NETWORK & ITS TROUBLESHOOTING IN CCNA
#1

Presented By:
Agam Jain

NETWORK & ITS TROUBLESHOOTING IN CCNA
[attachment=9666]
 CEG Industry Partners
 Some features of CEG are:

• To promote interaction between the Government, Technical Institutes and the Industries.
• To provide conducive environment for learning by doing in colleges.
• To promote the dissemination of knowledge fostering the innovative thoughts of the Students.
• To empower students living in the rural areas so as to bridge the urban - Rural gap.
• To organize seminar and lectures of eminent professionals and scientists.
• To produce readily employable graduates by imparting industry grade skills.
• To produce industry ready IT professionals.
• To help in updating the Curriculum as per the needs of the Industries.
• To perform such other functions and to carry out such other duties as the society may deem proper or as may be assigned to it by the State Government from time to time
Aims and Objectives of CEG are:
• Campus Placement Mission (CPM)
• Campus Placement Related Skills (CPRS)
• Graduate Placement Mission (GPM)
• Training for Students
• Training for Faculty
Awards & Recognition
 Awarded No.1 CISCO-Academy Of Whole Asia Region
 Mr. Arvind Sharma Selected For Best Instructor In Asia
 How Networks Impact Daily Life

 The benefits of instantaneous communication and how it supports and improves our lives.
 How Networks Impact Daily Life
 The ways communication over a network changes the way we work
 Network Architecture Characteristics
 Basic measures to secure data networks
– Ensure confidentiality through use of
• User authentication
• Data encryption
– Maintain communication integrity through use of
• Digital signatures
– Ensure availability through use of
• Firewalls
• Redundant network
architecture
• Hardware without a single
point of failure
 Network Structure
 Network media and criteria for making a network media choice
Network media
this is the channel over which a message travels
 Network Types
 Define Local Area Networks (LANs)
- A network serving a home, building or campus is considered a Local Area Network (LAN)
 Network Types
 Define Wide Area Networks (WANs)
- LANs separated by geographic distance are connected by a network known as a Wide Area Network (WAN)
 Network Types
 Layers with TCP/IP and OSI Model
 Compare OSI and TCP/IP model
 Addressing and Naming Schemes
 Explain how labels in encapsulation headers are used to manage communication in data networks
 Addressing and Naming Schemes
 Explain how labels in encapsulation headers are used to manage communication in data networks
 SUBNETTING
 IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network.
 An IP address is a 32 bit binary number usually represented as 4 decimal values, each representing 8 bits
 range 0 to 255 (known as octets)
 Example:
140 .179 .220 .200 10001100.10110011.11011100.11001000
 IPv4 Address
 Default subnet masks
 Class A - 255.0.0.0 11111111.00000000.00000000.00000000

 Class B - 255.255.0.0 11111111.11111111.00000000.00000000

 Class C - 255.255.255.0
11111111.11111111.11111111.00000000
 Features, Operation, and Use of TCP/IP Application Layer Services
 Describe the features of the DNS protocol and how this protocol supports DNS services
 Features, Operation, and Use of TCP/IP Application Layer Services
 Describe the features of the HTTP protocol and how this protocol supports the delivery of web pages to the client
 Features, Operation, and Use of TCP/IP Application Layer Services
 Describe the features of the POP and SMTP protocols, and how these protocols support e-mail services
 Grouping Devices into Networks and Hierarchical Addressing
 Describe the purpose of further subdividing networks into smaller networks
 Types of Connections in a LAN
 Identify the correct cable to use in connecting intermediate and end devices in a LAN.
 Types of Connections in a LAN
 Identify the pinout of the straight-through and cross-over cables
 Role of Internetwork Operating System (IOS)
 Define the purpose of startup config.
 Role of Internetwork Operating System (IOS)
 Identify the basic command structure for IOS commands
 Role of Internetwork Operating System (IOS)
 Use the CLI to access various IOS configuration modes on a device
 Router as a Computer
 Describe the basic purpose of a router
-Computers that specialize in sending packets over the data network. They are responsible for interconnecting networks by selecting the best path for a packet to travel and forwarding packets to their destination
 Routers are the network center
-Routers generally have 2 connections:
-WAN connection (Connection to ISP)
-LAN connection
 Router as a Computer
 Router components and their functions”
 CPU - Executes operating system instructions
 Random access memory (RAM) - Contains the running copy of configuration file. Stores routing table. RAM contents lost when power is off
 Read-only memory (ROM) - Holds diagnostic software used when router is powered up. Stores the router’s bootstrap program.
 Non-volatile RAM (NVRAM) - Stores startup configuration. This may include IP addresses (Routing protocol, Hostname of router)
 Flash memory - Contains the operating system (Cisco IOS)
 Interfaces - There exist multiple physical interfaces that are used to connect network. Examples of interface types:
-Ethernet / fast Ethernet interfaces
-Serial interfaces
-Management interfaces
 Router as a Computer
 Router Interface is a physical connector that enables a router to send or receive packets
 Each interface connects to a separate network
 Consist of socket or jack found on the outside of a router
 Types of router interfaces:
-Ethernet
-Fastethernet
-Serial
-DSL
-ISDN
-Cable
Routing Protocols
 Best path

