003 - CCNA DAY 1-b
003 - CCNA DAY 1-b
003 - CCNA DAY 1-b
CCNA 1 PART 2
Decimal to Binary
172 Base 10 172
100 = 1 101 = 10 102 = 100 103 = 1000
1 10 100 1000
2 70 100
172
10101100
20 = 21 = 22 = 23 = 24 = 25 = 26 = 27 = 1 2 4 8 16 32 64 128 3
10101100 Base 2
1 2 4 8 16 32 64 128
0 0 4 8 0 32 0 128 172
172.18.0.2
10.13.0.0 10.13.0.1
HDR SA DA DATA
172.16.0.2
192.168.1.0 192.168.1.1
172.17.0.1
172.17.0.2
Unique addressing allows communication between end stations. Path choice is based on destination address. Location is represented by an address
IP Addressing
32 Bits Dotted Decimal Maximum
1
Network
Host
255
8 9
255
16 17
255
24 25
255
32
Binary
11111111 11111111
128 64 32 16 8 4 2 1 128 64 32 16 8 4 2 1
11111111 11111111
128 64 32 16 8 4 2 1 128 64 32 16 8 4 2 1
Example 172 16 122 204 Decimal Example 10101100 00010000 01111010 11001100 9 Binary
IP Address Classes
8 Bits 8 Bits Host 8 Bits Host Host 8 Bits Host Host Host
Class A:
Network
Class B:
Class C:
Network Network
Class D:
Class E:
Multicast
Research
10
IP Address Classes
Bits: 1 8 9 Host 16 17 16 17 Host 24 25 24 25 Host 32 32
Class A:
Bits:
Class B:
Bits:
10NNNNNN
Range (128-191) 1 8 9 110NNNNN Range (192-223) 1 8 9 1110MMMM
Network
16 17 Network
Host
24 25
Host
32 Host 24 25 32
Class C:
Bits:
Network 16 17
Class D:
Range (224-239)
Host Addresses
172.16.2.2 10.1.1.1
10.6.24.2 E1
172.16.3.10 E0 172.16.2.1 10.250.8.11
172.16.12.12
10.180.30.118
172.16 Network
12 . 12 Host
13
172
16
0
N
0
1 2 3 65534 65535 65536 2 65534 15
...
...
16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1
192.6.141.2
130.113.64.16 256.241.201.10
16
Subnetting
Subnetting is logically dividing a big network into smaller networks by BORROWING HOST BITS.
Advantage:
Can divide network in smaller parts Restrict Broadcast traffic Security Simplified Administration
18
Formula
Number of subnets 2x-2 Where X = number of bits borrowed Number of Hosts 2y-2 Where y = number of 0s Block Size = Total number of Address Block Size = 256-Mask
19
172.16.0.0
Network 172.16.0.0
21
172.16.3.0
172.16.4.0
172.16.1.0
172.16.2.0
Network 172.16.0.0
22
Subnet Addressing
172.16.2.200 172.16.3.1 E1 172.16.2.2 E0 172.16.2.1 172.16.3.100 172.16.3.5
172.16.2.160
172.16.3.150
172.16 Network
2 . 160 Host
Subnet Addressing
172.16.2.200 172.16.3.1 E1 172.16.2.2 E0 172.16.2.1 172.16.3.100 172.16.3.5
172.16.2.160
172.16.3.150
172.16 Network
160
Subnet Host
Subnet Mask
IP Address
172
255 11111111
16
Subnet Mask
255
255
255
0
25
1
1 1
1
1 1
1
1 1
1
1 1
0
1 1
0
0 1
0
0 0
0
0 0
=
= =
240
248 252
1
1
1
1
1
1
1
1
1
1
1
1
1
1
0
1
=
=
254
255
26
Class
Subnet
10.30.36.12
255.255.255.0
30
Class B A A
31
Broadcast Addresses
172.16.3.0
172.16.4.0
172.16.1.0 172.16.3.255 (Directed Broadcast) 255.255.255.255 (Local Network Broadcast) 172.16.255.255 (All Subnets Broadcast)
32
172.16.2.0
172.16.2.160 255.255.255.192
172.16.2.160 255.255.255.192
10101100 11111111
00010000 11111111
172.16.2.160 255.255.255.192
172.16.2.128
172.16.2.191 172.16.2.129 172.16.2.190
10101100
10101100 10101100
00010000
00010000 00010000
00000010 10|111111
Broadcast
Subnet Planning
20 Subnets 5 Hosts per Subnet Class C Address: 192.168.5.0 192.168.5.16 Other Subnets
192.168.5.32
192.168.5.48
42
Exam Question
Determine Subnet and Broadcast address
192.168.0.100/27
50
Exercise
192.168.10.54 /29 Mask ? Subnet ? Broadcast ?
51
Exercise
192.168.10.130 /28 Mask ? Subnet ? Broadcast ?
52
Exercise
192.168.10.193 /30 Mask ? Subnet ? Broadcast ?
53
Exercise
192.168.1.100 /26 Mask ? Subnet ? Broadcast ?
54
Class
Subnet
Broadcast
76
153.50.6.27
255.255.255.128
153.50.6.0
153.50.6.127
77
VLSM
VLSM is a method of designating a different subnet mask for the same network number on different subnets Can use a long mask on networks with few hosts and a shorter mask on subnets with many hosts With VLSMs we can have different subnet masks for different subnets.
78
Networking Requirements
Bangalore 60
WAN 1
WAN 2
WAN 3
Mumbai 60
Sydney 60
Singapore 60
In the example above, a /26 was used to provide the 60 addresses for Bangalore and the other LANs. There are no addresses left for WAN links 80
Networking Scheme
Mumbai 192.168.10.64/27
28
192.168.10.128/30
192.168.10.132/30
WAN 192.198.10.137 and 138
192.168.10.136/30
60
12
12
Singapore 192.168.10.112/28
81
VLSM Exercise
2
12
40 2 2
25
192.168.1.0
82
VLSM Exercise
192.168.1.64/26 40 2 192.168.1.4/30 192.168.1.8/30 2 2 192.168.1.12/30 192.168.1.16/28
12
25
192.168.1.32/27
192.168.1.0
83
VLSM Exercise
2
8 2 5
2 35 15
192.168.1.0
84
Summarization
Summarization, also called route aggregation, allows routing protocols to advertise many networks as one address. The purpose of this is to reduce the size of routing tables on routers to save memory Route summarization (also called route aggregation or supernetting) can reduce the number of routes that a router must maintain Route summarization is possible only when a proper addressing plan is in place Route summarization is most effective within a subnetted environment when the network addresses are in contiguous blocks
85
Summarization
86
Supernetting
Network 172.16.12.0 172.16.13.0 172.16.14.0 172.16.15.0 11000000 11000000 11000000 Network Network
16 8 4 2 1
Subnet
11000000
10101000 00001100 00000000 10101000 00001101 00000000 10101000 00001110 00000000 10101000 00001111 00000000 11111111
255.255.255.0 11111111
11111111
00000000
87
Supernetting
Network 172.16.12.0 172.16.13.0 172.16.14.0 172.16.15.0 11000000 11000000 11000000 Network Network
16 8 4 2 1
Subnet
11000000
10101000 00001100 00000000 10101000 00001101 00000000 10101000 00001110 00000000 10101000 00001111 00000000 11111111
255.255.252.0 11111111
172.16.12.0/24 172.16.13.0/24 172.16.14.0/24 172.16.15.0/24
11111100
00000000
172.16.12.0/22
88
Supernetting Question
What is the most efficient summarization that TK1 can use to advertise its networks to TK2?
A. 172.1.4.0/24, 172.1.5.0/24, 172.1.6.0/24, 172.1.7.0/24 B. 172.1.0.0/22 C. 172.1.4.0/25, 172.1.4.128/25, 172.1.5.0/24, 172.1.6.0/24, 172.1.7.0/24 D. 172.1.0.0/21 E. 172.1.4.0/22
89
In the implementation of VLSM techniques on a network using a single Class C address, which subnet mask is the most efficient for point to point serial links?
a. b. c. d. e.
In the implementation of VLSM techniques on a network using a single Class C address, which subnet mask is the most efficient for point to point serial links?
a. b. c. d. e.
Which of the following describe private IP addresses? (Choose two) a. Addresses chosen by a company to communicate with the internet. b. Addresses that cannot be routed through the public internet. c. Addresses that can be routed through the public internet. d. A scheme to conserve public addresses.
92
Which of the following describe private IP addresses? (Choose two) a. Addresses chosen by a company to communicate with the internet. b. Addresses that cannot be routed through the public internet. c. Addresses that can be routed through the public internet. d. A scheme to conserve public addresses.
93
Refer to the exhibit. What IP address should assigned to Workstation A? a. b. c. d. e. 192.168.1.143/28 192.168.1.144/28 192.168.1.145/28 192.168.1.159/28 192.168.1.160/28
94
Refer to the exhibit. What IP address should assigned to Workstation A? a. b. c. d. e. 192.168.1.143/28 192.168.1.144/28 192.168.1.145/28 192.168.1.159/28 192.168.1.160/28
95
If an Ethernet port on a router was assigned an IP address of 172.16.112.1/20, what is the maximum number of hosts allowed on this subnet? a. b. c. d. e. 1024 2046 4094 4096 8190
96
If an Ethernet port on a router was assigned an IP address of 172.16.112.1/20, what is the maximum number of hosts allowed on this subnet? a. b. c. d. e. 1024 2046 4094 4096 8190
97
Refer to the exhibit. A new subnet with 12 hosts has been added to the network. Which subnet address should this network use to provide enough usable addresses while wasting the fewest addresses?
a. b. c. d.
98
Refer to the exhibit. A new subnet with 12 hosts has been added to the network. Which subnet address should this network use to provide enough usable addresses while wasting the fewest addresses?
a. b. c. d.
99
IOS Management
IOS Internetwork Operating System The operating systems used by Cisco routers and switches are called IOS. The IOS file itself is several MB in size and is stored in a semi-permanent memory area called flash.
100
IOS Management
101
IOS Management
Accessing the Cisco IOS on a Device
Methods: Console, Telnet or SSH, AUX port
102
IOS Management
103
IOS Management
Cisco IOS Modes
104
IOS Management
IOS Prompt Structure
105
IOS Management
Moving between the Modes
Output similar to a Cisco switch
106
IOS Management
107
IOS Management
IOS Command Convention
108
IOS Management
109
IOS Management
110
IOS Management
Hot Keys and Shortcuts
Tab - Completes the remainder of the command or keyword Ctrl-R - Redisplays a line Ctrl-Z - Exits configuration mode and returns to the EXEC Down Arrow - Allows user to scroll forward through former commands (Ctrl-N) Up Arrow - Allows user to scroll backward through former commands (Ctrl-P) Ctrl-Shift-6 - Allows the user to interrupt an IOS process such as ping or traceroute Ctrl-C - Aborts the current command and exits the configuration mode
Commands and keywords can be abbreviated to the minimum number of characters that identifies a 111 unique selection.
IOS Examination Commands Identify the purpose of the show command and several of its variations
Use strong passwords that are not easily guessed. In our labs, simple passwords such as cisco or class will be used. These passwords are considered weak and easily guessable.
Use Cisco CLI Commands to Perform Basic Router & Switch Configuration and Verification
Service Password-Encryption - causes the encryption of passwords to occur when a password is configured. The command applies weak encryption to all unencrypted passwords; weak encryption; irreversible
Banner MOTD
Because banners can be seen by anyone who attempts to log in, the message must be worded very carefully. Any wording that implies that a login is "welcome" or "invited" is not appropriate.
Configuration files should be stored as backup files in the event of a problem. Configuration files can be stored on a Trivial File Transfer Protocol (TFTP) server, a CD, a USB memory stick, or a floppy disk stored in a safe place. A configuration file should also be included in the network documentation..
Interface Descriptions
Interface Testing
Use Common Utilities to Establish a Relative Performance Baseline for the Network
A baseline is a process for studying the network at regular intervals to ensure that the network is working as designed. It is more than a single report detailing the health of the network at a certain point in time. One method for starting a baseline is to copy and paste the results from an executed ping, trace, or other relevant command into a text file.
Use Common Utilities to Establish a Relative Performance Baseline for the Network
Use the output of the traceroute command, saved into logs, and repeated over time, to establish relative network performance