This tutorial gives very good understanding on Computer Networks After completing this tutorial,You will find yourself at a moderate level of expertise in knowing Advance Networking(CCNA), from where you can take yourself to next levels.
The document is a candidate evaluation form used to assess an applicant's qualifications for a position. It contains sections to rate the applicant on their general background, technical competency, people and leadership skills, behaviors and habits, and overall impression. Evaluators are asked to assign numeric values between 1 and 5 corresponding to whether the applicant exceeds, meets, or is below expectations for the position. Space is provided to comment on the applicant's suitability and recommend whether to hire, interview for another role, or reject them.
1) DWDM combines multiple optical signals so that they can be amplified and transmitted over a single fiber, increasing network capacity.
2) Basic DWDM system components include terminal multiplexers and demultiplexers, line repeaters, and optical terminals. Optical add-drop multiplexers allow removal or insertion of wavelengths along the span.
3) Proper link budgeting is required to ensure optical power levels remain above minimum thresholds to maintain signal quality as light propagates long distances through fiber. Regular monitoring and troubleshooting helps ensure transmission quality parameters are met.
1. The document discusses the decimal and binary number systems.
2. The decimal system uses 10 symbols (0-9) and has a base of 10, while the binary system uses two symbols (0 and 1) and has a base of 2.
3. Binary code is made up of only zeros and ones and forms the basis for computer processors and digital text.
Introduction to Artificial Intelligence.pptxRSAISHANKAR
My name is R. Sai Shankar. In here, I'm publish a small PowerPoint Presentation on Artificial Intelligence. Here is the link for my YouTube Channel "Learn AI With Shankar". Please Like Share Subscribe. Thank you.
https://youtu.be/3N5C99sb-gc
IP addressing and subnetting allows networks to be logically organized and divided. The key objectives covered include explaining IP address classes, configuring addresses, subnetting networks, and advanced concepts like CIDR, summarization, and VLSM. Transitioning to IPv6 is also discussed as a way to address the depletion of IPv4 addresses and improve security.
This document provides an overview of various topics related to the network layer, including IPv4, IPv6, ARP, RARP, mobile IP, routing algorithms, and routing protocols. It begins with basics of IPv4 such as its addressing scheme and role in interconnecting networks. IPv6 is then introduced, along with reasons for its development and key features like its large 128-bit addresses. Address Resolution Protocol (ARP) and Reverse ARP (RARP) are also covered. The document concludes by discussing routing algorithms like link-state and distance-vector, as well as protocols including RIP, OSPF, and BGP.
The application layer allows users to interface with networks through application layer protocols like HTTP, SMTP, POP3, FTP, Telnet, and DHCP. It provides the interface between applications on different ends of a network. Common application layer protocols include DNS for mapping domain names to IP addresses, HTTP for transferring web page data, and SMTP/POP3 for sending and receiving email messages. The client/server and peer-to-peer models describe how requests are made and fulfilled over the application layer.
This document discusses Cisco Certified Network Associate (CCNA) certification and networking concepts. It includes:
- An overview of the CCNA certification and what skills it demonstrates in networking areas like LANs, WANs, routing protocols, and network access.
- Explanations of common networking devices, topologies, protocols like IP addressing and routing, and models like the OSI model.
- Descriptions of static and dynamic routing, protocols like RIP, OSPF, EIGRP, and commands used to configure routers.
This document discusses different types of firewalls and how they work. It begins by explaining that firewalls come in many shapes and sizes, and sometimes a firewall is a collection of computers. All communication must pass through the firewall. It then discusses packet filters, stateful packet inspection engines, application gateways, and circuit-level gateways. Packet filters use transport layer information like IP addresses and port numbers to filter traffic. Stateful packet filters track client-server sessions to match return packets. Application gateways run proxy programs that filter traffic at the application layer. Circuit-level gateways filter traffic at the circuit level. A combination of these is known as a dynamic packet filter. The document also discusses additional firewall functions like network address
IPsec provides the capability to secure communications across a LAN, across private and public WANs, and across the Internet. Examples of its use include:
Secure branch office connectivity over the Internet
Secure remote access over the Internet
Establishing extranet and intranet connectivity with partners
Enhancing electronic commerce security
This document provides an overview of networking concepts including routing protocols. It begins with an introduction and explanation of common networking terms like routers, switches, servers and IP addressing. The document then focuses on routing protocols, describing different types like static, default, dynamic routing protocols and examples like RIP, EIGRP, OSPF. It provides details on each protocol's functionality and purpose in routing network traffic between devices.
This document provides information about Cisco and the CCNA certification. It discusses Cisco as a company and their networking products. The CCNA certification focuses on routing, switching, security, service provider, and voice communication skills. The CCNA exam contains questions in drag and drop and simulation formats. The document also summarizes different types of computer networks, common networking devices, cable types, topologies and more.
Networking devices like hubs, switches, routers, and gateways interconnect networks and manage data flow. Hubs operate at the physical layer and connect segments but do not filter traffic. Switches operate at the data link layer and can direct traffic to specific ports for better performance than hubs. Routers operate at the network layer and can connect networks across LANs, MANs, and WANs using IP addressing to route packets. Gateways can operate at multiple layers and act as connections between different network protocols or applications.
The document provides an overview of Border Gateway Protocol (BGP) which is the routing protocol used to exchange routes between institutions and the KAREN network. BGP allows different autonomous systems (AS) to exchange routing information and is more than just a routing protocol as it contains additional route attributes that are used for policy rules. BGP can operate internally within an AS or externally between ASes to control route propagation based on commercial agreements.
Routers connect different computer networks and forward data packets between them by reading the address information in each packet to determine the ultimate destination. A router contains a routing table with information about connected networks and uses this to determine the best path for packets to travel through multiple networks to reach their destination. There are two main types of routers: core routers connect different cities while edge routers connect users and hosts to networks.
This document discusses various network devices and their functions. It describes repeaters, routers, brouters, hubs, switches, bridges, network interface cards (NICs), and gateways. Repeaters operate at the physical layer and regenerate signals to extend network distance. Routers operate at multiple layers and direct traffic between networks by maintaining routing tables. Bridges separate networks into segments to reduce congestion. Switches operate at the data link layer to limit collision domains. NICs connect devices to the network. Gateways connect different network types and protocols.
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
This document provides an overview of basic switching concepts and Cisco switch configuration. It explains Ethernet and how switches work to segment networks and reduce collisions. Switches operate at the data link layer and learn MAC addresses to forward frames efficiently. The document discusses switch configuration using commands like hostname, interface, duplex, and port security. It compares switching methods like store-and-forward and cut-through forwarding. The summary reiterates how switches divide collision domains to improve performance over shared-medium Ethernet.
