final ccna notes

64
CCNA (Cisco Certified Network Associate) Syllabus 1) Introduction 2) OSI (Open System Interconnection) Reference Model 3) Network Devices Types of Communication Cards LAN & WAN Concept 4) IP Addressing & Concepts IPv4 IPv6 Subneting Superneting Variable Length Subnet Scheme (VLSM) And Operation 5) C.D.P 6) IOS Boot up Sequence IOS Upgrading Dual (Booting) 7) IP Routing Static Route RIP (Routing Information Protocol) IGRP (Internet Gateway Routing Protocol) EIGRP (Enhance Internet Gateway Routing Protocol) OSPF (Open Shortest Path First) 8) Switching VLAN (Virtual Local Area Network) STP (Spanning Tree Protocol)

Upload: athimoolam

Post on 08-Apr-2015

899 views

Category:

Documents


28 download

TRANSCRIPT

Page 1: Final CCNA Notes

CCNA (Cisco Certified Network Associate) Syllabus

1) Introduction

2) OSI (Open System Interconnection) Reference Model

3) Network Devices

Types of Communication Cards LAN & WAN Concept

4) IP Addressing & Concepts

IPv4 IPv6 Subneting Superneting Variable Length Subnet Scheme (VLSM) And Operation

5) C.D.P

6) IOS Boot up Sequence

IOS Upgrading Dual (Booting)

7) IP Routing

Static Route RIP (Routing Information Protocol) IGRP (Internet Gateway Routing Protocol) EIGRP (Enhance Internet Gateway Routing Protocol) OSPF (Open Shortest Path First)

8) Switching

VLAN (Virtual Local Area Network) STP (Spanning Tree Protocol)

9) ACL (Access Control List)

10) WAN (Wide Area Network) Router as a Switch

11) Frame Relay

12) NAT & PAT Private & Public

13) WLAN (Wireless Local Area Network)

14) VOIP (Voice Over Internet Protocol)

Page 2: Final CCNA Notes

15) Cabling

1) Introduction

CCNA (Cisco Certified Network Associate)

Cisco

Cisco is company name, in course. Company may any, there are many companies i.e. Cisco, Motorola, Simons, Microsoft, but configurations are same. Cisco has 87% shares on infrastructure of IP. It is said that if you send any small information on Internet, this is impossible that this information do not pass through the Cisco Devices.Our purpose is not reading about any product or any company but only with technology.

Certified

Practically you know what you study.

Associate

This is a level in this line. Associate is the first level.

Network

Our whole lab is around the one word i.e. “Network”.“Connectivity of two or more than two devices so that you can communicate with each other, you can exchange the sources or share the information is called networking”. It has two parts:

1. Connectivity2. Communication

Medium may any (copper, wire and wave) for the connectivity and communication. Connectivity is due to the Hardware and communication is due to the Software.

Example

There is a telephone line connected to your home telephone set from PTCL exchange. Is this a network? No, because there is only connectivity but not communication. If an other person talks with you, it is communication. Here the both parts fulfil the definition. Now, you can say the “Network”.

Page 3: Final CCNA Notes

Q: The signals from telephone exchange are analog signals. If you think that I have digital telephone set in home then why would these signals analog?

Ans: In old days when a number is dialed then the exchange had a mechanical arm. You can listen the sound of that arm as the sound of typewriter on every digits of your number. But there is no sound now a day, only this process is converted into digital. But the signals pass through media as analog.

Avoid Wrong Concept

If you use the modem in between the telephone exchange and your computer, then modem converts the analog signals into digital to analog signals, this concept is wrong.

Modem

The basic purpose of modem is modulation and demodulation.

Modulation & Demodulation

Example

If you take a page and throw away with full capacity then this page (Information) will not travel more. But if you use a stone covered by paper (Information) then this paper will covered long distance with high speed. When this paper reached to other side, unwanted information (Stone) is removed to get information (Paper).Insertion of carrier (Stone) into information for covering long distance is called “Modulation”. And distraction of carrier unwanted information is called “Demodulation”.

2) OSI (Open System Interconnection) Reference Model

OSI Reference Model

Reference

The word reference always between two things, there is no reference of only a single thing. The eye’s reference is with eye and the leg’s reference with leg. This reference means there is any two devices is involved in this reference not one device. OSI Reference Model is not for a single machine, this model is for networks.

OSI

OSI stands for Open System Interconnection.

Q: Why is it said as Open System, why not as Close System?

Ans: As you know, “The connectivity of two or more than two devices so that they can communicate which each other”.

Page 4: Final CCNA Notes

there is not mentioned that medium would be copper, fiber, microwaves or radio waves for the connectivity. Media may be anything for the connectivity.

The other part of the definition “The connectivity of two or more than two devices” devices mean it can be a router, switch, computer, modem or any other device.

Example

Using your Internet, when you send an email or chat with other by MSN Messenger, there is not a condition that those only those people can send emails or chat with each other that had the same machines both sides. Machines may be of any vendor i.e. IBM, Compaq or Dell.You can use any media, any vender’s computer and any operating system for connectivity and sharing resources. So it is known as Open i.e. open for every one.

If the OSI System was as Close System then it means, Internet will use the people that have only Compaq machines.

OSI Model is a Layered Approach (Structured Approach), which is made to understand the Internet or network.

Layered Approach OR Structured Approach

If you understand the human, then you can say this is a human being, which is divided into structure. Like head, eyes, nose, hand mouth etc. Each part of body has its own function.

Q: What is advantage of Layered Approach?

Ans:

Example:

If there is one person is working in a company, that person is marketing manager, technical manager, receptionist and peon also. This single person is responsible for all working of company.

After one year, there is a visit of Chief Executive by chance, he asked that person about the dirtiness of office. He replied that I have been involving in technical matter, marketing all day so I have not time. The employee accepts the responsibility of office but he presents logic also. In this situation you cannot blame on the employee.

On the other hand if there is division like: there are separate employees on all departments i.e. marketing, technical, receptionist and peon.

When Chief Executive came and asked the peon about the dirtiness of office. This is an error by the peon not marketing or technical manager. Company has no business in this whole year this error is by the marketing manager not peon or receptionist or any other person.

By using Layered Approach you can find out the errors on accurate location. If there is not layered approach then there is very difficult to find out the errors and also resolving these errors.

Example:

Page 5: Final CCNA Notes

Using Internet, when you dial to connect to the Internet, messages may show like” There is no dial tone”, “Invalid User Name / Pass Word”. If you see the word only as “Error” then you cannot find out the exact location of error. After seeing messages you will check the appropriate location for resolving the error.

e.g. if you see “There is no dial tone” then you will check the telephone not correct the password.

Net Workers divide the Internet theory to maximum seven layers. They said there are seven layers may not be eight layers but may be six, five. You can remember the seven layers with this line“All People Seems to Need Data Processing”.

Q: Why do make OSI Model?

Ans: OSI Reference Model is made for to the point error detection.

OSI Open System Interconnection Layered Model

You can say this model as “Data Flow Chart”. The purpose of this model to understand the flow of data on the network, understanding the steps during moving the data in network.

7. Application Layer

Computer applications like MS Word, MS Excel etc. If we want to chat on Internet then we run MS Messenger (which is Application), without opening of any application on your computer you cannot make any work.

The first step for doing any work, to run application.

You send HELLO to other computer there is compulsory that same applications are running on both computers that want to communicate. If there are not running same applications on both computers then this HELLO not to be seen on computer screen.

6. Presentation Layer

Our language is English and computer learns that language is machine. This layer converts the data from one form to another form. It converts the data into machine language.

5. Session Layer

Ser No

Layers

7 Application Layer6 Presentation Layer5 Session Layer4 Transport Layer3 Network Layer2 Data Link Layer1 Physical Layer

Page 6: Final CCNA Notes

This layer is most critical and most conceptual. This layer creates virtual session. Virtual Session means to check the availability of other side. Sessions are of two kinds:

i. Physical Session (First we go and the checking)ii. Virtual Session (First we checking then going)

Remember the word HELLO is not for our machine but it is another machine.

Example (Physical Session)

If you want to go to Lahore from Islamabad, then there are two ways. First is that you reached at Lahore without informing that person. When you asked about that person, you find that person is not available. You will come back by spending patrol, time without any progress.

Example (Virtual Session)

If you call that person before go to Lahore, if that person is available then I will move, otherwise I will not move. The advantage of this virtual session was, you have saved their resources.

Virtual Session provides the information about the other party available or not and also saving the resources.

Example

This layer normally to be said as G.M. This G.M. wants to move another G.M. of Company for meeting. There are seven gates for going, but only one gate from which G.M can go out. When two computers connected with each other then this is physical layer.

Example

Using MSN Messenger, you want to chat another person, if that person is available then the other window is opened otherwise a message will display as “User is not available”

4. Transport Layer

If other machine is available then this layer is responsible to transport the data on network. For the transport of data fragmentation is made. “The conversion of data into small pieces is called fragmentation or permutation”. E.g. HELLO is converted as:

H E L L O

3. Network Layer

Its major function is sorting and distribution. For understanding you consider this layer as a “Post Office” and Router as “Post Box”. On this layer a device is used called as “Router”. The pieces of HELLO are sent to a device called Router, which acts as sorting and distribution. In Post Office there is sorting is done, like all mails of Islamabad, Lahore etc. is separated for the distribution to their destinations.

Page 7: Final CCNA Notes

In old days when you send a letter to any one, which is called mail. There are two possibilities, the mail reached at exact location or do not reach.

2. Data Link Layer

There are two sub layers.

1) LLC(Logical Link Control)

LLC layer finish hardware and software dependsies.

Example

If we use “Pentium 1” computer and “Windows 98” one side and “Pentium 4” computer and “Windows XP” other side then data speed and operating system clash between two computer but that layer finish that problem

2) MAC(Media Access Control)

There is MAC address exist, MAC address have used many devices like switches and LAN card.

As you know that data travel in form of 0 & 1 (these are the voltage level not mathematical and other number ), every device may contain different voltage, its means there is the involvement of voltage. If you have 3 or 5 voltage and its parallel there is line of any high voltage, then it may harm your data.e.g.

During watching TV, you some time see lining on your TV set, this is why with any high voltage.

Same like above, if there is any data cable contains 3 volts but its parallel a high 5 volts is passing then it is very possible that any bit of your data changes (i.e. 0 to 1).

Example

During the chatting on messenger a person asked what is your age, he writes answer 25 and sends. During the data traveling its only one bit changes and your information will be changed as 65.

Media Access Control

NetworkNetwork

Data LinkData Link

Physical

LLC Sub LayerLLC Sub Layer

MAC Sub Layer

Logical Link Control

Page 8: Final CCNA Notes

In reality no any system is so week, so to resolve this problem a layer is introduced called Data Link Layer. Its main function is the deduction of error.

CRC: (Cyclic Redundancy Code)

This algorithm is very important and famous. There may were mistakes take place, so an error deduction algorithm is made. It attaches an algorithm for sending data to the other side as it is.

Example

If we have data 25 (5 5) and generators of link side are 5. That generator will divide the 5 / 5 and remainder will 0. When you send 25 on Internet then not only 25 is passing but the footers (tailors) also. Due to some error the word 26 (5 5 1) instead of 25 is changed, on the other machine there will be attached a CRC Algorithm again to check the both checksum. If there is any different then there is any error in that data which you sent. If there is an error then your system (Receiver) will not correct that error but it will say to the sender to correct.

Retransmission is faster as compared to error correction.

There are two sources for errors:

a) Errors within the Machine or System (i.e. Computers, Routers, Modems etc) b) Errors from outside the Machine (i.e. in media when data is sent)

According to the research there is 99% probability of error when data travels on Media. The error in system is very rare, if may occur then system recover or restore from its own cache.

1. Physical Layer:

After all the layers exist on a cable is attached to your computer, this cable works on which level is called physical layer.

Example

If you make a file and give to a peon for send to another place. The peon will move physically for the delivery of that file. The work of peon is to carry the data as it is.

Above you sent the word HELLO to other machine, this word travels on all layers by sequence, but if there is an error between the layers then the chances of data to be corrupted.

Q: Where that corrupted data is checked?

Ans: There is another Data Link Layer to the other side of Computer. From sender, the algorithm is attached with the data and will re verify by other side.

Switch, NIC Card (LAN Card) work on Data Link Layer.

Page 9: Final CCNA Notes

There are all opposite works are done to other side of machine.

Data Encapsulation

Transport

Data-Link

Physical

Network

Upper-Layer Data

Upper-Layer DataTCP Header

DataIP Header

DataLLC Header

0101110101001000010

DataMAC Header

PresentationApplication

Session

Segment

Packet

Bits

Frame

PDU

FCS

FCS

Page 10: Final CCNA Notes

Concept

1. Protocols

2. Headers

3. Encapsulation

4. Software

1. Protocols

Protocol is a same set of rules and regulations for the communication between two different machines on the same layer level.

Example

Company “A” Company “B”

1. G.M (Application) G.M (Application)2. Secretary (Session) Secretary (Session)3. Peon (Physical) Peon (Physical)

According to rules, is there possible that the G.M of Company “A” call to the Peon of Company “B” everyday?

By above definition of Protocols, the relation of these companies will as under:

G.M G.M

Secretary Secretary

Peon Peon

The main function of Protocols is the communication.

By the definition of Network: The connectivity is due to the hardware and the communication is because of the software.

Protocols are software. On the Internet or network no any work is done without protocols. If there is no protocol then there is no any communication.

Page 11: Final CCNA Notes

2. Header

When you write HELLO and send, then the data will move to down as Presentation Layer. On this layer the header of presentation layer is attached with the data. On one step down there is another header of session layer is attached with, and so on.

Example

If I write a letter (Data) and saved in my draws without any receiver’s address then this letter will not reach on any destination. Because this letter contains no any address and media (LCS or TCS etc). On the other hand if this letter contains the complete address of receiver and also specified the courier then letter will reach at desired location. With out header data cannot move. Header is the method for communication. Header is an overhead.

Example

There are students in class, there said the students to pass outside the class and passing rate of data is one student per one man. 10 students will pass out in 10 seconds. But if there are 2 bodyguards (as over heads) with these then total 12 students, now these will pass in 12 seconds. This time consuming due to the overhead. When you use overhead on network then it decreases the speed.

3. Encapsulation

Example

If there is a patient and you give a white powder (medicine) to eat, that patient will not take because he does not know about that medicine so he refused. (There is No Communication). If he receives that medicine then it is said communication is done.On the other hand if I put that medicine in a capsule (Encapsulation) and I said eat it, then he will not eat. I write the name of medicine in “French” on capsule then he will not eat because he does not understand “French” language. If I wrote in English i.e. Amoxil then he eat immediately because he knows and understand that language. (There is communication is done).

For the communication same set of rules and regulations is required. If one machine knows the French then other machine must know that language (Protocol), otherwise communication will not take place. Due to this Protocol (language) forces the patient to take medicine.

4. Software

Protocols, headers and encapsulation are software.

As you know about Transport Layer, controls the flow of data. Flow control because of the:

i. Connection Awaitingii. Connection Less

iii. TCPiv. Connection Oriented v. UDP

Page 12: Final CCNA Notes

Flow Control

Example

The water (Data) is coming from hand pump (Sender) to a glass (Receiver), after a short time the glass will full and then it will be overflow (Wastage of Data). If you want to reserve the wastage of data then you will have to apply a phenomenon is called flow control. There are two possibilities to control the flow of data:

a) You will stop the working of hand pump (to decrease the speed of sender)

b) Or you will start the usage of the water (to increase the speed of receiver)

On the Internet the process of Flow Control is automatic. On the back a process is working called “Speed Utilization” which means that equalizes the speed of sender and receiver.

Connection Oriented

Connection Oriented (Reliable)

In this type of communication, an acknowledgment receipt is generated. This is slow but most reliable.

Example

Slow: the machine will not go ahead whenever he does not understand the data.Reliable: it is 100% sure that if machine receives the information then go ahead, otherwise not.

Connection Oriented: (Unreliable)

In this type of communication, only one time connection confirmation then always data will be sent. This type of communication little bit fast than connection oriented reliable.

Connection Less: (Unreliable)

In this communication, an acknowledgment receipt is not generated. It is fast but unreliable.

Example

During the construction of building there are some workers are working. The bricks are coming the worker from floor to other worker on ground. Due to non-acknowledgment, bricks kill the worker on ground but bricks (Data) are coming from floor. Due to the absent of ground worker data is lost.

TCP (Transmission Control Protocol)

TCP is the example of Connection Oriented.

UDP (User Datagram Protocol):

Page 13: Final CCNA Notes

UDP is the example of Connection Less.

3) Network Devices

There is a line of network devices like Hub, Repeater, Generator, Bridges, Switch, Multinet Switch, Routers Derouter, Fixed Firewall etc. these are all devices included in your course.

But the devices that are related your course are Hub, Switch and Router.

1) HUB

A central part of any network is known as Hub. There is no any abbreviation used for Hub. Hub is a broadcast device and same data to all ports. Hub works on Physical Layer.

Q: Hub is a Directed or Flooded Broadcast device?

Ans: This will depend on the address.

Q: Why is Hub a Broadcast device?

Ans: Hub is same as an electric extension wire used in homes. As you know current and water flows where they find the path. As you attach the computers with Hub the current from Hub flows to that all computers.

2) Switch

Page 14: Final CCNA Notes

Switch works on Data Link Layer and has software ASIC (Application Specific Integrated Circuit). It is the combination of software and hardware. The software of Switch is known as Switching Table. There are switches of LAN and also of WAN.

Note: Controller for specific work Processor for multiple works

Example

If there are three devices like A, B and C. A wants to talk with B then data from A reaches to the switch. Data will stay in switch for a moment if Hub was present then the data would not stay. Hub contains IC (Integrated Circuit). initially there is no Switching Table (Software) in ASIC(Application Specific Integrated Circuit) . As you know that if there is no software on device then it is called Hub, so switch acts as Hub initially.

So first time the switch will broadcast the data, if the entry of destination is not available in Switching Table. Otherwise if the entry of the destination is available in Switching Table then the switch will do Unicast.

“Switch will be doing broadcast till the entry of destination and source is not available in the Switching Table”.

Destination Entry Available then UnicastDestination Entry Not Available then Boradcast

3) Router

Page 15: Final CCNA Notes

Router is layer three device, There are routing table.Router is a unicast device, non-broadcast device. Router has two ports written as Serial 0, Serial 1. Ethernet or LAN also printed. The word Serial means this port is for WAN and Ethernet means for port of LAN.

“So Router is a device, which integrates (merge) WAN and LAN”.

Destination entry available then unicastDestination entry not available then Drops

Cards

NIC Card (Network Interface Card)

WIC Card (Wide Interface Card)

Page 16: Final CCNA Notes

VIC Card (Voice Interface Card)

VWIC Card Or WVIC Card (Voice Wide or Wide Voice Interface Card)

Types of communication

There are three types of communication

1) Unicast

2) Multicast

3) Broadcast

1) Unicast

Page 17: Final CCNA Notes

Unicast means one to one communication. In this kind of communication only one person listen and that person give answer. Traffic always sent to fix destination.

2) Multicast

One to many communication.In case of Multicast there is no specific or fix destination. Destination can be changed. Multicast sent from the source (Spread around the source). One destination (System) can be one and more than one Multicast member at a time

Example

If we divided a class in two groups one group “A” and other group “B”. Teacher talks group “A”. Multicast means one to any specific group

3) Broadcast

One to all communication or Broadcast means to all devices

Example

A teacher in class speaks and all the students listen that sound. The bulletin is broadcasting.

Broadcast is divided into two categories:

1. Directed Broadcast2. Flooded Broadcast

In a room when a teacher said that Roll no 1 hands up, listen that comment all people but replay only Roll no 1, this is specific broadcast.

1. Directed Broadcast

In class if teacher ask a question from one student then all the students are listening but only that student answers the question to teacher.

2. Flooded Broadcast

In class of teacher ask a question from all students then all the students answer that question to the teacher.

Disadvantages of Broadcast:

There is no security in broadcasting because all persons are listening. There is software “Cains” use the connection Cable Internet, you can listen the chatting on MSN messenger of all your neighbors. This software catches the packets of IP and decodes them, and you can listen the sounds of your neighbors.

Page 18: Final CCNA Notes

LAN (Local Area Network) & WAN (Wide Area Network)

Online Banking

In old days, when you have to withdraw or deposit the money you have to go to that specific branch that have your account. In order to maintain the balance of each account holder, the manual books are maintained.

With the passage of time up gradation is made with the computer system. This increases the volume of computers in every branch for data maintaining using LAN.

All the branches of all banks are connected each other with antennas. These antennas are point to point but not broadcast because to avoid the risk of security.

Example

ATM Machine

ATM Machine is the example of online banking, using this machine you can withdraw money from any ATM of any bank.

During defining the definitions of LAN WAN, there must not be criteria “Distance”.

LAN

Computers are connected using the LAN Standard Cable / LAN Standard Port.

WAN

Computers are connected using the WAN Standard Cable / WAN Standard Port.

Standard of WAN Cable

It must be a 1/2-inch thick and having 60 pins end of the cable.

Example

In a bank there is an antenna with a black cable (WAN Cable). This cable is directly attached with router i.e. in serial port of the router.

Q: Provide some examples of LAN’s switch and WAN’s switch?

Ans: The WAN and LAN both have their own switches separately. The examples of WAN Switches are follows:

Ethernet Supports to LAN

X.25: Running on Mobilink (Supports to WAN)

Page 19: Final CCNA Notes

ATM: Running on PTCL (Supports to WAN)Frame Relay: Running on remaining Lahore. (Support to WAN)

4) IP Addressing & Concept

IP Addressing

Q: What is IP Addressing

Ans: The Internet is a collection of networks whose users communicate with each other. Each communication carries the address of the source and destination networks and the particular machine within the network associated with the user or host computer at each end. This address is called the IP Address (Internet Protocol address). This 32-bit IP address has two parts: one part identifies the network (with the network number) and the other part identifies the specific machine or host within the network (with the host number). An organization can use some of the bits in the machine or host part of the address to identify a specific subnet. Effectively, the IP address then contains three parts: the network number, the subnet number, and the machine number.

The 32-bit IP address is often depicted as a dot address (also called dotted decimal notation) - that is, four groups (or octet) of decimal numbers separated by periods. Here's an example:

Decimal Digit : 1-9

130.5.5.25

Each of the decimal numbers represents a string of eight binary digits. Thus, the above IP address really is this string of 0s and 1s:

Binary Digit :0-1

10000010. 00000101. 00000101. 00011001

As you can see, we inserted periods between each eight-digit sequence just as we did for the decimal version of the IP address. Obviously, the decimal version of the IP address is easier to read and that's the form most commonly used.

We can purchase an IP Address from IANA (Internet Assigning Number Authority)

MAC Address

Hardware AddressPhysical AddressNone configurable AddressLayer 2 addressHardcode Address48 Bit Address

Page 20: Final CCNA Notes

IP Address

Software AddressLogical AddressConfigurable AddressLayer 3 Address32 Bit Address

Remember that 95% communication on MAC base and 5% IP base, because LAN communication faster than WAN. LAN mostly devices have MAC Address and WAN work on IP Address. MAC developed core relation with IP, only one time IP called then every time MAC called.

Q What is IP addressing Scheme?

Ans:

1) Flat Addressing Scheme

Example

In America use flat addressing scheme. “White house” # 1 then # 2 and so on …. But in your mind no # 1 address in America ,every no different than other.

2) Hierarchal Addressing Scheme

Example

In Pakistan use hierarchal scheme. “Block Z” have many time use, but every time “Block Z” hierarchy are different. If we go to “Block Z” first of all we know about what is your Province, City, Area and then “Block”.

Data LinkData Link

Physical

NetworkNetwork

Data LinkData Link

Physical

MAC Address

Media Access Control

IP Address

Internet Protocol

Page 21: Final CCNA Notes

IP Address Classes

IP addresses can be one of several classes, each determining how many bits represent the network number and how many represent the host number. The most common class used by large organizations (Class A) allows 8 bits for the network number and 24 for the host number.

Class A 1 – 127 (Network 127 is reserved for loopback and internal testing)Leading bit pattern 0 00000000.00000000.00000000.00000000 Network . Host . Host . Host

Class B 128 – 191 Leading bit pattern 10 10000000 .00000000.00000000.00000000 Network . Network . Host . Host

Class C 192 – 223 Leading bit pattern 110 11000000.00000000.00000000.00000000 Network . Network . Network . Host

Class D 224 – 239 (Reserved for multicast)Class E 240 – 255 (Reserved for experimental, used for research)

Network portion is globally unique and host portion locally unique.

A Class 00000000=0 Default Route 01111111=127 Loopback Testing

B Class 10000000=128 10111111=191

C Class 11000000=192 11011111=223

D Class 11000000=224 11011111=239

E Class 11000000=240 11011111=255

Class No of Network No of Host/Network No of Host/ClassClass A 2 8-1

2 7

2 24 2 7

x

2 24

Class B 2 16-2

2 16 2 14

Page 22: Final CCNA Notes

2 14 x

2 16

Class C 2 24-3

2 21

2 8 2 21

x

2 8

Private Address Space

Class A 10.0.0.0 to 10.255.255.255Class B 172.16.0.0 to 172.31.255.255Class C 192.168.0.0 to 192.168.255.255

Default Subnet MasksClass A 255.0.0.0Class B 255.255.0.0Class C 255.255.255.0

This in you mind if recognized that what is your class then we see only first octets (Octal is 8 word combination) of the IP Address 192.168.1.1 (also called doted decimal notation)

Formula (Decimal to Binary and Binary to Decimal)

Conversion in Binary Form

IP Address in decimal form 192 . 168 . 30 . 24

First Octet 128 . 64 . 32 . 16 . 8 . 4 . 2 . 1 1 1 0 0 0 0 0 0 = 192

Second Octet 128 . 64 . 32 . 16 . 8 . 4 . 2 . 1 1 0 1 0 1 0 0 0 = 168

Third Octet 128 . 64 . 32 . 16 . 8 . 4 . 2 . 1 0 0 1 0 0 0 0 0 = 30

Fourth Octet 128 . 64 . 32 . 16 . 8 . 4 . 2 . 1 0 0 0 1 1 0 0 0 = 24

Conversion in Decimal Form

IP Address in binary form 11001100 . 00011110 . 00111111 . 00011100

First Octet 128 . 64 . 32 . 16 . 8 . 4 . 2 . 1 1 1 0 0 1 1 0 0 = 204

Second Octet 128 . 64 . 32 . 16 . 8 . 4 . 2 . 1 0 0 0 1 1 1 1 0 = 30

Page 23: Final CCNA Notes

Third Octet 128 . 64 . 32 . 16 . 8 . 4 . 2 . 1 0 0 1 1 1 1 1 1 = 63

Fourth Octet 128 . 64 . 32 . 16 . 8 . 4 . 2 . 1 0 0 0 1 1 1 0 0 = 28

Subneting

Q What is subnetting?

Subnetting is the process of breaking down an IP network into smaller sub-networks (Network with in network) called "subnets." Each subnet is a non-physical description (or ID) for a physical sub-network (usually a switched network of host containing a single router in a multi-router network).

Subnet Mask Notation

There are two forms of subnet notation, standard notation and CIDR (Classless Internet Domain Routing) notation. Both versions of notation use a base address (or network Address) to define the starting point of the network, such as 192.168.1.0. This means that the network begins at 192.168.1.0 and the first possible host IP address on this subnet would be 192.168.1.1.

In standard subnet mask notation, a four octet numeric value is used as with the base address , for example 255.255.255.0. The standard mask can be calculated by creating four binary values for each octet, and assigning the binary digit of .1. to the network potion, and assigning the binary digit of .0. to the network potion. In the example above this value would be 11111111.11111111.11111111.00000000. In combination with the base address you have a subnet definition, in this case the subnet in standard notation would be 192.168.1.0 255.255.255.0.

In CIDR notation, the number of 1.s in the binary version of the mask are counted from the left, and that number is appended to the end of the base address following a slash (/). In the example here the subnet would be listed in CIDR notation as 192.168.1.0/24.

When is Subnetting Used?

Subnets are created to limit the scope of broadcast traffic, to apply network security measures, to separate network segments by function, and/or to assist in resolving network congestion problems.., A subnet is usually composed of a network router, a switch or hub, and at least one host

“Compromise in the host portion and addition in the network portion is called subnetting” Logically dividing the networks .

Example

A latter posted which address is that “IMTIAZ AHMED Corvit 14/C Gulbarg III”. A post man takes latter and gives to “IMTIAZ AHMED”, letter reach the correct destination (This is one IP Address and communication with default subnet mask.)

Page 24: Final CCNA Notes

But two same name person “IMTIAZ AHMED” leave or work in corvit then latter could not reach correct destination and data will loss.

There should be some addition here for save data. Then address is that “IMTIAZ AHMED Training Section Corvit 14/C Gulbarg III” A post man takes letter and going to Corvit then Training Section and gives letter “IMTIAZ AHMED”, letter reaches the correct destination (This is one IP Address and communication with Customize subnet mask.)

LetterLetterName : Imtiaz AhmedName : Imtiaz AhmedAddress: Corvit 14/CAddress: Corvit 14/C

Gulbarg IIIGulbarg III

CorvitCorvit

IMTIAZIMTIAZ AHMEDAHMED

LetterLetterName : Imtiaz AhmedName : Imtiaz AhmedAddress: Corvit 14/CAddress: Corvit 14/C

Gulbarg IIIGulbarg III

CorvitCorvit

IMTIAZIMTIAZ AHMEDAHMED

IMTIAZIMTIAZ AHMEDAHMED

LetterLetterName : Imtiaz AhmedName : Imtiaz Ahmed

Address: Corvit Tranning Section 14/CAddress: Corvit Tranning Section 14/C Gulbarg IIIGulbarg III

Page 25: Final CCNA Notes

How much bits subneting?

Judgment of bits table

Bits Formula Total Subnets

12 1

2

22 2

4

32 3

8

42 4

16

52 5

32

62 6

64

72 7

128

82 8

256

Customize Subnet Mast table

Class 1st bit 2nd bit 3rd bit 4th bit 5th bit 6th bit 7th bit 8th bit

A /8 /9 /10 /11 /12 /13 /14 /15B /16 /17 /18 /19 /20 /21 /22 /23C /24 /25 /26 /27 /28 /29 /30 /31Result 0 128 192 224 240 248 252 254

CorvitCorvit

IMTIAZIMTIAZ AHMEDAHMED

IMTIAZIMTIAZ AHMEDAHMED

Page 26: Final CCNA Notes

Binary Value Customized Subnet Mast0 0 0 0 0 0 0 01 0 0 0 0 0 0 01 1 0 0 0 0 0 01 1 1 0 0 0 0 01 1 1 1 0 0 0 01 1 1 1 1 0 0 01 1 1 1 1 1 0 01 1 1 1 1 1 1 0

Each IP pool in exclaimed three things

1) Net ID2) Broadcast ID3) Mask

Network ID or Net ID

And Operation

0 AND 0 = 00 AND 1 = 01 AND 0 = 01 AND 1 = 1

IP Address 192 . 168 . 100 . 10

IP Address 11000000 . 10101000 . 01100100 . 00001010

Subnet Mask 11111111 . 11111111 . 11111111 . 00000000

Network ID 11000000 . 10101000 . 01100100 . 00000000

Network ID 192 . 168 . 100 . 0

Note: It is remember that

IP Address 192.1.1.100/24

Net ID 192.1.1.0 (Net ID always even)

Broadcat ID 192.168.1.255 (Broadcast ID always odd)

Mask 255.255.255.0

1) Example of Subnetting

Chiniot Local Router

Page 27: Final CCNA Notes

IP Address Available 192.168.1.0

Q: If we have two remote site then judge that how many bits Subnetting and how many subnets available?

Ans: Remember that these things.

1) What is your class Address Class C

2) How many networks bits 24

3) How many remote brunches 2

4) Default subnet Mask 255 .255 .255 .011111111 .11111111 .11111111 .0 0000000

5) How many bits barrows 1

We have two remote sits then we see that table for subnetting and chose bits.

Karachi Remote Router

Lahore Remote Router

That BitSubnet

(Subnetting)

Page 28: Final CCNA Notes

6) 192. 168. 1. 0 0 0 0 0 0 0 0 0 =0

1 0 0 0 0 0 0 0 =128

OR

Farmula called Block Size 256-128=128=0=128

7) Customize Subnet Mask255 .255 .255 .128

8) Address and Range

Net ID 192.168.1.0

Valid Range 192.168.1.1 To Total Address 126192.168.1.126

Broad Cast ID 192.168.1.127

Net ID 192.168.1.128

Valid Range 192.168.1.129 To Total Address 126192.168.1.254

Broad Cast ID 192.168.1.255

9) Subnet Mask Selection

C /24 /25 /26 /27 /28 /29 /30 /31

Bits Formula Total Subnets

12 1

2

22 2

4

32 3

8

42 4

16

52 5

32

62 6

64

72 7

128

82 8

256

1 Bit subnetting&

2 Subnets Available

Page 29: Final CCNA Notes

Result 0 128 192 224 240 248 252 254

10) How many hosts (28-1 =27) Total Hosts(128-2) Usable Hosts(126)

2) Example of Subnetting

IP Address Available 10.0.0.0

Q: If we have two remote site then judge that how many bits Subnetting and how many subnets available?

Ans: Remember that these things.

1) What is your class Address Class A

2) How many networks bits 8

3) How many remote brunches 8

4) Default subnet Mask 255 .0 .0 .0

/25&

Subnets Mask is 128

Chiniot Local Router

Isalamabad

Lahore

Karachi

Faisalabad

Sargodha

Vehari

Jhang Peshawar

Page 30: Final CCNA Notes

11111111 .000 00000 .00000000 .00000000

5) How many bits barrows 3

We have two remote labs then we see that table for subnetting and chose bits.

6) Possible combination

10. 0. 0. 0 0 0 0 0 0 0 0 0 =0 0 0 1 0 0 0 0 0 =32

0 1 0 0 0 0 0 0 =64 0 1 1 0 0 0 0 0 =96

1 0 0 0 0 0 0 0 =128 1 0 1 0 0 0 0 0 =160

1 1 0 0 0 0 0 0 =192 1 1 1 0 0 0 0 0 =224

OR

Farmula called Block Size 256-224=32=0=32=64=96=128=160=192=224

7) Customize Subnet Mask255 .224 .0 .0

Bits Formula Total Subnets

12 1

2

22 2

4

32 3

8

42 4

16

52 5

32

62 6

64

72 7

128

82 8

256

3 Bit subnetting&

8 Subnets Available

These Bits Subnet

(Subnetting)

Page 31: Final CCNA Notes

8) Address and Range

Net ID 10.0.0.0

Valid Range 10.1.0.0 To Total Address 209715010. 30.0.0

Broad Cast ID 10. 31.255.255

Net ID 10. 32.0.0

Valid Range 10. 33.0.0 To Total Address 209715010. 62.0.0

Broad Cast ID 10. 63.255.255

Net ID 10. 64.0.0

Valid Range 10. 65.0.0 To Total Address 209715010. 94.0.0

Broad Cast ID 10. 95.255.255

Net ID 10. 96.0.0

Valid Range 10. 97.0.0 To Total Address 209715010. 126.0.0

Broad Cast ID 10. 127.255.255 Net ID 10. 128.0.0

Valid Range 10. 129.0.0 To Total Address 209715010. 158.0.0

Broad Cast ID 10. 159.0.0

Net ID 10. 160.0.0

Valid Range 10. 161.0.0 To Total Address 209715010. 190.0.0

Broad Cast ID 10. 191.0.0

Net ID 10. 192.0.0

Valid Range 10. 193.0.0 To Total Address 209715010. 222.0.0

Broad Cast ID 10. 223.0.0

Net ID 10. 224.0.0

Page 32: Final CCNA Notes

Valid Range 10. 225.0.0 To Total Address 209715010. 254.0.0

Broad Cast ID 10. 255.0.0

9) Subnet Mask Selection

A /8 /9 /10 /11 /12 /13 /14 /15Result 0 128 192 224 240 248 252 254

10) How many hosts (224-3 =221) Total Hosts(2097152-2) Usable Hosts(2097150)

3) Example of Subnetting

Total Remote Brunches are 2048

IP Address Available 172.10.0.0

Q: If we have 2048 remote site then judge that how many bits Subnetting and how many subnets available?

Ans: Remember that these things.

1) What is your class Address Class B

2) How many networks bits 16

3) How many remote brunches 2048

4) Default subnet Mask 255 .255 .0 .011111111 .11111111 .00000000 .000 00000

5) How many bits barrows 11

/11&

Subnets Mask is 224

These Bits Subnet

(Subnetting)

Page 33: Final CCNA Notes

We have two remote labs then we see that table for subnetting and chose bits.

6) Possible combination

172. 10. 0. .0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 =0. 0

0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 =0. 32 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 =0. 64

0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 =0. 96 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 =0. 128

0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 =0. 160

0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 =0. 192

0 0 0 0 0 0 0 0 1 1 1 0 0 0 0 0 =0. 224 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 =1. 0

0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 =1. 32 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 =1. 64

OR

Farmula called Block Size 256-224=32=0. 0=0. 32=0. 64=0. 96=0. 128=0. 160=0. 192=0. 224=1. 0=1. 32=1. 64

Bits Formula Total Subnets

12 1

2

22 2

4

32 3

8

42 4

16

52 5

32

62 6

64

72 7

128

82 8

256

92 9

512

102 10

1024

112 11

2048

11 Bit subnetting&

2048 Subnets Available

Page 34: Final CCNA Notes

7) Customize Subnet Mask255 .225 .255 .224

8) Address and Range

Net ID 172.10.0.0

Valid Range 172.10.1.0 To Total Address 30172. 10.30.0

Broad Cast ID 172. 10.31.255

Net ID 172. 10.32.0

Valid Range 172. 10.33.0 To Total Address 30172. 10.62.0

Broad Cast ID 172. 10.63.255

9) Subnet Mask Selection

B /16 /17 /18 /19 /20 /21 /22 /23Result 0 128 192 224 240 248 252 254

B /24 /25 /26 /27 /28 /29 /30 /31Result 0 128 192 224 240 248 252 254

10) How many hosts (216-11 =25) Total Hosts(32) Usable Hosts(30)

/27&

Subnets Mask is 255.224

Page 35: Final CCNA Notes

VLSM(Verable Length Subnet Mask)

Q: What Is VLSM and Why Is It Used?

A Waste of Space

Page 36: Final CCNA Notes

Q: When to Use VLSM?

A variable length subnet mask is a means of allocating IP addressing resources to subnets according to their individual need rather than some general network-wide rule. So therefore the network/host division can occur at any bit boundary in the address. Because the normal class distinctions are ignored, the new system was called classless routing. This led to the original system being called, by back-formation, classful routing. Classless routing came into use in the mid 1990s due to the inefficiences of the classful system.

Networking Scheme

Mumbai 192.168.10.64/27

28

WAN 192.168.10.129 and 130

Page 37: Final CCNA Notes

Example of VLSMAddress 192.168.1.0.

Subnets Hosts

2 60

2 32

2 15

2 7

2 22

62 12 28

WAN 192.198.10.133 and 134 192.168.10.132/30

WAN 192.198.10.137 and 138

192.168.10.136/30

192.168.10.128/30

Sydney 192.168.10.96/28

Bangalore 192.168.10.0/26 Singapore 192.168.10.112/28

64 64 64 64

62192.168.1.0/26

TO192.168.1.63/2

6

62192.168.1.0/26

TO192.168.1.63/2

6

Page 38: Final CCNA Notes

7) IP Routing

Encapsulation Topic

We can encapsulate interface not router. There are five statuses.

Hardware Part Indicate Software Part Indicate

Serial 0/0 is up, line protocol is up (Communication will accord)

Int in up, line protocol is down (No Communication accord)

Int in down line protocol is up (No Communication accord)

Int in down line protocol is down (No Communication accord)

Int in administratively down line protocol is down (No Communication accord)

Protocol A uniform set of rules that enable two devices to connect and transmit data to one another. Protocols determine how data are transmitted between computing devices and over networks. They define issues such as error control and data compression methods. The protocol determines the following: type of error checking to be used, data compression method (if any), how the sending device will indicate that it has finished a message and how the receiving device will indicate that it has received the message. Also called protocol is a language.

Encapsulation ProtocolBy default encapsulation protocol is HDLC(High level Data Link). We can change protocol but that is in your mind if we want to communication between two routers then both protocols is same.

Page 39: Final CCNA Notes

A>EnableA#Configure TerminalA(config)#Interface Serial 0/0A(config-if)#Encapsulation PPPA(config-if)# ExitA(config)#ExitA#Show Enterface Serial 0

Then we will see

Int in up ,line protocol is down

OR

A#Ping 10.0.0.1 (5 Packets Send ICL Protocol)!!!!!Success rate is 0 percent (0/5), round-trip min/avg/max=32/38/56 ms

There is no communication accord; if we want communication begun between router then we follow these commands.

A>EnableA#Configure TerminalA(config)#Interface Serial 0/0A(config-if)#No EncapsulationA(config-if)# ExitA(config)#ExitA#Show Interface Serial 0/0

Then we will see

Int in up ,line protocol is up

OR

A#Ping 10.0.0.1 !!!!!Success rate is 100 percent (5/5), round-trip min/avg/max=32/38/56 ms

There is communication started.

If we want to administratively down the interface link (Some times administrator himself down the interface that is called administratively shutdown).For that particular work we need these commands.

A>EnableA#Configure TerminalA(config)#Interface Serial 0/0A(config-if)#ShutdownA(config-if)# ExitA(config)#ExitA#Show Interface Serial 0

Then we will see

Serial 0 is administratively down, line protocol is down

OR

Page 40: Final CCNA Notes

A#ping 10.0.0.1 !!!!!Success rate is 0 percent (0/5), round-trip min/avg/max=32/38/56 ms

There is no communication accord, if we want communication begun between router then we go to

A>EnableA#Configure TerminalA(config)#Interface Serial 0/0A(config-if)#No ShutdownA(config-if)# ExitA(config)#ExitA#Show Interface Serial 0/0

Then we will see

Int in up ,line protocol is up

OR

A#Ping 10.0.0.1 !!!!!Success rate is 100 percent (5/5), round-trip min/avg/max=32/38/56 ms

There is communication started.

If we can not understand the problem completely or new on the job. Then we type the 4 commands. These commands will magically work and all problems will solve if physical Layer error not exist. Because that error is router internal error.

1) A(config-if)# No Shutdown

2) A(config-if)# No Encapsulation

3) A(config-if)# Keepalive

4) A(config-if)# Clock Rate 64000

One important point keep in your mind clock rate always configure in DCE end. Because when we connect to two routers then which cable work is one side “DTE” and second side “DCE”. If we configure ‘Clock rate 64000” command then IOS(Internetworking Operating System) message that “This is DET end and not configure that command” and Some IOS (Internetworking Operating System) accept that “Clock rate 64000” command on “DTE” end but no work at all.

IP Routing Topic

Purpose

Completion of routing table (every intelligent device have table, Router “Routing table” Switch” Switching table”).Routing table complete called convergence

Page 41: Final CCNA Notes

A # Show IP Route

That command show ip routing table.

C 1.0.0.0/8 is directly connected, Serial 0C 192.168.1.0/24 is directly connected, FastEthernet0/0

“C” word mentions that system directly connected to network. A pin point is that there is only show network ID’s not display IP address.

There is two ways to complete routing table.

1) Static Routing Protocol2) Dynamic Routing Protocol

1) Static Method (Static Routing Protocol)

We will define one static route define. Entry will be mentioned character “S” in routing table

10.0.0.1 20.0.0.1 Serial 0/0 Serial 0/0 A B

192.168.0.1 192.168.1.1 Fasteathernet 0/0 Fasteathernet 0/0

Method:

Missing Ether net Missing Subnet Mask Missing Router

A(config)# ip route 20.0.0.1 255.0.0.0 10.0.0.0 Missing Ether net Missing Subnet Mask Missing Router

A(config)# ip route 192.168.1.1 255.255.255.0 20.0.0.0

A# show ip route

C 1.0.0.0/8 is directly connected, Serial 0S 10.0.0.0/8 is directly connected, Serial0/0S 192.168.0.0/24 [1/0] via 10.0.0.1C 192.168.1.0/24 is directly connected, FastEthernet0/0 This is Static route, but only method not practical in these days. If 100 network then we add separate 100 entries that is not possible now a days and in routing table entry show with “S” character.

1) Dynamic Method

That is method of latest technology. There are if we complete the routing table then we will define the routing protocol. These are given below

1) RIP (Routing Information protocol)2) IGRP (Interior Gateway Routing Protocol)3) EIGRP (Enhanced Interior Gateway Routing Protocol)4) OSPF (Open Shortest Path First)

Page 42: Final CCNA Notes

Properties

Protocol RIP IGRP EIGRPOSPF

Protocol Category Distance Vector

Distance Vector

Hybrid Link State

AD (Administrative Distance)

120 100 90/170 110

Meaning: This is preference criteria (if we two protocol configure then which protocol shows in the routing table) Presentation In Routing table

R

I

D

O

Meaning: Display in Routing Table Matric Hop Count

Composite 1) Band Width 2) Delay 3) Reliability 4) Loading 5) MTN

Composite 1) Band Width 2) Delay 3) Reliability 4) Loading 5) MTN

Cost 1Band width

Meaning: Decision Criteria Configuration

1) RIP (Routing Information protocol) ConfigurationIn this protocol we directly connected network advertised

10.0.0.1 10.0.0.2 Serial 0/0 Serial 0/0 A B

192.168.0.1 192.168.1.1 Fasteathernet 0/0 Fasteathernet 0/0

A> EnableA# Configuration TerminalA(config)# Router RIPA(config-router)# Network 10.0.0.1A(config-router)# Network 192.168.0.1A(config-router)# ExitA(config)# ExitA# Show IP Route

Page 43: Final CCNA Notes

C 10.0.0.0/8 is directly connected, Serial0/0C 192.168.0.0/24 is directly connected, FastEthernet0/0R 192.168.1.0/24 [120/1] via 10.0.0.2, 00:00:15, Serial0/0

A# Ping 10.0.0.2!!!!!Success rate is 100 percent (5/5), round-trip min/avg/max=32/38/56

Second Router

B> EnableB# Configuration TerminalB(config)# Router RIPB(config-router)# Network 10.0.0.2B(config-router)# Network 192.168.1.1B(config-router)# ExitB(config)# ExitB#Show IP Route

C 10.0.0.0/8 is directly connected, Serial0/0R 192.168.0.0/24 [120/1] via 10.0.0.1, 00:00:02, Serial0/0C 192.168.1.0/24 is directly connected, FastEthernet0/0

B# ping 10.0.0.1!!!!!Success rate is 100 percent (5/5), round-trip min/avg/max=32/38/56

“R” character is representing RIP protocol entry. We can check IP protocol

B# Show IP Protocols

Routing Protocol is “rip”

3) IGRP (Interior Gateway Routing Protocol) Configuration

10.0.0.1 10.0.0.2 Serial 0/0 Serial 0/0 A B

192.168.0.1 192.168.1.1 Fasteathernet 0/0 Fasteathernet 0/0

A> EnableA# Configuration TerminalA(config)# Router IGRP 1 ( Autnums System Number) Same Aadministrative policies Under having same routing policies

A(config-router)# Network 10.0.0.1A(config-router)# Network 192.168.0.1A(config-router)# ExitA(config)# ExitA# Show IP Route

C 10.0.0.0/8 is directly connected, Serial 0/0I 192.168.0.0 [100/10476] via 10.0.0.2, Serial 10/0 C 192.168.1.0/24 is directly connected, FastEthernet0/0

A# Ping 10.0.0.2 !!!!!Success rate is 100 percent (5/5), round-trip min/avg/max=32/38/56

Page 44: Final CCNA Notes

Second Router

B> EnableB # Configuration TerminalB(config)# Router IGRP 1 ( Autnums System Number) Same Aadministrative policies Under having same routing policiesB(config-router)# Network 10.0.0.2B(config-router)# Network 192.168.1.1B(config-router)# ExitB(config)# ExitB# Show IP Route

C 1.0.0.0/8 is directly connected, Serial 0R 192.168.0.0 [100/10476] via 10.0.0.1, Serial 10/0 C 192.168.1.0/24 is directly connected, FastEthernet0/0

B# Ping 10.0.0.1!!!!!Success rate is 100 percent (5/5), round-trip min/avg/max=32/38/56

“I” character is representing IGRP protocol entry

3) EIGRP(Enhance Interior Gateway Routing Protocol)Configuration

10.0.0.1 10.0.0.2 Serial 0/0 Serial 0/0 A B

192.168.0.1 192.168.1.1 Fasteathernet 0/0 Fasteathernet 0/0

A> EnableA# Configuration TerminalA(config)# Router EIGRP 1 ( Autnums System Number) Same Aadministrative policies Under having same routing policiesA(config-router)# Network 10.0.0.1A(config-router)# Network 192.168.0.1A(config-router)# ExitA(config)# ExitA# Show IP Route

C 10.0.0.0/8 is directly connected, Serial0/0C 192.168.0.0/24 is directly connected, FastEthernet0/0D 192.168.1.0/24 [90/2172416] via 10.0.0.2, 00:00:05, Serial0/0

A# Ping 10.0.0.2 !!!!!Success rate is 100 percent (5/5), round-trip min/avg/max=32/38/56

Second Router

B> EnableB # Configuration TerminalB(config)# Router EIGRP 1 ( Autnums System Number) Same Aadministrative policies Under having same routing policiesB(config-router)# Network 10.0.0.2

Page 45: Final CCNA Notes

Bconfig-router)# Network 192.168.1.1B(config-router)# ExitB(config)# ExitB# Show IP Route

C 10.0.0.0/8 is directly connected, Serial0/0D 192.168.0.0/24 [90/2172416] via 10.0.0.1, 00:01:42, Serial0/0C 192.168.1.0/24 is directly connected, FastEthernet0/0

B# Ping 10.0.0.1!!!!!Success rate is 100 percent (5/5), round-trip min/avg/max=32/38/56

“D” character is representing IGRP protocol entry

4) OSPF(Open Shortest Path First)Configuration

What was the requirement of OSPF?When we configure “RIP” “IGRP” “ EIGRP” or other protocols then these protocol run all interfaces of the router but “OSPF” is that protocol run only one interface if we run. OSPF is very secure protocol. If we use “RIP” protocol then main disadvantage is that after 30 second put routing table and send for updates(Live environment that is very big disadvantage of that protocol because there normally data size consist on 1000 MB and particular work waste 2 and 3 second every updates.). In world 85 % use OSPF 13 % BGP and 2% other.

OSPF can be configuring single interface, single link, single network and single subnets.OSPF have powered by dint of “WILDCARD MASK”

What is WILDCARD MASK?Which of the following network commands , following the 'router ospf 1' command, tells the router to start using OSPF on interfaces whose ip addresses are 10.1.1.1, 10.1.100.1, and 10.1.120.1?

A) network 10.1.1.0 255.0.0.0 area 0B) network 10.0.0.0 0.255.255.0 area 0 C) network 10.0.0.0 255.0.0.0 area 0 D) network 0.0.0.0 255.255.255.255 area 0

WILDCARD MASK Concept.

Normally we listen about WILDCARD MASK that reverse of SUBNET MASK. But this is wrong concept.

255.255.255.00 .0 .0 .255 As a rule wrong because this is valid WILDCARD MASK

Definition of Subnet Mask

Subnet Mask is continue stream of 0’s or 1’s. But Wildcard Mask is not same type.

Calculation of Multiple IP Wildcard Mask

In Decimal Form In Binary Form

192 . 168. 1. 1 11000000.10101000.00000001.00000001

Page 46: Final CCNA Notes

192 . 168. 2. 1 11000000.10101000.00000010.00000001192 . 168. 3. 1 11000000.10101000.00000011.00000001192 . 168. 4. 1 11000000.10101000.00000100.00000001________________ ___________________________________ 0 . 0. 7. 0 00000000.00000000.00000111.00000000 ________________ ___________________________________

Rule 0 Must Match 1 Don’t Care Wildcard Mask192 .168 . 1 . 1 0 . 0 . 7 . 0

Single IP Wildcard Mask

Wildcard Mask192 .168 . 1 . 1 0 . 0 . 0 . 0

1) OSPF Single Area Configuration

10.0.0.1 10.0.0.2 Serial 0/0 Serial 0/0 A B

192.168.0.1 192.168.1.1 Fasteathernet 0/0 Fasteathernet 0

A> EnableA# Configuration TerminalA(config)# Router OSPF 1 (Range 1 to 65335) A(config-router)# Network 10.0.0.1 0.0.0.0 area 0 A(config-router)# Network 192.168.0.1 0.0.0.0 area 0A(config-router)# ExitA(config)# ExitA# Show IP Route

C 10.0.0.0/8 is directly connected, Serial0/0C 192.168.0.0/24 is directly connected, FastEthernet0/0O 192.168.1.0/24 [110/65] via 10.0.0.2, 00:00:14, Serial0/0

A# Ping 10.0.0.2 !!!!!Success rate is 100 percent (5/5), round-trip min/avg/max=32/38/56

Second Router

B> EnableB# Configuration TerminalB(config)#Router OSPF 1 (Range 1 to 65335) B(config-router)# Network 10.0.0.2 0.0.0.0 area 0B(config-router)# Network 192.168.1.1 0.0.0.0 area 0B(config-router)# ExitB(config)# ExitB# Show IP Route

C 10.0.0.0/8 is directly connected, Serial0/0O 192.168.0.0/24 [110/65] via 10.0.0.1, 00:00:25, Serial0/0C 192.168.1.0/24 is directly connected, FastEthernet0/0

B# Ping 10.0.0.1 !!!!!

Page 47: Final CCNA Notes

Success rate is 100 percent (5/5), round-trip min/avg/max=32/38/56

“O” Character is representing OSPF protocol entry

2) OSPF Multiple Area configuration

10.0.0.1 10.0.0.2 Serial 0/0 FastEathernet0/0 Serial 0/0 192.168.0.1 FastEathernet 0/0

A B 192.168.1.1

Serial 0/1 20.0.0.1 172.16.0.1 FastEathernet 0/0

C

Serial 0/1 20.0.0.2

A> EnableA# Configuration TerminalA(config)# Router OSPF 1 (Range 1 to 65335) A(config-router)# Network 10.0.0.1 0.0.0.0 area 0 A(config-router)# Network 20.0.0.1 0.0.0.0 area 1 A(config-router)# Network 192.168.0.1 0.0.0.0 area 0A(config-router)# ExitA(config)# ExitA# Show IP Route

C 10.0.0.0/8 is directly connected, Serial0/0C 20.0.0.0/8 is directly connected, Serial0/1O 172.16.0.0/16 [110/65] via 20.0.0.2, 00:00:20, Serial0/1C 192.168.0.0/24 is directly connected, FastEthernet0/0O 192.168.1.0/24 [110/65] via 10.0.0.2, 00:02:03, Serial0/0

A# Ping 10.0.0.2 !!!!!

Page 48: Final CCNA Notes

Success rate is 100 percent (5/5), round-trip min/avg/max=32/38/56

A# Ping 20.0.0.2 !!!!!Success rate is 100 percent (5/5), round-trip min/avg/max=32/38/56

Second Router

B> EnableB # Configuration TerminalB(config)# Router OSPF 1 (Range 1 to 65335) B (config-router)# Network 10.0.0.2 0.0.0.0 area 0B (config-router)# Network 192.168.1.1 0.0.0.0 area 0B (config-router)# ExitB(config)# ExitB # Show IP Route

C 10.0.0.0/8 is directly connected, Serial0/0O IA 20.0.0.0/8 [110/128] via 10.0.0.1, 00:03:02, Serial0/0O IA 172.16.0.0/16 [110/129] via 10.0.0.1, 00:03:02, Serial0/0O 192.168.0.0/24 [110/65] via 10.0.0.1, 00:03:02, Serial0/0C 192.168.1.0/24 is directly connected, FastEthernet0/0

B# Ping 10.0.0.1 !!!!!Success rate is 100 percent (5/5), round-trip min/avg/max=32/38/56

B# Ping 20.0.0.1 !!!!!Success rate is 100 percent (5/5), round-trip min/avg/max=32/38/56

Third Router

C> EnableC # Configuration TerminalC(config)# Router OSPF 1 (Range 1 to 65335) C (config-router)# Network 20.0.0.2 0.0.0.0 area 1C (config-router)# Network 172.16.0.1 0.0.0.0 area 1C (config-router)# ExitC(config)# ExitC # Show IP Route

O IA 10.0.0.0/8 [110/128] via 20.0.0.1, 00:22:49, Serial0/1C 20.0.0.0/8 is directly connected, Serial0/1C 172.16.0.0/16 is directly connected, FastEthernet0/0O IA 192.168.0.0/24 [110/65] via 20.0.0.1, 00:22:49, Serial0/1O IA 192.168.1.0/24 [110/129] via 20.0.0.1, 00:22:49, Serial0/1

C# Ping 10.0.0.1 !!!!!Success rate is 100 percent (5/5), round-trip min/avg/max=32/38/56

C# Ping 10.0.0.2

Page 49: Final CCNA Notes

!!!!!Success rate is 100 percent (5/5), round-trip min/avg/max=32/38/56

“O A1” character is representing multiple area configuration OSPF protocol entry

What is the difference between Broad cast & flooded cast?

Flooded cast can be also multicast.

If we finish all the ip routing the we will type that command

C(config)#No IP Routing C(config)#No OSPF 1

Difference between Distance Vector & Link State

Distance Vector RIP(Routing Information Protocol) ver 1 IGRP(Interior Gateway Routing Protocol)

Link State OSPF(Open Shortest Path First)IS-IS(Intermediate System to Intermediate System)

1) Neighbor to Neighbor (Slow) 1) Information in Flooded (Fast)2) Complete Routing table exchange No Hallow Packet Sent Slow Convergence Small Network

2) Only Incremental & Decremental Updates Hallow Packets Sent Band Width Fast Convergence Big Network

3) Calssfull(Sent only Net ID’s) No Support of Subnatting

3) Classless(Sent Net ID’s & Subnet Mask) Support of Subnatting

4) Routing Loops is exist 4) Routing Loops is not exist