Most efficient route from one node to another
Dependent on:
Number of hops between nodes
Current network activity
Unavailable link
Network transmission speed
Topology
Determined by routing protocol
Routing Protocols (cont’d.)
 Routing protocol

Router communication
Collects current network status data
Contribute to best path selection
Routing table creation
Router convergence time
Time router takes to recognize best path
Change or network outage event
Distinguishing feature
Overhead; burden on network to support routing protocol
Distance-Vector: RIP, RIPv2, BGP
 Distance-vector routing protocols

Determine best route based on distance to destination
Factors
Hops, latency, network traffic conditions
RIP (Routing Information Protocol)
Only factors in number of hops between nodes
Limits 15 hops
Interior routing protocol
Slow and less secure
Distance-Vector: RIP, RIPv2, BGP (cont’d.)
 RIPv2 (Routing Information Protocol Version 2)

Generates less broadcast traffic, more secure
Cannot exceed 15 hops
Less commonly used
BGP (Border Gateway Protocol)
Communicates using BGP-specific messages
Many factors determine best paths
Configurable to follow policies
Most complex (choice for Internet traffic)
 Link-State: OSPF, IS-IS
Link-state routing protocol
Routers share information
Each router independently maps network, determines best path
OSPF (Open Shortest Path First)
Interior or border router use
No hop limit
Complex algorithm for determining best paths
Each OSPF router
Maintains database containing other routers’ links
Link-State: OSPF, IS-IS (cont’d.)
 IS-IS (Intermediate System to Intermediate System)

Codified by ISO
Interior routers only
Less common than OSPF
Key Learnings
 Conclusion

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: buet ccna admission question, troubleshooting of motor pdf, ccna projects pdf, trainsignal cisco ccna training videos free download, troubleshooting briggs and stratton engines, summer training report on ccna pdf downliad free, seminar topics for computer troubleshooting,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ARTIFICIAL NEURAL NETWORK AND FUZZY LOGIC BASED POWER SYSTEM STABILIZER project topics 4 6,145 28-02-2014, 04:00 AM
Last Post: Guest
  Low Power Wireless Sensor Network computer science crazy 4 5,744 30-04-2013, 10:04 AM
Last Post: computer topic
  A Disaster Information System by Ballooned Wireless Adhoc Network seminar surveyer 2 2,368 15-02-2013, 10:20 AM
Last Post: seminar details
  RADIO NETWORK CONTROLLER FOR 3G MOBILE AND WIRELESS NETWORK DEVICES seminar presentation 4 5,334 22-12-2012, 10:52 AM
Last Post: seminar details
  Radio Network Controller computer science crazy 1 1,806 22-12-2012, 10:52 AM
Last Post: seminar details
  A Digital Watermark Based on The Wavelet Transform and its Robustness on Image project topics 1 2,347 19-12-2012, 11:48 AM
Last Post: seminar details
  Economic Dispatch Solution using Hopfield Neural Network seminar class 1 2,040 16-11-2012, 12:25 PM
Last Post: seminar details
  ADAPTIVE-NETWORK-BASED FUZZY INFERENCE SYSTEMS computer girl 0 807 11-06-2012, 12:48 PM
Last Post: computer girl
  Seminar on Network Devices computer girl 0 819 09-06-2012, 02:25 PM
Last Post: computer girl
  PERSONAL ENTERTAINMENT NETWORK SYSTEMS (PENS)- A project report ajukrishnan 2 4,617 18-02-2012, 02:23 PM
Last Post: seminar paper

Forum Jump: