In this lab, you will complete the following objectives:
Part 1: Configure a Basic Network Device
Part 2: Verify and Test Network Connectivity
Lab - Configuring a Switch Management Address
...
Thursday, December 29, 2016
Lab - Building a Simple Network
In this lab, you will complete the following objectives:
Part 1: Set Up the Network Topology (Ethernet only)
Part 2: Configure PC Hosts
Part 3: Configure and Verify Basic Switch Settings
Lab - Building a Simple Network
...
Wednesday, December 28, 2016
Packet Tracer - Implementing Basic Connectivity
In this activity, you will first perform basic switch
configurations. Then you will implement basic connectivity by
configuring IP addressing on switches and PCs. When the IP addressing
configuration is complete, you will use various show commands to verify
configurations and use the ping command to verify basic connectivity
between devices.
Packet Tracer - Implementing Basic Connectivity Instructions
Packet Tracer - Implementing Basic Connectivity – PKA
...
Syntax Checker - Configuring a Switch Virtual Interface
Use the Syntax Checker in the figure to practice configuring a switch virtual interfa...
Switch Virtual Interface Configuration
To access the switch remotely, an IP address and a subnet
mask must be configured on the SVI. To configure an SVI on a switch, use
the interface vlan 1 global configuration command. Vlan 1 is not
an actual physical interface but a virtual one. Next assign an IPv4
address using the ip address ip-address subnet-mask interface configuration command. Finally, enable the virtual interface using the no shutdown interface configuration command.
After these commands are configured, the switch has all the IPv4 elements ready for communication over the network.
Click Play in the figure to...
Monday, December 26, 2016
Packet Tracer - Configuring Initial Switch Settings
In this activity, you will perform basic switch
configurations. You will secure access to the command-line interface
(CLI) and console ports using encrypted and plain text passwords. You
will learn how to configure messages for users logging into the switch.
These banners are also used to warn unauthorized users that access is
prohibited.
Packet Tracer - Configuring Initial Switch Settings Instructions
Packet Tracer - Configuring Initial Switch Settings - PKA
...
Capture Configuration to a Text File
Configuration files can also be saved and archived to a
text document. This sequence of steps ensures that a working copy of the
configuration file is available for editing or reuse later.
For example, assume that a switch has been configured, and the running configuration has been saved on the device.
Open a terminal emulation software such as PuTTY or Tera Term (Figure 1) connected to a switch.
Enable logging in the terminal software, such as PuTTY
or Tera Term, and assign a name and file location to save the log file.
Figure 2 displays that All session...
Saturday, December 24, 2016
Save the Running Configuration File
There are two system files that store the device configuration:
startup-config - The file stored in Non-volatile
Random Access Memory (NVRAM) that contains all of the commands that will
be used by the device upon startup or reboot. NVRAM does not lose its
contents when the device is powered off.
running-config - The file stored in Random Access
Memory (RAM) that reflects the current configuration. Modifying a
running configuration affects the operation of a Cisco device
immediately. RAM is volatile memory. It loses all of its content when...
Banner Messages
Although requiring passwords is one way to keep
unauthorized personnel out of a network, it is vital to provide a method
for declaring that only authorized personnel should attempt to gain
entry into the device. To do this, add a banner to the device output.
Banners can be an important part of the legal process in the event that
someone is prosecuted for breaking into a device. Some legal systems do
not allow prosecution, or even the monitoring of users, unless a
notification is visible.
To create a banner message of the day on a network device, use the banner motd # the message of the day # global
...
Thursday, December 22, 2016
Secure Device Access
The use of weak or easily guessed passwords continues to be
a security issue in many facets of the business world. Network devices,
including home wireless routers, should always have passwords
configured to limit administrative access.
Cisco IOS can be configured to use hierarchical mode passwords to allow different access privileges to a network device.
All networking devices should limit access as listed in Figure 1.
Use strong passwords that are not easily guessed. Consider the key points listed in Figure 2.
Note: Most...
Configure Hostnames
Once the naming convention has been identified, the next step is to apply the names to the devices using the CLI.
As shown in Figure 1, from the privileged EXEC mode, access the global configuration mode by entering the configure terminal command. Notice the change in the command prompt.
From global configuration mode, enter the command hostname followed by the name of the switch and press Enter. Notice the change in the command prompt name.
Note: To remove the configured hostname and return the switch to the default prompt, use the no hostname global...
Wednesday, December 21, 2016
Lab - Establishing a Console Session with Tera Term
In this lab, you will complete the following objectives:
Part 1: Access a Cisco Switch through the Serial Console Port
Part 2: Display and Configure Basic Device Settings
Part 3: (Optional) Access a Cisco Router Using a Mini-USB Console Cable
Lab - Establishing a Console Session with Tera Term
...
Hotkeys and Shortcuts
The IOS CLI provides hot keys and shortcuts that make
configuring, monitoring, and troubleshooting easier, as shown in the
figure.
Commands and keywords can be shortened to the minimum number of characters that identify a unique selection. For example, the configure command can be shortened to conf because configure is the only command that begins with conf. An even shorter version of con will not work because more than one command begins with con. Keywords can also be shortene...
Sunday, December 18, 2016
IOS Command Syntax
A command might require one or more arguments. To determine
the keywords and arguments required for a command, refer to the command
syntax. The syntax provides the pattern or format that must be used
when entering a command.
As identified in the table in the figure, boldface text
indicates commands and keywords that are entered as shown. Italic text
indicates an argument for which the user provides the value.
For instance, the syntax for using the description command is description string. The argument is a string
value provided by the user. The description command is typically...
Friday, December 16, 2016
Navigate Between IOS Modes
Various commands are used to move in and out of command prompts. To move from user EXEC mode to privileged EXEC mode, use the enable command. Use the disable privileged EXEC mode command to return to user EXEC mode.
Note: Privileged EXEC mode is sometimes called enable mode.
To move in and out of global configuration mode, use the configure terminal privileged EXEC mode command. To return to the privileged EXEC mode, enter the exit global config mode command.
There are many different sub-configuration modes. For example, to enter line sub-configuration...
Thursday, December 15, 2016
Primary Command Modes
As a security feature, the Cisco IOS software separates management access into the following two command modes:
User EXEC Mode - This mode has limited
capabilities but is useful for basic operations. It allows only a
limited number of basic monitoring commands but does not allow the
execution of any commands that might change the configuration of the
device. The user EXEC mode is identified by the CLI prompt that ends
with the > symbol.
Privileged EXEC Mode - To execute configuration
commands, a network administrator must access privileged EXEC mode.
Higher configuration modes, like global...
Terminal Emulation Programs
There are a number of excellent terminal emulation programs
available for connecting to a networking device either by a serial
connection over a console port or by a SSH/Telnet connection. Some of
these include:
PuTTY (Figure 1)
Tera Term (Figure 2)
SecureCRT (Figure 3)
OS X Terminal
These programs allow you to enhance your productivity by
adjusting window sizes, changing font sizes, and changing color scheme...
Purpose of OS
Network operating systems are similar to a PC operating system. Through a GUI, a PC operating system enables a user to:
Use a mouse to make selections and run programs
Enter text and text-based commands
View output on a monitor
A CLI-based network operating system like the Cisco IOS on a switch or router enables a network technician to:
Use a keyboard to run CLI-based network programs
Use a keyboard to enter text and text-based commands
View...
Monday, December 5, 2016
Class Activity - It Is Just an Operating System
In this activity, imagine that you are employed as an
engineer for a car manufacturing company. The company is currently
working on a new car model. This model will have selected functions that
can be controlled by the driver giving specific voice commands.
Design a set of commands used by this voice-activated
control system, and identify how they are going to be executed. The
functions of the car that can be controlled by voice commands are:
Lights
Wipers
Radio
Telephone set
...
