting of Ipv4 and Ipv6 access
list for filtering traffic
○ Standard
○ Extended
○ Named
● Verification of ACLS using APIC-EM Path Trace Analysis Tool
● Configuration, verification, and troubleshooting of basic device
hardening
● Local authentication
● Secure password
● Access to device
○ Source address
○ Telnet/SSH
● Login banner
● Description of device security using AAA with TACAS+ and RADIUS
Infrastructure Management
This module covers the management of devices that are present in the
network system. The module also covers the configuration and verification
of the device monitoring protocols. It also provides information on how one
can maintain the performance of the device. Some topics covered in this
module are:
● ·Configuration and verification of device monitoring protocols
○ SNMPv2
○ SNMPv3
○ Syslog
● Troubleshooting network connectivity issues using ICMP echo-based IP
SLA
● Configuration and verification of initial device configuration
● Performing device maintenance
○ Cisco IOS upgrades and recovery (SCP, FTP, TFTP, and MD5 verify)
○ Password recovery and configuration register
○ File system management
● · Using Cisco tools for troubleshooting and resolving problems
○ Ping and traceroute with extended option
○ Terminal monitor
○ Log events
○ Local SPAN
● Describing network programmability in enterprise network architecture
○ The function of a controller
○ Separation of control plane and data plane
○ Northbound and southbound APIs
Operation of IP Data Networks
Some of the topics included in this module are:
● (SDN) Awareness of programmable network architectures.
● Recognize the purpose and function of various network devices such as
Router, Switches Bridges and Hubs.
● Expanded VPN topics, DMVPN, site-to-site VPN, client VPN
technologies.
● Increased focus on IPv6 routing protocols, configuration, and knowledge
● Knowledge of QoS concepts.
● Select the component required to meet a given network specification.
● Understanding of cloud resources deployed in enterprise network
architecture.
● Describe the purpose of the networks
● Identify common applications and their impact on the network.
● Predict the data flow between two hosts across a network
● Identify appropriate media, ports, cables, and connection to connect the
Cisco network device to another network device and host in a LAN
Chapter 5
Every CCNA examination that you appear for will boost your IT career.
This section will shed some light on the different examinations that you can
appear for, and also help you understand how you can prepare for the
examination.
CCNA Industrial
The Cisco Certified Network Associate Industrial (CCNA Industrial)
certification is designed for plant administrators, traditional network
engineers, and control system engineers dealing with process control,
assembling, and oil/gas ventures, who will be working along with industrial
and IT networks. When you clear this certification, you will learn the
different skills that are necessary for you to know to design, implement, and
troubleshoot any issues that arise within a network. It will also provide
information on how you can do this while using the best practices necessary
for the connected networks present today.
This module consolidates both theoretical and practical knowledge through
some practical lab work and exercises. This module will help you develop
the skills necessary for working in the IT industry and also enhance your
knowledge about the current infrastructures that different organizations
incorporate in their functions. It will also provide information about the
infrastructure that will support the future results of the business.
The prerequisites for this certification are Industrial Networking Specialist
or CCENT or CCNA Routing and Switching or any other CCIE
certification.
200 -601 IMINS2
This examination will test your understanding and knowledge about the
concepts and techniques that you can find in an automated manufacturing
environment. This exam will cover the Common Industrial Protocol (CIP)
and ProfiNET industrial conventions. It will also test you on the
fundamental design of the support network infrastructure to optimize the
effectiveness of the Industrial Ethernet.
CCNA Security
The CCNA Security certification will help individuals garner the skills and
knowledge that they will need to work as associate level representatives in
the IT department of any organization. If you have this certification, you
will be hired as a network professional since you will have the abilities
required to develop a security infrastructure, perceive dangers and
vulnerabilities to networks, and alleviate any security breaches. The CCNA
Security educational program emphasizes primary security technologies. It
also provides information about the establishment, investigation, and
vigilance of network instruments for maintaining the virtues, discretion, and
the accessibility of information and instruments, as well as their
competency of all the innovations that use Cisco security structure.
210-260 IINS
The CCNA Security examination will test your knowledge about the
different aspects of security including security network infrastructure, your
understanding of the fundamental concepts of security, verification of
secure access, VPN encryption, firewalls, prevention of any breach and the
endpoint security while using SIEM technology, Cloud and Virtual Network
topology, BYOD, Identity Service Engine (ISE), 801.1 x Authentication
and a other cyber-security related concepts.
This examination will help you validate your skills of designing, installing,
monitoring, and troubleshooting any secure network which will help the
service provider secure the data and also allow the data to be accessible to
the devices connected to the network.
CCNA Wireless
Cisco has a wireless innovation department that has been placing a lot of
demands on the network. These demands, in turn, affect the individuals
working on networks. Every organization will require a set of professionals
who can work on the network and ensure that the network has been
configured properly. These individuals must also monitor the network and
troubleshoot if necessary. You can improve your skills and enhance your
knowledge of these networks when you prepare for the CCNA wireless
certification.
Some prerequisites to apply for this certification are CCNA Routing and
Switching certification, Cisco CCENT, and the CCIE certification. To
obtain the CCNA Wireless certification, you must obtain the following
certification.
200-355 WIFUND
This examination will test your knowledge about how to install, configure,
and troubleshoot a small-sized network or a Wide Area Network.
The next few chapters will shed some light on the CCNA Routing and
Switching examination.
Exam Preparation
Cisco is at the top when compared to different IT vendors. Cisco provides
you with the required tools and material that will make it easy for you to
earn your certification in the first attempt. Cisco constantly tries to improve
the material that it creates for this certification to ensure that it provides
readers with the latest information. From the Cisco Learning network to
self-study materials as well as some exam dumps, you have different
materials that you can use to clear your exam. This section lists some of the
tools that you can use to prepare for the exam. These tools will help you
strengthen your understanding of the numerous concepts you will be
learning.
Self-Study Materials
The Cisco Learning Network provides numerous self-study material that
you can use to obtain your certification. You should always enroll for the
different courses available on the learning network like the Interconnecting
Cisco Network Devices (parts one and two). You should also look at the
labs that are conducted for these courses. The subjects and topics covered in
these courses will help you learn all the concepts that you will need to cover
in the composite examination. Numerous practice exams are available on
the learning network that will help you gauge your knowledge. More
information about these courses has been provided later in the book.
Training Videos and Webinars
You can always go through the different learning and training sessions that
are provided on the Cisco learning web. These sessions will help you learn
more in very little time. There are numerous resources available on the
learning network that are covered in detail in this book.
Study Groups
It is always a good idea to join a study group when you decide to appear for
the examination since you can ensure that you prepare well for the
examination. You can always build your network. This group will also act
as a support group since you will be studying with them to cover the
different concepts in the syllabus.
Exam Dumps
An exam dump is as important, if not more important, as the study group
you want to join or the study material that you want to read. These dumps
will always contain all the questions that you can be asked in any
certification examination, and it is for this reason that you should always go
through the dump when you prepare for the exam. When you have
understood the different topics covered in the syllabus, you can practice all
the questions in the exam dump to strengthen your understanding. These
dumps will also help you familiarize yourself with different questions.
Recertification
The CCNA Routing and Switching Certification have a validity period of
three years. That being said, you can always extend the validity by earning
a certification that is at a professional or expert level. For instance, you can
earn a CCIE certification that is valid for two years. You can easily extend
the validity period of the routing and switching certification by obtaining
the CCIE certification. You will learn more about how you can recertify
yourself later in the book.
In simple words, it is important to remember that you can achieve a lot by
earning any CCNA certification. Regardless of what experience you have,
you can excel in your profession if you choose to earn different
certifications that Cisco provides. You will always find a good job with a
good salary if you obtain these certifications.
Chapter 6
Cisco Recertification
There are some charges applied to the recertification of a module, and you
will need to bear those costs. You can also obtain recertification using other
methods, and this chapter will provide further information about the same.
Certification Policy of Cisco
It isn't that good an idea to add expired certifications to your resume, but
you can certainly mention them as an achievement. Since there are new
developments in the technological industry, Cisco ensures that it includes
these changes into the course material for any certification that it provides.
It is for this reason that they have set validity on their certifications. Cisco
will make some changes to the syllabus over time, and when you recertify
yourself, you can ensure that you update your knowledge and skills.
Entry-Level Certifications
If you want to renew an entry-level certificate, you'll either need to take the
same exam once more or opt for a higher-level certification. For instance, if
you've got a CCNA Routing and Switching Certification whose validity
period is nearing expiration, you have the option to either sit for the CCNA
Security examination or any other CCNA level certification exam. If you
are not too keen on giving an associate-level examination, you can choose
to give any other professional level examination. You can choose to clear
any one of the CNNP-level exams, and a certification in any of these
examinations can help you recertify your basic CCNA certifications.
Alternatively, you can also choose to clear the CCIE examinations. There
are no prerequisites to clearing the CCIE examinations, and it is for this
reason that they are easy to do. A certification in this examination will
automatically help you renew your certification.
To sum it all up, the following options are available if you want to rectify or
renew your CCNA certifications:
1. Clear any of the present Associate-level exams except the
ICNID exam
2. Clear any of the present 642-xxxx professional-level or any of
the 300-xxxx professional-level exams
3. Clear any one of the existing 642-xxxx Cisco Specialist exams
(this doesn't include Sales Specialist or Meeting Place
Specialist, Implementing Cisco TelePresence Installations,
Cisco Leading Virtual Classroom Instruction exams or any of
the other 650-online exams)
4. Clear any of the existing CCIE written exams
5. Clear any of the existing CCDE written or practical exams
6. Clear the Cisco Certified Architect interview along with the
Cisco Certified Architect board review for the renewal of your
lower certifications
7. You merely have to choose one of the options, as mentioned
earlier.
Professional-Level Certifications
As with entry-level certifications, even for professional-level certifications,
you have got two choices - either take the same exam once more or choose
a certification that is at a higher level. In this case, if you have a CCNP
Routing and Switching certification whose validity period is expiring within
a year, you can appear for the certification exam again or opt for a high-
level examination. You can also choose to clear any other certification
examination if you wish to renew the current certification that you have.
You should pass any of these options below if you want to recertify your
Professional level Cisco certifications:
1. Clear any of the existing CCDE written or practical exams
2. Clear any of the existing CCIE written exams
3. Clear any of the existing 642-xxxx professional-level or any of
the 300-xxxx professional-level exams
4. Clear the Cisco Certified Architect interview along with the
Cisco Certified Architect board review for the renewal of your
lower certifications
Expert-Level Certifications
Every Cisco certification has a validity period, including the expert level
certifications. As mentioned earlier in this chapter, there is a constant
change in technology, and since these certifications are all related to
technology, they need to be updated too. You must reappear for the CCIE
certification examination if you want to recertify your expert-level Cisco
certifications.
To renew your expert-level certifications, you must clear any of the
following exams.
1. Clear any of the existing CCDE written or practical exams
2. Clear any of the existing CCIE has written or lab exams
3. Clear the Cisco Certified Architect board review and the Cisco
Certified Architect interview for the renewal of your lower
certifications
Chapter 7
When you obtain the CCNA Routing and Switching certification, you can
show your employers that you have the required skills to develop, design,
implement, develop, and configure a network. They will also have the
confidence that you can troubleshoot any issues if they crop up. Having said
that, you must ensure that you stay abreast of any developments or changes
being made in the industry. This will give you an edge over your
competitors. As read earlier, you will need to recertify yourself to ensure
that your certification is valid. The previous chapter sheds some light on
cisco recertification.
Before getting certified for CCNA Routing and Switching, it is important to
pass the entry-level examination (CCENT). You can then choose to either
take the one exam-path or the two exam-path to obtain the certification.
Cisco Certified Network Associate - Routing and Switching (CCNA
Routing and Switching)
The CCNA Routing and Switching certification are one of the most sought-
after certifications in the networking industry. If you want to obtain the
certification, you can either appear for one exam or two exams. The former
is the composite exam, while the latter is the ICND1 and ICND2
examination. You can appear for these examinations once you clear your
CCENT examination. The cost of this examination is $150. The questions
asked in the CCENT examination are often tricky, which makes this exam a
little difficult to crack. It is for this reason that you should only purchase the
material offered by Cisco. Like every other CCNA certification, the
CCENT certification also covers different concepts. Therefore, you will
need to read through the entire material and also test your level of
understanding. If you do wish to study by yourself, you can do that, but
experts suggest that you sign up for some online tutorial classes since these
will help you understand the concepts better. Once you obtain this
certification, you can obtain the CCNP (Cisco Certified Networking
Professional) certification.
It is always a good idea to study for the CCNA Routing and Switching
examination, and you can land a great job in the networking field. If you do
not want to appear for two examinations, ICND1 and ICND2, you can sign
up for the composite examination. You must remember that the syllabus
covered in all three examinations is extensive. This will mean that you need
to spend enough time preparing for the examination. You will learn later
about the different reasons why you should appear for the CCNA Routing
and Switching examination. We will also look at some tips you should keep
in mind when you prepare for the examination.
Required Skills
You will be tested on the following in the IDND1 examination:
1. Knowledge and skills to test a small network
2. Installation of a network
3. How does the network function?
4. How to troubleshoot any issues?
5. LAN Switching technologies
6. IP routing technologies
7. IP services network device security
8. Network device security
9. Troubleshooting
10.
IPv6 protocol
Exams to Take
If you want to obtain the CCNA Routing and Switching Certification, you
must take the Composite examination. This is a combined examination that
is slightly difficult to clear. This is because the syllabus covered in this
examination is vast, and it is impossible to understand every concept and
remember them so you can answer the required number of questions to pass
the examination. The different topics that are covered in the CCNA
Composite examination have been taken from the ICND1 and ICND2
examinations.
If you do not wish to appear for the composite examination, you can appear
for the ICND1 and ICND2 examinations. You must always think carefully
and plan your study route before you sign up for the examination. You can
choose to give one examination instead of two, and there is a high
probability of clearing the examination if you study for the required time.
Remember that you must practice and work hard. You will need to clear the
following papers if you choose to take up two examinations instead of one:
- Exam: Interconnecting Cisco Networking Devices Part 1 (ICND1)
- Exam: Interconnecting Cisco Networking Devices Part 2 (ICND2)
History about the Routing and Switching Certification
Cisco announced that it would begin the CCNA and CCNP certifications in
the year 1998. At that time, the company only offered the routing and
switching examination, so there was no separate routing and switching
certification. The examination was simply called CCNA. It was also easier
to appear for this examination since there were only two types of
examinations, and one could obtain the CCNA certification by passing only
one examination, which was CCNA. There was no CCENT examination at
that time. The examination rules and requirements remained the same for
the first three examination numbers.
Impressions About Old Exams and Books
As mentioned earlier, there were three examinations that one would need to
clear to obtain the CCNA certification. If you counted the number of pages
in each of the study material for these examinations, without counting the
study tools and the overhead, the number of pages in the guidebook shared
by Cisco Press were:
1. Examination 600-407: 500 pages
2. Examination 600-507: 650 pages
3. Examination 600-607: 750 pages
When you compare these texts to the new edition of the books for the
CCNA Routing and Switching certification examination, the latter has over
1600 pages. You will also notice that Cisco worked on revising the syllabus
and the examination in the first few years. Some records suggest that there
was a mere 16-month gap between the second and third editions of the
CCNA examination. This is a very quick revision since Cisco now takes
longer to revise either the CCNA or CCNP examinations. This does not
come as a surprise since, in the past, they were working towards developing
the latest syllabus.
Impressions About the Topics in the Past
If you look at the age of technology in the same way as the age of dogs, you
can say that the CCNA certification is close to 130 years old. Continuing
with that same line of thought, let us look at the technology that was
included in the first three versions of the CCNA examination. For example,
books:
1. All include information about the ISDN configuration
2. All include some information about Frame Relay since this
concept was popular in the 1990s. Frame Relay is a topic that
was removed in 2016 since it is no longer a popular method
used
3. All include some information about VLAN trunking
4. All include information about the different protocols in the
NetWare protocol suite, the Netware SAP filtering, and
NetWare IPX Layer 3 protocol
5. None of these include information about the router-on-a-stick
method or the 3-layer switching
The Fourth CCNA (2003): The Addition of the Two-Exam Path to CCNA
One of the biggest changes made to the CCNA Examination happened in
the year 2003. The examination was still called CCNA, but the following
changes were made to the curriculum:
1. Cisco broke the CCNA examination into two parts – the ICND
(640-821) and INTRO (620-811)
2. The two parts combined to cover the same topics mentioned in
the CCNA examination. This means that CCNA = INTRO +
ICND.
3. Cisco also offered a single examination for the students called
CCNA (640-801). Students could choose to write this
examination instead of the two parts.
The change made to the course and the examination names did not impact
the students who were taking the examination. The decision to add CCENT
to the syllabus was a huge change. This examination will allow people to
gather information on some parts of the CCNA examination and stop.
When Cisco introduced CCENT to the course structure, it also came up
with numerous prerequisites:
1. CCNA Routing and Switching Certification as a prerequisite
2. CCENT as a prerequisite
3. No exam is a prerequisite
The CCENT examination is also not simple since there are a lot of topics
that the student will need to cover. The changes made to the syllabus were
not topic changes but were changes made to the quality of information
shared and the skills that the student developed. For example, this version
of the examination included information about wireless LANs. Cisco then
introduced the CCNA wireless examination and removed the topic of
wireless LANs from the Routing and Switching certification. In this edition
of the examination, there were many questions asked about wireless LANs.
Some of the new topics included were:
1. Increased performance level to learn more about
troubleshooting for some topics
2. Some topics on Wireless LANs
3. Introduction to the IPv6 protocol
4. Introduction to Internet access and VPNs
5. No information about the ISDN configuration
The Seventh CCNA (2016): The New CCNA R&S (Exam Version v3.0)
This is the latest change made to the CCNA routing and switching
examination, and these changes represent the seventh version of the
examination and the seventh number of the routing and switching
examination. From the program perspective, you can note the following:
1. There was still a one exam-path and two exam-path to clear the
CCNA examination
2. Every student is required to pass the CCENT examination to
appear for the ICND1 100-105 examination
3. The new examination is called Version 3.0 on most web pages,
but make sure to check the examination numbers if you are ever
in doubt
a. ICND1 100-105
b. ICND2 200-105
c. CCNA Routing and Switching 200-125
This version of the examination is the complete transition that Cisco has
made wherein the course material focuses on whether a student can
implement what they have learned and troubleshoot what they have
configured. The topics included in the examination have also increased.
From a larger perspective:
1. For most topics included in the examination, the student is
required to know how to troubleshoot any issues
2. New subject areas have been included in the examinations
when compared to the earlier versions of the examination
Now that we are aware of how the examination changed over the years, let
us look at the different products offered by Cisco and also look at some
other information about the CCNA routing and switching examination.
Where to Register for the Examination
You are required to register for the exam on Pearson VUE regardless of
whether you choose to take the ICND1 and ICND2 examinations or the
composite examination. If you want to gather some more information about
these examinations, please visit the website using the following link:
www.vue.com.
Follow the steps given below if you have decided to clear the examination:
1. The first thing you must do is choose the exam that you want to
appear for. If you want to take up the composite examination,
you should choose the code 200-125. If you want to sign up for
the ICND1 and ICND2 examinations, you should choose the
codes 100-105 and 200-105.
2. After you have selected the examination that you want to
appear form, you will need to visit the nearest examination
center and register for that exam. Remember that you will need
to pay for the exam in advance, and you can sit for the exam
within a year since you have made the payment.
3. You can sit for the exam when you decide to give the exam or
give yourself a six-week deadline before you sit for the exam.
That being said, if you cannot appear for the exam on the day
you have decided to sit for it, you must wait for five days
before you sign up for the exam. If you know that you will be
unable to sit for the exam, you should send Pearson VUE an
email at least twenty-four hours before the examination. They
will help you reschedule the examination at no cost.
