CIS 192 - Module 11 - Build a Small Network(1) (6)
CIS 192 - Module 11 - Build a Small Network(1) (6)
Introduction to
Networking Introduction to
Networks v6 Companion
Module 11 Guide
Fall
2024
Module Objectives
Module Objective: Implement a network design for a small network to include a router, a switch, and
end devices.
Small Network Applications and Protocols Identify the protocols and applications used in a small network.
Scale to Larger Networks Explain how a small network serves as the basis of larger networks.
Use the output of the ping and tracert commands to verify connectivity
Verify Connectivity
and establish relative network performance.
Use host and IOS commands to acquire information about the devices
Host and IOS Commands
in a network.
2
Small Network Topologies
4
IP Addressing
• Plan, create and implement a unique IP
addressing scheme for all network
devices.
• Document and maintain the IP
addressing scheme by device type for
easier identification and troubleshooting.
5
Redundancy in a Small Network
6
Remote Access
• Network administrators may
require remote access to network
devices and servers.
• The common remote access
solutions are Telnet and Secure
Shell (SSH).
• SSH is a secure alternative to
Telnet.
• Network device & Server must
support SSH
7
Remote Access
Enable Telnet client
Try
• telnet towel.blinkenlights.nl
• telnet freechess.org 5000
8
Applications and protocols
• Prefer secure protocols (e.g.,
SSH, SFTP, HTTPS) for better
security.
9
Real-Time Applications and Traffic Management
Examples: VoIP, IP Telephony
• IP Telephony uses dedicated servers for call management.
• VoIP offers cost savings but may compromise quality.
Growth Alignment:
• Network must grow alongside business.
• Timely decisions by the network administrator are essential.
11
Protocol Analysis
• Determine traffic flow patterns
and Network Utilization:
• Capture traffic during peak
times for accurate data.
• Analyze various network
segments as traffic may differ.
• Evaluate traffic based on
source, destination, and type.
• Utilize findings to optimize
traffic management.
• A simple protocol analyzer such
as Wireshark can be used
12
Verify Connectivity - Ping
• Ping command, Internet Control Message Protocol (ICMP)
• Extended Ping: allows the administrator to adjust parameters related to the command
13
Verify Connectivity - Traceroute
• Traceroute can help locate Layer 3 problem areas in a
network.
• Extended traceroute allows the administrator to adjust
parameters related to the command operation
14
Network Baseline
• Establish a network baseline for monitoring and troubleshooting performance.
• Start by saving results from commands (ping, trace) in timestamped text files.
• Record error messages and response times for host comparisons.
• Corporate networks require extensive baselines; consider professional software tools for
management.
15
Troubleshooting Methodologies - Basic Troubleshooting Approaches
Step Description
Step 3. Test the Theory to •Apply a quick fix to test and see if it solves the problem.
Determine Cause •If a quick fix does not correct the problem, research the problem further
Step 4. Establish a Plan of Action Establish a plan of action to resolve the problem and implement the
and Implement the Solution solution.
Step 5. Verify Solution and •After you have corrected the problem, verify full functionality.
Implement Preventive Measures •If applicable, implement preventive measures.
16
Troubleshooting Methodologies - Resolve or Escalate?
17
Troubleshooting Scenarios
•Duplex Operation and Mismatch
• Requirement: Ethernet interfaces should match duplex modes (full vs. half).
• Mismatch Effects: Communication continues, but performance degrades.
• Autonegotiation: Minimizes misconfigurations by selecting the best link performance.
18
Troubleshooting Scenarios
•Default Gateway Issues
• Function: The gateway forwards traffic to remote networks.
• Causes: Misconfiguration or DHCP failures.
• Verification:
• Windows: Use ipconfig.
• Router: Use show ip route to check the routing table.
•DNS Troubleshooting
• Common Mistakes: Users may confuse DNS issues with internet connectivity.
• DNS Server Assignment: Can be manual or through DHCP.
• Verification:
• Windows: Use ipconfig /all to see the DNS server.
• Command-Line Tool: Use nslookup for DNS queries and responses.
• OpenDNS: Cisco's secure DNS service (208.67.222.222, 208.67.220.220).
19
Activity
http://digitalsqewlets.ca/stames/languages-langues-eng.php )
Host and IOS Commands - Revisited
•IP Configuration on Windows Host
• Access IP settings via Network and Sharing Center or run ipconfig command.
• Use ipconfig /all to view MAC address and Layer 3 details.
• For DHCP clients, renew IP with ipconfig /release and ipconfig /renew.
• Utilize ipconfig /displaydns to view cached DNS entries.
21
Host and IOS Commands - Revisited
22
Host and IOS Commands - Revisited
Common show Commands
Command Description
show running-config Verifies the current configuration and settings
show interfaces Verifies the interface status and displays any error
messages
show ip interface Verifies the Layer 3 information of an interface
show ip interface brief provides a summary of the key information for all the
network interfaces on a router
show arp Verifies the list of known hosts on the local Ethernet LANs
show ip route Verifies the Layer 3 routing information
show protocols Verifies which protocols are operational
show version Verifies the memory, interfaces, and licenses of the device
23
Host and IOS Commands - Revisited
The show cdp neighbors command provides the following information about each CDP
neighbor device:
• Device identifiers - The configured host name of a switch, router, or other device
• Address list - Up to one network layer address for each protocol supported
• Port identifier - The name of the local and remote port in the form of an ASCII character
string, such as FastEthernet 0/0
• Capabilities list - Whether a specific device is a Layer 2 switch or a Layer 3 switch
• Platform - The hardware platform of the device.
24
Host and IOS Commands - The debug Command
• Function: Displays OS processes, protocols, and event messages in real-time.
• Access: Entered in privileged EXEC mode.
• Usage: Only for troubleshooting specific issues.
• Use debug ? to view command options.
• You can narrow output to relevant features or sub-features.
• Disable a specific debugging feature: Use no debug or undebug .
• Turn Off All: Use undebug all.
25