Chapter 1: Exploring the Network
Networks and the Internet have changed the way we communicate, learn, work, and even play.
Networks come in all sizes. They can range from simple
networks consisting of two computers to networks connecting millions of
devices.
The Internet is the largest network in existence. In fact,
the term Internet means a ‘network of networks’. The Internet provides
the services that enable us to connect and communicate with our
families, friends, work, and interests.
The network infrastructure is the platform that supports
the network. It provides the stable and reliable...
Sunday, December 4, 2016
Class Activity – Draw Your Concept of the Internet Now
Draw Your Concept of the Internet Now
In this activity, you will use the knowledge you have
acquired throughout Chapter 1, and the modeling activity document that
you prepared at the beginning of this chapter. You may also refer to the
other activities completed in this chapter, including Packet Tracer
activities.
Draw a map of the Internet as you see it now. Use the icons
presented in the chapter for media, end devices, and intermediary
devices.
In your revised drawing, you may wish to include some of the following:
WANs...
Thursday, December 1, 2016
CCNA
As the use of these integrated, expanding networks
increase, so does the need for training for individuals who implement
and manage network solutions. This training must begin with the routing
and switching foundation. Achieving Cisco Certified Network Associate
(CCNA) certification is the first step in helping an individual prepare
for a career in networking.
CCNA certification validates an individual’s ability to
install, configure, operate, and troubleshoot medium-size route and
switched networks, including implementation and verification of
connections to remote sites in a WAN. CCNA curriculum...
Wednesday, November 30, 2016
Security Solutions
No single solution can protect the network from the variety
of threats that exist. For this reason, security should be implemented
in multiple layers, using more than one security solution. If one
security component fails to identify and protect the network, others
still stand.
A home network security implementation is usually rather
basic. It is generally implemented on the connecting end devices, as
well as at the point of connection to the Internet, and can even rely on
contracted services from the ISP.
In contrast, the network security implementation for a
corporate network...
Security Threats
Network security is an integral part of computer
networking, regardless of whether the network is limited to a home
environment with a single connection to the Internet or as large as a
corporation with thousands of users. The network security that is
implemented must take into account the environment, as well as the tools
and requirements of the network. It must be able to secure data while
still allowing for the quality of service that is expected of the
network.
Securing a network involves protocols, technologies,
devices, tools, and techniques to secure data and mitigate threats.
Threat vectors...
Wireless Broadband
Connecting to the Internet is vital in smart home
technology. DSL and cable are common technologies used to connect homes
and small businesses to the Internet. However, wireless may be another
option in many areas.
Wireless Internet Service Provider (WISP)
Wireless Internet Service Provider (WISP) is an ISP that
connects subscribers to a designated access point or hot spot using
similar wireless technologies found in home wireless local area networks
(WLANs). WISPs are more commonly found in rural environments where DSL
or cable services are not available....
Sunday, November 20, 2016
Technology Trends in the Home
Networking trends are not only affecting the way we communicate at work and at school, they are also changing just about every aspect of the home. The newest home trends include ‘smart home technology’. Smart home technology is technology that is integrated into every-day appliances allowing them to interconnect with other devices, making them more ‘smart’ or automated. For example, imagine being able to prepare a dish and place it in the oven for cooking prior to leaving the house for the day. Imagine if the oven was ‘aware’ of the dish it was cooking and was connected to your ‘calendar of events’ so that...
Cloud Computing
Cloud computing is another global trend changing the way we access and store data. Cloud computing allows us to store personal files, even backup our entire hard disk drive on servers over the Internet. Applications such as word processing and photo editing can be accessed using the Cloud. For businesses, Cloud computing extends IT's capabilities without requiring investment in new infrastructure, training new personnel, or licensing new software. These services are available on demand and delivered economically to any device anywhere in the world without compromising security or function. ...