4. Once you schedule the examination, Pearson VUE will send all
the instructions to you via email, and will also provide some
information about what you will need to do at the examination
center. You will also be given information about the different
items you will need to carry to the center.
5. You must always carry an original copy of the document or
identification proof.
We will look at a few more tips to help you clear the examination later in
the book.
Chapter 8
From what you have read earlier, you know that any Cisco certification will
boost your career in the IT industry. You also know that you can apply for
different roles in the same company or a different company. The
examinations will help you create a sound foundation of technical
knowledge. You will also develop the necessary skills to help you move
ahead in this world. You will see that these examinations will bring in
quantifiable results in the form of better pay and better increments. Let us
now focus on the CCNA Routing and Switching Certification. There are
multiple benefits of getting a CCNA Routing and Switching Certification.
Since technology is constantly changing, the roles and responsibilities of a
network engineer and administrator are also changing.
One of the best ways to prepare yourself for these changes is to appear for
the CCNA Routing and Switching certification. Let us look at some of the
reasons why you should obtain this certification.
A Certificate from the Networking Leader
If you remember from the first chapter, Cisco was one of the first
companies to have established itself in the networking industry. In the
previous chapter, we read that this company introduced the routing and
switching certification. Cisco is one of the leading companies in the
networking industry. Most companies use products and services developed
by Cisco to develop and build network pathways. If you want to learn more
about how to work on Cisco products, you should obtain this certification
along with some other certifications offered by Cisco.
The Certification Is Globally Accepted
One of the best things about any CCNA certification is that it is recognized
globally and is accepted in different countries in the world. So, the validity
of a CCNA certification doesn't have any geographical constraints.
Anybody working in the networking industry. If you have this certification,
you are in a position to negotiate higher pay and also obtain a better
position in the organization. Currently, the number of CCNA jobs open on
the market is steadily increasing, and they all require that the potential
candidates have some CCNA certification as one of their criteria for job
eligibility. All the knowledge you gain through the CCNA routing and
switching certification will help you learn more about new modules and
different methods of networking. The security courses and other
information you learn while preparing for this examination will boost your
career. Obtaining the first certification might seem rather complicated and
also an uphill battle at times. Once you take this step, you can race through
the other certifications since you will get the hang of it. After all, beginning
well is half done, and this stands true for CCNA certification.
Your Networking Career Is Built on This Certification
Many networking employees and engineers are doing their best to obtain
CCNA certifications ever since Cisco introduced them. There are different
programs offered by Cisco. Studies conducted by IDC state that many
networking companies look for different Cisco skills when they are hiring
employees. Many employees include Cisco certifications along with other
information on their resume. Employees must always have an idea of the
different networks, infrastructure, and protocols that they need to use
regularly. They need to know how they work together. When you obtain the
Routing and Switching certification, you can obtain the expertise and
knowledge that you will need to succeed in this industry. This knowledge
will also help you troubleshoot any issues that occur within the network.
Ever since Cisco began to offer courses and certifications, people from the
networking field, including administrators and engineers, have been
working hard to complete these certifications. Many organizations also look
for these certifications when they hire employees. As indicated by an
ongoing report from the IDC (International Data Corporation), Cisco's
abilities are among the most wanted for aptitudes while enlisting potential
candidates. This need is constantly increasing by the day. The CCNA
Routing and Switching examination will improve your knowledge and also
validate it. You will be termed an expert in the networking industry. When
you take up CCNA certification and successfully clear it, you can place
yourself as a network administrator capable of troubleshooting network
problems prevalent in networking areas. You will be able to create the
infrastructure to back it.
When you hold the CCNA Routing and Switching certification, you will be
considered before your other competitors. This certification will boost your
career and give you better recognition in the networking field. When you
hand your resume over to any company, you will be considered over other
applicants who do not have this certification. Since you should recertify
yourself in three years, you must recertify yourself. When you recertify
yourself, you will learn about the latest developments in the field.
When you obtain the CCNA Routing and Switching certification, your
career opportunities will increase. Based on a survey conducted by IDC, it
was identified that seven out of ten organizations look for CCNA
certifications when they are promoting or hiring an individual. You can
move from the associate level to the expert level in the routing and
switching certification. You can also improve processes in the company
using the skills you develop as routing and switching expert in technologies
like Collaboration, Cloud, Network Programmability, Data Center, Security,
or Wireless. You can change the direction that your career will take if you
have the routing and switching certification.
Certification Improves Your Learning
As mentioned earlier, the CCNA Routing and Switching examination will
create a foundation for your networking knowledge. When you appear for
these examinations, you can enhance your knowledge about networking.
The CCNA examination gives you an efficient way to understand different
concepts about networks. Regardless of whether you have years of
experience under your belt in the field of networking or not, you will
certainly need to keep up with the growing demand for specialized skills to
keep up with your competition. There is indeed nothing that can substitute
experience, but you need to stay abreast of the changes in technology. This
is the only way you can maintain an edge over your competition. Before
you choose to appear for all the examinations offered by Cisco, there are a
few prerequisites that you need to clear. Only when you do this that you can
appear for some of these examinations. The CCNA Routing and Switching
certification are like the stepping-stone to move ahead in the Cisco Training
courses.
Certification Prepares You for Network Evolution in the Digital Era
Since most businesses are now digitizing their processes, there is a rapid
change in the network tools and infrastructure. Many manual processes
have been replaced with the software-driven network architecture that
depends on analytics, automation, visualization, cloud service management,
and whether the network is open and extensible. A survey conducted by
IDC revealed that the role of a network architect and engineer is the most
important role in the IT industry. Professionals who want to improve their
standing in the industry should embrace this change and work towards
improving their profiles.
Certification Keeps You Current on All the Latest Technology Changes
Cisco has brought about major changes to the network architecture that
businesses use. Apart from this, Cisco also works on developing an IT
landscape that is conducive to different developments in technology. These
developments will have a huge impact on your job if you work in the
networking industry. Cisco always ensures that it is aware of all the changes
that are taking place in technology and the IT industry. The company does
this to ensure that every student appearing for these examinations is aware
of how the changes in technology will affect their role in the company. The
company also wants students to learn how these changes will affect the
certification. The CCNA Routing and Switching exam is not an exception
to this. Cisco constantly revises the curriculum to ensure that students are
aware of every small change made in the industry. The latest curriculum
(for further details, please check the previous chapter) includes elements of
QoS and also how they can be used, interactions of firewalls, wireless
controllers and access points, and network functions. You will also learn
more about IPv6 and basic network security. This means that you can keep
up with any changes in the technology field by obtaining the CCNA routing
and switching certification.
Certification Helps You Stand Out with Your Employer
You are not the only person who gains when you obtain this certification.
This certification is also beneficial to organizations in the networking
industry. Ask your potential employers, and they will tell you that they will
prefer a certified professional any day. Therefore, if you want to stand out,
you need to obtain this certification. When you obtain this certification,
your employer will know that you have the necessary knowledge and skills
to get the job done quickly and efficiently. Your employer will know that
you want to excel in your career when you begin to prepare for the CCNA
Routing and Switching examination. Managed will notice this kind of an
initiative. Based on a study conducted by IDC, close to eighty-two percent
of leaders in digital transformation believe that people who have a
certification help to accelerate innovation. Cisco certifications are credible,
and many people do their best to obtain this certification. Many employers
use the CCNA Routing and Switching Certification as a criterion to hire a
candidate. It is always a good idea to have an additional qualification up
your sleeve so you can have the edge over your competitors.
Certification Helps Increase Your Paycheck
The salary for a networking professional is very high since there are only a
few professionals in this industry. You can most definitely expect an
increment in your pay if you have the CCNA Routing and switching
examination. As per a report by Robert Half Technology, in the 2018
Technology Salary Guide, CCNA routing and switching certification is one
the most sought-after certifications in the industry. This salary guide
showed that the salary could increase by ten percent or more if the
candidate meets all the criteria. Most organizations also offer their
employees a monetary reward for clearing the CCNA routing and switching
certification. If you obtain the CCNA certification, that you can look for
better career opportunities in the networking industry. The qualifications
that you obtain will also lead to an increase in your salary. In every team,
and employees given a role based on the different certifications they hold. If
you have a CC any certification, you can climb up the corporate ladder
pretty quickly. It is always a good idea to obtain this certification close to
your appraisal cycle since this will ensure that you receive a higher
increment.
Certification Helps You Learn from Your Peers
Professionals and individuals are doing their best to obtain more than one
Cisco certification. Since many students appear for this examination, Cisco
developed the learning network. This network is a community that enables
students from across the globe to communicate with one another. It also
aids in career development. There are a million professionals in this
community. This community provides valuable support and also helps the
members learn, study, and prepare for the certification examinations. If you
are a member of the learning network, you can access a wealth of
information, including training videos and material. You can also speak to
your peers to clear your doubts or any other questions you may have about
the industry.
Certification Gives You a Full Range of Training Options
There is no right way of learning when it comes to these certifications.
There is numerous authorized learning partners comma, and each of these
partners offers a variety of training options that will make it easier for you
to understand the concepts covered in the routing and switching
certification. You can either choose to enroll in an instructor-led training or
a virtual classroom for the examination. You can also sign up for a hands-on
lab session for both these examinations to stop the Cisco learning network
also offers self-paced, E-learning, learning labs, and are there practice
exams that will enable you to strengthen your concepts and prepare well for
the certification. Cisco also provides numerous resources that you can use
to prepare for the examination. This is school certifications that allow you
to prepare for the examinations according to your convenience will stop you
can choose to endure enroll yourself in a training program or a self-paced
curriculum.
Don't Forget: There Is Value in Recertification
As mentioned earlier, Cisco routing and switching certification are valid
only for three years. Having said that, you can recertify your certification at
the end of 3 years. Cisco constantly monitors the industry and does its best
to ensure that all the information included in the course material will keep
the person writing the examination abreast of the changes in the industry. If
you want to learn constantly and are happy to recertify yourself, you will
learn more about the changes being made in the industry. We have covered
recertification in the previous chapter in the book.
Secure Your Career through Routing and Switching
You must remember that digital transformation is changing the face of the
world. It this is especially true in the case of every business in this industry
since companies have to take advantage of these changes to maintain a
competitive edge over other companies in the market. If you notice, every
initiative that a company starts is a technology initiative point every ID
professional is not only expected to improve different processes within the
business but also know all the changes made in technology.
Businesses are doing better now since the development of the Internet of
Things (IoT). IoT is constantly evolving. The importance of technology like
mobility, big data, security, network design, cloud, application
development, and data center operations, systems, or services integration, as
well as enterprise architecture, is increasing. You need to understand how
this will affect your career or your growth in the company. Since there are
numerous developments taking place every single day, managers want to
hire people with certifications and the required knowledge. These
certifications will let the company know that you have sufficient experience
in the routing and switching industry. A recent study showed that there was
a shortage of employees with critical IT skills. Managers who were a part of
this study would be only willing to hire candidates or promote those
employees who had Cisco certifications. When you obtain the CCNA
routing and switching certification, you will gain a competitive edge over
other applicants or employees.
Unique Way of Learning
The Cisco learning network is unique since this is not only a learning
platform but also a social network platform that is used for learning. You
can think of this platform as a better version of the Internet. This network
offers students the option to share information across the globe with other
professionals and students. You can also avail of a wide area of services like
training, simulation labs, corporate internships, job listings, programs for
mentorship and recruitment, and various other things.
Personal Gratification
Most networking professionals wonder whether you should appear for the
Microsoft or Cisco examinations. The Cisco certification program does not
include any broad frameworks, which makes it simpler for the applicant to
understand the concepts and complete the modules. These certifications are
also not very demanding, which allows you to appear or pursue other
certifications that will stop if you are a certified CCNA routing and
switching professional, you can move on to Obtaining the professional or
expert level certification in this course. Apart from all the other benefits
discussed in the chapter, you will also receive another benefit that cannot be
quantified; this benefit is personal satisfaction. When you are certified, you
will certainly feel a sense of personal satisfaction. If you are a networking
professional, you would be quite proud to have the C CNA certification
against your name. If you are in the networking field, you are quite lucky
since there is a shortage of qualified professionals in the industry. With the
ever-increasing innovations and developments in the industry, a greater
number of people must enter the industry. So, it is a good idea to cement
your ground as a qualified professional in the networking industry by
obtaining a CCNA certification.
The Changing Role of Core Network Engineers
Many businesses and organizations are now looking at adopting
programmable network architecture. It is for this reason that most
employees will need to develop the necessary skill set to understand,
configure, design, and work with these architectures. Most companies are
trying to get rid of CLI based interactions in the routing and switching
infrastructure. They are now adopting a controller-based interaction that is
driven by business and application policies. It is for this reason that Cisco
updated its curriculum for the routing and switching certification in the year
2016 to ensure that every IT professional is aware of the changes in the
industry. Those people who have not renewed their certification will need to
pay attention to the following changes that were made to the syllabus:
1. Understanding of cloud resources deployed in enterprise
network architectures
2. Awareness of programmable network (SDN) architectures and
the separation of control plane and data plane
3. Increased focus on IPv6 routing protocols, configuration, and
knowledge
4. Expanded VPN topics to include DMVPN, site-to-site VPN,
and Client VPN technologies
5. Knowledge of QoS concepts, including marking, shaping, and
policing mechanisms to manage congestion of various types of
traffic
Cisco always ensures that the syllabus is updated regularly to cater to the
changes in the networking and technology fields. The material will always
need to include some new developments so professionals can stay abreast of
the changes made. When you obtain the router and switching certification,
you can prove to your current and future employers that you know what
networking is and the different solutions you can use in that industry. Many
professionals do not renew their certificate or recertify themselves since
they no longer require that certification. This is, however, a bad idea since
you may lose out on future opportunities.
Chapter 9
You must have the right learning material to help you understand the
concepts covered in the examination. This is the only way you can ensure
that you are confident when you appear for the examination. This learning
material should include all the information about the examination, including
the various questions that one can be asked during the examination. This
material should also include the exam code structure and some sample
exam questions that one may be asked. You should keep the following
factors in mind before you choose the right study material.
Factors to Consider
Look Out for Free Material
Every student will always look for the best resources when they are
preparing for the examination. The same can be said for you when you
appear for the CCNA routing and switching examination. You will want to
rely on the expensive course material and books available on the Cisco
learning network to learn for the examination. There are, however,
numerous websites that offer free study material for the examination.
Before you rush into making a purchase, you should conduct thorough the
search to understand which material has the required information and can
be purchased for a lower rate.
Your Peers are Your Greatest Resource
Your peers are not a great resource that you can Roach to learn more about
the CC Annie routing and switching certification. You can always approach
them and arrange a one on one session, so you are aware of which direction
your career is going to take. You can also ask them to recommend some
books and borrow their news before the examination. These notes can be
very helpful when you prepare for the examination. It is always a good idea
to ask someone who has already written the examination any questions and
ask them for guidance.
Mix It Up
One of the best ways to learn something and also remember the concepts by
committing them to memory is by engaging all your senses. You should
always choose different ways of learning so that you are always on your
toes, wanting to learn more first up this will make your learning experience
fun. You can always choose a mix of video, audio, text, real-time data, and
graphics to help you understand the different concepts covered in the
examination. This will help you build a holistic approach of learning that
will enable you to commit all your concepts the memory. You will be
engaged in the subject when you mix things up.
Keep Yourself Updated
You must always be updated with the advancements made in technology in
the routing industry. You should always stay abreast of the happenings and
developments in the network industry. These study materials will only teach
you a little bit about the networking industry. It is, therefore, important that
you throw in some relevant information. In addition to studying the
theoretical concepts.
Get Practical
You must always include some practical horses and tests as a part of your
learning. If you are an employee of any organization or are a member of the
Cisco learning network, you can obtain and appear for different practice
tests that will help you prepare well for the examination. You cannot expect
too easy examination simply with theoretical knowledge.
We will now look at how you can obtain the required information that will
help you covered the concepts that you will need to learn to appear for the
CCNA routing and switching certification.
The Cisco Official Study Material
The Cisco learning website will give you the link to the syllabus or material
you will need to clear the CCNA Routing and Switching certification. You
can obtain this information on the routing and switching tab on the Cisco
website. In this tab, you will find a link to the two exam approaches: the
one exam approach and the two-exam approach. The former is the CCNA
composite exam, while the latter is the ICND1 and ICND2 examination.
These sections have an examination kit that provides information about
every topic that you will need to cover to clear the examination. This kit
will also shed some light on the topics that are easy to understand and also
on the topics that are slightly difficult and more complicated.
As mentioned earlier, businesses are doing their best to migrate towards a
control-based framework. This means that the role and the skills required
for a network engineer are also changing rapidly. Most certifications offered
by Cisco will provide this information. The CCNA routing and switching
certification, however, will give you the foundation and the required
knowledge about the technologies and how they impact the networks. Using
this course material, you can ensure that your skills stay relevant even when
there are changes in network technology.
This section will shed some light on the different study material and
training program that you can use to understand the concepts covered in this
certification.
Self-Study Materials
Interconnecting Cisco Networking Devices- Part 1
Cisco offers you an E-learning portal that is designed to assist you and
enable you to learn to understand the concepts included in the routing and
switching certification examination. This portal will include all the
information about the ICND1 examination.
The course is structured in a way that will provide you a basic
understanding of all the layers within the network that is used for code
routing and switching. You will also gather information about various
progressive technologies. Humorous topics have been included in the latest
version of this examination, the version developed in the year 2016, to help
you understand the interactions that take place in different network
functions. You will also learn more about the interactions between wireless
controllers, access points, and firewalls. Apart from this, you will also learn
about the fundamentals of network security and some important protocols.
This course will also introduce you to different configuration commands
that will enable you to develop networks easily. You are also given a few
lab exercises that will help you put your theoretical knowledge into
practice.
This course is designed effectively. The material in this course will ensure
that you develop a basic understanding of the routing and switching
certification. The content in this course is available in the form of text as
well as an instructor-led session. This text is presented in a very easy format
that you can understand. The course is often self-paced, but it ensures that
you can interact with other students appearing for this examination. These
different aspects ensure a hands-on learning experience while
simultaneously increasing the efficiency and effectiveness of the course.
This course will also make it easier for you to obtain feedback from your
peers and instructors about your understanding of the course. There are
some merit badges and leaderboards shown at the end of each week to
motivate students to perform better.
When you complete this course, you will have gathered the required
knowledge and skills to:
1. Define the fundamentals of networks and build basic LANs
2. Secure as well as manage network devices
3. Work on expanding networks that are small to medium-sized
4. Be able to describe the fundamentals of IPv6
You do not have to satisfy any prerequisites or criteria when you want to
appear for the scores, but you must have some knowledge about the
following topics:
- Fundamentals of networks
- Implementation of local area networks
- Implementation of Internet connectivity
- Management of devices
- Knowledge about securing network devices
- Implementation of IPv6 connectivity
The associated certification of this course is CCNA Routing, and Switching
and the associated exam is 200-1051 ICND2. English, Japanese, Chinese,
and Spanish are the languages supported by this module. At present, the
instructional videos are available in English and Spanish.
Cisco Learning Labs for ICND2
Cisco developed labs for each examination, and this set of labs was created
to help students understand and improve their understanding of the different
concepts covered in this examination. These labs are powered by the Cisco
IOS Software equipped with Layer 2 and Layer 3 features, are supported by
CLI, and are accessible 24/7, so you can study and learn at your
convenience. If you want to study on your own, the module and structure
given in this course are easy to follow. It is the second part of the labs. You
will learn more about how to configure, manage, and troubleshoot any
issues in the network. Like the previous module, this module is also a
combination of discovery and challenge labs. These will enable you to
understand the topics better and also test your theoretical knowledge. These
labs consist of 44 different pieces that you should go through. These pieces
are aligned with the learning objectives of the second examination. When
you hear this examination, you will obtain the CCNA routing and switching
certification.
