< All Cisco CCNA Notes

sushmi.J | Cisco CCNA | Module 4 - Layer 3 Network

By: sushmi.J | Related Course: Cisco CCNA | Published: June 20, 2016 | Modified: June 21, 2016
Join Cybrary

NotepadARC

ARP(address reolution protocol)

packet at layer 3 looks like. dest.ip,source.ip,data,FCS

if host one wants to ping host 2 the

host 1 need to create a ethernet link to send a data over host 2. as host 1 dont know host 2 MAC address so it sends a broadcast saying whoever has the IP 10.101.10.2 the pls send the MAC address.the host 2 replyies with its mac address which is unicast transformation.ARC basically resolves MAC address and stores in the table.host 1 encapsulate the ip address in the frame in data field where the packet is present.host 2 decapsulates it.

 


Notepadbringing up serial connections

serial point to point link

routers are seldom connected back to back using CSUDSU will connecct to cloud

functions of CSUDSU:

1)clocking(physical bit transfer rate)

2)a data connecting equipment device

sh ip interfacebrief command has

methos-layer 1

protocol-layer 2

down down means-layer 1 issue

up up -layer 2 issue(it becos no keepaline,mismatch encapsulation,no clock rate set on DCE end)

 

 

 

 

 


Notepaddata transfer example .

router 1 eg:150/101.45.0/29

show interface fastethernet 0/0

test connection

ping 150.101.45.7 which is broadcast .so it should go to everybody

show ip interface brief

config t

interface fastethernet 0/0

to assign an ip add

ip address 150.101.45.1   255.255.255.248

shutdown

no shutdown

do show ip interface brief

u ll see ”up ,UP

do wr (to save)

router 2

no ip domain look

host r2

line console 0

loog synch

no exec-timeout

int f0/0

id address 150.101.45.2 255.255.255.248..

router 3

do the same

go to router 1

using ping

ping 150.101.45.2 ,.3,.4

the first ping failed becos it is doing ARP address.

show ip arp

clear arp-cache

debug ip icmp

 

 

 

 

 

 


Notepadexmaple problems

150.101.45.0/30

ans-255.255.255.252

150.101.64.0/19

ans-255.255.224.0

150.101.0.0/19

150.101.64.0/19

150.101.94.0/19


Notepadlayer 3

controlls communication between broadcast domain.if u want to go to one broadcast domain to another u need network layer

need a router to connect.

device works at layer 3 is router

funtion is sending data

protocol unit is packet for layer 3

address are used is IP address

ip address is 32 bit in length,written in 4 field of 8 bits each seperating a dor (dotted decimal format)

x.x.x.x-32 bit

each x is 8 bit

one x: can vary from 0-255

eg.10.0.128.50

Class full IP addressing(old method):

first octect-1-126(ie the first x)

    the subnet mask no.sjould be 255 0 0 0

    CIDAR= /8( no of bits on in subnet mask)

Second octect-128-191

   subnet mask -255 255 0 0

   cidar notation-/16

example-150.101.45.45/16

octect 3-192-223

   subnet mask-255.255.255.0

   CIDAR-/24

eg:200.0.0.30/24

octect 4=224-239(multitasking)

octect 5=240-255(experimental)

no.127.0.0.0 is reserved for testing

127.0.0.1 is called the local loop back(if u can reach the address or test for this address then that means the TCP/IP protocol is properly installed)

 

 

 


Notepadproblem solving.

The new method :Classless IP Addressing.

how can i get 30 i address for a company

 


Notepadsubneting

Subnet mak:

ip address has network portion and host portion.the subnet mask separates both .

example:ip->200.10.10.0

               MASK->255.255.255.0(1,2,4,8,16,32,64,1280

If a corresponding  bit in MASK is ON (ie)1 then it belongs to network. And if it is OFF then it belongs to host.

the netowrk address

the host address

the first valid address eg.10.0.0.1. (10.0.0.2,….10.0.1.255)

the last valid address eg-10.255.255.254

the broadcast -eg.10.255.255.255

 


< All Cisco CCNA Notes
Join Cybrary

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel