44
Week Six Agenda • Attendance • Announcements • Review Week Five • Current Week Information • Upcoming Assignments

Week Six Agenda

  • Upload
    casey

  • View
    41

  • Download
    0

Embed Size (px)

DESCRIPTION

Week Six Agenda. Attendance Announcements Review Week Five Current Week Information Upcoming Assignments. Review Week Five . Routing in the Enterprise Architecture. Routing in the Enterprise Architecture. Notice that RIP is not a part of an enterprise design - PowerPoint PPT Presentation

Citation preview

Page 1: Week Six Agenda

Week Six Agenda• Attendance• Announcements• Review Week Five• Current Week Information• Upcoming Assignments

Page 2: Week Six Agenda

Review Week Five

Page 3: Week Six Agenda

Routing in the Enterprise Architecture

Page 4: Week Six Agenda

Routing in the Enterprise Architecture

Notice that RIP is not a part of an enterprise design

• It is considered to be too slow to converge

• It is not recommended for large networks

• However, it may be adequate for small networks and may be present in older (legacy)networks

Page 5: Week Six Agenda

EIGRPThe Enhanced Interior Gateway Routing Protocol (EIGRP) represents an evolution from its predecessor IGRP.Key capabilities that distinguish EIGRP from other routing protocols include fast convergence, support for variable-length subnet mask, support for partial updates, and support for multiple network layer protocols.

Page 6: Week Six Agenda

EIGRPA router running EIGRP stores all its neighbors' routing tables so that it can quickly adapt to alternate routes. If no appropriate route exists, EIGRP queries its neighbors to discover an alternate route. These queries propagate until an alternate route is found.

Page 7: Week Six Agenda

OSPFOSPF protocol was developed due to a need in the Internet community to introduce a high functionality non-proprietary Internal Gateway Protocol (IGP) for the TCP/IP protocol family.The OSPF protocol is based on link-state technology, which is a departure from the Bellman-Ford vector based algorithms used in traditional Internet routing protocols such as RIP. OSPF has introduced new concepts such as authentication of routing updates, Variable Length Subnet Masks (VLSM), route summarization, and so forth.

Page 8: Week Six Agenda

BGPThe Border Gateway Protocol (BGP) is the routing protocol used to exchange routing information across the Internet. It makes it possible for ISPs to connect to each other and for end-users to connect to more than one ISP. BGP is the only protocol that is designed to deal with a network of the Internet's size, and the only protocol that can deal well with having multiple connections to unrelated routing domains.

Page 9: Week Six Agenda
Page 10: Week Six Agenda

IP secInternet Protocol security (IPsec) is a framework of open standards for protecting communications over Internet Protocol (IP) networks through the use of cryptographic security services. IPsec supports network-level peer authentication, data origin authentication, data integrity, data confidentiality (encryption), and replay protection.

Page 11: Week Six Agenda

Routers One of the primary jobs of a router is to determine the best path to a given destination.

A router learns paths, or routes, from the static configuration entered by an administrator or dynamically from other routers, through routing protocols

Page 12: Week Six Agenda

Static RoutingStatic routes in the routing tableIncludes: network address and subnet mask and IP address of next hop router or exit interfaceDenoted with the code S in the routing tableRouting tables must contain directly connected networks used to connect remote networks before static or dynamic routing can be used.

Page 13: Week Six Agenda

Static Routing

Page 14: Week Six Agenda

Dynamic RoutingDynamic routing protocols are used to add

remote networks to a routing tableAre used to discover networksAre used to update and maintain routing tablesAutomatic network discoveryNetwork discovery is the ability of a routing protocol to share information about the networks that it knows about with other routers that are also using the same routing protocol.

Page 15: Week Six Agenda

Dynamic Routing

Maintaining routing tablesDynamic routing protocols are used to share

routing information with other router and to maintain and up date their own routing table.

Dynamic routing protocols not only make a best path determination to various networks, they will also determine a new best path if the initial path becomes unusable (or if the topology changes)

Page 16: Week Six Agenda

Routing TableRouters keep a routing table in RAM

A routing table is a list of the best known available routes.

Routers use this table to make decisions about how to forward a packet.

On a Cisco router the show ip route command is used to view the TCP/IP routing table.

Page 17: Week Six Agenda

Routing LoopsA network problem in which packets continue to be routed in an endless circle.It is caused by a router or line failure, and the notification of the downed link has not yet reached all the other routers.It can also occur over time due to normal growth or when networks are merged together.Routing protocols utilize various techniques to lessen the chance of a routing loop.

Page 18: Week Six Agenda

Introduction to WANsA wide area network (WAN) is a computer network that covers a broad area. Typically, it is any network whose communications links cross metropolitan, regional, or national boundaries. WAN transmission facilities are generally provided by service providers (SP), such as telephone companies that charge a usage fee called, a tariff.

Page 19: Week Six Agenda

WAN Connection TypesConnecting LANs together over a data communications

equipment (DCE) networkDedicated WANs utilize synchronous serial

connections. DrawingCircuit-switched WANs use telephone company

networks with asynchronous serial, and ISDN. Drawing

Packet-switched WANs use a service provider with synchronous serial. Drawing

Page 20: Week Six Agenda

WAN Connection TypesLeased lines are typically point-to-point connections or a dedicated connection. The WAN connection path from the CPE, through the DCE switch, to the CPE of the remote site, allowing DTE to communicate at any time with no setup procedures before transmitting data. It uses synchronous serial lines up to 45 Mbps. Excellent for constant transmission data flow.Circuit-switching sets up a line like a phone call. No data can transfer before the end-to-end connection is established. Circuit switching uses dial-up modems and ISDN. It is used for low-bandwidth data transfers.

Page 21: Week Six Agenda

WAN Connection TypesPacket switching is a WAN switching method that allows you to share bandwidth with other companies to save money. Packet switching is excellent for bur sty data transfers, packet switching can save you money. Frame relay and X.25 are packet-switching technologies . Speeds can range from 56Kbps to 2.048Mbps.

Page 22: Week Six Agenda

WAN Connection TypesTime Division Multiplexing (TDM) is a technique for assigning bandwidth on a single wire, based on pre-assigned time slots, to data from several channels. Bandwidth is allocated to each channel regardless of a station’s ability to send data.

Page 23: Week Six Agenda

WAN Connection Types

Page 24: Week Six Agenda

WAN ProtocolsPoint-to-Point Protocol (PPP) is an industry standard protocol. PPP can be used to create point-to-point links between different vendors’ equipment. It allows authentication and multilink connections and can be run over asynchronous and synchronous links.Asynchronous Transfer Mode (ATM) was created for time sensitive traffic, providing simultaneous transmission of voice, video, and data. ATM uses cells rather than packets that are a fixed 53-bytes long.

Page 25: Week Six Agenda

WAN ProtocolsHigh-Level Data Link Control (HDLC)Data Link protocolDesignates a method for data encapsulation on synchronous serial links Default encapsulation for Cisco routersBit oriented layer protocol created by ISO.The HDLC header carries no identification of the type of protocol being carried inside the HDLC encapsulation. Because of this, each vendor that uses HDLC has their own way of identifying the Network layer protocol, which means that each vendor’s HDLC is proprietary for their equipment.

Page 26: Week Six Agenda

WAN Protocols Link Access Procedure, Balanced (LAPB)

Connection-oriented protocol at the Data Link layerPossesses much overhead because of strict timeout and windowing techniquesLAPB is used instead of the lower-overhead HDLC if your link is very error prone

Page 27: Week Six Agenda

WAN Protocols Integrated Services Digital Network (ISDN)

is a service offered by telephone companies, It is a communication protocol that allows telephone networks to carry data, voice, and other digital traffic.

ISDN network is a digital communication system that is capable of producing the maximum transmission speed of 1.4Mbps. 128Kbps speed is however more common in the digital technology. It's a international standard for sending data, voice, video over regular digital telephone lines. ISDN uses UTP (unshielded twisted pair cable) for transmission.

Page 28: Week Six Agenda

WAN ProtocolsFrame Relay is a packet switching protocol for connecting devices on a Wide Area Network (WAN). Frame Relay networks in the U.S. support data transfer rates at T-1 (1.544Mbps ) and T-3 (45 Mbps) speeds. In fact, you can think of Frame Relay as a way of utilizing existing T-1 and T-3 lines owned by a service provider. Most telephone companies now provide Frame Relay service for customers who want connections at 56 Kbps to T-1 speeds. (In Europe, Frame Relay speeds vary from 64 Kbps to 2 Mbps.

Page 29: Week Six Agenda

WAN Protocols Multiprotocol Label Switching (MPLS) replaces the

hop-by-hop, individually routed packet model with a connection-oriented model that establishes ‘paths’ to destinations.  Instead of routing each packet based upon its destination address, each packet is labeled such that it can be switched along a pre-defined path.  Thus, a single destination may have multiple paths leading to it, with one path used for voice, one for video, and one for data. MPLS integrates Layer 2 information about network links (bandwidth, latency, utilization) into Layer 3 (IP) within a particular autonomous system or ISP in order to simplify and improve IP packet exchange.

Page 30: Week Six Agenda

WAN Protocols Which WAN service is the best one to use?

Answer: None of them. The best WAN service is the one you can get in your neighborhood or at your company.

Page 31: Week Six Agenda

Transmission Modes Digital transmission, is binary codes of 0 and 1.for

transmission. It is necessary to notify the receiving end of precise information such as where the data starts and how long the interval of data is. “Synchronous”and“asynchronous”are the two modes for communicating this information, and it is necessary to confirm which mode a each end supports. With Synchronous Transmission Mode, 64 kbps is the highest available transmission speed, while 57.6 kbps is the highest for Asynchronous Transmission Mode. Drawings

Page 32: Week Six Agenda

Transmission ModesSynchronous signals, signals that play the role of signs, are added to the top of the data to be transmitted. With these signals, computers can precisely determine the first position of the characters. This mode can transmit data accurately, making it appropriate for corporate information networks. Synchronous Transmission Mode

0111111001101100110001Synchronous Signal Data First Char Data Second Char 01111110 01101100 11000101

Page 33: Week Six Agenda

Transmission ModesAsynchronous signals, instead, use a portion of the data that has arrived as a clue, the first position of the character is identified. Two bits are added to each character, a start bit for the beginning and an end bit for the end, making the transmission speed slower. Asynchronous Transmission Mode

001101100101100010110 Start Stop Start Stop 0011011001 0110001011 Data First Char Data Second Char

Page 34: Week Six Agenda

Packet-Switched Network TopologiesStar topology is a LAN physical topology with endpoints on the network converging at a common central switch (known as a hub) using point-to-point links. A logical ring topology can be configurated as a physical star topology using a unidirectional closed-loop star rather than point-to-point links. That is, connections within the hub are arranged in an internal ring. DrawingFull mesh topology is where every node has either a physical or a virtual circuit linking it to every other network node. A full mesh supplies a great deal of redundancy but is typically reserved for network backbones because of its expense. Drawing

Page 35: Week Six Agenda

Packet-Switched Network TopologiesPartially meshed topology is where some network nodes form a full mesh, but others are attached to only one or two nodes in the network. Drawing

Observe the WAN Transport Technology table on pages 298 and 299 in your text book.

Page 36: Week Six Agenda

WAN Transport TechnologiesDS0 Rate is known as the base channel bandwidth of 64Kbps. A bandwidth of 64Kbps is the bandwidth required for an uncompressed digitized phone conversation.

Standard speech less then 4KHz; analog speech is filtered at 4KHz before being sampled.

Nyquist Theorem sample at a rate at least two times the input frequency to obtain a signal that represents the true signal.Each sample is encoded into 8 bit octets. This DS0 rate is 8KHz. Per second times 8 bits per sample, which is 64Kbps.

Page 37: Week Six Agenda

TechnologiesMetro Ethernet technology is based on Ethernet technology to offer the best cost-effective, high speed connectivity for MAN and WAN.DSL technology is a high-bandwidth technology over the traditional copper lines. It is designed to work with two modems at either end of the wire. DSL is a transmission technology that is used by SPs to deliver a wide range of services to subscribers.Asymmetric DSL (ADSL) used over short distances (less then 21meters). Most common type used. Frequency range 100KHz to 1.1Hz. ADSL allows PSTN telephone service concurrently on the same line.

Page 38: Week Six Agenda

TechnologiesSymmetric (SDSL) DSL allows traffic to be transmitted in both directions at the same speed over a single twisted pair. The distance served with SDSL is 10K feet or 3048.8 meters. SDSL is often referred to as single-pair DSL. SDSL is excellent for running applications like email and web servers.Ling Reach Ethernet (LRE) is a WAN access technology which allows for greater distance than the traditional Ethernet provides.Cable technology is another high-speed copper platform that supports both analog and digital video services over a coaxial cable.

Page 39: Week Six Agenda

TechnologiesCabling technology makes use channels for upstream and downstream data flow. One application channel in the coaxial cable is used to upstream signals from the modem to the Cable Modem Termination System (CMTS). The output from the CMTS is handed to either the WAN or the PSTN. A different channel is used for the downstream signals from these Internet Service Providers to the CMTS to the modem.The CMTS converts signals from the modem to IP packets prior to handing them to the IP router for transmission across the Internet. Downstream signals are modulated for transmission across the cable to the modem.

Page 40: Week Six Agenda
Page 41: Week Six Agenda

TechnologiesInternet download bandwidth over a cable TV line is shared 27 Mbps. Internet upstream bandwidth over the same shared cable is 2.5 Mbps.Wireless technology electromagnetic waves carry RF signals. It is the option of some, that these waves could be harmful to humans.Synchronous Optical Network/Digital Hierarchy (SONET/SDH) is the ANSI standard for synchronous transmission on fiber optic media. It specifies a base signal rate (OC-1) of 51.84 Mbps and a set of multiples of that rate, known as Optical Carrier levels, up to 9.5 Gbps for OC-192.

Page 42: Week Six Agenda

TechnologiesSONET/SDH is a circuit based technology that provided uses high speed circuits using TDM framing.Dark fiber is a fiber optic cable(s) leased from an SP. Fiber is typically connected to a company’s own infrastructure. Dark fiber got its name after the dot-com burst. Many of the companies that had the rights to these fiber networks either went bankrupt, or, had to abandon their goals of utilizing this fiber. This resulted in hundreds of thousands of miles of “unlit” (dark) fiber. Dark fiber is optical fiber that is lying in the ground unutilized

Page 43: Week Six Agenda

WAN Bandwidth OptimizationCompression is used to reduce the data size to conserve transmission time.

Page 44: Week Six Agenda

Upcoming AssignmentsAssignment 5-1, Concept Question 4 is due May 31,

2010Assignment 4-1-2, Basic Routing and LAN Switching

Configuration is due June 28, 2010Assignment 4-1-3, Basic Network Troubleshooting is

due July 26, 2010