The document provides an overview of IT network design and installation topics covered in a MaxWiFi training course, including network models, IP addressing, NAT, routing, DHCP, VLANs, wireless networking, and Cisco device configuration.
This document provides information about networking concepts for the CCNA exam, including transmission media, network interface cards, protocols, addresses, hubs, switches, routers, and the OSI model. It defines common networking cable types and standards like Ethernet and their associated bandwidths. It also covers IP addressing schemes including public/private IP ranges, subnetting of IP classes A, B and C, and default subnet masks. Network communication methods like unicast, broadcast and multicast are defined.
This document provides an overview of networking concepts including network components, layers of the OSI model, network structures, IP addressing, subnetting, routing, and TCP/IP protocols. Key points covered include the core, distribution, and access layers of a network hierarchy; functions of the physical, data link, network, and transport layers; MAC addressing; IP addressing classes and subnetting; TCP and port numbers; and routing protocols.
If the number of spine switches were to be merely doubled, the effect of a single switch failure is halved. With 8 spine switches, the effect of a single switch failure only causes a 12% reduction in available bandwidth. So, in modern data centers, people build networks with anywhere from 4 to 32 spine switches. With a leaf-spine network, every server on the network is exactly the same distance away from all other servers three port hops, to be precise. The benefit of this architecture is that you can just add more spines and leaves as you expand the cluster and you don't have to do any recabling. Intuition Systems will also get more predictable latency between the nodes.
As a trend, disaggregation seems to be most useful for very large companies like Facebook and Google, or cloud providers. The technology does not necessarily have significant implications for small or medium sized businesses. Historically, however, technology has a way of trickling down from the pioneering phases of existing only within large companies with tremendous resources, to becoming more standardized across the board.
Zdalna komunikacja sieciowa - zagadnienia sieciowe Agnieszka Kuba
油
This document discusses remote communication and networking concepts. It covers transmission modes, Ethernet basics, the TCP/IP model including layers, IP addressing and subnets, network devices like routers and firewalls, protocols like TCP, UDP, DNS, DHCP, and VPN technology. Mobile networks including 2G, 3G, 4G and LTE standards are also summarized along with examples of mobile remote access solutions.
This document provides an overview of routing fundamentals and subnetting in CCNA version 3.0. It discusses routed and routing protocols, how IP acts as a routed protocol, routing tables, routing algorithms and metrics, and the mechanics of subnetting including establishing subnet masks and calculating subnetworks through ANDing. The objectives are to understand routed protocols, IP routing protocols, and the mechanics of subnetting.
Repeaters amplify signals and hubs connect multiple devices in a star topology within a single collision domain. Switches forward frames based on MAC addresses, creating multiple collision domains and full-duplex connections. Routers connect different networks and forward packets based on IP addresses. Modems convert between digital and analog signals to transmit data over telephone or cable lines. VPNs create secure private networks across public networks using encryption. Common network cabling includes coaxial cable, twisted pair cable, and fiber optic cable.
GMNS will design and implement a computer network for First Bourne Tax Services including installing hardware such as servers, switches, routers, firewalls, and access points. The network will utilize virtualization and cloud services including containers for functions like DHCP, DNS, file sharing, and security cameras. Hardware specifications are provided for the EMC storage servers and considerations for storage configuration, RAID levels, and calculating disk IOPS.
This document discusses several common networking devices and their functions. It describes hubs, switches, bridges, routers, gateways, CSU/DSUs, NICs, ISDN adapters, modems, and firewalls. Hubs broadcast traffic to all ports, wasting bandwidth, while switches only forward frames to their destination port. Bridges operate at the data link layer and routers at the network layer. Gateways perform protocol translation. NICs connect devices to the network. Modems convert digital to analog signals for transmission over phone lines. Firewalls control network access for security.
The document discusses several key networking concepts:
- The Internet is a global network of interconnected devices linked by various networking technologies.
- A VPN creates a secure connection over the public Internet by tunneling between a remote computer and a company's network. VPNs allow remote access and sharing of private data.
- In a client/server network, work is shared between client computers and centralized server computers which provide applications, files, and other resources.
- Peer-to-peer networks have no servers - all computers act as both clients and servers, allowing direct sharing between users like in file sharing programs.
ccna workbook and lab manual by NETWORKERS HOME. NETWORKERS HOME understand the importance of CCNA workbook when it comes Cisco certification which is why we offered free CCNA workbook.
This document discusses various networking devices and their functions. It describes hubs, switches, bridges, routers, gateways, CSU/DSU, NICs, ISDN adapters, modems and firewalls. It explains that hubs broadcast traffic to all ports, wasting bandwidth, while switches only forward frames to their destination port based on MAC addresses. Routers route packets based on IP addresses and connect LANs and WANs. Gateways translate between different data formats. NICs allow devices to connect to networks. Modems convert digital to analog signals for transmission over phone lines. Firewalls control network access for security.
Networking issues for distributed systemskingGovindi
油
The document provides an overview of networking issues for distributed systems, basic networking concepts, and Internet protocols. It discusses performance parameters like latency and data transfer rate that affect message transfer speed. It also describes various wired and wireless network types and their typical bandwidth and latency ranges. The document introduces the OSI 7-layer model and summarizes each layer's functions. It explains concepts like routing, routing algorithms, encapsulation, and the TCP/IP protocol stack. The document provides examples of routing tables, packet encapsulation, and how NAT enables private addressing on local networks.
The document provides information about line transmission and summarizes key details about the European E1 digital transmission format, the VMX0100 versatile multiplexer, and synchronous digital hierarchy (SDH). It describes that the E1 format reserves two channels for signaling and control, with time slot 0 for transmission management and time slot 16 for signaling. It then provides an introduction to the VMX0100 multiplexer, describing its features such as E1 and fractional E1 interfaces, voice ports, and data interfaces. The document discusses transmission mediums, cards, user interfaces, and applications of the VMX0100. It concludes with an introduction to SDH, describing its frame structure and advantages over the plesiochronous digital hierarchy such as support
This document provides the answers to a CCNA 1 v6.0 Final Exam with 100 questions. Some key points:
- It addresses topics related to networking fundamentals, including network models, protocols, network configuration and troubleshooting.
- The questions test knowledge of networking concepts and Cisco IOS commands across the OSI model layers, from physical layer addressing to application layer protocols.
- Answers are provided for multiple choice questions about LANs, WANs, routing, switching, IPv4 and IPv6 addressing, TCP/IP protocols and network client-server models.
The document provides instructions for setting up and using a wireless customer premises router (CPE). It includes:
1) An overview of the CPE and its capabilities, including routing traffic between a user network and internet service provider.
2) Details on proper network implementation, including using the CPE as a router between wired and wireless networks with different IP ranges.
3) Instructions for accessing and navigating the CPE's browser-based user interface to configure settings like IP addresses, default gateways, and wireless settings.
4) Step-by-step directions for basic CPE configuration options, including setting the CPE up as a router with network address translation between its Ethernet and wireless interfaces.
The document discusses IP addressing and routing in LTE networks. It covers:
- OSI layers used in LTE including physical, MAC, RLC, and PDCP layers
- IP addressing schemes including IPv4 addressing, subnetting, and network/broadcast addresses
- IP routing configuration in BSCs, RNCs, and between network nodes
- Interface IP allocation and configuration of BTS, NodeB, and OAM addresses
This document provides an overview of computer networking concepts including:
1) It defines what a network is and describes the basic components of a network like cables, devices, and operating systems.
2) It discusses different types of networks including LANs, WANs, and examples of networking technologies and topologies used.
3) It covers IP addressing fundamentals like IP classes and private IP ranges.
4) It describes common networking devices like switches, routers, and their functions.
5) It provides steps for basic router configuration and setting up RIP routing protocol.
The document discusses the key responsibilities and functions of the network layer in computer networking. The network layer is responsible for getting packets from their source to their destination across multiple hops and routers. It must choose appropriate paths through the network topology and balance traffic loads across lines and routers. The network layer provides either a connectionless or connection-oriented service and uses different packet forwarding mechanisms depending on the chosen service.
The document discusses planning and cabling for a CCNA Exploration course. It covers topics like identifying media for LANs and WANs, cable types and standards, switch and router configurations. Examples are provided for designing addressing schemes for networks using VLSM and subnetting techniques. The document compares different network designs and components like hubs, switches and routers. It also discusses cable lengths, types and connections used within networks and between networks.
The document discusses network technologies and concepts. It covers topics like network layers, IP addressing, routing, and protocols. It provides an overview of common network standards and technologies used in both home and enterprise networks, such as Ethernet, switches, WiFi, and IP routing.
A LAN or Local Area Network is a computer network (or data communications network) which is confined in a limited geographical location. A Virtual (or logical) LAN is a local area network with a definition that maps workstations/PCs on some other basis than geographic location (for example, by department, type of user or primary application)
This document discusses computer networks and networking concepts such as IP addressing, routing, broadcasting, multicasting, and routing algorithms. It describes the IP address classes (A, B, C, D, E), how IP addresses are assigned, and how network masks are used to determine the network ID and host ID portions of an IP address. Common routing algorithms like flooding, distance vector routing, and link state routing are also summarized.
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...Tarun Khaneja
油
This document provides a summary of a presentation on CCNA (Cisco Certified Network Associate). It was trained by Ravinder Kumar from Gurukul Technical Institute and submitted by Tarun Khaneja with roll number 2110045 and contact number 09034406598. The presentation introduces CCNA and discusses networking types and applications. It also covers networking devices, subnetting, routing protocols like RIP, EIGRP, OSPF, ACLs, VLANs, and inter-VLAN routing. Configuration examples are provided for EIGRP and RIP routing on the same network.
This document discusses IP addressing and routing in computer networks. It covers MAC addresses, IP addresses (including IPv4 and IPv6), IP address classes (A, B, C, D, E), network masks, loopback addresses, routing algorithms like flooding, distance vector, and link state. It also defines terms like routers, gateways, ping, bandwidth, transmission time, propagation delay, routing tables, and shortest path trees. The goal of computer networks is to provide fast, accurate, adequate, and secure communication between systems.
