You are on page 1of 54

C.C.N.

A
Cisco Certified Network Associate

BY: AYMAN FOUAD SHOKRY


Email: ayman_shokry22@hotmail.com
Subneting

Before we talk about subneting we need know the decimal and Binary and Hexa .

Ex: Dec 200

Bin = 128 64 32 16 8 4 2 1

1 1 0 0 1 0 0 0

We calculate the subs which giving us 200 and write under it 1 for each value and 0 for others.

Hexa : 1-> 9 A-> F

So first we need change it to binary then divide it .

8 4 2 1 / 8 4 2 1

1 1 0 0 / 1 0 0 0

4 / F

Subneting Standards :

128 198 224 240 248 252 254 255


1 2 3 4 5 6 7 8

2^3 =8 2^4=16 2^5=32 2^6=64 2^7=128 2^8 = 256 2^10=1024

Subneting Ex:

192.168.0.0 6 sub 30 host

255.255.255.0

1st we explain that the last subnet “0” equal 8 “ 0’s”

0 0 0 0 0 0 0 0

1 1 1

Sub = 2^3-2 = 3 sub = 224

Host = 2^6 = 64 hosts

1
Ayman Fouad shokry
Ex 2:

192.168.0.0 14sub 14host

255.255.255.0

0 0 0 0 0 0 0 0

1 1 1 1

Sub = 2^4-2 = 14 sub 240

Host = 2^-2 = 14 hosts 240

Ex 3 :

192.168.0.0 2 sub xhosts

0.255.255.0

0 0 0 0 0 0 0 0

1 1

Sub 2^2-2= sub 192

Host 2^6 – 2 = 64

Network ID:

192.168.0.0 6sub 30 hosts

255.255.255.0

N.ID : 32,64,96,128,160,192,224

N.ID First IP Last IP B.C


192.168.0.32 192.168.0.33 192.168.0.62 192.168.0.63
192.168.0.64 192.168.0.65 192.168.0.94 192.168.0.95
192.168.0.96 192.168.0.97 192.168.0.126 192.168.0.127
192.168.0.128 192.168.0.129 192.168.0.158 192.168.0.159
192.168.0.160 192.168.0.161 192.168.0.190 192.168.0.191
192.168.0.192 192.168.0.193 192.168.0.222 192.168.0.223
192.168.0.224 192.168.0.225
Subnet 255.255.255.224

8+ 8 + 8 + 3 =27

Ip: 192.168.0.0/27

2
Ayman Fouad shokry
Notes:

- Every network must have N.ID and B.C and ip add between these.
- Ip address can’t use 0 cause its network id.
- Also can’t use 255 cause its broadcast for all network
192.168.0.0 192.168.0.255
Ip which between 0 -> 255 are multicast, host or ip.

3
Ayman Fouad shokry
Switch and hub
Difference between switch and hub .

HUB SWITCH
Slow Fast
Broadcast Unicast
Has no O.S Has an O.S
Ex : 10.0.0.4 in port 4

Hub doesn’t understand the IP’s


Cause has no O.S M.A.T ARP

Port MAC MAC IP


1 ……….f ……….f 10.0.0.1
2 ……….a ……….a 10.0.0.2
3 ……….d ……….d 10.0.0.3
4 ……….c ……….c 10.0.0.4
5 ……….b ……….b 10.0.0.5

Switch port doesn’t understand IP’s but the MAC’s


and device Doesn’t understand the MAC’s so witch
has the ARP and MAT for identify IP’s with MAC’s
with Ports.

Notes :

- Sort of Communications:
1- broadcast “ one to all “

2- unicast “ one to one”

3- Multicast “ one to many “

- PC ID’s :
1 - Name

2 – Logical address

3 – physical address

4
Ayman Fouad shokry
- What is problems and disadvantages of broadcasting ?

Low security and high traffic .

- Does the broadcast domain is bad ?

No because as long as we increase B.C Domain’s the security also increase and the traffic be less .

- When hub make broadcast is broadcasting for all ports cause it has 1 B.C Domain.
- Collision happened in hub when 2 ports sent in the same time and that cause of Csma/CD is for
detection not for avoidance . and when happened the whole device stopping .
- When collision happened the whole ports get effected by collision .

In switch no way to happened collision like in hub but it may happened specific ports “ per port “

And it happened while port reciving and it sending in the same time and it effect only on the specific
port

- Increase of collision domains in better than 1 C.D in hub.

Notes:

Csma/CD is responsible for collision detection and arranging it .

Csma/CA is responsible for wirless avoidance collision .

5
Ayman Fouad shokry
B.C Domain 2
B.C Collision
Hub 1 1
Switch 1 Per ports
Collision Domain 6
router Per ports Per ports

6
Ayman Fouad shokry
Vlan

- What is vlan ? “ virtual lan “

Responsible to change the 1 B.C domain to many for less traffic and increase the security .

For devices be able to connect must make 2 steps

1 must be in the same vlan.

2 must be in the same subnet.

p.s : always vlan be the same “ default “

- Why we must divide the vlan and not just specific subnet and IP’S?

Because when the vlan be just 1 and any device make broadcast it moves to all vlan and gonna be very
easy to any other device see the data .

But even we sperate the vlan to many vlans they can connect to each other by unicast.

They can connect to each other by unicast .

Sperate vlan is for stop the broadcast to all devices.

7
Ayman Fouad shokry
Basic vlan configuration

1) Create Vlans :
>enable
#Config t
#Vlan 2
#vlan 3

2) Assign port membership :


#int f0/1
#switchport access vlan2
#int f0/3
#switchport access vlan 3
#CTR Z
#Copy run start

8
Ayman Fouad shokry
Basic Config

- How to config Cisco device “ Switch , Router “ ?

1 by console “ plug in the console cable to the console port “.

Start > accessory > communication >hyperterminal .

- Any cisco device has modes :

1 Device > enable “ user “

2 Device # Config T “ enable mode “ show , save , delete

3 Device “ config “ # “ config , terminal > configuration

- Why router is important ?

Because is the only way for connect devices with different subnets to each other .

- Ports of router and its types :


1- Ethernet port “ from router to switch “
2- Serial port “ from router to router “

- Ethernet types :
1- Ethernet E0 = 10
2- Fast Ethernet F0 = 100
3- Giga Ethernet G0 = 1000

Notes : all cisco devices data bits “ 9600”

9
Ayman Fouad shokry
- How to give IP to specific port ?

-
S0/0

S Module / Port

- How to connect different regions to other region ?

First you cant connet from Region A to B without have the right gateway of your connection and be the
same of the router

10
Ayman Fouad shokry
- How can add IP’s for router port ?

After access the router

>enable

#config t

#int f 0/0

#ip add 10.0.0.10 255.0.0.0

#No shut

#int f0/1

#ip add 20.0.0.10 255.0.0.0

#no shut

#CTR Z

#Copy run start

Notes :

Gateway is very important without devices wont have internet connection.

11
Ayman Fouad shokry
Passwords

- Line passwords :

>enable

#config t

#line console 0

#password “ ****”

#login

#line aux 0

#password “ ****”

#login

#line vty 0 4

#password “ ****”

#login

#CTR Z

#copy run start

- Enable password :

>enable

#config t

#enable password “ ****”

Notes :

Must put password after user mode for secure it from any tries to hacking “ enable mode”

Must save after finish for don’t lose configs

12
Ayman Fouad shokry
Vlan VTP

- When more than 1 switches connected to each other

They gonna have 1 B.C domain “ figure 1 “

- When many switches are connected to each other in different floors in building and all have
1B.C domains

- We have 3 different management departments and need connect to each other . “ figure 2 “

First we have to make server switch or core for manage Vlans

T = Trunk : responsible for tag data before pass to other switch “ figure 2 “

13
Ayman Fouad shokry
- Switch configuration :

1 create VTP domain

2 add trunk

3 VTP mode “ server , client , transport “

- When switch in server mode can “ create , delete , modify , sych”


- When switch in client mode can only “ receive , pass data “
- Transporting is vtp for create vlan in client without create in other clients

Can recive all vlans but without share his data with others .

- We make sperate vlans for stop the 1 B.C domain and increase the security but vlans cant never
connect or ping to other

14
Ayman Fouad shokry
Configuration :

(A)>enable

#config t

#vtp domain “ choose name “

#int f 0/1

#Switchport mode trunk

#vtp mode Server

(B)>enable

#config t

#vtp domain “choose name”

#int f 0/1

#swtichport mode trunk

#vtp mode client

(C)>enable

#config t

#vtp domain “choose name “

#int f 0/1

#switchport mode trunk

#vtp mode client

15
Ayman Fouad shokry
(D)>enable

#config t

#vtp domain “choose name “

#int f 0/1

#switchport mode trunk

#vtp mode client

And make your vlans

>enable

#config t

#int f 0/2

#switchport access vlan 2

#int f 0/3

#switchport access vlan 3

#etc….

16
Ayman Fouad shokry
Router Interface

>enable

#config t
Notes:
#int f0/0 We use router for make all vlans can connect to each
other by unicast and not B.C domain.
#no shut

#int f 0/0.1

#ip add 10.0.0.100 255.0.0.0

#encapsulation Isl/1Q2

#int f0/0.2

#ip add 50.0.0.100 255.0.0.0

#encapsulation isl/1Q 5

#int f 0/0.3

#ip add 80.0.0.100 255.0.0.0

#encapsulation isl/1Q 8

F0/12 port which connected with router should be trunk.

17
Ayman Fouad shokry
Port Security
- Ports security with dynamic and static mac :

You can use port security to restrict a port increase traffic by limiting the mac address’s that are allowed
to send traffic into the port when you assigned secure mac mac address’s to secure port , the port
doesn’t forward increase traffic into the port that has source address’s outside the group of defined
address’s.

Ex :

To attach 1 port with 1 mac address’s “ pc only”

>enable

#config t

#int f0/0

#switchport port -security mac – address 1234-5677-abc

#switchport port – security max 1

- Port security with sticky max address “ auto”

Can be learned dynamically port security with sticky mac address retain dynamically learned mac
address during a link down condition.

#int f0/0

#switchport port security mac address sticky

Notes:

To show port security setting must use

#show port – security address

Configuring the maximum number of secured mac address on port

#int f0/0

#switchport port – security maximum “num”

18
Ayman Fouad shokry
Routing

- Routing :
1- Filling the routing table
2- Choose the best way for route
A- Static route
B- Dynamic route

Static route work only for next hub for more must use dynamic

EX: static

#ip route 30.0.0.0 255.0.0.0 20.0.0.2

#ip route 40.0.0.0 255.0.0.0 20.0.0.2

Ex: Dynamic

#ip route 0.0.0.0 0.0.0.0 10.0.0.2

Notes:

For show static and connected ip’s

#show ip route

Difference between static and dynamic:

Static is like blind after gives manual setting and happened changes it will never update itself
automatically

Dynmaic is updating automatically by using the protocols

19
Ayman Fouad shokry
Routing serials
DTE : Data terminal equipment

DCE : Data Communication equipment

DTE DCE
#int s0/0 #int s0/0
#ip add 70.0.0.10 2550.0.0 #ip add 70.0.0.20 2550.0.0
#no shut #no shut
#clock rate 1000000

Notes:

DCE : is responsible port for send rate for the DTE port and if forget or didn’t add clock rate the line
between port and DCE gonna be offline .

When make first serial port DCE the other port be auto DTE

20
Ayman Fouad shokry
Dynamic Routing

Dynamic Routing:

Is always keep routers update with the protocol software in routers

Dynamic Routing protocols:

1- Distance vector 2- Link state 3- Hybrid


RIP OSPF EIGRP
IGRP IS_IS

1-Distance vector features : 2-Link state features : 3-Hybrid features :

A ) exchange full routing table A ) exchange only specific update A ) mix


p.s “increasing traffic “ B ) support immediately updates
B ) periodic update C ) support Vlsm
P.s “ prefer immediately for not D ) support summarization
have to wait time line”
C ) doesn’t support Vlsm
D ) Doesn’t support
summarization

21
Ayman Fouad shokry
Distance vector
RIP IGRP

Routing internet /info protocol Interior gateway routing protocol


Distance vector Distance vector
Update periodic 30 sec Update periodic 90 sec
Max 15 hops Max 255 hops
Public standard “ non vendor “ Cisco only
Admin distance 120 Distance admin 100
Config : Config :

(A)# router rip (A)#router IGRP 11


Config (A)#net 10.0.0.0 #net 10.0.0.0
#net 20.0.0.0 #net 20.0.0.0
Etc B,C,D Etc B,C,D
Metrics : Metrics :
Hops count B.W , Delay , load , mtu , reliability

Notes:

Always IGRP appear first in router config if rip is already installed cause of admin distance is lower

MTU : maximum transfer units

B.W : bandwidth

22
Ayman Fouad shokry
OSPF protocol
Admin distance : 110

Metrics : 10^8/B.W

Public Stand : “ multi vendor “

Update immediately

Notes:

OSPF requires router with strong hardware for can hold the load .

- How does it works ?

Building 3 tables

1- Neighbor table :

It has all neighbor which has ospf protocol .

For knew which has ospf its sending hello messages 224.0.0.5 224.0.0.6

2- Topology table :

Is after get ospf of neighbor its join this table and share them networks .

For collect networks of neighbor must use LSA.

And for choose best route must use spf

3- Routing table:

Why ospf protocol requires strong router ?

1) Cause topology table is heavy running table .


2) Cause when update immediately it must change networks in table and choose best routes again.

23
Ayman Fouad shokry
Configuration :
(A)# router ospf 60
#network 10.0.0.0 0.255.255.255 area 1
#network 192.168.0.0 0 0.0.0.255 area 1

(ABR)#Router ospf 19
#network 172.16.0.0 0.0.255.255 area 0
# router ospf 47
#network 200.0.0.0 0.0.0.255 area 1

24
Ayman Fouad shokry
EIGRP

EGIRP : enhanced interior gateway routing protocol.

Cisco only .
Admin distance :90
Metrics:
B.W , load , reliability , delay , mtu

Config :
(A)#router egirp 11
#net 0.0.0.0 0.0.0.0
#net 0.0..0.0 0.0.0.0
#no auto summary

- How it works ?

The same like ospf

1) Neighbor :

Hello message 224.0.0.10

2) Topology “ database”

Dual choose best 2 path’s > successor route , leasable successor route

3) Routing table :

It take the successor route.

25
Ayman Fouad shokry
Protocols load balance

Standard : all protocols use load balance

- Rip :

4 equals path’s up to 6 path’s

- IGRP , EIGRP :

4 equals or non equals path’s to 6 path’s

For control the load balance and cause it never be equal … and it not near values .

So we must manage and configuration it set the load balance and choose the most close values to each
others.

Variance 2

Number prefer for time need multiply for the range it gonna chosen .

- Ospf :

4 equals path’s up to 6 path’s

Notes :

Admin distance :

Connected =0

Static = 1

EIGRP = 90

IGRP = 100

Ospf = 110

RIP = 120

26
Ayman Fouad shokry
Types of router

1- Internal “which inside some area”


2- DR/BDR “internal “
3- ABR “for which connect area with other “
4- ASBR “ for connect other protocol out of area with ospf inside area “

Router ID :

1- Router id 1.1.1.1
2- Highest loopback interface :

( )#int lo0

#ip add 10.0.0.1 255.0.0.0

#int lo0

#ip add 20.0.0.1 255.0.0.0

3- Highest logical interface :

#int f0/0

#int f0/0.1

#ip add 10.0.0.1 255.0.0.0

#int f0/0.2

#ip add 20.0.0.1 255.0.0.0

4- Highest physically interface :

Take highest ip of S ports of F ports .

27
Ayman Fouad shokry
Area Types

Areas:

We use it for decrease the load on routers and for spend less expenses in buy expenses strong routers
and it can exchange the whole data in the same time , if we have 1 area it doesn’t matter give any
number, but if have many areas must give number but after be sure that middle router has 0 number.

1) point to point 2) NBMA 3) Broadcast

None broadcast DR/BDR

For solve problem of looping and echo updating broadcasting and for not break down the system must
make one router DR with highest priority 0-----255

For stop update sending from all routers and make 1 router manage the area.

28
Ayman Fouad shokry
NAT/PAT
NAT :Network address translation
Virtual ip Real ip
10.----------
192.168.------
PAT: port address translation 180.16.--------
172.32.--------
169.234.------- Any other ip
Apipa 169.254.---
Standard : no pc can get virtual ip to connect internet must real ip Auto private ip
add

Notes :

Corporation need buy real ip’s for can login to internet its very expensive per month so better they use
NAT and buy just 1 IP and NAT transit it from local ip to real ip and it can work up to 64000 without
conflicts corporation can buy more than 1 ip and manage NAT with router for close NAT for specific
users which use real ip.

P.S : real ip is not very good in security cause it make hacker work become very easy .

Network card has 64535 ports in it.

29
Ayman Fouad shokry
Nat ports :

EX: when pc want go yahoo it gonna use pat and nat for change virtual ip to real ip and change port for
don’t happened conflicts.
65535

user yahoo 65025


NAT 10.0.0.1 98.1.1.1

64000 Free
PAT 80 80 ports
1625

1024

3389 RDT
110 Pops
80 http
69 DHCP
53 DNS
15 SMTP
23 telnet
21/20 PiP
17 VPN

30
Ayman Fouad shokry
CDP
CDP: Cisco discovery protocol.

Is for know the next hubs which connected to main device

EX:

(A)#show CPD details

10----2<- S0/1 <-- 13.4 <-- R <-- S0/0 f0/0 --> Sw --> 12.1 --> f0/1

Port device virsion port

For disable the CDP in device :

#no cdp enable “ for port “

#no cdp run “ for global “

We disable it for hide ports and global info’s from others.

31
Ayman Fouad shokry
IP v.4 /6

IPV.4 : 32 bit /Dec binary Bin 0/1

8 . 8 . 8 . 8 = 32 Decimals Dec 0-----9

----.-----.-----.----
XVI Hexa 0---9 A----F
EX : 192.168.1.100

IPV.6 : 128 bit/hexa

EX:

A012:123D:00AF:ABED:123C:3AEI:F280:C88F/112 Hexa description


EX Dec 200
128 64 32 16 8 4 2 1
1 1 0 0 1 0 0 0
8 + 4 2 1 8 4 2 1

Ex:

A012:0000:0000:00CD:123C:0000:F280:C88F/112

A012: : CD:123C:0000:F280:C88F/112

Cant fuse more than 1 time in op

Can when Colum start with 0 don’t mention it and start with letter or number after it direct

Must type 0000 if u had used fuse already before .

32
Ayman Fouad shokry
A.C.L
A.C.L: Access control list.

1) Standard access 1:1-99

(A)#access list 1 permit/deny source net wildcard

#access list 1 deny 200.0.0.5 0.0.0.0

#access list 1 permit 200.0.0.0 0.0.0.255

#int s0/0

#ip access group 1 in

Notes:

In pervious example was deny user 200.0.0.5 from access “A” and all network to access.

Must use configuration of specific commands before common commands.

Ports take only 1 access list in and other out.

If want add other specific command must delete all access list.

(A)#no access list 1

Standard list for control permit / deny on port accessing only but not inside network.

33
Ayman Fouad shokry
2) Extended A.C.L : 100-199
(A) #access list 101 permit / deny protocol source net wildcard distention.

(A)# Access list 101 permit tcp 200.0.0.0 0.0.0.255 eq80

#access list 101 permit tcp 200.0.0.0 0.0.0.255 eq 21

#int s0/0

#ip access group 101 in

Notes:

Has some features and policy of standard.

Extended A.C.L control what user or network or device can do inside the host network by add the “
eq”.

A.C.L must have 1 line permitted or all A.C.L will be harmed.

P.S : firewall auto deny the while network until you give it manual permit to access.

34
Ayman Fouad shokry
Class full/ classless
Network classes

- Class A: 1 ------ 126


10.0.0.1
255.0.0.0

- Class B : 128---191
172.16.0.0
255.255.0.0

- class c : 192 ---- 224

92.168.0.0

255.255.255.0

- Classless: 180.1.1.1 ospf/EIGRP

255.255.255.0

- class full : 10.0.0.1 RIP/ IGRP

255.0.0.0

Class full cant support with its protocols the classless IP’s because it gonna turn classless IP’s to class full.

Classless can support class full normally.

35
Ayman Fouad shokry
High availability protocols
HSRP : Hot Standby routing protocol

Features :

1 cisco

2 doesn’t support load balance

Configuration:

(A)#int f0/0 (B)#int f0/1


#ip add 10----2 255. ------------- #ip add 10-----2 255. -------
#no shut #no shut
#Standby 15 ip 10----10 (1) #standby 15 ip 10-------------10
#standby 15 priority 200 (2) #standby 15 timer 2 3
#standby 15 timer 2 3 (3) #standby 15 prempt
#standby permpt (4) #standby 15 track s0/1 50
#standby 15 track s0/0 150 (5)

Notes:

(1) Make 1 virtual ip to connect 2 lines with internet with the company.
(2) Making priority for lines which has higher value will be active and other standby.
(3) Sending hello message every 2 sec between 2 lines if other didn’t replay 3 sec’s its mean dead
and standby line start be active and take control.
(4) Incase #3 happened control will not back to main line until secondary line be down so we make
this command for keep eye on priority value.
(5) Is keep eye on port outside incase line is down from outside firm it make priority value decrease
to be less than standby line and it take control until back again.
36
Ayman Fouad shokry
- VRRP:

Public standard

No load balance

Config :

(A) #int f0/0


#ip add 10-----1 255------
#no shut
#vrrp 7 ip 10------10
#vrrp 7 prempt 100
#vrrp 7 timer 2

- GLBP:

Public standard

Load balance

Config :

(A) #int f0/0


#ip add 10-----1 255-----
#no shut
#glbp 7 ip 10-----10
#glbp 7 prempt 100
#glbp 7 timer 2 5

37
Ayman Fouad shokry
OSI layers
OSI : open system inter connected .

Application Initiate connection


HTTP,FTP,HTTP’s,TFTP
Presentation Encryption,
decryption
Session Separation

Transportation tcp Connection oriented


udp Connection less
Network Router
Addressing > logical
Data link Switch
Addressing > physical
Physical cable

DoD: TCP/IP “department of defense”

Application
“app, presentation, session”
Transportation
Network
Physical

Encapsulation:

Application Data
Transportation Segment
Network Packet
Physical Frame

Notes:

DoD is the united states department of defense made this system and they combine 3 layer of
Application , presentation and session in 1 layer and named it application and its five stake protocol or
four stake and combine network and data link.

38
Ayman Fouad shokry
- Sigma structure : S.Port D.Port

TCP: Transmission control protocol


Sequencing
Sequencing: for numbrize bits of data
Acknowledge
Acknowledge: for ask other side if data has sent or no
Windowing
Flag: for now begin of data and its end
Flag

Data

S.port D.Port
UDP: user datagram protocol
Data

- Frame Structure :

Pre D. S. type IP TCP Data CRC


emple mac mac

CRC: responsible for error detection

For correction use tcp in layer 4

Notes:

Layer1: HTTP, HTTP’s, FTP, TFTP,Telnet,DNS ,POP3, DHCP

Layer 2: encryption, SSL, ASCLL, WAN, BMP

Layer 3: Separation, SQL, Notions, RBC, PPTP

Layer 4: Connection orien, tcp , udp , connectionless

Layer 5: Ipv.4, Ipv.6, Ip sec

Layer 6: PPP, ATM, wifi , Vlan

Layer 7: Cable, Hub, network card, repeater, and modem

39
Ayman Fouad shokry
Spanning tree protocol “STP”
- Redundant topology :

Problem occur when connection 2 switches with cables.

1- Broadcast storm
2- Mac address table instability
3- Multi frame copies

- Stp how it works :


1 root bridge :

One per topology

All its ports are designed

40
Ayman Fouad shokry
2 non root :

Has one root port

3 Designed port:

One per segment

Forward state
B.W Cost

10 100
4 root port :
100 19
One per non port bridge
1000 4
Forward state
10000 2

Root bridge Root port


election election

Lowest pbdu Lowest cost


Mac+ priority to the R.B

41
Ayman Fouad shokry
Network map

PS:
Switch protocol: token ring but no longer use it

Routed protocol: tcp/ip address

42
Ayman Fouad shokry
WAN
- difference between LAN and WAN :

Every device we have as own personal or to our firm is LAN “switch, router, hub “

But if rented or not own is WAN “Cable, central routers “

- begin / starting WAN :

Notes:

In beginning before Adsl the only way for connect 2 firm to each other was by telephone but problem
was speed very low only 56k and very high cost cause was paying per minute as normal telephone rate,

And also not safe cause if someone called the telephone line the connection get cut.

1) Circuit switching :

Dial up 56k

ISDN 128k “T1 23 E1 30

2) Point to point

43
Ayman Fouad shokry
Notes :

in 2000 start take internet line from main source buy it and rent for people per month by use D Slam
and then it deliver to A slan and use telephone cable for transfer internet as telephone cable have about
1m free for use and then to splitter to be given 2 cables 1 for routers and other for telephone without
effect on connection or telephone line and it reduce the internet cost and it be more fast .

- Point to point :

DSL Leased line


Shared tech Dedicated tech
Shared B.W Dedicated B.w
Shared line Dedicated line

ADSL SDSL
D U D U
1 2 1 1
1 4 2 2
1 6 3 3
1 8 4 4

Notes:

In Adsl company buy internet for example 100mb in 1 Internet Company they get customers for take
speed they get unlimited customers and then divided the speed on them no matter the usage or the
capacity on Dslam.

In Adsl they give you for example 1 mb then they give you 1/8 upload only.

Leased line is get speed stable not care about usage or capacity on Dslam and its more expensive cause
of that also it have special port in dslam and telephone cable be data only not voice .

SDSL is much better than Adsl but still shared tech but is given better uploading speed be the same of
downloading.

Radius is for have all information of users on d slam without be controlled from dslam .

44
Ayman Fouad shokry
DHCP is for give ip address.

Point to point protocols:

1) PPP: 2) HDLC
Point to point protocols High data link connection
Config :
Config : (A)#int s0/1
(A)#int s0/1 #encapsulation HDLC
#encapsulation ppp
Doesn’t support authentication
Support authentication pap chap
#ppp authentication pap
Pap- chap
Chap – pap

Notes:

4- World no longer use HDLC we only use ppp chap – pap.


5- Chap better than pap because it’s stronger in secure password upon it.
6- For connect more than 2 routers to other we can’t use point to point and for not buy a lot of
data link and not get too much high cost we used pocket switching.
7- All wan protocols are layer 2.
8- All protocols which running on cables are layer 2.

45
Ayman Fouad shokry
Pocket switching WAN:

9- Frame relay :

DLci table Invert app

Port Dlci Dlci IP

1 15 15 10---1

2 16 16 10---2

3 17 17 10---3

4 18 18 10---4

5 19 19 10---5

46
Ayman Fouad shokry
1) All in the same subnet :

(A)# int s0/0

#ip add 172.16.0.0 10.0.0.1

#no shut

#encapsulation frame-relay IETF “Cisco only”

#Frame-relay- delci 15 broadcast

2) Not all in the same subnet :

(A)#int s0/0

#encapsulation frame- relay

#int s0/0.1 point to point

#ip add 10.0.0.2 255.0.0.0

#frame-relay interface delci 15

Etc….

Notes :

We use it in case have company in different countries need be connected.

47
Ayman Fouad shokry
Wireless
We using wireless for connect devices which cant use cable and also for don’t use a lot of cables in the
firm.

Ex1:

Company have 3 floors and we want make it have internet connection.

1st we calculate the range of every floor which we want make it covered by internet.

2nd we get 3 access points for cover the internet range.

For keep all floors with connection without get cut while moving from floor to other we need make 1
access point and 2 others be repeater from mode inside access point, and must make sure that every
range of A.P have overlap in ranges. For it repeat the same wave in its range. Figure 1

Must make sure that all ranges have the same SSID and PW.

48
Ayman Fouad shokry
Ex 2:

When we have company of 2 different floors or away from each other in the building,

We need make A.P connect to other by cable for they both continue the same range and internet
connection like in figure 2

Types of antennas:

1. Omni: is arrange wave in circle circuit.


2. Directional: is arrange wave in specific direction on my desire.

3. Yagi: is arrange direction wave more freely not specific area.

49
Ayman Fouad shokry
Wireless Standards:

Wireless type B.W Frequency


802.11 A 54m 5Ghz
802.11 B 11m 2.4Ghz
802.11 g 54m 5Ghz
802.11 N 400/480 m 2.4/5 Ghz
Notes: not al work with others cause difference frequencies, just 802, 11 n cause have both frequency
2.4 and 5GHz. also only which have Dual tech which able to work A and G for example .

Password standards:

Type Encryption Key sort


Wep 1010 Static key Public
Cisco TKIP Dynamic key Cisco only
Wpa “ wifi “ TKIP Dynamic key public
Wpa2 “ PSK” AES Dynamic key

50
Ayman Fouad shokry
Cabling

1 Cross cable:

- Pc to pc “ IP “
- R to R “ IP “
- Sw to Sw “ Mac”
- PC to R “ IP “

It can be used when 2 devices are the same IP or mac.

2 Straight through :

Can be used with any 2 devices pc to sw or to router.

3 Roll over :

Notes:

Rj Types: 45 net 8bin

11 tel 4 bin

51
Ayman Fouad shokry
Cisco Devices Hardware

- RAM:

Is not for speed up the device is just for carry folders or configurations or program from HDD while we
using it and until we save our work it back again to HDD and if we lost power for the device we will lose
all data which are carrying upon ram, that why when we re upgrade the mount of rams device be more
fast cause there more mount of ram for carry.

- NVRAM:

In cisco device is the HDD.

- ROM:

Chiptec has BIOS inside it and mini operating system for it start when power start and check device and
then awake the main operating system for starts and it calls the firmware, and it has boot strap code
0x2102.

- Flash:

It have the main operating system.

Power on:

1- P.O.S.T “ Power on Self-Test “


2- Load boot startup code.
3- Find and load operating system.
4- Find and load configuration.

How to enter cisco device has password?

Edit in the 2nd option “load boot strap code”

Change it to 0x2142 load main operating system without loading configuration.

Backup:

1- Install TFTP
2- #copy flash TFTP HTTP :// 10.0.0.1
3- #copy NVRAM TFTP HTTP :// 10.0.0.1
4- #copy TFTP flash

52
Ayman Fouad shokry
That’s the end of CCNA course .

Best wishes for all

Ayman Shokry.

53
Ayman Fouad shokry

You might also like