This document discusses several common networking devices and their functions. It describes hubs, switches, bridges, routers, gateways, CSU/DSUs, NICs, ISDN adapters, modems, and firewalls. Hubs broadcast traffic to all ports, wasting bandwidth, while switches only forward frames to their destination port. Bridges operate at the data link layer and routers at the network layer. Gateways perform protocol translation. NICs connect devices to the network. Modems convert digital to analog signals for transmission over phone lines. Firewalls control network access for security.
NAT is used to translate private IP addresses to public IP addresses to allow access to the internet. There are different types of NAT including static NAT for one-to-one mapping, dynamic NAT for mapping multiple private addresses to public addresses from a pool, and NAT overload/PAT which maps multiple private addresses to a single public address using port addressing. The document provides configuration examples for static, dynamic, and overload NAT on a Cisco router.
The document describes the TCP 3-way handshake process used to establish a connection between a client and server in a TCP/IP network. It involves 3 steps: 1) the client sends a SYN packet to the server, 2) the server responds with a SYN-ACK packet to acknowledge the client's SYN and identify its own sequence number, and 3) the client sends an ACK packet to the server to acknowledge receiving the SYN-ACK and complete the handshake process, allowing data transfer to begin.
Routing is the process of selecting a path for traffic in a network or between or across multiple networks. this slide helps to describe routing protocols and their various aspects.
RIP (Routing Information Protocol) is a standard routing protocol that exchanges routing information between gateways and hosts. It works by limiting routes to a maximum of 15 hops to prevent routing loops. There are three versions of RIP: RIP version 1 supports only classful routing; RIP version 2 adds support for VLSM and authentication; and RIPng extends RIP version 2 to support IPv6. RIP has limitations such as a small hop count limit and slow convergence times. It is commonly implemented in Cisco IOS, Junos, and open source routing software.
Pgp-Pretty Good Privacy is the open source freely available tool to encrypt your emails then you can very securely send mails to others over internet without fear of eavesdropping by cryptanalyst.
The document discusses IP addresses and the differences between IPv4 and IPv6. It defines what an IP address is and explains the classes of IPv4 addresses including Class A, B, C, D and E. It also defines IPv6, noting it uses 128-bit addresses represented by 8 groups of hexadecimal digits separated by colons. The key differences between IPv4 and IPv6 are that IPv4 uses 32-bit addresses in dot-decimal notation while IPv6 uses 128-bit addresses in hexadecimal colon-separated notation and has a much larger address space.
Overview of IP routing protocols, packet forwarding and proxy ARP.
The principle of IP routing proved to be very flexible and scalable in the growth of the Internet and TCP/IP based networks.
IP routing denotes protocols for exchanging IP address range reachability like RIP, BGP and OSPF.
In contrast to IP routing, IP packet forwarding collectively means all functions performed when an IP router receives a packet and forwards it over the output interface indicated by an IP route in the routing table.
When an IP router performs a route lookup, it calculates a route decision based on different properties like prefix (mask) length, route precedence and metrics.
Routing protocols for exchanging route information can be coarsely classified as distance vector and link state protocols. Distance vector protocols like RIP (Routing Information Protocol) exchange information about the path cost to specific targets (IP address ranges). Routers that talk distance vector protocols receive reachability information about all sub-networks indirectly from neighboring routers.
In contrast to distance vector protocols, link state protocols like OSPF disseminate information about the link state of each router link in a network to all routers in the network. Thus link state protocols tend to converge faster to topology changes since all routers have firsthand information of the topology of the network.
Proxy ARP may be a convenient solution when it comes to add additional subnets without having to add routes to routers and hosts. A proxy ARP enabled router would answer ARP requests on behalf of the targeted hosts mimicking a local network access to the requesting host.
An overview of networking basics, building to more advanced networking techniques. Learn more about networking by subscribing to the Networking Motivator's weekly email at http://www.BethBridges.com
Dynamic routing protocols are used to automatically discover remote networks, maintain up-to-date routing information, and choose the best path to destination networks. There are two main types - interior gateway protocols (IGPs) like RIP, OSPF, and EIGRP that are used within an autonomous system, and exterior protocols like BGP that route between autonomous systems. IGPs use metrics like hop count or bandwidth to determine the best path. OSPF is a link-state protocol that floods link information, while EIGRP uses DUAL algorithm and maintains topology tables for fast convergence.
This document discusses Cisco Certified Network Associate (CCNA) certification and networking concepts. It includes:
- An overview of the CCNA certification and what skills it demonstrates in networking areas like LANs, WANs, routing protocols, and network access.
- Explanations of common networking devices, topologies, protocols like IP addressing and routing, and models like the OSI model.
- Descriptions of static and dynamic routing, protocols like RIP, OSPF, EIGRP, and commands used to configure routers.
This document discusses different types of firewalls and how they work. It begins by explaining that firewalls come in many shapes and sizes, and sometimes a firewall is a collection of computers. All communication must pass through the firewall. It then discusses packet filters, stateful packet inspection engines, application gateways, and circuit-level gateways. Packet filters use transport layer information like IP addresses and port numbers to filter traffic. Stateful packet filters track client-server sessions to match return packets. Application gateways run proxy programs that filter traffic at the application layer. Circuit-level gateways filter traffic at the circuit level. A combination of these is known as a dynamic packet filter. The document also discusses additional firewall functions like network address
IPsec provides the capability to secure communications across a LAN, across private and public WANs, and across the Internet. Examples of its use include:
Secure branch office connectivity over the Internet
Secure remote access over the Internet
Establishing extranet and intranet connectivity with partners
Enhancing electronic commerce security
This document provides an overview of networking concepts including routing protocols. It begins with an introduction and explanation of common networking terms like routers, switches, servers and IP addressing. The document then focuses on routing protocols, describing different types like static, default, dynamic routing protocols and examples like RIP, EIGRP, OSPF. It provides details on each protocol's functionality and purpose in routing network traffic between devices.
This document provides information about Cisco and the CCNA certification. It discusses Cisco as a company and their networking products. The CCNA certification focuses on routing, switching, security, service provider, and voice communication skills. The CCNA exam contains questions in drag and drop and simulation formats. The document also summarizes different types of computer networks, common networking devices, cable types, topologies and more.
Networking devices like hubs, switches, routers, and gateways interconnect networks and manage data flow. Hubs operate at the physical layer and connect segments but do not filter traffic. Switches operate at the data link layer and can direct traffic to specific ports for better performance than hubs. Routers operate at the network layer and can connect networks across LANs, MANs, and WANs using IP addressing to route packets. Gateways can operate at multiple layers and act as connections between different network protocols or applications.
The document provides an overview of Border Gateway Protocol (BGP) which is the routing protocol used to exchange routes between institutions and the KAREN network. BGP allows different autonomous systems (AS) to exchange routing information and is more than just a routing protocol as it contains additional route attributes that are used for policy rules. BGP can operate internally within an AS or externally between ASes to control route propagation based on commercial agreements.
Routers connect different computer networks and forward data packets between them by reading the address information in each packet to determine the ultimate destination. A router contains a routing table with information about connected networks and uses this to determine the best path for packets to travel through multiple networks to reach their destination. There are two main types of routers: core routers connect different cities while edge routers connect users and hosts to networks.
This document discusses various network devices and their functions. It describes repeaters, routers, brouters, hubs, switches, bridges, network interface cards (NICs), and gateways. Repeaters operate at the physical layer and regenerate signals to extend network distance. Routers operate at multiple layers and direct traffic between networks by maintaining routing tables. Bridges separate networks into segments to reduce congestion. Switches operate at the data link layer to limit collision domains. NICs connect devices to the network. Gateways connect different network types and protocols.
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
This document provides an overview of basic switching concepts and Cisco switch configuration. It explains Ethernet and how switches work to segment networks and reduce collisions. Switches operate at the data link layer and learn MAC addresses to forward frames efficiently. The document discusses switch configuration using commands like hostname, interface, duplex, and port security. It compares switching methods like store-and-forward and cut-through forwarding. The summary reiterates how switches divide collision domains to improve performance over shared-medium Ethernet.
This document discusses several common networking devices and their functions. It describes hubs, switches, bridges, routers, gateways, CSU/DSUs, NICs, ISDN adapters, modems, and firewalls. Hubs broadcast traffic to all ports, wasting bandwidth, while switches only forward frames to their destination port. Bridges operate at the data link layer and routers at the network layer. Gateways perform protocol translation. NICs connect devices to the network. Modems convert digital to analog signals for transmission over phone lines. Firewalls control network access for security.
NAT is used to translate private IP addresses to public IP addresses to allow access to the internet. There are different types of NAT including static NAT for one-to-one mapping, dynamic NAT for mapping multiple private addresses to public addresses from a pool, and NAT overload/PAT which maps multiple private addresses to a single public address using port addressing. The document provides configuration examples for static, dynamic, and overload NAT on a Cisco router.
The document describes the TCP 3-way handshake process used to establish a connection between a client and server in a TCP/IP network. It involves 3 steps: 1) the client sends a SYN packet to the server, 2) the server responds with a SYN-ACK packet to acknowledge the client's SYN and identify its own sequence number, and 3) the client sends an ACK packet to the server to acknowledge receiving the SYN-ACK and complete the handshake process, allowing data transfer to begin.
Routing is the process of selecting a path for traffic in a network or between or across multiple networks. this slide helps to describe routing protocols and their various aspects.
RIP (Routing Information Protocol) is a standard routing protocol that exchanges routing information between gateways and hosts. It works by limiting routes to a maximum of 15 hops to prevent routing loops. There are three versions of RIP: RIP version 1 supports only classful routing; RIP version 2 adds support for VLSM and authentication; and RIPng extends RIP version 2 to support IPv6. RIP has limitations such as a small hop count limit and slow convergence times. It is commonly implemented in Cisco IOS, Junos, and open source routing software.
Pgp-Pretty Good Privacy is the open source freely available tool to encrypt your emails then you can very securely send mails to others over internet without fear of eavesdropping by cryptanalyst.
The document discusses IP addresses and the differences between IPv4 and IPv6. It defines what an IP address is and explains the classes of IPv4 addresses including Class A, B, C, D and E. It also defines IPv6, noting it uses 128-bit addresses represented by 8 groups of hexadecimal digits separated by colons. The key differences between IPv4 and IPv6 are that IPv4 uses 32-bit addresses in dot-decimal notation while IPv6 uses 128-bit addresses in hexadecimal colon-separated notation and has a much larger address space.
Overview of IP routing protocols, packet forwarding and proxy ARP.
The principle of IP routing proved to be very flexible and scalable in the growth of the Internet and TCP/IP based networks.
IP routing denotes protocols for exchanging IP address range reachability like RIP, BGP and OSPF.
In contrast to IP routing, IP packet forwarding collectively means all functions performed when an IP router receives a packet and forwards it over the output interface indicated by an IP route in the routing table.
When an IP router performs a route lookup, it calculates a route decision based on different properties like prefix (mask) length, route precedence and metrics.
Routing protocols for exchanging route information can be coarsely classified as distance vector and link state protocols. Distance vector protocols like RIP (Routing Information Protocol) exchange information about the path cost to specific targets (IP address ranges). Routers that talk distance vector protocols receive reachability information about all sub-networks indirectly from neighboring routers.
In contrast to distance vector protocols, link state protocols like OSPF disseminate information about the link state of each router link in a network to all routers in the network. Thus link state protocols tend to converge faster to topology changes since all routers have firsthand information of the topology of the network.
Proxy ARP may be a convenient solution when it comes to add additional subnets without having to add routes to routers and hosts. A proxy ARP enabled router would answer ARP requests on behalf of the targeted hosts mimicking a local network access to the requesting host.
An overview of networking basics, building to more advanced networking techniques. Learn more about networking by subscribing to the Networking Motivator's weekly email at http://www.BethBridges.com
Dynamic routing protocols are used to automatically discover remote networks, maintain up-to-date routing information, and choose the best path to destination networks. There are two main types - interior gateway protocols (IGPs) like RIP, OSPF, and EIGRP that are used within an autonomous system, and exterior protocols like BGP that route between autonomous systems. IGPs use metrics like hop count or bandwidth to determine the best path. OSPF is a link-state protocol that floods link information, while EIGRP uses DUAL algorithm and maintains topology tables for fast convergence.
A computer network connects computers and devices together through communication devices and transmission media. It allows sharing of resources like printers, files, data and information. There are three main types of networks - local area networks (LANs) within a small geographical area, metropolitan area networks (MANs) within a city, and wide area networks (WANs) across large areas like countries. Network architecture refers to the overall design of a computer network and describes how it is configured and what strategies are used. The two main architectures are client/server, where a server provides services to clients, and peer-to-peer where all computers have equal capabilities without a central server.
Department Of computer Application- Advanced computer network
Main office:
Remote locations
Branch offices:
Home offices:
Mobile users
Resource-Sharing Functions and Benefits
Network User Applications
Characteristics of a Network
Foundation
Advance Internet working
Congestion Control & Resource Allocation
Network Security
Symmetric Key Encryption
Cryptographic Building Blocks
This document provides an overview of networking fundamentals, including definitions of common network types like LANs and WANs. It describes network topologies like bus, star, and ring configurations. Communication protocols and hardware like hubs, routers, and firewalls are defined. The roles of gateways and modems in transmitting data are also summarized.
