SlideShare una empresa de Scribd logo
1 de 6
Copyright 2013 @tcpipguru.com
Copyright 2013 @tcpipguru.com
Preface
The Ebook explains the fundamental concepts of routing and switching with case
study and examples. Internal analysis of concepts and how routing and switching
technologies work in different conditions are understood. This book is
recommended for audience who would want to understand the internal working of
routing and switching technologies.
Copyright 2013 @tcpipguru.com
Table of Contents
What happens when an IP packet reaches a router
What is the use of subnet mask on a PC.
How does a PC know if the destination is residing on the same or different
network.
How does a PC send a packet to the gateway.
How is a packet forwarded on a router.
What happens when a frame arrives on a switch.
What happens when an IP packet reaches a switch port.
How does a PC1 on SW1 communicate with PC2 on SW2.
What happens if the destination is shutdown on a switch.
How is a broadcast frame interpreted by a switch.
How is an IP packet with unknown destination handled by a router.
How does a switch populate a cam table
How is broadcasting handled in a VLAN environment.
How does a switch handle a frame with source and destination mac-address as the
same value.
Why is the encapsulation type 802.1q provided with the vlan number when
intervlan routing is configured on a router.
How is flooding and broadcasting different from a switching perspective.
What is the difference between a layer 2 and layer 3 broadcast.
Copyright 2013 @tcpipguru.com
How does a router handle a packet with unknown destination address with two
default routes.
What happens when two frames arrive simultaneously on two different ports on a
switch.
When is a static route configured on a router.
What is required for intervlan communication.
How many broadcast domains are there on a 24 port switch and a 24 port hub
What is the difference between default route and default gateway.
How does routing work
Which connection would be used on a PC with two internet connections
What is gateway in networking
What is the Use of VLAN
How does STP prevent looping
How do Routers populate routing tables for directly connected interfaces
Copyright 2013 @tcpipguru.com
What happens when an IP packet reaches a router
In the above diagram, PC1 is configured with the IP address 192.168.1.2 and
subnet mask 255.255.255.0. The router is configured with the IP address
192.168.1.3 and subnet mask 255.255.255.0. When PC1 pings the IP address
of the router, the source IP address in the IP packet is 192.168.1.2 and the
destination IP address in the IP packet would be 192.168.1.3. The IP packet
is encapsulated in an ethernet frame, which would have the source mac-
address as that of PC1 and destination mac-address as that of the routers
interface configured with the IP address 192.168.1.3. When the packet
reaches the router, the router would look into the destination mac-address
inside the frame. After verification, the router would look into the
destination IP address inside the packet. It would then understand that the
packet is intended for itself, and would then process the upper layer of the
packet.
Copyright 2013 @tcpipguru.com
Buy the Ebook with PayPal
Price - $5
Click on the below link to BUY NOW with PayPal
http://www.e-junkie.com/211191/product/489940.php

Más contenido relacionado

Más de tcpipguru

How to configure Standard ACL for an ip address
How to configure Standard ACL for an ip addressHow to configure Standard ACL for an ip address
How to configure Standard ACL for an ip address
tcpipguru
 
How to configure Standard ACL for a network
How to configure Standard ACL  for a networkHow to configure Standard ACL  for a network
How to configure Standard ACL for a network
tcpipguru
 
Cisco Router Terms
Cisco Router TermsCisco Router Terms
Cisco Router Terms
tcpipguru
 
How to configure Rip version2 on a Cisco router
How to configure Rip version2 on a Cisco routerHow to configure Rip version2 on a Cisco router
How to configure Rip version2 on a Cisco router
tcpipguru
 
How to obtain ip address from a different network dhcp
How to obtain ip address from a different network dhcpHow to obtain ip address from a different network dhcp
How to obtain ip address from a different network dhcp
tcpipguru
 
How to configure Extended acl for an ip address
How to configure Extended acl for an ip addressHow to configure Extended acl for an ip address
How to configure Extended acl for an ip address
tcpipguru
 
How to configure Extended acl for a network
How to configure Extended acl for a networkHow to configure Extended acl for a network
How to configure Extended acl for a network
tcpipguru
 
How to configure EIGRP on a Cisco router
How to configure EIGRP on a Cisco routerHow to configure EIGRP on a Cisco router
How to configure EIGRP on a Cisco router
tcpipguru
 
How to configure Dynamic nat
How to configure Dynamic natHow to configure Dynamic nat
How to configure Dynamic nat
tcpipguru
 
How to configure DHCP Server
How to configure DHCP Server How to configure DHCP Server
How to configure DHCP Server
tcpipguru
 
How to configure Default Routing
How to configure Default RoutingHow to configure Default Routing
How to configure Default Routing
tcpipguru
 
How to configure SSH on Cisco switch
How to configure SSH on Cisco switchHow to configure SSH on Cisco switch
How to configure SSH on Cisco switch
tcpipguru
 
Configuring ssh on switch
Configuring ssh on switchConfiguring ssh on switch
Configuring ssh on switch
tcpipguru
 
How to Configure password for telnet and console port of a switch
How to Configure password for telnet and console port of a switchHow to Configure password for telnet and console port of a switch
How to Configure password for telnet and console port of a switch
tcpipguru
 
How to Configure ip address for router interfaces
How to Configure ip address for router interfacesHow to Configure ip address for router interfaces
How to Configure ip address for router interfaces
tcpipguru
 
How to create Security on Cisco switch
How to create Security on Cisco switchHow to create Security on Cisco switch
How to create Security on Cisco switch
tcpipguru
 
How to Save, backup and restore IOS on Cisco router
How to Save, backup and restore IOS on Cisco routerHow to Save, backup and restore IOS on Cisco router
How to Save, backup and restore IOS on Cisco router
tcpipguru
 
How to configure different Spanning tree port status
How to configure different Spanning tree port statusHow to configure different Spanning tree port status
How to configure different Spanning tree port status
tcpipguru
 

Más de tcpipguru (20)

Python programming course
Python programming coursePython programming course
Python programming course
 
Network security projects
Network security projectsNetwork security projects
Network security projects
 
How to configure Standard ACL for an ip address
How to configure Standard ACL for an ip addressHow to configure Standard ACL for an ip address
How to configure Standard ACL for an ip address
 
How to configure Standard ACL for a network
How to configure Standard ACL  for a networkHow to configure Standard ACL  for a network
How to configure Standard ACL for a network
 
Cisco Router Terms
Cisco Router TermsCisco Router Terms
Cisco Router Terms
 
How to configure Rip version2 on a Cisco router
How to configure Rip version2 on a Cisco routerHow to configure Rip version2 on a Cisco router
How to configure Rip version2 on a Cisco router
 
How to obtain ip address from a different network dhcp
How to obtain ip address from a different network dhcpHow to obtain ip address from a different network dhcp
How to obtain ip address from a different network dhcp
 
How to configure Extended acl for an ip address
How to configure Extended acl for an ip addressHow to configure Extended acl for an ip address
How to configure Extended acl for an ip address
 
How to configure Extended acl for a network
How to configure Extended acl for a networkHow to configure Extended acl for a network
How to configure Extended acl for a network
 
How to configure EIGRP on a Cisco router
How to configure EIGRP on a Cisco routerHow to configure EIGRP on a Cisco router
How to configure EIGRP on a Cisco router
 
How to configure Dynamic nat
How to configure Dynamic natHow to configure Dynamic nat
How to configure Dynamic nat
 
How to configure DHCP Server
How to configure DHCP Server How to configure DHCP Server
How to configure DHCP Server
 
How to configure Default Routing
How to configure Default RoutingHow to configure Default Routing
How to configure Default Routing
 
How to configure SSH on Cisco switch
How to configure SSH on Cisco switchHow to configure SSH on Cisco switch
How to configure SSH on Cisco switch
 
Configuring ssh on switch
Configuring ssh on switchConfiguring ssh on switch
Configuring ssh on switch
 
How to Configure password for telnet and console port of a switch
How to Configure password for telnet and console port of a switchHow to Configure password for telnet and console port of a switch
How to Configure password for telnet and console port of a switch
 
How to Configure ip address for router interfaces
How to Configure ip address for router interfacesHow to Configure ip address for router interfaces
How to Configure ip address for router interfaces
 
How to create Security on Cisco switch
How to create Security on Cisco switchHow to create Security on Cisco switch
How to create Security on Cisco switch
 
How to Save, backup and restore IOS on Cisco router
How to Save, backup and restore IOS on Cisco routerHow to Save, backup and restore IOS on Cisco router
How to Save, backup and restore IOS on Cisco router
 
How to configure different Spanning tree port status
How to configure different Spanning tree port statusHow to configure different Spanning tree port status
How to configure different Spanning tree port status
 

Último

“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Último (20)

Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 

Routing and Switching

  • 2. Copyright 2013 @tcpipguru.com Preface The Ebook explains the fundamental concepts of routing and switching with case study and examples. Internal analysis of concepts and how routing and switching technologies work in different conditions are understood. This book is recommended for audience who would want to understand the internal working of routing and switching technologies.
  • 3. Copyright 2013 @tcpipguru.com Table of Contents What happens when an IP packet reaches a router What is the use of subnet mask on a PC. How does a PC know if the destination is residing on the same or different network. How does a PC send a packet to the gateway. How is a packet forwarded on a router. What happens when a frame arrives on a switch. What happens when an IP packet reaches a switch port. How does a PC1 on SW1 communicate with PC2 on SW2. What happens if the destination is shutdown on a switch. How is a broadcast frame interpreted by a switch. How is an IP packet with unknown destination handled by a router. How does a switch populate a cam table How is broadcasting handled in a VLAN environment. How does a switch handle a frame with source and destination mac-address as the same value. Why is the encapsulation type 802.1q provided with the vlan number when intervlan routing is configured on a router. How is flooding and broadcasting different from a switching perspective. What is the difference between a layer 2 and layer 3 broadcast.
  • 4. Copyright 2013 @tcpipguru.com How does a router handle a packet with unknown destination address with two default routes. What happens when two frames arrive simultaneously on two different ports on a switch. When is a static route configured on a router. What is required for intervlan communication. How many broadcast domains are there on a 24 port switch and a 24 port hub What is the difference between default route and default gateway. How does routing work Which connection would be used on a PC with two internet connections What is gateway in networking What is the Use of VLAN How does STP prevent looping How do Routers populate routing tables for directly connected interfaces
  • 5. Copyright 2013 @tcpipguru.com What happens when an IP packet reaches a router In the above diagram, PC1 is configured with the IP address 192.168.1.2 and subnet mask 255.255.255.0. The router is configured with the IP address 192.168.1.3 and subnet mask 255.255.255.0. When PC1 pings the IP address of the router, the source IP address in the IP packet is 192.168.1.2 and the destination IP address in the IP packet would be 192.168.1.3. The IP packet is encapsulated in an ethernet frame, which would have the source mac- address as that of PC1 and destination mac-address as that of the routers interface configured with the IP address 192.168.1.3. When the packet reaches the router, the router would look into the destination mac-address inside the frame. After verification, the router would look into the destination IP address inside the packet. It would then understand that the packet is intended for itself, and would then process the upper layer of the packet.
  • 6. Copyright 2013 @tcpipguru.com Buy the Ebook with PayPal Price - $5 Click on the below link to BUY NOW with PayPal http://www.e-junkie.com/211191/product/489940.php