You are on page 1of 19

Amit Kumar 100101027 CSEA

The main objective is to take care of business continuity because now a days most of the organizations dont want obstacle for even a single moment in business continuity like banks ,BPOs because 80% works are done online . So to avoid discontinuity we work on redundancy and backups on servers ,connectivity ,routers.

Transferring of data between the devices is known as networking. A Network is a group of two or more computer systems linked together .

1. User EXEC mode: By default the first mode we enter when log in into a CISCO device is user EXEC mode. No configuration can be changed or viewed from User mode. Only basic status information can be viewed from this mode. User mode appends a > after the device hostname like: Router>

2. Privileged mode: This mode allows all configuration files, settings and status information to be viewed. Privileged mode appends # after the device hostname like:

Router#
To enter into Privileged mode from User EXEC mode, type: Router>enable Router#

3. Global Configuration mode: Very few numbers of changed are allowed in Privileged mode. Actual configuration of CISCO device is done by Global Configuration mode. Router(config)#

To avoid collision domain VLAN concept comes. VLAN separates a Layer 2 switch into multiple broadcast domains. Each VLAN has its own individual broadcast domain. Only ports assigning to the same VLAN can be communicate freely through a switch, but ports assign to the different VLAN requires a router to communicate.

To configure a switch as a server and others as clients VTP is used. All the information present in server switch is shared for client switch.

There are 3 modes in VTP, like: Server Mode We can configure VLANs, edit VLANs, manage VLANs and delete them also. This is the default mode of the switch. Client Mode We cannot delete or add or edit VLANs here. Transparent Mode This mode is used for monitoring purpose. It is not visible to either server or client. We can create or delete or edit VLANs here.

When a loop is introduced into the network, a highly destructive broadcast storm develops and choked off all other traffic. To prevent loops Spanning Tree Protocol (STP) was developed.


1.
2. 3.

Spanning Tree Process:


Electing a STP Root Bridge Identifying Root Ports Identifying Designated Ports

Root bridge
The root bridge is the bridge with the best bridge ID. Which switch contains the minimum priority or minimum MAC address, that switch become the KING of the network. All other decisions in the networksuch as which port is to be blocked and which port is to be put in forwarding modeare made from the perspective of this root bridge.

There are two types of routing:


Static

Routing Dynamic Routing

A static routing table is created, maintained and updated by a network administrator, manually. A static route to every network must be configured on every router for full connectivity.

A dynamic routing table is created, maintained and updated by a routing protocol running on the router like: RIP (Routing Information Protocol) EIGRP (Enhanced Interior Gateway Routing Protocol) OSPF (Open Shortest Path First)

Access Control List can be used for two purposes on Cisco Routers, to filter traffic and to identify traffic.

Access lists are a set of rules, organized in a rule table. Each rule or line in an access-list provides a condition, either permit or deny.

NAT is used to translate between private addresses and public addresses. PAT bound the ip of clients with a unique port number of a single global address.

A Virtual Private Network (VPN) is a network technology that creates a secure network connection over a public network such as the internet or a private network owned by a service provider. This logical path through which the encapsulated packets travel through the inter-network is called a tunnel.

You might also like