Vt Ccna Report

29
Company Overview Overall Evaluation SWOT Recommendation Conclusion References

Transcript of Vt Ccna Report

Page 1: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 1/29

Company Overview

Overall Evaluation

SWOT

Recommendation

Conclusion

References

Page 2: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 2/29

Company Overview

About the Company – Matrix Technology Pvt.Ltd.

Matrix Technology has large group of network integrators coming fromdifferent backgrounds. We are able to balance network development efforts andproject durations to your need for the business. Matrix Technology also works in thearea of product development and software maintenance and independent softwaretesting with a local project management team.

Matrix Technology is a Network Integration company started with an idea toenhance, promote and provide various Business Enterprise Solutions to businessesworldwide.

Matrix Technology delivers high quality software and customized e-businesssolutions that reflects the in depth knowledge and understanding of emergingtechnologies in today's fast growing competitive world. Our team comprises of people who have a passion for their area of work and believe in bringing the best fortheir company's clients.

Matrix Technology also serves software consultancy and any type of technicalassistance for your organizations. Matrix Technology Pvt. Ltd. promising you for off shoring works. We are dedicated to our work. Our motive is to create HighLandmark in Network Industries with our work as early as possible.

We undertake every aspect of your project, requirements management,product design and architecture, programming and development, quality assurance,documentation preparation, technical support, and maintenance. We ensure toguarantee the secure management of your trade secrets, source codes, copyrightsand any information involved in the product development.

Page 3: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 3/29

Overall Evaluation

Network Formation

Hardware Elements of the Network

Unless the computers that are connected know they are connected and agree

on a common means of communication and what resources are to be shared, they

can't work together. Networking software is just as important as networking

hardware because it establishes the logical connections that make the physical

connections work.

At a minimum, each network requires the following:

Physical (cable), or wireless (infrared [IRDA] or radio-frequency) connections

between computers.

Network devices like switches or routers to connect all the computers.

A common set of communications rules, known as a Network Protocol.

Software that enables resources to be shared with other PCs and controls

access to shared resources, known as a Network Operating System.

Resources that can be shared, such as printers, disk drives, and CD-ROMs.

Software that enables computers to access other computers with shared

resources, known as a Network Client.

These rules apply to the simplest and most powerful networks, and all the

ones in between, regardless of their nature.

Network Interface Card

On most of the computers, the network interface adapters takes the form of a

network interface card (NIC) that fits into a PCI slots on a desktop computer or a PC

card (PCMCIA) slot on a notebook computer. Although network cards for older

systems might use the ISA or EISA slot standard, these don’t support high speed

network standards and are obsolete. Many recent systems incorporate the network

Page 4: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 4/29

interface adapters onto the motherboard, but this practice is more commonly found

in workstation and portable computers and rarely in serves because most network

administrators prefer to select their own NICs.

Network Adapter Connectors

Ethernet adapters typically have a connector that looks like a large

telephone jack called an RJ-45 (for 10-BASE-T and Fast Ethernet twisted pair cables),

or a D-shaped 15-pin connectors called a DB15 (for thick net coaxial cables). A few

older 10 Mbps adapters have a combination of two or all three of these connector

types; adapters with two or more connectors are referred to as combo adapters.

Token-Ring adapters can have a 9-pin connector called a DB9 (for type 1 STP cable)

or sometimes an RJ-45 jack (for type three UTP cable).

Page 5: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 5/29

RJ-45

Virtually standard and 10/100 Ethernet NICs made the client-PC on the use

market today are designed to support unshielded twisted-pair (UTP) cable

exclusively; Gigabit Ethernet cards made for wire (not fiber-optic) networks also useonly UTP cables.

Installing and Configuring Network Cards

If we are removing another card to insert the new one, we need to follow the

following steps:

1. Make sure the card is disconnected from any outside cables.

2. Unscrew the small screw attaching the card to the PC case, and lay it aside.3. Pull gently on the card, using both hands to wiggle it back and forth slightly

to disengage it from the connectors. This may take a little tugging, but if the

card does not come fairly easily, stop and make sure that the card is indeed

fully disconnected from the PC.

4. After we pull the card out, we set it aside. Wrap it back up in its original

sheath if we have kept it and plan to use the card again. We should never

touch the gold, connector on the card; the oils in our skin can corrode the

gold and thus reduce the cards connectivity

Installing a card is much the same process, in reverse:

1. Unwrap the card, being careful not to touch the gold connectors, and set it

aside.

2. Power down the PC, and open it up.

3. Find an open slot on the motherboard. It will most probably be an open

Peripheral Component Interconnect (PCI) slot.

4. Unscrew the plate that covered the open slot’s opening to the rear of the

computer, and set the plate and screw aside. We may need the plate later,

and we will need the screw in just a minute.

5. Align the network card with the slot in the PC and push gently but firmly to

seat the card in its slot. We may need to push fairly hard for this to work,

Page 6: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 6/29

which can be somewhat intimidating if we are not used to inserting the cards.

If we have the right slot and push straight in, then the card should snap its

place.

6. Using the screw that we set aside in step 4, screw the card into the little hole

in the case to hold it in place. If the card is in all the way, this extra step will

not affect the card’s positioning all that much, but it will keep it from sagging

or working loose.

7. Replace the card and if the cables are already in place, connect them to card.

Installing Network Adapter Cards

Network Cables

Originally, all networks used some type of cable to connect the computers on

the network to each other. Although various types of wireless networks are now on

the market, most office and home networks are still based on one of the followingwired topologies:

Coaxial cable

Twisted-pair cabling

Fiber optic cable.

Page 7: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 7/29

Thick and Thin Ethernet Coaxial Cable

The first versions of Ethernet were based on coaxial cable. The original form

of Ethernet, 10BASE-5, used a thick coaxial cable (called Thicknet) that was not

directly attached to the NIC. A device called an attachment unit interface (AUI) ran

from a DB15 connector on the rear of the NIC to the cable. The cable had a hole

drilled into it to allow the "vampire tap" to be connected to the cable. NICs designed

for use with thick Ethernet cable are almost impossible to find as new hardware

today.

10BASE-2 Ethernet cards use a BNC (Bayonet-Neill-Councilmen) connector on

the rear of the NIC. Although the thin coaxial cable (called Thinnet or RG-58) used

with 10BASE-2 Ethernet has a bayonet connector that can physically attach to the

BNC connector on the card, this configuration is incorrect and won't work. Instead, aBNC T-connector attaches to the rear of the card, allowing a thin Ethernet cable to

be connected to either both ends of the T (for a computer in the middle of the

network) or to one end only (for a computer at the end of the network). A 50-ohm

terminator is connected to the other arm of the T to indicate the end of the network

and prevent erroneous signals from being sent to other clients on the network.

Page 8: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 8/29

Some early Ethernet cards were designed to handle thick (AUI/DB15), thin (RG-58),

and UTP (RJ-45) cables. Combo cards with both BNC and RJ-45 connectors are still

available but can run at only standard Ethernet speeds.

Advantages of Coaxial CablesIt has higher bandwidth and excellent noise immunity.

These are relatively cheap as compared to fiber optic cables and easy to use.

Disadvantage of Coaxial CablesIf any part of cable is damaged then the entire network will be shut down.

Twisted-Pair Cable

Twisted-pair cable is just what its name implies: insulated wires within a

protective casing with a specified number of twists per foot. Twisting the wires

reduces the effect of electromagnetic interference (that can be generated by

nearby cables, electric motors, and fluorescent lighting) on the signals being

transmitted. Shielded twisted pair (STP) refers to the amount of insulation around

the cluster of wires and therefore its immunity to noise. You are probably familiar

with unshielded twisted-pair (UTP) cable; it is often used for telephone wiring.

Most Ethernet and Fast Ethernet installations that use twisted-pair cabling

use UTP because the physical flexibility and small size of the cable and connectors

makes routing it very easy. However, its lack of electrical insulation can make

interference from fluorescent lighting, elevators, and alarm systems (among other

devices) a major problem. If you use UTP in installations where interference can be

a problem, you need to route the cable away from the interference, use an external

shield, or substitute STP for UTP near interference sources.

Page 9: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 9/29

Fiber Optic Cable

Fiber cable is the ideal cable for data tram mission. Not only does this type of

cable accommodate extremely high bandwidths, but it also presents no problems

with EMI and supports durable cables and cable runs as long as several K.M.

Page 10: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 10/29

The center conductor of a fiber optic cable is a fiber consists of highly refined

glass or plastic designed to transmit light signals with little loss. A glass core

supports a longer cabling distance, but a plastic core is typically easier to work with.

The fiber is coated with a cladding or a gel that reflects signals back into the fiber to

reduce signal loss a plastic sheath protects the fiber.

Advantages of Fiber Optic CableIt can handle much higher bandwidth than copper.

Fiber is not affected by power surges, electromagnetic interference, or power

failure.

Disadvantages of Fiber Optic CableIt is very costly.

Its installation is very difficult.

Hubs and Switches for Ethernet Networks

We know that most of the modern Ethernet workgroup networks are based on

UTP cable with workstations arranged in a star topology. The center of the star uses

a multi-port connecting device that can be either a hub or a switch. Although hubs

and switches can be used to connect the network-and can have several features in

common-the differences between them are also significant.

All Ethernet hubs and switches have the following features:

• Multiple RJ-45 UTP connectors

• Diagnostic and activity lights

• A power supply

Page 11: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 11/29

• Ethernet hubs and switches are made in two forms: managed and

unmanaged. Managed hubs and switches can be configured, enabled or

disabled, or monitored by a network operator and are commonly used on

corporate networks. Workgroup and home-office networks use less expensive

unmanaged hubs, which simply connect on the network.

The connection between each workstation and the hub or switch is the UTP

cable running from the RJ-45 jack on the rear of the NIC to the RJ-45 jack on the rear

of the hub or switch.

Signal lights on the front of the hub or switch indicate which connections are

in use by computers; switches also indicate whether a full-duplex connection is in

use. Multi-speed hubs and switches also indicate which connection speed is in use

on each port. A hub or switch must have at least one RJ-45 UTP connector for each

computer we want to connect to it.

Page 12: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 12/29

Cisco Router Configuration

There are several methods available for configuring Cisco routers. It can be

done over the network from a TFTP server. It can be done via menu interface

provided at bootup, and it can be done from the menu interface provided by using

the command setup. Under the training program we went through the IOS

command line interface for configuration.

The main reason for using the command-line interface instead of a menu

driven interface is speed. Once you have invested the time to learn the command-

line commands, you can perform many operations much more quickly than by using

a menu. This is basically true of all command-line vs. menu interfaces. What makes

it especially efficient to learn the command-line interface of the Cisco IOS is that itis standard across all Cisco routers

Initialization

Initially you will probably configure your router from a terminal. If the router

is already configured and at least one port is configured with an IP address, and it

has a physical connection to the network, you might be able to telnet to the routerand configure it across the network. If it is not already configured, then you will

have to directly connect to it with a terminal and a serial cable. With any Windows

box you can use Hyperterminal to easily connect to the router. Plug a serial cable

into a serial (COM) port on the PC and the other end into the console port on the

Cisco router. Start Hyperterminal, tell it which COM port to use and click OK. Set the

speed of the connection to 9600 baud and click OK. If the router is not on, turn it on.

If you wish to configure the router from a Linux box, either Seyon or Minicom

should work. At least one of them, and maybe both, will come with your Linux

distribution.

Often you will need to hit the Enter key to see the prompt from the router. If

it is unconfigured it will look like this:

Page 13: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 13/29

Router>

If it has been previously configured with a hostname, it will look like this:

hostname of router>

If you have just turned on the router, after it boots it will ask you if you wish

to begin initial configuration. Say no. If you say yes, it will put you in the menu

interface.

Modes

The Cisco IOS command-line interface is organized around the idea of modes.

You move in and out of several different modes while configuring a router, and

which mode you are in determines what commands you can use. Each mode has aset of commands available in that mode, and some of these commands are only

available in that mode. In any mode, typing a question mark will display a list of the

commands available in that mode.

Router>?

Unprivileged and Privileged ModeWhen you first connect to the router and provide the password (if necessary),

you enter EXEC mode, the first mode in which you can issue commands from the

command-line. From here you can use such unprivileged commands as ping, telnet,

and rlogin. You can also use some of the show commands to obtain information

about the system. In unprivileged mode you use commands like, show version to

display the version of the IOS the router is running. Typing show ? will diplay all the

show commands available in the mode you are presently in.

Router>show ?

You must enter privileged mode to configure the router. You do this by using

the command enable. Privileged mode will usually be password protected unless the

router is unconfigured. You have the option of not password protecting privileged

Page 14: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 14/29

mode, but it is HIGHLY recommended that you do. When you issue the command

enable and provide the password, you will enter privileged mode.

To help the user keep track of what mode they are in, the command-line

prompt changes each time you enter a different mode. When you switch from

unprivileged mode to privileged mode, the prompt changes from:

Router>

to

Router#

This would probably not be a big deal if there were just two modes. There

are, in fact, numerous modes, and this feature is probably indispensable. Pay closeattention to the prompt at all times.

Within privileged mode there are many sub-modes. In this document I do not

closely follow Cisco terminology for this hierarchy of modes. I think that my

explanation is clearer, frankly. Cisco describes two modes, unprivileged and

privileged, and then a hierarchy of commands used in privileged mode. I reason

that it is much clearer to understand if you just consider there to be many sub-

modes of privileged mode, which I will also call parent mode. Once you enter

privileged mode (parent mode) the prompt ends with a pound sign (#). There are

numerous modes you can enter only after entering privileged mode. Each of these

modes has a prompt of the form:

Router(arguments)#

They still all end with the pound sign. They are subsumed within privileged

mode. Many of these modes have sub-modes of their own. Once you enter priliged

mode, you have access to all the configuration information and options the IOS

provides, either directly from the parent mode, or from one of its submodes.

Page 15: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 15/29

Configuring the Router

If you have just turned on the router, it will be completely unconfigured. If it

is already configured, you may want to view its current configuration. Even if it has

not been previously configured, you should familiarize yourself with the show

commands before beginning to configure the router. Enter privileged mode by

issuing the command enable, then issue several show commands to see what they

display. Remember, the command show ? will display all the showcommands

aavailable in the current mode. Definately try out the following commands:

Router#show interfaces

Router#show ip protocols

Router#show ip route

Router#show ip arp

When you enter privileged mode by using the command enable, you are in

the top-level mode of privileged mode, also known in this document as "parent

mode." It is in this top-level or parent mode that you can display most of the

information about the router. As you now know, you do this with the show

commands. Here you can learn the configuration of interfaces and whether they are

up or down. You can display what IP protocols are in use, such as dynamic routing

protocols. You can view the route and ARP tables, and these are just a few of the

more important options.

As you configure the router, you will enter various sub-modes to set options,

then return to the parent mode to display the results of your commands. You also

return to the parent mode to enter other sub-modes. To return to the parent mode,

you hit ctrl-z. This puts any commands you have just issued into effect, and returns

you to parent mode.

Page 16: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 16/29

Global configuration (config)

To configure any feature of the router, you must enter configuration mode.

This is the first sub-mode of the parent mode. In the parent mode, you issue the

command config.

Router#config terminal

Router(config)#

As demonstrated above, the prompt changes to indicate the mode that you

are now in.

In connfiguration mode you can set options that apply system-wide, also

refered to as "global configurations." For instance, it is a good idea to name yourrouter so that you can easily identify it. You do this in configuration mode with the

hostname command.

Router(config)#hostname ExampleName

ExampleName(config)#

As demonstrated above, when you set the name of the host with the

hostname command, the prompt immediately changes by replacing Router with

ExampleName. (Note: It is a good idea to name your routers with an organized

naming scheme.)

Another useful command issued from config mode is the command to

designate the DNS server to be used by the router:

ExampleName(config)#ip name-server aa.bb.cc.dd

ExampleName(config)#ctrl-Z

ExampleName#

This is also where you set the password for privileged mode.

ExampleName(config)#enable secret examplepassword

ExampleName(config)#ctrl-Z

Page 17: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 17/29

ExampleName#

Until you hit ctrl-Z (or type exit until you reach parent mode) your command

has not been put into effect. You can enter config mode, issue several different

commands, then hit ctrl-Z to activate them all. Each time you hit ctrl-Z you return to

parent mode and the prompt:

ExampleName#

Here you use show commands to verify the results of the commands you

issued in config mode. To verify the results of the ip name-server command, issue

the command show host.

Configuring the interfaces

Cisco interface naming is straightforward. Individual interfaces are referred to

by this convention:

media type slot#/port#

"Media type" refers to the type of media that the port is an interface for, such

as Ethernet, Token Ring, FDDI, serial, etc. Slot numbers are only applicable for

routers that provide slots into which you can install modules. These modules

contain several ports for a given media. The 7200 series is an example. These

modules are even hot-swapable. You can remove a module from a slot and replace

it with a different module, without interrupting service provided by the other

modules installed in the router. These slots are numbered on the router.

Port number refers to the port in reference to the other ports in that module.

Numbering is left-to-right, and all numbering starts at 0, not at one.

For example, a Cisco 7206 is a 7200 series router with six slots. To refer to an

interface that is the third port of an Ethernet module installed in the sixth slot, it

would be interface ethernet 6/2. Therefor, to display the configuration of that

interface you use the command:

ExampleName#show interface ethernet 6/2

Page 18: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 18/29

If your router does not have slots, like a 1600, then the interface name

consists only of:

media type port#

For example:

ExampleName#show interface serial 0

Here is an example of configuring a serial port with an IP address:

ExampleName#config

ExampleName(config)#interface serial 1/1

ExampleName(config-if)#ip address 192.168.155.2 255.255.255.0

ExampleName(config-if)#no shutdown

ExampleName(config-if)#ctrl-Z

ExampleName#

Then to verify configuration:

ExampleName#show interface serial 1/1

Note the no shutdown command. An interface may be correctly configured

and physically connected, yet be "administratively down." In this state it will not

function. The command for causing an interface to be administratively down is

shutdown.

ExampleName(config)#interface serial 1/1

ExampleName(config-if)#shutdown

ExampleName(config-if)#ctrl-Z

ExampleName#show interface serial 1/1

Page 19: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 19/29

In the Cisco IOS, the way to reverse or delete the results of any command is

to simply put no infront of it. For instance, if we wanted to unassign the IP address

we had assigned to interface serial 1/1:

ExampleName(config)#interface serial 1/1

ExampleName(config-if)#no ip address 192.168.155.2 255.255.255.0

ExampleName(config-if)ctrl-Z

ExampleName#show interface serial 1/1

Configuring most interfaces for LAN connections might consist only of

assigning a network layer address and making sure the interface is not

administratively shutdown. It is usually not necessary to stipulate data-link layerencapsulation.

Configuring Dynamic Routing

IP routing is automatically enabled on Cisco routers. If it has been previously

disabled on your router, you turn it back on in config mode with the command ip

routing.

ExampleName(config)#ip routing

ExampleName(config)#ctrl-Z

There are two main ways a router knows where to send packets. The

administrator can assign static routes, or the router can learn routes by employing a

dynamic routing protocol.

These days static routes are generally used in very simple networks or in

particular cases that necessitate their use. To create a static route, the

administrator tells the router operating system that any network traffic destined for

a specified network layer address should be forwarded to a similarly specified

network layer address. In the Cisco IOS this is done with the ip route command.

ExampleName#config

Page 20: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 20/29

ExampleName(config)#ip route 172.16.0.0 255.255.255.0 192.168.150.1

ExampleName(config)#ctrl-Z

ExampleName#show ip route

Two things to be said about this example; first, the packet destination

address must include the subnet mask for that destination network. Second, the

address it is to be forwarded to is the specified address of the next router along the

path to the destination.

Dynamic routing protocols, running on connected routers, enable those

routers to share routing information. This enables routers to learn the routes

available to them. The advantage of this method is that routers are able to adjust to

changes in network topologies. If a route is physically removed, or a neighbor router

goes down, the routing protocol searches for a new route. Routing protocols can

even dynamically choose between possible routes based on variables such as

network congestion or network reliability.

There are many different routing protocols, and they all use different

variables, known as "metrics," to decide upon appropriate routes. Unfortunately, a

router needs to be running the same routing protocols as its neighbors. Many

routers can, however, run multiple protocols.

Routing protocols are a complex topic and this document contains only this

superficial description of them. There is much to learn about them, and there are

many sources of information about them available.

This describes how to configure the Routing Information Protocol (RIP) on

Cisco routers. From the command-line, we must explicitly tell the router which

protocol to use, and what networks the protocol will route for.

ExampleName#config

ExampleName(config)#router rip

ExampleName(config-router)#network aa.bb.cc.dd

ExampleName(config-router)#network ee.ff.gg.hh

Page 21: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 21/29

ExampleName(config-router)#ctrl-Z

ExampleName#show ip protocols

Now when you issue the show ip protocols command, you should see an

entry describing RIP configuration.

Saving Cisco Router Configuration

Once you have configured routing on the router, and you have configured

individual interfaces, your router should be capable of routing traffic. Give it a few

moments to talk to its neighbors, then issue the commands show ip route and show

ip arp. There should now be entries in these tables learned from the routing

protocol.

If you turned the router off right now, and turned it on again, you would have

to start configuration over again. Your running configuration is not saved to any

permanent storage media. You can see this configuration with the command show

running-config.

ExampleName#show running-config

You do want to save your successful running configuration. Issue thecommand copy running-config startup-config.

ExampleName#copy running-config startup-config

Your configuration is now saved to non-volatile RAM (NVRAM). Issue the

command show startup-config.

ExampleName#show startup-config

Now any time you need to return your router to that configuration, issue the

command copy startup-config running-config.

ExampleName#copy startup-config running-config

Page 22: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 22/29

Troubleshooting Cisco router

Inevitably, there will be problems. Usually, it will come in the form of a user

notifying you that they cannot reach a certain destination or any destination at all.

You will need to be able to check how the router is attempting to route traffic, and

you must be able to track down the point of failure.

You are already familiar with the show commands, both specific commands

and how to learn what other show commands are available. Some of the most basic,

most useful commands you will use for troubleshooting are:

ExampleName#show interfaces

ExampleName#show ip protocols

ExampleName#show ip route

ExampleName#show ip arp

Testing Connectivity

It is very possible that the point of failure is not in your router configuration or

at your router at all. If you examine your router's configuration and operation and

everything looks good, the problem might be farther up the line. In fact, it may be

the line itself, or it could be another router, which may or may not be under your

administration.

