Upload
tithleang
View
215
Download
0
Embed Size (px)
Citation preview
8/7/2019 slide for sharing
1/65
Exploring the FunctionsExploring the Functions of Networkingof Networking
What Is a Network?
ICND1 volume 1
8/7/2019 slide for sharing
2/65
Common Physical Components of a NetworkCommon Physical Components of a Network
8/7/2019 slide for sharing
3/65
Interpreting a Network DiagramInterpreting a Network Diagram
8/7/2019 slide for sharing
4/65
ResourceResource--Sharing FunctionsSharing Functions andand BenefitsBenefits
Data and applications
Resources
Network storage
Backup devices
8/7/2019 slide for sharing
5/65
Impact of User Applications on the NetworkImpact of User Applications on the Network
Impact of User Applications on the
Network
Batch applications
FTP, TFTP, inventory updates No direct human interaction
Bandwidth important, but not critical
Interactive applications
Inventory inquiries, database updates.
Human-to-machine interaction.
Because a human is waiting for a
response, response time is important
but not critical, unless the wait
becomes excessive.
Real-time applications
VoIP, video
Human-to-human interaction
End-to-end latency critical
Impact of User Applications on the Network
8/7/2019 slide for sharing
6/65
Understanding theUnderstanding the HostHost--toto--HostHostCommunicationsCommunications ModelModel
Older model
Proprietary
Application and combinations software
controlled by one
vendor Standards-based model
Multivendor software
Layered approach
Understanding Host-to-Host Communications
8/7/2019 slide for sharing
7/65
The OSI Reference ModelThe OSI Reference Model
Reduces complexity
Standardizes interfaces Facilitates modular engineering
Ensures interoperable Technology
Accelerates evolution
Simplifies teaching and learning
Why a Layered Network Model?
8/7/2019 slide for sharing
8/65
Layer 1:The Physical LayerLayer 1:The Physical LayerThe Seven Layers of the OSI Model
8/7/2019 slide for sharing
9/65
Layer 2:The Data Link LayerLayer 2:The Data Link Layer
8/7/2019 slide for sharing
10/65
Layer 3:The Network LayerLayer 3:The Network Layer
8/7/2019 slide for sharing
11/65
Layer 4:TheTransport LayerLayer 4:TheTransport Layer
8/7/2019 slide for sharing
12/65
Layer 5:The Session LayerLayer 5:The Session Layer
8/7/2019 slide for sharing
13/65
Layer 6:The Presentation LayerLayer 6:The Presentation LayerThe Seven Layers of the OSI Model (Cont.)
8/7/2019 slide for sharing
14/65
Layer 7:The Application LayerLayer 7:The Application Layer
The Seven Layers of the OSI Model (Cont.)
8/7/2019 slide for sharing
15/65
Encapsulation and DeEncapsulation and De--EncapsulationEncapsulation
Data Encapsulation
8/7/2019 slide for sharing
16/65
Encapsulation and DeEncapsulation and De--EncapsulationEncapsulation
Data De-Encapsulation
8/7/2019 slide for sharing
17/65
PeerPeer--toto--Peer CommunicationPeer Communication
Peer-to-Peer Communication
8/7/2019 slide for sharing
18/65
TCP/IP SuiteTCP/IP Suite
Defines four layers
Uses different names for Layers 1 through 3
Combines Layers 5 through 7 into single
application layer
TCP/IP Stack
8/7/2019 slide for sharing
19/65
TCP/IP Stack vs. the OSI ModelTCP/IP Stack vs. the OSI Model
8/7/2019 slide for sharing
20/65
Understanding the TCP/IPUnderstanding the TCP/IP
Internet LayerInternet LayerIP Address Format: Dotted Decimal Notation
The binary-to-decimal and decimal-to binary conversion will be
detailed later in this course.
8/7/2019 slide for sharing
21/65
IP Address Classes:The FirstIP Address Classes:The First
OctetOctet
8/7/2019 slide for sharing
22/65
IP Address RangesIP Address Ranges
*127 (01111111) is a Class A address reserved for loopback testing
and cannot be assigned to a network.
IP Address Ranges
8/7/2019 slide for sharing
23/65
Dynamic Host ConfigurationDynamic Host ConfigurationProtocol (DHCP)Protocol (DHCP)
DHCP
8/7/2019 slide for sharing
24/65
Understanding EthernetUnderstanding Ethernet
Local Area Network
8/7/2019 slide for sharing
25/65
Ethernet Frame AddressingEthernet Frame Addressing
Communicating Within the LAN
8/7/2019 slide for sharing
26/65
Ethernet LAN SegmentsEthernet LAN Segments
Signals degrade with transmission distance.
Each Ethernet type has a maximum segment length
LAN Segment Limitations
8/7/2019 slide for sharing
27/65
Extending a LAN SegmentExtending a LAN Segment
Shares bandwidth
Extends cable distances
Repeats or amplifies signal
Extending LAN Segments
8/7/2019 slide for sharing
28/65
CollisionsCollisions
8/7/2019 slide for sharing
29/65
Multiple Collision DomainsMultiple Collision Domains
Multiple Collision Domains
8/7/2019 slide for sharing
30/65
Typical Causes of Network CongestionTypical Causes of Network Congestion
Network Congestion
8/7/2019 slide for sharing
31/65
BridgesBridgesEarly Solutions to NetworkEarly Solutions to NetworkCongestionCongestion
Bridges
Operate at Layer 2 of the OSI model
Forward, filter, or flood frames
Have few ports
Are slow
8/7/2019 slide for sharing
32/65
Switches vs. BridgesSwitches vs. Bridges
8/7/2019 slide for sharing
33/65
How Switches Segment the EthernetHow Switches Segment the Ethernet
NetworkNetwork
Switches Supersede Bridges
Operate at Layer 2 of the OSI model
Forward, filter, or flood frames
Have many ports
Are fast
8/7/2019 slide for sharing
34/65
Switching in ActionSwitching in Action
8/7/2019 slide for sharing
35/65
LANs Using SwitchedTechnologyLANs Using SwitchedTechnology
Users grouped by physical location
More switches added to networks
Switches connected by high-speed links
LANsToday
8/7/2019 slide for sharing
36/65
VLAN OverviewVLAN Overview
Segmentation
Flexibility
Security
VLAN Overview
VLAN = Broadcast Domain = Logical Network (Subnet)
8/7/2019 slide for sharing
37/65
Cisco IOS Software Features andCisco IOS Software Features and
FunctionsFunctions
Cisco IOS Software
Features to carry the chosen network protocols and functions Connectivity for high-speed traffic between devices
Security to control access and prohibit unauthorized network use
Scalability to add interfaces and capability as needed for network Growth
Reliability to ensure dependable access to networked resources
8/7/2019 slide for sharing
38/65
Cisco IOS Software FeaturesCisco IOS Software Features
and Functionsand Functions
An Overview of Cisco Device Startup
8/7/2019 slide for sharing
39/65
External Configuration SourcesExternal Configuration Sources
Configurations can come from many sources.
Configurations will act in device memory.
- Personal computer (PC) or equivalent with communications softwareconfigured with the following settings:
Speed: 9600 b/s
Data bits: 8
Parity: None
Stop bit: 1
Flow control: None
8/7/2019 slide for sharing
40/65
Cisco IOS CommandCisco IOS Command--Line InterfaceLine InterfaceFunctionsFunctions
CLI is used to enter commands.
Operations vary on different
internetworking devices. Users type or paste entries in the console
command modes.
Command modes have distinctive
prompts.
Enter key instructs device to parse and
execute the command.Two primary EXEC modes are user mode
and privileged mode.
Cisco IOS User Interface Functions
8/7/2019 slide for sharing
41/65
Entering the EXEC ModesEntering the EXEC Modes
There are two main EXEC modes for entering commands.
Cisco IOS Software EXEC Mode (User)
8/7/2019 slide for sharing
42/65
Entering the Privilege ModesEntering the Privilege Modes
Cisco IOS Software EXEC Mode
(Privileged)
8/7/2019 slide for sharing
43/65
Keyboard Help in the CLIKeyboard Help in the CLI
Switch Command-Line Help Facilities
8/7/2019 slide for sharing
44/65
ContextContext--Sensitive HelpSensitive Help
8/7/2019 slide for sharing
45/65
ContextContext--Sensitive Help (Cont.)Sensitive Help (Cont.)
8/7/2019 slide for sharing
46/65
Enhanced Editing CommandsEnhanced Editing Commands
8/7/2019 slide for sharing
47/65
Viewing the ConfigurationViewing the Configuration
8/7/2019 slide for sharing
48/65
show runningshow running--configconfig and showand show
startupconfigstartupconfig CommandsCommands
Displays the current and saved configuration
8/7/2019 slide for sharing
49/65
Logging In to the SwitchLogging In to the Switch
Logging In to the Switch and Entering the Privileged EXECMode
8/7/2019 slide for sharing
50/65
Configuring a Switch from theConfiguring a Switch from the
Command LineCommand Line
Configuration modes: Global configuration mode
SwitchX#configure terminalSwitchX(config)#
Interface configuration mode
SwitchX(config)#interface fa0/1
SwitchX(config-if)#
Configuring the Switch
8/7/2019 slide for sharing
51/65
Configuring Switch IdentificationConfiguring Switch Identification
Sets the local identity for the switch
8/7/2019 slide for sharing
52/65
Configuring the Switch IPConfiguring the Switch IP
AddressAddress
SwitchX(config)#interface vlan 1SwitchX(config-if)#ip address {ip address} {mask}
Example:
SwitchX(config)#interface vlan 1SwitchX(config-if)#ip address 10.5.5.11 255.255.255.0
SwitchX(config-if)#no shutdown
Note: It is necessary to use the no shutdown command to maketheinterface operational.
8/7/2019 slide for sharing
53/65
Configuring the Switch DefaultConfiguring the Switch Default
GatewayGateway
SwitchX(config)#ip default-gateway {ip address}
SwitchX(config)#ip default-gateway 172.20.137.1
Example:
8/7/2019 slide for sharing
54/65
Saving ConfigurationsSaving Configurations
SwitchX
SwitchX copy running-config startup-configDestination filename [startup-config]?
Building configurationSwitchX
Copies the current configuration to NVRAM
8/7/2019 slide for sharing
55/65
Showing the Switch Initial StartupShowing the Switch Initial Startup
StatusStatus
Showing Switch Initial Startup Status
SwitchX#show version
Displays the configuration of the system hardware, software version, names and
sources of configuration files, and boot images
SwitchX#show running-config
SwitchX#show interfaces
Displays the current active configuration file of the switch
Displays statistics for all interfaces configured on the
switch
8/7/2019 slide for sharing
56/65
Switch show version CommandSwitch show version Command
8/7/2019 slide for sharing
57/65
Switch show interfaces CommandSwitch show interfaces Command
8/7/2019 slide for sharing
58/65
MAC AddressTable ManagementMAC AddressTable Management
Catalyst 2960 Series
Managing the MAC AddressTable
8/7/2019 slide for sharing
59/65
Understanding Switch SecurityUnderstanding Switch Security
Configuring a Switch Password
8/7/2019 slide for sharing
60/65
Configuring the Login BannerConfiguring the Login Banner
SwitchX# banner login " Access for authorized users only. Please enter your
username and password. "
Defines and enables a customized banner to be displayed before
the username and password login prompts.
Configuring the Login Banner
8/7/2019 slide for sharing
61/65
Telnet vs. SSH AccessTelnet vs. SSH Access
Telnet
Most common access method
Insecure
SSH-encrypted
8/7/2019 slide for sharing
62/65
Port Security ConfigurationPort Security Configuration
Cisco Catalyst 2960 Series
Configuring Port Security
8/7/2019 slide for sharing
63/65
Verifying Port SecurityVerifying Port Security
on the Catalyst 2960 Serieson the Catalyst 2960 Series
8/7/2019 slide for sharing
64/65
Verifying Port SecurityVerifying Port Security
on the Catalyst 2960 Series (Cont.)on the Catalyst 2960 Series (Cont.)
8/7/2019 slide for sharing
65/65