SlideShare a Scribd company logo
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Instructor Materials
Chapter 1: Routing
Concepts
CCNA Routing and Switching
Routing and Switching
Essentials v6.0
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15
Chapter 1: Routing
Concepts
Routing and Switching Essentials v6.0
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1 - Sections & Objectives
1.1 Router Initial Configuration
• Describe the primary functions and features of a router.
• Configure basic settings on a router to route between two directly-connected
networks, using CLI.
• Verify connectivity between two networks that are directly connected to a
router.
1.2 Routing Decisions
• Explain the encapsulation and de-encapsulation process used by routers when
switching packets between interfaces.
• Explain the path determination function of a router.
1.3 Router Operation
• Explain routing table entries for directly connected networks.
• Explain how a router builds a routing table of directly connected networks.
• Explain how a router builds a routing table using static routes.
• Explain how a router builds a routing table using a dynamic routing protocol.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 17
1.1 Router Initial
Configuration
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Functions
Characteristicsof a Network
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Functions
Why Routing?
The router is responsible for the routing of traffic
between networks.
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Routers are specialized computers containing the following
required components to operate:
• Central processing unit (CPU)
• Operating system (OS) - Routers use Cisco IOS
• Memory and storage (RAM, ROM, NVRAM, Flash, hard drive)
Router Functions
Routers are Computers
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Routers use specialized ports and network interface cards to
interconnect to other networks.
Router Functions
Routers are Computers (cont.)
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Functions
Routers are Computers
Router Memory
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Functions
Routers Interconnect Networks
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Functions
Routers Choose Best Paths
 Routers use static routes and dynamic routing protocols to learn
about remote networks and build their routing tables.
 Routers use routing tables to determine the best path to send
packets.
 Routers encapsulate the packet and forward it to the interface
indicated in routing table.
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 Process switching – An
older packet forwarding
mechanism still available for
Cisco routers.
 Fast switching – A common
packet forwarding
mechanism which uses a
fast-switching cache to store
next hop information.
 Cisco Express Forwarding
(CEF) – The most recent,
fastest, and preferred Cisco
IOS packet-forwarding
mechanism.
Router Functions
Packet Forwarding Methods
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connect Devices
Connect to a Network
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connect Devices
Default Gateways
To enable network
access devices, must be
configured with the
following IP address
information:
IP address - Identifies a
unique host on a local
network.
Subnet mask - Identifies
the host’s network subnet.
Default gateway -
Identifies the router a
packet is sent to when the
destination is not on the
same local network
subnet.
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connect Devices
Document Network Addressing
Network documentation should include at least the following in a topology diagram
and addressing table:
 Device names
 Interfaces
 IP addresses and
subnet masks
 Default gateways
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connect Devices
Enable IP on a Host
Statically Assigned IP address – The host is manually assigned an IP
address, subnet mask and default gateway. A DNS server IP address can
also be assigned.
• Used to identify specific network resources such as network servers
and printers.
• Can be used in very small networks with few hosts.
Dynamically Assigned IP Address – IP Address information is
dynamically assigned by a server using Dynamic Host Configuration
Protocol (DHCP).
• Most hosts acquire their IP address information through DHCP.
• DHCP services can be provided by Cisco routers.
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connect Devices
Enable IP on a Host
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connect Devices
Enable IP on a Host
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connect devices
Device LEDs
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Console Access
Connect Devices
Console Access
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connect Devices
Enable IP on a Switch
 Network infrastructure devices require IP addresses to enable remote
management.
 On a switch, the management IP address is assigned on a virtual interface
called a switched virtual interface (SVI)
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Basic Settings
Configure Router Basic Settings
 Name the device – Distinguishes
it from other routers
 Secure management access –
Secures privileged EXEC, user
EXEC, and Telnet access, and
encrypts passwords .
 Configure a banner – Provides
legal notification of unauthorized
access.
 Save the Configuration
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Basic Settings
Configure an IPv4 Router Interface
To be available, a router interface
must be:
 Configured with an address and subnet
mask.
 Activated using no shutdown
command. By default LAN and WAN
interfaces are not activated.
 Configured with the clock
rate command on the Serial cable end
labeled DCE.
Optional description can be included.
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Basic Settings
Configure an IPv6 Router Interface
Configure interface with IPv6 address and subnet mask:
 Use the ipv6 address ipv6-address/ipv6-length [link-local | eui-64]interface configuration
command.
 Activate using the no shutdown command.
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Basic Settings
Configure an IPv6 Router Interface (cont.)
IPv6 interfaces can support more than one address:
 Configure a specified global unicast – ipv6address ipv6-
address /ipv6-length
 Configure a global IPv6 address with an interface identifier (ID) in the
low-order 64 bits - ipv6address ipv6-address /ipv6-length eui-64
 Configure a link-local address - ipv6address ipv6-address /ipv6-
length link-local
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Basic Settings
Configure an IPv4 Loopback Interface
A loopback interface is a logical interface that is internal to the
router:
 It is not assigned to a physical port, it is considered a software interface that is
automatically in an UP state.
 A loopback interface is useful for testing.
 It is important in the OSPF routing process.
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verify Connectivity of Directly Connected Networks
Verify Interface Settings
Show commands are used to
verify operation and configuration
of interface:
 show ip interfaces brief
 show ip route
 show running-config
Show commands that are used to
gather more detailed interface
information:
 show interfaces
 show ip interfaces
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verify Connectivity of Directly Connected Networks
Verify Interface Settings (cont.)
Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verify Connectivity of Directly Connected Networks
Verify IPv6 Interface Settings
Common commands to verify the IPv6 interface configuration:
 show ipv6 interface brief - displays a summary for each of the interfaces.
 show ipv6 interface gigabitethernet 0/0 - displays the interface status and all the IPv6
addresses for this interface.
 show ipv6 route - verifies that IPv6 networks and specific IPv6 interface addresses have
been installed in the IPv6 routing table.
Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Show command output can be managed using the following
command and filters:
 Use the terminal length number command to specify the number of lines to be
displayed.
 To filter specific output of commands use the (|)pipe character after show
command. Parameters that can be used after pipe include:
• section, include, exclude, begin
Verify Connectivity of Directly Connected Networks
Filter Show Command Output
Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verify Connectivity of Directly Connected Networks