Certification Practice Exams
MeasureUp provides Cisco Certification Practice Exams to help test your
level of understanding and skills. This website provides some information
on different topics (these aren't the questions that might come in the final
exam) that are related to various certification exams offered, such as Cisco
CCENT, Cisco CCNA Routing, and Switching, Cisco CCNP ROUTE,
Cisco CCNP SWITCH, and Cisco CCNA Security.
Apart from the study materials, Cisco also offers an extensive network of
resources that include CCNA routing and switching study sessions, study
material, access to different forums and blogs, and peer counseling.
Training
One of the best ways to prepare for the CCNA routing and switching
certification is to enroll for the different training programs that are approved
by Cisco. You can enroll for either the CCNAX course or enroll for the
independent courses ICND1 and ICND2.
Interconnecting Cisco Networking Devices Part 1 (ICND1)
The ICND1 course will help you learn the basics of network layers, which
are important for routing and switching. You will also learn more about the
basics of routing and switching, which will create a base for some advanced
technologies. The syllabus covered in this training module is the same as
the syllabus that is covered in the ICND1 course. Please refer to the
previous section for more information about the ICND1 examination.
Interconnecting Cisco Networking Devices Part 2 (ICND2)
The syllabus or the content covered in this training module is the same as
the course material you will need to prepare if you are writing the ICND2
examination. Please refer to the previous section for more information
about the ICND2 examination. The difference between this training
program and the self-paced learning is that the former has numerous lab
exercises that you can work on to master the different training modules.
Enrollment
You can enroll for either the composite examination or the ICND1 and
ICND2 examinations depending on which you choose to appear for in the
following ways:
1. Choose an instructor-led training session, and enroll yourself
into that session on the Cisco Learning Locator page.
2. Enroll for a private group training session on the Cisco Private
Group Training.
3. Visit the Cisco Learning Network Store if you want to choose a
self-paced e-learning program.
4. You should visit the Cisco Platinum Learning Library if you
only want to access the digital library.
This is not an exhaustive list of all the concepts that you will learn in this
course. You will also learn about the functions and interactions of firewalls,
the basics of network security, the IPv6 protocol, wireless controllers, the
access points for wireless controllers, and more. This course is a
combination of the ICND1 and ICND2 courses.
Cisco learning network offers instructor-led training that is spread over five
days. This course also includes some lab practice. At the end of the course,
you will learn to design, configure, implement, and troubleshoot a network.
This course will ensure that you nor the basics of networking. Support
engineers, associate network engineers, network specialists, and network
administrators and analysts must appear for this course. You can either
choose to take a private group training or instructor-led training depending
on your interest. You can obtain further details about this course on Cisco's
website in the following sections: "Cisco Learning Locator" and "Cisco
Private Group Training," respectively.
Cisco Official Course Material for Purchase
You can access all the material required to prepare for the certification
examination by just paying $750. Some topics can be downloaded for free,
while others are sold at a lower price. You must ensure that you check the
content and verify that the material is not repetitive.
Chapter 10
Now that you are aware of what is included in the CCNA Routing and
Switching examination let us look at how you can analyze where you stand
concerning the curriculum. This book will help you understand everything
you need to know about the examination, but this is not where it ends. You
need to develop a study plan if you want to ensure that you ace the
examination and clear it in your first attempt. This chapter will give you a
four-week study plan that you can follow. Remember that you can clear
your examination only if you follow the plan word for word.
When you choose to write the CCNA Routing and Switching examination,
you must make some changes to your daily schedule since you need to
spend some time studying for the examination. When you follow this study
plan, you must complete at least two sections in the syllabus every week.
Since there are numerous topics covered in each of these sections, you must
spend at least four hours every day on the syllabus. If you have briefly read
through the course material, you can identify the topics that will take you
some time to master. You will also identify those topics where you will
need to practice a little more.
If you choose to prepare for the routing and switching examination, you can
undergo some training sessions provided by Cisco. You can find this
training on the Global knowledge page. The instructors are people from the
field who are well-read and know the concepts they are teaching. Most of
the instructors are either recertifying themselves or taking the exam. They
know exactly what one needs to do to clear the examination.
Week 1
Since subnetting and binary networks are the most difficult topics for most
students, you will need to cover these during the first week of your study
plan. It would be best if you also went through some active sessions and
training to improve your understanding. During this week, you will need to
cover the following topics:
- What networking is, building blocks of networks, types of
networks, TCP/IP model and OSI reference
- Ethernet technologies like cabling, Cisco layer 3 model and a
summary
- What subnetting is, IP addressing and subnetting, types,
composition, and classes of IP addresses, private and public IP
Addresses
- Basics of subnetting, subnet lengths, subnet masks,
troubleshooting IP addresses, summarization of routes
- When you go through each of these topics, you must ensure that
you have enough time. You must spend at least three hours every
day to work on the topics mentioned in this section. Make sure that
you do not revise the topics now. If you have finished the course
material very early, you can move onto the next topics in the
syllabus. If you want to master these topics, you can watch different
videos on the Cisco learning page to help you understand the
capacities of every gadget used in the network. If you have time,
you can also complete some practice tests on those topics.
Week 2
Before you write the CCNA Routing and Switching examination, you must
ensure that you clear the 640-840 examination. In this examination, you
will need to cover a total of 76 subtopics. During the second week of your
study plan, you should cover some of those 76 topics:
- Basics to enhanced gateway interior protocol routing and
configuring the EIGRP, troubleshoot and verify the same,
operations and configuration of OSPF
- Gather the information and verify the configuration, configure the
router interfaces along with DHCP and DNS and take the CCNA
Lab 1 at this point
- Restoring, backing up, erasing and saving the IOS and
configuration file, use of password recovery through a Cisco router,
Cisco discovery and protocol and use of Telnet via IOS
- Introduction to switches, IOS and Cisco routers, use of CLI, i.e.,
command-line interface, the basic configuration of switches and
router
- Basics of IP routing, understanding the operations of the same,
default, dynamic and static routing, routing metrics and
administrative details and classifying routing protocols
- Routing loops and redistribution, default route and static lab,
routing protocols of RIPv2 and RIPv1, configuring, troubleshooting
and verifying the RIP
- Redistribution and summary routes for OSP and EIGRP. You
should also take the labs for EGRP, OSP and RIP at this stage
Week 3
During this week, you should look at the protocols. You will need to cover
the switching protocol and spanning tree, understanding the configuration
and functioning for catalyst switch, STP, RSTP and Ether channels with
Cisco additions, Rapid spanning and VLAN spanning, BPDU guard and
filter, labs for Port and STP security, MAC addressing table, VLAN and
VTP, types of VLANs and Ports, VLAN trunking and protocol, Cisco
firewalls and Network security, VLAN configuration and routing, device
management, secure communication and security for Layer 2.
Week 4
This is the last week of your study plan. You must push yourself hard
during this week if you want to achieve your goals. Make sure that you
cover every topic in the study material, and understand the content
thoroughly. You can practice everything you learn using different mock and
practice tests that are available on the Internet and in the Cisco learning
press. Since this is the last leg of your preparation, you will need to
complete the following topics: access-list and secure communication,
switch port and remote access, standard and extended access list, network
translation address, dynamic and static configuration of NAT, WAN and
NAT troubleshooting, VPN and frame relay, IP services and IOS Netflow,
NAT and WAN troubleshooting, PPP concepts and configuration, IPv6 and
encryption.
The Cisco Learning press releases some guides and study material for every
examination version created. The content in these books will break the
concept down into information that one can understand easily. These books
will also provide some information that you may not have looked at in the
beginning. It is also a good idea to go through some practice papers during
this week and look for some discussion forums where people talk about
some new questions they may have come across.
Chapter 11
Exam Tips
You now know what plan you should follow and also have an idea of the
different topics that are covered in the CCNA Routing and Switching
examination. This chapter will leave you with some tips that you can use to
clear the CCNA Routing and Switching examination or any other CCNA
certification that you appear for. Remember that you cannot expect to clear
the exam by only studying the concepts. You also need to be smart about
how you approach the examination. Experts have suggested the tips
mentioned in this chapter.
Get to Know Your Exam
Remember, you need to know what you are signing up for if you want to
succeed. Look at any actor as an example. They know they need to struggle
and work hard to get to where they want to be. The same concept works for
you too. When you sit for any examination without an idea of what will be
thrown at you, you will not ace the examination. Numerous people are
willing to share some knowledge about the examination through their
experience. If you are wary about speaking to other people about your
experience, you can visit the Cisco website to learn more about the
examination. This book provides some links that you can use to learn more
about the different topics that you should know well if you want to clear the
examination. You will also obtain some links for study material, online
tutors, and practice tests. If you are unsure of what you are doing with this
examination, then this is the right book for you. It is the right place since
you will learn all there is to know about the examination.
Organize a Study Space
You must ensure that you always set up a corner in your house that you will
only use to study. Keep any distractions away. Make sure that you always
focus on your studies when you begin preparing for the examination. Avoid
sitting on the sofa or bed when you study since this will only make you
sluggish. Make sure that you have enough place in your study area to
spread your books around and study. Never keep any electronic items on
your study table, unless you need to use it while you study. You know how
you can study and focus on the exam material, so make sure you do exactly
that. If you are someone who needs complete silence when you study, you
should work in a closed room with no disturbance. Some people may study
better when they work with other people while some would like to listen to
music while they study.
Obtain the Right Material
This book would have given you an overview of the different concepts you
must cover when you prepare for the examination. The previous chapter
also shed some light on the different topics you must cover every week.
You must always obtain the right material to study from. You should always
use the material provided by the Learning Press. There are separate books
for each examination. You can also use the 31-days before the material for
the last month. It is always important that you make notes so you can revise
some concepts before the exam. You can also outline the flow of the chapter
for future reference.
Join the Online Community
When it comes to any IT certification examination, there is a lot of material
that you can source from the Internet. Numerous communities allow you to
share your experiences with the world. Some people want to share some
examination strategies in these communities. These forums will also help
you learn more about people's successes and failures. Aside from the Cisco
Learning Network, you can search Google for a forum for that specific
certification. You can also view the CCNA page on Reddit since there are
people from across the globe that share their experiences. You must ensure
that you always stay away from some toxic people and posts. Numerous
users only use these forums to vent their frustration, and this will
discourage you.
Study Until it Feels Like Second Nature
When you study for the examination, you should know the concepts so well
that if someone were to wake you up and ask you to define a concept, you
should answer the question without a second thought. If you cannot learn
the course material in this manner, the chances of you clearing the
examination will decrease. Since the CCNA examination is comprehensive,
there are some concepts that people overlook when they study for it.
Remember that you cannot do this. You must cover every single note
mentioned in the book, and it is hard to do this. You must memorize
Internet speed designations, port numbers, and understand different
networking tools and more. Make sure that you study every single day. You
can develop a study plan that will help you set some time out every day so
you can study. You should remember everything you learn in the syllabus
since you will come across these terms and concepts at work. A CCNA
Certification is valuable since it will say a lot about your quality.
Create Your Own Custom Study Plan
As mentioned earlier, you must prepare your very own study plan. The
previous chapter provided a four-week study plan that you can use to get
started. It is always a good idea to create your own study plan since you
know what plan will work for you, and how many hours you can spare
every day to study for the examination. There is no need to write an
elaborate plan. You must, however, consider the following when you
develop your study plan:
1. Make sure you have the date set. You should choose the
examination date before you begin preparing for the exam. To
do this, you should create your profile and identify the time and
location that will suit you
2. Decide the amount of time you can spare every day to prepare
for the examination. You may have some other commitments,
so you must find the right time to prepare for the examination.
This is the only way you can complete all the topics in the
material. Remember to give you enough time so you can
practice every concept that you have learned
3. Take a look at the training material and courses, and see if you
can afford it. If you can afford the certified study material and
training videos, you can blindly follow the information in the
two. If you are unable to purchase these materials and videos.
One of the best ways to ensure that you pass the exam is to
purchase the pre-study material and begin reading it. This will
help you create a solid foundation and also help you develop
the necessary skills based on the course you have chosen.
4. Identify the training method that will help you learn better.
Some people can work better in classroom sessions while
others like to study alone. If you are someone who prefers
online sessions, make sure you plan your study sessions
accordingly. Since you know yourself better than anybody else,
you should choose your study plan according to what works
best for you.
5. Have you understood the subject you have chosen well? Do
you know what the passing rate for this examination is? Make
sure you use your experience to help you understand how to
prepare for the exam. That being said, you should also take the
questions, logic, and the length of the exam into account. When
you rely only on your experiences, it can lead to bad results.
What is Routing?
Through routing, you can identify the path in which any information can be
passed between the source and destination systems. The path is usually
provided through a network layer that is created by the router.
What Purpose Does the Data Link serve?
There are two functions that the data link layer performs:
- Framing
- Verifying that the messages from the source reach the right device
What is the Difference between Physical Topology and Logical Topology?
The physical topology will provide the actual layout of the medium in the
network while the logical topology refers to the path that the signal takes
through the physical topology.
Why is it Important to Use a Switch?
When information is passed from a source to a destination, you need to use
a switch to create a frame. The switch will receive signals, and it will use
that signal to create a frame. When it does this, the switch can easily read
the destination system's address and access that address. The switch can
then send the frame to the correct port in the network to pass on the
information. Every organization uses this method since this is the most
effective way to transmit data. The switch will never broadcast the
information sent to every other port in the network.
In What Situation Does Network Congestion Occur?
If numerous users are trying to access one network using the same
bandwidth, there will be some congestion in the network. For example, if
you want to log onto a website on Black Friday to access the sales, you may
find it difficult to find your product because the server of the store is down,
considering there is too much traffic on that network. This situation,
however, only occurs where there is no segmentation in a large network.
Define the Term 'Window' in Terms of Networking
The source and destination can only share a set of segments, called the
window, on any network. Once the segments are shared between the source
and the destination, a notification must be sent to the source, confirming
that the destination has indeed received the segments.
How Do Hold-downs Work?
A hold-down will ensure that an update message does not reinstate any
downed link. It does this by removing that link from that message. A
triggered update is used to reset the hold-down timer.
How is the Router Hold-down Timer Reset Due to a Triggered Update?
A triggered update can reset the router's hold-down timer if the timer has
expired. This happens when the router receives a processing task that was
proportional to the number of links present in the Internetwork.
Is a Network Divided into Smaller Sections Using a Bridge?
A bridge cannot be used to break the network into smaller segments, but it
can be used to filter a large network. It does this without shrinking the
network.
How Many Types of Memories are used in a Cisco Router?
Every Cisco router will use the following memories:
1. The NVRAM is used to store the startup configuration file
2. The DRAM stores the configuration file during the execution
3. The Cisco IOS is stored in the flash memory during the
execution process
How Does Cut-through LAN Switching Work?
In this type of switching, once a data frame is passed to a router, it is sent
out immediately and forwarded to the next segment in the network. This is
done once the destination address is read.
Which LAN Switching Method Does the Cisco Catalyst 5000 Use?
The Cisco Catalyst 5000 uses the store-and-forward method of switching.
The data frame is only shared between the source and the destination once
the switch checks the CRC and saves the frame within the buffer.
What is the Purpose of the LLC Sublayer?
Most application developers use the LLC or Logical Link Control sublayer
to perform the following functions:
1. Error correction
2. Manage the flow of the network layer using the start and stop
codes
The CCNA Routing and Switching certification are one of the most
prestigious certifications that an individual in the IT industry can earn. This
book sheds some light on this examination and also provides some
information about the other examinations that are offered by Cisco. Since
Cisco is a leading networking company, every certification offered by it is
considered prestigious. Many employers expect their current or future
employees to have a Cisco certification. This certification will give them
the faith that the employee can function on a variety of tasks and cater to
any issues that may occur in the network.
This book was written to guide you, and help you learn more about the
CCNA Routing and Switching examination. This book leaves you with
some tips that you can use to ace the exam. You can ensure that you clear
the examination in your first attempt if you follow the instructions and tips
mentioned in the book word for word.
Remember that the CCNA examination is a comprehensive examination.
Therefore, you need to set aside some time to prepare for the exam because
the syllabus covered is vast. You will need to create a study plan and ensure
that you stick to that plan. It is only when you do this that your hard work
will pay off. This certification will give you an edge over your competitors
since it will tell organizations that you have the required capabilities to
work with networks.
If you are an aspirant of this CCNA Certification, I'm sure that this guide
will help you achieve your goals. Prepare well, and do not be disheartened
if you do not clear the examination in your first attempt. Try again and
ensure that you do not repeat the mistakes that you made in the past. This is
the only way you can ensure that you ace the examination and obtain the
certification.
References
https://www.cisco.com/c/en/us/products/index.html#~products-by-technology
https://www.cisco.com/c/en/us/solutions/collaboration/index.html#~stickynav=1
https://learningnetwork.cisco.com/community/certifications/ccna/ccna-exam/exam-topics
https://blog.certskills.com/ann2016-09/
https://www.cisco.com/c/en_dz/about/blog-africa/2017/8-things-you-didnt-know-about-Cisco.html
https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/associate/ccna-
routing-switching.html#~stickynav=1
https://learningnetwork.cisco.com/community/certifications/ccna/icnd2/exam-topics
http://index-of.co.uk/Various/CCNA%20Routing%20and%20Switching%20Study%20Guide%20-
%20Lammle,%20Todd.pdf
https://www.globalknowledge.com/us-en/training/certification-prep/brands/cisco/section/routing-
and-switching/ccna-routing-and-switching/
https://www.cognitel.com/blog/ccna-certification/advantages-of-ccna-certification/
https://www.cisco.com/c/en/us/products/switches/virtual-networking/index.html#~tab-benefits
https://learningnetworkstore.cisco.com/on-demand-e- learning/interconnecting-cisco-networking-
devices-part-1-icnd1-v3-0-elt-icnd1-v3-0-020196
https://www.cisco.com/c/en_au/products/hyperconverged-infrastructure/index.html
https://www.cisco.com/en/US/services/ps2827/ps2993/services_at_a_glance_sas_sasu.pdf
https://www.greycampus.com/blog/networking/10-reasons-to-get-a-ccna-certification
https://learningnetwork.cisco.com/community/learning_center/certification_exam_topics
https://www.bestvalueschools.com/faq/what-is-the-cisco-ccna-certification/
https://learningnetwork.cisco.com/community/certifications/ccna/ccna-exam/study-material
https://www.cisco.com/c/en_au/products/switches/data-center-switches/index.html#~stickynav=3
https://www.cisco.com/c/en_au/products/collaboration-endpoints/index.html#~stickynav=1
https://career.guru99.com/frequently-asked-ccna-interview-questions/
https://www.workitdaily.com/benefits-ccna-certified
https://www.greycampus.com/blog/networking/everything-you-wanted-to-know-about-ccna
http://blog.networkbulls.com/top-5-networking-concepts-to-prepare-for-ccna-routing-switching-
examination
https://www.urbanpro.com/ccna-certification/top-10-tips-for-ccna-routing-and-switching
https://www.techrrival.com/prepare-cisco-ccna-200-125-exam/
https://www.certlibrary.com/blog/tips-passing-cisco-ccna-certification-exams/
https://www.workitdaily.com/benefits-ccna-certified
https://www.globalknowledge.com/us-en/training/certification-prep/brands/cisco/section/routing-
and-switching/ccna-routing-and-switching/
https://www.braindumps.com/guide-4-weeks-study-plan-for-ccna-routing-and-switching-exam.htm
https://www.greycampus.com/blog/networking/everything-you-wanted-to-know-about-ccna
CISCO CCNA
COMMAND GUIDE
STUART NICHOLAS
Introduction
Cisco Devices
The chapter walks you through the requisite information and commands
needed to connect rollover cables to the switch or router. The chapter also
spans around the determination of the terminal settings and setup of LAN
connections. I have explained different categories in bullets to give you a
clear understanding.
Cable Types
You must ensure that the cabling is properly done or you might trigger
problems before you even start. See the following pattern.
If your device A contains a computer COM port and device B
contains the console of switch or router, you should use the
rollover cable.
If your device A contains computer NIC and device B contains
the switch or hub, you should use the straight-through cable.
If your device A contains computer NIC and device B also
contains computer NIC, you should use the crossover cable.
If your device A contains computer NIC and device B also
contains computer NIC, you should use the rollover cable.
If your device A contains a switch or hub port and device B
contains Router’s Ethernet port, you should use the straight-
through cable.
If your device A contains a switch or hub port and device B
also contains a switch or hub port, you should use the crossover
cable. Also, don’t forget to check for the uplink button to defeat
this.
If your device A contains a router’s Ethernet port and device B
also contains a router’s Ethernet port, you should use the
crossover cable.
If your device A contains a router’s serial port and device B
also contains a router’s serial port, you should use the Cisco
serial DCE/DTE cable.
If your device A contains a computer NIC and device B
contains the router’s Ethernet port, you should use the
crossover cable.
Different cables have different pinout systems. See the following patterns.
Crossover Cable: Pin 1 – Pin 3, Pin 2 – Pin 6, Pin 3 – Pin 1, Pin 4 –
Pin 4, Pin 5 – Pin 5, Pin 6 – Pin 2, Pin 7 – Pin 7, Pin 8 – Pin 8
Straight-Through Cable: Pin 1 – Pin 1, Pin 2 – Pin 2, Pin 3 – Pin 3,
Pin 4 – Pin 4, Pin 5 – Pin 5, Pin 6– Pin 6, Pin 7 – Pin 7, Pin 8 – Pin
8
Rollover Cable: Pin 1 – Pin 8, Pin 2 – Pin 7, Pin 3 – Pin 6, Pin 4 –
Pin 5, Pin 5 – Pin 4, Pin 6 – Pin 3, Pin 7 – Pin 2, Pin 8 – Pin
LAN Connections
If the connection or port is Ethernet, the port type will be RJ-
45. You must connect it to an Ethernet hub or Ethernet switch
through cable RJ-45.
If the connection or port is TI/EI WAN, the port type will be
RJ-48C/CA81A. You must connect it to EI or TI network
through rollover cable.
If the connection or port is a console, the port type will be 8-
pin. You must connect it to a computer COM port through
rollover cable.
If the connection or port is AUX, the port type will be 8-pin.
You must connect it to the Modem through cable RJ-45.
If the connection or port is BRI U WAN, the port type will be
RJ-49C/CA11A. You must connect it to an ISDN network
exchange (PINX) through cable RJ-45.
If the connection or port is BRI S/T, the port type will be RJ-
48C/CA81A. You must connect it to an NTI device or private
integrated network exchange (PINX) through cable RJ-45.
The question mark plays an important role in executing commands. You can
use the question mark to see what you can do with the command and its
parameters.
Question Mark
The command Router#? will list all the commands that are
available in the present command mode.
The command
Router#c?
clear clock
will list all the available choices that tend to start with c.
The command
Router#c1?
clear clock
will list all the available choices that will start with cl.
The command
Router#clock ?
set
will list all the available choices that reveal all the subcommands that are
linked to this command. It also sets the date and time of the system.
The command Router#c? set 20:40:00 17 August 2020 ? +
Enter key will confirm that you have configured the data and
time of the system.
The command Router# will show there is no incomplete
command message or error message and that the command was
executed successfully.
Miscellaneous Commands
There is an enable command you can use to move the user. The
command Router>enable Router# will move the user to the
privileged mode.
The command Router#exit or Router>exit allows the user to log
off on the system.
The command Router(config-if)#exit Router(config)# will
move the user back to level one.
The command Router(config)#exit Router# will also move the
user back to level one.
The command Router#disable Router> will move a user from
the privileged mode to the user mode. It is known as the disable
command.
The command Router#logout has the same function to perform
as exit. It is known as the logout command.
The command Router#setup will take the user to the startup
mode right at the command line. It is labeled as the setup mode
and you will see an answer in the square brackets. If this is
what you want, you should go on and press the Enter key. If
you want to end the setup process at any point, you can enter
Ctrl + C to shut down the interfaces and return to the user-mode
Router>. The setup mode can never be used for the router's
configuration as it only performs the basics. You can turn on
the IGRP or RIPv1 but not the EIGRP or OSPF and you cannot
make ACLs or enable the NAT.
Keyboard Usages
You can use different keyboard commands during the editing process. There
will be many tasks that you will repeatedly be using. To make it possible,
the Cisco IOS Software allows you to use different keyboard combinations
to make the process highly efficient.
You can use the carrot symbol ^ over the 6 key on the keyboard
to locate the mistake you might have made while entering the
command.
You can enter ctrl + a on the keyboard to move the cursor from
where it is to the start of the line.
You can enter ctrl + b on the keyboard to move the cursor from
where it is to the back by one word.
You can enter ctrl + b or the left arrow on the keyboard to move
the cursor from where it is to back by one character.
You can enter ctrl + e on the keyboard to move the cursor from
where it is to the end of the line.
You can enter Esc + f on the keyboard to move the cursor from
where it is to a forward point by one word.
You can enter Ctrl + f or the right arrow on the keyboard to
move the cursor from where it is to a forward point by one
character.
You can enter $ that is above the 4 key on the keyboard to
indicate that you have scrolled the line toward the left side.
You can enter Router#terminal no editing to turn off the ability
to use the keyboard shortcuts of the previous session.
You can enter Router#terminal editing to re-enable the
enhanced editing mode.
You can apply some show command to scan the information about the
command line interface and the systems.
The command Router#show version will display the requisite
information about the present IOS.
The command Router#show history will display all the
commands you have used in the command line interface
history.
The command Router#flash version will display the requisite
information about the flash memory of the system.
The last line of output from the show version tells us what the configuration
register has been set up to.
Chapter Two
This chapter will walk you through the commands and information about
the configuration of a router. You will learn how to set up the names,
interfaces, passwords, host tables, and save the configurations. The router
mode commands are as under.
Interface Names
Remembering the names of the interfaces is one of the biggest problems
that administrators might face. Each router has a different interface name.
The market is replete with many Cisco devices that are being used in the
production networks in the present day. Some administrators get confused
due to these interface names. You can use the command router#show ip
interface brief to see which type of interface is on your computer.
Router mode: 2501. The slot number or port location is on board. The
port or slot type is Ethernet. The slot numbering range is labeled as an
interface-type number. An example of this interface is ethernet0(e0).
Router mode: 2501. The slot number or port location is on board. The
port or slot type can be Serial. The slot numbering range is labeled as an
interface-type number. An example of this interface is serial0 (sO) & s1.
Router mode: 2514. The slot number or port location is on board. The
port or slot type is Ethernet. The slot numbering range is labeled as an
interface-type number. An example of this interface is e0 & e1.
Router mode: 1721. The slot number or port location is on board. The
port or slot type is FastEthernet. The slot numbering range is labeled as
an interface-type number. An example of this interface is fastethernet0()
(fa0).
Router mode: 2514. The slot number or port location is slot 0. The port
or slot type is WAC (WIN Interface Card) (Serial). The slot numbering
range is labeled as an interface-type number. An example of this
interface is s0 & s1.
Router mode: 1760. The slot number or port location is on board. The
port or slot type is Fast Ethernet. The slot numbering range is labeled as
interface-type 0/port. An example of this interface is fa0/0.
Router mode: 1760. The slot number or port location is slot 0. The port
or slot type is WIC/VIC (Voice Interface Card). The slot numbering
range is labeled as interface-type 0/port. An example of this interface is
s0/0 & s0/1 and v0/0 & v0/1.
Router mode: 1760. The slot number or port location is slot 1. The port
or slot type is WIC/VIC. The slot numbering range is labeled as
interface-type 1/port. An example of this interface is s1/0 & s1/1 and
v1/0 & v1/1.
Router mode: 1760. The slot number or port location is slot 2. The port
or slot type is VIC. The slot numbering range is labeled as interface-
type 2/port. An example of this interface is v2/0 & v2/1.
Router mode: 1760. The slot number or port location is slot 3. The port
or slot type is VIC. The slot numbering range is labeled as interface-
type 3/port. An example of this interface is v3/0 & v3/1.
Router mode: 2610. The slot number or port location is on board. The
port or slot type is Ethernet. The slot numbering range is labeled as
interface-type 0/port. An example of this interface is e0/0.
Router mode: 2610. The slot number or port location is slot 0. The port
or slot type is WIC (Serial). The slot numbering range is labeled as
interface-type 0/port. An example of this interface is s0/0 & s0/1.
Router mode: 2611. The slot number or port location is on board. The
port or slot type is Ethernet. The slot numbering range is labeled as
interface-type 0/port. An example of this interface is e0/0 & e0/1.
Router mode: 2611. The slot number or port location is slot 0. The port
or slot type is WIC (Serial). The slot numbering range is labeled as
interface-type 0/port. An example of this interface is s0/0 & s0/1.
Router mode: 2620. The slot number or port location is on board. The
port or slot type is FastEthernet. The slot numbering range is labeled as
interface-type 0/port. An example of this interface is fa0/0.
Router mode: 2620. The slot number or port location is slot 0. The port
or slot type is WIC (Serial). The slot numbering range is labeled as
interface-type 0/port. An example of this interface is s0/0 & s0/1.
Router mode: 2621. The slot number or port location is on board. The
port or slot type is FastEthernet. The slot numbering range is labeled as
interface-type 0/port. An example of this interface is fa0/0 & fa0/1.
Router mode: 2621. The slot number or port location is slot 0. The port
or slot type is WIC (Serial). The slot numbering range is labeled as
interface-type 0/port. An example of this interface is s0/0 & s0/1.
Router mode: 1841. The slot number or port location is on board. The
port or slot type is FastEthernet. The slot numbering range is labeled as
interface-type 0/port. An example of this interface is fa0/0 & fa0/1.
Router mode: 1841. The slot number or port location is slot 0. The port
or slot type is HWIC/WIC/VWIC. The slot numbering range is labeled
as interface-type 0/port. An example of this interface is s0/0/0& s0/0/1.
Router mode: 1841. The slot number or port location is slot 1. The port
or slot type is HWIC/WIC/VWIC. The slot numbering range is labeled
as interface-type 0/port. An example of this interface is s0/1/0& s0/1/1.
Router mode: 2801. The slot number or port location is on board. The
port or slot type is FastEthernet. The slot numbering range is labeled as
interface-type 0/port. An example of this interface is fa0/0& fa0/1.
Router mode: 2801. The slot number or port location is slot 0. The port
or slot type is VIC/VWIC(voice only). The slot numbering range is
labeled as interface-type 0/slot/port. An example of this interface is
voice0/0/0& voice0/0/3.
Router mode: 2801. The slot number or port location is slot 1. The port
or slot type is HWIC/WIC/VWIC. The slot numbering range is labeled
as interface-type 0/slot/port. The examples of this interface are 0/1/0-
0/1/3(this is single-wide HWIC) and 0/1/1-0/1/7 (this is double-wide
HWIC).
Router mode: 2801. The slot number or port location is slot 2. The port
or slot type is WIC/VIC/VWIC. The slot numbering range is labeled as
interface-type 0/slot/port. An example of this interface is 0/2/0- 0/2/3.
Router mode: 2801. The slot number or port location is slot 3. The port
or slot type is HWIC/WIC/VWIC. The slot numbering range is labeled
as interface-type 0/slot/port. An example of this interface is 0/3/0- 0/3/3
for single-wide HWIC and o/3/0- 0/3/7 for double-wide HWIC.
Router mode: 2811. The slot number or port location is built into the
front of the chassis. The port or slot type is USB. The slot numbering
range is labeled as an interface-type port. An example of this interface
is usb0& usb1.
Router mode: 2811. The slot number or port location is built into the
back of the chassis. The port or slot type is FastEthernet Gigabit
Ethernet. The slot numbering range is labeled as interface-type 0/port.
An example of this interface is fa0/0& fa0/1 gi0/0& gi0/1.
Router mode: 2811. The slot number or port location is built into slot 0.
The port or slot type is HWIC/HWIC-D/WIC/VWIC/VIC. The slot
numbering range is labeled as interface-type 0/slot/port. An example of
this interface is s0/0/0& s0/0/1 fa0/0/0& 0/0/1.
Router mode: 2811. The slot number or port location is built into slot 1.
The port or slot type is HWIC/HWIC-D/WIC/VWIC/VIC. The slot
numbering range is labeled as interface-type 0/slot/port. An example of
this interface is s0/1/0& s0/1/1 fa0/1/0& 0/1/1.
Router mode: 2811. The slot number or port location is at NME slot.
The port or slot type is NM/NME. The slot numbering range is labeled
as interface-type 1/port. An example of this interface is gi1/0& gi1/1
s1/0& s1/1.
Configuring Interfaces
You can configure any kind of interface with the help of the following
commands.
The command Router(config)#int s0/0 will let you move from
your current interface to the Serial 0/0 mode interface.
The command Router(config-if)#clock rate 56000 will let you
assign a set clock rate for the interface you are in.
The command Router(config-if)#description Link to ISP will
explain the optional descriptor of the link.
The command Router(config-if)#no shut will let you turn on
the interface.
The command Router(config-if)#ip address 192.168.10.1
255.255.255.0 will let you assign the subnet mask and address
to the interface.
The command Router(config)#int fa0/0 will let you move from
your current interface to the Fast Ethernet 0/0 mode interface.
The command Router(config-if)#description Accounting LAN
will let you view your link's optional descriptor.
The command Router(config-if)#ip address 192.168.20.1
255.255.255.0 will let you assign subnet masks and addresses
to your current interface.
The command Router(config-if)#int fa0/0 will let you move
from your current interface to the Fast Ethernet 0/0 mode
interface.
The command Router(config-if)#no shut will let you turn on
the interface.
You can use the clock rate command only on the serial interface that
possesses a DCE cable that is plugged right into it. There ought to be a
clock rate that is set on each serial link in between the routers. It is of least
importance as to which router has been plugged with the DCE cable or
which interface has got the cable plugged into it. The Serial 0 on the one
router can be plugged into Serial 1 on some other router.
This chapter will walk you through the basic concepts of networking and
routing in cisco. The administrative distance is an important aspect in
networking and routing. There are some default administrative distances
(AD) in the world of cisco, which are as under:
The administrative distance for the connected interface is 0.
The administrative distance for the static route is 1.
The administrative distance for the internal EIGRP is 90.
The administrative distance for the EIGRP summary route is 5.
The administrative distance for the external border gateway
protocol (eBGP) is 20.
The administrative distance for the internal BGP(iBGP) is 200.
The administrative distance for the external EIGRP is 170.
The administrative distance for the Interior Gateway Routing
Protocol (IGRP) is 100.
The administrative distance for the Intermediate System-to-
Intermediate System (IS-IS) Protocol is 115.
The administrative distance for the RIP is 120.
The administrative distance for the unknown is 255.
Permanent Keywords
The command Georgia(config)#ip route 192.168.50.0 255.255.255.0
serial0/0/0/0 permanent will let you create a static route that you cannot
remove from the table even if you have shut down the interface. In the
absence of a permanent keyword in the static route statement, the static
route will stand removed, if your interface that is specified in the command
moves down. An interface that is down will trigger the directly connected
network and the associated static routes to get deleted from the table. When
the interface is back up, the routes will definitely be returned. When you
have added a permanent keyword to a static route statement, you will keep
the static routes in the table even if the interface goes down. The interface
remains down but the routes remain in the table. Its benefit is that when the
interface gets back up, little need is usually left for the reprocessing of the
static routes. This saves time and also the power that is usually consumed
on processing.
This chapter will walk you through the commands and information that are
concerned with the optional and mandatory commands for the configuration
of the Routing Information Protocol (RIP). I will also explain the
commands that are linked to the configuration of RIP Version 2 (RIP-2).
First of all, I will explain how you can turn and off the ip classless.
The command Georgia(config)#ip classless will direct IOS to
process the packets that are destined for the unknown subnet
toward the top supernet route. Usually, you do not have to
enable this command in cisco as it is enabled by default in
interfaces.
The command Georgia(config)#no ip classless will undo what
you have done with the help of the previous command.
RIP Routing
The command Georgia(config)#router rip will help you to
enable RIP.
The command Georgia(config-router)#network w.x.y.z is
usually a network number of a directly connected network that
you are looking forward to advertise.
Troubleshooting Problems
The commands that you can use to troubleshoot problems are as under:
The command Georgia#debug ip rip will let you see the entire
RIP activity. The results will be displayed in real time.
The command Georgia#show ip rip database will let you see
the contents of the database of RIP.
IGRP
In the following section, I will give the details of different mandatory and
optional commands that are related to Interior Gateway Routing Protocol
(IGRP).
The command Georgia(config)#router igrp will enable the
routing process related to IGRP. IGRP routing uses autonomous
system. The process ought to match other routers that will share
the routing updates to make sure that the communication takes
place.
The command Georgia(config-router)#network x.x.x.x will let
you advertise the network. The x.x.x.x is the name of the
network that is directly connected and that you are looking
forward to advertise.
You only have to advertise the classful network. You are not required to
advertise a subnet. If you advertise a subnet, you will see no error message,
because the router is likely to automatically convert the subnet into the
address of a classful network.
The bandwidth command is also used for metric calculations. It will not
change the performance of the interface.
Troubleshooting
You can use two commands to troubleshoot if an issue pops up in the
middle of the operations.
The command Georgia#debug ip igrp events will let you see the
IGRP events in the real time.
The command Georgia#debug ip igrp transactions will let you
see the IGRP updates that exist in between the routers.
EIGRP
This section will explain how to configure EIGRP, verify EIGRP,
autosummarize EIGRP, and troubleshoot EIGRP.
Configuring EIGRP
The command Georgia(config)#router eigrp 100 will turn on
process 100 of EIGRP, an autonomous system (AS) number.
This can be a number in between 1 and 65535. All the routers
in AS ought to use a similar AS number.
The command Georgia(config-router)#network 10.0.0.0 will
specify which network must advertise in EIGRP.
The command Georgia(config-router)#eigrp log-neighbor-
changes will log any kind of changes that happen to one of the
EGRIP neighbors.
The command Georgia(config-router)#no network 10.0.0.0 will
allow you to remove the same network from EIGRP process.
The command Georgia(config-router)#bandwidth a will allow
you to set up the bandwidth of your interface to a kilobit. This
allows the EIGRP to make an improved and beneficial routing
decision. You only can use the bandwidth command to perform
the metric calculations. This usually does not change the
performance of your interface.
Auto-summarization
The command Georgia(config-router)#no auto-summary will
allow you to switch off the feature of auto-summarization. You
will be able to summarize the networks, by default, at the
boundary of the classful. The command Georgia(config-
router)#int fa 0/0 is also a part of the auto-summarization
process.
The command Georgia(config-if)#ip summary-address eigrp
100 10.10.0.0 255.255.0.0 will allow you to enable the manual
summarization process on your interface. This will be for the
given mask and address.
Troubleshooting
You can use the following commands to troubleshoot a problem that pops
up along the way.
The command Georgia#debug eigrp fam will allow you to see
the actions/events that are related to the DUAL FSM.
The command Georgia#debug eigrp neighbor will allow you to
see the actions/events that are connected to EIGRP neighbors.
The command Georgia#debug eigrp packet will allow you to
see the actions/events that are connected to the packets of
EIGRP.
Troubleshooting RIPng
When you are using the debug command for RIPng, it is likely to affect the
router performance adversely. It may even trigger a reboot in the router.
Therefore, you should always stay cautious when you are using this
command. You must never leave the debugging process open. You may use
it long enough to collect the information and once you have harvested the
information, you must immediately disable it with the undebug command. I
will continue to use the router name Georgia in the following example as
well. Here is the rundown of the commands for troubleshooting in RIPng.
The command Georgia#clear ipv6 rip will help you to delete
the routes from the IPv6 RIP table. It will also delete the routes
from the IPv6 table as well.
The command Georgia#clear ipv6 route * will let you delete all
the routes that exist in the IPv6 routing table.
The command Georgia#clear ipv6 route 2001:db8:c18:3: :/64
will let you clear a specific route from the IPv6 table.
The command Georgia#clear ipv6 interface will let you see the
status of all the interfaces that have been configured for IPv6.
The command Georgia#clear ipv6 routing will let you see the
debug messages related to the updates of the IPv6 routing table
and the routing cache updates.
The command Georgia#clear ipv6 traffic will let you reset the
IPv6 traffic counters.
The command Georgia#clear ipv6 packet will let you see the
debug messages that are for the IPv6 packets.
The command Georgia#clear ipv6 rip will let you see the debug
messages for the transactions regarding IPv6 RIP routing.
The command Georgia#show ipv6 route rip will let you see the
present routes for RIPng in the IPv6 table.
The command Georgia#show ipv6 route will let you see the
present status of the IPv6 table.
The command Georgia#show ipv6 rip next-hops will let you
see the processes of RIPng. It also displays the next-hop
processes that are running under each major process.
The command Georgia#show ipv6 tip database will let you see
the database of the RIPng processes. Even if more than two
processes are running in the system, this command will show
all the databases.
The command Georgia#show ipv6 rip will let you see the
information about the present process.
The command Georgia#show ipv6 protocols will let you see the
protocols and the present state of all the IPv6 protocol
processes.
The command Georgia#show ipv6 neighbors will let you see
the IPv6 neighbor discovery information.
The command Georgia#show ipv6 traffic will let you see the
statistics that are related to IPv6 traffic.
The command Georgia#show ipv6 route summary will let you
see the short form of the IPv6 table.
The command Georgia#show ipv6 routers will let you see the
advertisement data for the IPv6 router.
IPv6 Ping
If you are looking forward to diagnosing the basic connectivity in a network
with the help of IPv6, you may enter the Ping command that can be seen
below.
Georgia#ping ipv6 2001:db8: :3/64
In the next section, I will shed light on the characters that you will see and
their meaning and understand how to read the symbols.
Chapter Five
This chapter will walk you through the commands related to the Open
Shortest Path First (OSPF). You will navigate through the commands
regarding the configuration of single-area OSPF, the use of wildcard masks
in OSPF areas, and the configuration of single-area OSPF such as cost
metrics and loopback interfaces, timers, authentication, and propagation of
default tone. You will also learn about the commands to verify OSPF and
the troubleshooting of issues that pop up along the way.
The following commands will help you modify the OSPF cost metrics.
The command Georgia(config)#int s 0/0 will allow you to
modify the metrics.
The command Georgia(config-if)#bandwidth 256 will allow
you to change the bandwidth of the network. You can change it
to 128. OSPF will also recalculate the cost of the link.
The command Georgia(config-if)#ip ospf cost 1690 will allow
you to change the cost figure to the value of 1690. The link's
cost is generally determined by the division of the reference
bandwidth by interface bandwidth. The default bandwidth can
be a number from 1-10,000,000. It is generally measured in
kilobits. The cost is a number between 1-65,535.
Authentication
The command Georgia(config)#router ospf 456 will allow you
to kick off the authentication process.
The next command on the line is Georgia(config-router)#area 0
authentication will allow you to turn on the process of simple
authentication. You can send in the password in clear text.
The command Georgia(config-router)#exit will allow you to
exit the authentication process.
The next command to enter in the interface is
Georgia(config)#int fa0/0.
The command Georgia(config-if)#ip ospf authentication-key
jasmine will allow you to set the password for your
authentication process to jasmine. You can choose any other
word to set the password. You can also make it more complex
so that it defies any cracking attempts.
MD5 Authentication
The command Georgia(config)#router ospf 456 will allow you
to kick off the process of authentication using MD5.
The command Georgia(config-router)#area 0 authentication
message-digest will allow you to enable the authentication
process with MD5 password encryption.
The command Georgia(config-router)#exit will allow you to
exit the process at any time.
The next command on the line is Georgia(config-router)#int fa
0/0.
The command Georgia(config-if)#ip ospf message-digest-key 1
md5 jasmine will allow you to encrypt the password that you
have filled in the interface. In the command 1 is the key-id.
This value remains the same. The key and password must
remain the same for any neighboring router.
Timers
The command Georgia(config-if)#ip ospf hello-interval timer
30 will allow you to change the Hello interval to 30 seconds.
You can change the timing as per your custom requirements.
The command Georgia(config-if)#ip ospf dead-interval 90 will
allow you to change the dead interval to 90 seconds. You can
fill it in with any other amount of seconds.
Default Route
The command Georgia(config)#ip route 0.0.0.0 0.0.0.0 s0/0
will allow you to create a default route in the system. After you
have entered the abovementioned command, you can fill in the
system with the following command Georgia(config)#router
ospf 1 to further the process of creating default routes.
The command Georgia(config-router)#default-information-
originate will allow you to set the default route so that it can be
propagated across the OSPF routers.
Troubleshooting Process
The command Georgia#clear ip route * will allow you to clear
the routing table. It forces the users to rebuild the table. In that
way, the problem is automatically killed.
The command Georgia#clear ip route x.x.x.x will allow you to
clear a specific route to the network x.x.x.x.
The command Georgia#clear ip ospf counters will allow you to
clear and reset the OSPF counters.
The command Georgia#clear ip ospf process will allow you to
reset the OSPF process. This forces the OSPF to recreate the
neighbors, routing tables and databases. This is how the
problem is tackled and erased completely from the system.
The command Georgia#debug ip ospf events will allow you to
see OSPF events in the system. This is how you can correct any
problem that pops up along the way.
The command Georgia#debug ip ospf packets will allow you to
see the OSPF packets.
The command Georgia#debug ip ospf adj will allow you to see
different states of OSPF.
Chapter Six
This chapter will walk you through the configuration processes of single
area OSPF and multiarea OSPF. I will explain each configuration process
by neatly stating the step-by-step commands.
Multi-area OSPF
OSPF uses different types of messages. A few of them are given as under.
Each OSPF packet is packed up inside an IP header.
The first type of OSPF messages is named Hello. The message
is used to discover the neighbors and it also builds the
adjacencies that are between them.
The second type of OSPF messages is named Database
description (DBD). The message is used to check for the
synchronization of the database between the routers.
The third type of OSPF messages is named Link-state request
(LSR). The message is used to request specific link-state
advertisements (LSAs) from a different router.
The fourth type of OSPF messages is named Link-state
update(LSU). The message is used to send off the specifically
requested LSAs.
The fifth type of OSPF messages is named Link-state
acknowledgment (LSAck). The message is used to
acknowledge the different types of packets.
LSA Types
In the next section, I will explain the different types of LSA that the OSPF
uses. LSAs are considered as the building blocks of the OSPF link-state
database (LSDB). LSAs act as database records. They describe the topology
of the OSPF network area.
The first type of LSA is Router LSA. It describes the router link
state to area. It remains flooded in a single area.
The second type of LSA is Network LSA. Designated routers
generate this type. It is also flooded in a single area.
The third type of LSA is Summary LSA. This type is used by
area Border Router (ABR). It is also used to harvest
information that is collected from one area. It also summarizes
it for a different area.
The fourth type of LSA is ASBR summary LSA. It tends to
inform the OSPF domain on how to approach the ASBR.
The fifth type of LSA is Autonomous system LSA. Its
description is that ASBR generates it. These types of LSAs
describe the routes to the destinations that are generally
external to the systems that operate autonomously.
The sixth type of LSA is Group membership LSA. Its
description is that it is used in multicast OSPF apps. Multicast
apps or MOSPF apps have been deprecated.
The seventh type of LSA is NSSA external link entry LSA. Its
description is it is used in the special types of areas are known
as not-so-stubby-area (NSSA). It tends to advertise the external
routes in the NSSA.
The eighth type of LSA is Link-local LSA for OSPFv3. Its
description is that it yields information about the link-local
addresses in addition to displaying a list of IPv6 addresses on
the link. It is generally not supported by Cisco.
The ninth type of LSA is Opaque LSA. This LSA is reserved
for future usage.
The tenth type of LSA is Opaque LSA. This LSA is reserved
for future usage.
The eleventh type of LSA is Opaque LSA. This LSA is
reserved for future usage.
OSPF Configuration
There are a few steps involved in the configuration process of OSPF. The
steps are given below.
The command Georgia(config)#router ospf 555 will allow you
to initiate the OSPF process 555. The ID can be a positive
integer between 1 and 65,535. The process ID is never related
to the OSPF area. The process ID distinguishes one process
from another one inside of the device.
The command Georgia(config-router)#network 172.16.10.0
0.0.0.0255 area 0 will allow you to use the wildcard mask to
determine which interfaces you can advertise. Any interface
that has an address of 172.16.10.x will run the OSPF. It can also
be put into area 0.
The command Georgia(config-router)#log-adjacency-changes
detail will allow you to configure routers to some syslog
messages whenever there is some change of state inside the
OSPF neighbors.
You can use different wildcard masks with OSPF areas. When you compare
it with an IP address, a wildcard mask will help you locate what addresses
will be matched up to run the OSPF and also be placed inside a particular
area.
The zero(0) in the wildcard mask means checking the
corresponding bit within the address to make a perfect match.
The one(1) in the wildcard mask means ignorance of the
corresponding bit within the address.
Georgia1 Router:
The command Router> enable will allow you to shift to the
privileged mode.
The command Router#configure terminal will allow you to
shift to the global configuration mode.
The command Router(config)#hostname Georgia1 will allow
you to set up the name of the router.
The command Georgia1(config)#interface loopback0 will allow
you to enter the mode of the loopback interface.
The command Georgia1(config-if)#ip address (enter ip address
here) will allow you to assign the IP address and the netmask to
the network.
The command Georgia1(config-if)#description Router ID will
allow you to set up a locally significant description.
The command Georgia1(config-if)#exit will allow you to shift
back to the global configuration mode.
The command Georgia1(config-if)#interface fastethernet0/1
will allow you to shift back to the interface configuration mode.
The command Georgia1(config-if)#ip ospf priority 200 will set
up the priority for BDR and DR election processes. The router
is likely to win and become the DR.
The command Georgia1(config-if)#no shutdown will allow you
to shift back to the interface mode.
The command Georgia1(config-if)#exit will allow you to
reenter the global configuration mode.
The command Georgia1(config)#router ospf1 will allow you to
kick off OSPF 1.
The command Georgia1(config)#ip route 0.0.0.0 0.0.0.0
10.1.0.2 fastethernet0/1 will allow you to create a default route.
If you use next-hop address and exit interface on a Fast
Ethernet interface, you will be able to prevent the recursive
look-ups within the routing table.
The command Georgia1(config-router)#network 172.16.1.0
0.0.0.255 area 0 will ensure that the interface that has the IP
address 172.16.1.y will operate OSPF and it will also be put in
area 0.
The command Georgia1(config-router)#network 172.16.51.1
0.0.0.0 area 51 will ensure that the interface that has the IP
address 172.16.51.1 will operate OSPF and it will also be put in
area 51.
The command Georgia1(config-router)#exit will take you back
to the global configuration mode.
The command Georgia1(config)#exit will allow you to get back
to the privileged mode.
The command Georgia1#copy running-config startup-config
will allow you to save your network configuration to NVRAM.
Georgia2 router:
The command Router> enable will allow you to shift to the
privileged mode.
The command Router#configure terminal will allow you to
shift to the global configuration mode.
The command Router(config)#hostname Georgia2 will allow
you to set up the name of the router.
The command Georgia2(config)#interface loopback0 will allow
you to enter the mode of the loopback interface.
The command Georgia2(config-if)#ip address (enter ip address
here) will allow you to assign the IP address and the netmask to
the network.
The command Georgia2(config-if)#description Router ID will
allow you to set up a locally significant description.
The command Georgia2(config-if)#exit will allow you to shift
back to the global configuration mode.
The command Georgia2(config-if)#interface fastethernet0/0
will allow you to shift back to the interface configuration mode.
The command Georgia2(config-if)#ip ospf priority 100 will set
up the priority for BDR and DR election processes. The router
is likely to win and become the DR.
The command Georgia2(config-if)#no shutdown will allow you
to shift back to the interface mode.
The command Georgia2(config-if)#exit will allow you to
reenter the global configuration mode.
The command Georgia2(config)#router ospf1 will allow you to
kick off OSPF 1.
The command Georgia2(config)#ip route 0.0.0.0 0.0.0.0
10.1.0.2 fastethernet0/1 will help you create a default route. If
you use next-hop address and exit interface on a Fast Ethernet
interface, you will be able to prevent the recursive look-ups
within the routing table.
The command Georgia2(config-router)#network 172.16.1.0
0.0.0.255 area 0 will ensure that the interface that has the IP
address 172.16.1.y will operate OSPF and it will also be put in
area 0.
The command Georgia2(config-router)#network 172.16.10.14
0.0.0.3 area 1 will ensure that the interface with the IP address
172.16.10.4—7 will operate OSPF it will also be put in area 1.
The command Georgia2(config-router)#area 1 stub will allow
you to make area 1 stub area. The LSA type 4 and 5s are
usually blocked. They are generally not sent into area 1.
Usually, a default route is placed into the stub area. It points to
Georgia1.
The command Georgia2(config-router)#exit will take you back
to the global configuration mode.
The command Georgia2(config)#exit will allow you to get back
to the privileged mode.
The command Georgia2#copy running-config startup-config
will allow you to save your network configuration to NVRAM.
GeorgiaInt Router:
The command Router> enable will allow you to shift to the
privileged mode.
The command Router#configure terminal will allow you to
shift to the global configuration mode.
The command Router(config)#hostname GeorgiaInt will allow
you to set up the name of the router.
The command GeorgiaInt(config)#interface loopback0 will
allow you to enter the mode of loopback interface.
The command GeorgiaInt(config-if)#ip address (enter ip
address here) will allow you to assign the IP address and the
netmask to the network.
The command GeorgiaInt(config-if)#description Router ID will
allow you to set up a description that is locally significant.
The command GeorgiaInt(config-if)#exit will allow you to shift
back to the global configuration mode.
The command GeorgiaInt(config-if)#exit will allow you to
reenter the global configuration mode.
The command GeorgiaInt(config)#router ospf1 will allow you
to kick off OSPF 1.
The command GeorgiaInt(config-router)#network 172.16.0.0
0.0.255.255 area 1 will ensure that the interface that has the IP
address 172.16.y.y will operate OSPF and it will also be put in
area 0.
The command GeorgiaInt(config-router)#area 1 stub will allow
you to make area 1 stub area.
The command GeorgiaInt(config-router)#exit will take you
back to the global configuration mode.
The command GeorgiaInt(config)#exit will allow you to get
back to the privileged mode.
The command GeorgiaInt#copy running-config startup-config
will allow you to save your network configuration to NVRAM.
Loopback Interfaces
The command Georgia(config)#interface loopback0 will allow
you to create a type of virtual interface named Loopback 0. It
then shifts the router to the configuration mode of the interface.
The command Georgia(config-if)#ip address (Ip address) will
allow you to assign an IP address to your interface. The
loopback interfaces are all the time up. They do not go down
unless you shut them down manually. This is why loopback
interfaces are great for usage as OSPF router ID.
Router ID
The command Georgia(config)#router ospf 1 will allow you to
kick off process 1.
The command Georgia(config-router)#router-id 10.1.1.1 will
allow you to set up the router ID and fix it to 10.1.1.1. If you
use the command on the OSPF router process that is active
already, the new router ID will be used at the next reload. It will
also be used for the manual restart of the OSPF process.
The command Georgia(config-router)#no router-id 10.1.1.1
will allow you to remove your static router ID from the process
of configuration. If you use the command on the ODPF router
process that is active already, the old router ID will be used at
the upcoming reload or at the manual restart of the OSPF
process.
If you want to choose the router ID at the point of the initialization of the
OSPF process, the router will use the following criteria in a particular order.
You should use the router ID that is specified in the command
regarding the router-id ip address.
You should use the highest IP address among the active
loopback interfaces that present are on the router.
You should use the highest IP address among the active
nonloopback interfaces that are present on the router.
DR/BDR Elections
The command Georgia(config)#interface fastethernet0/0 will
allow you to enter into the interface's configuration mode.
The command Georgia(config-if)#ip ospf priority 100 will
allow you to change the priority of the ospf interface to 100.
You can set the priority at any figure between 0 and 255. The
priority of 0 will make the router ineligible to create a
designated router (DR). The highest priority will win the
election and become the DR. The one that comes at the second
slot will win the position of BDR. If all the routers on a
network have the same priority, there will be a tie. You can
break up a tie by the highest router ID. The default setting for
the priorities is set at 1.
Passive Interfaces
The command Georgia(config)#router ospf 1 will allow you to
kick off the OSPF process 1.
The command Georgia(config-router)#network 172.16.10.0
0.0.0.255 area 0 will allow you to put the interface with the
address 172.16.10.y into area 0.
The command Georgia(config-router)#passive-interface
fastethernet0/0 will disable the process of sending OSPF
packets on your interface.
The command Georgia(config-router)#passive-interface default
will disable the process of sending OSPF packets on all the
interfaces in the system.
The command Georgia(config-router)#no passive-interface
serial 0/0/1 will enable the process of sending OSPF packets to
interface serial0/0/1. That’s how it allows the neighbor
adjacencies to formulate.
Cost Metrics
The command Georgia(config)#interface will land you in the
mode of configuration of your interface.
The command Georgia(config-if)#bandwidth 256 will let you
change the bandwidth of your network. If you change it, the
OSPF will allow you to recalculate the link cost.
Georgia2:
The command Georgia1(config)#router ospf1 will allow you to
kick off OSPF 1.
The command Georgia1(config-router)#network 172.16.10.0.
0.0.255.255 area 0 will ensure that the interface that has the IP
address 172.16.y.y will operate OSPF and it will also be put in
area 0.
The command Georgia1(config-router)#<CTRL> z will take
you back to the network system's privileged mode.
The command Georgia1#copy running-config startup-config
will allow you to save your network configuration to NVRAM.
Georgia3:
The command Georgia1(config)#router ospf1 will allow you to
kick off OSPF 1.
The command Georgia1(config-router)#network 172.16.40.2
0.0.0.0 area 0 will ensure that the interface that has the IP
address 172.16.40.2 will operate OSPF and it will also be put in
area 0.
The command Georgia1(config-router)#network 172.16.50.1
0.0.0.0 area 0 will ensure that the interface that has the IP
address 172.16.50.1 will operate OSPF and it will also be put in
area 0.
The command Georgia1(config-router)#<CTRL> z will take
you back to the network system's privileged mode.
The command Georgia1#copy running-config startup-config
will allow you to save your network configuration to NVRAM.
Georgia1:
The command Georgia1(config)#router ospf1 will allow you to
initiate the OSPF 1 process.
The command Georgia1(config-router)#network 172.16.0.0
0.0.255.255 area 0 will ensure that the interface with the IP
address 172.16.y.y will operate OSPF and it will also be put in
area 0.
The command Georgia1(config)#<CTRL> z will allow you to
get back to the privileged mode.
The command Georgia1#copy running-config startup-config
will allow you to save your network configuration to NVRAM.
Georgia3:
The command Georgia3(config)#router ospf1 will allow you to
initiate the OSPF 1 process.
The command Georgia3(config-router)#network 172.16.40.2
0.0.0.0 area 0 will ensure that the interface with the IP address
172.16.40.2 will operate OSPF and it will also be put in area 0.
The command Georgia3(config)#<CTRL> z will allow you to
get back to the privileged mode.
The command Georgia3#copy running-config startup-config
will allow you to save your network configuration to NVRAM.
Chapter Seven
This chapter will walk you through the OSPF area types and network types.
You will learn the commands for different areas and networks related to
OSPF.
Not-So-Stubby Areas
The command ABR (config)#router ospf 1 will kick off the
OSPF process 1.
The command ABR (config-router)#network 172.16.10.0
0.0.0.255 area 0 will allow you to confirm that any interface
that possesses the address 172.16.10.y will run OSPF and will
also be placed inside area 0.
The command ABR (config-router)#network 172.16.20.0
0.0.0.255 area 1 will allow you to confirm that any interface
that possesses the address 172.16.20.y will run OSPF and will
also be placed inside area 1.
The command ABR (config-router)#area 1 nssa will allow you
to label area 1 as the no-so-stubby-area.
The command Internal(config)#router ospf 1 will allow you to
initiate the OSPF process 1.
The command Internal(config-router)#network 172.16.20.0
0.0.0.255 area 1 will allow you to confirm that any interface
that possesses the address 172.16.20.y will run OSPF and will
also be placed inside area 1.
The command Internal(config-router)#area 1 nssa will label
area 1 as the not-so-stubby-area.
Totally NSSA
The command ABR (config)#router ospf 1 will kick off the
OSPF process 1.
The command ABR (config-router)#network 172.16.10.0
0.0.0.255 area 0 will allow you to confirm that any interface
that possesses the address 172.16.10.y will run OSPF and will
also be placed inside area 0.
The command ABR (config-router)#network 172.16.20.0
0.0.0.255 area 11 will allow you to confirm that any interface
that possesses the address 172.16.20.y will run OSPF and will
also be placed inside area 11.
The command ABR (config-router)#area 11 nssa no-summary
will allow you to label area 11 as the totally nssa.
The command Internal(config)#router ospf 1 will allow you to
kick off the OSPF process 1.
The command Internal(config-router)#network 172.16.20.0
0.0.0.255 area 11 will allow you to confirm that any interface
that possesses the address 172.16.20.y will run OSPF and will
also be placed inside area 11.
The command Internal(config-router)#area 11 nssa will label
area 11 as NSSA. As all the internal routers in the particular
area are configured with area x nssa command, the ABR router
is configured with area x nssa no-summary command.
Point-to-Multipoint Networks
The command Georgia(config)#interface serial0/0/0 will let
you switch to the mode of interface configuration.
The command Georgia(config-if)#encapsulation frame-relay
will let you enable the frame relay on your interface.
The command Georgia(config-if)#ip address (ip address) will
let you assign a particular IP address as well as a netmask to
your interface.
The command Georgia(config-if)#ip ospf network point-to-
multipoint will let you change the type of the network to point-
to-multipoint network.
The command Georgia(config-if)#exit will take you back to the
mode of global configuration.
The command Georgia(config)#router ospf 1 will let you start
the OSPF process 1.
The command Georgia(config-if)#network 10.1.1.0 0.0.0.255
area 0 will let you confirm that any interface that possesses the
address 10.1.1.y will run OSPF and will also be placed inside
area 0.
The command Georgia(config-if)#neighbor 10.1.1.2 will let
you detect the neighbor router.
The command Georgia(config-if)#exit will take you back to the
mode of global configuration.
The command Georgia(config)#interface serial0/0/0 will let
you switch to the mode of interface configuration.
The command Georgia(config-if)#ip ospf network point-to-
multipoint non-broadcast will let you create and enter a point-
to-multipoint network mode that is non-broadcast as well. The
point-to-multipoint non-broadcast mode is a kind of Cisco
extension to RFC-compliant mode. The neighbors in the
network ought to be manually defined in this specific mode.
The BDRs/DR will not be used in this specific mode. The
point-to-multipoint non-broadcast mode can be used in some
special cases in which neighbors are not supposed to be
discovered automatically.
Point-to-Point Networks
The command Georgia(config)#interface serial0/0/0 will let
you switch to the mode of interface configuration.
The command Georgia(config-if)#encapsulation frame-relay
will let you enable the frame relay on your interface.
The command Georgia(config-if)#no shutdown will let you
enable your interface.
The command Georgia(config)#interface serial0/0/0.300 point-
to-point will let you create a subinterface 300 and make it
onwards a point-to-point network. This is a kind of default
mode.
The command Georgia(config-subif)#ip address (ip address)
will let you assign a particular IP address as well as a netmask
to your interface.
The command Georgia(config-subif)#frame-relay interface-dlci
300 will let you map out and assign the DLCI 300 to your
subinterface.
The command Georgia(config-subif)#interface serial0/0/0.400
point-to-point will let you define and create subinterfaces 400
and make them point-to-point networks.
The command Georgia(config-subif)#ip address (ip address)
will let you assign a particular IP address as well as a netmask
to your interface.
The command Georgia(config-subif)#frame-relay interface-dlci
400 will let you map out and assign DLCI 400 to your
subinterface.
The command Georgia(config-subif)#exit will take you back to
the mode of interface configuration.
The command Georgia(config-if)#exit will take you back to the
mode of global configuration.
Georgia2 Router:
The command Georgia2(config)#interface serial0/0/0 will
allow you to enter the configuration mode.
The command Georgia2(config-if)#encapsulation frame-relay
will allow you to enable the Frame Relay Encapsulation on the
network.
The command Georgia2(config-if)#ip address (enter ip address
here) will allow you to assign a particular IP address and
netmask to the system.
The command Georgia2(config-if)#frame-relay map ip (enter ip
address here) 50 will allow you to map out a remote IP address
to the local DLCI 50.
The command Georgia2(config-if)#frame-relay map ip (enter ip
address here) 150 will allow you to map out a remote IP
address to the local DLCI 150.
The command Georgia2(config-if)#frame-relay map ip (enter ip
address here) 150 will allow you to map out a remote IP
address to the local DLCI 150.
The command Georgia2(config-if)#ip ospf priority 0 will allow
you to change your OSPF interface priority into 0.
The command Georgia2(config-if)#no shutdown will allow you
to enable your interface on the network.
The command Georgia2(config-if)#exit will allow you to shift
back to the global configuration mode.
The command Georgia2(config)#router ospf1 will allow you to
kick off OSPF 1.
The command Georgia2(config-router)#network 172.16.0.0
0.0.255.255 area 0 will ensure that the interface that has the IP
address 172.16.y.y will operate OSPF and it will also be put in
area 0.
The command Georgia2(config-router)#exit will take you back
to the global configuration mode.
The command Georgia2(config)#exit will allow you to get back
to the privileged mode.
The command Georgia2#copy running-config startup-config
will allow you to save your network configuration to NVRAM.
Georgia3 router:
The command Georgia3(config)#interface serial0/0/0 will
allow you to enter the configuration mode.
The command Georgia3(config-if)#encapsulation frame-relay
will allow you to enable the Frame Relay Encapsulation on the
network.
The command Georgia3(config-if)#ip address (enter ip address
here) will allow you to assign a particular IP address and
netmask to the system.
The command Georgia3(config-if)#frame-relay map ip
172.16.2.1 151 will allow you to map out a remote IP address
to the local DLCI 151.
The command Georgia3(config-if)#frame-relay map ip
172.16.2.2 151 will allow you to map out a remote IP address
to the local DLCI 151.
The command Georgia3(config-if)#frame-relay map ip
172.16.2.1 151 will allow you to map out a remote IP address
to the local DLCI 151.
The command Georgia3(config-if)#ip ospf priority 0 will allow
you to change your OSPF interface priority into 0.
The command Georgia3(config-if)#no shutdown will allow you
to enable your interface on the network.
The command Georgia3(config-if)#exit will allow you to shift
back to the global configuration mode.
The command Georgia3(config)#router ospf1 will allow you to
kick off OSPF 1.
The command Georgia3(config-router)#network 172.16.0.0
0.0.255.255 area 0 will ensure that the interface that has the IP
address 172.16.y.y will operate OSPF and it will also be put in
area 0.
The command Georgia3(config-if)#ip ospf priority 0 will allow
you to change your OSPF interface priority into 0.
The command Georgia3(config-router)#exit will take you back
to the global configuration mode.
The command Georgia3(config)#exit will allow you to get back
to the privileged mode.
The command Georgia3#copy running-config startup-config
will allow you to save your network configuration to NVRAM.
Georgia4 router:
The command Georgia4(config)#interface serial0/0/0 will
allow you to enter the configuration mode.
The command Georgia4(config-if)#encapsulation frame-relay
will allow you to enable the Frame Relay Encapsulation on the
network.
The command Georgia4(config-if)#ip address (enter ip address
here) will allow you to assign a particular IP address and
netmask to the system.
The command Georgia4(config-if)#frame-relay map ip
172.16.2.1 152 will allow you to map out a remote IP address
to the local DLCI 152.
The command Georgia4(config-if)#frame-relay map ip
172.16.2.2 152 will allow you to map out a remote IP address
to the local DLCI 152.
The command Georgia4(config-if)#frame-relay map ip
172.16.2.3 152 will allow you to map out a remote IP address
to the local DLCI 152.
The command Georgia4(config-if)#ip ospf priority 0 will allow
you to change your OSPF interface priority into 0.
The command Georgia3(config-if)#no shutdown will allow you
to enable your interface on the network.
The command Georgia4(config-if)#exit will allow you to shift
back to the global configuration mode.
The command Georgia4(config)#router ospf1 will allow you to
kick off OSPF 1.
The command Georgia4(config-router)#network 172.16.0.0
0.0.255.255 area 0 will ensure that the interface that has the IP
address 172.16.y.y will operate OSPF and it will also be put in
area 0.
The command Georgia4(config-router)#exit will take you back
to the global configuration mode.
The command Georgia4(config)#exit will allow you to get back
to the privileged mode.
The command Georgia4#copy running-config startup-config
will allow you to save your network configuration to NVRAM.
Georgia2 router:
The command Georgia2(config)#interface serial0/0/0 will
allow you to enter the configuration mode.
The command Georgia2(config-if)#encapsulation frame-relay
will allow you to enable the Frame Relay Encapsulation on the
network.
The command Georgia2(config-if)#ip address (enter ip address
here) will allow you to assign a particular IP address and
netmask to the system.
The command Georgia2(config-if)#ip ospf network broadcast
will allow you to switch your network’s type from default
nonbroadcast to the broadcast.
The command Georgia1(config-if)#ip ospf priority 0 will allow
you to change your OSPF interface priority into 0 for DR and
BDR election process.
The command Georgia2(config-if)#frame-relay map ip
172.16.2.1 150 will allow you to map out a remote IP address
to the local DLCI 150.
The command Georgia2(config-if)#frame-relay map ip
172.16.2.2 150 will allow you to map out a remote IP address
to the local DLCI 150.
The command Georgia2(config-if)#frame-relay map ip
172.16.2.3 150 will allow you to map out a remote IP address
to the local DLCI 150.
The command Georgia2(config-if)#no shut will enable your
interface on the network.
The command Georgia2(config-if)#exit will allow you to shift
back to the global configuration mode.
The command Georgia2(config)#router ospf1 will allow you to
kick off OSPF 1.
The command Georgia2(config-router)#network 172.16.0.0
0.0.255.255 area 0 will ensure that the interface that has the IP
address 172.16.y.y will operate OSPF and it will also be put in
area 0.
The command Georgia2(config-router)#exit will take you back
to the global configuration mode.
The command Georgia2(config)#exit will allow you to get back
to the privileged mode.
The command Georgia2#copy running-config startup-config
will allow you to save your network configuration to NVRAM.
Georgia3 router:
The command Georgia3(config)#interface serial0/0/0 will
allow you to enter the configuration mode.
The command Georgia3(config-if)#encapsulation frame-relay
will allow you to enable the Frame Relay Encapsulation on the
network.
The command Georgia3(config-if)#ip address (enter ip address
here) will allow you to assign a particular IP address and
netmask to the system.
The command Georgia3(config-if)#ip ospf network broadcast
will allow you to switch your network’s type from default
nonbroadcast to the broadcast.
The command Georgia3(config-if)#ip ospf priority 0 will allow
you to change your OSPF interface priority into 0 for DR and
BDR election process.
The command Georgia3(config-if)#frame-relay map ip
172.16.2.1 151 will allow you to map out a remote IP address
to the local DLCI 151.
The command Georgia3(config-if)#frame-relay map ip
172.16.2.2 151 will allow you to map out a remote IP address
to the local DLCI 151.
The command Georgia3(config-if)#frame-relay map ip
172.16.2.4 151 will allow you to map out a remote IP address
to the local DLCI 151.
The command Georgia3(config-if)#no shut will allow you to
enable your interface on the network.
The command Georgia3(config-if)#exit will allow you to shift
back to the global configuration mode.
The command Georgia3(config)#router ospf1 will allow you to
kick off OSPF 1.
The command Georgia3(config-router)#network 172.16.0.0
0.0.255.255 area 0 will ensure that the interface that has the IP
address 172.16.y.y will operate OSPF and it will also be put in
area 0.
The command Georgia3(config-router)#exit will take you back
to the global configuration mode.
The command Georgia3(config)#exit will allow you to get back
to the privileged mode.
The command Georgia3#copy running-config startup-config
will allow you to save your network configuration to NVRAM.
Georgia4 router:
The command Georgia4(config)#interface serial0/0/0 will
allow you to enter the configuration mode.
The command Georgia4(config-if)#encapsulation frame-relay
will allow you to enable the Frame Relay Encapsulation on the
network.
The command Georgia4(config-if)#ip address (enter ip address
here) will allow you to assign a particular IP address and
netmask to the system.
The command Georgia4(config-if)#ip ospf network broadcast
will allow you to switch your network’s type from default
nonbroadcast to the broadcast.
The command Georgia4(config-if)#ip ospf priority 0 will allow
you to change your OSPF interface priority into 0 for DR and
BDR election process.
The command Georgia4(config-if)#frame-relay map ip
172.16.2.1 152 will allow you to map out a remote IP address
to the local DLCI 152.
The command Georgia4(config-if)#frame-relay map ip
172.16.2.2 152 will allow you to map out a remote IP address
to the local DLCI 152.
The command Georgia4(config-if)#frame-relay map ip
172.16.2.3 152 will allow you to map out a remote IP address
to the local DLCI 152.
The command Georgia4(config-if)#no shut will allow you to
enable your interface on the network.
The command Georgia4(config-if)#exit will allow you to shift
back to the global configuration mode.
The command Georgia4(config)#router ospf1 will allow you to
kick off OSPF 1.
The command Georgia4(config-router)#network 172.16.0.0
0.0.255.255 area 0 will ensure that the interface that has the IP
address 172.16.y.y will operate OSPF and it will also be put in
area 0.
The command Georgia4(config-router)#exit will take you back
to the global configuration mode.
The command Georgia4(config)#exit will allow you to get back
to the privileged mode.
The command Georgia4#copy running-config startup-config
will allow you to save your network configuration to NVRAM.
OSPF and Point-to-Multipoint Networks
Georgia1 router:
The command Georgia1(config)#interface serial0/0/0 will
allow you to enter the interface's configuration mode.
The command Georgia1(config-if)#encapsulation frame-relay
will allow you to enable the Frame Relay Encapsulation on the
network.
The command Georgia1(config-if)#ip address (enter ip address
here) will allow you to assign a particular IP address and
netmask to the system.
The command Georgia1(config-if)#ip ospf network point-to-
multipoint will allow you to switch your network’s type from
default nonbroadcast to point-to-multipoint.
The command Georgia1(config-if)#frame-relay map ip
172.16.2.2 50 will allow you to map out a remote IP address to
the local DLCI 50.
The command Georgia1(config-if)#frame-relay map ip
172.16.2.3 51 will allow you to map out a remote IP address to
the local DLCI 51.
The command Georgia1(config-if)#frame-relay map ip
172.16.2.4 52 will allow you to map out a remote IP address to
the local DLCI 52.
The command Georgia1(config-if)#no shutdown will allow you
to enable your interface on the network.
The command Georgia1(config-if)#exit will allow you to shift
back to the global configuration mode.
The command Georgia1(config)#router ospf1 will allow you to
kick off OSPF 1.
The command Georgia1(config-router)#network 172.16.0.0
0.0.255.255 area 0 will ensure that the interface that has the IP
address 172.16.y.y will operate OSPF and it will also be put in
area 0.
The command Georgia1(config-router)#exit will take you back
to the global configuration mode.
The command Georgia1(config)#exit will allow you to get back
to the privileged mode.
The command Georgia1#copy running-config startup-config
will allow you to save your network configuration to NVRAM.
Georgia2 router:
The command Georgia2(config)#interface serial0/0/0 will
allow you to enter the interface's configuration mode.
The command Georgia2(config-if)#encapsulation frame-relay
will allow you to enable the Frame Relay Encapsulation on the
network.
The command Georgia2(config-if)#ip address (enter ip address
here) will allow you to assign a particular IP address and
netmask to the system.
The command Georgia2(config-if)#ip ospf network point-to-
multipoint will allow you to switch your network’s type from
default nonbroadcast to point-to-multipoint.
The command Georgia2(config-if)#frame-relay map ip
172.16.2.1 150 will allow you to map out a remote IP address
to the local DLCI 150.
The command Georgia2(config-if)#frame-relay map ip
172.16.2.3 150 will allow you to map out a remote IP address
to the local DLCI 150.
The command Georgia2(config-if)#frame-relay map ip
172.16.2.4 150 will allow you to map out a remote IP address
to the local DLCI 150.
The command Georgia2(config-if)#no shutdown will allow you
to enable your interface on the network.
The command Georgia2(config-if)#exit will allow you to shift
back to the global configuration mode.
The command Georgia2(config)#router ospf1 will allow you to
kick off OSPF 1.
The command Georgia2(config-router)#network 172.16.0.0
0.0.255.255 area 0 will ensure that the interface that has the IP
address 172.16.y.y will operate OSPF and it will also be put in
area 0.
The command Georgia2(config-router)#exit will take you back
to the global configuration mode.
The command Georgia2(config)#exit will allow you to get back
to the privileged mode.
The command Georgia2#copy running-config startup-config
will allow you to save your network configuration to NVRAM.
Georgia3 router:
The command Georgia3(config)#interface serial0/0/0 will
allow you to enter the interface's configuration mode.
The command Georgia3(config-if)#encapsulation frame-relay
will allow you to enable the Frame Relay Encapsulation on the
network.
The command Georgia3(config-if)#ip address (enter ip address
here) will allow you to assign a particular IP address and
netmask to the system.
The command Georgia3(config-if)#ip ospf network point-to-
multipoint will allow you to switch your network’s type from
default nonbroadcast to point-to-multipoint.
The command Georgia3(config-if)#frame-relay map ip
172.16.2.1 151 will allow you to map out a remote IP address
to the local DLCI 151.
The command Georgia3(config-if)#frame-relay map ip
172.16.2.2 151 will allow you to map out a remote IP address
to the local DLCI 151.
The command Georgia3(config-if)#frame-relay map ip
172.16.2.4 151 will allow you to map out a remote IP address
to the local DLCI 151.
The command Georgia3(config-if)#no shutdown will allow you
to enable your interface on the network.
The command Georgia3(config-if)#exit will allow you to shift
back to the global configuration mode.
The command Georgia3(config)#router ospf1 will allow you to
kick off OSPF 1.
The command Georgia3(config-router)#network 172.16.0.0
0.0.255.255 area 0 will ensure that the interface that has the IP
address 172.16.y.y will operate OSPF and it will also be put in
area 0.
The command Georgia3(config-router)#exit will take you back
to the global configuration mode.
The command Georgia3(config)#exit will allow you to get back
to the privileged mode.
The command Georgia3#copy running-config startup-config
will allow you to save your network configuration to NVRAM.
Georgia4 router:
The command Georgia4(config)#interface serial0/0/0 will
allow you to enter the interface's configuration mode.
The command Georgia4(config-if)#encapsulation frame-relay
will allow you to enable the Frame Relay Encapsulation on the
network.
The command Georgia4(config-if)#ip address (enter ip address
here) will allow you to assign a particular IP address and
netmask to the system.
The command Georgia4(config-if)#ip ospf network point-to-
multipoint will allow you to switch your network’s type from
default nonbroadcast to point-to-multipoint.
The command Georgia4(config-if)#frame-relay map ip
172.16.2.2 152 will allow you to map out a remote IP address
to the local DLCI 152.
The command Georgia4(config-if)#frame-relay map ip
172.16.2.2 152 will allow you to map out a remote IP address
to the local DLCI 152.
The command Georgia4(config-if)#frame-relay map ip
172.16.2.2 152 will allow you to map out a remote IP address
to the local DLCI 152.
The command Georgia4(config-if)#no shutdown will allow you
to enable your interface on the network.
The command Georgia4(config-if)#exit will allow you to shift
back to the global configuration mode.
The command Georgia4(config)#router ospf1 will allow you to
kick off OSPF 1.
The command Georgia4(config-router)#network 172.16.0.0.
0.0.255.255 area 0 will ensure that the interface that has the IP
address 172.16.y.y will operate OSPF and it will also be put in
area 0.
The command Georgia4(config-router)#exit will take you back
to the global configuration mode.
The command Georgia4(config)#exit will allow you to get back
to the privileged mode.
The command Georgia4#copy running-config startup-config
will allow you to save your network configuration to NVRAM.
OSPF and Point-to-Point Networks By Using Subinterfaces
The following section is packed up with commands to build a four router
network of OSPF and point-to-point networks. There will be commands for
four routers in the following example. You can build and configure the
network by using the following commands.
Georgia1 router:
The command Georgia1(config)#interface serial0/0/0 will
allow you to enter the interface's configuration mode.
The command Georgia1(config-if)#encapsulation frame-relay
will allow you to enable the Frame Relay Encapsulation on the
network.
The command Georgia1(config-if)#no shutdown will allow you
to start your interface.
The command Georgia1(config-if)#interface serial 0/0/0.50
point-to-point will allow you to make a subinterface.
The command Georgia1(config-subif)#description Link to
Georgia2 will allow you to create a locally significant interface
description.
The command Georgia1(config-subif)#ip address (enter ip
address here) will allow you to assign a particular IP address
and netmask to the system.
The command Georgia1(config-subif)#frame-relay interface-
dlci 50 will allow you to assign a DLCI to subinterface.
The command Georgia1(config-subif)#exit will allow you to
shift back to the interface configuration mode.
The command Georgia1(config-if)#interface serial 0/0/0.51
point-to-point will allow you to make a subinterface.
The command Georgia1(config-subif)#description Link to
Georgia3 will allow you to create a locally significant interface
description.
The command Georgia1(config-subif)#ip address (enter ip
address here) will allow you to assign a particular IP address
and netmask to the system.
The command Georgia1(config-subif)#frame-relay interface-
dlci 51 will allow you to assign a DLCI to subinterface.
The command Georgia1(config-subif)#exit will allow you to
shift back to the interface configuration mode.
The command Georgia1(config-if)#interface serial 0/0/0.52
point-to-point will allow you to make a subinterface.
The command Georgia1(config-subif)#description Link to
Georgia4 will allow you to create a locally significant interface
description.
The command Georgia1(config-subif)#ip address (enter ip
address here) will allow you to assign a particular IP address
and netmask to the system.
The command Georgia1(config-subif)#frame-relay interface-
dlci 52 will allow you to assign a DLCI to subinterface.
The command Georgia1(config-subif)#exit will allow you to
shift back to the interface configuration mode.
The command Georgia1(config-if)#exit will allow you to shift
back to the global configuration mode.
The command Georgia1(config)#router ospf1 will allow you to
kick off OSPF 1.
The command Georgia1(config-router)#network 172.16.0.0
0.0.255.255 area 0 will ensure that the interface that has the IP
address 172.16.y.y will operate OSPF and it will also be put in
area 0.
The command Georgia1(config-router)#exit will take you back
to the global configuration mode.
The command Georgia1(config)#exit will allow you to get back
to the privileged mode.
The command Georgia1#copy running-config startup-config
will allow you to save your network configuration to NVRAM.
Georgia 2:
The command Georgia2(config)#interface serial0/0/0 will
allow you to enter the interface's configuration mode.
The command Georgia2(config-if)#encapsulation frame-relay
will allow you to enable the Frame Relay Encapsulation on the
network.
The command Georgia2(config-if)#no shutdown will allow you
to start your interface.
The command Georgia2(config-if)#interface serial 0/0/0.150
point-to-point will allow you to make a subinterface.
The command Georgia2(config-subif)#description Link to
Georgia1 will allow you to create a locally significant interface
description.
The command Georgia2(config-subif)#ip address (enter ip
address here) will allow you to assign a particular IP address
and netmask to the system.
The command Georgia2(config-subif)#frame-relay interface-
dlci 150 will allow you to assign a DLCI to subinterface.
The command Georgia2(config-subif)#exit will allow you to
shift back to the interface configuration mode.
The command Georgia2(config)#exit will allow you to shift
back to the global configuration mode.
The command Georgia2(config)#router ospf1 will allow you to
kick off OSPF 1.
The command Georgia2(config-router)#network 172.16.0.0
0.0.255.255 area 0 will ensure that the interface that has the IP
address 172.16.y.y will operate OSPF and it will also be put in
area 0.
The command Georgia2(config-router)#exit will take you back
to the global configuration mode.
The command Georgia2(config)#exit will allow you to get back
to the privileged mode.
The command Georgia2#copy running-config startup-config
will allow you to save your network configuration to NVRAM.
Georgia3 router:
The command Georgia3(config)#interface serial0/0/0 will
allow you to enter the interface's configuration mode.
The command Georgia3(config-if)#encapsulation frame-relay
will allow you to enable the Frame Relay Encapsulation on the
network.
The command Georgia3(config-if)#no shutdown will allow you
to start your interface.
The command Georgia3(config-if)#interface serial 0/0/0.151
point-to-point will allow you to make a subinterface.
The command Georgia3(config-subif)#ip address (enter ip
address here) will allow you to assign a particular IP address
and netmask to the system.
The command Georgia3(config-subif)#frame-relay interface-
dlci 151 will allow you to assign a DLCI to subinterface.
The command Georgia3(config-subif)#exit will allow you to
shift back to the interface configuration mode.
The command Georgia3(config)#exit will allow you to shift
back to the global configuration mode.
The command Georgia3(config)#router ospf1 will allow you to
kick off OSPF 1.
The command Georgia3(config-router)#network 172.16.0.0
0.0.255.255 area 0 will ensure that the interface that has the IP
address 172.16.y.y will operate OSPF and it will also be put in
area 0.
The command Georgia3(config-router)#exit will take you back
to the global configuration mode.
The command Georgia3(config)#exit will allow you to get back
to the privileged mode.
The command Georgia3#copy running-config startup-config
will allow you to save your network configuration to NVRAM.
Georgia4:
The command Georgia2(config)#interface serial0/0/0 will
allow you to enter the interface's configuration mode.
The command Georgia2(config-if)#encapsulation frame-relay
will allow you to enable the Frame Relay Encapsulation on the
network.
The command Georgia2(config-if)#no shutdown will allow you
to start your interface.
The command Georgia2(config-if)#interface serial 0/0/0.150
point-to-point will allow you to make a subinterface.
The command Georgia2(config-subif)#description Link to
Georgia1 will allow you to create a locally significant interface
description.
The command Georgia2(config-subif)#ip address (enter ip
address here) will allow you to assign a particular IP address
and netmask to the system.
The command Georgia2(config-subif)#frame-relay interface-
dlci 150 will allow you to assign a DLCI to subinterface.
The command Georgia2(config-subif)#exit will allow you to
shift back to the interface configuration mode.
The command Georgia2(config)#exit will allow you to shift
back to the global configuration mode.
The command Georgia2(config)#router ospf1 will allow you to
kick off OSPF 1.
The command Georgia2(config-router)#network 172.16.0.0
0.0.255.255 area 0 will ensure that the interface that has the IP
address 172.16.y.y will operate OSPF and it will also be put in
area 0.
The command Georgia2(config-router)#exit will take you back
to the global configuration mode.
The command Georgia2(config)#exit will allow you to get back
to the privileged mode.
The command Georgia2#copy running-config startup-config
will allow you to save your network configuration to NVRAM.
Georgia2 router:
The command Georgia2(config)#ipv6 unicast-routing will let
you enable the globally spread of IPv6 unicast datagrams across
the router.
The command Georgia2(config)#interface fastethernet0/0 will
let you switch to the mode for interface configuration.
The command Georgia2(config-if)#ipv6 address 2001:db8:0:1:
:2/64 will let you configure the global IPv6 address across the
interface and it also enables the IPv6 processing across the
interface.
The command Georgia2(config-if)#ipv6 ospf 1 area 1 will let
you enable the OSPFv3 process across the interface. It also
places the interface into area 1.
The command Georgia2(config-if)#no shutdown will let you
enable the interface of your network.
The command Georgia2(config-if)#interface loopback0 will let
you shift to the interface configuration mode.
The command Georgia2(config-if)#ipv6 address 2001:db8:0:1:
:1/64 will let you configure the global IPv6 address across the
interface and it also enables the IPv6 processing across the
interface.
The command Georgia2(config-if)#ipv6 ospf 1 area 1 will let
you enable the OSPFv3 process across the interface. It also
places the interface into area 1.
The command Georgia2(config-rtr)#router-id 2.2.2.2 will let
you set up a router ID that is manually configured.
The command Georgia2(config-if)#exit will take you back to
the global configuration mode.
The command Georgia2(config)#exit will allow you to get back
to the privileged mode.
The command Georgia2#copy running-config startup-config
will allow you to save your network configuration to NVRAM.
Georgia1 Router:
The command Georgia1(config)#ipv6 unicast-routing will let
you enable the globally spread of IPv6 unicast datagrams across
the router.
The command Georgia1(config)#interface fastethernet0/0 will
let you switch to the mode for interface configuration.
The command Georgia1(config-if)#ipv6 address 2001:db8:0:1:
:1/64 will let you configure the global IPv6 address across the
interface and it also enables the IPv6 processing across the
interface.
The command Georgia1(config-if)#ipv6 ospf 1 area 1 will let
you enable the OSPFv3 process across the interface. It also
places the interface into area 1.
The command Georgia1(config-if)#no shutdown will let you
enable the interface of your network.
The command Georgia1(config)#interface serial0/0 will let you
switch to the mode for interface configuration.
The command Georgia1(config-if)#ipv6 address 2001:db8:0:1:
:1/64 will let you configure the global IPv6 address across the
interface and it also enables the IPv6 processing across the
interface.
The command Georgia1(config-if)#ipv6 ospf 1 area 0 will let
you enable the OSPFv3 process across the interface. It also
places the interface into area 0.
The command Georgia1(config-if)#clock rate 56000 will let
you set up and assign the clock rate to your interface.
The command Georgia1(config-if)#no shutdown will let you
enable the interface of your network.
The command Georgia1(config-if)#exit will take you back to
the global configuration mode.
The command Georgia2(config)#ipv6 router ospf 1 will allow
you to shift to OSPFv3 configuration mode.
The command Georgia2(config-rtr)#router-id 1.1.1.1 will let
you set up a router ID that is manually configured.
The command Georgia1(config-if)#exit will take you back to
the global configuration mode.
The command Georgia1(config)#exit will allow you to get back
to the privileged mode.
The command Georgia1#copy running-config startup-config
will allow you to save your network configuration to NVRAM.
Georgia4 Router:
The command Georgia4(config)#ipv6 unicast-routing will let
you enable the globally spread of IPv6 unicast datagrams across
the router.
The command Georgia4(config)#interface serial0/0 will let you
switch to the mode for interface configuration.
The command Georgia4(config-if)#ipv6 address 2001:db8:0:1:
:2/64 will let you configure the global IPv6 address across the
interface and it also enables the IPv6 processing across the
interface.
The command Georgia4(config-if)#ipv6 ospf 1 area 0 will let
you enable the OSPFv3 process across the interface. It also
places the interface into area 0.
The command Georgia4(config-if)#no shutdown will let you
enable the interface of your network.
The command Georgia4(config-if)#no shutdown will let you
enable the interface of your network.
The command Georgia4(config-if)#exit will take you back to
the global configuration mode.
The command Georgia4(config)#ipv6 router ospf 1 will allow
you to shift to OSPFv3 configuration mode.
The command Georgia4(config-rtr)#router-id 4.4.4.4 will let
you set up a router ID that is manually configured.
The command Georgia4(config-if)#exit will take you back to
the global configuration mode.
The command Georgia4(config)#exit will allow you to get back
to the privileged mode.
The command Georgia4#copy running-config startup-config
will allow you to save your network configuration to NVRAM.
Troubleshooting OSPF
Chapter Eight
Configuration of Switch
This chapter will walk you through the commands and information that are
related to the configuration of switch. I will shed light on the hostnames,
passwords, duplex and speed settings, interface descriptions and port
security and I will explain each command and its purpose. The first on the
line is the help command.
The command switch>? will allow you to get help about
different aspects of switches. The symbol ? works in the same
manner as it does in a router.
Command Modes
The command switch>enable lets you enter the user mode in
the same way you do in a router.
The command switch# will allow you to enter the privileged
mode in the same way as you do in a router.
The command switch>disable will allow you to leave the
privileged mode in the same way as you do in a router.
The command switch>exit will allow you to leave the user
mode in the same way as you do in a router.
Command Verification
The command switch#show version will allow you to see the
information about the hardware and the software.
The command switch#show interfaces will let you see the
information about the configuration of interfaces and the status
of the lines such as admin down, up/up and up/down.
The command switch#show flash: will allow you to see the
information about the flash memory. This feature is only
available for the 2900/2950 series only.
The command switch#show vlan will allow you to see the
information about the present configuration of VLAN.
The command switch#show mac-address-table will allow you
to see the information about the forwarding table of the present
MAC address.
The command switch#show post will allow you to see the
information about the POST that is switch passed.
The command switch#show controllers ethernet-controller will
allow you to see the information about the Ethernet controller.
The command switch#show start will allow you to see the
information about the present level of configuration in
NVRAM.
The command switch#show running-config will allow you to
see the information about the present configuration style in
NVRAM.
The command switch#show interface vlan1 will allow you to
see the information about the settings of the virtual interfaces
such as VLAN1 and the default interfaces such as VLAN on
the system’s switch.
Resetting Configuration
The following settings are for the 1900 series switches.
The command 1900switch#delete vtp will allow you to remove
the information about VLAN Trunking Protocol.
The command 1900switch#delete nvram will allow you to reset
the switch along the lines of the default settings.
The command 1900switch>en will allow you to get back to the
privileged mode.
The command 1900switch#reload will allow you to restart your
switch.
Setting Hostnames
For 1900 series switches:
The command #config t will allow you to start the process of
setting up the hostnames.
The command (config)#hostname AustinSwitch will allow you
to set up the name of the switch. The method is the same as for
the router. The interface will appear like the following:
AustinSwitch(config)#.
Setting IP Addresses
The command AustinSwitch(config)#ip address (write ip
address here) will allow you to set up the system's IP address
and the mask to enable remote access to switch.
Interface Descriptions
The command AustinSwitch(config-if)#description Finance
VLAN will allow you to set up and add the description for your
interfaces.
Duplex Settings
The command AustinSwitch(config)#int e0/1 will allow you to
use e0/1 on the 2900/2950 series.
The command AustinSwitch(config-if)#duplex full will allow
you to force the full-duplex operation on your network.
The command AustinSwitch(config-if)#duplex half will allow
you to force the half-duplex operation on your network.
The command AustinSwitch(config-if)#duplex auto will allow
you to force the auto-duplex configuration on your network.
Port Security
The command AustinSwitch(config-if)#port secure will allow
you to set up security for the interface you are working in.
The command AustinSwitch(config-if)#port secure max-mac-
count 1 will allow you one MAC address in the table for the
given interface.
Configuration of EtherChannel
The command AustinSwitch#config t will allow you to start the
configuration mode.
The command AustinSwitch(config)#int fa 0/11 will allow you
to start the interface.
The command AustinSwitch(config-if)channel-group y mode
on will allow you to start the mode for channel groups. In the
command, y is the total number of channel groups. It must
watch the other interfaces.
The command AustinSwitch(config)#int fa 0/12 will allow you
to start the interface.
The command AustinSwitch(config-if)channel-group y mode
on will allow you to start the mode for channel groups. In the
command, y is the total number of channel groups. It must
watch the other interfaces.
Verification
The command AustinSwitch#show etherchannel y detail will
allow you to see comprehensive information about the ether
channel.
The command AustinSwitch#show etherchannel y port will
allow you to see comprehensive information about the
EtherChannel port.
The command AustinSwitch#show etherchannel y port-channel
will allow you to see comprehensive information about the port
channel.
The command AustinSwitch#show etherchannel y summary
will allow you to see the one-line summary information about
per channel-groups.
VLAN
This chapter will walk you through the commands and information about
the display of VLAN info, the creation of static VLANs, the assigning of
the ports to the VLANs, and the assigning of the ports by using the range
command.
Displaying VLANs
The command AustinSwitch#show vlan will allow you to see
the information about VLAN.
The command AustinSwitch#show vlan-membership will allow
you to see the information about VLAN ports.
The command AustinSwitch#show vlan 2 will allow you to see
the information about VLAN 2.
Static VLANs
The command AustinSwitch#config t will allow you to start the
configuration mode.
The command AustinSwitch(config)#vlan 2 name John will
allow you to create the VLAN 2 named John.
The command AustinSwitch(config)#vlan 3 name John1 will
allow you to create the VLAN 3 named John1.
Troubleshooting Process
The command AustinSwitch#show vlan will allow you to see
the information about the full VLAN database.
The command AustinSwitch#show vlan brief will allow you to
see the information about the database in a summarized manner.
The command AustinSwitch#show vlan interfaces will allow
you to see the information about the interfaces. This includes
the information about the duplex settings and the speed as well.
The command AustinSwitch#debug sw-vlan packets will allow
you to see the information about the VLAN packets that a
router received but it cannot support it.
VLAN Configuration Process
The command switch>en will allow you to enter the privileged
mode.
The command switch#config t will allow you to enter the mode
of global configuration.
The command switch(config)# hostname AustinSwitch will
allow you to set up the name for the host.
The command AustinSwitch(config)#no ip domain-lookup will
allow you to switch off the DNS entries checking on spelling
mistakes.
The command AustinSwitch(config)#enable secret jasmine will
allow you to set up the secret password to jasmine.
The command AustinSwitch(config)#line con 0 will allow you
to enter the console mode.
The command AustinSwitch(config-line)#logging synchronous
will ensure that the informational lines do not meddle with the
command that you have entered.
The command AustinSwitch(config-line)#password john1 will
allow you to set up the password to john1.
The command AustinSwitch(config-line)#exit will allow you to
get back t the global configuration mode.
The command AustinSwitch(config)#line vty 0 15 will allow
you to enter the 16 vty modes. You will the same commands
being applied to all lines.
The command AustinSwitch(config-line)#login synchronous
will allow you to challenge remote users to enter a password.
The command AustinSwitch(config-line)#password john1 will
allow you to set up the password to john1.
The command AustinSwitch(config-line)#exit will allow you to
get back t the global configuration mode.
The command AustinSwitch(config)#ip default-gateway
192.168.1.1 will allow you to set up the switch's default
gateway.
The command AustinSwitch(config)#int vlan1 will allow you
to enter the virtual interface VLAN1.
The command AustinSwitch(config-if)#ip address 192.168.1.2
255.255.255.0 will allow you to set up your switch's IP address.
The command AustinSwitch(config-if)#no shut will allow you
to switch on the interface you are working in.
The command AustinSwitch(config-if)#exit will allow you to
get back to the global configuration mode.
The command AustinSwitch#vlan database will allow you to
enter into the VLAN database.
The command AustinSwitch(vlan)# 10 name Rose will allow
you to create VLAN 10.
The command AustinSwitch(vlan)# 20 name Rosemary will
allow you to create VLAN 20.
The command AustinSwitch(vlan)# 30 name Jasmine will
allow you to create VLAN 30.
The command AustinSwitch(vlan)#exit will allow you to apply
the information you have entered and exit the system.
The command Austinswitch#config t will allow you to enter the
mode of global configuration.
The command Austinswitch(config)#int fa0/2 will allow you to
switch back to the interface mode.
The command Austinswitch(config-if)#switchport mode access
will allow you to set up the switchport mode to give access.
The command Austinswitch(config-if)#switchport access vlan
10 will allow you to assign the port to VLAN 10.
The command Austinswitch(config)#int fa0/3 will allow you to
switch back to the interface mode.
The command Austinswitch(config-if)#switchport mode access
will allow you to set up the switchport mode to give access.
The command Austinswitch(config-if)#switchport access vlan
10 will allow you to assign the port to VLAN 10.
The command Austinswitch(config)#int fa0/4 will allow you to
switch back to the interface mode.
The command Austinswitch(config-if)#switchport mode access
will allow you to set up the switchport mode to give access.
The command Austinswitch(config-if)#switchport access vlan
10 will allow you to assign the port to VLAN 10.
The command Austinswitch(config)#int fa0/5 will allow you to
switch back to the interface mode.
The command Austinswitch(config-if)#switchport mode access
will allow you to set up the switchport mode to give access.
The command Austinswitch(config-if)#switchport access vlan
20 will allow you to assign the port to VLAN 20.
The command Austinswitch(config)#int fa0/6 will allow you to
switch back to the interface mode.
The command Austinswitch(config-if)#switchport mode access
will allow you to set up the switchport mode to give access.
The command Austinswitch(config-if)#switchport access vlan
20 will allow you to assign the port to VLAN 20.
The command Austinswitch(config)#int fa0/7 will allow you to
switch back to the interface mode.
The command Austinswitch(config-if)#switchport mode access
will allow you to set up the switchport mode to give access.
The command Austinswitch(config-if)#switchport access vlan
20 will allow you to assign the port to VLAN 20.
The command Austinswitch(config)#int fa0/8 will allow you to
switch back to the interface mode.
The command Austinswitch(config-if)#switchport mode access
will allow you to set up the switchport mode to give access.
The command Austinswitch(config-if)#switchport access vlan
10 will allow you to assign the port to VLAN 10.
The command Austinswitch(config)#int fa0/9 will allow you to
switch back to the interface mode.
The command Austinswitch(config-if)#switchport mode access
will allow you to set up the switchport mode to give access.
The command Austinswitch(config-if)#switchport access vlan
30 will allow you to assign the port to VLAN 30.
The command Austinswitch(config)#int fa0/10 will allow you
to switch back to the interface mode.
The command Austinswitch(config-if)#switchport mode access
will allow you to set up the switchport mode to give access.
The command Austinswitch(config-if)#switchport access vlan
30 will allow you to assign the port to VLAN 30.
The command Austinswitch(config)#int fa0/11 will allow you
to switch back to the interface mode.
The command Austinswitch(config-if)#switchport mode access
will allow you to set up the switchport mode to give access.
The command Austinswitch(config-if)#switchport access vlan
30 will allow you to assign the port to VLAN 30.
The command Austinswitch(config)#int fa0/12 will allow you
to switch back to the interface mode.
The command Austinswitch(config-if)#switchport mode access
will allow you to set up the switchport mode to give access.
The command Austinswitch(config-if)#switchport access vlan
30 will allow you to assign the port to VLAN 30.
The command Austinswitch(config)#(enter the following keys
on the keyboard: ctrl + z) will allow you to get back to the
privileged mode.
The command Austinswitch#copy run start will allow you to
save the settings to NVRAM.
VTP Configuration
For 1900 series:
The command Austinswitch1900(config)#vtp client will
allow you to turn the switch to the mode namely VTP
client.
The command Austinswitch1900(config)#vtp server will
allow you to turn the switch to mode namely default VTP
server.
The command Austinswitch1900(config)#vtp transparent
will allow you to turn the switch to the mode namely VTP
transparent.
The command Austinswitch1900(config)#vtp domain
SNAP will allow you to change the domain from the
default to CNAP.
The command Austinswitch1900(config)#vtp password
john will allow you to change the password.
For 2900 series:
The command Austinswitch2900#vlan database will allow
you to initiate the mode namely VLAN database.
The command Austinswitch2900(vlan)#vtp client will
allow you to turn the switch to mode namely client.
The command Austinswitch2900(vlan)#vtp server will
allow you to turn the switch to mode namely server.
The command Austinswitch2900(vlan)#vtp transparent
will allow you to turn the switch to the mode namely VTP
transparent.
The command Austinswitch2900(vlan)#vtp domain
academy will allow you to change the domain to academy.
The command Austinswitch2900(vlan)#vtp password
john1 will allow you to change the password to john1.
The command Austinswitch2900(vlan)#vtp v2-mode will
allow you to turn the switch to the mode namely version 2
or v2.
The command Austinswitch2900(vlan)#vtp pruning will
allow you to turn on VTP pruning.
The command Austinswitch2900(vlan)#vtp transparent
will allow you to turn the switch to the mode namely VTP
transparent.
The command Austinswitch2900(vlan)#exit will allow you
to implement the changes and then exit the mode.
For 2950 series
The command Austinswitch2950#config t will allow you
to enter the global configuration mode.
The command Austinswitch2950(config)#vtp mode client
will allow you to turn the switch to the mode namely VTP
client.
The command Austinswitch2950(config)#vtp server will
allow you to turn the switch to mode namely default VTP
server.
The command Austinswitch2950(config)#vtp mode
transparent will allow you to turn the switch to the mode
namely VTP transparent.
The command Austinswitch2950(config)#vtp domain
academy will allow you to change the domain from the
default to academy.
The command Austinswitch2950(config)#vtp password
john will allow you to change the password to john.
The command Austinswitch2950(config)#vtp v2-mode
will allow you to turn the switch to the mode namely
version 2 or v2.
The command Austinswitch2950(condig)#vtp pruning will
allow you to turn on VTP pruning.
Configuration for 2900 Series
The command switch>en will allow you to enter the
privileged mode.
The command switch>config t will allow you to enter the
configuration mode.
The command switch(config)#hostname AustinSwitch2900
will allow you to set up the host name.
The command AustinSwitch2900(config)#no ip domain-
lookup will allow you to turn off the DNS resolution to
avoid the waiting time to the DNS lookup for the spelling
errors.
The command AustinSwitch2900(config)#line con 0 will
allow you to enter the line mode.
The command AustinSwitch2900(config-line)#logging
synchronous will allow you to append the command line to
a new line. There will be no interruption from the
information items.
The command AustinSwitch2900(config-line)#exec-
timeout 0 0 will allow you to stop the console session from
getting timed out.
The command AustinSwitch2900(config-line)#exit will
allow you to line mode.
The command AustinSwitch2900(config)#enable secret
john will allow you to set up the secret password to the
word john.
The command AustinSwitch2900(config)#exit will allow
you to exit the session.
The command AustinSwitch2900#vlan database will allow
you to enter the database mode.
The command AustinSwitch2900(vlan)#vlan 10 name
Rose will allow you to create a VLAN 10 named Rose.
The command AustinSwitch2900(vlan)#vlan 20 name
Rose1 will allow you to create a VLAN 10 named Rose1.
The command AustinSwitch2900(vlan)#vlan 30 name
Rose2 will allow you to create a VLAN 10 named Rose2.
The command AustinSwitch2900(vlan)#vtp server will
allow you to turn your switch into the VTP server.
The command AustinSwitch2900(vlan)#vtp domain
academy will allow you to assign the domain name
academy to the server.
The command AustinSwitch2900(vlan)#exit will allow you
to exit the VTP server mode after applying all the system's
necessary changes.
The command AustinSwitch2900#config t will allow you
to enter the configuration mode once again.
The command AustinSwitch2900(config)#int vlan1 will
allow you to initiate vlan1.
The command AustinSwitch2900(config-if)#ip add (enter
ip address here) will allow you to enter and add the ip
address to the network.
The command AustinSwitch2900(config-if)#no shutdown
is the next command on the line.
The last command is AustinSwitch2900(config-if)#exit. It
will exit the configuration mode.
The command AustinSwitch2900(config)#ip default-
gateway 192.168.1.1 will allow you to set the ip default-
gateway.
The command AustinSwitch2900(config)#int fa 0/1 will
allow you to initiate the interface.
The command AustinSwitch2900(config-if)#desc Trunk
Link to Corp Router will allow you to link the system to
the CORP router.
The command AustinSwitch2900(config-if)#switchport
mode trunk will allow you to create trunk link.
The command AustinSwitch2900(config-if)#switchport
trunk encapsulation dotiq will allow you to set up the
encapsulation to the DotIQ.
The command AustinSwitch2900(config-if)#int fa 0/2 will
allow you to initiate the interface.
The command AustinSwitch2900(config-if)#switchport
access vlan 10 will allow you to assign VLAN 10 a
separate port.
The command AustinSwitch2900(config-if)#spanning-tree
portfast will allow you to transition the port to the
forwarding state inside the Spanning Tree Protocol (STP).
The command AustinSwitch2900(config-if)#int fa 0/3 will
allow you to initiate the interface.
The command AustinSwitch2900(config-if)#switchport
access vlan 10 will allow you to assign VLAN 10 a
separate port.
The command AustinSwitch2900(config-if)#spanning-tree
portfast will allow you to transition the port to the
forwarding state inside the Spanning Tree Protocol (STP).
The command AustinSwitch2900(config-if)#int fa 0/4 will
allow you to initiate the interface.
The command AustinSwitch2900(config-if)#switchport
access vlan 10 will allow you to assign VLAN 10 a
separate port.
The command AustinSwitch2900(config-if)#spanning-tree
portfast will allow you to transition the port to the
forwarding state inside the Spanning Tree Protocol (STP).
The command AustinSwitch2900(config-if)#int fa 0/5 will
allow you to initiate the interface.
The command AustinSwitch2900(config-if)#switchport
access vlan 20 will allow you to assign VLAN 20 a
separate port.
The command AustinSwitch2900(config-if)#spanning-tree
portfast will allow you to transition the port to the
forwarding state inside the Spanning Tree Protocol (STP).
The command AustinSwitch2900(config-if)#int fa 0/6 will
allow you to initiate the interface.
The command AustinSwitch2900(config-if)#switchport
access vlan 20 will allow you to assign VLAN 20 a
separate port.
The command AustinSwitch2900(config-if)#spanning-tree
portfast will allow you to transition the port to the
forwarding state inside the Spanning Tree Protocol (STP).
The command AustinSwitch2900(config-if)#int fa0/7 will
allow you to initiate the interface.
The command AustinSwitch2900(config-if)#switchport
access vlan 20 will allow you to assign VLAN 20 a
separate port.
The command AustinSwitch2900(config-if)#spanning-tree
portfast will allow you to transition the port to the
forwarding state inside the Spanning Tree Protocol (STP).
The command AustinSwitch2900(config-if)#int fa0/8 will
allow you to initiate the interface.
The command AustinSwitch2900(config-if)#switchport
access vlan 20 will allow you to assign VLAN 20 a
separate port.
The command AustinSwitch2900(config-if)#spanning-tree
portfast will allow you to transition the port to the
forwarding state inside the Spanning Tree Protocol (STP).
The command AustinSwitch2900(config-if)#int fa0/8 will
allow you to initiate the interface.
The command AustinSwitch2900(config-if)#switchport
access vlan 20 will allow you to assign VLAN 20 a
separate port.
The command AustinSwitch2900(config-if)#spanning-tree
portfast will allow you to transition the port to the
forwarding state inside the Spanning Tree Protocol (STP).
The command AustinSwitch2900(config-if)#int fa0/9 will
allow you to initiate the interface.
The command AustinSwitch2900(config-if)#switchport
access vlan 20 will allow you to assign VLAN 20 a
separate port.
The command AustinSwitch2900(config-if)#spanning-tree
portfast will allow you to transition the port to the
forwarding state inside the Spanning Tree Protocol (STP).
The command AustinSwitch2900(config-if)#int fa0/10 will
allow you to initiate the interface.
The command AustinSwitch2900(config-if)#switchport
access vlan 30 will allow you to assign VLAN 30 a
separate port.
The command AustinSwitch2900(config-if)#spanning-tree
portfast will allow you to transition the port to the
forwarding state inside the Spanning Tree Protocol (STP).
The command AustinSwitch2900(config-if)#int fa0/11 will
allow you to initiate the interface.
The command AustinSwitch2900(config-if)#switchport
access vlan 30 will allow you to assign VLAN 30 a
separate port.
The command AustinSwitch2900(config-if)#spanning-tree
portfast will allow you to transition the port to the
forwarding state inside the Spanning Tree Protocol (STP).
The command AustinSwitch2900(config-if)#int fa0/12 will
allow you to initiate the interface.
The command AustinSwitch2900(config-if)#switchport
access vlan 30 will allow you to assign VLAN 30 a
separate port.
The command AustinSwitch2900(config-if)#spanning-tree
portfast will allow you to transition the port to the
forwarding state inside the Spanning Tree Protocol (STP).
Now enter the following command
AustinSwitch2900(config-if)# (enter Ctrl + Z on the
keyboard).
The command AustinSwitch2900#copy run start will allow
you to save the configuration of the system to NVRAM.
Configuration for 2950 Series
The command switch>en will allow you to enter the
privileged mode.
The command switch>config t will allow you to enter
the configuration mode.
The command switch(config)#hostname
AustinSwitch2950 will allow you to set up the host
name.
The command AustinSwitch2950(config)#no ip
domain-lookup will allow you to turn off the DNS
resolution to avoid the waiting time to the DNS lookup
for the spelling errors.
The command AustinSwitch2950(config)#line con 0
will allow you to enter the line mode.
The command AustinSwitch2950(config-line)#logging
synchronous will allow you to append the command
line to a new line. There will be no interruption from
the information items.
The command AustinSwitch2950(config-line)#exec-
timeout 0 0 will allow you to stop the console session
from getting timed out.
The command AustinSwitch2950(config-line)#exit
will allow you to line mode.
The command AustinSwitch2950(config)#enable
secret john will allow you to set up the secret
password to the word john.
The command AustinSwitch2950(config)#vlan 10 will
allow you to create a VLAN 10.
The command AustinSwitch2950(config-vlan)#name
Rose will allow you to name the vlan Rose.
The command AustinSwitch2950(config-vlan)#vlan
20 will allow you to create a VLAN 20.
The command AustinSwitch2950(config-vlan)#name
Rose1 will allow you to name the vlan Rose1.
The command AustinSwitch2950(config-vlan)#vlan
30 will allow you to create a VLAN 30.
The command AustinSwitch2950(config-vlan)#vlan
30 name Rose2 will allow you to name the vlan
Rose2.
The command AustinSwitch2950(config-vlan)#exit
will allow you to vlan mode.
The command AustinSwitch2950(config)#vtp server
will allow you to convert your switch into the VTP
server.
The command AustinSwitch2950(config)#vtp domain
academy will allow you to assign the domain name
academy to the server.
The command AustinSwitch2950(config)#int vlan1
will allow you to initiate vlan1.
The command AustinSwitch2950(config-if)#ip add
(enter ip address here) will allow you to enter and add
the ip address to the network.
The command AustinSwitch2950(config-if)#no
shutdown is the next command on the line.
The last command is AustinSwitch2900(config-
if)#exit. It will exit the configuration mode.
The command AustinSwitch2950(config)#ip default-
gateway 192.168.1.1 will allow you to set the ip
default-gateway.
The command AustinSwitch2950(config)#int fa 0/1
will allow you to initiate the interface.
The command AustinSwitch2950(config-if)#desc
Trunk Link to Corp Router will allow you to link the
system to the CORP router.
The command AustinSwitch2950(config-
if)#switchport mode trunk will allow you to create
trunk link.
The command AustinSwitch2950(config-if)#int range
fa 0/2 - 4 will allow you to initiate the interface.
The command AustinSwitch2950(config-if-
range)#switchport access vlan 10 will allow you to
assign VLAN 10 a separate port.
The command AustinSwitch2950(config-if-
range)#spanning-tree portfast will allow you to
transition the port to the forwarding state inside the
Spanning Tree Protocol (STP).
The command AustinSwitch2950(config-if-range)#int
range fa 0/5 - 6 will allow you to initiate the interface.
The command AustinSwitch2950(config-if-
range)#switchport access vlan 20 will allow you to
assign VLAN 20 a separate port.
The command AustinSwitch2950(config-if-
range)#spanning-tree portfast will allow you to
transition the port to the forwarding state inside the
Spanning Tree Protocol (STP).
The command AustinSwitch2950(config-if-range)#int
range fa 0/9 - 12 will allow you to initiate the
interface.
The command AustinSwitch2950(config-if-
range)#switchport access vlan 10 will allow you to
assign VLAN 10 a separate port.
The command AustinSwitch2950(config-if-
range)#spanning-tree portfast will allow you to
transition the port to the forwarding state inside the
Spanning Tree Protocol (STP).
Now enter the following command
AustinSwitch2900(config-if)# (enter Ctrl + Z on the
keyboard).
The command AustinSwitch2900#copy run start will
allow you to save the configuration of the system to
NVRAM.
Conclusion
Now that you have made it to the end of the book, I hope you are better
prepared for your next exam. The book has equipped you with the
technicalities of the subject. I recommend that you give it a second read to
clear the concepts in a better way. I also recommend that you keep the
books as a pocketbook to use it on the go. You can also use it to note down
references whenever you are stuck on a command. The next step is to
practice what you have learned. Memorizing the commands is not easy. It
takes determination, sweat and the will to read them again and again, and
memorize the commands.
I hope you have found the book highly useful and effective for your
learning program. I do not claim that you will learn everything in the first
go. Instead, I encourage you to read it at least twice to have a clear picture
of all the commands that I have given in the book. I hope that with
commitment, you will be able to understand the subject in a better way.
References
Empson, S. (2006). CCNA Self-Study CCNA Portable Command Guide.
https://www.pdfdrive.com/ccna-self-study-ccna-portable-command-guide-shinra-inc-main-
page-d3667445.html
Empson, S., Gargano, P., & Roth, H. (2015). CCNP Routing and Switching Portable Command
Guide. https://www.pdfdrive.com/ccnp-routing-and-switching-portable-command-guide-
d56814104.html
OSPF part I. (n.d.). CCNA Blog | Tips and Tutorials. https://www.ccnablog.com/ospf-part-1/
Cisco certified network associate (CCNA). (2020, November 4). Welcome to Computer Institute,
The technology training School. https://www.trainus.com/ccna.asp
Cisco CCNA training certification course in Lahore Pakistan - CCNA training course in Lahore.
(n.d.). Student Shelter In Computers. https://www.stscomps.com/cisco.htm