SlideShare a Scribd company logo
COMPUTER NETWORKS-
ROUTING & SWITCHING
[CCNA]
COMPANY PROFILE: TCIT-IT
 Telecommunications Consultants India Ltd (TCIL) is a leading ISO - 9001:2000 certified public sector
undertaking.
 TCIL, a premier telecommunication consultancy and engineering company with a strong base in
Telecommunication & Information Technology (IT).
 It was incorporated in 1978 by Department of Telecommunications (DOT), Government of India under
the aegis of Ministry of Communications, headed by Minister of Communications and Information
Technology.
 The Organizational Structure is formed with the objectives of providing globally world-class technology
and Indian expertise in all fields of Telecommunications and to provide total Quality management &
excellence in project execution.
 TCIL-IT is managed by ICSIL (Intelligent Communication Systems India Ltd.), a Joint Venture of TCIL
(Telecommunication Consultants India Ltd), a Govt. of India Enterprise and DSIIDC (Delhi State Industrial
Infrastructure Development Corporation Ltd).
 TCIL-IT has tie-up with many government agencies to impart computer education for career advancement.
 There are a number of PSUs under DoT. TCIL is one of them. Some other major companies are
1. Bharat Sanchar Nigam Limited (BSNL)
2. Mahanagar Telephone Nigam Limited (MTNL)
3. ITI Limited
 TCIL has its presence in almost 45 Countries mainly in Middle East Africa, South-East Africa, South-East Asia
Asia and Europe.
COMPUTER NETWORKS
Computer network : A collection of computing devices that are connected in various ways in
order to communicate and share resources.
Usually, the connections between computers in a network are made using physical wires or
cables. However, some connections are wireless, using radio waves or infrared signals.
The purpose of a network is to share resources-
A resource may be:
-A file
-A folder
-A printer
-A disk drive
-Or just about anything else that exists on a computer.
1. Network design
 a. Peer-to-peer
 b. Server/Client
2. Area network
 PAN(Personal Area Network)
 LAN(Local area network)
 W-LAN(Wireless LAN)
 CAN(Campus Area network)
 SAN(Storage data area network)
 GAN(Global area network)
Components of Networks
Network topology
 Star Topology:
 Ring Topology
 Mesh Topology
 Tree Topology
 Hybrid Topology
3.3.iv. Network Protocols
3.3.v. Wired and wireless
1. Network Design
Peer-to-Peer:
 a peer-to-peer or P2P network, the tasks are allocated among all the members of the network.
There is no real hierarchy among the computers, and all of them are considered equal. This is
also referred to as a distributed architecture or workgroup without hierarchy.
 A peer-to-peer network does not use a central computer server that controls network activity.
Instead, every computer on the network has a special software running that allows for
communications between all the computers.
Server – Client:
 In a client/server network, a number of network clients or workstations request resources or
services from the network. One or more network servers manage and provide these
or services.
 The clients are computers that depends on the server for data and software. Network
are also referred to as computer servers or simply servers. Sometimes a server is described in
terms of the specific service it provides, such as e-mail server, print server or storage server.
2. Types of Networking
1. LAN – It stands for local area network.
Location:
In a building or individual rooms or floors of buildings or connecting nearby buildings together like a
campus wide network like a college or university.
2. MAN – It stands for metropolitan area network.
Location:
network connecting various cities.
3. WAN – It stands for wide area network. This communication system links LANs between cities, countries
and continents. The main difference between a MAN and a WAN is that the WAN uses Long Distance
Carriers rather than Local Exchange carriers.
Location:
City to city, across a country or across a continent. Wide Area Networks (WANs) connect LANs together
between cities or across a country.
3. Network Topology
 a) BUS Topology: All the nodes (file server, workstations, and peripherals) on a bus topology are
connected by one single cable.
Advantages of Bus Topology
• It is Cheap, easy to handle and implement.
• Require less cable
• It is best suited for small networks.
 Disadvantages of Bus Topology
• The cable length is limited. This limits the number of stations that can be connected.
• This network topology can perform well only for a limited number of nodes.
b) RING Topology
• In a ring network, every device has exactly two neighbors for communication purposes.
• All messages travel through a ring in the same direction.
• A failure in any cable or device breaks the loop and can take down the entire network.
 Advantage of Ring Topology
• Very orderly network where every device has access to the token and the opportunity to transmit.
• Easier to Manage than a Bus Network.
• Good Communication over long distances.
• Handles high volume of traffic.
 Disadvantages of Ring Topology
• The failure of a single node of the network can cause the entire network to fail.
• The movement or changes made to network nodes affects the performance of the entire network.
c) STAR Topology
• In a star network, each node (file server, workstations, and peripherals) is connected to a central
called a hub.
• The hub takes a signal that comes from any node and passes it along to all the other nodes in the
network.
• Data on a star network passes through the hub, switch, or concentrator before continuing to its
destination.
 Advantages of Star Topology
• Easy to manage
• Easy to locate problems (cable/workstations)
• Easier to expand than a bus or ring topology.
• Easy to install and wire.
• Easy to detect faults and to remove parts.
 Disadvantages of Star Topology
• Requires more cable length than a linear topology.
• If the hub or concentrator fails, nodes attached are disabled.
• More expensive because of the cost of the concentrators.
d) TREE Topology
• A tree topology (hierarchical topology) can be viewed as a collection of star networks arranged in a
hierarchy.
• This tree has individual peripheral nodes which are required to transmit to and receive from one other
only and are not required to act as repeaters or regenerators
 Advantages of a Tree Topology
• Point-to-point wiring for individual segments.
• Supported by several hardware and software vendors.
• All the computers have access to the larger and their immediate networks.
 Disadvantages of a Tree Topology
• Overall length of each segment is limited by the type of cabling used.
• If the backbone line breaks, the entire segment goes down.
• More difficult to configure and wire than other topologies.
e) MESH Topology
• In this topology, each node is connected to every other node in the network.
• Implementing the mesh topology is expensive and difficult.
• In this type of network, each node may send message to destination through multiple paths.
Advantage of Mesh Topology
• No traffic problem as there are dedicated links.
• It has multiple links, so if one route is blocked then other routes can be used for data
communication.
• Points to point links make fault identification easy.
Disadvantage of Mesh Topology
• There is mesh of wiring which can be difficult to manage.
• Installation is complex as each node is connected to every node.
• Cabling cost is high.
f) HYBRID Topology
• A combination of any two or more network topologies.
• A hybrid topology always accrues when two different basic network topologies are connected.
• It is a mixture of above mentioned topologies. Usually, a central computer is attached with sub-
controllers which in turn participate in a variety of topologies.
 Advantages of a Hybrid Topology
• It is extremely flexible.
• It is very reliable.
 Disadvantages of a Hybrid Topology
• Expensive
NETWORKING DEVICES
 HUB
The hubs used on UTP Ethernet networks are repeaters as well, but they can have many RJ45 ports
instead of just two BNC connectors. When data enters the hub through any of its ports, the hub
amplifies the signal and transmits it out through all of the other ports.
 BRIDGES
A bridge is used to join two network segments together, it allows computers on
either segment to access resources on the other. They can also be used to
divide large networks into smaller segments.
 ROUTERS
Routers are networking devices used to extend or segment networks by forwarding packets from
one logical network to another. Routers are most often used in large internetworks that use the
TCP/IP protocol suite and for connecting TCP/IP hosts and local area networks (LANs) to the Internet
using dedicated leased lines.
 BROUTERS
Brouters are a combination of router and bridge. This is a special type of equipment
for networks that can be either bridged or routed, based on the protocols being
forwarded. Brouters are complex, fairly expensive pieces of equipment and
such are rarely used.
 NICs (Network Interface Card)
Network Interface Card, or NIC is a hardware card installed in a computer
can communicate on a network.
 WAPs (Wireless Access Point)
Access points act as wireless hubs to link multiple wireless NICs into a single
subnet. Access points also have at least one fixed to allow the wireless
network to be bridged to a traditional wired Ethernet network.
►MODEMS
A modem is a device that makes it possible for computers communicate over
telephone lines. The word modem comes from Modulate and Demodulate.
 SWITCHES
Switches are a special type of hub that offers an additional
of intelligence to basic, physical-layer repeater hubs.
NETWORKING CABLES► Coaxial Cable
Coaxial cable is braided-grounded strands of wire that can provide some shielding and noise immunity;
however, the installation and the termination of the cable itself can be costly. Coaxial cabling, which uses
connectors called BNC (Bayonet Nut Connector) is known as, in forms of Ethernet, thick net and thin net,
in the older LAN technology, ARC net, and cable TV.
► Fiber Optic
Fiber optic cabling carries signals, which have been
converted from electrical to optical (pulses of light) form. It
consists of the core, either an extremely thin cylinder of
glass or optical quality plastic, which is surrounded by a
second glass or plastic layer called the cladding.
The interface between the core and cladding can
trap light signals by a process called Total Internal
Reflection (TIR), resulting in the optical fiber acting as a light pipe.
► Unshielded Twisted Pair (UTP)
Unshielded Twisted Pair (UTP) is a set of three or four pairs of wires with each wire in each pair twisted
around the other to prevent electromagnetic interference. UTP cabling uses RJ-45, RJ-11, RS232, and RS-
449 connectors. Because it is less expensive and easier to install, UTP is more popular than Shielded
Twisted Pair (STP) or Coaxial Cabling.
► Shielded Twisted Pair (STP)
Shielded Twisted Pair (TP), like UTP, also has four pairs of wires with each wire in each pair twisted
together. However, the difference is that STP is surrounded with a foil shield and copper braided around
the wires that allows more protection from any external electromagnetic interference.
UTP cable
Straight UTP cable Cross UTP cable Crossover UTP cable
TYPES OF UTP cable
1. Straight Cable
Usually use straight cable to connect different type of devices.
1) Connect a computer to a switch/hub's normal port.
2) Connect a computer to a cable/DSL modem's LAN port.
2. Crossover Cable
It is usually used to connect same type of devices.
1) Connect two computers directly.
2) Connect a router's LAN port to a switch/hub's normal port.
► Rollover cable
A rollover cable is a network cable that connects a
computer terminal to network router’s console port.
IP Addresses
 IP" stands for Internet Protocol, so an IP address is an Internet Protocol address. It is a fascinating product
of modern computer technology designed to allow one computer (or other digital device) to
communicate with another via the Internet.
 There are broadly two types of IPs
o Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP),
the communications protocol that provides an identification and location system for computers on
networks and routes traffic across the Internet.
o Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol.
TYPES OF IP ADDRESSES
► Public IP Address
A public IP address is assigned to every computer that connects to the Internet where each IP is
unique. In this case, there cannot exist two computers with the same public IP address all over the
Internet.
► Public IP address
An IP address is considered private if the IP number falls within one of the IP address ranges reserved
for private networks such as a Local Area Network (LAN).
 Automatic Private IP Addressing (APIPA)
Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems that
enables a computer to automatically assign itself an IP address when there is no Dynamic Host
Configuration Protocol (DHCP) server available to perform that function. APIPA serves as a DHCP
server failover mechanism and makes it easier to configure and support small local area networks
(LANs). The computer selects an IP address from a range of addresses
from 169.254.0.0 - 169.254.255.255) reserved by the Internet Assigned Numbers Authority (IANA)
► Cisco Certified Network Associate[CCNA] is a popular industry certification program in computer