This IT company provides network support and aims to upgrade their client's network. The upgrade involves 3 phases: establishing WAN connectivity between sites; upgrading a remote site's LAN with switches and VLANs; and adding a Frame Relay switch with PPP encapsulation. The upgrade will improve productivity by connecting sites, using new equipment, and adding security between networks.
This document discusses several common networking devices and their functions. It describes hubs, switches, bridges, routers, gateways, CSU/DSUs, NICs, ISDN adapters, modems, and firewalls. Hubs broadcast traffic to all ports, wasting bandwidth, while switches only forward frames to their destination port. Bridges operate at the data link layer and routers at the network layer. Gateways perform protocol translation. NICs connect devices to the network. Modems convert digital to analog signals for transmission over phone lines. Firewalls control network access for security.
The document discusses several key networking concepts:
- The Internet is a global network of interconnected devices linked by various networking technologies.
- A VPN creates a secure connection over the public Internet by tunneling between a remote computer and a company's network. VPNs allow remote access and sharing of private data.
- In a client/server network, work is shared between client computers and centralized server computers which provide applications, files, and other resources.
- Peer-to-peer networks have no servers - all computers act as both clients and servers, allowing direct sharing between users like in file sharing programs.
ccna workbook and lab manual by NETWORKERS HOME. NETWORKERS HOME understand the importance of CCNA workbook when it comes Cisco certification which is why we offered free CCNA workbook.
This document discusses various networking devices and their functions. It describes hubs, switches, bridges, routers, gateways, CSU/DSU, NICs, ISDN adapters, modems and firewalls. It explains that hubs broadcast traffic to all ports, wasting bandwidth, while switches only forward frames to their destination port based on MAC addresses. Routers route packets based on IP addresses and connect LANs and WANs. Gateways translate between different data formats. NICs allow devices to connect to networks. Modems convert digital to analog signals for transmission over phone lines. Firewalls control network access for security.
Networking issues for distributed systemskingGovindi
油
The document provides an overview of networking issues for distributed systems, basic networking concepts, and Internet protocols. It discusses performance parameters like latency and data transfer rate that affect message transfer speed. It also describes various wired and wireless network types and their typical bandwidth and latency ranges. The document introduces the OSI 7-layer model and summarizes each layer's functions. It explains concepts like routing, routing algorithms, encapsulation, and the TCP/IP protocol stack. The document provides examples of routing tables, packet encapsulation, and how NAT enables private addressing on local networks.
The document provides information about line transmission and summarizes key details about the European E1 digital transmission format, the VMX0100 versatile multiplexer, and synchronous digital hierarchy (SDH). It describes that the E1 format reserves two channels for signaling and control, with time slot 0 for transmission management and time slot 16 for signaling. It then provides an introduction to the VMX0100 multiplexer, describing its features such as E1 and fractional E1 interfaces, voice ports, and data interfaces. The document discusses transmission mediums, cards, user interfaces, and applications of the VMX0100. It concludes with an introduction to SDH, describing its frame structure and advantages over the plesiochronous digital hierarchy such as support
This document provides the answers to a CCNA 1 v6.0 Final Exam with 100 questions. Some key points:
- It addresses topics related to networking fundamentals, including network models, protocols, network configuration and troubleshooting.
- The questions test knowledge of networking concepts and Cisco IOS commands across the OSI model layers, from physical layer addressing to application layer protocols.
- Answers are provided for multiple choice questions about LANs, WANs, routing, switching, IPv4 and IPv6 addressing, TCP/IP protocols and network client-server models.
The document provides instructions for setting up and using a wireless customer premises router (CPE). It includes:
1) An overview of the CPE and its capabilities, including routing traffic between a user network and internet service provider.
2) Details on proper network implementation, including using the CPE as a router between wired and wireless networks with different IP ranges.
3) Instructions for accessing and navigating the CPE's browser-based user interface to configure settings like IP addresses, default gateways, and wireless settings.
4) Step-by-step directions for basic CPE configuration options, including setting the CPE up as a router with network address translation between its Ethernet and wireless interfaces.
The document discusses IP addressing and routing in LTE networks. It covers:
- OSI layers used in LTE including physical, MAC, RLC, and PDCP layers
- IP addressing schemes including IPv4 addressing, subnetting, and network/broadcast addresses
- IP routing configuration in BSCs, RNCs, and between network nodes
- Interface IP allocation and configuration of BTS, NodeB, and OAM addresses
This document provides an overview of computer networking concepts including:
1) It defines what a network is and describes the basic components of a network like cables, devices, and operating systems.
2) It discusses different types of networks including LANs, WANs, and examples of networking technologies and topologies used.
3) It covers IP addressing fundamentals like IP classes and private IP ranges.
4) It describes common networking devices like switches, routers, and their functions.
5) It provides steps for basic router configuration and setting up RIP routing protocol.
The document discusses the key responsibilities and functions of the network layer in computer networking. The network layer is responsible for getting packets from their source to their destination across multiple hops and routers. It must choose appropriate paths through the network topology and balance traffic loads across lines and routers. The network layer provides either a connectionless or connection-oriented service and uses different packet forwarding mechanisms depending on the chosen service.