This tutorial gives very good understanding on Protocols.After completing this tutorial,You will find yourself at a moderate level of expertise in Protocols port Number.
This tutorial gives very good understanding on CCNA (VOIP). After completing this tutorial.You will find yourself at a moderate level of expertise in knowing Advance Networking(CCNA)
A computer network is defined as the interconnection of two or more computers. It is done to enable the computers to communicate and share available resources.
Components of computer network
Network benefits
Disadvantages of computer network
Classification by their geographical area
Network classification by their component role
Types of servers
The document discusses different types of computer network topologies. It defines network topology as the physical configuration of cables, computers, and other devices on a network. The key network topologies covered are bus, ring, star, and mesh. Advantages and disadvantages of each topology are summarized.
This document provides an overview of various computer networking concepts and components. It begins with definitions of networking basics like communications and telecommunications. It then describes the essential parts of a basic network including a message, transmitter, medium, receiver and destination. The document outlines different network topologies like bus, ring, star, star-bus and mesh. It also discusses network types like peer-to-peer and client-server networks. The document provides details on common networking media and components including coaxial cable, twisted pair cables, optical fibers, wireless transmission, hubs, gateways, routers, bridges and switches. It concludes with a brief introduction to the IEEE 802 family of standards related to local and metropolitan area networks.
This document discusses various networking devices used to connect electronic devices and share resources in a computer network. It describes network interface cards (NICs) that provide the physical interface between a computer and cabling. It also covers repeaters that regenerate signals to extend distances, modems that modulate and demodulate signals for internet connections, hubs and switches that connect multiple devices either by broadcasting or selectively forwarding, bridges that segment networks while filtering traffic, and routers that intelligently connect different network types and choose optimal paths between them. The document provides details on the function and layer (physical, data link, network) of operation for each type of networking device.
This document provides an introduction to routing and packet forwarding. It describes routers as computers that specialize in sending packets between networks by selecting the best path using routing tables. The document outlines router components, the boot-up process, interface types, and how routers examine packet headers to determine the best path and switch packets between incoming and outgoing interfaces. It also discusses topics like routing table structure, static and dynamic routing, path determination, and how packets are forwarded hop-by-hop between routers while headers are updated.
Routing protocols allow routers to communicate and exchange information that helps determine the best path between networks. The main types are static routing, where routes are manually configured, and dynamic routing, where routes are automatically updated as network conditions change. Common dynamic routing protocols include RIP, IGRP, EIGRP, and OSPF, which use different algorithms and metrics like hop count or bandwidth to calculate the best routes.
Networking involves connecting two or more computers or electronic devices to share information. The main advantages of networking are the ability to share files, hardware, websites and programs between devices. The main disadvantages include the risk of the entire system crashing if the network server fails and potential slowdowns from high network usage. Common network types are LANs which connect devices in a local area like a home or office, and WANs which connect multiple LANs over a wider area. Key networking hardware includes servers to store and share information, workstations to access the server, and switches, routers and other devices to facilitate communication between devices on the network.
The document introduces computer networking concepts including definitions, advantages, disadvantages, classifications and topologies. It defines a network as connecting computers to share resources. Local area networks connect computers in a small area like a building, while wide area networks connect LANs across cities/countries. Key networking hardware includes network interface cards, repeaters, hubs, bridges, routers and switches.
20 common port numbers and their purposes salamassh
This document lists 20 common port numbers and their associated protocols, providing brief descriptions of each. It covers protocols for file transfer (FTP, SSH, Telnet), email (SMTP, POP2/3, IMAP), networking (DNS, BOOTP/DHCP, HTTP, SQL, SMB/CIFS, LDAP, NFS), and secure variants (HTTPS). The port numbers, protocol names and basic functions are provided for each entry.
This short document promotes creating presentations using Haiku Deck on SlideShare. It encourages the reader to get started making their own Haiku Deck presentation by simply clicking the "GET STARTED" prompt. The document is brief and aims to inspire the reader to try making presentations on the Haiku Deck platform hosted through SlideShare.
Distance vector routing is an algorithm where each node maintains a routing table with the distances to all other nodes and shares this table periodically with its neighbors. Nodes initially only know the cost to directly connected neighbors and update their tables based on information received, potentially leading to a "count to infinity" problem if routes oscillate. Solutions include using split horizon to not pass back the source of a route and poison reverse to mark such routes as infinite. RIP is an implementation of distance vector routing that shares updates every 30 seconds.
CCNA 1 Routing and Switching v5.0 Chapter 2Nil Menon
This document provides an overview of configuring a Cisco IOS network operating system. It discusses accessing and navigating the Cisco IOS using the command line interface, including setting hostnames, limiting access using passwords, and saving configurations. It also covers basic networking concepts like addressing schemes and verifying connectivity between devices.
ccna project on topic company infrastructurePrince Gautam
Prince Gautam submitted a presentation on CCNA that introduces CCNA and networking. It defines CCNA, describes the importance of networking for communication and resource sharing. It also summarizes different types of networking including LAN, MAN, WAN and common networking devices like hubs, switches, routers. The presentation further explains concepts like subnetting, supernetting, routing protocols like RIP, EIGRP, OSPF and basic router configuration.
Routers forward data packets between networks while switches operate at the data link layer and forward packets within a local area network. Hubs simply broadcast all incoming data to all ports. The document provides answers to common CCNA interview questions about networking fundamentals like IP addressing, routing, switching, protocols and Cisco router components.
The document provides an overview of the CCNA certification and covers topics like internetworking, IP addressing, routing protocols, Cisco IOS, and more. It begins with an introduction to computer networks and protocols. Then it discusses the OSI reference model, IP addressing fundamentals, routing protocols like RIP, IGRP, EIGRP and OSPF, Cisco IOS configuration, and IP routing. The document serves as a study guide for CCNA exam topics at a high level.
The document provides an overview of IT network design and installation topics covered in a MaxWiFi training course, including network models, IP addressing, NAT, routing, DHCP, VLANs, wireless networking, and Cisco device configuration.
CCNA stands for Cisco Certified Network Associate. Routers are networking devices that direct data packets to their destination. Routers use routing protocols like RIP to share information and determine the best paths between networks. Access control lists (ACLs) allow routers to filter traffic and restrict access to networks for security purposes. Network Address Translation (NAT) allows multiple devices to share public IP addresses to communicate on the Internet.
