Ccna Slides

Embed Size (px)

DESCRIPTION

Ccna Slides

Citation preview

  • 2002, Cisco Systems, Inc. All rights reserved.

  • Networking Basics

  • How a LAN Is Built

    1999, Cisco Systems, Inc.www.cisco.com

  • Local-Area NetworkLAN

    What is a LAN? A collection of computers, printers, and other

    devices that can communicate with each other in a small area (< ~ 3000 m or 1000 feet)

    What are the components? Computers, operating system (OS),

    network interface card (NIC), and hubs

    How is a LAN controlled? ProtocolsFormal descriptions of sets of rules and

    conventions that govern how devices on a network exchange information

  • Local-Area Networks

    LANs are designed to:

    Operate within a limited geographic area

    Allow multi-access to high-bandwidth media

    Control the network privately under local administration

    Provide full-time connectivity to local services

    Connect physically adjacent devices

  • Network Operating System (OS)

    Software that allows communicating and sharing of data and network resources

    Examples: AppleTalk

    NetWare

    Win NT

    PC or Workstation

    Loaded with NOS

  • Connector Port

    PC or Workstation

    Loaded with NOS

    Network Interface

    Card (NIC)

    Network Interface Card

    Amplifies electronic signals

    Packages data for transmission

    Physically connects computer to transmission media (cable)

  • 1990sGlobal Internetworking

    19921 major backbone, 3,000 networks, 200K computers

    1995Multiple backbones, hundreds of regional nets, tens of thousands

    of LANs, millions of hosts, tens of millions of users

    Doubling every year!

  • The OSI Model

    OSI Layer is meant for Networking manufacturers and developers to provide them a standard based on which they can make their products.

    All OSI Layers are independent from each other, which makes introducing changes easier as no other layers are effected.

    Ease of Troubleshooting.

  • The Layered Model

    1999, Cisco Systems, Inc. www.cisco.com

  • Layered Communication

    Source: Tanenbaum, 1996

    I like

    rabbits

    L: Dutch

    Ik hou

    van

    konijnen

    Fax #:---

    L: Dutch

    Ik hou

    van

    konijnen

    Message

    Information

    for the

    Remote

    Translator

    Information

    for the

    Remote

    Secretary

    Location A

  • Layered Communication

    I like

    rabbits

    L: Dutch

    Ik hou

    van

    konijnen

    L: Dutch

    Ik hou

    van

    konijnen

    Fax #:---

    L: Dutch

    Ik hou

    van

    konijnen

    Fax #:---

    L: Dutch

    Ik hou

    van

    konijnen

    Jaimeles lapins

    Information

    for the

    Remote

    Translator

    Information

    for the

    Remote

    Secretary

    Location A Location B

    Message

  • Layered Communication

    I like

    rabbits

    L: Dutch

    Ik hou

    van

    konijnen

    L: Dutch

    Ik hou

    van

    konijnen

    Fax #:---

    L: Dutch

    Ik hou

    van

    konijnen

    Fax #:---

    L: Dutch

    Ik hou

    van

    konijnen

    Jaimeles lapins

    Information

    for the

    remote

    translator

    Information

    for the

    remote

    secretary

    Location A Location B

    1

    2

    3

    Layers

    Message

  • Why a Layered Network Model?

    7 Application

    6 Presentation

    5 Session

    4 Transport

    3 Network

    2 Data Link

    1 Physical

    Reduces complexity (one big problem to seven smaller ones)

    Standardizes interfaces

    Facilitates modular engineering

    Assures interoperable technology

    Accelerates evolution

    Simplifies teaching and learning

  • Devices Function at Layers

    7 Application

    6 Presentation

    5 Session

    4 Transport

    3 Network

    2 Data Link

    1 Physical

    NIC Card

    Hub

  • Host Layers

    7 Application

    6 Presentation

    5 Session

    4 Transport

    Network

    3 Data Link

    1

    Host layers: Provide accurate data delivery

    between computers}Physical

  • Media Layers

    7 Application

    6 Presentation

    5 Session

    4

    Transport

    3 Network

    2 Data Link

    1 Physical

    Host layers: Provide accurate data delivery

    between computers

    Media layers: Controlphysical delivery of messages

    over the network}}

  • Layer Functions

    Provides network services to

    application processes (such as

    electronic mail, file transfer, and

    terminal emulation)

    7 Application

  • Layer Functions

    Network services to applications

    Ensures data is readable by receiving system

    Format of data Data structures Negotiates data transfer

    syntax for application layer

    7 Application

    6 Presentation Data representation

  • Layer Functions

    Inter-host communication

    Establishes, manages, and terminates sessions between

    applications

    7 Application

    6 Presentation

    5 Session

    Network services to applications

    Data representation

  • Layer Functions

    7 Application

    6 Presentation

    5 Session

    Transport4

    Inter-host communication

    Network services to applications

    Data representation

    End-to-end connection reliability Concerned with data transport

    issues between hosts

    Data transport reliability Establishes, maintains, and

    terminates virtual circuits

    Fault detection and recovery Information flow control

  • Layer Functions

    7 Application

    6 Presentation

    5 Session

    Transport4

    Network3

    Inter-host communication

    Network services to applications

    Data representation

    End-to-end connection reliability

    Addresses and best path Provides connectivity and path

    selection between two end

    systems

    Domain of routing

  • Layer Functions7 Application

    6 Presentation

    5 Session

    Transport4

    Network3

    Data Link2

    Inter-host communication

    Network services to applications

    Data representation

    End-to-end connection reliability

    Addresses and best path

    Access to media Provides reliable transfer of data

    across media

    Physical addressing, network topology, error notification, flow

    control

  • Layer Functions

    7 Application

    6 Presentation

    5 Session

    Transport4

    Network3

    Data Link2

    Physical1

    Inter-host communication

    Network services to applications

    Data representation

    End-to-end connection reliability

    Addresses and best path

    Access to media

    Binary transmission

    Wires, connectors, voltages, data rates

  • 7 Application

    6 Presentation

    5 Session

    4 Transport

    3 Network

    2 Data Link

    1 Physical

    Host A

    Peer-to-Peer Communications

    Application

    Presentation

    Session

    Transport

    Network

    Data Link

    PhysicalBits

    Frames

    Packets

    Segments

    Host B

  • Application Layer

    This is where users communicate to the computer.

    This is where communication between two users are established.

    This is a point where user or application interfaces with the protocols to gain access to the network.

    Examples are WWW, Telnet, FTP, TFTP, E-mail, SNMP, DNS

  • Presentation Layer

    Tasks like Translation, Encryption, decryption, compression, decompression are associated with this layer.

    It receives the data in native format & converts in standard format or receives data in standard format and converts in native format, ie. EBCDIC to ASCII.

    It is mainly responsible for how the data is to be presented to the Application Layer.

    Examples are PICT, TIFF, JPEG, MIDI, MPEG, GIFF etc.

  • Presentation Layer

    ASCIIEBCDIC

    Encrypted

    Text

    Data

    login:

    PICTTIFF

    JPEGGIF

    Graphics

    Visual images

    Sound

    VideoMPEG

    QuickTime

    MIDI

    Provides code formatting and conversion for applications

  • Session Layer

    Session EstablishmentEstablishes a session between two devices before actual transmission of data.

    Dialog ControlSimplex

    Half Duplex

    Full Duplex

  • Simplex

    Data travels only one way.

    Radio transmission is the best example of this.

    Half Duplex

    Both way but one at a time. By default all LAN Cards (NICs) work on Half Duplex.

    Full Duplex

    Both way at the same time.

    Session Layer

  • Session Layer

    Network File System (NFS)

    Structured Query Language (SQL)

    Remote-Procedure Call (RPC)

    X Window System

    AppleTalk Session Protocol (ASP)

    DEC Session Control Protocol (SCP)

    Service Request

    Service Reply

    Coordinates applications as they interact on different hosts

  • Transport Layer

    Segments upper-layer applications

    Establishes an end-to-end connection

    Sends segments from one end host to another

    Optionally, ensures data reliability

  • Transport Layer

    Transport Layer never actually transports the data but only prepares for transporting.

    Uses Socket to define the services running on a particular node, the data is associated with.

    Responsible for the following :

    Segmentation

    End-to-end Communication

    Flow Control

    Error Control

    Multiplexing of Applications

    TCP, UDP and SPX work at this layer

  • Socket Socket is a software component and points to a particular service running

    on a particular node.

    Structure of a socket

    IP Address + Port Address

    Each service has a unique Port address

    Max. Port Addresses can be 65,536

    Port address 1-1023 is reserved for specific Services like

    WWW - 80

    FTP - 21

    SMTP - 25

    Port Addresses are reserved for standardization purpose.

  • Transport LayerSegments Upper-Layer

    Applications

    Electronic

    Mail

    File

    Transfer

    Application

    Presentation

    Session

    Segments

    DataApplication

    Port

    Transport DataApplication

    Port

    Terminal

    Session

  • Port Numbers

    TCP

    Port

    Numbers

    FTP

    Transport

    Layer

    TELNET

    DNS

    SNMP

    TFTP

    SMTP

    UDP

    Application

    Layer

    21 23 25 53 69 161

    RIP

    520

  • Segmentation

    This is a mechanism wherein the data is divided into multiple segments and sent over the network.

    By doing this different segments can use different links for travelling across the network.

    If one segment is lost the only segment is required to be re-sent and not the entire data.

    Once all segments reach to the destination the received segments have to be sequenced back, which is also done at

    this layer.

  • Transport LayerSends Segments with Flow Control

    Transmit

    Buffer FullNot Ready

    StopProcess

    Segments

    Buffer OKReadyGo

    Resume Transmission

    ReceiverSender

  • Flow Control

    Used while connection oriented communication

    It helps to have a control on over flow of Buffer.

    Advantages are:

    The segments delivered are acknowledged if received

    Any segment not acknowledged are retransmitted

    segments are sequenced back upon their arrival

    Congestion, Overloading and data loss are avoided

    To achieve all this it uses the technique of Sliding window or Windowing

  • Transport LayerEstablishes Connection

    Synchronize

    Synchronize

    Acknowledge

    Negotiate Connection

    Receiver

    Data Transfer

    Connection Established

    (Send Segments)

    Sender

  • End-to-End Communication

    Connection Less Transmission UDP is used

    Not reliable

    Faster

    Connection Oriented Transmission TCP or SPX is used

    Reliable

    Slower

  • Connection Oriented Protocol

    These protocols relies on Acknowledgement.

    Positive acknowledgement means data has been received.

    Negative acknowledgement means data is lost no further data is sent till positive acknowledgement is received.

    It is slow but Reliable.

    Eg. TCP and SPX

  • Transport LayerReliability with Windowing

    Window Size = 1

    Sender

    Send 1 Receive 1

    Receiver

    Ack 2

    Send 2 Receive 2

    Ack 3

    Sender

    Send 1

    Send 2Receive 1Receive 2

    Receiver

    Window Size = 3

    Send 3 Receive 3Ack 4

    Send 4

  • Transport LayerAn Acknowledgement Technique

    Sender Receiver

    Send 2Send 1

    Send 3

    Ack 4

    Send 5Send 4

    Send 6

    Ack 5

    Send 5Ack 7

    1 2 3 4 5 6 7 1 2 3 4 5 6 7

  • Connection Less Protocol

    They do not provide acknowledgement neither sequence numbers.

    It is faster but not reliable

    Eg. UDP

  • Network Layer

    It is responsible for communicating Networks

    It recognizes Networks with the help of Netwok Addresses

    Network Address is a logical address like IP Address or IPX Address

    It is common for a group of computers

    It works only with Network IDs and has got nothing to do with host Ids.

    Path determination or Routing is performed at this layer.

    Router works at this layer.

  • Network Layer: Path

    Determination

    Which Path?Which Path?

    Layer 3 functions to find the best path through the internetwork

  • Network Layer: Communicate

    Path

    1

    2

    3

    4

    5

    6

    7

    8

    9

    10 11

    Addresses represent the path of media connections

  • AddressingNetwork and Node

    Network Node

    1

    2

    123

    1

    3 1

    1.1

    2.1

    3.1

    1.2

    1.3

    Network addressPath part used by the router

    Node addressSpecific port or device on the network

  • Protocol Addressing Variations

    Network Node

    1 1

    General

    Example

    Network Host

    10. 8.2.48

    TCP/IP

    Example(Mask 255.0.0.0)

    Network Node

    1aceb0b. 0000.0c00.6e25

    Novell IPX

    Example

  • Network Layer

    Protocol Operations

    Each router provides its services to support upper layer functions

    X Y

    AA

    CC

  • Routed Versus Routing Protocol

    Routed protocol

    used between

    routers to direct

    user traffic

    Examples: IP, IPX,

    AppleTalk

    Routing protocolused only between

    routers to maintain

    routing tables

    Examples: RIP, IGRP, OSPF

  • Static Versus Dynamic Routes

    Uses a protocol route that a network

    administrator enters into the router

    Static Route

    Uses a route that a network protocoladjusts automatically for topology or

    traffic changes

    Dynamic Route

  • Static Route Example

    Point-to-point orcircuit-switched

    connection

    Stub network

    Only a single network

    connection with no need

    for routing updates

    AA

    BB

    Fixed route to address reflects administrators knowledge

  • Adapting to Topology Change

    AA BB

    CCDD

    Can an alternate route substitute for a failed route?

  • Adapting to Topology Change

    AA BB

    CCDD

    XX

  • Adapting to Topology Change

    AA BB

    CCDD

    XX

    Can an alternate route substitute for a failed route?

    YesWith dynamic routing enabled

  • Data Link Layer

    It uniquely identifies each device in the Network.

    It translates data from Network Layer into bits for the Physical layer to transmit.

    It formats the messages into Data Frames

    Adds a customized header containing Source and Destination hardware address

    This layer works with Frames

    This layer is logically divided in two sub-layers:

    LLC (Logical Link Control)

    MAC (Media Access Control)

  • Physical Layer

    Electrical and Mechanical settings are provided at this layer.

    Transmits data in the form of bits.

    This layer communicates directly with actual communication media.

    At this layer DCE & DTE are identified

    DCE (Data Circuit-Terminating Equipment)

    Located at Service Providers side

    DTE (Data Terminal Equipment)

    The attached device at customer Place eg. Modem

    Services available to a DTE is most often accessed via a Modem or Channel Service Unit (CSU) Data Service Unit (DSU).

    HUBs & REPEATERS are working at this layer.

    Max. troubleshooting occurs at this layer.

  • 2002, Cisco Systems, Inc. All rights reserved.

  • DOD MODEL

  • The DoD Model The Process / Application Layer

    The Host-to-Host Layer

    The Internet Layer

    The Network Layer

  • The DoD & OSI

    Application

    Application

    Presentation

    Session

    Transport

    Network

    Data Link

    Physical

    Host-to-Host

    Internet

    Network

    Access

    DoD Model OSI Model

  • Process/Application Layer

    The Process / Application layer defines protocols for node-to-node application communication and

    also controls user-interface specification.

    A vast array of protocols combine at this layer of DoDs Model to integrate the activities and duties of upper layer of OSI.

    Examples for this layer are :

    Telnet, FTP, TFTP, NFS, SMTP, SNMP, DNS

    DHCP, BootP etc.

  • Host-to-Host Layer

    The Host-to-Host layer parallels the functions of the OSIs Transport layer

    It performs the following:

    Defining protocols for setting up the level of transmission service for Applications

    It tackles issues like creating reliable ene-to-end communication.

    It ensures the error free delivery of data

    It handles packet sequencing and maintains data integrity.

  • Internet Layer

    Internet Layer corresponds to the OSIs Network Layer.

    It performs the following:

    Designating the protocols relating to the logical transmission of packets over the entire network.

    It takes care of the addressing of hosts by giving them an IP address.

    It handles routing of packets among multiple networks.

  • Network Access Layer

    This layer is equivalent of the Data Link and Physical Layer of OSI model.

    It performs the following It monitors the data exchange between the host and

    the network.

    Network Access Layer overseas hardware addressing and defines protocols for the physical transmission of the Data.

    Lets have a look on how TCP/IP Protocol suit relates to the DoD model layers.

  • TCP/IP Protocol Suit at DoD

    DoD Model

    Process /

    Application

    Host-to-Host

    Internet

    Network

    Access

    TCP/IP Protocol Suit

    Telnet FTP LPD SNMP

    X WindowNFSSMTPTFTP

    TCP UDP

    ICMP

    Ethernet

    ARP RARP

    IP

    Fast

    Ethernet

    Token

    Ring FDDI

    BootP

  • LOWER LAYERS

    PROTOCOLS

  • Common LAN Technologies

    Ethernet

    Token Ring

    FDDIFDDI

    Dual Ring

    TokenRing

  • Ethernet

    1999, Cisco Systems, Inc. www.cisco.com

  • Introduction

    Ethernet is a methodology for accessing a media

    It allows all hosts on a network to share the same bandwidth of a link.

    It is popular because :

    It is easy to implement & Troubleshoot

    It is easy to add new technologies like Fast Ethernet and Gigabit Ethernet to existing infrastructure.

    Ethernet uses Data Link Layer and Physical Layer Specification

    It uses something called CSMA/CD

  • Ethernet Operation

    AA BB CC DD

  • Ethernet Operation

    AA BB CC DD

    D

    Data Link

    Network

    Transport

    Session

    Presentation

    Application

    Physical

  • Ethernet Operation

    AA BB CC DD

    D

    Data Link

    Network

    Transport

    Session

    Presentation

    Application

    Physical

    B and C

    Data Link

    Network

    Transport

    Session

    Presentation

    Application

    Physical

  • Ethernet LANs:How do they work?

    Multiple workstations are connected to a

    segment

    Each station has to take turns sending traffic

    All stations listen to all traffic on their segment

    Stations can only send data (Ethernet Frames)

    when no one else is

    sending

  • Ethernet LANs:MAC Addresses

    Every workstation has a Network Interface

    Card (NIC)

    Every NIC has a unique MAC address

    Stations use MAC addresses to send

    Ethernet Frames to a

    specific station

    0000.0c12.3456

    0000.0c12.11110000.1018.321a

  • Ethernet LANs:Unicast Frames

    Ethernet frames contain the MAC address of the

    station that the frame

    was sent to

    These are called unicast frames

    All stations receive the Ethernet frame, but

    ignore the frames that

    are not addressed to

    their MAC address

    0000.0c12.3456

    0000.0c12.11110000.1018.321a

    Frame

    To: 0000.0c12.3456

  • Ethernet LANs:Broadcast Frames

    Some Ethernet frames are sent to all stations

    These are called broadcast frames

    All stations process this frame

    0000.0c12.3456

    0000.0c12.11110000.1018.321a

    Frame

    To: FFFF.FFFF.FFFF

  • Flow Control Mechanism

    on Ethernet

    CSMA/CD is the mechanism that

    regulates the segment

    Each station listens for other traffic before they

    transmit

    PacketFrame

  • Ethernet Collisions

    Sometimes stations transmit simultaneously

    Two frames on the same segment collide

    Collisions require each station to wait and resend

    Collision!

    PacketFrame PacketFrame

    Packe

    t

    Packe

    tFrameFrame

  • Ethernet Reliability

    B C DA

    B C DAFigure 1

    Figure 2

    Collision

  • Ethernet Reliability

    Collision

    C

    B C DA

    BA D

    JAMJAMJAMJAMJAM JAM

  • Ethernet Reliability

    B C DA

    Collision

    B C DA

    JAMJAMJAMJAMJAM JAM

    Carrier sense multiple access with collision detection (CSMA/CD)

  • CSMA/CD CSMA/CD stands for Carrier Sense Multiple Access /

    Collision Detect.

    It is used by all NICs in Ethernet Networking

    In this method all NICs first sense whether the cable is free or not.

    If it is free the request is sent otherwise it waits.

  • Half Duplex Ethernet

    It is defined in 802.3 Ethernet specifications

    It uses only one wire pair for signals running in both direction.

    CSMA/CD is used to prevent collision.

    Half Duplex typically 10base T is 50-60 % efficient. (In CISCO views)

    In a large 10 base T network you only get 3 to 4 MBPS at most.

  • Full Duplex

    Full Duplex Ethernet uses two pairs of wires.

    It uses Point-to-Point connection

    There is no collision in Full Duplex

    Full Duplex is suppose to offer 100% efficiency in both direction

    Means you can get 20 MBPS in 10 MBPS or 200 MBPS in Fast Ethernet running Full

    Duplex.

  • Auto Detect Mechanism

    When a Full Duplex port is powered on, it first checks with remote end and decides whether it can run on 10 or 100 MBPS.

    Then it checks to see whether it can run Full duplex or half duplex.

    This is called Auto Detect Mechanism.

  • Ethernet Addressing Ethernet Addressing uses MAC Address

    MAC addresses are burned on every NIC

    It is a 48-bit address

    It is written in the same format even if different LAN Technologies are used.

    Organizationally

    Unique Identifier (OUI)

    (Assigned by IEEE)

    Vender Assigned

    24 bits 24 bits

    Ethernet Addressing using MAC Addresses

  • Ethernet and IEEE 802.3

    Benefits and background

    Ethernet is the most popular physical layer LAN technology because it strikes a good balance between speed, cost, and ease of installation

    Supports virtually all network protocols

    Xerox initiated, then joined by DEC & Intel in 1980

    Revisions of Ethernet specification

    Fast Ethernet (IEEE 802.3u) raises speed from 10 Mbps to 100 Mbps

    Gigabit Ethernet is an extension of IEEE 802.3 which increases speeds to 1000 Mbps, or 1 Gbps

  • Ethernet and IEEE 802.3

    Several framing variations exist for this common LAN technology

  • Ethernet Frames

    Frames are used at the Data Link Layer to encapsulate packets coming down for transmission on a type of Media Access

    Types of Media Access Contention (Ethernet)

    Token Passing (Token Ring or FDDI) We will be covering only Contention, as rest all are beyond the scope of our course.

  • DataSource add FCSLengthDest add

    Variable266 4

    0000.0C xx.xxxx

    Vendor assigned

    IEEE assigned

    MAC Layer - 802.3

    MAC SUB-LAYER

    Preamble

    Ethernet II

    uses Type here and

    does not use

    802.2.

    MAC Address

    8# Bytes

  • Preamble

    It allows the receiving devices to lock the incoming bit stream.

    The Peamble is used to indicate to the receiving station that the data portion of

    the message will follow.

  • Destination Address (DA)

    DA is used by receiving stations to determine if an incoming packet is addressed to a particular node.

    Uses LSB (Least Significant Bit) first

    Destination can be individual, multicast or broadcast Broadcast will be all 1s or Fs and will be sent to

    all.

    Multicast will be sent to the specific subnet

  • Source Address (SA)

    SA is a 48 bit MAC Address supplied by the transmitting device.

    Broadcast and Multicast address formats are illegal within the SA fields.

    It uses LSB (Least significant bit first)

  • Length or Type Field

    802.3 uses length field where as Ethernet frame uses type field to identify the network layer

    protocol.

    802.2 can identify upper-layer protocol and must be used with 802.3 frame.

  • Data

    This is the packet sent down to the Data Link Layer from the Network layer.

    The size can vary from 46-1500 bytes.

  • Frame Check Sequence (FCS)

    FCS is a field at the end of the frame that is used to store the cyclic redundancy

    check.

  • DataDest

    SAP

    Source

    SAP

    DataSource add FCSLengthDest add

    Variable11

    802.2 (SAP)

    MAC Layer - 802.3

    Data Link Layer Functions (cont.)

    Ctrl

    1 or 2

    3 2

    Preamble

    DataDest SAP

    AASource SAP

    AA

    Variable11

    802.2 (SNAP)

    Ctrl

    03

    1 or 2

    OR

    OUI

    IDType

    # Bytes

    # Bytes

  • 802.2 Frame

    802.2 Frame has two new fields DSAP (Destination Service Access Pointer)

    SSAP (Source Service Access Pointer)

    802.2 frame type is nothing but 802.3 frame with LLC information

    Because of the LLC information we know what upper layer protocol is.

  • SNAP Frame The SNAP Frame has its own protocol field to identify

    the upper layer protocol. To Identify SNAP Frame:

    DSAP and SSAP fields are always AA to indicate that this is a SNAP header coming up.

    it is an LLC data unit (sometimes called a Logical Protocol Data Unit (LPDU)) of Type 1 (indicated by 03)

    The SNAP header then indicates the vender via the Organisational Unique Identifier (OUI) and the protocol type via the Ethertype field

    CISCO uses SNAP frame with their proprietary protocol CDP (CISCO Discovery Protocol)

  • EXAMPLE - SNAP

    In the example above we have the OUI as

    00-00-00 which means that there is an Ethernet

    frame, and the Ethertype of 08-00 which

    indicates IP as the protocol.

  • ETHERNET

    CABLING

  • Network Cabling

    Media connecting network components NIC cards take turns transmitting on the cable

    LAN cables only carry one signal at a time

    WAN cables can carry multiple signals simultaneously

    Three primary types of cabling Twisted-pair (or copper)

    Coaxial cable

    Fiber-optic cable

  • Twisted-Pair (UTP and STP)

    Speed and throughput: 10/100 Mbps

    Relative cost: Least costly

    Media and connector size: Small

    Maximum cable length: 100 m

    RJ-45

    Connector

    Color-Coded

    Plastic Insulation

    Twisted-Pair

    Outer Jacket

    STP only:

    Shielded Insulation

    to Reduce EMI

  • Coaxial Cable

    Speed and throughput: 10/100 Mbps

    Relative cost: More than UTP, but still low

    Media and connector size: Medium

    Maximum cable length: 200/500 m

    OuterJacketBraided Copper Shielding

    Plastic Insulation

    Copper Conductor

    BNC Connector

  • Fiber-Optic Cable

    Outer JacketKevlar Reinforcing

    Material

    Plastic

    Shield Glass Fiber

    and Cladding

    Speed and throughput: 100+ Mbps

    Average cost per node: Most expensive

    Media and connector size: Small

    Maximum cable length: Up to 2 km

  • Optical Fiber

    Metal cables transmit signals in the form of electric current

    Optical fiber is made of glass or plastic and transmits signals in the form of light.

    Light, a form of electromagnetic energy, travels at 300,000 Kilometers/second ( 186,000 miles/second), in

    a vaccum.

    The speed of the light depends on the density of the medium through which it is traveling ( the higher

    density, the slower the speed).

  • Ethernet Local Area Network Ethernet was first created and implemented by a group called

    DIX (Digital, Intel and Xerox).

    The first Ethernet specification was modified by IEEE and IEEE 802.3 was created.

    This was a 10Mbps network running on co-axial, twisted pair and fiber physical media.

    IEEE 802.3 was further modified by IEEE only and 802.3u (Fast Ethernet) and 802.3g (Gigabit Ethernet) was created.

    802.3u and 802.3g are specified only on twisted pair and fiber physical media.

  • LAN

    speed (bps)

    100BaseFX

    Base = basebandBroad = broadband

    Indicates type of cable

    and maximum length.

    If a number,

    max. length = # x 100 m

    Ethernet Protocol Names

  • Cable Specification

    Cables Distance Throughput EthernetStandard

    Connectors

    Co-axialThinnet

    185 Mtrs. 10 MBPS 10Base2 T-connector

    Co-axialThicknet

    500 Mtrs. 100 MBPS 10Base5 AUI

    Category 3 100 Mtrs. 10 MBPS 10BaseT RJ-45

    Category 5 100 Mtrs. 100 MBPS 10BaseX /Fast Ethernet

    RJ-45

  • UTP Connections (RJ-45) UTP Cables have eight colored wire.

    These wires are twisted into 4 pairs

    Four (two pairs) carry the voltage and are considered tip.

    The more twists per inch in the wire, the less interference.

    CAT 5 & 6 have many more twists per inch than CAT 3 UTP.

  • Crimping There are two types of Crimping used with UTP cables and

    RJ-45 connectors. Straight-Through

    This is used while connecting Router to a Hub or Switch Server to Hub or Switch Workstation to a Hub or Switch

    CrossoverThis is used while connecting Uplinks between Switches Hubs to Switches Hub to another Hub Router Interface to another Router Interface

  • UTP Implementation

    Straight-through

    Wires on cable ends are in same order

    Pin Label

    1 RD+

    2 RD-

    3 TD+

    4 NC

    5 NC

    6 TD-

    7 NC

    8 NC

    Cable 10BaseT/100BaseTx Straight-through

    Pin Label

    1 TD+

    2 TD-

    3 RD+

    4 NC

    5 NC

    6 RD-

    7 NC

    8 NC

    Server/Router

    81

    wg

    g bwo

    wb

    o brwbr

    1

    8

    Straight-through Cable

    8

    1Hub/Switch

    81

    wg

    g bwo

    wb

    o brwbr

  • UTP Implementation

    Crossover

    Some wires on cable ends are crossed

    8 1

    wo

    ob wg

    wb

    gbr wbr

    Cable 10BaseT/100BaseT Crossover

    Pin Label

    1 RD+

    2 RD-

    3 TD+

    4 NC

    5 NC

    6 TD-

    7 NC

    8 NC

    Pin Label

    1 RD+

    2 RD-

    3 TD+

    4 NC

    5 NC

    6 TD-

    7 NC

    8 NC

    Crossover Cable

    1

    8 1

    8

    8 1

    wg

    gwb

    wo

    b obr wbr

    Hub/Switch Hub/Switch

  • CISCO MODEL

  • 118

    Network Structure Defined by

    Hierarchy

    Distribution

    Layer

    Core Layer

    Access

    Layer

  • The Three Layers are :

    Core Layer

    Distribution Layer

    Access Layer

  • 120

    Core Layer Characteristics

    Fast transport to enterprise services

    No packet manipulation

    Core Layer

  • Core Layer is actually the core of the network.

    It is responsible for transporting large amount of traffic reliably and quickly.

    Core Layer failure affects each individual user, hence fault tolerance becomes an issue at this layer.

    Core layer is likely to see large volume of traffic, hence speed and latency is the driving concerns.

    There are few thing we do not want to do at core layer but few things are recommended to do at this layer.

    Core Layer

  • 122

    Distribution Layer Characteristics

    Access Layer Aggregation Point

    Routes traffic

    Broadcast/Multicast Domains

    Media Translation

    Security

    Possible point for remote access

    Distribution Layer

  • It is sometimes also referred as workgroup layer.

    It is communication point between Access Layer and Core Layer.

    Routing, Filtering & WAN Access is the Primary function of the distribution layer.

    Network policies are implemented at Distribution Layer.

    Best path is determined and request are forwarded to Core Layer.

    Distribution Layer

  • At Distribution LayerWe do the following:

    Implementation of tools like access lists, packet filtering etc.

    Implementation of security and network policies like address translation and firewalls

    Redistribution between routing protocols, including static routing

    Routing between VLANs

    Definition of Broadcast and Multicast Domains

  • 125

    Access Layer Characteristics

    End station entry point to the network

    Access Layer

  • The Access Layer Access Layer controls users and workgroup

    access to network resources.

    This layer is also referred to as Desktop Layer.

    Continues access control and policies from distribution layer

    Creation of separate collision domains (segmentation)

    Workgroup connectivity into the distribution layer

  • 2002, Cisco Systems, Inc. All rights reserved.

  • UPPER LAYER PROTOCOLS

  • What Is TCP/IP?

    A suite of protocols

    Rules that dictate how packets of information are sent across

    multiple networks

    Addressing

    Error checking

  • TCP/IP Protocol The Transmission Control Protocol/Internet Protocol

    (TCP/IP) suit was created by the Department of Defense (DoD).

    The Internet Protocol can be used to communicate across any set of interconnected networks.

    TCP/IP supports both LAN and WAN communications.

    IP suite includes not only Layer 3 and 4 specifications but also specifications for common applications like e-mail, remote login, terminal emulation and file transfer.

    The TCP/IP protocol stack maps closely to the OSI model in the lower layers.

  • The DoD & OSI

    Application

    Application

    Presentation

    Session

    Transport

    Network

    Data Link

    Physical

    Host-to-Host

    Internet

    Network

    Access

    DoD Model OSI Model

  • TCP/IP Protocol Suit at DoD

    DoD Model

    Process /

    Application

    Host-to-Host

    Internet

    Network

    Access

    TCP/IP Protocol Suit

    Telnet FTP LPD SNMP

    X WindowNFSSMTPTFTP

    TCP UDP

    ICMP

    Ethernet

    ARP RARP

    IP

    Fast

    Ethernet

    Token

    Ring FDDI

    BootP

  • TCP/IP Applications

    Application layer File Transfer Protocol (FTP)

    Remote Login (Telnet)

    E-mail (SMTP)

    Transport layer Transport Control Protocol (TCP)

    User Datagram Protocol (UDP)

    Network layer Internet Protocol (IP)

    Data link & physical layer LAN Ethernet, Token Ring, FDDI, etc.

    WAN Serial lines, Frame Relay, X.25, etc.

  • Internet Layer Overview

    In the OSI reference model, the network layer corresponds to the TCP/IP Internet layer.

    Internet Protocol (IP)

    Internet Control MessageProtocol (ICMP)

    Address ResolutionProtocol (ARP)

    Reverse AddressResolution Protocol (RARP)

    Application

    Transport

    Internet

    Data-Link

    Physical

  • Internet Protocol

    Provides connectionless,best - effort delivery routing of datagrams.

    IP is not concerned with the content of the datagrams.

    It looks for a way to move the datagrams to their destination.

  • IP Datagram

    Version

    (4)

    Destination IP Address (32)

    Options (0 or 32 if Any)

    Data (Varies if Any)

    1Bit 0 Bit 15 Bit 16 Bit 31

    Header

    Length (4)Type

    of Service (8)Total Length (16)

    Identification (16)Flags

    (3) Fragment Offset (13)

    Time-to-Live (8) Protocol (8) Header Checksum (16)

    Source IP Address (32)

    20

    Bytes

  • IP Datagram Version Currently used IP version

    Header Length Datagram header length

    TOS Level of importance assigned by a particular upper-layer protocol

    Total Length- Length of packet in bytes including Data and Header

    Identification Identifies current datagram (Sequence Number)

    Flags Specifies whether the packet can be fragmented or not

    Fragment Offset Used to piece together datagram fragments

    TTL It maintains a counter that gradually decreases, in increments, to zero

    Protocol It indicates which upper-layer protocol receives incoming packets

    Header Checksum Calculated checksum of the header to check its integrity

    Source IP Address Sending node IP Address

    Destination IP Address Receiving node IP Address

    Options It allows IP to support various options like security

    Data Upper layer information (maximum 64Kb)

  • Determines destination upper-layer protocol

    Protocol Field

    Transport

    Layer

    Internet

    Layer

    TCP UDP

    Protocol

    Numbers

    IP

    176

  • Address Resolution Protocol

    (ARP) ARP works at Internet Layer of DoD Model

    It is used to resolve MAC address with the help of a known IP address.

    All resolved MAC addresses are maintained in ARP cache table is maintained.

    To send a datagram this ARP cache table is checked and if not found then a broadcast is sent

    along with the IP address.

    Machine with that IP address responds and the

    MAC address is cached.

  • Address Resolution Protocol

    172.16.3.1 172.16.3.2

    IP: 172.16.3.2 = ???

    I need the

    Ethernet

    address of

    176.16.3.2.

  • Address Resolution Protocol

    172.16.3.1 172.16.3.2

    IP: 172.16.3.2 = ???

    I heard that broadcast.

    The message is for me.

    Here is my Ethernet

    address.

    I need the

    Ethernet

    address of

    176.16.3.2.

  • Address Resolution Protocol

    172.16.3.1

    IP: 172.16.3.2

    Ethernet: 0800.0020.1111

    172.16.3.2

    IP: 172.16.3.2 = ???

    I heard that broadcast.

    The message is for me.

    Here is my Ethernet

    address.

    I need the

    Ethernet

    address of

    176.16.3.2.

  • Address Resolution Protocol

    Map IP Ethernet

    172.16.3.1

    IP: 172.16.3.2

    Ethernet: 0800.0020.1111

    172.16.3.2

    IP: 172.16.3.2 = ???

    I heard that broadcast.

    The message is for me.

    Here is my Ethernet

    address.

    I need the

    Ethernet

    address of

    176.16.3.2.

  • RARP (Reverse ARP) This also works at Internet Layer. It works exactly opposite of ARP

    It resolves an IP address with the help of a known MAC addres.

    DHCP is the example of an RARP implementation.

    Workstations get their IP address from a RARP server or DHCP server with the help of RARP.

  • Reverse ARP

    Ethernet: 0800.0020.1111 IP = ???

    What is

    my IP

    address?

  • Reverse ARP

    Ethernet: 0800.0020.1111 IP = ???

    What is

    my IP

    address?

    I heard that

    broadcast.

    Your IP

    address is

    172.16.3.25.

  • Reverse ARP

    Ethernet: 0800.0020.1111

    IP: 172.16.3.25

    Ethernet: 0800.0020.1111 IP = ???

    What is

    my IP

    address?

    I heard that

    broadcast.

    Your IP

    address is

    172.16.3.25.

  • Reverse ARP

    Map Ethernet IP

    Ethernet: 0800.0020.1111

    IP: 172.16.3.25

    Ethernet: 0800.0020.1111 IP = ???

    What is

    my IP

    address?

    I heard that

    broadcast.

    Your IP

    address is

    172.16.3.25.

  • Bootstrap Protocol (BootP)

    BootP stands for BootStrap Protocol.

    BootP is used by a diskless machine to learn the following:

    Its own IP address

    The IP address and host name of a server machine.

    The boot filename of a file that is to be loaded into memory and executed at boot-up.

    BootP is an old program and is now called the DHCP.

  • DHCP (Dynamic Host Configuration Protocol)

    The DHCP server dynamically assigns IP address to hosts.

    All types of Hardware can be used as a DHCP server, even a Cisco Router.

    BootP can also send an operating system that a host can boot from. DHCP can not perform this function.

    Following information is provided by DHCP while host registers for an IP address:

    IP Address

    Subnet mask

    Domain name

    Default gateway (router)

    DNS

  • Internet Control Message

    Protocol

    Application

    Transport

    Internet

    Data-Link

    Physical

    Destination

    Unreachable

    Echo (Ping)

    Other

    ICMP

    1

    ICMP messages are carried in IP datagrams and used to send error and control messages.

  • ICMP Ping

  • Transport Layer Overview

    Transmission ControlProtocol (TCP)

    User Datagram Protocol (UDP)

    Application

    Transport

    Internet

    Data-Link

    Physical

    Connection-

    Oriented

    Connectionless

  • Transmission Control Protocol

    (TCP)

    TCP works at Transport Layer

    TCP is a connection oriented protocol.

    TCP is responsible for breaking messages into segments and reassembling them.

    Supplies a virtual circuit between end-user application.

  • TCP Segment Format

    Source Port (16) Destination Port (16)

    Sequence Number (32)

    Header

    Length (4)

    Acknowledgment Number (32)

    Reserved (6) Code Bits (6) Window (16)

    Checksum (16) Urgent (16)

    Options (0 or 32 if Any)

    Data (Varies)

    20

    Bytes

    Bit 0 Bit 15 Bit 16 Bit 31

  • TCP Segment Format Source port Number of the calling port

    Destination Port Number of the called port

    Sequence Number Number used to ensure correct sequencing of the arriving data

    Acknowledgement Number Next expected TCP octet

    Header Length Length of the TCP header

    Reserved Set to zero

    Code Bits Control Functions (setup and termination of a session)

    Window Number of octets that the sender is willing to accept

    Checksum Calculated checksum of the header and data fields

    Urgent Pointer Indication of the end of the urgent data

    Options One option currently defined (maximum TCP segment size)

    Data Upper layer protocol data

  • Port Numbers

    TCP

    Port

    Numbers

    FTP

    Transport

    Layer

    TELNET

    DNS

    SNMP

    TFTP

    SMTP

    UDP

    Application

    Layer

    21 23 25 53 69 161

    RIP

    520

  • TCP Port Numbers

    Source

    Port

    Destination

    Port

    Host A

    1028 23

    SP DP

    Host ZTelnet Z

    Destination port = 23.

    Send packet to my

    Telnet

    application.

  • Send SYN (seq = 100 ctl = SYN)

    SYN Received

    Send SYN, ACK (seq = 300 ack = 101 ctl = syn,ack)

    Established(seq = 101 ack = 301 ctl = ack)

    Host A Host B

    1

    2

    3

    SYN Received

    TCP Three-Way Handshake/Open

    Connection

  • Window Size = 1

    Sender Receiver

    Send 1Receive 1

    Receive ACK 2 Send ACK 2

    Send 2Receive 2

    Receive ACK 3Send ACK 3

    Send 3Receive 3

    Receive ACK 4 Send ACK 4

    TCP Simple Acknowledgment

  • TCP Sequence and

    Acknowledgment Numbers

    Source

    Port

    Destination

    Port

    Sequence Acknowledgment

    1028 23

    Source Dest.

    11

    Seq.

    2

    Ack.

    1028 23

    Source Dest.

    10

    Seq.

    1

    Ack.

    102823

    Source Dest.

    11

    Seq.

    1

    Ack.

    .

    I just got number

    10, now I need

    number 11.

    I just

    sent number

    10

  • Window Size = 3Send 2

    TCP Windowing

    Sender Window Size = 3Send 1

    Window Size = 3Send 3

    ACK 3Window Size = 2

    Packet 3 Is

    Dropped

    Window Size = 3Send 4

    Window Size = 3Send 3

    ACK 5Window Size = 2

    ReceiverWindow Size = 3

  • UDP (User Datagram

    Protocol) A connectionless and unacknowledged protocol. UDP is also responsible for transmitting messages.

    But no checking for segment delivery is provided.

    UDP depends on upper layer protocol for reliability.

    TCP and UDP uses Port no. to listen to a particular services.

  • No sequence or acknowledgment fields

    UDP Segment Format

    Source Port (16) Destination Port (16)

    Length (16)

    Data (if Any)

    1Bit 0 Bit 15 Bit 16 Bit 31

    Checksum (16)

    8

    Bytes

  • UDP Segment Format

    Source port Number of the calling port

    Destination Port Number of the called port

    Length Number of bytes, including header and data

    Checksum Calculated checksum of the header and data fields

    Data Upper layer protocol data

  • Application Layer Overview

    *Used by the Router

    Application

    Transport

    Internet

    Data-Link

    Physical

    File Transfer- TFTP*- FTP*- NFS

    E-Mail- SMTP

    Remote Login- Telnet*- rlogin*

    Network Management- SNMP*

    Name Management- DNS*

  • Telnet

    Telnet is used for Terminal Emulation.

    It allows a user sitting on a remote machine to access the resources of another machine.

    It allows you to transfer files from one machine to another.

    It also allows access to both directories and files.

    It uses TCP for data transfer and hence slow but reliable.

  • Network File System (NFS)

    It is jewel of protocols specializing in file sharing.

    It allows two different types of file systems to interoperate.

    This is striped down version of FTP.

    It has no directory browsing abilities.

    It can only send and receive files.

    It uses UDP for data transfer and hence faster

    but not reliable.

  • LPD (Line Printer Daemon)

    The Line Printer Protocol is designed for Printer sharing.

    The LPD along with the LPR (Line Printer Program) allows print jobs to spooled and sent to the networks printers using TCP/IP.

    X Window X-windows defines a protocol for the writing of

    graphical user interface-based client/Server

    application.

  • Simple Network Management

    Protocol SNMP enable a central management of

    Network.

    Using SNMP an administrator can watch the entire network.

    SNMP works with TCP/IP.

    IT uses UDP for transportation of the data.

  • DNS (Domain Name Service)

    DNS resolves FQDNs with IP address.

    DNS allows you to use a domain name to specify and IP address.

    It maintains a database for IP address and Hostnames.

    On every query it checks this database and resolves the IP.

  • 2002, Cisco Systems, Inc. All rights reserved.

  • Unique addressing allows communication between end stations.

    Path choice is based on destination address.

    Location is represented by an address

    Introduction to TCP/IP

    Addresses

    172.18.0.2

    172.18.0.1

    172.17.0.2172.17.0.1

    172.16.0.2

    172.16.0.1

    SA DAHDR DATA10.13.0.0 192.168.1.0

    10.13.0.1 192.168.1.1

  • IPv4 Addressing

    32-bit addresses

    Commonly expressed in dotted decimal format (e.g., 192.168.10.12)

    Each dotted decimal is commonlycalled an octet (8 bits)

  • IP Addressing

    255 255 255 255

    DottedDecimal

    Maximum

    Network Host

    32 bits

  • IP Addressing

    255 255 255 255

    DottedDecimal

    Maximum

    Network Host

    128

    64

    32

    16 8 4 2 1

    11111111 11111111 11111111 11111111Binary

    32 bits

    1 8 9 16 17 24 25 32

    128

    64

    32

    16 8 4 2 1

    128

    64

    32

    16 8 4 2 1

    128

    64

    32

    16 8 4 2 1

  • IP Addressing

    255 255 255 255

    DottedDecimal

    Maximum

    Network Host

    128

    64

    32

    16 8 4 2 1

    11111111 11111111 11111111 11111111

    10101100 00010000 01111010 11001100

    Binary

    32 bits

    172 16 122 204ExampleDecimal

    ExampleBinary

    1 8 9 16 17 24 25 32

    128

    64

    32

    16 8 4 2 1

    128

    64

    32

    16 8 4 2 1

    128

    64

    32

    16 8 4 2 1

  • Class A:

    Class B:

    Class C:

    Class D: Multicast

    Class E: Research

    IP Address Classes

    Network Host Host Host

    Network Network Host Host

    Network Network Network Host

    8 bits 8 bits 8 bits 8 bits

  • IP AddressingClass A

    10.222.135.17

    Network # 10

    Host # 222.135.17

    Range of class A network IDs: 1126

    Number of available hosts: 16,777,214

  • IP AddressingClass B

    128.128.141.245

    Network # 128.128

    Host # 141.245

    Range of class B network IDs: 128.1191.254

    Number of available hosts: 65,534

  • IP AddressingClass C

    192.150.12.1

    Network # 192.150.12

    Host # 1

    Range of class C network IDs: 192.0.1223.255.254

    Number of available hosts: 254

  • IP Network Address Classes

    0000000001111111

    10111111

    1111111111011111

    00000000 00000000

    11111111

    11111111 00000000 00000000

    00000000

    # Networks

    126

    16,384

    2,097,152

    # Hosts

    254

    65,534

    16,777,214

    Class

    A

    B

    C

    Class A 35.0.0.0

    Class B 128.5.0.0

    Class C 132.33.33.0 Network Address Space

    Host Address Space

    Example

  • IP Address Classes

    1

    Class A:

    Bits:

    0NNNNNNN Host Host Host

    8 9 16 17 24 25 32

    Range (1-126)

    1

    Class B:

    Bits:

    10NNNNNN Network Host Host

    8 9 16 17 24 25 32

    Range (128-191)

    1

    Class C:

    Bits:

    110NNNNN Network Network Host

    8 9 16 17 24 25 32

    Range (192-223)

    1

    Class D:

    Bits:

    1110MMMM Multicast Group Multicast Group Multicast Group

    8 9 16 17 2425 32

    Range (224-239)

  • Private Addresses

    Class A 10.0.0.0 to 10.255.255.255

    Class B 172.16.0.0 to 172.31.255.255

    Class C 192.168.0.0 to 192.168.255.255

  • 11111111

    Determining Available Host

    Addresses

    172 16 0 0

    10101100 00010000 00000000 00000000

    16

    15

    14

    13

    12

    11

    10 9 8 7 6 5 4 3 2 1

    Network Host

    00000000 00000001

    11111111 1111111111111111 11111110

    ...

    ...

    00000000 00000011

    11111101

    123

    655346553565536-

    ...

    2

    65534

    N

    2N-2 = 216-2 = 65534

  • Subnet Mask

    172 16 0 0

    255 255 0 0

    255 255 255 0

    IP

    Address

    Default

    Subnet

    Mask

    8-bit

    Subnet

    Mask

    Network Host

    Network Host

    Network Subnet Host

    Also written as /16 where 16 represents the number of 1s in the mask.

    Also written as /24 where 24 represents the number of 1s in the mask.

    11111111 11111111 00000000 00000000

  • Decimal Equivalents of Bit

    Patterns

    1 0 0 0 0 0 0 0 = 128

    1 1 0 0 0 0 0 0 = 192

    1 1 1 0 0 0 0 0 = 224

    1 1 1 1 0 0 0 0 = 240

    1 1 1 1 1 0 0 0 = 248

    1 1 1 1 1 1 0 0 = 252

    1 1 1 1 1 1 1 0 = 254

    1 1 1 1 1 1 1 1 = 255

    128 64 32 16 8 4 2 1

  • 16

    Network Host

    172 0 0

    10101100

    11111111

    10101100

    00010000

    11111111

    00010000

    00000000

    00000000

    10100000

    00000000

    00000000

    Subnets not in usethe default

    00000010

    Subnet Mask without Subnets

    172.16.2.160

    255.255.0.0

    Network

    Number

  • Network number extended by eight bits

    Subnet Mask with Subnets

    16

    Network Host

    172.16.2.160

    255.255.255.0

    172 2 0

    10101100

    11111111

    10101100

    00010000

    11111111

    00010000

    11111111

    00000010

    10100000

    00000000

    00000000

    00000010

    Subnet

    Network

    Number128

    192

    224

    240

    248

    252

    254

    255

  • Subnet Mask with Subnets

    (cont.)Network Host

    172.16.2.160

    255.255.255.192

    10101100

    11111111

    10101100

    00010000

    11111111

    00010000

    11111111

    00000010

    10100000

    11000000

    10000000

    00000010

    Subnet

    Network number extended by ten bits

    16172 2 128

    Network

    Number128

    192

    224

    240

    248

    252

    254

    255

    128

    192

    224

    240

    248

    252

    254

    255

  • Addressing Summary Example

    16172 2 160

    10101100 00010000 1010000000000010 Host

    Mask

    Subnet

    Broadcast

    Last

    First

    172.16.2.160

    255.255.255.192

    4

    1

  • Addressing Summary Example

    10101100

    11111111

    00010000

    11111111 11111111

    10100000

    11000000

    00000010 Host

    Mask

    Subnet

    Broadcast

    Last

    First

    172.16.2.160

    255.255.255.192

    1

    2

    16172 2 160

  • Addressing Summary Example

    10101100

    11111111

    00010000

    11111111 11111111

    10100000

    11000000

    00000010 Host

    Mask

    Subnet

    Broadcast

    Last

    First

    172.16.2.160

    255.255.255.192

    1

    2

    3

    7

    16172 2 160

  • Addressing Summary Example

    10101100

    11111111

    00010000

    11111111 11111111

    10100000

    11000000

    10000000

    00000010 Host

    Mask

    Subnet

    Broadcast

    Last

    First

    172.16.2.160

    255.255.255.192

    1

    2

    3

    4

    16172 2 160

  • Addressing Summary Example

    10101100

    11111111

    00010000

    11111111 11111111

    10100000

    11000000

    10000000

    00000010

    10111111

    Host

    Mask

    Subnet

    Broadcast

    Last

    First

    172.16.2.160

    255.255.255.192

    1

    2

    3

    4

    5

    6

    16172 2 160

  • Addressing Summary Example

    10101100

    11111111

    00010000

    11111111 11111111

    10100000

    11000000

    10000000

    00000010

    10111111

    10000001

    Host

    Mask

    Subnet

    Broadcast

    Last

    First

    172.16.2.160

    255.255.255.192

    1

    2

    3

    4

    5

    6

    16172 2 160

  • Addressing Summary Example

    10101100

    11111111

    00010000

    11111111 11111111

    10100000

    11000000

    10000000

    00000010

    10111111

    10000001

    10111110

    Host

    Mask

    Subnet

    Broadcast

    Last

    First

    172.16.2.160

    255.255.255.192

    1

    2

    3

    4

    5

    6

    7

    16172 2 160

  • Addressing Summary Example

    10101100

    11111111

    10101100

    00010000

    11111111

    00010000

    11111111

    00000010

    10100000

    11000000

    10000000

    00000010

    10101100 00010000 00000010 10111111

    10101100 00010000 00000010 10000001

    10101100 00010000 00000010 10111110

    Host

    Mask

    Subnet

    Broadcast

    Last

    First

    172.16.2.160

    255.255.255.192

    1

    2

    3

    4

    5

    6

    7

    8

    16172 2 160

  • Addressing Summary Example

    10101100

    11111111

    10101100

    00010000

    11111111

    00010000

    11111111

    00000010

    10100000

    11000000

    10000000

    00000010

    10101100 00010000 00000010 10111111

    10101100 00010000 00000010 10000001

    10101100 00010000 00000010 10111110

    Host

    Mask

    Subnet

    Broadcast

    Last

    First

    172.16.2.160

    255.255.255.192

    172.16.2.128

    172.16.2.191

    172.16.2.129

    172.16.2.190

    1

    2

    3

    4

    5

    6

    7

    89

    16172 2 160

  • Variable-Length

    Subnet Masks

    2001, Cisco Systems, Inc. 3-2003-200

  • What Is a Variable-Length Subnet Mask?

    HQ172.16.0.0/16

  • HQHQ172.16.0.0/16

    What Is a Variable-Length Subnet Mask? (cont.)

  • 172.16.14.32/27

    172.16.14. 64/27

    172.16.14.96/27

    C

    B

    A

    Subnet 172.16.14.0/24 is divided into smaller subnets:

    Subnet with one mask at first (/27)

    HQHQ172.16.0.0/16

    What Is a Variable-Length Subnet Mask? (cont.)

  • 172.16.14.32/27

    172.16.14. 64/27

    172.16.14.96/27

    Subnet 172.16.14.0/24 is divided into smaller subnets:

    Subnet with one mask at first (/27)

    Then further subnet one of the unused /27 subnets into multiple /30 subnets

    C

    B

    A

    HQHQ172.16.0.0/16

    What Is a Variable-Length Subnet Mask? (cont.)

  • Calculating VLSMs

    Subnetted Address: 172.16.32.0/20

    In Binary 10101100. 00010000.00100000.00000000

  • Calculating VLSMs (cont.)

    VLSM Address: 172.16.32.0/26

    In Binary 10101100. 00010000.00100000.00000000

    Subnetted Address: 172.16.32.0/20

    In Binary 10101100. 00010000.00100000.00000000

  • Network Subnet VLSM

    subnet

    Host

    10101100 . 00010000 .0010 0000.00 000000=172.16.32.0/261st subnet:

    VLSM Address: 172.16.32.0/26

    In Binary 10101100. 00010000.00100000.00000000

    Subnetted Address: 172.16.32.0/20

    In Binary 10101100. 00010000.00100000.00000000

    Calculating VLSMs (cont.)

  • Subnetted Address: 172.16.32.0/20

    In Binary 10101100. 00010000.00100000.00000000

    VLSM Address: 172.16.32.0/26

    In Binary 10101100. 00010000.00100000.00000000

    1st subnet: 10101100 . 00010000 .0010 0000.00 000000=172.16.32.0/26

    172 . 16 .0010 0000.01 000000=172.16.32.64/26

    172 . 16 .0010 0000.10 000000=172.16.32.128/26

    172 . 16 .0010 0000. 1 000000=172.16.32.192/26

    172 . 16 .0010 0001.00 000000=172.16.33.0/26

    Network Subnet VLSM

    Subnet

    Host

    1

    2nd subnet:

    3rd subnet:

    4th subnet:

    5th subnet:

    Calculating VLSMs (cont.)

  • A Working VLSM Example

    Derived from the 172.16.32.0/20 Subnet

  • A Working VLSM Example

    (cont.)

    172.16.32.0/26

    172.16.32.64/26

    172.16.32.128/26

    172.16.32.192/26

    26 bit mask

    (62 hosts)

    Derived from the 172.16.32.0/20 Subnet

  • Derived from the

    172.16.33.0/26 Subnet

    30 bit mask

    (2 hosts)

    172.16.32.0/26

    172.16.32.64/26

    172.16.32.128/26

    172.16.32.192/26

    26 bit mask

    (62 hosts)

    Derived from the 172.16.32.0/20 Subnet

    A Working VLSM Example

    (cont.)

  • 172.16.33.0/30

    172.16.33.4/30

    172.16.33.8/30

    172.16.33.12/30

    Derived from the

    172.16.33.0/26 Subnet

    30-Bit Mask

    (2 Hosts)

    172.16.32.0/26

    172.16.32.64/26

    172.16.32.128/26

    172.16.32.192/26

    26-Bit Mask

    (62 Hosts)

    Derived from the 172.16.32.0/20 Subnet

    A Working VLSM Example

    (cont.)

  • Route Summarization

    2001, Cisco Systems, Inc. 3-213

  • What Is Route Summarization?

    Routing table

    172.16.25.0/24

    172.16.26.0/24

    172.16.27.0/24

    172.16.27.0/24

    172.16.26.0/24

    172.16.25.0/24

    A

  • What Is Route

    Summarization? (cont.)

    Routing protocols can summarize addresses of several networks into one address

    I can route to the 172.16.0.0/16 network.

    Routing Table

    172.16.0.0/16

    B

    Routing Table

    172.16.25.0/24

    172.16.26.0/24

    172.16.27.0/24

    172.16.27.0/24

    172.16.26.0/24

    172.16.25.0/24

    A

  • Summarizing Within an Octet

    172.16.168.0/24 = 10101100 . 00010000 . 10101 000 . 00000000

    Number of Common Bits = 21

    Summary: 172.16.168.0/21

    Noncommon

    Bits = 11

    172.16.169.0/24 = 172 . 16 . 10101 001 . 0

    172.16.170.0/24 = 172 . 16 . 10101 010 . 0

    172.16.171.0/24 = 172 . 16 . 10101 011 . 0

    172.16.172.0/24 = 172 . 16 . 10101 100 . 0

    172.16.173.0/24 = 172 . 16 . 10101 101 . 0

    172.16.174.0/24 = 172 . 16 . 10101 110 . 0

    172.16.175.0/24 = 172 . 16 . 10101 111 . 0

  • Summarizing Addresses in

    a VLSM-Designed Network

    CorporateNetwork

    172.16.0.0/16

    172.16.128.0/20

    172.16.32.64/26

    172.16.32.0/24

    172.16.32.128/26

    A

    B

    C

    D172.16.64.0/20

  • Classless

    Interdomain Routing

    2001, Cisco Systems, Inc. 3-218

  • Classless Interdomain Routing

    Mechanism developed to alleviate exhaustion of addresses and reduce

    routing table size

    Blocks of Class C addresses assigned to ISPsISPs assign subsets of address space to organizations

    Blocks are summarized in routing tables

  • CIDR Example

    ISP

    H

    B

    192.168.8.0/24

    192.168.9.0/24

    192.168.15.0/24

    Networks 192.168.8.0/24 through 192.168.15.0/24 are summarized by the ISP in one advertisement

    192.168.8.0/21

    A

    192.168.8.0/21192.168.9.0/24

  • 2002, Cisco Systems, Inc. All rights reserved.

  • WAN Basics

  • A network that serves users across a broad geographic area

    Often uses transmission devices provided by public carriers (Pacific Bell, AT&T, etc.)

    This service is commonly referred to as plain old telephone service (POTS)

    WANs function at the lower three layers of the OSI reference model

    Physical layer, data link layer, and network layer

    What Is a WAN?

  • WAN Overview

    Service

    Provider

    WANs connect sites

    Connection requirements vary depending on user requirements and cost

  • What is a

    WAN?

    A WAN is a data communications network that covers a relatively broad geographic

    area and often uses transmission facilities provided by common carriers, such as

    telephone companies. WAN technologies function at the lower three layers of the OSI

    reference model: the physical layer, the data link layer, and the network layer.

  • WAN connection types

    Point-to-Point Links or Leased Lines

    Circuit Switching

    Packet Switching

  • Point-to-Point Links or

    Leased Lines

    A point-to-point link is also known as a leased line because its

    established path is permanent and fixed for each remote network reached

    through the carrier facilities. It uses synchronous serial lines upto 45

    Mbps

  • Leased Line

    One connection per physical interface

    Bandwidth: 56 kbps1.544 Mbps

    Cost effective at 46 hours daily usage

    Dedicated connections with predictable throughput

    Permanent

    Cost varies by distance

  • Dedicated physical circuit established, maintained, and terminated through a carrier network for each

    communication session

    Datagram and data stream transmissions

    Operates like a normal telephone call

    Example: ISDN

    WANModem Modem

    Circuit Switching

  • Sets up line like a phone call. No data can transfer before the end-to-end

    connection is established.

    Uses dial-up modems and ISDN. It is used for low-bandwidth data transfers.

    Circuit Switching

  • POTS Using Modem Dialup

    Widely available

    Easy to set up

    Dial on demand

    Asynchronous transmission

    Low cost, usage-based

    Lower bandwidth access requirements

    Telecommuters

    Mobile

    Users

    Modem

    Corporate Network

    Server

    ModemAccess Router

    Basic

    Telephone

    Service

  • Integrated Services Digital

    Network (ISDN)

    High bandwidth

    Up to 128 Kbps per basic rate interface

    Dial on demand

    Multiple channels

    Fast connection time

    Monthly rate plus cost-effective, usage-based billing

    Strictly digital

    LAN

    Server

    Company Network

    Telecommuter/After-

    Hours, Work-at-

    Home

    BRI

    2B+DBRI/PRI

    23B+D

    30B+D (Europe)

    ISDN

  • Network devices share a point-to-point link to transport packets from a source to a destination across a carrier

    network

    Statistical multiplexing is used to enable devices to share these circuits

    Examples: ATM, Frame Relay, X.25

    WANModem Modem

    MultiplexingDemultiplexing

    Packet Switching

  • WAN switching method that allows you to sharebandwidth with other companies to save money.

    Think of packet switching networks as a party line. As long as you are not constantly transmit-ting data and are instead

    using bursty data transfers, packet switching can save you

    a lot of money. However, if you have constant data

    transfers,then you will need to get a leased line.

    Frame Relay and X.25 are packet-switching technologies. Speeds can range from 56Kbps to 2.048Mbps.

    Packet Switching

  • Frame Relay

    Permanent, not dialup

    Multiple connections per physical interface (permanent virtual circuits)

    Efficient handling of bursty (peak performance period) data

    Guaranteed bandwidth (typical speeds are 56/64 Kbps, 256 Kbps, and 1.544 Mbps)committed information rate (CIR)

    Cost varies greatly by region

    Permanent Virtual Circuit (PVC)

  • X.25

    Very robust protocol for low-quality lines

    Packet-switched

    Bandwidth: 9.6 kbps64 kbps

    Well-established technology; large installed base

    Worldwide availability

    X.25DCE

    DTE DTE

    DCE

  • Asynchronous Transfer Mode

    (ATM)

    Technology capable of transferring voice, video, and data through private and public networks

    Uses VLSI technology to segment data, at high speeds, into units called cells

    5 bytes of header information

    48 bytes of payload

    53 bytes total

    Cells contain identifiers that specify the data stream to which they belong

    Primarily used in enterprise backbones or WAN links

    DataHeader

    5 48

  • Cabling the WAN

    Core_

    Server core_sw_a

    ISDN Cloud

    Legend

    FastEthernet/

    Ethernet

    ISDN

    Dedicated

    core_sw_b core_sw_b

    ISL

    Leased Line/

    Frame Relay

  • WAN Physical Layer

    Implementations

    Physical layer implementations vary

    Cable specifications define speed of linkP

    PP

    Fra

    me

    Rela

    y

    EIA/TIA-232

    EIA/TIA-449

    X.21 V.24 V.35

    HSSI

    ISDN BRI (with PPP)

    RJ-45

    NOTE: Pinouts are

    different than RJ-45

    used in campus

    HD

    LC

  • Differentiating Between WAN

    Serial ConnectorsRouter connections

    Network connections at the CSU/DSU

    EIA/TIA-232 EIA/TIA-449 EIA-530V.35 X.21

    CSU/

    DSU

    End user

    device

    DTE

    DCE

    Service

    provider

  • Data Terminal Equipment

    End of the users deviceon the WAN link

    Data Communications Equipment End of the WAN providers

    side of the communication facility

    DCE is responsible for clocking

    DCEDTE

    Modem

    CSU/DSU

    S S

    SS

    SS

    DTE DTEDCE DCE

    Serial Implementation of

    DTE versus DCE

  • WAN Terminating Equipment

    Modem

    Data Terminal EquipmentDTE

    Data Circuit-Terminating Equipment

    The Service Providers

    Equipment

    DCE

    EIA/TIA-232

    V.35

    X.21

    HSSITo Corporate

    Network

    The Customers Equipment

    WAN Provider

    (Carrier) Network

    Physical Cable Types

    Usually on the

    CustomersPremises

    Router

  • Serial Transmission

    WAN Serial connectors use serial transmission Serial transmission uses one bit at time over a

    single channel. Parallel transmission can use 8 bits at a time,

    but all WANs use serial transmission. Cisco Routers use a proprietary 60 pin serial

    connector. Connector at the other end of the cable will

    depend on your service provider or end device requirements.

  • LAN/WAN Devices

    1999, Cisco Systems, Inc.www.cisco.com

  • Hubs

    Bridges

    Switches

    Routers

    LAN/WAN Devices

  • Hub

    Device that serves as the center of a star topology network, sometimes

    referred to as a multiport repeater,

    no forwarding intelligence

  • Hubs

    123

    124

    125

    126

    127

    128

    Hub

    Amplifies signals

    Propagates signals through the network

    Does not filter data packets based on destination

    No path determination or switching

    Used as network concentration point

  • Hubs Operate at Physical layer

    A B C D

    Physical

    All devices in the same collision domain

    All devices in the same broadcast domain

    Devices share the same bandwidth

  • Hubs: One Collision Domain

    More end stations means more collisions

    CSMA/CD is used

  • Bridge

    Device that connects and passes packets between two network

    segments.

    More intelligent than hubanalyzes incoming packets and forwards (or

    filters) them based on addressing

    information.

  • Bridge

    Segment 1 Segment 2

    123

    124

    125

    126

    127

    128

    Corporate Intranet

    Hub Hub

    More intelligent than a hubcan analyze incoming packets and forward (or filter) them based on addressing information

    Collects and passes packets between two network segments

    Maintains address tables

    Bridge Example

  • Switches

    Use bridging technology to forward traffic between ports.

    Provide full dedicated data transmission rate between two stations that are directly connected to the switch ports.

    Build and maintain address tables called content-addressable memory (CAM).

  • 10-Mbps

    UTP Cable

    Dedicated

    Workstation

    31

    Switch

    Corporate Intranet

    32

    3336

    100 Mbps 100 Mbps

    Uses bridging technology to forward traffic (i.e. maintains address tables, and can filter)

    Provides full dedicated transmission rate between stations that are connected to switch ports

    Used in both local-area and in wide-area networking

    All types availableEthernet, Token Ring, ATM

    SwitchingDedicated Media

    35

    34

  • Each segment has its own collision domain

    All segments are in the same broadcast domain

    Data Link

    Switches and Bridges Operate

    at Data Link Layer

    OR1 2 3 1 24

  • Switches

    Each segment has its own collision domain

    Broadcasts are forwarded to all segments

    Memory

    Switch

  • Routers

    Interconnect LANs and WANs

    Provide path determination using metrics

    Forward packets from one network to another

    Control broadcasts to the network

  • Routing Table

    NET INT Metric

    124

    S0S0E0

    100

    1.0 4.0

    1.3

    E0

    4.3

    S0

    2.2

    E0

    2.1

    S0

    4.1

    4.2

    1.1

    1.2

    Routing Table

    NET INT Metric

    124

    E0S0S0

    001

    Logical addressing allows for hierarchical network Configuration required Uses configured information to identify paths to networks

    Network Layer Functions (cont.)

  • Routers: Operate at the

    Network Layer

    Broadcast control

    Multicast control

    Optimal path determination

    Traffic management

    Logical addressing

    Connects to WAN services

  • Using Routers to Provide

    Remote Access

    Internet

    Telecommuter

    Branch Office

    Modem or ISDN TA

    Mobile User

    Main Office

  • Network Device Domains

    Hub Bridge Switch Router

    Collision Domains:

    1 4 4 4

    Broadcast Domains:

    1 1 1 4

  • 2002, Cisco Systems, Inc. All rights reserved.

  • Product Selection

    Considerations

    Provides functionality and features you need today

    Capacity and performance

    Easy installation and centralized management

    Provides network reliability

    Investment protection in existing infrastructure

    Migration path for change and growth

    Seamless access for mobile users and branch offices

  • Selection Issues:

    Scale of the routing features needed

    Port density/variety requirements

    Capacity and performance

    Common user interface

    Cisco

    700/800

    Series

    Cisco

    1600/1700

    Series

    Cisco

    2500

    Series

    Cisco

    3600

    Series

    AS

    5000

    Series

    Small Office Solutions

    Branch Office Solutions

    Central Site Solutions

    Cisco

    12000 GSR

    Series

    Cisco

    7000

    Series

    Cisco

    10000

    Series

    Home Office Solutions

    Cisco

    2600

    Series

    Cisco Router Products

  • Visual Objective

    Use the product selection tool to

    select Cisco Equipment

  • Router 7200

  • Router 7300

  • Router 7500

  • Router 7600

  • Router 10000

  • Router 12000

  • Fixed and Moduler Interfaces

    Some Cisco Routers have fixed interfaces while other are modular.

    2500 series routers have set interfaces that cant be changed.

    The 2501 Router has two serial connections one 10BaseT AUI interface.

    If you need to add a third serial connection you need to buy a new router.

    The 1600, 1700, 2600, 3600 and higher routers have modular interfaces.

    These Routers allow you to buy what you need and add almost any type of interface you may need later.

  • Fixed Interfaces

    2500 Routerrear view

    Serial WAN ports can be fixed

  • Console

    1603 Routerrear view

    Ethernet AUIEthernet 10BaseT ISDN BRI S/T

    Serial WAN ports can be modular

    3640 Routerrear view

    Modular Interfaces

    Module

    WAN

    Interface

    Card

  • Router Internal Components

  • RAM

    It contains the software and data structures that allow the router to function.

    The principal software running in RAM is

    the Cisco IOS image and the running

    configuration. Some routers, such as the

    2500 series, run IOS from Flash and not

    RAM.

  • ROM Functions

    Contains microcode for basic functions

  • POST : The microcode used to test the basic functionality of the router hardware and to

    determine what components are present.

    ROM

  • ROM

    Bootstrap code : the bootstrap code is used to bring the router up during initialization. It contains microcode for basic functions to start and maintain the router. It reads the configuration register to determine how to boot and then, if instructed to do so, loads the IOS software.

  • ROM monitor : A low-level operating system normally used for manufacturing, testing and troubleshooting.

    A partial IOS : This partial IOS can be used to load a new software image into Flash memory and to perform

    some other maintainence operations. It does not

    support the IP routing and most other routing

    functions. Sometimes, this subset of the IOS is

    referred to as RXBOOT code.

    ROM

  • Flash memory

    Flash memory : is used to contain the IOS software image. Some router run IOS image

    directly from Flash and do not need to

    transfer it to RAM.

  • NVRAM

    NVRAM : is used mainly to store the configuration. NVRAM uses a battery to

    maintain the data when the power is removed

    from the router.

  • Configuration Register

    Configuration Register : is used to control how the router boots up.

  • Configurations can come from many sources.

    Configurations will act in device memory.

    External Configuration Sources

  • Basics of Cisco IOS IOS Software delivers Network Services and enables network

    services.

    Cisco IOS enable the following network services:

    Features to carry the chosen network protocols & functions.

    Connectivity to provide high-speed traffic between devices.

    Security to control access and discourage unauthorized network use.

    Scalability to add interfaces and capability as the need for networking grows.

    Reliability to ensure dependable access to networked resources.

  • Cisco IOS software delivers network services and enables networked

    applications.

    Cisco IOS Software Features

  • A CLI is used to enter commands.

    Operations vary on different internetworking devices.

    Users type or paste entries in the console command modes.

    Enter key instructs device to parse and execute the command.

    Two primary EXEC modes are user mode and privileged mode.

    Command modes have distinctive prompts.

    Cisco IOS User Interface

    Functions

  • Setting Up A Console

    Connection

    PCs require an RJ-45-to-DB-9 or RJ-45-to-DB-25 adapter.

    COM port settings are 9600 bps, 8 data bits, no parity, 1 stop bit, no flow control.

    This provides out-of-band console access.

    AUX switch port may be used for a modem-connected console.

    Device with Console

  • Console Connection Console connection is required to configure the router for the

    first time.

    All Cisco devices are shipped with one Console cable.

    It allows you to connect a device and configure, verify and monitor it.

    The cable is a rollover cable with RJ-45 connectors

    Pinouts for the rollover cable is:

    1-8 4-5 7-2

    2-7 5-4 8-1

    3-6 6-3 ---

  • Setup terminal emulation program to run at 9600 bps

    8 data bits

    no parity

    1 stop bit

    no flow control

    Most of the router has an auxiliary port which can connect to a modem This will give you console access to a remote router. The console port and auxiliary port are considered out-of-band

    management since you are configuring router out of the network Telnet is considered in-band.

    Console Connection

  • System startup routines initiate router software

    Router falls back to startup alternatives if needed

    Initial Startup of the Cisco

    Router

  • Router Power-On/Bootup

    Sequence

    1. Perform power-on self test (POST).

    2. Load and run bootstrap code.

    3. Find the Cisco IOS software.

    4. Load the Cisco IOS software.

    5. Find the configuration.

    6. Load the configuration.

    7. Run the configured Cisco IOS software.

  • Router Configuration from

    CLI First method of Router configuration is Setup utility

    allows a basic initial configuration

    Command Line Interface (CLI) can be used for more complex and specific configurations

    CLI provides following modes of operation:

    User Mode

    EXEC Mode

    Terminal Configuration / Global Configuration Mode

    Terminal configuration Mode gives you access to different configuration Modes.

  • Unconfigured Versus Configured Router

    Bootup Output from the Router

  • Router#setup

    --- System Configuration Dialog ---

    Continue with configuration dialog? [yes/no]: yes

    At any point you may enter a question mark '?' for help.

    Use ctrl-c to abort configuration dialog at any prompt.

    Default settings are in square brackets '[]'.

    Basic management setup configures only enough connectivity

    for management of the system, extended setup will ask you

    to configure each interface on the system

    Would you like to enter basic management setup? [yes/no]: no

    Setup: The Initial

    Configuration Dialog

  • Setup Interface Summary

    First, would you like to see the current interface summary? [yes]:

    Interface IP-Address OK? Method Status Protocol

    BRI0 unassigned YES unset administratively down down

    BRI0:1 unassigned YES unset administratively down down

    BRI0:2 unassigned YES unset administratively down down

    Ethernet0 unassigned YES unset administratively down down

    Serial0 unassigned YES unset administratively down down

    Interfaces Found During Startup

  • Setup Initial

    Global Parameters

    Configuring global parameters:

    Enter host name [Router]:wg_ro_c

    The enable secret is a password used to protect access to

    privileged EXEC and configuration modes. This password, after

    entered, becomes encrypted in the configuration.

    Enter enable secret: cisco

    The enable password is used when you do not specify an

    enable secret password, with some older software versions, and

    some boot images.

    Enter enable password: sanfran

    The virtual terminal password is used to protect

    access to the router over a network interface.

    Enter virtual terminal password: sanjose

    Configure SNMP Network Management? [no]:

  • Setup Initial

    Protocol Configurations

    Configure LAT? [yes]: no

    Configure AppleTalk? [no]:

    Configure DECnet? [no]:

    Configure IP? [yes]:

    Configure IGRP routing? [yes]: no

    Configure RIP routing? [no]:

    Configure CLNS? [no]:

    Configure IPX? [no]:

    Configure Vines? [no]:

    Configure XNS? [no]:

    Configure Apollo? [no]:

  • Setup Interface

    ParametersBRI interface needs isdn switch-type to be configured

    Valid switch types are :

    [0] none..........Only if you don't want to configure BRI.

    [1] basic-1tr6....1TR6 switch type for Germany

    [2] basic-5ess....AT&T 5ESS switch type for the US/Canada

    [3] basic-dms100..Northern DMS-100 switch type for US/Canada

    [4] basic-net3....NET3 switch type for UK and Europe

    [5] basic-ni......National ISDN switch type

    [6] basic-ts013...TS013 switch type for Australia

    [7] ntt...........NTT switch type for Japan

    [8] vn3...........VN3 and VN4 switch types for FranceChoose ISDN BRI Switch Type [2]:

    Configuring interface parameters:

    Do you want to configure BRI0 (BRI d-channel) interface? [no]:

    Do you want to configure Ethernet0 interface? [no]: yes

    Configure IP on this interface? [no]: yes

    IP address for this interface: 10.1.1.33

    Subnet mask for this interface [255.0.0.0] : 255.255.255.0

    Class A network is 10.0.0.0, 24 subnet bits; mask is /24

    Do you want to configure Serial0 interface? [no]:

  • Setup Script

    Review and UseThe following configuration command script was created:

    hostname Router

    enable secret 5 $1$/CCk$4r7zDwDNeqkxFO.kJxC3G0

    enable password sanfran

    line vty 0 4

    password sanjose

    no snmp-server

    !

    no appletalk routing

    no decnet routing

    ip routing

    no clns routing

    no ipx routing

    no vines routing

    no xns routing

    no apollo routing

    isdn switch-type basic-5ess

    interface BRI0

    shutdown

    no ip address

    !

    interface Ethernet0

    no shutdown

    ip address 10.1.1.31 255.255.255.0

    no mop enabled

    !

    interface Serial0

    shutdown

    no ip address

    end

    [0] Go to the IOS command prompt without saving this config.

    [1] Return back to the setup without saving this config.

    [2] Save this configuration to nvram and exit.

    Enter your selection [2]:

  • Logging In to the Router

  • There are two main EXEC modes for entering commands.

    Cisco IOS Software EXEC

    Mode

  • You can abbreviate a command to the fewest characters that make a unique character string.

    Router User-Mode

    Command Listwg_ro_c>?

    Exec commands:

    access-enable Create a temporary Access-List entry

    atms