networking developed by Cisco Systems.
► The CCNA program began in 1998 with one core certification focused on network Routing and
Switching, obtainable by passing a single 75-minute written exam.
► In 2013, Cisco began expanding the program to cover many other facets of computer networking
and network administration
► Some of the modules under the CCNA course comprise of basic router configuration, IP routing,
NAT/PAT, virtual LAN, catalyst switch operation, IP traffic management with ACL, etc.
► Those who specialize in the various courses offered by CCNA have better job opportunities.
CISCO Certification
Software used: CISCO Packet Tracer
 Packet Tracer is a cross-platform visual simulation program designed by Cisco Systems that allows
users to create network topologies and imitate modern computer networks.
 Packet Tracer allows users to create simulated network topologies by dragging and dropping routers,
switches and various other types of network devices. A physical connection between devices is
represented by a "cable" item .
 Packet Tracer supports an array of simulated Application Layer protocols, as well as basic routing
with RIP, OSPF, EIGRP,BDP, to the extents required by the current CCNA curriculum.
 Packet Tracer is a cross-platform network simulator designed by Cisco Systems to run on Mac OS,
Linux and Microsoft Windows.
A router is a networking device that forwards data packets between computer networks.
• Broadband Routers
Broadband routers can do different types of things. Broadband routers can be used to
connect computers or to connect to the Internet.
• Wired & Wireless Routers
Wired router has physical connection whereas wireless routers create a wireless signal home or office. So,
any PC within range of Wireless routers can connect it and use your Internet.
• Edge Router
This type of router are placed at the edge of the ISP network, they are normally configured to
external protocol like BGP (Border gateway protocol) to another BGP of other ISP or large organization.
• Inter-provider Border Router
This type of router is for Interconnecting ISPs, this is a BGP speaking router that maintains BGP sessions
with other BGP speaking routers in other providers' Assess.
TYPES
Fig. Router
ROUTER COMMANDS
i) Basic Router Commands
 ii) ROUTING COMMANDS : To Show
 Cisco router copy commands
PASSWORD COMMANDS FOR ROUTERS
(i) Console Port
Cisco devices allow password protection of console access. This tech-recipe describes configuring the use of a password to protect
console of a Cisco switch.
Router(config)#line console 0
Router(config)#password CCNA
Router(config)#login
Router(config)#exit
(ii) Auxiliary port
Router(config)#line aux 0
Router(config)#password CCNA
Router(config)#login
Router(config)#exit
(iii) Enable password
Router(config)#enable password CCNA
Router(config)#exit
Router(config)#service password-encryption
To assign IP ADDRESS to Routers
Router 1
Router(config)#interface serial 0/0/0
Router(config)#ip address 11.0.0.1 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface fast ethernet 0/0
Router(config)#ip address 10.0.0.1 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router 2
Router(config)#interface serial 0/0/0
Router(config)#ip address 11.0.0.2 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface fast ethernet 0/0
Router(config)#ip address 20.0.0.1 255.0.0.0
Router(config-if)#no shutdown
ROUTING
Routing is the process of moving a packet of data from source to destination. Routing is usually
performed by a dedicated device called a router.
PING: Ping is a network diagnostic tool used primarily to test the connectivity between two nodes or devices. To
ping a destination node, an Internet Control Message Protocol (ICMP) echo request packet is sent to that node.
1. Static routing
Static routing is a form of routing that occurs when a router uses a manually-configured routing entry, rather than
information from a dynamic routing traffic. In many cases, static routes are manually configured by a network
administrator by adding in entries into a routing table.
2. Default Routing
Default route is a setting on a computer that defines the packet forwarding rule to use when no specific route can
be determined for a given Internet Protocol (IP) destination address.
Router(config)#ip route 0.0.0.0 0.0.0.0 11.0.0.2
Router(config)#ip route 0.0.0.0 0.0.0.0 12.0.0.2
Route(config)#ip route 0.0.0.0 0.0.0.0 12.0.0.1
Route(config)#ip route 0.0.0.0 0.0.0.0 13.0.0.1
Route(config) #ip route 0.0.0.0 0.0.0.0 14.0.0.2
Router(config)# IP route network ID subnet mask Next IP address
3. Dynamic Routing
Dynamic routing, also called adaptive routing, describes the capability of a system, through which routes are
characterized by their destination, to alter the path that the route takes through the system in response to a
change in conditions.
There are three types of Routing Protocols:
• Distance vector
• Linc state
• Hybrid
Router metrics: Metric is a measure used to decide which route is better (lower number is better). Each
routing protocol uses its own metric. For example, RIP uses hop counts as a metric, while OSPF uses cost.
1. Distance-vector Routing Protocols: Distance-vector Routing Protocols use simple algorithms that calculate a
cumulative distance value between routers based on hop count.
.
• RIP (Routing Info. Protocol)
• IGRP(Interior Gateway Routing Protocol)
Administrative Distance
Administrative distance number is used by routers to find out which route is better (lower number is better).
RIP(Routing Information Protocol
Router(config)# Router RIP
Router(config)#Version 2
Network 11.0.0.0
Network 10.0.0.0
Routing Information Protocol Version 2 (RIPv2)
• Distance-Vector protocol which some characteristics of Link State routing protocols. RIPv2 is classless
routing, which allows us to use subnetted networks also RIPv2 has the option for sending network mask in
the update to allow classless routing.
• RIPv2 support VLSM (Variable Length Subnet Masking).
• RIPv2 support maximum metric (hop count) value of 15. Any router farther than 15 hops away is
considered as unreachable.
• RIPv2 supports triggered updates.
2. Link-state Routing Protocols: Link-state Routing Protocols use sophisticated algorithms that maintain a
complex database of internetwork topology.
OSPF
OSPF(Open Shortest Path First)
 OSPF officially was documented in 1989 by the Internet Engineering Task Force (IETF) to address many
of the limitations of distance vector protocols, such as RIP and IGRP.
 OSPF become the standard open routing protocol.
 The word open is used because the algorithm that drives OSPF, Dijkstra's Shortest Path First (SPF)
algorithm, isn't proprietary to any vendor or organization.
 This allows for mainframes such as IBM, Unisys, and DEC, as well as other manufacturers' routers, to
run OSPF.
FEATURES
• Fast convergence
• Support for VLSM, super netting, and summarization
• Support for large network diameters.
• Stub area routing— Large networks are supported because stub-area routing reduces the routing
table.
• Fully classless routing protocol
Commands
Router 1
Router(config)#router OSPF 100
Router(config)#Network 10.0.0.0 0.255.255.255 area 0
Router(config)#Network 192.168.1.0 0.0.0.255 area 0
Router 2
Router(config)#router OSPF 100
Router(config)#Network 10.0.0.0 0.255.255.255 area 0
Router(config)#Network 11.0.0.0 0.255.255.255 area 1
Router(config)#Network 192.168.2.0 0.0.0.255 area 0
Router 3
Router(config)#router OSPF 100
Router(config)#Network 11.0.0.0 0.255.255.255 area 0
Router(config)#Network 192.168.3.0 0.0.0.255 area 1
3. Hybrid Routing Protocols: Hybrid Routing Protocols use a combination of distance-vector and link-state methods
that tries to incorporate the advantages of both and minimize their disadvantages.
EIGRP
Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance-vector routing protocol that is used on
a computer network for automating routing decisions and configuration.
• Maximum hop count =224
• Administrator distance=90
• Supports subnet+VLSM
Commands
Router(config)#Router EIGRP 500
Router(config)#network 11.0.0.0
Router(config)#No auto-summary
EIGRP
ACL
Access control lists (ACLs) provide a means to filter packets by allowing a user to permit or
deny IP packets from crossing specified interfaces.
(i) Extended ACL (Destination based)
Extended Access Control Lists (ACLs) allow you to permit or deny traffic from specific IP addresses to a
specific destination IP address and port. It also allows you to specify different types of traffic such as
ICMP, TCP, UDP, etc. Needless to say, it is very granular and allows you to be very specific.
Commands
Router (config)#access-list 100 deny tcp host ip 20.0.0.2 host 10.0.0.3 EQ 80
Router(config)#access-list 100 permit tcp any host 10.0.0.3 EQ 80
Router(config)#access-list 100 permit IP any any
Router(config)#interface fast Ethernet 0/0
Router(config)#ip access-group100 in
(ii) Standard ACL (Number based)
Commands
Router(config)#access-list N deny 20.0.0.2
Router(config)#access-list N permit any
Router(config)#interface Se0/0/0
Router(config)#ip access-group N in
(iii) Standard ACL (Name based)
Router(config)#IP access-list standard abc
Router(config)#deny 20.0.0.2
Router(config)#permit any
Router(config)#exit
Router(config)#interface Se0/0/0
Router(config)#ip access-group abc in
 Switching is process to forward packets coming in from one port to a port leading towards
the destination.
VLAN
A local area network, or LAN, provides the nodes connected to it with direct (Layer 2) access to one another
Commands to create VLAN
Switch(config)#VLAN 2
Switch (config)#name Sales
To assign Ports in VLAN
Switch(config)#interface fastethernet0/1
Switch (config) #switch port mode access
Switch (config) #switch port access VLAN 2
VTP (Virtual Trunking Port)
VTP) is a protocol created by Cisco to create and manage VLANs for a large network with many interconnected
switches and to maintain consistency throughout the network.
A network switch, which is participating in VLAN Trunking Protocol (VTP), can have three different modes.
• Server Mode
• Client Mode
• Transparent Mode
PORT SECURITY
Method-I
Switch(config)#interface fastethernet 0/11
Switch(config)#switchport mode access
Switch(config)#switchport port security mac 21.13.8.1
Remove pc and again connect to give the following command
Switch(config)#interface fast Ethernet 0/11
Switch(config)#shutdown
Switch(config)#no shutdown
Method II
Switch(config)#interface fast Ethernet 0/11
Switch(config)#Switch port port-security
Switch(config)#switch port port-security mac-address sticky
Switch(config)#switch port port-security max-2
Switch(config)#switch port port-security violation shutdown
NAT
Network Address Translation (NAT) is the process where a network device, usually a firewall,
assigns a public address to a computer (or group of computers) inside a private network.
The main use of NAT is to limit the number of public IP addresses an organization or company must use,
for both economy and security purposes. The most common form of network translation involves a large
private network using addresses .
Types of NAT
1.Static NAT (Network Address Translation)
Static NAT (Network Address Translation) is one-to-one mapping of a private IP address to a public IP
address.
COMMANDS
Switch(config)#IP NAT inside source static 10.0.0.2 122.122.100.10
Switch(config)#IP nat inside source static 10.0.0.3 122.122.100.11
Switch(config)#interface fastethernet 0/0
Switch(config)#IP nat inside exit
Switch(config)#interface serial 0/0/0
Switch(config)#IP nat outside
2.Dynamic NAT (Network Address Translation)
Dynamic NAT can be defined as mapping of a private IP address to a public IP address from a group of
public IP address.
COMMANDS
Switch(config)#interface fast Ethernet 0/0
Switch(config)#IP Nat inside
Switch(config)#exit
Switch(config)#interface serial 0/0/0
Switch(config)#IP nat outside
Switch(config)#exit
Switch(config)#access-list 10 permit 10.0.0.0 0.255.255.255.255
Switch(config)#IP nat pool abc 122.122.200.10 122.122.200.10 netmask 255.255.255.0
Switch(config)#IP Nat inside source list 10 pool abc
3. PAT (Port Address Translation)
Port Address Translation (PAT) is another type of dynamic NAT which can map multiple private IP addresses to a
public IP address by using a technology known as Port Address Translation.
Commands
Switch(config)#access-list 10 permit 10.0.0.0 0.255.255.255
Switch(config)#IP nat pool abc 122.122.200.20 122.122.200.20 net mask 255.255.255.0
Switch(config)#IP nat inside source list 10 pool abc overloads
Switch(config)#interface fast Ethernet 0/0
Switch(config)IP Nat inside
Switch(config)#exit
Switch(config)#interface serial 0/0/0
Switch (config)#IP Nat outside
Subnetting is a process of dividing large network into the smaller networks based on layer 3 IP address.
Every computer on network has an IP address that represent its location on network. Two version of IP
addresses are available IPv4 and IPv6.
Class A addresses range from 1-126
Class B addresses range from 128-191
Class C addresses range from 192-223
Class D addresses range from 224-239
Class E addresses range from 240-254
Subnet mask
Subnet mask is a 32 bits long address used to distinguish between network address and host address in
IP address. Subnet mask is always used with IP address. Subnet mask has only one purpose, to identify
which part of an IP address is network address and which part is host address.

Class Subnet Mask Format
A 255.0.0.0 Network.Host.Host.Host
B 255.255.0.0 Network.Network.Host.Host
C 255.255.255.0 Network.Network.Network.Host
 A computer network or data network is a telecommunications network which
allows computers to exchange data.
 In computer networks, networked computing devices exchange data with each other using
a data link. The connections between nodes are established using either cable
media or wireless media. The best-known computer network is the Internet.
 Computer networks support an enormous number of applications and services such as access
to the World Wide Web, digital video, digital audio, shared use of application and storage
servers, printers, and fax machines, and use of email and instant messaging applications as well
as many others.
 In most cases, application-specific communications protocols are layered (i.e. carried
as payload) over other more general communications protocols.
Textbooks:
[1] Goleniewski, L. (2006) Telecommunications Essentials, Addison Wesley Professional. )
[2 ]Kurose, J.F. and K.W. Ross (2003) Computer Networking: A Top Down Approach Featuring the Internet,
Addison Wesley. )
[3] Mir, N.F. (2006) Computer and Communication Networks, Prentice Hall.
[4]“Computer Networks” by Andrew S. Tanenbaum
[5] “Internetworking with TCP/IP, Volume 1” by Douglas Comer.
[6] Sam Halabi & Danny McPherson, Internet Routing Architectures.
[7 ]Christian Huitema, Routing in the Internet.
Research Papers:
[8][3ComWHITE] 3Com, "Understanding IP Addressing: Everything You Ever wanted to Know," White Paper,
May 2001.
[9][Cisco IP] Cisco, "Internet Protocols," Internetworking Technology Handbook.
[10][Cisco Routing] Cisco, "Routing Basics," Internetworking Technology Handbook.
Ccna(routing &and switching)
Ccna(routing &and switching)
Ad

More Related Content

What's hot (20)

CCNA ppt
CCNA pptCCNA ppt
CCNA ppt
Sumant Garg
 
TCP IP Addressing
TCP IP AddressingTCP IP Addressing
TCP IP Addressing
Ritul Sonania
 
Routing ppt
Routing pptRouting ppt
Routing ppt
ArpiSaxena1
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
Er. Anmol Bhagat
 
Difference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP LayerDifference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP Layer
Netwax Lab
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)
Peter R. Egli
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
sanjoysanyal
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
kirbadh
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
Pijush Kanti Das
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
Touhidul Fahim
 
IP classes
IP classesIP classes
IP classes
Meenakshi Paul
 
WAN Technologies slide show
WAN Technologies slide showWAN Technologies slide show
WAN Technologies slide show
NavleshKumar singh
 
Subnetting
SubnettingSubnetting
Subnetting
Gichelle Amon
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
NetProtocol Xpert
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
AYESHA JAVED
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
Smriti Tikoo
 
Introduction to network switches
Introduction to network switchesIntroduction to network switches
Introduction to network switches
NetProtocol Xpert
 
Router
RouterRouter
Router
Then Murugeshwari
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
AIRTEL
 
OSI Model
OSI ModelOSI Model
OSI Model
Daffodil International University
 

Viewers also liked (17)

Routing
RoutingRouting
Routing
Saima Azam
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routing
Deepak John
 
Ccna1v3 Mod02 Class
Ccna1v3 Mod02 ClassCcna1v3 Mod02 Class
Ccna1v3 Mod02 Class
aqeelhaider74
 
Sem 1 Ch 3
Sem 1 Ch 3Sem 1 Ch 3
Sem 1 Ch 3
aqeelhaider74
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routing
r123027
 
Cisco CCNA-Standard Access List
Cisco CCNA-Standard Access ListCisco CCNA-Standard Access List
Cisco CCNA-Standard Access List
Hamed Moghaddam
 
DYNAMIC SOURCE ROUTING (DSR)
DYNAMIC SOURCE ROUTING  (DSR)DYNAMIC SOURCE ROUTING  (DSR)
DYNAMIC SOURCE ROUTING (DSR)
Shankha Subhra Ghosh
 
Modes of router
Modes of routerModes of router
Modes of router
Er. Anmol Bhagat
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routing
Ashraf Uddin
 
Cisco CCNA- DHCP Server
Cisco CCNA-  DHCP ServerCisco CCNA-  DHCP Server
Cisco CCNA- DHCP Server
Hamed Moghaddam
 
Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPF
arpit
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
Aung Thu Rha Hein
 
CCNA Routing and Switching IT Certifications
CCNA Routing and Switching  IT CertificationsCCNA Routing and Switching  IT Certifications
CCNA Routing and Switching IT Certifications
Muhammad Qasim
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
farimoin
 
Distance vector routing algorithm
Distance vector routing algorithmDistance vector routing algorithm
Distance vector routing algorithm
Gaurav Rawat
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
Bhagyashri Dhoke
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
Siddique Ibrahim
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routing
Deepak John
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routing
r123027
 
Cisco CCNA-Standard Access List
Cisco CCNA-Standard Access ListCisco CCNA-Standard Access List
Cisco CCNA-Standard Access List
Hamed Moghaddam
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routing
Ashraf Uddin
 
Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPF
arpit
 
CCNA Routing and Switching IT Certifications
CCNA Routing and Switching  IT CertificationsCCNA Routing and Switching  IT Certifications
CCNA Routing and Switching IT Certifications
Muhammad Qasim
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
farimoin
 
Distance vector routing algorithm
Distance vector routing algorithmDistance vector routing algorithm
Distance vector routing algorithm
Gaurav Rawat
 
Ad

Similar to Ccna(routing &and switching) (20)

Introduction of network
Introduction of networkIntroduction of network
Introduction of network
sharone singh
 
Computer Network
Computer NetworkComputer Network
Computer Network
Subhash Vadadoriya
 
COMPUTER NETWORK seminar.pptx
COMPUTER NETWORK seminar.pptxCOMPUTER NETWORK seminar.pptx
COMPUTER NETWORK seminar.pptx
nihareddy0302
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
SOLOMONCHINAEMEUCHEA
 
Unit_1.pptx
Unit_1.pptxUnit_1.pptx
Unit_1.pptx
Mayura shelke
 
networking.ppt
networking.pptnetworking.ppt
networking.ppt
suchita74
 
networking
networkingnetworking
networking
Pooja Dhiman
 
Data Communication Network Unit 1 sgbau .pptx
Data Communication Network Unit 1 sgbau .pptxData Communication Network Unit 1 sgbau .pptx
Data Communication Network Unit 1 sgbau .pptx
neha540357
 
Networks
NetworksNetworks
Networks
Sajid Hussain
 
Networking HMT-1
Networking HMT-1Networking HMT-1
Networking HMT-1
ImranulHasan6
 
5- Introduction to Networking.type and general
5- Introduction to Networking.type and general5- Introduction to Networking.type and general
5- Introduction to Networking.type and general
faresabushanab37
 
An Introduction to Networking
An Introduction to Networking An Introduction to Networking
An Introduction to Networking
SrikantaSahu10
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
Atika Zaimi
 
145753533-Topologies seminar-Presentation.pptx
145753533-Topologies seminar-Presentation.pptx145753533-Topologies seminar-Presentation.pptx
145753533-Topologies seminar-Presentation.pptx
abhinandpk2405
 
Computer Network ssss ppt.pptx
Computer Network ssss ppt.pptxComputer Network ssss ppt.pptx
Computer Network ssss ppt.pptx
RamNivas42
 
Computer Network Introduction full
Computer Network Introduction fullComputer Network Introduction full
Computer Network Introduction full
aneebkmct
 
What is networking
What is networkingWhat is networking
What is networking
babyparul
 
Unit 2B.pdf
Unit 2B.pdfUnit 2B.pdf
Unit 2B.pdf
TuhinUtsabPaul
 
Networking hard copy (1)
Networking  hard copy (1)Networking  hard copy (1)
Networking hard copy (1)
Ankita Shetty
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
Alisha Jain
 
Introduction of network
Introduction of networkIntroduction of network
Introduction of network
sharone singh
 
COMPUTER NETWORK seminar.pptx
COMPUTER NETWORK seminar.pptxCOMPUTER NETWORK seminar.pptx
COMPUTER NETWORK seminar.pptx
nihareddy0302
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
SOLOMONCHINAEMEUCHEA
 
networking.ppt
networking.pptnetworking.ppt
networking.ppt
suchita74
 
Data Communication Network Unit 1 sgbau .pptx
Data Communication Network Unit 1 sgbau .pptxData Communication Network Unit 1 sgbau .pptx
Data Communication Network Unit 1 sgbau .pptx
neha540357
 
5- Introduction to Networking.type and general
5- Introduction to Networking.type and general5- Introduction to Networking.type and general
5- Introduction to Networking.type and general
faresabushanab37
 
An Introduction to Networking
An Introduction to Networking An Introduction to Networking
An Introduction to Networking
SrikantaSahu10
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
Atika Zaimi
 
145753533-Topologies seminar-Presentation.pptx
145753533-Topologies seminar-Presentation.pptx145753533-Topologies seminar-Presentation.pptx
145753533-Topologies seminar-Presentation.pptx
abhinandpk2405
 
Computer Network ssss ppt.pptx
Computer Network ssss ppt.pptxComputer Network ssss ppt.pptx
Computer Network ssss ppt.pptx
RamNivas42
 
Computer Network Introduction full
Computer Network Introduction fullComputer Network Introduction full
Computer Network Introduction full
aneebkmct
 
What is networking
What is networkingWhat is networking
What is networking
babyparul
 
Networking hard copy (1)
Networking  hard copy (1)Networking  hard copy (1)
Networking hard copy (1)
Ankita Shetty
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
Alisha Jain
 
Ad

Recently uploaded (20)

tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 

Ccna(routing &and switching)

  • 1. COMPUTER NETWORKS- ROUTING & SWITCHING [CCNA]
  • 2. COMPANY PROFILE: TCIT-IT  Telecommunications Consultants India Ltd (TCIL) is a leading ISO - 9001:2000 certified public sector undertaking.  TCIL, a premier telecommunication consultancy and engineering company with a strong base in Telecommunication & Information Technology (IT).  It was incorporated in 1978 by Department of Telecommunications (DOT), Government of India under the aegis of Ministry of Communications, headed by Minister of Communications and Information Technology.  The Organizational Structure is formed with the objectives of providing globally world-class technology and Indian expertise in all fields of Telecommunications and to provide total Quality management & excellence in project execution.
  • 3.  TCIL-IT is managed by ICSIL (Intelligent Communication Systems India Ltd.), a Joint Venture of TCIL (Telecommunication Consultants India Ltd), a Govt. of India Enterprise and DSIIDC (Delhi State Industrial Infrastructure Development Corporation Ltd).  TCIL-IT has tie-up with many government agencies to impart computer education for career advancement.  There are a number of PSUs under DoT. TCIL is one of them. Some other major companies are 1. Bharat Sanchar Nigam Limited (BSNL) 2. Mahanagar Telephone Nigam Limited (MTNL) 3. ITI Limited  TCIL has its presence in almost 45 Countries mainly in Middle East Africa, South-East Africa, South-East Asia Asia and Europe.
  • 4. COMPUTER NETWORKS Computer network : A collection of computing devices that are connected in various ways in order to communicate and share resources. Usually, the connections between computers in a network are made using physical wires or cables. However, some connections are wireless, using radio waves or infrared signals. The purpose of a network is to share resources- A resource may be: -A file -A folder -A printer -A disk drive -Or just about anything else that exists on a computer.
  • 5. 1. Network design  a. Peer-to-peer  b. Server/Client 2. Area network  PAN(Personal Area Network)  LAN(Local area network)  W-LAN(Wireless LAN)  CAN(Campus Area network)  SAN(Storage data area network)  GAN(Global area network) Components of Networks
  • 6. Network topology  Star Topology:  Ring Topology  Mesh Topology  Tree Topology  Hybrid Topology 3.3.iv. Network Protocols 3.3.v. Wired and wireless
  • 7. 1. Network Design Peer-to-Peer:  a peer-to-peer or P2P network, the tasks are allocated among all the members of the network. There is no real hierarchy among the computers, and all of them are considered equal. This is also referred to as a distributed architecture or workgroup without hierarchy.  A peer-to-peer network does not use a central computer server that controls network activity. Instead, every computer on the network has a special software running that allows for communications between all the computers.
  • 8. Server – Client:  In a client/server network, a number of network clients or workstations request resources or services from the network. One or more network servers manage and provide these or services.  The clients are computers that depends on the server for data and software. Network are also referred to as computer servers or simply servers. Sometimes a server is described in terms of the specific service it provides, such as e-mail server, print server or storage server.
  • 9. 2. Types of Networking 1. LAN – It stands for local area network. Location: In a building or individual rooms or floors of buildings or connecting nearby buildings together like a campus wide network like a college or university. 2. MAN – It stands for metropolitan area network. Location: network connecting various cities. 3. WAN – It stands for wide area network. This communication system links LANs between cities, countries and continents. The main difference between a MAN and a WAN is that the WAN uses Long Distance Carriers rather than Local Exchange carriers. Location: City to city, across a country or across a continent. Wide Area Networks (WANs) connect LANs together between cities or across a country.
  • 10. 3. Network Topology  a) BUS Topology: All the nodes (file server, workstations, and peripherals) on a bus topology are connected by one single cable. Advantages of Bus Topology • It is Cheap, easy to handle and implement. • Require less cable • It is best suited for small networks.  Disadvantages of Bus Topology • The cable length is limited. This limits the number of stations that can be connected. • This network topology can perform well only for a limited number of nodes. b) RING Topology • In a ring network, every device has exactly two neighbors for communication purposes. • All messages travel through a ring in the same direction. • A failure in any cable or device breaks the loop and can take down the entire network.
  • 11.  Advantage of Ring Topology • Very orderly network where every device has access to the token and the opportunity to transmit. • Easier to Manage than a Bus Network. • Good Communication over long distances. • Handles high volume of traffic.  Disadvantages of Ring Topology • The failure of a single node of the network can cause the entire network to fail. • The movement or changes made to network nodes affects the performance of the entire network. c) STAR Topology • In a star network, each node (file server, workstations, and peripherals) is connected to a central called a hub. • The hub takes a signal that comes from any node and passes it along to all the other nodes in the network. • Data on a star network passes through the hub, switch, or concentrator before continuing to its destination.
  • 12.  Advantages of Star Topology • Easy to manage • Easy to locate problems (cable/workstations) • Easier to expand than a bus or ring topology. • Easy to install and wire. • Easy to detect faults and to remove parts.  Disadvantages of Star Topology • Requires more cable length than a linear topology. • If the hub or concentrator fails, nodes attached are disabled. • More expensive because of the cost of the concentrators. d) TREE Topology • A tree topology (hierarchical topology) can be viewed as a collection of star networks arranged in a hierarchy. • This tree has individual peripheral nodes which are required to transmit to and receive from one other only and are not required to act as repeaters or regenerators
  • 13.  Advantages of a Tree Topology • Point-to-point wiring for individual segments. • Supported by several hardware and software vendors. • All the computers have access to the larger and their immediate networks.  Disadvantages of a Tree Topology • Overall length of each segment is limited by the type of cabling used. • If the backbone line breaks, the entire segment goes down. • More difficult to configure and wire than other topologies. e) MESH Topology • In this topology, each node is connected to every other node in the network. • Implementing the mesh topology is expensive and difficult. • In this type of network, each node may send message to destination through multiple paths.
  • 14. Advantage of Mesh Topology • No traffic problem as there are dedicated links. • It has multiple links, so if one route is blocked then other routes can be used for data communication. • Points to point links make fault identification easy. Disadvantage of Mesh Topology • There is mesh of wiring which can be difficult to manage. • Installation is complex as each node is connected to every node. • Cabling cost is high. f) HYBRID Topology • A combination of any two or more network topologies. • A hybrid topology always accrues when two different basic network topologies are connected. • It is a mixture of above mentioned topologies. Usually, a central computer is attached with sub- controllers which in turn participate in a variety of topologies.
  • 15.  Advantages of a Hybrid Topology • It is extremely flexible. • It is very reliable.  Disadvantages of a Hybrid Topology • Expensive
  • 16. NETWORKING DEVICES  HUB The hubs used on UTP Ethernet networks are repeaters as well, but they can have many RJ45 ports instead of just two BNC connectors. When data enters the hub through any of its ports, the hub amplifies the signal and transmits it out through all of the other ports.  BRIDGES A bridge is used to join two network segments together, it allows computers on either segment to access resources on the other. They can also be used to divide large networks into smaller segments.  ROUTERS Routers are networking devices used to extend or segment networks by forwarding packets from one logical network to another. Routers are most often used in large internetworks that use the TCP/IP protocol suite and for connecting TCP/IP hosts and local area networks (LANs) to the Internet using dedicated leased lines.
  • 17.  BROUTERS Brouters are a combination of router and bridge. This is a special type of equipment for networks that can be either bridged or routed, based on the protocols being forwarded. Brouters are complex, fairly expensive pieces of equipment and such are rarely used.  NICs (Network Interface Card) Network Interface Card, or NIC is a hardware card installed in a computer can communicate on a network.  WAPs (Wireless Access Point) Access points act as wireless hubs to link multiple wireless NICs into a single subnet. Access points also have at least one fixed to allow the wireless network to be bridged to a traditional wired Ethernet network. ►MODEMS A modem is a device that makes it possible for computers communicate over telephone lines. The word modem comes from Modulate and Demodulate.
  • 18.  SWITCHES Switches are a special type of hub that offers an additional of intelligence to basic, physical-layer repeater hubs.
  • 19. NETWORKING CABLES► Coaxial Cable Coaxial cable is braided-grounded strands of wire that can provide some shielding and noise immunity; however, the installation and the termination of the cable itself can be costly. Coaxial cabling, which uses connectors called BNC (Bayonet Nut Connector) is known as, in forms of Ethernet, thick net and thin net, in the older LAN technology, ARC net, and cable TV. ► Fiber Optic Fiber optic cabling carries signals, which have been converted from electrical to optical (pulses of light) form. It consists of the core, either an extremely thin cylinder of glass or optical quality plastic, which is surrounded by a second glass or plastic layer called the cladding. The interface between the core and cladding can trap light signals by a process called Total Internal Reflection (TIR), resulting in the optical fiber acting as a light pipe. ► Unshielded Twisted Pair (UTP) Unshielded Twisted Pair (UTP) is a set of three or four pairs of wires with each wire in each pair twisted around the other to prevent electromagnetic interference. UTP cabling uses RJ-45, RJ-11, RS232, and RS- 449 connectors. Because it is less expensive and easier to install, UTP is more popular than Shielded Twisted Pair (STP) or Coaxial Cabling.
  • 20. ► Shielded Twisted Pair (STP) Shielded Twisted Pair (TP), like UTP, also has four pairs of wires with each wire in each pair twisted together. However, the difference is that STP is surrounded with a foil shield and copper braided around the wires that allows more protection from any external electromagnetic interference. UTP cable Straight UTP cable Cross UTP cable Crossover UTP cable TYPES OF UTP cable
  • 21. 1. Straight Cable Usually use straight cable to connect different type of devices. 1) Connect a computer to a switch/hub's normal port. 2) Connect a computer to a cable/DSL modem's LAN port. 2. Crossover Cable It is usually used to connect same type of devices. 1) Connect two computers directly. 2) Connect a router's LAN port to a switch/hub's normal port.
  • 22. ► Rollover cable A rollover cable is a network cable that connects a computer terminal to network router’s console port.
  • 23. IP Addresses  IP" stands for Internet Protocol, so an IP address is an Internet Protocol address. It is a fascinating product of modern computer technology designed to allow one computer (or other digital device) to communicate with another via the Internet.  There are broadly two types of IPs o Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. o Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol. TYPES OF IP ADDRESSES ► Public IP Address A public IP address is assigned to every computer that connects to the Internet where each IP is unique. In this case, there cannot exist two computers with the same public IP address all over the Internet.
  • 24. ► Public IP address An IP address is considered private if the IP number falls within one of the IP address ranges reserved for private networks such as a Local Area Network (LAN).
  • 25.  Automatic Private IP Addressing (APIPA) Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function. APIPA serves as a DHCP server failover mechanism and makes it easier to configure and support small local area networks (LANs). The computer selects an IP address from a range of addresses from 169.254.0.0 - 169.254.255.255) reserved by the Internet Assigned Numbers Authority (IANA)
  • 26. ► Cisco Certified Network Associate[CCNA] is a popular industry certification program in computer networking developed by Cisco Systems. ► The CCNA program began in 1998 with one core certification focused on network Routing and Switching, obtainable by passing a single 75-minute written exam. ► In 2013, Cisco began expanding the program to cover many other facets of computer networking and network administration ► Some of the modules under the CCNA course comprise of basic router configuration, IP routing, NAT/PAT, virtual LAN, catalyst switch operation, IP traffic management with ACL, etc. ► Those who specialize in the various courses offered by CCNA have better job opportunities.
  • 28. Software used: CISCO Packet Tracer  Packet Tracer is a cross-platform visual simulation program designed by Cisco Systems that allows users to create network topologies and imitate modern computer networks.  Packet Tracer allows users to create simulated network topologies by dragging and dropping routers, switches and various other types of network devices. A physical connection between devices is represented by a "cable" item .  Packet Tracer supports an array of simulated Application Layer protocols, as well as basic routing with RIP, OSPF, EIGRP,BDP, to the extents required by the current CCNA curriculum.  Packet Tracer is a cross-platform network simulator designed by Cisco Systems to run on Mac OS, Linux and Microsoft Windows.
  • 29. A router is a networking device that forwards data packets between computer networks. • Broadband Routers Broadband routers can do different types of things. Broadband routers can be used to connect computers or to connect to the Internet. • Wired & Wireless Routers Wired router has physical connection whereas wireless routers create a wireless signal home or office. So, any PC within range of Wireless routers can connect it and use your Internet. • Edge Router This type of router are placed at the edge of the ISP network, they are normally configured to external protocol like BGP (Border gateway protocol) to another BGP of other ISP or large organization. • Inter-provider Border Router This type of router is for Interconnecting ISPs, this is a BGP speaking router that maintains BGP sessions with other BGP speaking routers in other providers' Assess. TYPES
  • 30. Fig. Router ROUTER COMMANDS i) Basic Router Commands
  • 31.  ii) ROUTING COMMANDS : To Show
  • 32.  Cisco router copy commands
  • 33. PASSWORD COMMANDS FOR ROUTERS (i) Console Port Cisco devices allow password protection of console access. This tech-recipe describes configuring the use of a password to protect console of a Cisco switch. Router(config)#line console 0 Router(config)#password CCNA Router(config)#login Router(config)#exit (ii) Auxiliary port Router(config)#line aux 0 Router(config)#password CCNA Router(config)#login Router(config)#exit (iii) Enable password Router(config)#enable password CCNA Router(config)#exit Router(config)#service password-encryption
  • 34. To assign IP ADDRESS to Routers Router 1 Router(config)#interface serial 0/0/0 Router(config)#ip address 11.0.0.1 255.0.0.0 Router(config-if)#no shutdown Router(config-if)#exit Router(config)#interface fast ethernet 0/0 Router(config)#ip address 10.0.0.1 255.0.0.0 Router(config-if)#no shutdown Router(config-if)#exit Router 2 Router(config)#interface serial 0/0/0 Router(config)#ip address 11.0.0.2 255.0.0.0 Router(config-if)#no shutdown Router(config-if)#exit Router(config)#interface fast ethernet 0/0 Router(config)#ip address 20.0.0.1 255.0.0.0 Router(config-if)#no shutdown
  • 35. ROUTING Routing is the process of moving a packet of data from source to destination. Routing is usually performed by a dedicated device called a router. PING: Ping is a network diagnostic tool used primarily to test the connectivity between two nodes or devices. To ping a destination node, an Internet Control Message Protocol (ICMP) echo request packet is sent to that node. 1. Static routing Static routing is a form of routing that occurs when a router uses a manually-configured routing entry, rather than information from a dynamic routing traffic. In many cases, static routes are manually configured by a network administrator by adding in entries into a routing table. 2. Default Routing Default route is a setting on a computer that defines the packet forwarding rule to use when no specific route can be determined for a given Internet Protocol (IP) destination address. Router(config)#ip route 0.0.0.0 0.0.0.0 11.0.0.2 Router(config)#ip route 0.0.0.0 0.0.0.0 12.0.0.2 Route(config)#ip route 0.0.0.0 0.0.0.0 12.0.0.1 Route(config)#ip route 0.0.0.0 0.0.0.0 13.0.0.1 Route(config) #ip route 0.0.0.0 0.0.0.0 14.0.0.2 Router(config)# IP route network ID subnet mask Next IP address
  • 36. 3. Dynamic Routing Dynamic routing, also called adaptive routing, describes the capability of a system, through which routes are characterized by their destination, to alter the path that the route takes through the system in response to a change in conditions. There are three types of Routing Protocols: • Distance vector • Linc state • Hybrid
  • 37. Router metrics: Metric is a measure used to decide which route is better (lower number is better). Each routing protocol uses its own metric. For example, RIP uses hop counts as a metric, while OSPF uses cost. 1. Distance-vector Routing Protocols: Distance-vector Routing Protocols use simple algorithms that calculate a cumulative distance value between routers based on hop count. . • RIP (Routing Info. Protocol) • IGRP(Interior Gateway Routing Protocol) Administrative Distance Administrative distance number is used by routers to find out which route is better (lower number is better).
  • 38. RIP(Routing Information Protocol Router(config)# Router RIP Router(config)#Version 2 Network 11.0.0.0 Network 10.0.0.0 Routing Information Protocol Version 2 (RIPv2) • Distance-Vector protocol which some characteristics of Link State routing protocols. RIPv2 is classless routing, which allows us to use subnetted networks also RIPv2 has the option for sending network mask in the update to allow classless routing. • RIPv2 support VLSM (Variable Length Subnet Masking). • RIPv2 support maximum metric (hop count) value of 15. Any router farther than 15 hops away is considered as unreachable. • RIPv2 supports triggered updates. 2. Link-state Routing Protocols: Link-state Routing Protocols use sophisticated algorithms that maintain a complex database of internetwork topology. OSPF
  • 39. OSPF(Open Shortest Path First)  OSPF officially was documented in 1989 by the Internet Engineering Task Force (IETF) to address many of the limitations of distance vector protocols, such as RIP and IGRP.  OSPF become the standard open routing protocol.  The word open is used because the algorithm that drives OSPF, Dijkstra's Shortest Path First (SPF) algorithm, isn't proprietary to any vendor or organization.  This allows for mainframes such as IBM, Unisys, and DEC, as well as other manufacturers' routers, to run OSPF. FEATURES • Fast convergence • Support for VLSM, super netting, and summarization • Support for large network diameters. • Stub area routing— Large networks are supported because stub-area routing reduces the routing table. • Fully classless routing protocol
  • 40. Commands Router 1 Router(config)#router OSPF 100 Router(config)#Network 10.0.0.0 0.255.255.255 area 0 Router(config)#Network 192.168.1.0 0.0.0.255 area 0 Router 2 Router(config)#router OSPF 100 Router(config)#Network 10.0.0.0 0.255.255.255 area 0 Router(config)#Network 11.0.0.0 0.255.255.255 area 1 Router(config)#Network 192.168.2.0 0.0.0.255 area 0 Router 3 Router(config)#router OSPF 100 Router(config)#Network 11.0.0.0 0.255.255.255 area 0 Router(config)#Network 192.168.3.0 0.0.0.255 area 1
  • 41. 3. Hybrid Routing Protocols: Hybrid Routing Protocols use a combination of distance-vector and link-state methods that tries to incorporate the advantages of both and minimize their disadvantages. EIGRP Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance-vector routing protocol that is used on a computer network for automating routing decisions and configuration. • Maximum hop count =224 • Administrator distance=90 • Supports subnet+VLSM Commands Router(config)#Router EIGRP 500 Router(config)#network 11.0.0.0 Router(config)#No auto-summary EIGRP
  • 42. ACL Access control lists (ACLs) provide a means to filter packets by allowing a user to permit or deny IP packets from crossing specified interfaces. (i) Extended ACL (Destination based) Extended Access Control Lists (ACLs) allow you to permit or deny traffic from specific IP addresses to a specific destination IP address and port. It also allows you to specify different types of traffic such as ICMP, TCP, UDP, etc. Needless to say, it is very granular and allows you to be very specific. Commands Router (config)#access-list 100 deny tcp host ip 20.0.0.2 host 10.0.0.3 EQ 80 Router(config)#access-list 100 permit tcp any host 10.0.0.3 EQ 80 Router(config)#access-list 100 permit IP any any Router(config)#interface fast Ethernet 0/0 Router(config)#ip access-group100 in (ii) Standard ACL (Number based) Commands Router(config)#access-list N deny 20.0.0.2 Router(config)#access-list N permit any Router(config)#interface Se0/0/0 Router(config)#ip access-group N in
  • 43. (iii) Standard ACL (Name based) Router(config)#IP access-list standard abc Router(config)#deny 20.0.0.2 Router(config)#permit any Router(config)#exit Router(config)#interface Se0/0/0 Router(config)#ip access-group abc in
  • 44.  Switching is process to forward packets coming in from one port to a port leading towards the destination. VLAN A local area network, or LAN, provides the nodes connected to it with direct (Layer 2) access to one another
  • 45. Commands to create VLAN Switch(config)#VLAN 2 Switch (config)#name Sales To assign Ports in VLAN Switch(config)#interface fastethernet0/1 Switch (config) #switch port mode access Switch (config) #switch port access VLAN 2 VTP (Virtual Trunking Port) VTP) is a protocol created by Cisco to create and manage VLANs for a large network with many interconnected switches and to maintain consistency throughout the network. A network switch, which is participating in VLAN Trunking Protocol (VTP), can have three different modes. • Server Mode • Client Mode • Transparent Mode
  • 46. PORT SECURITY Method-I Switch(config)#interface fastethernet 0/11 Switch(config)#switchport mode access Switch(config)#switchport port security mac 21.13.8.1 Remove pc and again connect to give the following command Switch(config)#interface fast Ethernet 0/11 Switch(config)#shutdown Switch(config)#no shutdown Method II Switch(config)#interface fast Ethernet 0/11 Switch(config)#Switch port port-security Switch(config)#switch port port-security mac-address sticky Switch(config)#switch port port-security max-2 Switch(config)#switch port port-security violation shutdown
  • 47. NAT Network Address Translation (NAT) is the process where a network device, usually a firewall, assigns a public address to a computer (or group of computers) inside a private network. The main use of NAT is to limit the number of public IP addresses an organization or company must use, for both economy and security purposes. The most common form of network translation involves a large private network using addresses . Types of NAT 1.Static NAT (Network Address Translation) Static NAT (Network Address Translation) is one-to-one mapping of a private IP address to a public IP address. COMMANDS Switch(config)#IP NAT inside source static 10.0.0.2 122.122.100.10 Switch(config)#IP nat inside source static 10.0.0.3 122.122.100.11 Switch(config)#interface fastethernet 0/0 Switch(config)#IP nat inside exit Switch(config)#interface serial 0/0/0 Switch(config)#IP nat outside
  • 48. 2.Dynamic NAT (Network Address Translation) Dynamic NAT can be defined as mapping of a private IP address to a public IP address from a group of public IP address. COMMANDS Switch(config)#interface fast Ethernet 0/0 Switch(config)#IP Nat inside Switch(config)#exit Switch(config)#interface serial 0/0/0 Switch(config)#IP nat outside Switch(config)#exit Switch(config)#access-list 10 permit 10.0.0.0 0.255.255.255.255 Switch(config)#IP nat pool abc 122.122.200.10 122.122.200.10 netmask 255.255.255.0 Switch(config)#IP Nat inside source list 10 pool abc 3. PAT (Port Address Translation) Port Address Translation (PAT) is another type of dynamic NAT which can map multiple private IP addresses to a public IP address by using a technology known as Port Address Translation.
  • 49. Commands Switch(config)#access-list 10 permit 10.0.0.0 0.255.255.255 Switch(config)#IP nat pool abc 122.122.200.20 122.122.200.20 net mask 255.255.255.0 Switch(config)#IP nat inside source list 10 pool abc overloads Switch(config)#interface fast Ethernet 0/0 Switch(config)IP Nat inside Switch(config)#exit Switch(config)#interface serial 0/0/0 Switch (config)#IP Nat outside
  • 50. Subnetting is a process of dividing large network into the smaller networks based on layer 3 IP address. Every computer on network has an IP address that represent its location on network. Two version of IP addresses are available IPv4 and IPv6. Class A addresses range from 1-126 Class B addresses range from 128-191 Class C addresses range from 192-223 Class D addresses range from 224-239 Class E addresses range from 240-254 Subnet mask Subnet mask is a 32 bits long address used to distinguish between network address and host address in IP address. Subnet mask is always used with IP address. Subnet mask has only one purpose, to identify which part of an IP address is network address and which part is host address. 
  • 51. Class Subnet Mask Format A 255.0.0.0 Network.Host.Host.Host B 255.255.0.0 Network.Network.Host.Host C 255.255.255.0 Network.Network.Network.Host
  • 52.  A computer network or data network is a telecommunications network which allows computers to exchange data.  In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media. The best-known computer network is the Internet.  Computer networks support an enormous number of applications and services such as access to the World Wide Web, digital video, digital audio, shared use of application and storage servers, printers, and fax machines, and use of email and instant messaging applications as well as many others.  In most cases, application-specific communications protocols are layered (i.e. carried as payload) over other more general communications protocols.
  • 53. Textbooks: [1] Goleniewski, L. (2006) Telecommunications Essentials, Addison Wesley Professional. ) [2 ]Kurose, J.F. and K.W. Ross (2003) Computer Networking: A Top Down Approach Featuring the Internet, Addison Wesley. ) [3] Mir, N.F. (2006) Computer and Communication Networks, Prentice Hall. [4]“Computer Networks” by Andrew S. Tanenbaum [5] “Internetworking with TCP/IP, Volume 1” by Douglas Comer. [6] Sam Halabi & Danny McPherson, Internet Routing Architectures. [7 ]Christian Huitema, Routing in the Internet. Research Papers: [8][3ComWHITE] 3Com, "Understanding IP Addressing: Everything You Ever wanted to Know," White Paper, May 2001. [9][Cisco IP] Cisco, "Internet Protocols," Internetworking Technology Handbook. [10][Cisco Routing] Cisco, "Routing Basics," Internetworking Technology Handbook.