Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2011 ITT Educational Services Inc.

Similar presentations


Presentation on theme: "© 2011 ITT Educational Services Inc."— Presentation transcript:

1 Unit 2 TCP/IP Network, Transport & Application Layers Chapters 5-7 NT2640.U2.PS1
© 2011 ITT Educational Services Inc. NT-2640 Advanced Networking: Unit 2: Slide 1

2 Class Agenda 11/21/16 Learning Objectives
Unit 2: Presentation and Discussions and Videos Chapter 5-7 Discussion on Lab Activities. Discussion on Assignments. Break Times. 10 Minutes break in every 1 Hour. Note: Submit all Assignment and labs due today.

3 In this unit, students will demonstrate an:
Objectives In this unit, students will demonstrate an: Understanding of Network Layer Addressing Understand of Basic IP Routing Concepts Understanding of Basic IP Subnetting Principles Understanding of the Differences between and the Features of the Layer 4 Protocols TCP & UDP Understanding of Basic Network Security Concepts including Common Issues and Defenses Understanding Tasks Involved in the Installation of Cisco IOS Devices Understanding the Basic Tasks Involved in the Accessing the Cisco IOS CLI Environment and Utilizing the Help Subsystem © 2011 ITT Educational Services Inc. NT-2640 Advanced Networking: : Unit 2: Slide 3

4 Network Layer Addressing and Layer 4 Protocols Chapters 5 & 6 NT2640-U2-PS1
© 2011 ITT Educational Services Inc. NT-2640 Advanced Networking: : Unit 2: Slide 4 4

5 Routing Logic: PC1 Sending to PC2
© 2011 ITT Educational Services Inc. NT-2640 Advanced Networking: Unit 2: Slide 5

6 IPv4 Header © 2011 ITT Educational Services Inc.
NT-2640 Wan Technologies: Unit 2: Slide 6

7 Example 19.1 Change the following IPv4 addresses from binary notation to dotted-decimal notation. Solution We replace each group of 8 bits with its equivalent decimal number (see Appendix B) and add dots for separation.

8 Figure 19.2 Finding the classes in binary and dotted-decimal notation

9 Figure 19.7 Configuration and addresses in a subnetted network

10 Using Subnets © 2011 ITT Educational Services Inc.
NT-2640 Wan Technologies: Unit 2: Slide 10

11 Address Formats When Subnetting Is Used (Classful)
© 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 11

12 Address Formats When Subnetting Is Used (Classless)
IP addressing with subnetting uses a concept called a subnet mask. A subnet mask helps define the structure of an IP address, © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 12

13 Table 19.2 Default masks for classful addressing

14 ROUTING or FORWARDING Forwarding means to place the packet in its route to its destination. Forwarding requires a host or a router to have a routing table. When a host has a packet to send or when a router has received a packet to be forwarded, it looks at this table to find the route to the final destination. Forwarding Techniques Forwarding Process Routing Table

15 Figure 22.2 Route method versus next-hop method

16 Simple Routing Example, with IP Subnets
© 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 16

17 Network Layer Utilities
(ARP) Address Resolution Protocol (DNS) Domain Name System (DHCP) Dynamic Host Configuration Protocol (ICMP) Internet Control Message Protocol used for troubleshooting - Ping & Tracert © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 17

18 Chapter 6 Fundamentals of TCP/IP Transport, Applications, and Security
© 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 18

19 TCP/IP Layer 4 Protocols: TCP and UDP
Function Description Multiplexing using ports Function that allows receiving hosts to choose the correct application for which the data is destined, based on the port number. Error recovery (reliability) Process of numbering and acknowledging data with Sequence and Acknowledgment header fields. Flow control using windowing Process that uses window sizes to protect buffer space and routing devices. Connection establishment and termination Process used to initialize port numbers and Sequence and Acknowledgment fields. Ordered data transfer and data segmentation Continuous stream of bytes from an upper-layer process that is “segmented” for transmission and delivered to upper-layer processes at the receiving device, with the bytes in the same order. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 19

20 Multiplexing Using TCP Port Numbers
The computer might be running many applications, such as a web browser, an package, or an Internet VoIP application (for example, Skype). TCP and UDP multiplexing enables the receiving computer to know which application to give the data to. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 20

21 6-1 MULTIPLEXING Whenever the bandwidth of a medium linking two devices is greater than the bandwidth needs of the devices, the link can be shared. Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link. As data and telecommunications use increases, so does traffic.

22 Figure 6.3 Frequency-division multiplexing

23 Popular Applications and Their Well-Known Port Numbers
Protocol Application 20 TCP FTP data 21 FTP control 22 SSH 23 Telnet 25 SMTP 53 UDP, TCP DNS 67, 68 UDP DHCP 69 TFTP 80 HTTP (WWW) 110 POP3 161 SNMP 443 SSL 16, 384–32, 767 RTP-based Voice (VoIP) and Video © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 23

24 Connection & Connectionless Protocols
Connection-oriented protocol: A protocol that requires an exchange of messages before data transfer begins or that has a required preestablished correlation between two endpoints Connectionless protocol: A protocol that does not require an exchange of messages and that does not require a preestablished correlation between two endpoints © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 24

25 Firewalls IDS and IPS VPN © 2011 ITT Educational Services Inc.
NT-2640 Wan Technologies: Unit 2: Slide 25

26 Chapter 7 Operating Cisco Routers
© 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 26

27 Cisco Routers Cisco routers need to know several pieces of information before they can start routing IP packets. First, they need to know which of their physical interfaces currently connect to real LANs and WANs. Next, the router needs to know its IP address and mask for each of these interfaces. The router can then use each interface’s IP address/mask pair to calculate the subnet ID of the subnet connected to that interface. Finally, the routers need to advertise information about the subnets, so that all routers learn about all subnets, and can then choose the best route with which to forward packets to reach each subnet. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 27

28 Installing Cisco Routers
Routers collectively provide the main feature of the network layer—the capability to forward packets end-to-end through a network. Routers forward packets by connecting to various physical network links, like Ethernet, serial links, and Frame Relay, and then using Layer 3 routing logic to choose where to forward each packet. A typical enterprise network has a few centralized sites as well as lots of smaller remote sites. To support devices at each site (the computers, IP phones, printers, and other devices), the network includes at least one LAN switch at each site. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 28

29 Detailed Cabling Diagram for the Same Enterprise Network
© 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 29

30 Model 1841 Cisco Integrated Services Router (ISR)
© 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 30

31 Router Installation Step 1: Connect any LAN cables to the LAN ports.
Step 2: If using an external CSU/DSU, connect the router’s serial interface to the CSU/DSU, and the CSU/DSU to the line from the telco. Step 3: If using an internal CSU/DSU, connect the router’s serial interface to the line from the telco. Step 4: Connect the router’s console port to a PC (using a rollover cable), as needed, to configure the router. Step 5: Connect a power cable from a power outlet to the power port on the router. Step 6: Turn on the router. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 31

32 Devices in a SOHO Network with High-Speed CATV Internet
© 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 32

33 Steps for Install a SOHO router
Step 1: Connect a UTP straight-through cable from the router to the switch. Step 2: Connect a UTP straight-through cable from the router to the cable modem. Step 3: Connect the router’s console port to a PC (using a rollover cable), as needed, to configure the router. Step 4: Connect a power cable from a power outlet to the power port on the router. Step 5: Turn on the router. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 33

34 SOHO Network, Using Cable Internet with an Integrated Device
© 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 34

35 CLI Access © 2011 ITT Educational Services Inc.
NT-2640 Wan Technologies: Unit 2: Slide 35

36 Console Connection to a Router
© 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 36

37 Accessing the CLI with Telnet and SSH
To use Telnet, the user must install a Telnet client software package on his or her PC. Most terminal emulator software packages today include both Telnet and SSH client functions. The router runs Telnet server software by default, but the router does need to have an IP address configured so that it can send and receive IP packets. Additionally, the network between the PC and router needs to be up and working so that the PC and router can exchange IP packets. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 37

38 Password Security for CLI Access
By default, a Cisco router is very secure as long as the router is locked inside a room. By default, a router allows only console access, but no Telnet or SSH access. From the console, you can gain full access to all router commands, and if so inclined, you can stop all functions of the router. However, console access requires physical access to the router, so allowing console access for routers just removed from the shipping boxes is reasonable. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 38

39 User and Enable (Privileged) Modes
All three CLI access methods covered so far (console, Telnet, and SSH) place the user in an area of the CLI called user EXEC mode. User EXEC mode, sometimes also called user mode, allows the user to look around but not break anything. The “EXEC mode” part of the name refers to the fact that in this mode, when you enter a command, the router executes the command and then displays messages that describe the command’s results. Cisco IOS supports a more powerful EXEC mode called enable mode (also known as privileged mode or privileged EXEC mode). Enable mode is so named because the enable command is used to reach this mode. Privileged mode earns its name because powerful, or privileged, commands can be executed there. You can use the reload command, which tells the router to reinitialize or reboot Cisco IOS, only from enable mode. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 39

40 User and Privileged Modes
© 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 40

41 CLI Help Features What You Enter What Help You Get ?
Help for all commands available in this mode. help Text describing how to get help. No actual command help is given. command ? Text help describing all the first parameter options for the command. com? A list of commands that start with com. command parm? This style of help lists all parameters beginning with parm. (Notice that there is no space between parm and the ?.) command parm<Tab> If you press the Tab key midword, the CLI either spells the rest of this parameter at the command line or does nothing. If the CLI does nothing, it means that this string of characters represents more than one possible next parameter, so the CLI does not know which one to spell out. command parm1 ? If a space is inserted before the question mark, the CLI lists all the next parameters and gives a brief explanation of each. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 41

42 Key Sequences for Command Edit and Recall
Keyboard Command What Happens Up arrow or Ctrl-p This displays the most recently used command. If you press it again, the next most recent command appears, until the history buffer is exhausted. (The p stands for previous.) Down arrow or Ctrl-n If you have gone too far back into the history buffer, these keys take you forward to the more recently entered commands. (The n stands for next.) Left arrow or Ctrl-b This moves the cursor backward in the currently displayed command without deleting characters. (The b stands for back.) Right arrow or Ctrl-f This moves the cursor forward in the currently displayed command without deleting characters. (The f stands for forward.) Backspace This moves the cursor backward in the currently displayed command, deleting characters. Ctrl-a This moves the cursor directly to the first character of the currently displayed command. Ctrl-e This moves the cursor directly to the end of the currently displayed command. Ctrl-r This redisplays the command line with all characters. It’s useful when messages clutter the screen. Ctrl-d This deletes a single character. Esc-b This moves back one word. Esc-f This moves forward one word. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 42

43 Configuring Cisco IOS Software
Configuration mode is another mode for the Cisco CLI, similar to user mode and privileged mode. User mode lets you issue non-disruptive commands and displays some information. Privileged mode supports a superset of commands compared to user mode, including commands that might harm the router. However, none of the commands in user or privileged mode changes the router’s configuration. Configuration mode accepts configuration commands—commands that tell the router the details of what to do, and how to do it. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 43

44 CLI Configuration Mode Versus Exec Modes
© 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 44

45 Configuration Submodes and Contexts
Configuration mode itself contains a multitude of subcommand modes. Context-setting commands move you from one configuration subcommand mode, or context, to another. These context-setting commands tell the router the topic about which you will enter the next few configuration commands. More importantly, the context tells the router the topic you care about right now, so when you use the ? to get help, the router gives you help about that topic only. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 45

46 Storing Router Configuration Files
RAM: Sometimes called DRAM for Dynamic Random-Access Memory, RAM is used by the router just as it is used by any other computer: for working storage. The running (active) configuration file is stored here. ROM: Read-Only Memory (ROM) stores a bootstrap (or boothelper) program that is loaded when the router first powers on. This bootstrap program then finds the full Cisco IOS image and manages the process of loading Cisco IOS into RAM, at which point Cisco IOS takes over operation of the router. Flash memory: Either a chip inside the router or a removable memory card, Flash memory stores fully functional Cisco IOS images and is the default location where the router gets its Cisco IOS at boot time. Flash memory also can be used to store any other files, including backup copies of configuration files. NVRAM: Nonvolatile RAM (NVRAM) stores the initial or startup configuration file that is used when the router is first powered on and when the router is reloaded. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 46

47 Configuration Mode, changes for the running-config file
Step 1: The original hostname command on the router, with the startup-config file matching the running-config file. Step 2: The hostname command changes the hostname, but only in the running-config file. Step 3: The show running-config and show startup-config commands are shown, with only the hostname commands displayed for brevity, to make the point that the two configuration files are now different. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 47

48 IFS Filenames for the Startup and Running Config Files
Config File Common Name Alternative Names startup-config nvram: nvram:startup-config running-config system:running-config © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 48

49 Entering the Setup Mode
© 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 49

50 Check Point What type of cable is used for console access to a Cisco router and what is the serial communication connection properties? Describe the differences between NVRAM and flash storage Describe the differences between enable mode and configuration mode Describe the differences between startup-config an running-config © 2011 ITT Educational Services Inc. NT-2640 Advanced Networking: : Unit 1: Slide 50

51 Summary In this unit, we discussed: Network Layer Addressing
Basic IP Routing Concepts Basic IP Subnetting Principles Differences between and Features of the Layer 4 Protocols TCP & UDP Basic Network Security Concepts including Common Issues and Defenses Tasks Involved in Installing Cisco IOS Devices Basic Tasks Involved in Accessing the Cisco IOS CLI Environment and Using the Help Subsystem © 2011 ITT Educational Services Inc. NT-2640 Advanced Networking: : Unit 2: Slide 51

52 Unit 2 Assignments Assignment 2.1:Networking Protocol Numbers
Discussion 2.1: IP Addressing and Routing-Exercise Read Assignment. Read Chapter 5 to 7. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 52

53 Unit 2 Lab Switch CLI Exec Mode Switch CLI Configuration Process I
Switch CLI Configuration Process II Router CLI Exec Mode I Router CLI Exec Mode II Route CLI Configuration Process Setting Switch Passwords Setting Router Passwords Configuring Hostnames Subnetting Lab 1 Subnetting Lab 2 Note: Use the syllabus to determine the correct lab. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 53


Download ppt "© 2011 ITT Educational Services Inc."

Similar presentations


Ads by Google