Protocols And IP suite PPT
Contents are
History
TCP/IP Suite Layer
a} Network Interface
b} Internet Layer
c} Transport Layer
d} Application Layer
3.Comparison of OSI and IP
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...Tarun Khaneja
This document provides a summary of a presentation on CCNA (Cisco Certified Network Associate). It was trained by Ravinder Kumar from Gurukul Technical Institute and submitted by Tarun Khaneja with roll number 2110045 and contact number 09034406598. The presentation introduces CCNA and discusses networking types and applications. It also covers networking devices, subnetting, routing protocols like RIP, EIGRP, OSPF, ACLs, VLANs, and inter-VLAN routing. Configuration examples are provided for EIGRP and RIP routing on the same network.
TCP/IP is a communication protocol suite that includes TCP, IP, and other protocols used to interconnect devices on the internet and private networks. TCP/IP functions as an abstraction layer and is divided into four layers: the application layer, transport layer, internet layer, and physical/link layer. The transport layer maintains end-to-end communications using TCP or UDP. The internet layer routes packets between networks using IP. The physical layer operates on a local link using protocols like Ethernet. Network devices can be assigned addresses statically, through configuration, or dynamically assigned by a server.
This presentation summarizes the Cisco Certified Network Associate (CCNA) certification and covers networking concepts relevant to the CCNA including networking devices, the OSI model, IP addressing, routing, access lists, network address translation, switches, virtual LANs, WAN connection types, wireless technology, and comparisons of 802.11 wireless standards.
The document discusses DHCP, NAT, and forwarding of IP packets. It begins by explaining DHCP and how DHCP servers dynamically assign IP addresses and network configuration parameters to devices on a network. It then covers network address translation, how NAT allows private IP addresses to be mapped to public IP addresses. The document concludes by discussing how routers forward IP packets based on the destination address, and methods for routing tables and longest prefix matching to determine the appropriate path for packet forwarding.
The document discusses network design using TCP/IP. It covers IP addressing, subnet masks, default gateways, and subnetting. It also discusses network security methods like IP packet filtering, encryption, authentication, and IPSec. Optimizing the subnet design, IP performance, remote subnets, and quality of service can create an effective network infrastructure.
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Vanitha Joshi
This document discusses implementing an IPsec VPN on Cisco routers and ISPs. It begins with introductions to TCP/IP concepts like layers, IP, and TCP. It then discusses existing VPN implementation methods and proposes using IPsec VPN. IPsec provides authentication and encryption of IP packets to secure communications. The document outlines the TCP/IP internet architecture including layers, IP, and protocols. It provides details on IP datagram format and fields. Finally, it discusses network topologies like bus, ring, and star, and components like hubs, switches, routers, and gateways.
This document provides a summary of a presentation on CCNA (Cisco Certified Network Associate). It includes:
1. An introduction to CCNA, which stands for Cisco Certified Network Associate and provides information about networking, its types and applications. Networking is important for communication and resource sharing.
2. Descriptions of different types of networking including LAN, MAN, and WAN. It also lists common networking devices like LAN cards, bridges, hubs, switches, and routers.
3. Overviews of topics covered in CCNA including subnetting, supernetting, Classless Interdomain Routing (CIDR), the differences between hubs and switches, what routers are used for,
Computer networks - CBSE New Syllabus (083) Class - XIIDeepak Singh
The document provides information on various computer networking concepts. It defines Internet of Things (IoT) and discusses the differences between public and private clouds. It also describes wired and wireless networks, the roles of clients and servers, and common networking hardware like NICs, switches, routers and access points. The document further explains networking protocols and standards such as IP versions, DNS, URLs, modulation techniques, and communication protocols like HTTP, FTP, SMTP and more.
Basic Introduction to Technology (networking).pdftthind
The document provides an overview of networking concepts and components. It begins with basic definitions of networks and networking. It then describes common networking devices like hubs, switches, routers, and network cards. It covers networking cables, IPv4 addressing, routing protocols like RIP and EIGRP, redistribution between protocols, ACLs, NAT, VPN tunnels, and Frame Relay. It concludes with an example implementation of a VPN tunnel between two routers.
This document provides an overview of the TCP/IP model created by the Department of Defense (DoD) and compares it to the OSI reference model. The DoD model consists of four layers - Process/Application, Host-to-Host, Internet, and Network Access - which correspond to a condensed version of the seven-layer OSI model. The document describes the functions of each layer and some of the key protocols that operate at each layer, such as TCP, IP, ARP, and Ethernet. It also covers topics like IP addressing, private vs public addresses, broadcast vs unicast traffic, and network access technologies.
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveScyllaDB
Want to learn practical tips for designing systems that can scale efficiently without compromising speed?
Join us for a workshop where we’ll address these challenges head-on and explore how to architect low-latency systems using Rust. During this free interactive workshop oriented for developers, engineers, and architects, we’ll cover how Rust’s unique language features and the Tokio async runtime enable high-performance application development.
As you explore key principles of designing low-latency systems with Rust, you will learn how to:
- Create and compile a real-world app with Rust
- Connect the application to ScyllaDB (NoSQL data store)
- Negotiate tradeoffs related to data modeling and querying
- Manage and monitor the database for consistently low latencies
Procurement Insights Cost To Value Guide.pptxJon Hansen
Procurement Insights integrated Historic Procurement Industry Archives, serves as a powerful complement — not a competitor — to other procurement industry firms. It fills critical gaps in depth, agility, and contextual insight that most traditional analyst and association models overlook.
Learn more about this value- driven proprietary service offering here.
HCL Nomad Web – Best Practices and Managing Multiuser Environmentspanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-nomad-web-best-practices-and-managing-multiuser-environments/
HCL Nomad Web is heralded as the next generation of the HCL Notes client, offering numerous advantages such as eliminating the need for packaging, distribution, and installation. Nomad Web client upgrades will be installed “automatically” in the background. This significantly reduces the administrative footprint compared to traditional HCL Notes clients. However, troubleshooting issues in Nomad Web present unique challenges compared to the Notes client.
Join Christoph and Marc as they demonstrate how to simplify the troubleshooting process in HCL Nomad Web, ensuring a smoother and more efficient user experience.
In this webinar, we will explore effective strategies for diagnosing and resolving common problems in HCL Nomad Web, including
- Accessing the console
- Locating and interpreting log files
- Accessing the data folder within the browser’s cache (using OPFS)
- Understand the difference between single- and multi-user scenarios
- Utilizing Client Clocking
Dev Dives: Automate and orchestrate your processes with UiPath MaestroUiPathCommunity
This session is designed to equip developers with the skills needed to build mission-critical, end-to-end processes that seamlessly orchestrate agents, people, and robots.
📕 Here's what you can expect:
- Modeling: Build end-to-end processes using BPMN.
- Implementing: Integrate agentic tasks, RPA, APIs, and advanced decisioning into processes.
- Operating: Control process instances with rewind, replay, pause, and stop functions.
- Monitoring: Use dashboards and embedded analytics for real-time insights into process instances.
This webinar is a must-attend for developers looking to enhance their agentic automation skills and orchestrate robust, mission-critical processes.
👨🏫 Speaker:
Andrei Vintila, Principal Product Manager @UiPath
This session streamed live on April 29, 2025, 16:00 CET.
Check out all our upcoming Dev Dives sessions at https://community.uipath.com/dev-dives-automation-developer-2025/.
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxAnoop Ashok
In today's fast-paced retail environment, efficiency is key. Every minute counts, and every penny matters. One tool that can significantly boost your store's efficiency is a well-executed planogram. These visual merchandising blueprints not only enhance store layouts but also save time and money in the process.
This is the keynote of the Into the Box conference, highlighting the release of the BoxLang JVM language, its key enhancements, and its vision for the future.
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfSoftware Company
Explore the benefits and features of advanced logistics management software for businesses in Riyadh. This guide delves into the latest technologies, from real-time tracking and route optimization to warehouse management and inventory control, helping businesses streamline their logistics operations and reduce costs. Learn how implementing the right software solution can enhance efficiency, improve customer satisfaction, and provide a competitive edge in the growing logistics sector of Riyadh.
Big Data Analytics Quick Research Guide by Arthur MorganArthur Morgan
This is a Quick Research Guide (QRG).
QRGs include the following:
- A brief, high-level overview of the QRG topic.
- A milestone timeline for the QRG topic.
- Links to various free online resource materials to provide a deeper dive into the QRG topic.
- Conclusion and a recommendation for at least two books available in the SJPL system on the QRG topic.
QRGs planned for the series:
- Artificial Intelligence QRG
- Quantum Computing QRG
- Big Data Analytics QRG
- Spacecraft Guidance, Navigation & Control QRG (coming 2026)
- UK Home Computing & The Birth of ARM QRG (coming 2027)
Any questions or comments?
- Please contact Arthur Morgan at [email protected].
100% human made.
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...SOFTTECHHUB
I started my online journey with several hosting services before stumbling upon Ai EngineHost. At first, the idea of paying one fee and getting lifetime access seemed too good to pass up. The platform is built on reliable US-based servers, ensuring your projects run at high speeds and remain safe. Let me take you step by step through its benefits and features as I explain why this hosting solution is a perfect fit for digital entrepreneurs.
Artificial Intelligence is providing benefits in many areas of work within the heritage sector, from image analysis, to ideas generation, and new research tools. However, it is more critical than ever for people, with analogue intelligence, to ensure the integrity and ethical use of AI. Including real people can improve the use of AI by identifying potential biases, cross-checking results, refining workflows, and providing contextual relevance to AI-driven results.
News about the impact of AI often paints a rosy picture. In practice, there are many potential pitfalls. This presentation discusses these issues and looks at the role of analogue intelligence and analogue interfaces in providing the best results to our audiences. How do we deal with factually incorrect results? How do we get content generated that better reflects the diversity of our communities? What roles are there for physical, in-person experiences in the digital world?
Spark is a powerhouse for large datasets, but when it comes to smaller data workloads, its overhead can sometimes slow things down. What if you could achieve high performance and efficiency without the need for Spark?
At S&P Global Commodity Insights, having a complete view of global energy and commodities markets enables customers to make data-driven decisions with confidence and create long-term, sustainable value. 🌍
Explore delta-rs + CDC and how these open-source innovations power lightweight, high-performance data applications beyond Spark! 🚀
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell
With expertise in data architecture, performance tracking, and revenue forecasting, Andrew Marnell plays a vital role in aligning business strategies with data insights. Andrew Marnell’s ability to lead cross-functional teams ensures businesses achieve sustainable growth and operational excellence.
3. TOPOLOGY
Topology is the structural design of communication model depicted physically or logically.
PHYSICAL TOPOLOGY
Physical topology is the placement of the various components of a network, including
device location and cable installation
Example: LAN has one or more physical links to other devices in the network;
graphically mapping these links results in a geometric shape that can be used to
describe the physical topology of the network.
4. LOGICAL TOPOLOGY
ICMP – INTERNET CONTROL MESSAGE PROTOCOL
Used to communicate between two devices . Ping command help in implementation of
ICMP
IPx/SPx - INTERNET PACKET EXCHANGE / SEQUENCE PACKET EXCHANGE
Developed by Novell company for LAN and MAN
NET- Bios - Network Basic Input / Output System
It is a program that allows applications on different computers to communicate within a
local area network (LAN).
It was created by IBM for its early PC Network, was adopted by Microsoft, and has
since become a de facto industry standard.
Nwlink IPx/ SPx
NWLink packages data to be compatible with client/server services on NetWare
Networks.
SMTP – SIMPLE MAIL TRANSFER PROTOCOLS
It is used for electronic mailing
5. POP3 - POST OFFICE PROTOCOL 3
It is the most recent version of a standard protocol for receiving e-mail.
POP3 is a client/server protocol in which e-mail is received and held for you by your Internet
server.
FTP - FILE TRANSFER PROTOCOL
It is a standard network protocol used to transfer computer files between a client and server on a
computer network.
TFTP – TRIVIAL FILE TRANSFER PROTOCOL
It is an Internet software utility for transferring files that is simpler to use than the File Transfer
Protocol but less capable.
It is used where user authentication and directory visibility are not required.
It is used as backup to recovery files
HTTP – HYPER TEXT TRANSFER PROTOCOL
It is an application protocol for distributed, collaborative, hypermedia information systems.
It is the foundation of data communication for the World Wide Web.
Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text
HTTP functions as a request–response protocol in the client–server computing model.
6. HTTPS – HYPER TEXT TRANSFER PROTOCOL SECURE
It is advanced version of http
DHCP – DYNAMIC HOST CONFIGURATION PROTOCOL
It is a client/server protocol that automatically provides an Internet Protocol host with its IP
address and other related configuration information such as the Subnet Mask and Default
Gateway.
TELNET-
It is an application layer protocol used on the Internet or local area networks to provide a
bidirectional interactive text-oriented communication facility using a virtual terminal
connection
SSH – SECURE SHELL PROTOCOL
It is used for security purpose like authentication for username , password etc.
ARP – ADDRESS RESOLUTION PROTOCOL
It is a protocol used by the Internet Protocol to map IP network addresses to the hardware
addresses used by a data link protocol
RARP – REVERSE ADDRESS RESOLUTION PROTOCOL
It is used to convert MAC address to IP address
8. ROUTER
It is a route device which defines router of data
It reads the packet and filter them
It works on IP address network
It manages all traffic inside the routing
Here we are dealing with ROUTER 2811
9. SWITCH
Switch is a computer networking device that connects devices together on a computer
network, by using packet switching to receive, process and forward data to the
destination device.
Here we are going to deal with SWITCH 2960-24T
10. IPADDRESSING and SUBNETTING
IPADDRESSING
Internet Protocol address (IP address) is a numerical label assigned to each device
(e.g., computer, printer) participating in a computer network that uses the Internet
Protocol for communication.
Types of IP address
IPv4 – Internet Protocol version 4
IPv6 – Internet Protocol version 6
11. SUBNETTING
It is process of dividation of IPs into subparts.
We require subnetting in order to reduce the cost
Example: Suppose we want to buy 100 IPs and each having cost of 260
=> Total Cost = 260 *100=> 26000
But through subnetting we need only single IP which is divided through subnetting into
different IPs as below:
Example: 192.168.1.0 Main IP
192.168.1.1
192.168.1.2
192.168.1.3 and so on……………
12. CONCEPT OF CLASSES
There are five types of classes namely A,B,C,D,E described below.
But in Practical Networking we prefer CLASS C only.
S.N
O
CLASS NETWORK
BIT
HOST
BIT
RANGE SUBNET WILDMASK
1 A 8 24 1-126 255.0.0.0 0.255.2555.255
2 B 16 16 128-191 255.255.0.0 0.0.255.255
3 C 24 8 192-223 255.255.255.
0
0.0.0.255
4 D BROADCAST 224-239
5 E RESEARCH 240-255
13. CORPS INFORMATION SYSTEM CONTROL OFFICER
(CISCO)
Cisco Systems is an American multinational technology company headquartered in San
Jose, California, that designs, manufactures and sells networking equipment.
It is considered to be the biggest networking company in the world.
It is a MNC which deals in Networking Hardware Devices.
It provides three certifications
CCNA – CISCO CERTIFIED NETWORK ASSOCIATE/ADMINISTRATOR
CCNP – CISCO CERTIFIED NETWORK PROFESSIONAL
CCIE – CISCO CERTIFIED INTERNETWORK EXPERT
NOTE: Here we are going to deal with CCNA
17. ROUTING
It means allocating the suitable and appropriate path by the router to the message/packets
from source to destination i.e Tx to Rx and vice versa.
The device used for this mechanism used is called ROUTING and the device used is called
ROUTER
Here we are going to deal with ROUTER 2811
CISCO Routers have four ports for inserting WIC-2T card generating two serial ports from
each card.
It has two Fast Ethernet ports namely fa 0/0 and fa 0/1 used for connecting devices through
copper straight wire
It also have 8 serial ports generated two by each WIC-2T card. These ports are used for
only serial connections through Serial DATA TRANSFER EQUIPMENT (DTE) wire
18. BASIC CONFIGURATION
It is done on Router
Router with Switch and PC
Select Router 2811
Double click on it and a box will appear.
Switch Off the Power
Insert WIC-2T Cards as per requirement .
Each card will give rise to Two different Serial Ports like 0/0/0 ,0/1/0 etc.
Then take Switch-2960 and connect both with Copper Straight Wire.
At last attach PC with Switch using same wire.
Then click on Router And Then CLI Mode.
Then write the following configuration code on Router:
19. CONFIGURATION ON ROUTER
Press : no
Router>enable
Router # config terminal
Router( config) #interface fastEthernet 0/0
Router( config-if) # ip address 10.0.0.1 255.0.0.0
Router( config-if)#no shut
This will turn the light Green between Router And Switch
Then click PC and provide suitable IP and then press tab which will automatically
assign a suitable subnet mask. And then close this window
Now click command prompt and write the below command:
Pc> ping_assigned ip of pc…..
Then press enter
20. SERIAL PORT CONFIGURATION
It is used for communication between two or more routers
Two or more routers are attached with each other through Serial DTE wire at suitable
serial ports.
CONFIGURATION ON BOTH ROUTERS
Router > en
Router # config terminal
Router (config )# interface serial 0/0/0
Router (config-if)# ip address 10.0.0.1 255.0.0.0
Router (config –if)# no shut
21. STATIC ROUTING
It is used where router uses manual IP configuration .
It is used in small scale networks.
In it we left all the directly attached network .
Commands Used
Router (config )# iproute_neighbor ip_subnet_via
ADVANTAGES OF STATIC ROUTING
Fast and Effective
Moreover control selective path
Less overload for router
DISADVANTAGES OF STATIC ROUTING
More overhead on administrator
Load balancing is not easily possible
22. DEFAULT ROUTING
It means a route for any network
This route is specified with following syntax:
Router (config)# ip route 0.0.0.0_0.0.0.0_via
23. DYNAMIC ROUTING
It is simple and fast to implement
In it we have to write only directly attached entire network
Various DYNAMIC ROUTING techniques includes :
ROUTER INFORMATION PROTOCOL(RIP)
INTERIOR GATEWAY ROUTING PROTOCOL(IGRP)
ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL(EIGRP)
OPEN SHORTEST PATH FIRST(OSPF)
BORDER GATEWAY PROTOCOL(BGP)
24. ROUTER INFORMATION PROTOCOL (RIP)
It is one of the oldest distance-vector routing protocols which employ the hop count as a
routing metric.
RIP prevents routing loops by implementing a limit on the number of hops allowed in a
path from source to destination.
The maximum number of hops allowed for RIP is 15, which limits the size of networks
that RIP can support.
A hop count of 16 is considered an infinite distance and the route is considered
unreachable.
In it we have to write only directly attached networks.
Command used :
Router (config)# router rip
Router (config-router)# network_required network IP
25. ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL
(EIGRP)
EIGRP (Enhanced Interior Gateway Routing Protocol) is a network protocol that lets
routers exchange information more efficiently than with earlier network protocols
It has characteristics of both distance vector and link state protocols
EIGRP will route the same protocols that IGRP route .
SYNTAX :
Router (config)# router eigrp_PROCESS ID ( )
Router (config-router)# network _ required network IP
NOTE: All Routers has same Process ID
26. OPEN SHORTEST PATH FIRST (OSPF)
Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks.
It uses a link state routing algorithm and falls into the group of interior routing protocols,
operating within a single autonomous system (AS).