Video Communication
Another trend in networking that is critical to the communication and collaboration effort is video. Video is being used for communications, collaboration, and entertainment. Video calls can be made to and from anywhere with an Internet connection. Video conferencing is a powerful tool for communicating with others at a distance, both locally and globally. Video is becoming a critical requirement for effective collaboration as organizations extend across geographic and cultural boundaries. Click Play in the figure to view how TelePresence can be incorporated into everyday life and business. ...
Online Collaboration
Individuals want to connect to the network, not only for access to data applications, but also to collaborate with one another. Collaboration is defined as “the act of working with another or others on a joint project.” Collaboration tools, like Cisco WebEx shown in the figure, give employees, students, teachers, customers, and partners a way to instantly connect, interact, and achieve their objectives. For businesses, collaboration is a critical and strategic priority that organizations are using to remain competitive. Collaboration is also a priority in education. Students need to collaborate to assist...
Bring Your Own Device
The concept of any device, to any content, in any manner, is a major global trend that requires significant changes to the way devices are used. This trend is known as Bring Your Own Device (BYOD). BYOD is about end users having the freedom to use personal tools to access information and communicate across a business or campus network. With the growth of consumer devices, and the related drop in cost, employees and students can be expected to have some of the most advanced computing and networking tools for personal use. These personal tools include laptops, netbooks, tablets, smartphones, and e-readers....
New Trends
As new technologies and end user devices come to market, businesses and consumers must continue to adjust to this ever-changing environment. The role of the network is transforming to enable the connections between people, devices, and information. There are several new networking trends that will effect organizations and consumers. Some of the top trends include: Bring Your Own Device (BYOD)Online collaborationVideo communicationsCloud comput...
Security
The network infrastructure, services, and the data contained on network-attached devices are crucial personal and business assets. There are two types of network security concerns that must be addressed: network infrastructure security and information security. Securing a network infrastructure includes the physical securing of devices that provide network connectivity, and preventing unauthorized access to the management software that resides on them, as shown in Figure 1. Information security refers to protecting the information contained within the packets being transmitted over the...
Quality of Service
Quality of Service (QoS) is also an ever increasing requirement of networks today. New applications available to users over internetworks, such as voice and live video transmissions, create higher expectations for the quality of the delivered services. Have you ever tried to watch a video with constant breaks and pauses? As data, voice, and video content continue to converge onto the same network, QoS becomes a primary mechanism for managing congestion and ensuring reliable delivery of content to all users. Congestion occurs when the demand for bandwidth exceeds the amount available. Network bandwidth is...
Scalability
A scalable network can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users. The figure shows how a new network can be easily added to an existing network. In addition, networks are scalable because the designers follow accepted standards and protocols. This allows software and hardware vendors to focus on improving products and services without worrying about designing a new set of rules for operating within the network. To learn more about scalability as a requirement for reliable networks, refer to the Appendix for this...
Fault Tolerance
The expectation is that the Internet is always available to the millions of users who rely on it. This requires a network architecture that is built to be fault tolerant. A fault tolerant network is one that limits the impact of a failure, so that the fewest number of devices are affected. It is also built in a way that allows quick recovery when such a failure occurs. These networks depend on multiple paths between the source and destination of a message. If one path fails, the messages can be instantly sent over a different link. Having multiple paths to a destination is known as redundancy. One way reliable...
Network Architecture
Networks must support a wide range of applications and services, as well as operate over many different types of cables and devices, which make up the physical infrastructure. The term network architecture, in this context, refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network. As networks evolve, we are discovering that there are four basic characteristics that the underlying architectures need to address in order to meet user expectations: Fault Tolerance ScalabilityQuality of Service (QoS) Secur...
Lab – Researching Converged Network Services
In this lab, you will complete the following objectives: Part 1: Survey Your Understanding of Convergence Part 2: Research ISPs Offering Converged Services Part 3: Research Local ISPs Offering Converged Services Part 4: Select Best Local ISP Converged Service Part 5: Research Local Company or Public Institution Using Convergence TechnologiesLab - Researching Converged Network Services . ...
The Converging Network
Today, the separate data, telephone, and video networks are converging. Unlike dedicated networks, converged networks are capable of delivering data, voice, and video between many different types of devices over the same network infrastructure, as shown in the figure. This network infrastructure uses the same set of rules, agreements, and implementation standar...
Traditional Separate Networks
Consider a school built thirty years ago. Back then, some classrooms were cabled for the data network, telephone network, and video network for televisions. These separate networks could not communicate with each other, as shown in the figure. Each network used different technologies to carry the communication signal. Each network had its own set of rules and standards to ensure successful communicati...
Packet Tracer - Network Representation
In this activity, you will explore how Packet Tracer serves as a modeling tool for network representations. Packet Tracer - Network Representation Instructions Packet Tracer - Network Representation - PKA ...
Packet Tracer - Help and Navigation Tips
Packet Tracer is a fun, take-home, flexible software program which will help you with your Cisco Certified Network Associate (CCNA) studies. Packet Tracer allows you to experiment with network behavior, build network models, and ask "what if" questions. In this activity, you will explore a relatively complex network that highlights a few of Packet Tracer’s features. While doing so, you will learn how to access Help and the tutorials. You will also learn how to switch between various modes and workspaces. Packet Tracer – Help and Navigation Tips Instructions Packet Tracer...
Businesses Internet Connections
Corporate connection options differ from home user options. Businesses may require higher bandwidth, dedicated bandwidth, and managed services. Connection options available differ depending on the type of service providers located nearby. The figure illustrates common connection options for businesses: Dedicated Leased Line - Leased lines are actually reserved circuits within the service provider’s network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be...
Home and Small Office Internet Connections
The figure illustrates common connection options for small office and home office users: Cable - Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet. DSL - Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the...
Internet Access Technologies
There are many different ways to connect users and organizations to the Internet. Home users, teleworkers (remote workers), and small offices typically require a connection to an Internet Service Provider (ISP) to access the Internet. Connection options vary greatly between ISP and geographical location. However, popular choices include broadband cable, broadband digital subscriber line (DSL), wireless WANs, and mobile services. Organizations typically require access to other corporate sites and the Internet. Fast connections are required to support business services including IP phones,...
Intranets and Extranets
There are two other terms which are similar to the term Internet:IntranetExtranetIntranet is a term often used to refer to a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the organization's members, employees, or others with authorization.An organization may use an extranet to provide secure and safe access to individuals who work for a different organization, but require access to the organization’s data. Examples of extranets include:A company that is providing access to outside suppliers and contractors.A hospital that is providing a booking system to doctors so they can...
Tuesday, September 20, 2016
The Internet
The Internet is a worldwide collection of interconnected networks (internetworks or internet for short). The figure shows one way to view the Internet as a collection of interconnected LANs and WANs. Some of the LAN examples are connected to each other through a WAN connection. WANs are then connected to each other. The red WAN connection lines represent all the varieties of ways we connect networks. WANs can connect through copper wires, fiber optic cables, and wireless transmissions (not shown). The Internet is not owned by any individual or group. Ensuring effective communication across this diverse infrastructure...
Wide Area Networks
WANs are a network infrastructure that spans a wide geographical area. WANs are typically managed by service providers (SP) or Internet Service Providers (ISP). Specific features of WANs include: WANs interconnect LANs over wide geographical areas such as between cities, states, provinces, countries, or continents.WANs are usually administered by multiple service providers.WANs typically provide slower speed links between LA...
Local Area Networks
LANs are a network infrastructure that spans a small geographical area. Specific features of LANs include: LANs interconnect end devices in a limited area such as a home, school, office building, or campus.A LAN is usually administered by a single organization or individual. The administrative control that governs the security and access control policies are enforced on the network level.LANs provide high speed bandwidth to internal end devices and intermediary devic...