Command History Feature
The command history feature temporarily stores a list of executed
commands for access:
 To recall commands press Ctrl+P or the UP Arrow.
 To return to more recent commands press Ctrl+N or the Down Arrow.
 By default, command history is enabled and the system captures the last 10 commands
in the buffer. Use the show history privileged EXEC command to display the buffer
contents.
 Use the terminal history size user EXEC command to increase or decrease size of
the buffer.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 45
1.2 Routing Decisions
Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching Packets Between Networks
Router Switching Function
Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching Packets Between Networks
Send a Packet
Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching Packets Between Networks
Forward to Next Hop
Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching Packets Between Networks
Packet Routing
Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching Packets Between Networks
Reach the Destination
Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Path Determination
Routing Decisions
Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Path Determination
Best Path
 Best path is selected by a routing protocol based on the value or
metric it uses to determine the distance to reach a network:
o A metric is the value used to measure the distance to a given network.
o Best path to a network is the path with the lowest metric.
 Dynamic routing protocols use their own rules and metrics to build
and update routing tables:
o Routing Information Protocol (RIP) - Hop count
o Open Shortest Path First (OSPF) - Cost based on cumulative bandwidth from source to
destination
o Enhanced Interior Gateway Routing Protocol (EIGRP) - Bandwidth, delay, load, reliability
Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Path Determination
Load Balancing
 When a router has two or more paths to a destination with equal cost
metrics, then the router forwards the packets using both paths equally:
o Equal cost load balancing can improve network performance.
o Equal cost load balancing can be configured to use both dynamic routing protocols and
static routes.
Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Path Determination
Administrative Distance
 If multiple paths to a destination are configured on a router, the path
installed in the routing table is the one with the lowest Administrative
Distance (AD):
o A static route with an AD of 1 is more reliable than an EIGRP-discovered route with an
AD of 90.
o A directly connected route with an AD of 0 is more reliable than a static route with an AD
of 1.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 55
1.3 Router Operation
Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Analyze the Routing Table
The Routing Table
 A routing table is a file stored in RAM that contains information about:
o Directly connected routes
o Remote routes
Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Analyze the Routing Table
Routing Table Sources
The show ip route command is used to display the contents of the routing
table:
o Local route interfaces - Added to the routing table when an interface is configured.
(displayed in IOS 15 or newer for IPv4 routes and all IOS releases for IPv6 routes.)
o Directly connected interfaces - Added to the routing table when an interface is
configured and active.
o Static routes - Added when a route is manually configured and the exit interface is active.
o Dynamic routing protocol - Added when EIGRP or OSPF are implemented and
networks are identified.
Presentation_ID 58© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Analyze the Routing Table
Routing Table Sources (cont.)
Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Analyze the Routing Table
Remote Network Routing Entries
Interpreting the entries in the routing table
Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Directly Connected Routes
Directly Connected Interfaces
A newly deployed router, without any configured interfaces, has an empty
routing table.
Presentation_ID 61© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Directly Connected Routes
Directly Connected Routing Table Entries
Presentation_ID 62© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Directly Connected Routes
Directly Connected Example
Presentation_ID 63© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Directly Connected Routes
Directly Connected IPv6 Example
Presentation_ID 64© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Statically Learned Routes
Static Routes
Static routes and default static routes can be implemented after
directly connected interfaces are added to the routing table:
o Static routes are manually configured.
o They define an explicit path between two networking devices.
o Static routes must be manually updated if the topology changes.
o Their benefits include improved security and control of resources.
o Configure a static route to a specific network using the ip route network
mask {next-hop-ip | exit-intf} command.
o A default static route is used when the routing table does not contain a
path for a destination network.
o Configure a default static route using the ip route 0.0.0.0 0.0.0.0 {exit-
intf | next-hop-ip} command.
Presentation_ID 65© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Statically Learned Routes
Static Route Example
Presentation_ID 66© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Statically Learned Routes
Static Route Example (cont.)
Entering and Verifying a Static Route
Presentation_ID 67© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Statically Learned Routes
Static IPv6 Route Examples
Presentation_ID 68© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Statically Learned Routes
Static IPv6 Route Examples
Presentation_ID 69© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Dynamic Routing Protocols
Dynamic Routing
 Dynamic routing is used by
routers to share information
about the reachability and
status of remote networks.
 It performs network
discovery and maintains
routing tables.
 Routers have converged
after they have finished
exchanging and updating
their routing tables.
Presentation_ID 70© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Dynamic Routing Protocols
IPv4 Routing Protocols
Cisco routers can support a variety of dynamic IPv4 routing protocols
including:
• EIGRP – Enhanced Interior Gateway Routing Protocol
• OSPF – Open Shortest Path First
• IS-IS – Intermediate System-to-Intermediate System
• RIP – Routing Information Protocol
Use the router ? Command in global configuration mode to determine
which routing protocols are supported by the IOS.
Presentation_ID 71© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Dynamic Routing Protocols
IPv4 Dynamic Routing Examples
Presentation_ID 72© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Dynamic Routing Protocols
IPv6 Routing Protocols
Cisco routers can support a variety of dynamic IPv6 routing protocols
including:
o RIPng (RIP next generation)
o OSPFv3
o EIGRP for IPv6
Use the ipv6 router ? command to determine which routing
protocols are supported by the IOS
IPv6 Routing Protocols
Presentation_ID 73© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Dynamic Routing Protocols
IPv6 Dynamic Routing Examples
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 74
1.4 Chapter Summary
Presentation_ID 75© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 Describe the primary functions and features of a router.
 Configure basic settings on a router to route between two directly-connected networks,
using CLI.
 Verify connectivity between two networks that are directly connected to a router.
 Explain how routers use information in data packets to make forwarding decisions in a
small to medium-sized business network.
 Explain the encapsulation and de-encapsulation process used by routers when switching
packets between interfaces.
 Explain the path determination function of a router.
 Explain how a router learns about remote networks when operating in a small to medium-
sized business network.
 Explain how a router builds a routing table of directly connected networks.
 Explain how a router builds a routing table using static routes.
 Explain how a router builds a routing table using a dynamic routing protocol.
Chapter Summary
Summary
Presentation_ID 80© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 81© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ad