The document discusses planning and cabling for a CCNA Exploration course. It covers topics like identifying media for LANs and WANs, cable types and standards, switch and router configurations. Examples are provided for designing addressing schemes for networks using VLSM and subnetting techniques. The document compares different network designs and components like hubs, switches and routers. It also discusses cable lengths, types and connections used within networks and between networks.
The document discusses network technologies and concepts. It covers topics like network layers, IP addressing, routing, and protocols. It provides an overview of common network standards and technologies used in both home and enterprise networks, such as Ethernet, switches, WiFi, and IP routing.
A LAN or Local Area Network is a computer network (or data communications network) which is confined in a limited geographical location. A Virtual (or logical) LAN is a local area network with a definition that maps workstations/PCs on some other basis than geographic location (for example, by department, type of user or primary application)
This document discusses computer networks and networking concepts such as IP addressing, routing, broadcasting, multicasting, and routing algorithms. It describes the IP address classes (A, B, C, D, E), how IP addresses are assigned, and how network masks are used to determine the network ID and host ID portions of an IP address. Common routing algorithms like flooding, distance vector routing, and link state routing are also summarized.
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...Tarun Khaneja
油
This document provides a summary of a presentation on CCNA (Cisco Certified Network Associate). It was trained by Ravinder Kumar from Gurukul Technical Institute and submitted by Tarun Khaneja with roll number 2110045 and contact number 09034406598. The presentation introduces CCNA and discusses networking types and applications. It also covers networking devices, subnetting, routing protocols like RIP, EIGRP, OSPF, ACLs, VLANs, and inter-VLAN routing. Configuration examples are provided for EIGRP and RIP routing on the same network.
This document discusses IP addressing and routing in computer networks. It covers MAC addresses, IP addresses (including IPv4 and IPv6), IP address classes (A, B, C, D, E), network masks, loopback addresses, routing algorithms like flooding, distance vector, and link state. It also defines terms like routers, gateways, ping, bandwidth, transmission time, propagation delay, routing tables, and shortest path trees. The goal of computer networks is to provide fast, accurate, adequate, and secure communication between systems.
This IT company provides network support and aims to upgrade their client's network. The upgrade involves 3 phases: establishing WAN connectivity between sites; upgrading a remote site's LAN with switches and VLANs; and adding a Frame Relay switch with PPP encapsulation. The upgrade will improve productivity by connecting sites, using new equipment, and adding security between networks.
Mozambique, a country with vast natural resources and immense potential, nevertheless faces several economic challenges, including high unemployment, limited access to energy, and an unstable power supply. Underdeveloped infrastructure has slowed the growth of industry and hampered peoples entrepreneurial ambitions, leaving many regions in the darkliterally and figuratively.
https://www.rofinolicuco.net/blog/how-renewable-energy-can-help-mozambique-grow-its-economy
How to Build a Speed Sensor using Arduino?CircuitDigest
油
Learn how to measure speed using IR sensors in this simple DIY project. This tutorial cover circuit diagram, Sensor calibration and speed calculations and optimized Arduino code for real time speed measurements.
This PPT covers the index and engineering properties of soil. It includes details on index properties, along with their methods of determination. Various important terms related to soil behavior are explained in detail. The presentation also outlines the experimental procedures for determining soil properties such as water content, specific gravity, plastic limit, and liquid limit, along with the necessary calculations and graph plotting. Additionally, it provides insights to understand the importance of these properties in geotechnical engineering applications.
-Zuf辰lligurl zu
peut 辿lus silly mais les mes ishaute quils le aurais sans Les 辿tablis qui
des Louis de belle accueillis sell puss p竪re peut olds sects it's all辿tells peutall asplait suite
Il -12 ) pas cause subit lequel euros le en as d辿taill辿 de till
PILONI balo -2
ispeulit Mais anglais appareils guilt gens ils en anglais glory pile le vous pr竪s
... still que y pais vida Los play qu辿tej坦n Less via Leal su abuelos l叩stimaall) isa las
des audit elleguilt disons s'il souhait sous sirs vous lucius atoutes pouvait lets pas
il taille glacis Lieu daily qui les jeutaille pas bill Luc jean 辿cumait il taille Lacis just -Zuf辰lligurl zu
peut 辿lus silly mais les mes ishaute quils le aurais sans Les 辿tablis qui
des Louis de belle accueillis sell puss p竪re peut olds sects it's all辿tells peutall asplait suite
Il -12 ) pas cause subit lequel euros le en as d辿taill辿 de till
PILONI balo -2
ispeulit Mais anglais appareils guilt gens ils en anglais glory pile le vous pr竪s
... still que y pais vida Los play qu辿tej坦n Less via Leal su abuelos l叩stimaall) isa las
des audit elleguilt disons s'il souhait sous sirs vous lucius atoutes pouvait lets pas
il taille glacis Lieu daily qui les jeutaille pas bill Luc jean 辿cumait il taille Lacis just-Zuf辰lligurl zu
peut 辿lus silly mais les mes ishaute quils le aurais sans Les 辿tablis qui
des Louis de belle accueillis sell puss p竪re peut olds sects it's all辿tells peutall asplait suite
Il -12 ) pas cause subit lequel euros le en as d辿taill辿 de till
PILONI balo -2
ispeulit Mais anglais appareils guilt gens ils en anglais glory pile le vous pr竪s
... still que y pais vida Los play qu辿tej坦n Less via Leal su abuelos l叩stimaall) isa las
des audit elleguilt disons s'il souhait sous sirs vous lucius atoutes pouvait lets pas
il taille glacis Lieu daily qui les jeutaille pas bill Luc jean 辿cumait il taille Lacis just -Zuf辰lligurl zu
peut 辿lus silly mais les mes ishaute quils le aurais sans Les 辿tablis qui
des Louis de belle accueillis sell puss p竪re peut olds sects it's all辿tells peutall asplait suite
Il -12 ) pas cause subit lequel euros le en as d辿taill辿 de till
PILONI balo -2
ispeulit Mais anglais appareils guilt gens ils en anglais glory pile le vous pr竪s
... still que y pais vida Los play qu辿tej坦n Less via Leal su abuelos l叩stimaall) isa las
des audit elleguilt disons s'il souhait sous sirs vous lucius atoutes pouvait lets pas
il taille glacis Lieu daily qui les jeutaille pas bill Luc jean 辿cumait il taille Lacis just-Zuf辰lligurl zu
peut 辿lus silly mais les mes ishaute quils le aurais sans Les 辿tablis qui
des Louis de belle accueillis sell puss p竪re peut olds sects it's all辿tells peutall asplait suite
Il -12 ) pas cause subit lequel euros le en as d辿taill辿 de till
PILONI balo -2
ispeulit Mais anglais appareils guilt gens ils en anglais glory pile le vous pr竪s
... still que y pais vida Los play qu辿tej坦n Less via Leal su abuelos l叩stimaall) isa las
des audit elleguilt disons s'il souhait sous sirs vous lucius atoutes pouvait lets
The Golden Gate Bridge a structural marvel inspired by mother nature.pptxAkankshaRawat75
油
The Golden Gate Bridge is a 6 lane suspension bridge spans the Golden Gate Strait, connecting the city of San Francisco to Marin County, California.
It provides a vital transportation link between the Pacific Ocean and the San Francisco Bay.
Indian Soil Classification System in Geotechnical EngineeringRajani Vyawahare
油
This PowerPoint presentation provides a comprehensive overview of the Indian Soil Classification System, widely used in geotechnical engineering for identifying and categorizing soils based on their properties. It covers essential aspects such as particle size distribution, sieve analysis, and Atterberg consistency limits, which play a crucial role in determining soil behavior for construction and foundation design. The presentation explains the classification of soil based on particle size, including gravel, sand, silt, and clay, and details the sieve analysis experiment used to determine grain size distribution. Additionally, it explores the Atterberg consistency limits, such as the liquid limit, plastic limit, and shrinkage limit, along with a plasticity chart to assess soil plasticity and its impact on engineering applications. Furthermore, it discusses the Indian Standard Soil Classification (IS 1498:1970) and its significance in construction, along with a comparison to the Unified Soil Classification System (USCS). With detailed explanations, graphs, charts, and practical applications, this presentation serves as a valuable resource for students, civil engineers, and researchers in the field of geotechnical engineering.
The Uni-Bell PVC Pipe Association (PVCPA) has published the first North American industry-wide environmental product declaration (EPD) for water and sewer piping, and it has been verified by NSF Sustainability, a division of global public health organization NSF International.
Uses established clustering technologies for redundancy
Boosts availability and reliability of IT resources
Automatically transitions to standby instances when active resources become unavailable
Protects mission-critical software and reusable services from single points of failure
Can cover multiple geographical areas
Hosts redundant implementations of the same IT resource at each location
Relies on resource replication for monitoring defects and unavailability conditions
Biases, our brain and software developmentMatias Iacono
油
Quick presentation about cognitive biases, classic psychological researches and quite new papers that displays how those biases might be impacting software developers.
2. DATA NETWORKING
A Computer network is a system in which multiple computers are connected
to each other to share information and resources
Electronic removing of data from one place to another
is called data networking
In hard disk data is stored in bytes. But data
travelling through wire are in bits
3. TYPES OF NETWORK
When 2 or more than 2 computers or communicating devices which are in a
room in a floor ,in a building or in a campus if connected are said to be
connected in a LAN
1. Lan should be capable of providing high speed, high bandwidth, high capacity
comunication
LAN
Characteristics of lan
2. Owner of the premises is the owner of LAN , to connect 2 devices on LAN we
dont lease link from service provider.
3. Size of your campus defines size of your LAN. Largest LAN is campus wide LAN
4. TYPES OF NETWORK
8 BIT = 1 BYTE
Characteristics of lan
0 = 0V
1 = 5V
Binary
1000 Byte = 1K Byte
7. QUALITY OF SERVICE
CLASSIFICATION
Ip has the capability to mark the packet to identify that which service has
voice ,which service has video and which service has data
Services are of three types audio , video, data.
prioritization
It classify that which packet voice ,video ,data will go first through wire.
8. QUALITY OF SERVICE
In real time Service quality of experience is be good. If there is no :-
Delay(Latency) If there long difference between 2 voice communication
Jitter Sometimes sound is receive slower and sometime the sound is receive faster
Drop Packet is drop and perfect packet is not recevied
9. QUALITY OF SERVICE
VOICE PACKET
Voice is a delay sensitive means voice do not allow delay
Voice packet consider 1/10,000 drops
and delay = best < 50 ms
telco < 150 ms
Internet < 200 ms
If drop happen in Ip voice ,the voice concealment program adjust the drop
packet by taking the before and after packet
10. QUALITY OF SERVICE
data packet
Video is a drop sensitive means voice do not allow drop
Allowed drop is 1/10,0000
Allowed delay is < 200 ms
Data is insensitive . It allowed both drop and delay
Video packet
11. TYPES OF NETWORK
If 2 or more than 2 computers or communicating devices or network which
are geographically separated but within a same metro city if connected are
said to be connected on MAN
If 2 or more than 2 computers or communicating devices or network which are
geographically separated but not within a same metro city if connected are
said to be connected on MAN
MAN
WAN
12. TYPES OF NETWORK
1. MAN and WAN should be capable of Providing high to moderate bandwidth
connectivity where limiting factor is cost.
Characteristics of man and wan
2. Owner of premisis is the owner of MAN and WAN we leased link from service
provider.
3. Within campus LAN . Beyond campus but within metrocity is MAN and Beyond
metrocity WAN
13. PRIVATE NETWORK
LAN, MAN and WAN are private network. Any Internet is a types of Public
network.
IANA (Internet assigned numbers Authority) provide public IP address as
well as public IP
IP range is (0.0.0.0 ------------------------------------ 255.255.255.255
Private IP range is (10.0.0.0 -------------------- 10.255.255.255)
(172.16.0.0 ------------------172.31.255.255)
(192.168.0.0 --------------------
192.168.255.255)
14. SERIAL TECHNOLOGY
1. Serial technology works in open environment.
2. Serial technology works for longer distance connectivity
3. Serial Technology takes a chunk of data and line drives over a longer distance
4. Line drives means superimposing of signal over high intensity signal.
5. To avoid synchronization error serial technology use control signal (cts,rts,xoff)
15. ETHERNET TECHNOLOGY
1. Ethernet technology works in closed environment.
2. Ethernet technology works for shorter distance connectivity
3. Ethernet technology provides high speed, high bandwidth connectivity at low cost.
4. There is no additional set of control signal use in Ethernet technology.
18. COMMUNICATION TYPES
There are three types of communication
Unicast: If data is sent on an individual IP or mac.
Multicast: If data is sent on group IP or mac.
Broad cast: If data is sent all IP or mac.
19. PING
Ping sends ICMP echo packet to get network layer status.
Ping is also used for following:-
To check connectivity
Ping: ping is a tool or application of ip upper layer protocol stack that is
used to get network layer /ip layer /layer3 status.
To calculate Latency(delays)
To verify Link quality(drops)
Local host Universal loopback address: 127.0.0.1
20. IP ADDRESS
Ip address without mask is just a set of number. It cannot be defined without
its mask.
Mask tells us how many bits are on network side
10.0.0.0 DECIMAL
00001010.00000000.00000000.00000000 BINARY
10.0.0.0 /16 DECIMAL
Network
bits
Host
bits
26. SUBNETTING
2^0 = 1
2^1 = 2
2^2 = 4
2^3 = 8
2^4 = 16
2^5 = 32
2^6 = 64
255.255.255.192
192.168.1.10 /24
192.168.1.100 /24
192.168.1.10 /26
192.168.1.100 /26
Are the in same network or different network.
192.168.1.0 ----192.168.63 /26
192.168.1.64 ----192.168.127 /26
0 ---- 255 total host
There network id is 0 broadcast id is 255 thats
why they are in same network
30. SWITCH
Switch is an Intelligent device. As soon as switch receives a frame on its
Port , it will read MAC address refer MAC Table and take forwarding decision.
MAC Address is a L2 address , MAC Table is a L2 Table hence Switch is a L2 device.
On receiving frame on its port , Switch will open L2 information read Destination
MAC address refer MAC table and forward the frame to relevant port only and not to all
Other ports.
31. SWITCH
MAC Table can be populated in 2 ways.
1.Admin can make static MAC entry in MAC table.
2.Switch can do self learning of MAC address in MAC table when a frame traverse switch.
Because of this MAC Table size become huge.
Huge make table has 3 issues.
1.High memory Utilization
2.High C.P.U utilization due to high processing
3.Frame forwarding delay.
32. SWITCH
To over come these issues following solution were created
1. Cisco defined a limit of 4096 MAC entries in its MAC Table.
2. Any MAC entry in MAC Table that is not used for 5 min will be consider as stale
and removed from MAC table.
When a switch receive a broadcast frame on its port. Switch will make
multiple copies of that frame and forward to all other ports. And not to
that port from which the frame come.
When sender and receiver are on same port switch will discard that frame.
Switch switches between the ports not within the port.
33. TCP/UDP
TRANSMISSION
CONTROL PROTOCOL
(TCP)
USER DATAGRAM
PROTOCOL (UDP)
TCP is a connection-
oriented protocol.
Connection-
orientation means
that the
communicating
devices should
establish a
connection before
transmitting data and
should close the
connection after
transmitting the data.
UDP is the Datagram
oriented protocol.
This is because there
is no overhead for
opening a connection,
maintaining a
connection, and
terminating a
connection. UDP is
efficient for broadcast
and multicast type of
network transmission.
TCP is reliable as it
guarantees delivery of
data to the destination
router.
The delivery of data to
the destination cannot
be guaranteed in UDP.
TCP provides
extensive error
checking
mechanisms. It is
because it provides
flow control and
acknowledgment of
data.
UDP has only the
basic error checking
mechanism using
checksums.
TCP is comparatively slower than
UDP.a
UDP is faster, simpler and more
efficient than TCP.
Retransmission of lost packets is
possible in TCP, but not in UDP.
There is no retransmission of lost
packets in User Datagram Protocol
(UDP).
TCP has a (20-80) bytes variable
length header.
UDP has a 8 bytes fixed length
header.
TCP is heavy-weight. UDP is lightweight.
TCP doesnt supports Broadcasting. UDP supports Broadcasting.
TRANSMISSION CONTROL PROTOCOL
(TCP)
USER DATAGRAM PROTOCOL (UDP)
34. ROUTER
Router is an intelligent device. As soon as router receive a packet on
its port it will check destination IP refer routing table and take
forwarding decision.
IP address is layer 3 address routing table is a layer 3 table hence
router is a l3 device.
35. ROUTER
On receiving a packet on port router will open layer 3 information read destination IP
refer routing table and forward the packet only if it has a route to reach the network
or else discard it.
Because router refers routing table to take forwarding decision hence routing table
should be populated with routes. routing table can be populated in three ways:-
*Directly connected routes will automatically reflect in routers routing table .
*Administrator can make static route entry in router routing table
*Dynamic routing protocol can learn route dynamically in router routing table.
36. ROUTER
Switch switches within the subnet router routes between the network because router
routes between the network hence every port of router should be in different network
no 2 ports of router can belong to same subnet.
Router will never forward a broadcast received on it ports to other ports, router has
been created to break the broad cast domain.
Every port of router is member of separate collision domain, similarly every port of
router is member of separate broadcast domain. hence router is a multiple
collision/broadcast domain device
37. ROUTED VS ROUTING
PROTOCOL
Routed Protocols:
IP v4/ IP v6 are called Routed Protocols. In these forwarding is on the basis of IP
address.
Carry user information.
Each router making independent decision in determining path
Routing Protocols:
Exapmples: EIGRP,OSPF,RIP,ISIS,BGP,ETC
Communicate information about networks.
Determine the best route between networks.
39. STATIC ROUTE
Administrator manually enters route
Manual update required when a topology changes
ISSUe:- if there is topology change manually change the route.
AD value is 1
metric is 0
Floating static route AD value is other that 0
IP route destination network mask nexthope ip address
42. LINK STATE RP
1.Updates are triggered they are not periodic.
2.Updates are incremental, entire routing table is not send as an update
3.Update are multicasted they are not broadcasted
4.Update are sent to the group and not just connected neighbors.
L.S Router send details like SPF cost,SPF tree/table as part of their update which
Helps routers build end-to-end visibility of entire network all its paths and their
Costs in form of topology table (LSDB)
5.Algorithm used is SPF
6.Routers have E2E visibility
43. DISTANCE VECTOR RP
1.Updates are periodic sent every 30/90 sec.
2.Entire routing table is sent as an update.
3.Update are broadcasted .
4.Update are sent to the directly connected neighbours only.
5.Distance Vector router dont have end-to-end visibility of entire network.
6.They are also called as Routing by Rumors.
44. HYBRID RP
1.Share attributes of both distance-vector and link-state routing.
2.Entire operations are pulled from Link state.
3.Configuration Simplicity is taken from distance vector .
4.Eigrp Belongs to this Category
47. EIGRP RP
1.EIGRP is a classless Routing Protocol.
2.EIGRP is advanced distance vector routing protocol.
3.EIGRP is a enhancement of IGRP.
4.IT is a Cisco Proprietary Protocol, but its codes are open for general public use.
5.Class less Routing Protocol.
6.Best path selection DUA(dual diffusion algo).
7. Metric IGRP*256
8.AD value 90-internal, 170-external, 5-summary
48. WILD CARD MASK
NET MASK : 20.20.20.0 255.255.255.0
WILD CARD MASK: 20.20.20.0 0.0.0.255
It tells no. of hosts
49. K-value
K Values Metric components
K1 Bandwidth
K2 Load
K3 Delay
K4 Reliability
K5 MTU
K Values
EIGRP may use five metric components to select the best route for routing table.
These are Bandwidth, Load, Delay, Reliability and MTU. By default EIGRP uses only
two components; Bandwidth and delay. With K-Values we can control which
components should be used in route metric calculation. For five metric components we
have five K values.
50. EIGRP NEIGHBORSHIP
RULE
EIGRP Router doesnt trust anyone blindly. It checks following configuration values to
insure that requesting router is eligible to become his neighbor or not.
Active Hello packets
AS Number
K-Values
EIGRP selects best path at the same time when it select next best path.
Best path is called as successor.
Next best path is called as feasible successor.
Topology table, Neighbor table, routing table
51. EIGRP PACKETS
Hello
Update
Query
Reply
ACK (Acknowledgement)
A packet consists of control information and user data
(e.g. source and destination network addresses , error detection codes, or
sequencing information)
2 types of packet control packet and data packet
52. OSPF ROUTING PROTOCOL
1.OSPF is a link state routing protocol.
2.Classless routing protocol.
3.AD value = 110.
4. Dijkstra's Shortest Path First algorithm.
5.Class less Routing Protocol.
6.Best path selection criteria bandwidth.
7. Metric cost
53. DHCP
DHCP stands for dynamic host configuration protocol and is a network protocol used on IP
networks where a DHCP server automatically assigns an IP address and other information to
each host on the network so they can communicate efficiently with other endpoints.
55. NATING
Network Address Translation (NAT) is a process in which one or more local IP
address is translated into one or more Global IP address and vice versa in order
to provide Internet access to the local hosts. NAT generally operates on router or
firewall.
56. NATING
1. Static NAT
In this, a single private IP address is mapped with single Public IP address,
i.e., a private IP address is translated to a public IP address. It is used in Web
hosting.
2. Dynamic NAT
In this type of NAT, multiple private IP address are mapped to a pool of
public IP address . It is used when we know the number of fixed users wants
to access the Internet at a given point of time.
57. NATING
3. Port Address Translation (PAT)
This is also known as NAT overload. In this, many local (private) IP addresses can be
translated to single public IP address. Port numbers are used to distinguish the traffic,
i.e., which traffic belongs to which IP address. This is most frequently used as it is cost
effective as thousands of users can be connected to the Internet by using only one real
global (public) IP address
58. NATING
3. Port Address Translation (PAT)
This is also known as NAT overload. In this, many local (private) IP addresses can be
translated to single public IP address. Port numbers are used to distinguish the traffic,
i.e., which traffic belongs to which IP address. This is most frequently used as it is cost
effective as thousands of users can be connected to the Internet by using only one real
global (public) IP address
59. ACCESS-LIST
ACL features
1. The set of rules defined are matched serial wise i.e matching starts with the first line, then
2nd, then 3rd and so on.
2. The packets are matched only until it matches the rule. Once a rule is matched then no
further comparison takes place and that rule will be performed.
3. There is an implicit deny at the end of every ACL, i.e., if no condition or rule matches then
the packet will be discarded.
Access-list (ACL) is a set of rules defined for controlling the network traffic and
reducing network attack. ACLs are used to filter traffic based on the set of rules
defined for the incoming or out going of the network.
60. ACCESS-LIST
Types of ACL
There are two main different types of Access-list namely:
1.Standard Access-list These are the Access-list which are made using the source
IP address only. These ACLs permit or deny the entire protocol suite. They dont
distinguish between the IP traffic such as TCP, UDP, Https etc. By using numbers 1-
99 or 1300-1999, router will understand it as a standard ACL and the specified
address as source IP address.
2.Extended Access-list These are the ACL which uses both source and
destination IP address. In these type of ACL, we can also mention which IP traffic
should be allowed or denied. These use range 100-199 and 2000-2699.
62. IPV6
An IPv6 address is a 128-bit alphanumeric value that identifies an endpoint
device in an Internet Protocol Version 6 (IPv6) network. IPv6 is the successor to a
previous addressing infrastructure, IPv4, which had limitations IPv6 was
designed to overcome
Format of an IPv6 address
In precise terms, an IPv6 address is 128 bits long and is arranged in eight groups, each of
which is 16 bits. Each group is expressed as four hexadecimal digits and the groups are
separated by colons.
An example of a full IPv6 address could be:
FE80:CD00:0000:0CDE:1257:0000:211E:729C
63. IPV6
Types of IPv6 addresses
There are different types and formats of IPv6 addresses
Global unicast. These addresses are routable on the internet and start with "2001:" as the prefix
group. Global unicast addresses are the equivalent of IPv4 public addresses.
Unicast address. Used to identify the interface of an individual node.
Anycast address. Used to identify a group of interfaces on different nodes.
Multicast address. An address used to define multicast Multicasts are used to send a single packet to
multiple destinations at one time.
Link local addresses. One of the two internal address types that are not routed on the internet. Link
local addresses are used inside an internal network, are self-assigned and start with "fe80:" as the
prefix group.
Unique local addresses. This is the other type of internal address that is not routed on the internet.
Unique local addresses are equivalent to the IPv4 addresses 10.0.0.0/8, 172.16.0.0/12 and
192.168.0.0/16.
64. HSRP ROUTING PROTOCOL
Using HSRP, a set of routers work in concert to present the illusion of a single virtual router to the
hosts on the LAN. This set is known as an HSRP group or a standby group. A single router
elected from the group is responsible for forwarding the packets that hosts send to the virtual
router. This router is known as the active router. Another router is elected as the standby router.
In the event that the active router fails, the standby assumes the packet forwarding duties of
the active router
66. VPN
What is a VPN?
A VPN, or virtual private network, is a secure tunnel between your device and the
internet. VPNs protect you from online snooping, interference, and censorship
Change your location
Using a VPN changes your IP address, the unique number that identifies you and
your location in the world. With a new IP address, you can browse the internet as if
you were in the UK, Germany, Canada,