Você está na página 1de 23

Networking (CCNA)

What is network ?
Networking is a practice of linking of two or more computing devices such as PCs, printers, faxes etc., with each other .
Network is divided into two parts into two parts network and networking .

Cable/medi a

Categories of Networking

Networking Media

Network Commands
Windows provide several command line tools that can be used for troubleshooting any TCP/IP related issues. Some of them include :Ipconfig Ipconfig/all Ping Arp

Connecting Devices
Hub Multiple ports Used to connect all device on a network . Switch filters and forwards packets between LAN segments.

Bridge

Inspects each message that comes from one side and broadcast it to the other side of the bridge.

Gateway Used to connect networks using different protocols so that information can be passed from one system to the other.
Router
A device that connects two LANs It decides the best path between different networks.

IP address
Through Ip we can connect to another computer. IPv4 addresses consist of four sections . Each section is 8 bits long . It is divided into various classes namely Class A, Class B, Class C, Class D and Class E

MAC Addressing
It is a hardware address that is embedded in the NIC card. Every NIC card has a unique MAC address assigned by IEEE. The MAC address operates at the data link layer of the OSI model. MAC address is a 12 digit hexadecimal number (48 bit address). It is made up of numbers from 0-9 or letter from A-F MAC address can be written in any one of the formats: MM:MM:MM:SS:SS:SS The 12 digit MAC address will be shown as say 00:11:11:EA:8D:F6

We can Provide the IP Address By two Methods

Dynamic IP address (DHCP) They are assigned to the devices that require temporary connectivity to the network . An ip address that change each time you connect to the internet
Static IP address They are semi permanent. A static ip address is where a computer uses the same address every time a user logs on to a network

OSI reference model


It is layered architecture of 7 layers
Each layer defines a set of functions which takes part in data communication

Subnetting
It is a process or a technique to divide large and complex networks into smaller networks. Done to reduce the wastage of IP addresses . The format of subnetted IP address would be <network number , subnet number , host number> Two types of Subnetting Fixed Length Subnet Mask (FLSM) Variable Length Subnet Mask (VLSM)

Routing
Transfer of info from one network to another.

To route a router need to know


- Remote Networks - Neighbor Routers - All Possible routes to remote network - The absolute best route to all remote networks - Maintain and verify the routing information

Types of Routing
1.Static Routing Syntax Router(config)#ip route remote_network mask next_hop

Example
Stub Network
172.16.1.0
SO 172.16.3.1 SO 172.16.3.2 B B

ip route 172.16.1.0 255.255.255.0 172.16.3.2

2.Dynamic Routing Used when protocols are used to find networks and update routing table on routers. will enable a routing protocol on router

Some examples of dynamic protocol are: RIP, IGRP, EIGRP, and OSPF
EIGRP configuration mode

Enhanced Interior Gateway Routing Protocol


Router(config)#router <protocol> [<option>] ex. Router(config)#router eigrp 10

RIP Routing Configuration


Router(config)#router rip Router(config-router)#network network-number*

10.3.5.0

172.16.10.0

router RIP

router RIP

network 172.16.0.0 network 10.0.0.0

network 172.16.0.0 network 192.168.10.0

Security
Why we need Security To prevent the network from different kinds of attacks. Attacks - APPLICATION-LAYER ATTACKS
- AUTOROOTERS - BACKDOORS - DENIAL OF SERVICE (DOS) AND DISTRIBUTED DENIAL OF SERVICE (DDOS)
ATTACKS

To prevent from these attacks we can use different kind of ACCESS LISTS

Standard Access List


Filter by source IP addresses only

Extended Access List


Filter by Source IP, Destination IP, Protocol Field, Port Number

Named Access List


Functionally the same as standard and extended access lists.

Project : Site to Site Routing with implementation of Security


Done on a network simulator i.e Cisco Packet Tracer. It includes configuration of cisco routers and switches of a organization . There are 6 switches , 11 routers and many end devices like servers , ip-phones , wireless routers , computers and labtops Firstly routers were configured IP address were assigned to port on routers DHCP configured on switches . Subnetting done on whole network NAT (network address translation) and Access Control List are used to provide security

Over here we have shown a network which is connected to each other and data can travel from any end device to another end device

Router>en Router#conf t Router(config)#hostname r3 r3(config)#int s0/0/0 r3(config-if)#ip address 30.0.0.1 255.0.0.0 r3(config-if)#clock rate 64000 r3(config-if)#no shut r3(config-if)#exit r3(config)#int s0/0/1 r3(config-if)#ip add r3(config-if)#ip address 40.0.0.1 255.0.0.0 r3(config-if)#clock rate 64000 r3(config-if)#no shut r3(config-if)#exit r3(config-if)#ip dhcp pool 22 r3(dhcp-config)#default-router 50.0.0.1 r3(dhcp-config)#network 50.0.0.0 255.0.0.0 r3(dhcp-config)#exit r3(config)#router eigrp 22 r3(config-router)#net r3(config-router)#network 50.0.0.1 255.0.0.0 r3(config-router)#network 30.0.0.1 255.0.0.0 r3(config-router)#network 40.0.0.1 255.0.0.0 r3(config-router)#exit

Você também pode gostar