More Related Content

What's hot (20)

CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
Nil Menon
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
Vuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5
Nil Menon
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
Irsandi Hasan
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
Vuz Dở Hơi
 
CCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanCCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The Wan
Vuz Dở Hơi
 
Cisco router configuration tutorial
Cisco router configuration tutorialCisco router configuration tutorial
Cisco router configuration tutorial
IT Tech
 
Ether channel fundamentals
Ether channel fundamentalsEther channel fundamentals
Ether channel fundamentals
Edgardo Scrimaglia
 
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdfITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
GomzAriez
 
CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9
Nil Menon
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
Vuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1
Nil Menon
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
Vuz Dở Hơi
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
Er. Anmol Bhagat
 
CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1
Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2
Nil Menon
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
Vuz Dở Hơi
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
Chaing Ravuth
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
Nil Menon
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
Vuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5
Nil Menon
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
Irsandi Hasan
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
Vuz Dở Hơi
 
CCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanCCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The Wan
Vuz Dở Hơi
 
Cisco router configuration tutorial
Cisco router configuration tutorialCisco router configuration tutorial
Cisco router configuration tutorial
IT Tech
 
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdfITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
GomzAriez
 
CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9
Nil Menon
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
Vuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1
Nil Menon
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
Vuz Dở Hơi
 
CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1
Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2
Nil Menon
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
Vuz Dở Hơi
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
Chaing Ravuth
 

Similar to CCNA2 Verson6 Chapter1 (20)

1 Routing Concepts-students to download only.ppt
1 Routing Concepts-students to download only.ppt1 Routing Concepts-students to download only.ppt
1 Routing Concepts-students to download only.ppt
alvindalejoyosa1
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_final
Fisal Anwari
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing concepts
teknetir
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
Nil Menon
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
Waqas Ahmed Nawaz
 
Chapter 1 Overview - Introduction to Routing and Packet Forwarding
Chapter 1 Overview - Introduction to Routing and Packet ForwardingChapter 1 Overview - Introduction to Routing and Packet Forwarding
Chapter 1 Overview - Introduction to Routing and Packet Forwarding
arcijaz
 
CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2
Irsandi Hasan
 
Chapter 17 : static routing
Chapter 17 : static routingChapter 17 : static routing
Chapter 17 : static routing
teknetir
 
KPUCC-Rs instructor ppt_chapter6_final
KPUCC-Rs instructor ppt_chapter6_finalKPUCC-Rs instructor ppt_chapter6_final
KPUCC-Rs instructor ppt_chapter6_final
Fisal Anwari
 
CCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static RoutingCCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static Routing
Vuz Dở Hơi
 
Exploration routing chapter_1
Exploration routing chapter_1Exploration routing chapter_1
Exploration routing chapter_1
Joshua Torres
 
Routing Protocols and Concepts – Chapter 2
Routing Protocols and Concepts – Chapter 2Routing Protocols and Concepts – Chapter 2
Routing Protocols and Concepts – Chapter 2
arcijaz
 
Exploration routing chapter_2
Exploration routing chapter_2Exploration routing chapter_2
Exploration routing chapter_2
Joshua Torres
 
cisco-nti-Day19
cisco-nti-Day19cisco-nti-Day19
cisco-nti-Day19
eyad alaa
 
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame Relay
Vuz Dở Hơi
 
Cn instructor ppt_chapter4_final
Cn instructor ppt_chapter4_finalCn instructor ppt_chapter4_final
Cn instructor ppt_chapter4_final
Leoo Romo
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
Waqas Ahmed Nawaz
 
CCNA2 Verson6 Chapter2
CCNA2 Verson6 Chapter2CCNA2 Verson6 Chapter2
CCNA2 Verson6 Chapter2
Chaing Ravuth
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
Vuz Dở Hơi
 
1 Routing Concepts-students to download only.ppt
1 Routing Concepts-students to download only.ppt1 Routing Concepts-students to download only.ppt
1 Routing Concepts-students to download only.ppt
alvindalejoyosa1
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_final
Fisal Anwari
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing concepts
teknetir
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
Nil Menon
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
Waqas Ahmed Nawaz
 
Chapter 1 Overview - Introduction to Routing and Packet Forwarding
Chapter 1 Overview - Introduction to Routing and Packet ForwardingChapter 1 Overview - Introduction to Routing and Packet Forwarding
Chapter 1 Overview - Introduction to Routing and Packet Forwarding
arcijaz
 
CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2
Irsandi Hasan
 
Chapter 17 : static routing
Chapter 17 : static routingChapter 17 : static routing
Chapter 17 : static routing
teknetir
 
KPUCC-Rs instructor ppt_chapter6_final
KPUCC-Rs instructor ppt_chapter6_finalKPUCC-Rs instructor ppt_chapter6_final
KPUCC-Rs instructor ppt_chapter6_final
Fisal Anwari
 
CCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static RoutingCCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static Routing
Vuz Dở Hơi
 
Exploration routing chapter_1
Exploration routing chapter_1Exploration routing chapter_1
Exploration routing chapter_1
Joshua Torres
 
Routing Protocols and Concepts – Chapter 2
Routing Protocols and Concepts – Chapter 2Routing Protocols and Concepts – Chapter 2
Routing Protocols and Concepts – Chapter 2
arcijaz
 
Exploration routing chapter_2
Exploration routing chapter_2Exploration routing chapter_2
Exploration routing chapter_2
Joshua Torres
 
cisco-nti-Day19
cisco-nti-Day19cisco-nti-Day19
cisco-nti-Day19
eyad alaa
 
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame Relay
Vuz Dở Hơi
 
Cn instructor ppt_chapter4_final
Cn instructor ppt_chapter4_finalCn instructor ppt_chapter4_final
Cn instructor ppt_chapter4_final
Leoo Romo
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
Waqas Ahmed Nawaz
 
CCNA2 Verson6 Chapter2
CCNA2 Verson6 Chapter2CCNA2 Verson6 Chapter2
CCNA2 Verson6 Chapter2
Chaing Ravuth
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
Vuz Dở Hơi
 
Ad

More from Chaing Ravuth (20)

CCNP ROUTE V7 CH8
CCNP ROUTE V7 CH8CCNP ROUTE V7 CH8
CCNP ROUTE V7 CH8
Chaing Ravuth
 
CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7
Chaing Ravuth
 
CCNP ROUTE V7 CH6
CCNP ROUTE V7 CH6CCNP ROUTE V7 CH6
CCNP ROUTE V7 CH6
Chaing Ravuth
 
CCNP ROUTE V7 CH5
CCNP ROUTE V7 CH5CCNP ROUTE V7 CH5
CCNP ROUTE V7 CH5
Chaing Ravuth
 
CCNP ROUTE V7 CH4
CCNP ROUTE V7 CH4CCNP ROUTE V7 CH4
CCNP ROUTE V7 CH4
Chaing Ravuth
 
CCNP ROUTE V7 CH3
CCNP ROUTE V7 CH3CCNP ROUTE V7 CH3
CCNP ROUTE V7 CH3
Chaing Ravuth
 
CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH2CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH2
Chaing Ravuth
 
CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1
Chaing Ravuth
 
CCNP Switching Chapter 3
CCNP Switching Chapter 3CCNP Switching Chapter 3
CCNP Switching Chapter 3
Chaing Ravuth
 
CCNP Switching Chapter 2
CCNP Switching Chapter 2CCNP Switching Chapter 2
CCNP Switching Chapter 2
Chaing Ravuth
 
CCNP Switching Chapter 10
CCNP Switching Chapter 10CCNP Switching Chapter 10
CCNP Switching Chapter 10
Chaing Ravuth
 
CCNP Switching Chapter 9
CCNP Switching Chapter 9CCNP Switching Chapter 9
CCNP Switching Chapter 9
Chaing Ravuth
 
CCNP Switching Chapter 8
CCNP Switching Chapter 8CCNP Switching Chapter 8
CCNP Switching Chapter 8
Chaing Ravuth
 
CCNP Switching Chapter 7
CCNP Switching Chapter 7CCNP Switching Chapter 7
CCNP Switching Chapter 7
Chaing Ravuth
 
CCNP Switching Chapter 6
CCNP Switching Chapter 6CCNP Switching Chapter 6
CCNP Switching Chapter 6
Chaing Ravuth
 
CCNP Switching Chapter 5
CCNP Switching Chapter 5CCNP Switching Chapter 5
CCNP Switching Chapter 5
Chaing Ravuth
 
CCNP Switching Chapter 4
CCNP Switching Chapter 4CCNP Switching Chapter 4
CCNP Switching Chapter 4
Chaing Ravuth
 
CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1
Chaing Ravuth
 
CCNA4 Verson6 Chapter8
CCNA4 Verson6 Chapter8CCNA4 Verson6 Chapter8
CCNA4 Verson6 Chapter8
Chaing Ravuth
 
CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7
Chaing Ravuth
 
CCNP Switching Chapter 3
CCNP Switching Chapter 3CCNP Switching Chapter 3
CCNP Switching Chapter 3
Chaing Ravuth
 
CCNP Switching Chapter 2
CCNP Switching Chapter 2CCNP Switching Chapter 2
CCNP Switching Chapter 2
Chaing Ravuth
 
CCNP Switching Chapter 10
CCNP Switching Chapter 10CCNP Switching Chapter 10
CCNP Switching Chapter 10
Chaing Ravuth
 
CCNP Switching Chapter 9
CCNP Switching Chapter 9CCNP Switching Chapter 9
CCNP Switching Chapter 9
Chaing Ravuth
 
CCNP Switching Chapter 8
CCNP Switching Chapter 8CCNP Switching Chapter 8
CCNP Switching Chapter 8
Chaing Ravuth
 
CCNP Switching Chapter 7
CCNP Switching Chapter 7CCNP Switching Chapter 7
CCNP Switching Chapter 7
Chaing Ravuth
 
CCNP Switching Chapter 6
CCNP Switching Chapter 6CCNP Switching Chapter 6
CCNP Switching Chapter 6
Chaing Ravuth
 
CCNP Switching Chapter 5
CCNP Switching Chapter 5CCNP Switching Chapter 5
CCNP Switching Chapter 5
Chaing Ravuth
 
CCNP Switching Chapter 4
CCNP Switching Chapter 4CCNP Switching Chapter 4
CCNP Switching Chapter 4
Chaing Ravuth
 
CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1
Chaing Ravuth
 
CCNA4 Verson6 Chapter8
CCNA4 Verson6 Chapter8CCNA4 Verson6 Chapter8
CCNA4 Verson6 Chapter8
Chaing Ravuth
 
CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7
Chaing Ravuth
 
Ad

Recently uploaded (20)

Chemotherapy of Malignancy -Anticancer.pptx
Chemotherapy of Malignancy -Anticancer.pptxChemotherapy of Malignancy -Anticancer.pptx
Chemotherapy of Malignancy -Anticancer.pptx
Mayuri Chavan
 
Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...
Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...
Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...
parmarjuli1412
 
Transform tomorrow: Master benefits analysis with Gen AI today webinar, 30 A...
Transform tomorrow: Master benefits analysis with Gen AI today webinar,  30 A...Transform tomorrow: Master benefits analysis with Gen AI today webinar,  30 A...
Transform tomorrow: Master benefits analysis with Gen AI today webinar, 30 A...
Association for Project Management
 
CNS infections (encephalitis, meningitis & Brain abscess
CNS infections (encephalitis, meningitis & Brain abscessCNS infections (encephalitis, meningitis & Brain abscess
CNS infections (encephalitis, meningitis & Brain abscess
Mohamed Rizk Khodair
 
The role of wall art in interior designing
The role of wall art in interior designingThe role of wall art in interior designing
The role of wall art in interior designing
meghaark2110
 
Cultivation Practice of Onion in Nepal.pptx
Cultivation Practice of Onion in Nepal.pptxCultivation Practice of Onion in Nepal.pptx
Cultivation Practice of Onion in Nepal.pptx
UmeshTimilsina1
 
Myopathies (muscle disorders) for undergraduate
Myopathies (muscle disorders) for undergraduateMyopathies (muscle disorders) for undergraduate
Myopathies (muscle disorders) for undergraduate
Mohamed Rizk Khodair
 
Classification of mental disorder in 5th semester bsc. nursing and also used ...
Classification of mental disorder in 5th semester bsc. nursing and also used ...Classification of mental disorder in 5th semester bsc. nursing and also used ...
Classification of mental disorder in 5th semester bsc. nursing and also used ...
parmarjuli1412
 
Drugs in Anaesthesia and Intensive Care,.pdf
Drugs in Anaesthesia and Intensive Care,.pdfDrugs in Anaesthesia and Intensive Care,.pdf
Drugs in Anaesthesia and Intensive Care,.pdf
crewot855
 
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
Dr. Nasir Mustafa
 
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon DolabaniHistory Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
fruinkamel7m
 
How to Create Kanban View in Odoo 18 - Odoo Slides
How to Create Kanban View in Odoo 18 - Odoo SlidesHow to Create Kanban View in Odoo 18 - Odoo Slides
How to Create Kanban View in Odoo 18 - Odoo Slides
Celine George
 
Myasthenia gravis (Neuromuscular disorder)
Myasthenia gravis (Neuromuscular disorder)Myasthenia gravis (Neuromuscular disorder)
Myasthenia gravis (Neuromuscular disorder)
Mohamed Rizk Khodair
 
Module 1: Foundations of Research
Module 1: Foundations of ResearchModule 1: Foundations of Research
Module 1: Foundations of Research
drroxannekemp
 
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptxU3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
Mayuri Chavan
 
Rock Art As a Source of Ancient Indian History
Rock Art As a Source of Ancient Indian HistoryRock Art As a Source of Ancient Indian History
Rock Art As a Source of Ancient Indian History
Virag Sontakke
 
How to Share Accounts Between Companies in Odoo 18
How to Share Accounts Between Companies in Odoo 18How to Share Accounts Between Companies in Odoo 18
How to Share Accounts Between Companies in Odoo 18
Celine George
 
Ancient Stone Sculptures of India: As a Source of Indian History
Ancient Stone Sculptures of India: As a Source of Indian HistoryAncient Stone Sculptures of India: As a Source of Indian History
Ancient Stone Sculptures of India: As a Source of Indian History
Virag Sontakke
 
How to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 PurchaseHow to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 Purchase
Celine George
 
Chemotherapy of Malignancy -Anticancer.pptx
Chemotherapy of Malignancy -Anticancer.pptxChemotherapy of Malignancy -Anticancer.pptx
Chemotherapy of Malignancy -Anticancer.pptx
Mayuri Chavan
 
Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...
Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...
Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...
parmarjuli1412
 
Transform tomorrow: Master benefits analysis with Gen AI today webinar, 30 A...
Transform tomorrow: Master benefits analysis with Gen AI today webinar,  30 A...Transform tomorrow: Master benefits analysis with Gen AI today webinar,  30 A...
Transform tomorrow: Master benefits analysis with Gen AI today webinar, 30 A...
Association for Project Management
 
CNS infections (encephalitis, meningitis & Brain abscess
CNS infections (encephalitis, meningitis & Brain abscessCNS infections (encephalitis, meningitis & Brain abscess
CNS infections (encephalitis, meningitis & Brain abscess
Mohamed Rizk Khodair
 
The role of wall art in interior designing
The role of wall art in interior designingThe role of wall art in interior designing
The role of wall art in interior designing
meghaark2110
 
Cultivation Practice of Onion in Nepal.pptx
Cultivation Practice of Onion in Nepal.pptxCultivation Practice of Onion in Nepal.pptx
Cultivation Practice of Onion in Nepal.pptx
UmeshTimilsina1
 
Myopathies (muscle disorders) for undergraduate
Myopathies (muscle disorders) for undergraduateMyopathies (muscle disorders) for undergraduate
Myopathies (muscle disorders) for undergraduate
Mohamed Rizk Khodair
 
Classification of mental disorder in 5th semester bsc. nursing and also used ...
Classification of mental disorder in 5th semester bsc. nursing and also used ...Classification of mental disorder in 5th semester bsc. nursing and also used ...
Classification of mental disorder in 5th semester bsc. nursing and also used ...
parmarjuli1412
 
Drugs in Anaesthesia and Intensive Care,.pdf
Drugs in Anaesthesia and Intensive Care,.pdfDrugs in Anaesthesia and Intensive Care,.pdf
Drugs in Anaesthesia and Intensive Care,.pdf
crewot855
 
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
Dr. Nasir Mustafa
 
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon DolabaniHistory Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
fruinkamel7m
 
How to Create Kanban View in Odoo 18 - Odoo Slides
How to Create Kanban View in Odoo 18 - Odoo SlidesHow to Create Kanban View in Odoo 18 - Odoo Slides
How to Create Kanban View in Odoo 18 - Odoo Slides
Celine George
 
Myasthenia gravis (Neuromuscular disorder)
Myasthenia gravis (Neuromuscular disorder)Myasthenia gravis (Neuromuscular disorder)
Myasthenia gravis (Neuromuscular disorder)
Mohamed Rizk Khodair
 
Module 1: Foundations of Research
Module 1: Foundations of ResearchModule 1: Foundations of Research
Module 1: Foundations of Research
drroxannekemp
 
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptxU3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
Mayuri Chavan
 
Rock Art As a Source of Ancient Indian History
Rock Art As a Source of Ancient Indian HistoryRock Art As a Source of Ancient Indian History
Rock Art As a Source of Ancient Indian History
Virag Sontakke
 
How to Share Accounts Between Companies in Odoo 18
How to Share Accounts Between Companies in Odoo 18How to Share Accounts Between Companies in Odoo 18
How to Share Accounts Between Companies in Odoo 18
Celine George
 
Ancient Stone Sculptures of India: As a Source of Indian History
Ancient Stone Sculptures of India: As a Source of Indian HistoryAncient Stone Sculptures of India: As a Source of Indian History
Ancient Stone Sculptures of India: As a Source of Indian History
Virag Sontakke
 
How to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 PurchaseHow to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 Purchase
Celine George
 

CCNA2 Verson6 Chapter1

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Instructor Materials Chapter 1: Routing Concepts CCNA Routing and Switching Routing and Switching Essentials v6.0
  • 2. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15 Chapter 1: Routing Concepts Routing and Switching Essentials v6.0
  • 3. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 1 - Sections & Objectives 1.1 Router Initial Configuration • Describe the primary functions and features of a router. • Configure basic settings on a router to route between two directly-connected networks, using CLI. • Verify connectivity between two networks that are directly connected to a router. 1.2 Routing Decisions • Explain the encapsulation and de-encapsulation process used by routers when switching packets between interfaces. • Explain the path determination function of a router. 1.3 Router Operation • Explain routing table entries for directly connected networks. • Explain how a router builds a routing table of directly connected networks. • Explain how a router builds a routing table using static routes. • Explain how a router builds a routing table using a dynamic routing protocol.
  • 4. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 17 1.1 Router Initial Configuration
  • 5. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Functions Characteristicsof a Network
  • 6. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Functions Why Routing? The router is responsible for the routing of traffic between networks.
  • 7. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Routers are specialized computers containing the following required components to operate: • Central processing unit (CPU) • Operating system (OS) - Routers use Cisco IOS • Memory and storage (RAM, ROM, NVRAM, Flash, hard drive) Router Functions Routers are Computers
  • 8. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Routers use specialized ports and network interface cards to interconnect to other networks. Router Functions Routers are Computers (cont.)
  • 9. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Functions Routers are Computers Router Memory
  • 10. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Functions Routers Interconnect Networks
  • 11. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Functions Routers Choose Best Paths  Routers use static routes and dynamic routing protocols to learn about remote networks and build their routing tables.  Routers use routing tables to determine the best path to send packets.  Routers encapsulate the packet and forward it to the interface indicated in routing table.
  • 12. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  Process switching – An older packet forwarding mechanism still available for Cisco routers.  Fast switching – A common packet forwarding mechanism which uses a fast-switching cache to store next hop information.  Cisco Express Forwarding (CEF) – The most recent, fastest, and preferred Cisco IOS packet-forwarding mechanism. Router Functions Packet Forwarding Methods
  • 13. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connect Devices Connect to a Network
  • 14. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connect Devices Default Gateways To enable network access devices, must be configured with the following IP address information: IP address - Identifies a unique host on a local network. Subnet mask - Identifies the host’s network subnet. Default gateway - Identifies the router a packet is sent to when the destination is not on the same local network subnet.
  • 15. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connect Devices Document Network Addressing Network documentation should include at least the following in a topology diagram and addressing table:  Device names  Interfaces  IP addresses and subnet masks  Default gateways
  • 16. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connect Devices Enable IP on a Host Statically Assigned IP address – The host is manually assigned an IP address, subnet mask and default gateway. A DNS server IP address can also be assigned. • Used to identify specific network resources such as network servers and printers. • Can be used in very small networks with few hosts. Dynamically Assigned IP Address – IP Address information is dynamically assigned by a server using Dynamic Host Configuration Protocol (DHCP). • Most hosts acquire their IP address information through DHCP. • DHCP services can be provided by Cisco routers.
  • 17. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connect Devices Enable IP on a Host
  • 18. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connect Devices Enable IP on a Host
  • 19. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connect devices Device LEDs
  • 20. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Console Access Connect Devices Console Access
  • 21. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connect Devices Enable IP on a Switch  Network infrastructure devices require IP addresses to enable remote management.  On a switch, the management IP address is assigned on a virtual interface called a switched virtual interface (SVI)
  • 22. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Basic Settings Configure Router Basic Settings  Name the device – Distinguishes it from other routers  Secure management access – Secures privileged EXEC, user EXEC, and Telnet access, and encrypts passwords .  Configure a banner – Provides legal notification of unauthorized access.  Save the Configuration
  • 23. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Basic Settings Configure an IPv4 Router Interface To be available, a router interface must be:  Configured with an address and subnet mask.  Activated using no shutdown command. By default LAN and WAN interfaces are not activated.  Configured with the clock rate command on the Serial cable end labeled DCE. Optional description can be included.
  • 24. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Basic Settings Configure an IPv6 Router Interface Configure interface with IPv6 address and subnet mask:  Use the ipv6 address ipv6-address/ipv6-length [link-local | eui-64]interface configuration command.  Activate using the no shutdown command.
  • 25. Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Basic Settings Configure an IPv6 Router Interface (cont.) IPv6 interfaces can support more than one address:  Configure a specified global unicast – ipv6address ipv6- address /ipv6-length  Configure a global IPv6 address with an interface identifier (ID) in the low-order 64 bits - ipv6address ipv6-address /ipv6-length eui-64  Configure a link-local address - ipv6address ipv6-address /ipv6- length link-local
  • 26. Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Basic Settings Configure an IPv4 Loopback Interface A loopback interface is a logical interface that is internal to the router:  It is not assigned to a physical port, it is considered a software interface that is automatically in an UP state.  A loopback interface is useful for testing.  It is important in the OSPF routing process.
  • 27. Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verify Connectivity of Directly Connected Networks Verify Interface Settings Show commands are used to verify operation and configuration of interface:  show ip interfaces brief  show ip route  show running-config Show commands that are used to gather more detailed interface information:  show interfaces  show ip interfaces
  • 28. Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verify Connectivity of Directly Connected Networks Verify Interface Settings (cont.)
  • 29. Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verify Connectivity of Directly Connected Networks Verify IPv6 Interface Settings Common commands to verify the IPv6 interface configuration:  show ipv6 interface brief - displays a summary for each of the interfaces.  show ipv6 interface gigabitethernet 0/0 - displays the interface status and all the IPv6 addresses for this interface.  show ipv6 route - verifies that IPv6 networks and specific IPv6 interface addresses have been installed in the IPv6 routing table.
  • 30. Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Show command output can be managed using the following command and filters:  Use the terminal length number command to specify the number of lines to be displayed.  To filter specific output of commands use the (|)pipe character after show command. Parameters that can be used after pipe include: • section, include, exclude, begin Verify Connectivity of Directly Connected Networks Filter Show Command Output
  • 31. Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verify Connectivity of Directly Connected Networks Command History Feature The command history feature temporarily stores a list of executed commands for access:  To recall commands press Ctrl+P or the UP Arrow.  To return to more recent commands press Ctrl+N or the Down Arrow.  By default, command history is enabled and the system captures the last 10 commands in the buffer. Use the show history privileged EXEC command to display the buffer contents.  Use the terminal history size user EXEC command to increase or decrease size of the buffer.
  • 32. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 45 1.2 Routing Decisions
  • 33. Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Packets Between Networks Router Switching Function
  • 34. Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Packets Between Networks Send a Packet
  • 35. Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Packets Between Networks Forward to Next Hop
  • 36. Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Packets Between Networks Packet Routing
  • 37. Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Packets Between Networks Reach the Destination
  • 38. Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Path Determination Routing Decisions
  • 39. Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Path Determination Best Path  Best path is selected by a routing protocol based on the value or metric it uses to determine the distance to reach a network: o A metric is the value used to measure the distance to a given network. o Best path to a network is the path with the lowest metric.  Dynamic routing protocols use their own rules and metrics to build and update routing tables: o Routing Information Protocol (RIP) - Hop count o Open Shortest Path First (OSPF) - Cost based on cumulative bandwidth from source to destination o Enhanced Interior Gateway Routing Protocol (EIGRP) - Bandwidth, delay, load, reliability
  • 40. Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Path Determination Load Balancing  When a router has two or more paths to a destination with equal cost metrics, then the router forwards the packets using both paths equally: o Equal cost load balancing can improve network performance. o Equal cost load balancing can be configured to use both dynamic routing protocols and static routes.
  • 41. Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Path Determination Administrative Distance  If multiple paths to a destination are configured on a router, the path installed in the routing table is the one with the lowest Administrative Distance (AD): o A static route with an AD of 1 is more reliable than an EIGRP-discovered route with an AD of 90. o A directly connected route with an AD of 0 is more reliable than a static route with an AD of 1.
  • 42. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 55 1.3 Router Operation
  • 43. Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Analyze the Routing Table The Routing Table  A routing table is a file stored in RAM that contains information about: o Directly connected routes o Remote routes
  • 44. Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Analyze the Routing Table Routing Table Sources The show ip route command is used to display the contents of the routing table: o Local route interfaces - Added to the routing table when an interface is configured. (displayed in IOS 15 or newer for IPv4 routes and all IOS releases for IPv6 routes.) o Directly connected interfaces - Added to the routing table when an interface is configured and active. o Static routes - Added when a route is manually configured and the exit interface is active. o Dynamic routing protocol - Added when EIGRP or OSPF are implemented and networks are identified.
  • 45. Presentation_ID 58© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Analyze the Routing Table Routing Table Sources (cont.)
  • 46. Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Analyze the Routing Table Remote Network Routing Entries Interpreting the entries in the routing table
  • 47. Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Directly Connected Routes Directly Connected Interfaces A newly deployed router, without any configured interfaces, has an empty routing table.
  • 48. Presentation_ID 61© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Directly Connected Routes Directly Connected Routing Table Entries
  • 49. Presentation_ID 62© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Directly Connected Routes Directly Connected Example
  • 50. Presentation_ID 63© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Directly Connected Routes Directly Connected IPv6 Example
  • 51. Presentation_ID 64© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Statically Learned Routes Static Routes Static routes and default static routes can be implemented after directly connected interfaces are added to the routing table: o Static routes are manually configured. o They define an explicit path between two networking devices. o Static routes must be manually updated if the topology changes. o Their benefits include improved security and control of resources. o Configure a static route to a specific network using the ip route network mask {next-hop-ip | exit-intf} command. o A default static route is used when the routing table does not contain a path for a destination network. o Configure a default static route using the ip route 0.0.0.0 0.0.0.0 {exit- intf | next-hop-ip} command.
  • 52. Presentation_ID 65© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Statically Learned Routes Static Route Example
  • 53. Presentation_ID 66© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Statically Learned Routes Static Route Example (cont.) Entering and Verifying a Static Route
  • 54. Presentation_ID 67© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Statically Learned Routes Static IPv6 Route Examples
  • 55. Presentation_ID 68© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Statically Learned Routes Static IPv6 Route Examples
  • 56. Presentation_ID 69© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Dynamic Routing Protocols Dynamic Routing  Dynamic routing is used by routers to share information about the reachability and status of remote networks.  It performs network discovery and maintains routing tables.  Routers have converged after they have finished exchanging and updating their routing tables.
  • 57. Presentation_ID 70© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Dynamic Routing Protocols IPv4 Routing Protocols Cisco routers can support a variety of dynamic IPv4 routing protocols including: • EIGRP – Enhanced Interior Gateway Routing Protocol • OSPF – Open Shortest Path First • IS-IS – Intermediate System-to-Intermediate System • RIP – Routing Information Protocol Use the router ? Command in global configuration mode to determine which routing protocols are supported by the IOS.
  • 58. Presentation_ID 71© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Dynamic Routing Protocols IPv4 Dynamic Routing Examples
  • 59. Presentation_ID 72© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Dynamic Routing Protocols IPv6 Routing Protocols Cisco routers can support a variety of dynamic IPv6 routing protocols including: o RIPng (RIP next generation) o OSPFv3 o EIGRP for IPv6 Use the ipv6 router ? command to determine which routing protocols are supported by the IOS IPv6 Routing Protocols
  • 60. Presentation_ID 73© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Dynamic Routing Protocols IPv6 Dynamic Routing Examples
  • 61. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 74 1.4 Chapter Summary
  • 62. Presentation_ID 75© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  Describe the primary functions and features of a router.  Configure basic settings on a router to route between two directly-connected networks, using CLI.  Verify connectivity between two networks that are directly connected to a router.  Explain how routers use information in data packets to make forwarding decisions in a small to medium-sized business network.  Explain the encapsulation and de-encapsulation process used by routers when switching packets between interfaces.  Explain the path determination function of a router.  Explain how a router learns about remote networks when operating in a small to medium- sized business network.  Explain how a router builds a routing table of directly connected networks.  Explain how a router builds a routing table using static routes.  Explain how a router builds a routing table using a dynamic routing protocol. Chapter Summary Summary
  • 63. Presentation_ID 80© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 64. Presentation_ID 81© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  翻译: