You are on page 1of 18

CISCO CERTIFIED NETWORK ASSOCIATE 200-301

Wednesday, Nov 18 th 2020


What is ISP?
ISP is a Company that provides individuals and other companies access to the internet and other related
services such as Website Building and virtual Hosting. It is knows as Internet Service Provider.

What is IT Networks.?
A network Between Computers is known as IT Network or a computer network is a telecommunication
network that allows computers to exchange data. The best-known computer network is the Internet.
Types of Networks 1. LAN 2. WAN
The computer network may be located in a room, building, city county or anywhere in the world.

Know the Rules / Protocols: A network Protocol defines rules and conventions for communication
between network Devices. Protocols have five types
1. TCP-(Transmission Control Protocol), 2. IP-(Internet Protocol) 3. HTTP-(Hyper Test Transfer Protocols)
4. FTP-(File Transfer Protocol) 5. HTTPS-(Hyper Text Transfer Protocol Secure)

Hardware Components/Fundamental
1. HUB. 2. Repeater 3. Bridge 4. Router 5. Switches

Ethernet Cables

There are three types of Networking Cables

1. Coaxial Cable
2. Twisted pair Cable
3. Fiber Optics Cable

Coaxial Cable are still used even their use in computer networks has been completely discontinued.
Twisted pair cable is known as Ethernet Cable which has 4 twisted pair of 8 wires. Fiber optic cabling
consists of a center glass core surrounded by several layers of protective materials, It transfer light
rather then Electric Signals
Download Packet Tracer for Windows 10 64 Bits
https://www.computernetworkingnotes.com/ccna-study-guide/download-packet-
tracer-for-windows-and-linux.html
IP Address
IP-Internet Protocol is an address of your network hardware. It helps in connecting to other devices
on your network and all over world.
There is two type of IP Address 1. Private Address 2. Public Address
An internet protocol (IP) address allows computers to send and receive information. An IP address
allows information to be sent and received by the correct parties, which means they can also be used to
track down a user's physical location. Example of IP Address is 0.0.0.0

1
CISCO CERTIFIED NETWORK ASSOCIATE 200-301

MAC Address : Mac Address is Media Access Control is a Unique physical identifier of Network Device,
which is assigned by IANA( Internet Assigned Number Authority ).

Thursday, Nov 19th 2020

How to Check your Public IP Address:


https://whatismyipaddress.com/
Classes of IP Address :
Classes Address Supports
A 1-126 General Purpose
B 128-191 Public USE
C 192-223 LAN/WAN/MAN
D 224-239 Multicast
E 240-254 Future Use, Research or
Development
Loopback 127.0.0.0 e.g. : Virtualization
Address
IP Address are classified in two Natures 1. IPv4 2.IPv6,
IPv4 is of 32 Bits whereas IPv6 are 128 Bits. IPv4 Consist of 2^32 and IPv6 consist of 2^128.

Classification of IP Address: There are two types of IP Address 1. Dynamic IP 2. Statis IP


Dynamic IP: Since IP address keep on changing every time you connect to Internet, the DHCP will
provide you new IP address in a range from 1 to 254. Dynamic IP is configured by DHCP(Dynamic Host
Configuration Protocol.
Statis IP : They Never Change and they are permanent Internet IP Address like www.google.com
Statis IP address are less secure because they are permanent IP Address.

TCP/IP Models-OSI Reference

2
CISCO CERTIFIED NETWORK ASSOCIATE 200-301

Please do not throw Sausage Pizza Away


All People Seem to need Data Processing
TCP/IP Models

TCP/IP Comes in A TIN

PING : used to Check the connectivity of Nodes

Command Prompt
1. Ipconfig : to check the ip address and detailed IP of TCP/IP Protocol Configuration

2. Ping Command
It show the connectivity, delay and performing of System, It work with Command Prompt. E.g Ping -t
192.168.1.1 , Ping www.google.com, ping www.netflix.com ,

3
CISCO CERTIFIED NETWORK ASSOCIATE 200-301

3. ARP Command is used by network professional to match IP address to MAC address.


e.g arp -a , arp -d, arp -s
It works until the TTL reach zero.

4. /? Is used to take the help of any commands in Command Prompt. Eg Ping /?, arp /?

5. Tracert Command is a trace routing tool to find the traffic route of Packet
E.g tracert www.roger.com, tracert www.google.com

6. Nslookup : which is used to find the IP address that corresponds to a host, or the domain name that
corresponds to an IP address. E.g: nslookup www.google.com

TTL : (Time to Live ) TTL refers to the amount of time or hops that a Packet is set to exit inside a network
before being discarded by a router. TTL Default value depends upon Operating System.

4
CISCO CERTIFIED NETWORK ASSOCIATE 200-301

Domain Name System-DNS: it is the phone book of the Internet. It convert name to IP address so that
our machine can understand Binary or Machine Language.
DHCP : Dynamic Host Configuration Protocol is network management protocol which dynamically
assign IP address to your network Device.

Types of Network Cables

Coaxial Cable : This cable is no more in use in Networking.


Ethernet Cable: It is most common type of cable used in wired Networks, which has two kinds. 1. UTP 2.
STP
1. Unshielded Twisted Pair
2. Shield Twisted Pair

Basically, Ethernet is not a cable, It is a Technology which describe how network devices can transmit
data so other devices on the same network in LAN or WAN can recognize, receive and process the

5
CISCO CERTIFIED NETWORK ASSOCIATE 200-301

Information.

Category of Cables

Ethernet Cable

6
CISCO CERTIFIED NETWORK ASSOCIATE 200-301

Maximum Length of Ethernet Cable is 100 Meter.

Console Cable

7
CISCO CERTIFIED NETWORK ASSOCIATE 200-301

RJ 45 Connector

8
CISCO CERTIFIED NETWORK ASSOCIATE 200-301

Keystone Ethernet Jack

Crimping Tool

9
CISCO CERTIFIED NETWORK ASSOCIATE 200-301

Straight Cable and Cross Cable: Ethernet cables can be wired as straight-through or crossover.

10
CISCO CERTIFIED NETWORK ASSOCIATE 200-301

Monday, Nov 23 2020

POE Devices: PoE enables electrical power to be passed through Ethernet cables instead of standard
electrical wiring. Best Example of PoE Devices are VoIP Phones and CCTV Ip Camera.
It is Power over Ethernet PoE.

How Network Devices Works

1. Hub: Hub is Collision Domain, which can connect multiple PCs It’s a Simple Dump Device which works
as Unicast, Broadcast and Multicast but can’t determine flow of Data.

2. Bridge: Bridge Device is almost same as Switch but not intelligent device of Layer 2 and it works under
Data-Link Layer of OSI model.

3. Switch: A Network Switch is a device that operates at the Data Link Layer of OSI model in Layer 2. It
takes packet being send by Devices that are connected to its physical Ports and send them Out again.
They can operate at the Network Later of OSI model in Layer 3 Where Routing occurs.

4. Routers: A router is a device that communicates between the internet and the devices in your Data
Center that connect to Internet, as its device that Routes traffic between the devices and the internet. It
is design to receive, analyze and move incoming packets to another network. There are types of Routers
know as 1. Core Router, 2. Edge Router, 3. Virtual Router. A Routers can be used both as LANs and
WANs
Routers are mainly manufactured by Cisco, Huawei, D-Link, HP, Microteach, Linksys, Netgear etc.

5. Firewall: A firewall is a network security device that monitors incoming and outgoing network traffic
and permits or block data packets based on the set of Security Rules. Its main purpose is to establish a
barrier between your internal network and traffic from external source, Such as Internet in order to
block malicious traffic like virus or hackers. Firewalls can be software or hardware device

Port Security: When Port Security is enabled on Switch, Any Media Access Control-MAC address not
specified for that port is denied access to the switch and to any network to which the switch is
connected. A port number is a 16-bit unsigned integer, thus ranging from 0 to 65535. Registered port
numbers are currently assigned by the Internet Assigned Numbers Authority (IANA). It is first level

11
CISCO CERTIFIED NETWORK ASSOCIATE 200-301

Security in physical

Cisco Router Boot up Sequence


All Cisco devices run on IOS. The knowledge of boot up sequence of a router helps in troubleshooting a
router. Once the router is turned ON helps the router hardware to load the operating system. The
Operating system in case of a router is IOS (Internetwork Operating System). All Cisco devices run on IOS.
The knowledge of boot up sequence helps in troubleshooting a router.

The sequences of events that occur when a router is turned are as follows

1. Power On Self-Test (POST)


2. Loading and executing Bootstrap
3. Finding operating systems
4. Loading operating systems
5. Finding the configurations

12
CISCO CERTIFIED NETWORK ASSOCIATE 200-301

6. Loading the configurations

IOS (Internetwork Operating System)-: Internetwork Operating System (IOS) is an operation and
maintenance system developed by Cisco for its network equipment

Flash: Flash is a nonvolatile memory. Data store in flash is not lost when you turn the router off. You
could assume flash as hard disk of router. Like data stored in hard disk remain safe, same as data stored
in flash remain safe. Router uses flash to store IOS image. During the boot process router load IOS file
from flash to ram.

NVRAM
NVRAM is another permanent memory. Data stored in NVRAM is also remain safe. Router use NVRAM to
store configuration files. NVRAM uses a battery to maintain the data during the power off stage.
RAM
RAM is a temporary memory. Information stored in RAM does not remain in power off stage. Everything
in RAM is erased, when you turn off the router. RAM is the fastest memory among these memories. In a
powered on router, RAM contains all the information required to function the device.
 During the boot process IOS is copied and decompressed in RAM from Flash.
 Same as ISO, running configuration is also copied in RAM from NVRAM.
 RAM stores ARP, CDP neighbor, routing and other tables.
 Interface input and output buffers are also stored in RAM

Configuration Register Values : Configuration register value is a special register that is used to control the
booting process. They are loaded in NVRAM. There are three Registers Values in Cisco.
1. 0x 2100 Rom Monitor Mode by which the Router Boot Manually.
2. 0x 2101 Mini IoS
3. 0x 2102 Default Value
4. 0x 2142 Password Recovery

13
CISCO CERTIFIED NETWORK ASSOCIATE 200-301

You can check current configuration register value with "show version" command from exec mode .
Router(config)#config-register 0x2142
Router(config)#end
Router(config)#reload
Rommon 1 > confreg 0x2102

Basic CONFIGURATION of Routers and Switching:

There are three modes of Router.

1. Basic/User Mode: It is the Initial Startup Mode. A Router Configuration session can be initiated using
terminal emulation program Such as Putty, Kermit, Hyper Terminal or telnet. This is the Primary mode
when you logged in router. IT has a low level Verification.

2. Privilege Mode: is the System administrator mode. In this mode configuration can be read, the
Router can reboot and operating parameter can be changed. This is use for high level verification
purpose.

3. Global Configuration Mode: is used to modify system-Wide Configuration Parameters, Such as


Routing Table and routing Algorithm.

4. Interface Configuration Mode : is used to Modify the ethernet and serial Port configuration.

5. Rommom Mode : It is knows as ROM Monitoring/Troubleshooting and bootstrap program that


initiates the hardware and boors the Cisco IOS XE Software when you Power on or reload a
router/switch. It is use to recover Password, Cisco IOS recovery, etc.

General Commands in Router and Switch :

To exit interface configuration mode type exit. This will return the system to global configuration mode.
To exit global configuration mode type exit. This will return the system to privileged Exec mode.
To exit global configuration mode type disable. This will return the system to user Exec mode.
To exit user/Basic Exec mode type logout. This will end the session.

Let’s Start with the Configuration:

2. Privilege Mode: router #

14
CISCO CERTIFIED NETWORK ASSOCIATE 200-301

3. Global Configuration Mode: router (Config)#


4. Interface Configuration Mode: router (Config-if) #
5.Interface Line Configuration Mode : router (Config-line) #
6.Rommom Mode: roman >

Router Basic Command and Configuration

Enable Privilege Mode


Router > Enable

Global Configuration Mode


Router # configure terminal or conf t

Privilege Mode

Show running-config
show startup-config
Show Clock
clock read-calendar
show flash
show interfaces
show version
show history
wr / copy running config startup-config
Clock Set
Show Ip int Brief

Configure Terminal

Hostname XXXX
Banner motd *xxxxxxxxxxxxxxx*

How to add Password in Router Enable Configuration.

router> enable
router# configure Terminal
router (Config)# line Console 0
router (Config-line)# password XXX
router (Config-line)# login

router (Config-line)# enable secret XXX


router (Config-line)# exit

router # show running-config

router (Config)# service password-encryption This will convert plaintext password to cyphertext.

1. How to Set a Clock in Network Devices


Router# clock set 14:00:00 28 Nov 2020
2.How to change the Clock Time zone
Router (config)# clock timezone gst-5
Router (config)#end

15
CISCO CERTIFIED NETWORK ASSOCIATE 200-301

3. How to Write Banner Tag on Router Startup.


Router (config)# banner motd * Welcome to Router 2900 and it is configure by Asif from Canada *
4. How to configure IP Address
My-Router(config)# interface GigabitEthernet 0/0
My-Router(config-if)# ip address 100.100.100.1 255.255.255.252
My-Router(config-if)# no shutdown
My-Router(config-if)# exit

My-Router(config)# interface GigabitEthernet 0/1


My-Router(config-if)# ip address 192.168.10.1 255.255.255.0
My-Router(config-if)# no shutdown
My-Router(config-if)# exit

Wednesday Nov 25 2020


Subnetting: A subnet is a logical subdivision of an IP network. The Process of dividing a network into two
or more network is called subnetting.
The main purpose of subnetting is to heal relieve network congestion and improve network performance.
Security is another benefit of subnetting.
To Understand we need to know some basic Knowledge such as

1. Subnet Mask
2. IP Prefix
3. Network ID It represent with I
4. Host ID represent with 0
5. Broadcast ID.

You know that IPv4 is 32 Bits address and IPv6 is 128 Bits address.
You know that Computer understand only Binary or machine language which is 0s and 1s.
IP ADDRESS CLASSES
CLASSES RANGES SUBNET MASK
A 0-127 8
B 128-191 16
C 192-223 24
D 224-239 -
E 240-255 -

Special IP address ranges that are used for special purposes are:

 0.0.0.0/8 – addresses used to communicate with the local network, This is the first IP address of
IP addresses. It represents all networks.
 127.0.0.0/8 – loopback addresses
 169.254.0.0/16 – link-local addresses (APIPA)

16
CISCO CERTIFIED NETWORK ASSOCIATE 200-301

IP address has 4 Portions and each portion represents 8 bits. There are 4 portion of IP address
1. Network Part
2. Host part

Network Format with Network & Host Bits as


Class & Format Network Bits (N) Host Bits (H)
A: N.H.H.H 8 24

B: N.N.H.H 16 16

C: N.N.N.H 24 8

Method of Subnetting: There are two method of Subnetting


1. FLSM (Fixed Length Subnet Mask).
2. VLSM/CIDR (Variable Length Subnet Mask/Classless Inter Domain Routing).

1. FLSM (Fixed Length Subnet Mask): FLSM is also known as classful Subnetting. This was an old
technology and there was lot of wastage of Ip’s address but it is easy in configuration and administration.

/8 for class A 255.0.0.0


/16 for class B 255.255.0.0
/24 for class C 255.255.255.0

2. VLSM/CIDR (Variable Length Subnet Mask/Classless Inter Domain Routing): VLSM is also known as
classless Subnetting and have minimum wastes of IP Address and complex in configuration and
administration.

/9 = X.128.0.0
/18= X.X.192.0
/27= X.X.X.224
/30= X.X.X.252

A Single IP address is of 32 Bits and each octet is 8 Bits.


32 Bits 1 2 3 3 4 6 7 8 Total
0 0 0 0 0 0 0 0 0

17
CISCO CERTIFIED NETWORK ASSOCIATE 200-301

Bytes I I I I I I I I 255
Host 128 64 32 16 8 4 2 1 255
In other words, Subnetting is network within a network or logical division of IP address. IPv4 is 32 bits
address that means 2^32 it can provide 4.29 Billion ip address in a Network.
192.168.1.1 = 4.26

Class A Ip Address: 58.21.22.68/8 contain


Class B IP Address: 189.192.254.254/16 contain
Class C IP Address: 238.192.254.1/24 contain

Subnetting Table
Subnet 1 2 4 8 16 32 64 128 256
Host 256 128 64 32 16 8 4 2 1
Subnet Mask /24 /25 /26 /27 /28 /29 /30 /31 /32

Lets Take today an Example of Class C IP address.


203.10.0.0
This ip address is Class C, which means it has 24 bits in Network Port and 8 bits in Host Portion.
203.10.0.0/24
203.10.0.00000000/24
We use here formula 2n-2≥40, Where n =1,2,3,4,5,6,7,8, 9, ……... We have got n= 6
and the 64≥40 which meet the requirement

203.10.0.0000000/24

18

You might also like