Wednesday, August 3, 2011

Cisco Router Configuration Commands


Requirement Cisco Command
Set a console password to cisco Router(config)#line con 0
Router(config-line)#login
Router(config-line)#password cisco
Set a telnet password Router(config)#line vty 0 4
Router(config-line)#login
Router(config-line)#password cisco
Stop console timing out Router(config)#line con 0
Router(config-line)#exec-timeout 0 0
Set the enable password to cisco Router(config)#enable password cisco
Set the enable secret password to peter. This password overrides the enable password
and is encypted within the config file
Router(config)#enable secret peter
Enable an interface Router(config-if)#no shutdown
To disable an interface Router(config-if)#shutdown
Set the clock rate for a router with a DCE cable to 64K Router(config-if)clock rate 64000
Set a logical bandwidth assignment of 64K to the serial interface Router(config-if)bandwidth 64
Note that the zeroes are not missing
To add an IP address to a interface Router(config-if)#ip addr 10.1.1.1 255.255.255.0
To enable RIP on all 172.16.x.y interfaces Router(config)#router rip
Router(config-router)#network 172.16.0.0
Disable RIP Router(config)#no router rip
To enable IRGP with a AS of 200, to all interfaces Router(config)#router igrp 200
Router(config-router)#network 172.16.0.0
Disable IGRP Router(config)#no router igrp 200
Static route the remote network is 172.16.1.0, with a mask of 255.255.255.0, the next hop is 172.16.2.1, at a cost of 5 hops Router(config)#ip route 172.16.1.0 255.255.255.0 172.16.2.1 5
Disable CDP for the whole router Router(config)#no cdp run
Enable CDP for he whole router Router(config)#cdp run
Disable CDP on an interface Router(config-if)#no cdp enable


Cisco Router Show Commands

Requirement Cisco Command
View version information show version
View current configuration (DRAM) show running-config
View startup configuration (NVRAM) show startup-config
Show IOS file and flash space show flash
Shows all logs that the router has in its memory show log
View the interface status of interface e0 show interface e0
Overview all interfaces on the router show ip interfaces brief
View type of serial cable on s0 show controllers 0 (note the space between the 's' and the '0')
Display a summary of connected cdp devices show cdp neighbor
Display detailed information on all devices show cdp entry *
Display current routing protocols show ip protocols
Display IP routing table show ip route
Display access lists, this includes the number of displayed matches show access-lists
Check the router can see the ISDN switch show isdn status
Check a Frame Relay PVC connections show frame-relay pvc
show lmi traffic stats show frame-relay lmi
Display the frame inverse ARP table show frame-relay map

Cisco Router Basic Operations

Requirement Cisco Command
Enable Enter privileged mode
Return to user mode from privileged disable
Exit Router Logout or exit or quit
Recall last command up arrow or <Ctrl-P>
Recall next command down arrow or <Ctrl-N>
Suspend or abort <Shift> and  <Ctrl> and 6 then x
Refresh screen output <Ctrl-R>
Compleat Command TAB

Cisco Router Copy Commands

Requirement Cisco Command
Save the current configuration from DRAM to NVRAM copy running-config startup-config
Merge NVRAM configuration to DRAM copy startup-config running-config
Copy DRAM configuration to a TFTP server copy runing-config tftp
Merge TFTP configuration with current router configuration held in DRAM copy tftp runing-config
Backup the IOS onto a TFTP server copy flash tftp
Upgrade the router IOS from a TFTP server copy tftp flash

Cisco Router Debug Commands

Requirement Cisco Command
Enable debug for RIP debug ip rip
Enable summary IGRP debug information debug ip igrp events
Enable detailed IGRP debug information debug ip igrp transactions
Debug IPX RIP debug ipx routing activity
Debug IPX SAP debug IPX SAP
Enable debug for CHAP or PAP debug ppp authentication
Switch all debugging off no debug all
undebug all

Cisco routers have four basic types of memory

Cisco routers have four basic types of memory: RAM/DRAM, NVRAM, ROM, and Flash (EPROM) memory.
Memory/Type Contents
RAM/DRAM Active program and operating system instructions, the running configuration file, routing tables
NVRAM Startup configuration file
ROM POST, bootstrap, and startup/power-up utilities (usually limited version of), Cisco IOS
Flash Cisco IOS

For the exam, remember that the router's RAM is volatile DRAM that holds the working data and files of the router, and when the power is turned off, the contents of the RAM are lost.
Where DRAM is volatile and must have a power source to hold its contents, nonvolatile RAM (NVRAM) can hold its contents when the main power source is lost. You may even know this type of memory as static RAM (SRAM), but on the CCNA exam, remember it as NVRAM. The Cisco router uses NVRAM to store its startup configuration file.
There's another type of memory, called ROM (Read-Only Memory), that's even more reliable than NVRAM. Like NVRAM, ROM does not lose its contents when the power is turned off. On the Cisco router, ROM contains the program instructions for the power-on self-test (POST) diagnostics, the bootstrap program, which is the startup program for the router, and the router's operating system.
Cisco routers contain two copies of the IOS, a stripped won version that is stored in ROM and the full up-to-date version stored in Flash. The IOS version in Flash memory is the one you should focus on for the exam.
The Cisco Discovery Protocol (CDP) is a proprietary Cisco protocol that allows you to get information about directly connected CIsco router, bridges, and switches.
Stuff to memorize about CDP

  • CDP uses SNAP at the data link leve, which makes it protocol independent.

  • CDP detects attached devices regardless of what protocol they're running.

  • CDP is enabled by default when the router is booted on all interfaces.

  • CDP update requests are multicast by default every 60 seconds using layer 2 multicast messages.

  • CDP has a default holdtime. The amount of time a device holds a CDP update before discarding it is 180 seconds.



  • The two Exec modes in the user interface are User Exec and Enable Exec (a.k.a. Privileged) modes.
    Setup Mode
    when a router is first configured from the console port, Setup Mode is invoked. Setup mode can also be invoked from the Enable Exec mode prompt with the setup command, or by rebooting the router after deleting its startup-config file through the erase startup-config command.
    Another way to restart the router is to issue the reload command.
    Configuration Mode
    Like the setup mode, you can enter the configuration mode by using a command, in this case config. To move into what is called global configuration mode, enter the following config command at the Enable Exec prompt (the one with the # symbol):

    ROUTERNAME#config terminal

    The parameter terminal or its abbreviation t is absolutely necessary.
    The prompt for Configuration Mode is:
    RouterA#(config)

    The prompt for Configuration Interface Mode is:
    RouterB#(config-if)
    The suffix -if means interface.
    Enhanced Editing Keyboard Commands
    Key(s) Action
    Ctrl+A Move to the beginning of the current line
    Ctrl+E Move to the end of the current line
    Ctrl+B (or left-arrow key) Move back one character
    Ctrl+F (or right-arrow key) Move forward on character
    Ctrl+N (or down-arrow key) Recall most recent command
    Ctrl+P (or up-arrow key) Recall previous command
    Esc+B Move back to beginning of previous word (or beginning of current word).
    Esc+F Move forward one word
    Tab Complete the current word (shortcut command)
    Other configuration commands used in editing the comand history are:

  • Show history: This command displays the contents of the command history.

  • Terminal history size: This command is used to change the default value of ho wmany lines of the command history are to be displayed by a show history command. The default is to show the last 10 commands.

  • Terminal no editing: This command turns off the enhanced editing feature and is used to exit enhanced editing.

  • Terminal editing: This command turns the enhanced editing feature back on. Enhanced editing is on by default and must be turned off with the terminal no editing command.


  • Naming Your Router


  • You must first enter Enable Exec (privileged), the one that displays the number or pound sign prompt, and then enter Global Configuration mode, the one that adds the word "config" in parentheses.

  • The command used to assign the hostname is hostname. - Router(config)#hostname Name

  • IP Addressing


    Understanding IP Addresses

    An IP address is an address used in order to uniquely identify a device on an IP network. The address is made up of 32 binary bits, which can be divisible into a network portion and host portion with the help of a subnet mask. The 32 binary bits are broken into four octets (1 octet = 8 bits). Each octet is converted to decimal and separated by a period (dot). For this reason, an IP address is said to be expressed in dotted decimal format (for example, 172.16.81.100). The value in each octet ranges from 0 to 255 decimal, or 00000000 - 11111111 binary.
    Here is how binary octets convert to decimal: The right most bit, or least significant bit, of an octet holds a value of 20. The bit just to the left of that holds a value of 21. This continues until the left-most bit, or most significant bit, which holds a value of 27. So if all binary bits are a one, the decimal equivalent would be 255 as shown here:
    1  1  1  1 1 1 1 1
      128 64 32 16 8 4 2 1 (128+64+32+16+8+4+2+1=255)
    Here is a sample octet conversion when not all of the bits are set to 1.
    0  1 0 0 0 0 0 1
      0 64 0 0 0 0 0 1 (0+64+0+0+0+0+0+1=65)
    And this is sample shows an IP address represented in both binary and decimal.
    10.       1.      23.      19 (decimal)
      00001010.00000001.00010111.00010011 (binary)
    These octets are broken down to provide an addressing scheme that can accommodate large and small networks. There are five different classes of networks, A to E. This document focuses on addressing classes A to C, since classes D and E are reserved and discussion of them is beyond the scope of this document.
    Note: Also note that the terms "Class A, Class B" and so on are used in this document to help facilitate the understanding of IP addressing and subnetting. These terms are rarely used in the industry anymore because of the introduction of classless interdomain routing (CIDR).
    Given an IP address, its class can be determined from the three high-order bits. Figure 1 shows the significance in the three high order bits and the range of addresses that fall into each class. For informational purposes, Class D and Class E addresses are also shown.
    Figure 1
    3an.gif
    In a Class A address, the first octet is the network portion, so the Class A example in Figure 1 has a major network address of 1.0.0.0 - 127.255.255.255. Octets 2, 3, and 4 (the next 24 bits) are for the network manager to divide into subnets and hosts as he/she sees fit. Class A addresses are used for networks that have more than 65,536 hosts (actually, up to 16777214 hosts!).
    In a Class B address, the first two octets are the network portion, so the Class B example in Figure 1 has a major network address of 128.0.0.0 - 191.255.255.255. Octets 3 and 4 (16 bits) are for local subnets and hosts. Class B addresses are used for networks that have between 256 and 65534 hosts.
    In a Class C address, the first three octets are the network portion. The Class C example in Figure 1 has a major network address of 192.0.0.0 - 233.255.255.255. Octet 4 (8 bits) is for local subnets and hosts - perfect for networks with less than 254 hosts.

    Network Masks

    A network mask helps you know which portion of the address identifies the network and which portion of the address identifies the node. Class A, B, and C networks have default masks, also known as natural masks, as shown here:
    Class A: 255.0.0.0
    Class B: 255.255.0.0
    Class C: 255.255.255.0
    An IP address on a Class A network that has not been subnetted would have an address/mask pair similar to: 8.20.15.1 255.0.0.0. To see how the mask helps you identify the network and node parts of the address, convert the address and mask to binary numbers.
    8.20.15.1 = 00001000.00010100.00001111.00000001
    255.0.0.0 = 11111111.00000000.00000000.00000000
    Once you have the address and the mask represented in binary, then identifying the network and host ID is easier. Any address bits which have corresponding mask bits set to 1 represent the network ID. Any address bits that have corresponding mask bits set to 0 represent the node ID.
    8.20.15.1 = 00001000.00010100.00001111.00000001
    255.0.0.0 = 11111111.00000000.00000000.00000000
                -----------------------------------
                 net id |      host id             
    
    netid =  00001000 = 8
    hostid = 00010100.00001111.00000001 = 20.15.1

    Understanding Subnetting

    Subnetting allows you to create multiple logical networks that exist within a single Class A, B, or C network. If you do not subnet, you are only able to use one network from your Class A, B, or C network, which is unrealistic.
    Each data link on a network must have a unique network ID, with every node on that link being a member of the same network. If you break a major network (Class A, B, or C) into smaller subnetworks, it allows you to create a network of interconnecting subnetworks. Each data link on this network would then have a unique network/subnetwork ID. Any device, or gateway, connecting n networks/subnetworks has n distinct IP addresses, one for each network / subnetwork that it interconnects.
    In order to subnet a network, extend the natural mask using some of the bits from the host ID portion of the address to create a subnetwork ID. For example, given a Class C network of 204.17.5.0 which has a natural mask of 255.255.255.0, you can create subnets in this manner:
    204.17.5.0 -      11001100.00010001.00000101.00000000
    255.255.255.224 - 11111111.11111111.11111111.11100000
                      --------------------------|sub|----
    By extending the mask to be 255.255.255.224, you have taken three bits (indicated by "sub") from the original host portion of the address and used them to make subnets. With these three bits, it is possible to create eight subnets. With the remaining five host ID bits, each subnet can have up to 32 host addresses, 30 of which can actually be assigned to a device since host ids of all zeros or all ones are not allowed (it is very important to remember this). So, with this in mind, these subnets have been created.
    204.17.5.0 255.255.255.224     host address range 1 to 30
    204.17.5.32 255.255.255.224    host address range 33 to 62
    204.17.5.64 255.255.255.224    host address range 65 to 94
    204.17.5.96 255.255.255.224    host address range 97 to 126
    204.17.5.128 255.255.255.224   host address range 129 to 158
    204.17.5.160 255.255.255.224   host address range 161 to 190
    204.17.5.192 255.255.255.224   host address range 193 to 222
    204.17.5.224 255.255.255.224   host address range 225 to 254
    Note: There are two ways to denote these masks. First, since you are using three bits more than the "natural" Class C mask, you can denote these addresses as having a 3-bit subnet mask. Or, secondly, the mask of 255.255.255.224 can also be denoted as /27 as there are 27 bits that are set in the mask. This second method is used with CIDR. With this method, one of these networks can be described with the notation prefix/length. For example, 204.17.5.32/27 denotes the network 204.17.5.32 255.255.255.224. When appropriate the prefix/length notation is used to denote the mask throughout the rest of this document.
    The network subnetting scheme in this section allows for eight subnets, and the network might appear as:
    Figure 2
    3b.gif
    Notice that each of the routers in Figure 2 is attached to four subnetworks, one subnetwork is common to both routers. Also, each router has an IP address for each subnetwork to which it is attached. Each subnetwork could potentially support up to 30 host addresses.
    This brings up an interesting point. The more host bits you use for a subnet mask, the more subnets you have available. However, the more subnets available, the less host addresses available per subnet. For example, a Class C network of 204.17.5.0 and a mask of 255.255.255.224 (/27) allows you to have eight subnets, each with 32 host addresses (30 of which could be assigned to devices). If you use a mask of 255.255.255.240 (/28), the break down is:
    204.17.5.0 -      11001100.00010001.00000101.00000000
    255.255.255.240 - 11111111.11111111.11111111.11110000
                      --------------------------|sub |---
    Since you now have four bits to make subnets with, you only have four bits left for host addresses. So in this case you can have up to 16 subnets, each of which can have up to 16 host addresses (14 of which can be assigned to devices).
    Take a look at how a Class B network might be subnetted. If you have network 172.16.0.0 ,then you know that its natural mask is 255.255.0.0 or 172.16.0.0/16. Extending the mask to anything beyond 255.255.0.0 means you are subnetting. You can quickly see that you have the ability to create a lot more subnets than with the Class C network. If you use a mask of 255.255.248.0 (/21), how many subnets and hosts per subnet does this allow for?
    172.16.0.0  -   10101100.00010000.00000000.00000000
    255.255.248.0 - 11111111.11111111.11111000.00000000
                    -----------------| sub |-----------
    You are using five bits from the original host bits for subnets. This allows you to have 32 subnets (25). After using the five bits for subnetting, you are left with 11 bits for host addresses. This allows each subnet so have 2048 host addresses (211), 2046 of which could be assigned to devices.
    Note: In the past, there were limitations to the use of a subnet 0 (all subnet bits are set to zero) and all ones subnet (all subnet bits set to one). Some devices would not allow the use of these subnets. Cisco Systems devices allow the use of these subnets when theip subnet zero command is configured.

    Examples

    Sample Exercise 1

    Now that you have an understanding of subnetting, put this knowledge to use. In this example, you are given two address / mask combinations, written with the prefix/length notation, which have been assigned to two devices. Your task is to determine if these devices are on the same subnet or different subnets. You can do this by using the address and mask of each device to determine to which subnet each address belongs.
    DeviceA: 172.16.17.30/20
    DeviceB: 172.16.28.15/20
    Determining the Subnet for DeviceA:
    172.16.17.30  -   10101100.00010000.00010001.00011110
    255.255.240.0 -   11111111.11111111.11110000.00000000
                      -----------------| sub|------------
    subnet =          10101100.00010000.00010000.00000000 = 172.16.16.0
    Looking at the address bits that have a corresponding mask bit set to one, and setting all the other address bits to zero (this is equivalent to performing a logical "AND" between the mask and address), shows you to which subnet this address belongs. In this case, DeviceA belongs to subnet 172.16.16.0.
    Determining the Subnet for DeviceB:
    172.16.28.15  -   10101100.00010000.00011100.00001111
    255.255.240.0 -   11111111.11111111.11110000.00000000
                      -----------------| sub|------------
    subnet =          10101100.00010000.00010000.00000000 = 172.16.16.0
    From these determinations, DeviceA and DeviceB have addresses that are part of the same subnet.

    Sample Exercise 2

    Given the Class C network of 204.15.5.0/24, subnet the network in order to create the network in Figure 3 with the host requirements shown.
    Figure 3
    3c.gif
    Looking at the network shown in Figure 3, you can see that you are required to create five subnets. The largest subnet must support 28 host addresses. Is this possible with a Class C network? and if so, then how?
    You can start by looking at the subnet requirement. In order to create the five needed subnets you would need to use three bits from the Class C host bits. Two bits would only allow you four subnets (22).
    Since you need three subnet bits, that leaves you with five bits for the host portion of the address. How many hosts does this support? 25 = 32 (30 usable). This meets the requirement.
    Therefore you have determined that it is possible to create this network with a Class C network. An example of how you might assign the subnetworks is:
    netA: 204.15.5.0/27      host address range 1 to 30
    netB: 204.15.5.32/27     host address range 33 to 62
    netC: 204.15.5.64/27     host address range 65 to 94
    netD: 204.15.5.96/27     host address range 97 to 126
    netE: 204.15.5.128/27    host address range 129 to 158

    VLSM Example

    In all of the previous examples of subnetting, notice that the same subnet mask was applied for all the subnets. This means that each subnet has the same number of available host addresses. You can need this in some cases, but, in most cases, having the same subnet mask for all subnets ends up wasting address space. For example, in the Sample Exercise 2 section, a class C network was split into eight equal-size subnets; however, each subnet did not utilize all available host addresses, which results in wasted address space. Figure 4 illustrates this wasted address space.
    Figure 4
    3d.gif
    Figure 4 illustrates that of the subnets that are being used, NetA, NetC, and NetD have a lot of unused host address space. It is possible that this was a deliberate design accounting for future growth, but in many cases this is just wasted address space due to the fact that the same subnet mask is being used for all the subnets.
    Variable Length Subnet Masks (VLSM) allows you to use different masks for each subnet, thereby using address space efficiently.

    VLSM Example

    Given the same network and requirements as in Sample Exercise 2 develop a subnetting scheme with the use of VLSM, given:
    netA: must support 14 hosts
    netB: must support 28 hosts
    netC: must support 2 hosts
    netD: must support 7 hosts
    netE: must support 28 host
    Determine what mask allows the required number of hosts.
    netA: requires a /28 (255.255.255.240) mask to support 14 hosts
    netB: requires a /27 (255.255.255.224) mask to support 28 hosts
    netC: requires a /30 (255.255.255.252) mask to support 2 hosts
    netD*: requires a /28 (255.255.255.240) mask to support 7 hosts
    netE: requires a /27 (255.255.255.224) mask to support 28 hosts
    
    * a /29 (255.255.255.248) would only allow 6 usable host addresses
      therefore netD requires a /28 mask.
    The easiest way to assign the subnets is to assign the largest first. For example, you can assign in this manner:
    netB: 204.15.5.0/27  host address range 1 to 30
    netE: 204.15.5.32/27 host address range 33 to 62
    netA: 204.15.5.64/28 host address range 65 to 78
    netD: 204.15.5.80/28 host address range 81 to 94
    netC: 204.15.5.96/30 host address range 97 to 98
    This can be graphically represented as shown in Figure 5:
    Figure 5
    3e.gif
    Figure 5 illustrates how using VLSM helped save more than half of the address space.

    CIDR

    Classless Interdomain Routing (CIDR) was introduced to improve both address space utilization and routing scalability in the Internet. It was needed because of the rapid growth of the Internet and growth of the IP routing tables held in the Internet routers.
    CIDR moves way from the traditional IP classes (Class A, Class B, Class C, and so on). In CIDR , an IP network is represented by a prefix, which is an IP address and some indication of the length of the mask. Length means the number of left-most contiguous mask bits that are set to one. So network 172.16.0.0 255.255.0.0 can be represented as 172.16.0.0/16. CIDR also depicts a more hierarchical Internet architecture, where each domain takes its IP addresses from a higher level. This allows for the summarization of the domains to be done at the higher level. For example, if an ISP owns network 172.16.0.0/16, then the ISP can offer 172.16.1.0/24, 172.16.2.0/24, and so on to customers. Yet, when advertising to other providers, the ISP only needs to advertise 172.16.0.0/16.
    For more information on CIDR, see RFC 1518 leavingcisco.com and RFC 1519 leavingcisco.com.

    Appendix

    Sample Config

    Routers A and B are connected via serial interface.

    Router A

    hostname routera
      !
      ip routing
      !
      int e 0
      ip address 172.16.50.1 255.255.255.0
      !(subnet 50)
      int e 1 ip address 172.16.55.1 255.255.255.0
      !(subnet 55)
      int t 0 ip address 172.16.60.1 255.255.255.0
      !(subnet 60) int s 0
      ip address 172.16.65.1 255.255.255.0 (subnet 65)
      !S 0 connects to router B
      router rip
      network 172.16.0.0

    Router B

    hostname routerb
      !
      ip routing
      !
      int e 0
      ip address 192.1.10.200 255.255.255.240
      !(subnet 192)
      int e 1
      ip address 192.1.10.66 255.255.255.240
      !(subnet 64)
      int s 0
      ip address 172.16.65.2 (same subnet as router A's s 0)
      !Int s 0 connects to router A
      router rip
      network 192.1.10.0
      network 172.16.0.0

    Host/Subnet Quantities Table

    Class B                   Effective  Effective
    # bits        Mask         Subnets     Hosts
    -------  ---------------  ---------  ---------
      1      255.255.128.0           2     32766
      2      255.255.192.0           4     16382
      3      255.255.224.0           8      8190
      4      255.255.240.0          16      4094
      5      255.255.248.0          32      2046
      6      255.255.252.0          64      1022
      7      255.255.254.0         128       510
      8      255.255.255.0         256       254
      9      255.255.255.128       512       126
      10     255.255.255.192      1024        62
      11     255.255.255.224      2048        30
      12     255.255.255.240      4096        14
      13     255.255.255.248      8192         6
      14     255.255.255.252     16384         2
    
    Class C                   Effective  Effective
    # bits        Mask         Subnets     Hosts
    -------  ---------------  ---------  ---------
      1      255.255.255.128      2        126 
      2      255.255.255.192      4         62
      3      255.255.255.224      8         30
      4      255.255.255.240     16         14
      5      255.255.255.248     32          6
      6      255.255.255.252     64          2
    
      
    *Subnet all zeroes and all ones included. These 
     might not be supported on some legacy systems.
    *Host all zeroes and all ones excluded.

    Conversion Table - Decimal, Hexadecimal, Octal, Binary

    Dec
    Hex

    Oct

    Bin

    0
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15

    0
    1
    2
    3
    4
    5
    6
    7
    8
    9
    A
    B
    C
    D
    E
    F

    000
    001
    002
    003
    004
    005
    006
    007
    010
    011
    012
    013
    014
    015
    016
    017

    00000000
    00000001
    00000010
    00000011
    00000100
    00000101
    00000110
    00000111
    00001000
    00001001
    00001010
    00001011
    00001100
    00001101
    00001110
    00001111


    Dec

    Hex

    Oct

    Bin

    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31

    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    1A
    1B
    1C
    1D
    1E
    1F

    020
    021
    022
    023
    024
    025
    026
    027
    030
    031
    032
    033
    034
    035
    036
    037

    00010000
    00010001
    00010010
    00010011
    00010100
    00010101
    00010110
    00010111
    00011000
    00011001
    00011010
    00011011
    00011100
    00011101
    00011110
    00011111


    Dec

    Hex

    Oct

    Bin

    32
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47

    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    2A
    2B
    2C
    2D
    2E
    2F

    040
    041
    042
    043
    044
    045
    046
    047
    050
    051
    052
    053
    054
    055
    056
    057

    00100000
    00100001
    00100010
    00100011
    00100100
    00100101
    00100110
    00100111
    00101000
    00101001
    00101010
    00101011
    00101100
    00101101
    00101110
    00101111


    Dec

    Hex

    Oct

    Bin

    48
    49
    50
    51
    52
    53
    54
    55
    56
    57
    58
    59
    60
    61
    62
    63

    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    3A
    3B
    3C
    3D
    3E
    3F

    060
    061
    062
    063
    064
    065
    066
    067
    070
    071
    072
    073
    074
    075
    076
    077

    00110000
    00110001
    00110010
    00110011
    00110100
    00110101
    00110110
    00110111
    00111000
    00111001
    00111010
    00111011
    00111100
    00111101
    00111110
    00111111


    Dec

    Hex

    Oct

    Bin

    64
    65
    66
    67
    68
    69
    70
    71
    72
    73
    74
    75
    76
    77
    78
    79

    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    4A
    4B
    4C
    4D
    4E
    4F

    100
    101
    102
    103
    104
    105
    106
    107
    110
    111
    112
    113
    114
    115
    116
    117

    01000000
    01000001
    01000010
    01000011
    01000100
    01000101
    01000110
    01000111
    01001000
    01001001
    01001010
    01001011
    01001100
    01001101
    01001110
    01001111


    Dec

    Hex

    Oct

    Bin

    80
    81
    82
    83
    84
    85
    86
    87
    88
    89
    90
    91
    92
    93
    94
    95

    50
    51
    52
    53
    54
    55
    56
    57
    58
    59
    5A
    5B
    5C
    5D
    5E
    5F

    120
    121
    122
    123
    124
    125
    126
    127
    130
    131
    132
    133
    134
    135
    136
    137

    01010000
    01010001
    01010010
    01010011
    01010100
    01010101
    01010110
    01010111
    01011000
    01011001
    01011010
    01011011
    01011100
    01011101
    01011110
    01011111


    Dec

    Hex

    Oct

    Bin

    96
    97
    98
    99
    100
    101
    102
    103
    104
    105
    106
    107
    108
    109
    110
    111

    60
    61
    62
    63
    64
    65
    66
    67
    68
    69
    6A
    6B
    6C
    6D
    6E
    6F

    140
    141
    142
    143
    144
    145
    146
    147
    150
    151
    152
    153
    154
    155
    156
    157

    01100000
    01100001
    01100010
    01100011
    01100100
    01100101
    01100110
    01100111
    01101000
    01101001
    01101010
    01101011
    01101100
    01101101
    01101110
    01101111


    Dec

    Hex

    Oct

    Bin

    112
    113
    114
    115
    116
    117
    118
    119
    120
    121
    122
    123
    124
    125
    126
    127

    70
    71
    72
    73
    74
    75
    76
    77
    78
    79
    7A
    7B
    7C
    7D
    7E
    7F

    160
    161
    162
    163
    164
    165
    166
    167
    170
    171
    172
    173
    174
    175
    176
    177

    01110000
    01110001
    01110010
    01110011
    01110100
    01110101
    01110110
    01110111
    01111000
    01111001
    01111010
    01111011
    01111100
    01111101
    01111110
    01111111


    Dec

    Hex

    Oct

    Bin

    128
    129
    130
    131
    132
    133
    134
    135
    136
    137
    138
    139
    140
    141
    142
    143

    80
    81
    82
    83
    84
    85
    86
    87
    88
    89
    8A
    8B
    8C
    8D
    8E
    8F

    200
    201
    202
    203
    204
    205
    206
    207
    210
    211
    212
    213
    214
    215
    216
    217

    10000000
    10000001
    10000010
    10000011
    10000100
    10000101
    10000110
    10000111
    10001000
    10001001
    10001010
    10001011
    10001100
    10001101
    10001110
    10001111


    Dec

    Hex

    Oct

    Bin

    144
    145
    146
    147
    148
    149
    150
    151
    152
    153
    154
    155
    156
    157
    158
    159

    90
    91
    92
    93
    94
    95
    96
    97
    98
    99
    9A
    9B
    9C
    9D
    9E
    9F

    220
    221
    222
    223
    224
    225
    226
    227
    230
    231
    232
    233
    234
    235
    236
    237

    10010000
    10010001
    10010010
    10010011
    10010100
    10010101
    10010110
    10010111
    10011000
    10011001
    10011010
    10011011
    10011100
    10011101
    10011110
    10011111


    Dec

    Hex

    Oct

    Bin

    160
    161
    162
    163
    164
    165
    166
    167
    168
    169
    170
    171
    172
    173
    174
    175

    A0
    A1
    A2
    A3
    A4
    A5
    A6
    A7
    A8
    A9
    AA
    AB
    AC
    AD
    AE
    AF

    240
    241
    242
    243
    244
    245
    246
    247
    250
    251
    252
    253
    254
    255
    256
    257

    10100000
    10100001
    10100010
    10100011
    10100100
    10100101
    10100110
    10100111
    10101000
    10101001
    10101010
    10101011
    10101100
    10101101
    10101110
    10101111


    Dec

    Hex

    Oct

    Bin

    176
    177
    178
    179
    180
    181
    182
    183
    184
    185
    186
    187
    188
    189
    190
    191

    B0
    B1
    B2
    B3
    B4
    B5
    B6
    B7
    B8
    B9
    BA
    BB
    BC
    BD
    BE
    BF

    260
    261
    262
    263
    264
    265
    266
    267
    270
    271
    272
    273
    274
    275
    276
    277

    10110000
    10110001
    10110010
    10110011
    10110100
    10110101
    10110110
    10110111
    10111000
    10111001
    10111010
    10111011
    10111100
    10111101
    10111110
    10111111


    Dec

    Hex

    Oct

    Bin

    192
    193
    194
    195
    196
    197
    198
    199
    200
    201
    202
    203
    204
    205
    206
    207

    C0
    C1
    C2
    C3
    C4
    C5
    C6
    C7
    C8
    C9
    CA
    CB
    CC
    CD
    CE
    CF

    300
    301
    302
    303
    304
    305
    306
    307
    310
    311
    312
    313
    314
    315
    316
    317

    11000000
    11000001
    11000010
    11000011
    11000100
    11000101
    11000110
    11000111
    11001000
    11001001
    11001010
    11001011
    11001100
    11001101
    11001110
    11001111


    Dec

    Hex

    Oct

    Bin

    208
    209
    210
    211
    212
    213
    214
    215
    216
    217
    218
    219
    220
    221
    222
    223

    D0
    D1
    D2
    D3
    D4
    D5
    D6
    D7
    D8
    D9
    DA
    DB
    DC
    DD
    DE
    DF

    320
    321
    322
    323
    324
    325
    326
    327
    330
    331
    332
    333
    334
    335
    336
    337

    11010000
    11010001
    11010010
    11010011
    11010100
    11010101
    11010110
    11010111
    11011000
    11011001
    11011010
    11011011
    11011100
    11011101
    11011110
    11011111


    Dec

    Hex

    Oct

    Bin

    224
    225
    226
    227
    228
    229
    230
    231
    232
    233
    234
    235
    236
    237
    238
    239

    E0
    E1
    E2
    E3
    E4
    E5
    E6
    E7
    E8
    E9
    EA
    EB
    EC
    ED
    EE
    EF

    340
    341
    342
    343
    344
    345
    346
    347
    350
    351
    352
    353
    354
    355
    356
    357

    11100000
    11100001
    11100010
    11100011
    11100100
    11100101
    11100110
    11100111
    11101000
    11101001
    11101010
    11101011
    11101100
    11101101
    11101110
    11101111


    Dec

    Hex

    Oct

    Bin

    240
    241
    242
    243
    244
    245
    246
    247
    248
    249
    250
    251
    252
    253
    254
    255

    F0
    F1
    F2
    F3
    F4
    F5
    F6
    F7
    F8
    F9
    FA
    FB
    FC
    FD
    FE
    FF

    360
    361
    362
    363
    364
    365
    366
    367
    370
    371
    372
    373
    374
    375
    376
    377

    11110000
    11110001
    11110010
    11110011
    11110100
    11110101
    11110110
    11110111
    11111000
    11111001
    11111010
    11111011
    11111100
    11111101
    11111110
    11111111

    Seven Layer OSI Model

    OSI Reference Model is founded on a suggestion developed by the International Organization for Standardization (ISO). The model is known as ISO OSI (Open Systems Interconnection) Reference Model because it relates with connecting open systems – that is, systems that are open for communication with other systems.
    OSI Model is a set of protocols that try to identify and homogenize the data communication practices. The OSI Model has the support of most computer and network vendors, many big customers, and most governments, including the United States.
    The OSI Model is a model that illustrates how data communications should take place. It segregates the process into seven groups, called layers. Into these layers are integrated the protocol standards developed by the ISO and other standards organization, including the Institute of Electrical and Electronic Engineers (IEEE), American National Standards Institute (ANSI), and the International Telecommunications Union (ITU), formerly known as the CCITT (Comite Consultatif Internationale de Telegraphique et Telephone). The OSI Model affirms what protocols and standards should be used at each layer. It is modular, each layer of the OSI Model functions with the one above and below it.
    osimodel OSI Model
    The short form used to memorize the layer names of the OSI Model is “All People Seem To Need Data Processing”. The lower two layers are normally put into practice with hardware and software. The remaining five layers are only implemented with software.
    The layered approach to network communications gives the subsequent advantages: Reduced intricacy, enhanced teaching/learning, modular engineering, accelerated advancement, interoperable technology, and standard interfaces.

    The Seven Layers of the OSI Model

    The seven layers of the OSI model are:
    Layer Name
    7 Application
    6 Presentation
    5 Session
    4 Transport
    3 Network
    2 Data Link
    1 Physical
    The easiest way to remember the layers of the OSI model is to use the handy mnemonic “All People Seem To Need Data Processing”:
    Layer Name Mnemonic
    7 Application All
    6 Presentation People
    5 Session Seem
    4 Transport To
    3 Network Need
    2 Data Link Data
    1 Physical Processing
    Functions of Each Layer of the OSI Model
    Layer Seven
    The Application Layer of the OSI model is responsible for providing end-user services, such as file transfers, electronic messaging, e-mail, virtual terminal access, and network management. This is the layer with which the user interacts.
    Layer Six
    The Presentation Layer of the OSI model is responsible for defining the syntax which two network hosts use to communicate. Encryption and compression should be Presentation Layer functions.
    Layer Five
    The Session Layer of the OSI model is responsible for establishing process-to-process commnunications between networked hosts.
    Layer Four
    The Transport Layer of the OSI model is responsible for delivering messages between networked hosts. The Transport Layer should be responsible for fragmentation and reassembly.
    Layer Three
    The Network Layer of the OSI model is responsible for establishing paths for data transfer through the network. Routers operate at the Network Layer.
    Layer Two
    The Data Link Layer of the OSI model is responsible for communications between adjacent network nodes. Hubs and switches operate at the Data Link Layer.
    Layer One
    The Physical Layer of the OSI model is responsible for bit-level transmission between network nodes. The Physical Layer defines items such as: connector types, cable types, voltages, and pin-outs.

    The OSI Model vs. The Real World

    The most major difficulty with the OSI model is that is does not map well to the real world!
    The OSI was created after many of todays protocols were already in production use. These existing protocols, such as TCP/IP, were designed and built around the needs of real users with real problems to solve. The OSI model was created by academicians for academic purposes.
    The OSI model is a very poor standard, but it’s the only well-recognized standard we have which describes networked applications.
    The easiest way to deal with the OSI model is to map the real-world protocols to the model, as well as they can be mapped.
    Layer Name Common Protocols
    7 Application SSH, telnet, FTP
    6 Presentation HTTP, SMTP, SNMP
    5 Session RPC, Named Pipes, NETBIOS
    4 Transport TCP, UDP
    3 Network IP
    2 Data Link Ethernet
    1 Physical Cat-5
    The difficulty with this approach is that there is no general agreement as to which layer of the OSI model to map any specific protocol. You could argue forever about what OSI model layer SSH maps to.
    A much more accurate model of real-world networking is the TCP/IP model:
    TCP/IP Model
    Application Layer
    Transport Layer
    Internet Layer
    Network Interface Layer
    The most significant downside with the TCP/IP model is that if you reference it, fewer people will know what you are talking about!
    For a better description of why the OSI model should go the way of the dodo, disco, and