It uses the concept of WILD CARD MASK , which is complement of subnet
It also uses the Process ID and Area
NOTE: All routers have same Area but different Process ID
SYNTAX:
Router (config )# router ospf_ PID(range 1-65535)
Router (config –router)# network_requires network IP_ wildcard mask_area_any value(range
0-4294967295)
27. BRODER GATEWAY PROTOCOL (BGP)
Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed
to exchange routing and reachability information among autonomous systems (AS) on
the Internet.
The protocol is often classified as a path vector protocol but is sometimes also classed
as a distance-vector routing protocol.
This protocol use the ip of neighbor point for communication
SYNTAX:
Router (config)#router bgp_PID1
Router (config –router)# neighbor_ip of end point_remote-as_PID2
NOTE 1: Before applying this command apply Dynamic routing on each router
NOTE 2: Each router has different Process ID
NOTE 3:Do not write directly attached IP of network. All except directly attached IP
will be treated as neighbor
NOTE 4: PID will be of current router only.
30. INTODUCTION TO VOIP
VOIP is an acronym for Voice Over Internet Protocol, or in more common terms phone
service over the Internet.
If you have a reasonable quality Internet connection you can get phone service
delivered through your Internet connection instead of from your local phone company.
BASIC IDEA OF VOIP
Continuously sample audio.
Convert each sample to digital form.
Send the resulting digitized stream accross an IP network in packets.
Convert the stream back to analog for playback.
Before the procedure above, the system must handle call setup.
Phone number to IP.
31. ADVANTAGES OF VOIP
Low call costs. ...
Low cost of performing moves, ads and changes on a business VOIP phone system.
Increased functionality and integration with other IT business systems.
Ability to have your land-line phone number follow you anywhere.
Low infrastructure costs. ...
Future proof.
DISADVANTAGES OF VOIP
Loss of service during outages.
Without power VOIP phones are useless, so in case of emergencies during power
cuts it can be a major disadvantage.
With VOIP emergency calls, it is hard to locate you and send help in time.
Some times during calls, there may be periods of silence when data is lost while it
is being unscrambled.
Latency and traffic.
No standard protocol is applicable
34. SWITCHING
VIRTUAL LOCALAREA NETWORK (VLAN)
It is a smart device
It divides switch into multiple parts in order to maintain security.
Basic Configuration:
Switch(config)#vlan ID(1-1005)
#vlan 10
#name ABC
#vlan 20
#name XYZ
#do show vlan
#do wr
#exit
35. SWITCH TO SWITCH PROGRAMMIG
Switch#interface fa 0/0
#switchport access vlan 10
interface fa 0/3
# switchport access vlan 10
# interface fa 0/2
#switchport access vlan 20
# interface fa 0/4
#switchport access vlan 20
#do wr
#exit
:-> NOW apply the following commands:
Switch(config)# interface fa 0/24
#switchport mode trunk
#do wr
#exit
36. PER- VLAN SPANNING TREE
Per-VLAN Spanning Tree (PVST) maintains a spanning tree instance for each VLAN
configured in the network.
It uses ISL Trunking and allows a VLAN trunk to be forwarding for some VLANs while
blocking for other VLANs.
Since PVST treats each VLAN as a separate network, it has the ability to load balance
traffic (at layer-2) by forwarding some VLANs on one trunk and other Vlans on another
trunk without causing a Spanning Tree loop.
Commands for PVST on router:
Router(config)#interface fa 0/0
#no shut
Router(config)#int fa 0/0.10(10 is Ip of given PC’s)
#encapsulation_dot1Q_10
#ip_add_pc virtual IP_subnet
NOTE: Add similar above commands of number of even PC’s attached.
38. SECURITY
It is the network device protection in order to secure our network with help of
CCNA technology
TYPES OF SECURITY :
ACCESS CONTROL LIST : It is type of security in which we filter inbound
and outbound traffic
Types of ACL:
1. STANDARD ACL : It is a type of ACL in which we block all the protocols
in our network.
Commands for STANDARD ACL
Router(config)# ip_access-list standard_abc_deny_IP of n/w to be blocked_wildcard mask
#permit_any
#do wr
#exit
Router(config)# interface fa 0/0
#ip_access-group_abc
39. 2. EXTENDED ACL : It is a type of ACL in which we block a particular protocol as
well as particular IP
Commmands for Extended ACL:
Router(config) # ip_access-list_extended_abc
#deny_icmp_destination IP_wildcard mask_source IP_wildcard
mask
#permit_ip_any_any
#do wr
#exit
Router(config)# interface fa 0/0
#ip_access-group_abc
#do wr
#exit
40. VIRTUAL TERMINAL TYPE (VTY)
It is protocol used for remotely connection with other connection.
REQUIREMENT
1. Client Side: There are two password used that are ON ENABLE and ON LINE
CONSOLE
• Commands on CLIENT SIDE:
Router>en
Router#telnet_10.0.0.1
#do show ip interface brief
2. MASTER SIDE:
• Commands on MASTER SIDE:
Router(config)# enable_password_123
#line_vty_0 15
#password 1234
# do wr
# exit
41. VIRTUAL PRIVATE NETWORK (VPN)
VPN is a technology that creates an encrypted connection over a less secure network
In this basically TUNNEL is made to keep data secure , through which only source and
destination clients can get the data.
Commands for VPN:
Router(config)# interface_tunnel_number
# ip_address_virtual IP_subnet
# tunnel_source_serial_of router itself
#tunnel_destination_IP of end router
# do wr
# exit
NOTE: Also share the virtual ip on both end router with rip command.
42. NETWORK ADDRESS TRANSLATOR
It is type of security in which we convert our private address into public address
It is a part of ethical hacking in which there is use of fake IP
TYPES Of NAT:
1. STATIC NAT: It is a type of NAT in which the client will fetch only single
fake IP everytime.
Commands for STATIC NAT:
Router(config)# ip_nat_inside_source_static_IP of pc of router
# interface fa 0/0
#ip_nat_inside
#interface serial 0/0/0
#ip_nat_outside
#do wr
#exit
43. 2.DYNAMIC NAT : It is a type of security in which we create a pool of fake IP’s
,because of which the user will receive a different fake IP
everytime within the range of given IP pool.
Commands for DYANMIC NAT:
Router(config)# access-list_10_permit_actual router IP_wildcard mask
# ip_nat_pool_abc_50.0.0.3_50.0.0.10_netmask_subnet
# ip_nat_inside_source_list_10_pool_abc
#interface_fa_0/0
#ip_nat_inside
#interface_serial_port of router
#ip_nat-outside
#do_wr
#exit
3. Overload / NATPAD : It means that the single public IP assigned to your router can be used
by multiple internal hosts concurrently. This is done by translating source UDP/TCP ports in the
packets and keeping track of them within the translation table kept in the router .