One extremely useful and simple diagnostic tool is the ping command. Ping is

an implementation of the IP Message Control Protocol (ICMP). Ping sends an ICMP

echo request to a destination IP address. If the destination machine receives the

request, it responds with an ICMP echo response. This is a very simple exchange

that consists of:

Hello, are you alive? Yes, I am.

ExampleName#ping xx.xx.xx.xx

Page 23: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 23/29

If the ping test is successful, you know that the destination you are having

difficulty reaching is alive and physically reachable.

If there are routers between your router and the destination you are having

difficulty reaching, the problem might be at one of the other routers. Even if you

ping a router and it responds, it might have other interfaces that are down, its

routing table may be corrupted, or any number of other problems may exist.

To see where packets that leave your router for a particular destination go,

and how far, use the trace command.

ExampleName#trace xx.xx.xx.xx

It may take a few minutes for this utility to finish, so give it some time. It will

display a list of all the hops it makes on the way to the destination.

Table 7-1 ICMP Message Types

Message Description

DestinationUnreachable

Tells the source host that there is a problem delivering apacket.

Time Exceeded The time that it takes a packet to be delivered has expired,so the packet has been discarded.

Redirect The router sending this message has received a packet forwhich another router has a better route. The message tellsthe sender to use the better route.

Echo Request,Echo Reply

Used by the ping command to verify connectivity.

Page 24: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 24/29

Table 7-2 ICMP Unreachable Codes

Unreachable Code When It Is Used What TypicallySends It

Network unreachable There is no match in arouting table for thepacket’s destination.

Router

Host unreachable The packet can berouted to a routerconnected to thedestination subnet, butthe host is notresponding.

Router

Can’t fragment The packet has the

Don’t Fragment bit set,and a router mustfragment to forward thepacket.

Router

Protocol unreachable The packet is deliveredto the destination host,but the transport layerprotocol is not availableon that host.

Host

Port unreachable The packet is deliveredto the destination host,but the destination porthas not been opened byan application.

Host

Table 7-3 Codes That the ping Command Receives in Response to Its

ICMP Echo Request

ping CommandCode

Description

! ICMP Echo Reply received. Nothing was received before the ping command timed

outU ICMP unreachable (destination) receivedN ICMP unreachable (network/subnet) receivedM ICMP Can’t Fragment message received

Page 25: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 25/29

? Unknown packet received

Page 26: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 26/29

Table 7-4 Common Host Problem Symptoms and Typical

Reasons

Symptom Common Root Cause

The host can send packets to hosts in thesame subnet, but not to other subnets.

The host does not have a defaultgateway configured, or the defaultgateway IP address is incorrect.

The host can send packets to hosts in thesame subnet, but not to other subnets.

The host’s default gateway is in adifferent subnet than the host’s IPaddress (according to the host’sperception of the subnet).

Some hosts in a subnet can communicatewith hosts in other subnets, but otherscannot.

This may be caused by the defaultgateway (router) using a different maskthan the hosts. This may result in therouter’s connected route not includingsome of the hosts on the LAN.

Some hosts on the same VLAN can sendpackets to each other, but others cannot.

The hosts may not be using the samemask.

Page 27: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 27/29

SWOT

Strength

The whole network was secure via use of access list, and switches wereconfigured to be attached on a specific PC.

The router and the switches were secure by passwords, so that no one is able

to access other than administrator.

Weakness

The limitation was the number of connections that existed and were limited.

Opportunities

The connections could be increased via use of more port switches and even

the router could be changed to allow more number of network connections.

Threats

There was not any special threat we could detect.

Page 28: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 28/29

Recommendation

The company is though very stable in the kind of network infrastructure it

prepares, but it needs to look more into the security side of the devices.

The devices currently are placed in open space, for which a special room can

be provided so that they can be secure physically also.

Conclusion

The environment provided at the company was good. We were able tounderstand the whole network architecture that was laid.

Page 29: Vt Ccna Report

8/8/2019 Vt Ccna Report

http://slidepdf.com/reader/full/vt-ccna-report 29/29

References