CCNA Day1 Note 11th Nov 2023
CCNA Day1 Note 11th Nov 2023
What is Networking ?
1. Speed
2. Cost effective
3. Reliability
4. Scaleabe( A network size can be inscrease
accourding to the demand. )
Types of Network
1. Sender.
2. Receiver.
3. Media.
4. Data.
5. Protocol.
Types of communication
1111.2222.3333.4444
11.11.22.22.33.33.44.44
IP Address
It is a 32 bits address.
CLASS A: 0-127
CLASS B: 128-191
CLASS C: 192-223
CLASS D: 224-239
CLASS E: 240-255
Router
A router is used to connect two or more different networks.
Router work on full-duplex.
A router has per post B.D and per port C.D.
Router maintains routing table where they kept best path to
reach from one network to another network
Memory of router
1. RAM:-
3. NVRAM:-
User mode
privilage/enable mode
global configuration mode
interface mode
rommon mode
Basic command of a router
Command to change hostname of router
router(config)#hostname ----
Rommon>confreq 0x2142
OSI Model
Open system interconnection model
ISO( International standard organization ) developed
OSI Model in 1980.
APPLICATION LAYER
PRESENTATION LAYER
SESSION LAYER
TRANSPORT LAYER
NETWORK LAYER
DATA LINK LAYER
PHYSICAL LAYER
Application layer:-
Application layer acts as an interface between user and
the actual application.
This layer tell us that an application is internet based or
not.
There are various services like wave service, file
service,remote access service,time service,mail
service,etc are used at this layer.
These services are access with the help of some
protocols like http,tftp,https,telnet,ssh,smtp,ftp,DNS ect
App developer degin these protocol.
Presentation Layer
Server
https 443
ftp 21
Computer
https-443
Well known (0-1024)
Unknown (1025-65535)
Transport Layer
Retransmit YOU
TCP is Reliable protocol:-
TCP is a reliable protocol because every device which is
receiving traffic will send acknowledgment to the sender
that i had receive the traffic.
Flow control:-
Sender Receiver
Client
Least Buffer memory = window size =700 bytes
100 bytes
Acknowledgement
4 way handshake:-
It is used to terminate connection
Fin
Sender
Receiver
Ack
Fin
Ack
Network Layer
7 Data
6 Data
5 Data
4 Segment
3 Packet
2 Frame
1 Bits
Encapsulation and Decapsulation in OSI Model
TCP/IP Model
Application Layer
Transport Layer
Internet Layer
Data link Layer
Physical Layer
TCP Header :-
32 bits
Source Port Destination Port
Sequence Number
Acknowledgement Number
H.L RSV Flags Window Size
Checksum Urgent Point
Option
Source Port:- This is a 16 bits value that specifies the port number of
the sender.
Destination Port:-This is a 16 bits value that specifies the port number
of the receiver.
Sequence Number:- A number used by TCP that puts the data back in
in the correct order or retransmits missing data during a process called
sequencing.
Acknowledgment number:- The value is the TCP octet that is expected
next.
Header Length:- It is the size of TCP header,which indicates where the
data begins.(Bydefault size is 20 bytes).
Reserved:- it always set to zero.
Flags:- it is a control functions which is used to set up and terminate a
session.(There are 8 flags in TCP header)
Window Size:- This field negotiates the Buffer memory of
the interface.
Checksum:- This field is use to find error in the TCP
header.
Urgent Point:-It is used to send traffic urgently.
Option:- It is a optional field.
UDP Header :-
32 bit
IP Header :-
32 bit
Version Header Priority and
Total Length(16)
(4) Length(4) TOS(8)
Source ip address(32)
Option
Data
Version :- This field tells us which IP version we are using.
Header Length :- This 4 bits field tells us the length of the IP header.
Types of service:- This is used for QoS(Quality of service).
Total Length:-This field indicates the entire size of the IP Packet
include data and header.
Identification:-If the IP packet is fragmented then each fragmented
packet will use the same 16 bit identification number to identify to
which IP packet they belong to.
IP Flags:- These 3 bits are used for fragmentation.
The first bit is always 0.
The second bit is called the DF(Don't Fragment) bit.
The last bit is called the MF(More Fragments) bit and set on all
fragmented packets except the last one.
Fragment offset:- This 13 bit field specifies the position of
the original fragmented IP packet.
Time to Live:- Everytime an IP Packet passes through a
router, the time to live field is decremented by 1. Once it
hits 0 the router will drop the packet.
Protocol:- This field tells us which protocol is encapsulated
in the IP packet, for example TCP has value 6 and UDP has
value 17.
Segmentation Fregmentation
Dividing a big data into small part Dividing a big data into small part as
is known as segmentation. known as fregmentation.
It is done at layer-4. It is done at layer-3.
It is done with the help of MSS. It is done with the help of MTU.
MTU=1500.
MSS=1460.
Fragmentation is done for layer-3
Segmentation is done for layer-7
traffic.
or layer-4 traffic.
Application Layer Protocol:-
HTTP ( Hypertext transfer protocol )
Port number=80
use TCP at the transport layer
It is used to access wave page from the wave server
It is not a secure protocol
CLASS
CIDR
A /8
B /16
C /24
x
Number of network= 2
Where x is the number of network bits goes in host bit.
Block Size = 256-Subnet mask of that octet which have last 1s.
Block size tells us from where the next network will start.
H
No. of valid host = 2 -2