1. Cisco Network Support Certifications 2. Networking Terms 3. INTRODUCTION TO NETWORKING 4. TYPES OF NETWORK 5. The Development of the Internet 6. NETWORK ARCHITECTURE 7. TOPOLOGY 8. BUS TOPOLOGY 9. RING TOPOLOGY 10. STAR TOPOLOGY 11. MESH TOPOLOGY 12. HYBRID TOPOLOGY 13. Speed of Networking device 14. NETWORK DEVICES 15. Exploring Wireless Network 16. REPEATERS 17. HUB 18. SWITCH 19. BRIDGE 20. ROUTERS 21. TRANSMISSION Telecommunication 22. Difference between Full Duplex, Half Duplex and Simplex 23. IP-ADDRESSING and IPV4 24. IPv4 address classes 25. IPV6 [ Internet Protocol Version 6 ] 26. SPEED OF VARIOUS DEVICES 27. Network Security 28. Some basic suggestion and steps to prevent Attacks and Network security 29. OSI model 30. UPPER and LOWER Layer 31. Application Layer (Layer 7) 32. Presentation Layer (Layer 6) 33. Session Layer (Layer 5) 34. Transport Layer (Layer 4) 35. Network Layer (Layer 3) 36. Data Link Layer 2 37. Physical Layer 1 38. TCP/IP The DoD Model 39. ROUTED PROTOCOL 40. Ports and Application 41. Important Application, Protocol and Port Number 42. Router Function 43. Types of Routing Protocols 44. STARTING ROUTER 45. CISCO IOS 46. Logging in to the Router 47. CISCO Router IOS commands List 48. Setting time and date of router 49. Router configuration commands 50. Optimizing Switch and Router 51. Understanding Router Terms 52. ROUTER SECURITY 53. Configuring CISCO SWITCH Security Policy 54. IMPLEMENTING STATIC ROUTING 55. UNDERSTANDING THE NEED FOR NAT 56. WAN Connections 57. Access List [ACL] 58. VLAN [Virtual Local Area Network] 59. SPANNING TREE :- BROADCAST STORM 60. Lab 1 Setting up a Serial Interface 61. Lab 2 : IP Addressing 62. Lab 3 Static Routes 63. Lab 4 Default Routes 64. Lab 5 RIP Routes 65. Lab 6 IGRP Routes 66. Lab 7 EIGRP Routes 67. Lab 8 OSPF Routes 68. Lab 9 CHAP and RIP 69. Lab 10 Standard Access-Lists with RIP 70. Lab 11 Extended Access-Lists with RIP 71. Lab 12 Static NAT 72. Lab 13 Many to One NAT 73. Lab 14 NAT Pool 74. Lab 15 ( 2950 Trunk ) 75. Lab 16 ( 2950 Trunk Dynamic ) 76. Lab 17 (2950 VLANs) 77. Lab 18 ( 2950 Deleting VLANs ) 78. Lab 19 ( 2950 VTP ) 79. Lab 20 ( 2950 VTP w/ client ) 80. Lab 21 ( 2950 Telnet )
Pr.Pg Next Pg


  • Routers can also be used to interconnect different types of network such as Token Ring and Ethernet networks. In such case Router changes the packetís size and format to fit the type of destination network on which the packets is being sent. Routed Protocol is that LAN protocol that can be transmitted to other network by way of Router. For e.g. IP, AppleTalk, DECnet and SPX.

  • TCP / IP [DOD] Protocol Suite




FTP [File Transfer Protocol]


TFTP [Trivial File Transfer Protocol]


SMTP [Simple Mail Transfer Protocol]


TELNET [Terminal Emulation]


SNMP [Simple Network Management Protocol]


DHCP [Dynamic Host Configuration Protocol]


DNS [Domain Name Service]


HOST to Host

TCP [Transmission Control Protocol]


UDP [User Datagram Protocol]


IP Internet Protocol


ICMP Internet Control Message Protocol


ARP Address Resolution Protocol


RARP Reverse Address Resolution Protocol








  • It allows a user on remote client machine, called the Telnet Client, to access the resource of another machine (Telnet Server). On client it gives text mode type menus that give users the opportunity to choose option and access the applications on server. User begins a Telnet session by running Windows :- Hyper Terminal Option.



  • File Transfer Protocol helps to transfer files. FTP isnít just a protocol, itís also a program. Operating as a protocol, FTP is used by applications to Upload / Download files on Web or FTP Server. It allows to access directories and files, users are subjected to authenticate on server via login password.



  • Trivial File Transfer Protocol is the stripped down version of FTP. It is UDP based protocol that can transfer configuration files and Cisco IOS software images between systems.



  • Simple Mail Transfer Protocol uses a spooled or queued method of mail delivery. One a mail has been sent to destination from any pc, the mail is spooled to another PC usually SMTP server. The software at server keeps a vigil and regular check for mail from all connected SMTP client computers. All the mails are stored and delivered to respective destination from single SMTP server. SMTP is used to send mail while POP3 is used to receive mail.



  • Simple Network Management Protocol collects and manipulates valuable network information. It gathers data by polling the devices on the network from management station at fixed or random intervals, requiring them to disclose certain information. When all is well SNMP receives something called BASELINE. BASELINE is a report delimiting the operational traits of a healthy network. This protocol can also stand as a watchdog over the network. It quickly notify manager for any sudden turn of event. These network watchdogs are called Agents and when any abnormal activities are occurred, agent send alter called a trap to the management station. Most software house, corporate and IT firms keep vigil through SNMP.



  • Domain Name Service resolves hostnames to IP address. DNS was designed to make our lives easier. Think about this: if you need to remember the IP address of all the websites that you visit, it will be very difficult to remember the IP addresses of thousands of Web sites. DNS resolves the FQDN [Fully Qualified Domain name to IP Address and vice-versa. So when one type FQDN for e.g. in any web browser, DNS can locate IP address based on its FQDN name and you can communicate easily.



  • Dynamic Host Configuration Protocol assigns IP addresses to hosts. It allows easier administration and works well in small to large network environments. Most hardware can be used as a DHCP server, including Cisco Router. On DHCP server one specify SCOPE i.e. range of IP address to assign, Exclude. Depending upon scope host connected will get IP Address, Subnet mask etc. DHCP uses a four-step process to lease IP addressing information to DCHP clients. This process is referred to as DORA: Discovery, Offer, Request, and Acknowledgment.



  • Internet Protocol is essential for Internet layer. All other protocols found here merely exist to support it. We are aware that all interconnected network work only because networks have software and logical address called IP address. IP looks at each packetís address, then using a routing table it decides where a packets is to be sent next, choosing the best path. IP receives segments from Host-to-Host layer and fragments them into datagrams (Packets) if necessary. On receiving side IP then reassembles datagrams back into segments.



  • Internet Control Message Protocol works at the network layer and is used by IP for many different services. ICMP is a management protocol and messaging service provider for IP. It provides information to host about network problem. For e.g. if a router canít send an IP datagram (packets) any further, it uses ICMP to send a message back to the sender, advising it of the situation.



  • Address Resolution Protocol finds the hardware address of a host from a known IP address. When IP has a datagram to send, it must inform a Network Access Protocol, such as Ethernet or Token Ring, of the destinationís hardware address on local network. If IP doesnít find the destination hostís hardware address in ARP cache, it uses ARP to find destination IP address. ARP interrogates the local network by sending out a broadcast asking the computers with the specified IP address to reply with its hardware address.



  • Reverse Address Resolution Protocol When a computer happens to be a disk-less, it has no way of knowing and storing IP address. But it does know its MAC (Media Access Control) address. RARP send MAC address and request for IP address to RARP server, which in turns responds with IP address and resolve the MAC to IP identity. In short RARP resolves Ethernet MAC addresses to IP addresses.

Pr.Pg border                                              Next Pg