Escolar Documentos
Profissional Documentos
Cultura Documentos
A local area network (LAN) connects personal computers, printers, and other
computer resources together within a building or campus. Many schools, offices, and
even homes now have LANs. These networks allow printers, as well as documents and
projects, to be shared. LANs also enable computers to talk to one another and are
often used to share Internet access across all of the computers in a building or school.
Most LANs use wires, or cables, to connect computers and other peripheral devices. In
most networks, a network cable (which generally looks like an oversized telephone
cord) connects a computer to a network jack in the wall. Sometimes, in classrooms or
business offices, many computers are connected to an intermediate hub or switch,
not directly to the network jack. The hub or switch into which all of the computers
are plugged is the device that is connected to the network jack. In both cases, the
network jack is connected to a small router by another cable. Printers are also often
shared using this method of hubs and switches.
Some LANs are now wireless. Wireless LANs are fundamentally the same as wired
LANs, but the cabling is replaced by small "radios" that are contained inside the
computers. Wireless LANs are generally somewhat slower than the wired networks,
but they are much easier to set up and allow users to move their machines around
without having to reconnect network cables.
Wireless LANs have moved into the mainstream in schools and classrooms during the
last few years; however, it is important to note that security is much more difficult
when using a wireless network. Additionally, the adoption of competing protocols is
creating some confusion in the marketplace. Agencies need to select a wireless
protocol with care, considering how the network can be upgraded and whether it is
compatible with existing wireless protocols.
Telekomunikasi dan Elektronika
komlek.net@2008
Where a LAN may connect all of the computers within a building or campus, a wide
area network (WAN) connects multiple LANs. Many districts now have WANs
connecting all of the schools within the district for the sharing of Internet access,
selected files, or other resources.
Objectives
The Cisco IOS Wide-Area Networking Configuration Guide presents a set of general guidelines for
configuring the following software components:
• ATM
• Broadband Access: PPP and Routed Bridge Encapsulation
• Frame Relay
• Frame Relay-ATM Internetworking
• SMDS
• Link Access Procedure, Balanced and X.25
This overview chapter gives a high-level description of each technology. For specific configuration
information, see the appropriate chapter in this document.
Organization
The Cisco IOS Wide-Area Networking Configuration Guide includes the following chapters:
• Configuring ATM
• Configuring Broadband Access: PPP and Routed Bridge Encapsulation
• Configuring Frame Relay
• Configuring Frame Relay-ATM Interworking
• Configuring SMDS
• Configuring X.25 and LAPB
Introduction to NETWORKING
Network is the method to share hardware resources and software resources. We
can share the resources with the help of operating system like windows, Linux,
UNIX etc. To connect multiple networks we have to use internetworking devices
like router, bridge, layer 3, switches etc.
NIC NIC
Design Considerations
Server software and Client software should be compatible.
Protocol stack must be same.
Connectivity can be performed via switch/hub etc.
If NIC standards are different then translational bridge is required.
If media is different then Trans-Receiver is required.
OSI Model
OSI model is the layer approach to design, develop and implement networks.
OSI model provides following advantages: -
(i) Designing of network will be standards based.
(ii) Development time of new technologies will be reduced.
(iii) Devices from multiple vendors can communicate with each other.
(iv) Implementation and troubleshooting of network will be easier.
• Presentation Layer: -
This layer decides presentation format of the data. It also able to performs
other function like compression/decompression and
encryption/decryption.
Jpg file
Online song
• Session Layer: -
This layer initiate, maintain and terminate sessions between different
applications. Due to this layer multiple application software can be
executed at the same time.
Telephone trun
• Transport Layer: -
Transport layer is responsible for connection oriented and connection less
communication. Transport layer also performs other functions like
Positive Acknowledgement & Response
Error checking Flow Control
Buffering Windowing
Multiplexing Sequencing
Sender Receiver
Send
(iii) Sequencing
Transport layer add sequence number to data, so that out of sequence
data can be detected and
rearranged in proper manner.
Network Layer
This layer performs function like logical addressing and path
determination. Each networking device has a physical address that is MAC
address. But logical addressing is easier to communicate on large size
network.
Logical addressing defines network address and host address. This type
of addressing is used to simplify implementation of large network. Some
examples of logical addressing are: - IP addresses, IPX addresses etc.
Path determination
Network layer has different routing protocols like RIP, EIGRP, BGP, and
ARP etc. to perform the path determination for different routing protocol.
• Media Access Control defines methods to access the shared media and
establish the identity with the help of MAC address. Some examples of
Media Access Control are CSMA/CD, Token Passing.
Physical Layer
Physical Layer is responsible to communicate bits over the media this
layer deals with the standard defined for media and signals. This layer
may also perform modulation and demodulation as required.
Data Encapsulation
DCE: - DCE convert the bits into signal & send them on media.
FDDI – Fiber Distributed Data Interface
Switch forwards frames on the base of MAC address.
Router forwards packets on the base of IP address.
LAN Technologies
LAN
Ethernet Token Ring FDDI Wi-Fi
10 – 10000 mbps 4 – 16 mbps 4 – 16 mbps 1 – 108
mbps
Ethernet
Ethernet is the most popular LAN technology. It can support verity of media like
copper (UTP, Coaxial, fiber optic). This technology supports wide range of speed
from 10mbps to 10000 mbps.
Ethernet frame
Preamble An alternating 1,0 pattern provides a 5MHz clock at the start of each
packet, which allows the receiving devices to lock the incoming bit stream.
Start Frame Delimiter (SFD)/Synch The preamble is seven octets and the
SFD is one octet (synch). The SFD is 10101011, where the last pair of 1s allows
the receiver to come into the alternating 1,0 pattern somewhere in the middle
and still sync up and detect the beginning of the data.
Length or type 802.3 uses a length field, but the Ethernet frame uses a type
field to identify the network layer protocol. 802.3 cannot identify the upper-layer
protocol and must be used with a proprietary LAN-IPX, for example
Ethernet at Media Access Control
Ethernet at Media Access Control layer uses CSMA/CD protocol to access the
shared media.
In these days, we use Ethernet with switches and in switches the technology is
made CSMA/CA (Collision Avoidance). So this reason Ethernet is best compare
with Token Ring, FDDI & Wi-Fi.
CSMA/CD
Ethernet Family
Speed Base band
10 Base 2 200-meter Coaxial cable
10 Base 5 500-meter Thick Coaxial cable
10 Base T 100 meter Twisted Pair (UTP)
10/100(present) Base TX 100 meter UTP
100 Base T4 100 meter UTP 4 Pairs used
100 Base FX up to 4 kms Fiber Optic
1000(Server) Base TX 100 meter UTP
1000 Base FX up to 100 kms Fiber Optic
10000 Base FX Fiber Optic
Ethernet Cabling
Coaxial cabling
T connector, Terminator, BNC connector, Coaxial cable, 10 base2 lan cards
UTP Cabling
In the UTP, we have used different topology to create the network.
In any Ethernet UTP topology we have to use one of the two types of cables
• Straight cable
• Cross cable
Structure Cabling
Requirement: -
Rack, patch panel, Switch/ Hub( Rack Mounable), patch cord,
I/O connector, I/O box, UTP cable
Tool: - Punching tool
New
1 broadcast domain
Working of Bridge: -
Working of Bridge explains in following steps: -
(i) Bridge can receives a frame in the buffer memory.
(ii) The source MAC address of frame this stored to the bridging table.
Port number MAC address
1
2
3
(iii) According to the destination MAC address the frame will be forwarded
or drop
(a) If destination MAC address of the frame is known then frame is
forwarded to the particular port.
(b)If destination MAC address is unknown by bridging table then
frame is forwarded to the all port except receiving port.
(c) If destination MAC address is broadcast MAC address ff.ff.ff.ff.ff.ff.
(d)If destination MAC address exist on the same port from which
port received then frame is dropped.
Collision domain
A group of pc, in which collision can occur, is called a collision domain.
Broadcast domain
A group of pc in which broadcast message is delivered is called broadcast
domain.
Pc Architecture
Processor K/B Keyboard
Controller
Memory controller
I/O Display V.D.U
Controller Card
RAM
Serial
BIOS Parallel
ROM USB
HDD FD CD
D Sound
CMOS
Card
RAM
Router Architecture
LAN
Processor
I/O
Controller WAN
Memory
Controller RAM
Ports
BIOS
Flash
ROM
RAM
O/S
IOS
NVRAM
Components of ROUTER
Router operation
When a pc has to send data to a different network address, then data will be
forwarded to the router. It will analysis IP address of the data and obtain a route
from the routing table. According to the route data will be dropped, If route not
available.
(1) Processor
Speed: - 20 MHz to 1GHz
Architecture: - RISC
Reduce Instruction set computer
Manufacturers: - Motorola, IBM, Power PC, Texas, Dallis, Intel.
(3) NVRAM
NVRAM is a “Non Volatile Random Access Memory”. It is used to store the
configuration of the Router. The size of NVRAM is 8 KB to 512 KB.
(4) RAM
Ram of the router is divided into two logical parts.
(i) Primary RAM
(ii) Shared RAM
Primary RAM
Primary RAM is used for: -
(a) Running copy of IOS.
(b)Running configuration
(c) Routing table
(d)ARP table (IP address to MAC address)
(e) Processor & other data structure
Shared RAM
Shared RAM is used as a buffer memory to shared the data received from
different interfaces. Size of ram in a router may vary from 2 mb to 512
mb. The types of memory that may be present in a ram are: -
(a) DRAM Dynamic RAM
(b)EDORAM Extended Data Out RAM
(c) SDRAM Synchronous Dynamic RAM
Router Interfaces
Interface Connector color Speed Use
Ethernet RJ45 yellow 10 mbps To connect
Ethernet LAN
Using UTP media
Router Ports
Port Connector Color Speed Details
Console RJ45 sky blue 9600bps Used for
configuration
using PC
Other interfaces:-
(1) Token Ring RJ45 Violet 4/16 mbps To connect
Token Ring network.
Types of routers:-
(1) Fixed configuration router
(2) Modular router
(3) Chassis based router
Step 1 Click the Start button on the Windows Taskbar, and select Programs >
Accessories > Communications > HyperTerminal. HyperTerminal
launches and displays the Connection Description dialog box.Type any name
• Speed - 9600
• Data Bits - 8
• Parity - none
• Stop bits - 1
• Flow Control - none
Step 4 Click ok
User mode
In this mode, we can display basic parameter and status of the router we can
test connectivity and perform telnet to other devices. In this mode we are not
configure to manage & configure router.
Privileged mode
In this mode, we can display all information, configuration, perform
administration task, debugging, testing and connectivity with other devices. We
are not able to perform here configuration editing of the router.
The command to enter in this mode is ‘enable’. We have to enter
enable password or enable secret password to enter in this mode. Enable secret
has more priority than enable password. If both passwords are configured then
only enable secret will work.
Global configuration
This mode is used for the configuration of global parameters in the router.
Global parameters applied to the entire router. The command enter in this mode
is ‘configure terminal’.
For e.g: - router hostname or access list of router
Router(config)#router rip
Router(config)#router eigrp 10
Configuring Passwords
There are five types of password available in a router
Router#configure terminal
Router(config)#service password-encryption
TIP: In CISCO router any configuration can be removed by using ‘no’ prefix to
the same command.
Managing Configuration
There are two types of configurations present in a router
(1) Startup Configuration (2) Running Configuration
Setup Mode
The router will enter in setup mode if there is no configuration is present in
NVRAM. The router will display following message
“Would you like to enter in initial configuration dialog [
y / n ]: “
There are two types of setup modes:
• Basic setup mode
• Extended setup mode
In basic mode only one interface is configured which will be used for
telnet or web access connectivity. In extended mode all interfaces are
configured. At the end we can save configuration changes or discard changes
Telnet access :
Telnet is a virtual port through which we can access router command line using
interfaces
PC
Switch Router
To accept telnet connection we have to configure following options on router:
Configure IP on interface
Configure VTY, enable secret password
On client PC test connectivity with router & use command ‘telnet <router_ip>’
A router can boot from various sources. By default, it will boot from the
flash memory and we can control the sequence with the help of configuration
system or commands. A router can boot from following sources: -
(1) First file in flash
(2) Specific file in flash
(3) Incomplete IOS
(4) TFTP Server
(5) Rom Monitor (from Bios)
The first to control boot sequence using configuration system register. We
can modify configuration register value with the help of “config-register”
command in global configuration mode. We can also modify register value from
ROM monitor mode.
Configuration Register
Configuration Register is 16-bit value, which is stored in the NVRAM. At
the time of booting the Bootstrap Loader reads the value of configuration
Register and according to the value it configure its booting behavior.
To boot router from specific file in flash To boot from first file in
Router(config)#boot system flash <file flash
TFTP
name> server Router(config)#boot
TFTP server is modified form of FTP. It is used system
to transfer file without
flash
performing authentication.
To boot router from TFTP TFTP has only home directory, in which
server/network
subdirectories are not allowed. Directory browsing isTo
Router(config)#boot system tftp <file name> not allowed
boot from in the home
directory.
TFTP is the udp-based protocol, which works on port no 69. TFTP has
following features in comparison to the FTP.
(1)Only get file and put file service is available.
(2)Authentication is not supported.
(3)Home directory may not have subdirectories
(4)Directory browsing is not allowed
Installation and Configuration of TFTP server
In windows system, we have to execute following steps to use the pc as TFTP
server.
(1)Download TFTP server software from Internet.
(2)Install the TFTP server software on pc.
(3) If software is not installed as the service then software should be running
on screen.
Configure home directory of server or use default.
Reload the device. Make sure that configuration register set as 0x2102.
2) To backup IOS
i) Test connectivity and make sure TFTP server is running.
ii) Type command: -
Router#show flash (note the IOS filename)
Router#copy flash TFTP
Source filename = ?
Destination filename=?
IP of TFTP server=?
3) To restore Configuration
i) Test connectivity and make sure TFTP server is running.
ii) Make sure configuration file is present in home directory and note the
filename.
iii) Type commands: -
Router#copy tftp running-config
Remote IP: __________
Source Filename: ___________
Destination Filename[running-config]: _ Press enter here
4) Restore/Upgrade IOS
There are four different conditions in which we can restore/upgrade IOS.
Case3: old IOS is not present but incomplete IOS is present in bios.
The router will automatically boot from incomplete IOS. And we have to
execute same commands as in case1 and case2.
Rom Mon>IP_ADDRESS=10.0.0.2
Rom Mon> TFTP_SERVER=10.0.0.1
Rom Mon> TFTP_FILE=<filename>
Rom Mon> DEFAULT_GATEWAY=10.0.0.1
Rom Mon> IP_SUBNET_MASK=255.0.0.0
Rom Mon> tftpdnld
When IOS transfer is completed then type command.
Rom Mon>boot
To view source from which router boots.
Router#show version
TIP: If we want to allow telnet router without password then on the VTY type
command “No Login”.
TCP/IP MODEL
TCP/IP is the most popular protocol stack, which consist of large no of protocol.
According to the OSI model TCP/IP consist of only four layers. TCP/IP model is
modified form of DOD (Department of Defense) model.
Application Layer
This layer contains a large no. of protocols. Each protocol is designed to
act as server & client. Some of protocol will need connection oriented. TCP and
others may need connection less UDP for data transfer.
Application layer use port no.s to identity each application at Transport
layer. This layer performs most of functions, which are specified by the
Application, Presentation, and Session layer of OSI model.
Transport Layer
Two protocols are available on Transport layer
Transmission Control Protocol User Datagram Protocol
1) Transmission Control Protocol:
TCP performs connection-oriented communication. Its responsibilities are: -
Error Checking Acknowledgement
Sequencing Flow Control
Windowing
• Source Port and Destination Port fields together identify the two local end points of the
particular connection. A port plus its hosts’ IP address forms a unique end point. Ports are
used to communicate with the upper layer and distinguish different application sessions on
the host.
• The Sequence Number and Acknowledgment Number fields specify bytes in the byte
stream. The sequence number is used for segment differentiation and is useful for reordering
or retransmitting lost segments. The Acknowledgment number is set to the next segment
expected.
• Data offset or TCP header length indicates how many 4-byte words are contained in the
TCP header.
• The Window field indicates how many bytes can be transmitted before an acknowledgment
is received.
• The Checksum field is used to provide extra reliability and security to the TCP segment.
• The actual user data are included after the end of the header.
Internet Layer
The main function of Internet layer is routing and providing a single network
interface to the upper layers protocols. Upper or lower protocols have not any
functions relating to routing. To prevent this, IP provides one single network
interface for the upper layer protocols. After that it is the job of IP and the
various Network Access protocols to get along and work together. The main
protocols are used in Internet layer:-
1) Internet Protocol (IP)
2) Internet Control Message Protocol (ICMP)
3) Address Resolution Protocol (ARP)
4) Reverse Address Resolution Protocol (RARP)
5) Proxy ARP
Internet Protocol
This protocol works at internet layer. It is responsible for logical addressing,
defining type of service and fragmentation.
• Source Port and Destination Port fields together identify the two local end points of the
particular connection. A port plus its hosts IP address forms a unique end point. Ports are
used to communicate with the upper layer and distinguish different application sessions on
the host.
• The Sequence Number and Acknowledgment Number fields specify bytes in the byte
stream. The sequence number is used for segment differentiation and is useful for reordering
or retransmitting lost segments. The Acknowledgment number is set to the next segment
expected.
• Data offset or TCP header length indicates how many 4-byte words are contained in the
TCP header.
• Window indicates how many bytes can be transmitted before an acknowledgment is
received.
• Checksum is used to provide extra reliability and security to the TCP segment.
• User data represents the actual data which are always included at end of the header.
IP Subnet
In TCP/IP by default three sizes of networks are available: -
(1) Class A -224 PC -> 16777216
(2) Class B - 216 PC-> 65536
(3) Class C – 28 PC -> 256
In subneting, we will divide class A,B & C network into small size sub networks.
This procedure is called subneting.
Subneting is performed with the help of subnet mask. There are two types
of subneting that we performed: -
(1)FLSM Fixed Length Subnet Mask
(2)VLSM Variable Length Subnet Mask
Why to Sub?
(i) Default Class Network provide us large no. of PCs in comparison to the
requirement of PCs in the network.
(ii) It is practical never possible to create a class A or class B sized network.
To reduce the broadcast of network, we have to perform LAN
segmentation of routers. In each sub network, we need different network
addresses.
How to Subnet?
In this formula, we will first modify our requirement according to the no. of
subnet possible then we calculate new subnet mask and create IP range.
Example 1
Class = C
No. of subnet =5
Step1
No. of subnet possible is 2,4,8,16,32……
Class= C
No. of subnets= 8
Step 2
Calculate key value
2? = No. of subnets
2? = 8
23= 8
Step 3
Calculate new subnet mask
In class C
Net id Host id
24+key 8-key
24+3 8-3
27 5
11111111.11111111.11111111.11100000
255. 255. 255. 224
Step 4
Range
No. of Pc/Subnet= Total Pc/ No. of Subnet
= 256/8 =32
In Class C
x.x.x.0 – x.x.x.31
(1)- (30)
x.x.x.32- x.x.x.63
64- 95
96- 127
128- 159
160- 191
192- 223
x.x.x.224-x.x.x.255
The first IP of each subnet will be subnet id and last IP will be sub network
broadcast address.
Example 2
Class= C
No. of subnet= 10
Step 1
No. of subnet= 16
Step 2
24= 16
Step 3
Net id Host id
24+4 8-4
11111111.11111111.11111111.11110000
Subneting method 2
Class=
No. of Pc/Sub= 8
Mask= ?
Range= ?
In this case we have to calculate the key according to the no. of per subnet
according to the key value the bits of subnet mask from right hand side are set
to zero then range is calculated.
Example
Class= C
No. of Pc/Sub=5
Step 1
No. of Pc/Subnet possible 4,8,16,32,64….
New requirement
Class= C
No. of Pc/Sub= 8
Step 2
2?= No. of Pc/Sub
2?= 8
23= 8
key 3
11111111.11111111.11111111.11111000
255. 255. 255. 248
200.100.100.0 200.100.100.7
.8 .15
.16 .23
.24 .31
.
.
Example 2
Class C
No. of Pc/Sub=50
Step 1
Class= C
No. of Pc/Sub= 64
Step 2
26= 64
11111111.11111111.11111111.11000000
255. 255. 255. 192
Method 3
No. of Pc/Sub= 50
New req.
No. of Pc/Sub= 64
Class= C
No. of Sub= 4
22= 4
24+2 8-2
11111111.11111111.11111111.11000000
255. 255. 255. 192
Zero Subnet
According to the rules of IP Addressing the first subnet and last subnet is not
useable due to routing problem. In new Cisco router a command is present in
default configuration. With this command, we are able to use first and last
Subnet after Subneting.
Command is
Router#config ter
Router(config)#ip subnet-zero
Router(config)#exit
200.100.100.197
255.255.255.240
28 4
200.100.100.197
200.100.100.1100 0101 Valid IP
200.100.100.192
200.100.100.1100 0000 Network address
200.100.100.207
200.100.100.1100 1111 Broadcast address
Example: -
Class= B
No. of subnet= 64
26= 64
11111111.11111111.11111111.11000000
255. 255. 255. 192
150.20.0.0 – 150.20.3.255
150.20.4.0 – 150.20.7.255
150.20.8.0 – 150.20.11.255
200.100.100.18
255.255.255.248
200.100.100.18/29
170.20.6.6
255.255.255.224.0
170.20.6.6/19
This method is representing IP address also called CIDR (Classless Inter Domain
Routing) notation.
No Subneting
200.100.8.X
200.100.1.X
200.100.7.X 200.100.9.X
200.100.4.X 200.100.6.X
200.100.5.X
200.100.3.X
200.100.2.X
FLSM
200.100.1.112-127/28 200.100.1.128-143/28
200.100.1.95-111/28
200.100.1.48-63/28
200.100.1.80-95/28
200.100.1.64-79/28
200.100.1.32-47/28
200.100.0-15/28
200.100.1.16-31/28
Remaining Subnet
144 – 159
160 – 175
176 – 191
192 – 207
208 – 223
224 – 239
240 – 255
VLSM
/25 /26 /27 /28 /29
255.255.255.128 255.255.255.192 255.255.255.224 255.255.255.240
255.255.255.248
0 – 127 0 – 63 0 – 31 0 – 15 0–7
128 – 255 64 – 127 32 – 63 16 – 31 8 – 15
128 – 191 64 – 95 32 – 47 16 – 23
192 – 255 96 – 127 48 – 63 24 - 31
64 –79
80 – 95
96 – 111
/30
255.255.255.252
Sub Pc/Sub
64 4
0 – 3
4 – 7
8 – 11 20 64
12 – 15 32-63/30 64-95/27
2 IP
2 0-3/30
4-7/30
2 2
8-11/30 12-15/30
5
16-23/29
10 50
96-111/28 128-191/26
Remaining
24 – 31
112 – 127
If we are using VLSM and Dynamic Routing then routing be compatible to VLSM.
This will happen only if Subnet masks are also sends in the routing updates.
Super Netting
Combining small N/w to create a large size N/w is called Super Network. Super
netting is mostly used to define route summarizations in routing tables. It is not
used for the implementation of large network.
170.10.0.0 170.00001010.00000000.00000000
170.11.0.0 170.00001011.00000000.00000000
IP Routing
When we want to connect two or more networks using different n/w addresses
then we have to use IP Routing technique. The router will be used to perform
routing between the networks. A router will perform following functions for
routing.
(1)Path determination
(2)Packet forwarding
Routing Process
(i) The pc has a packet in which destination address is not same as the local n/w
address.
(ii) The pc will send an ARP request for default gateway. The router will reply to
the ARP address and inform its Mac address to pc.
(iii) The pc will encapsulate data, in which source IP is pc itself, destination IP is
server, source Mac is pc’s LAN interface and destination Mac is router’s LAN
interface.
R1
10.0.0.1
S. MAC D. MAC
PC1 R1
D. IP 172.16.0.5
S. IP 10.0.0.6
The router will receive the frame, store it into the buffer. When obtain packet
from the frame then forward data according to the destination IP of packet. The
router will obtain a route from routing table according to which next hop IP and
interface is selected
(iv) According to the next hop, the packet will encapsulated with new frame and
data is send to the output queue of the interface.
Static Routing
In this routing, we have to use IP route commands through which we can specify
routes for different networks. The administrator will analyze whole internetwork
topology and then specify the route for each n/w that is not directly connected
to the router.
Protocols AD
Directly Connected 0
Static 1
BGP 20
EIGRP 90
IGRP 100
OSPF 110
RIP 120
Example: -
Router#conf ter
Router(config)#ip route 150.10.0.0 255.255.0.0 150.20.0.5
Router(config)#ip route 150.10.0.0 25.255.0.0 160.20.1.1 8 (below 20)
Router(config)#exit
Default Routing
Default routing means a route for any n/w. these routes are specify with the
help of following syntax: -
Router(config)#ip route 0.0.0.0 0.0.0.0 <next hop>
Or
<exit interface>
This type of routing is used in following scenario.
Scenario 1: -
Stub network
A n/w which has only one exit interface is called stub network.
Scenario 2
Internet connectivity
On Internet, million of n/ws are present. So we have to specify default routing
on our router.
Default route is also called gateway of last resort. This route will be used when
no other routing protocol is available.
ISP
200.100.100.11
172.16.0.5
R1 R2
10.0.0.0
According to the type of area in which protocol is used there are again two
types of protocol: -
(1) Interior Routing Protocol
(2) Exterior Routing Protocol
Autonomous system
Autonomous system is the group of contiguous routers and n/w, which will share
their routing information directly with each other. If all routers are in single
domain and they share their information directly with each other then the size
of routing updates will depend on the no. of n/w present in the Internetwork.
Update for each n/w may take 150 – 200 bytes information.
For example: - if there are 1000 n/ws then size of update will be
200*1000 = 200000 bytes
The routing information is send periodically so it may consume a large amount
of bandwidth in our n/w.
Border Routing
Exterior Routing
Interior Routing
AS 400
AS 200 AS 500
Domain
Protocols
Interior Routing Exterior Routing
RIP BGP
IGRP EXEIGRP
EIGRP
OSPF
Distance Vector Routing
The Routing, which is based on two parameters, that is distance and direction is
called Distance Vector Routing. The example of Distance Vector Routing is RIP &
IGRP.
Operation: -
(1) Each Router will send its directly connected information to the neighbor
router. This information is send periodically to the neighbors.
(2) The neighbor will receive routing updates and process the route according to
following conditions: -
(i) If update of a new n/w is received then this information is stored in routing
table.
(ii) If update of a route is received which is already present in routing table
then route will be refresh that is route times is reset to zero.
(iii) If update is received for a route with lower metric then the route, which is
already present in our routing table. The router will discard old route and write
the new route in the routing table.
(iv) If update is received with higher metric then the route that is already
present in routing table, in this case the new update will be discard.
(3) A timer is associated with each route. The router will forward routing
information on all interfaces and entire routing table is send to the neighbor.
There are three types of timers associated with a route.
(i) Route update timer
It is the time after which the router will send periodic update to the
neighbor.
(ii) Route invalid timer
It is the time after which the route is declared invalid, if there are no
updates for the route. Invalid route are not forwarded to neighbor routers but it
is still used to forward the traffic.
(iii) Route flush timer
It is the time after which route is removed from the routing table, if there
are no updates about the router.
Routing Loops
It may occur between adjacent routers due to wrong routing information.
Distance Vector routing is also called routing by Rumor. Due to this the packet
may enter in the loop condition until their TTL is expired.
Split Horizon
Split Horizon states a route that update receive from an interface can not be
send back to same interface.
Poison Reverse
This method is the combination of split Horizon and Flash updates. It
implements the rule that information received from the interface can not be
sent back to the interface and in case of topology change flash updates will be
send to the neighbor.
Hold Down
If a route changes frequently then the route is declared in Hold Down state and
no updates are received until the Hold Down timer expires.
Configuring RIP
Router#conf ter
Router(config)#router rip
Router(config-router)#network <own net address>
Router(config-router)#network <own net address>
--------------
--------------
Router(config-router)#exit
172.16.0.6
RIP Dest. n/w mask AD Metric Next Hop Timer own Interface
Neighbor RIP
In RIP, by default routing updates are send to the address 255.255.255.255. In
some scenarios, it may be required to send routing updates as a unicast from
router to another. In this case, we have to configure neighbor RIP.
For example: - in a Frame Relay n/w the broadcast update is discarded by the
switches, so if we want to send RIP updates across the switches then we have to
unicast updates using Neighbor RIP.
Frame Relay
Unicast 10.0.0.2
Cloud
255.255.255.255
10.0.0.1 10.0.0.2
R1 R2
R1 R2
Router(config)#router rip Router(config)#router rip
Router(config-router)#neighbor 10.0.0.2 Router(config-router)#neighbor
10.0.0.1
Configuring Timers
Router(config)#router rip
Router(config-router)#timers basic <update> <invalid> <hold down> <flush>
Router(config-router)#exit
Example: -
Router(conf)#timer basic 50 200 210 300
Update 50 sec
Invalid 200 sec
Hold 210 sec
Flush 300 sec
RIP version 2
RIP version 2 supports following new features: -
(1) Support VLSM (send mask in updates)
(2) Multicast updates using address 224.0.0.9
(3) Support authentication
Router(config)#Router RIP
Router(config-router)#version 2
Router(config-router)#exit
To debug RIP routing
Router#debug ip rip
Configuring IGRP
Router(config)#router igrp <as no>(1 – 65535)
Router(config-router)#network <net address>
Router(config-router)#network <net address>
Router(config-router)#exit
Router(config)#interface serial 0
Router(config-if)#bandwidth 256
Router(config-if)#exit
Serial E1 modem Serial E1
2048 k 2048 k
256 k
sync
Maximum Path: - it is maximum no. of paths that can be used for load balancing
simultaneously.
Variance: - it is the multiplier value to the least metric for a destination n/w up
to which the load can be balanced.
R2 11.0.0.0
10.0.0.0
R3 13.0.0.0
14.0.0.0
15.0.0.0
16.0.0.0
R4 16.0.0.0
17.0.0.0
R5 18.0.0.0
19.0.0.0
20.0.0.0
14.0.0.0
R6 20.0.0.0 19.0.0.0
21.0.0.0
20.0.0.0 18.0.0.0
R R
6 5
21.0.0.0 14.0.0.0
16.0.0.0 12.0.0.0
17.0.0.0 R
4
Link State Routing
This type of routing is based on link state. Its working is explain as under
(1) Each router will send Hello packets to all neighbors using all interfaces.
(2) The router from which Hello reply receive are stored in the neighborship
table. Hello packets are send periodically to maintain the neighbor table.
(3) The router will send link state information to the all neighbors. Link state
information from one neighbor is also forwarded to other neighbor.
(4) Each router will maintain its link state database created from link state
advertisement received from different routers.
(5) The router will use best path algorithm to store the path in routing table.
Configuring EIGRP
Router(config)#router eigrp <as no>
Router(config-router)#network <net addr.>
Router(config-router)#network <net addr.>
Router(config-router)#exit
OSPF Terminology
Already known topics in this: -
(1) Hello packets
(2) LSA (Link State Advertisement)
(3) Neighbor
(4) Neighbor table
(5) Topology table (LSA database)
Router ID
Router ID is the highest IP address of router interfaces. This id is used as the
identity of the router. It maintaining stale databases. The first preference for
selecting router ID is given to the Logical interfaces. If logical interface is not
present then highest IP of physical interface is selected as router id.
Area
Area is the group of routers & n/ws, which can share their routing information
directly with each other.
Adjacency
A router is called adjacency when neighbor relationship is established. We can
also say adjacency relationship is formed between the routers.
br br br
ar ar ar ar
ar ar ar
Area Router
A router, which has all interfaces member of single area, is called area router.
Backbone Area
Area 0 is called backbone area. All other areas must connect to the backbone
area for communication.
Backbone Router
A router, which has all interfaces members of area 0, is called backbone router.
Area Border Router
A router, which connects an area with area 0, is called area border router.
Designated Router
A router with highest RID (router id) will be designated router for a particular
interface. This router is responsible for receiving LSA from non-DR router and
forward LSA to the all DR router.
Backup Designated Router
This router will work as backup for the designated router. In BDR mode, it will
receive all information but do not forward this information to other non-DR
router.
L K M N
A B C D
Switch
A B C D
B A A A Neighbor
C C B B
D D D C
L K M N
This problem is solved with the help of electing a router as designated router
and backup designated router.
Commands to configure OSPF
Router#conf ter
Router(config)#router ospf <process no>
Router(config-router)#network <net address> <wild mask> area <area id>
Router(config-router)#network <net address> <wild mask> area <area id>
Router(config-router)#exit
255.255.255.255 255.255.255.255
- Subnet mask - 0.255.255.192
Wild mask 0 . 0 . 0 . 63
Command: -
Router(config)#interface loopback <no>
Router(config-if)#ip address 200.100.100.1 255.255.255.255
Router(config-if)#no sh
Router(config-if)#exit
Display Database
Router#show ip ospf database
200.100.100.2/24
215.1.13/24
Router(config)#router ospf 32
Router(config-router)#network 200.100.100.0 0.0.0.255 area 20
Router(config-router)#network 215.1.1.0 0.0.0.255 area 20
Router(config-router)#exit
Area 0
R 200.100.100.33/30 200.100.100.34/30
R
1 2
200.100.100.66/27 200.100.100.160/26
R1
Router(config)#router ospf 33
Router(config-router)#network 200.100.100.32 0.0.0.3 area 0
Router(config-router)#network 200.100.100.64 0.0.0.31 area 0
Router(config-router)#exit
R2
Router(config)#router ospf 2
Router(config-router)#network 200.100.100.32 0.0.0.3 area 0
Router(config-router)#network 200.100.100.128 0.0.0.63 area 0
Router(config-router)#exit
200.100.100.5/30 200.100.100.17/30
R R R
1 2
200.100.100.6/30 3
200.100.100.18/30
200.100.100.230/27
200.100.100.38/28 200.100.100.161/28
R1
Router(config-router)#network 200.100.100.4 0.0.0.3
Router(config-router)#network 200.100.100.32 0.0.0.15
R2
Router(config-router)#network 200.100.100.4 0.0.0.3
Router(config-router)#network 200.100.100.160 0.0.0.15
Router(config-router)#network 200.100.100.16 0.0.0.3
R3
Router(config-router)#network 200.100.100.16 0.0.0.3
Router(config-router)#network 200.100.100.224 0.0.0.31
LAN Switching
Ethernet switches are used in LAN to create Ethernet networks. Switches
forward the traffic on the basis of MAC address. Switches maintain a switching
table in which MAC addresses and Port No are used to perform switching
decision. Working of bridge and switch is similar to each other.
Classification of switches
Switches are classified according to the following criteria: -
Types of switches based on working
(1) Store & Forward
This switch receives entire frame then perform error checking and start
forwarding data to the
destination.
(2) Cut through
This switch starts forwarding frame as soon as first six bytes of the frame
are received.
(3) Fragment-free
This switch receives 64 bytes of the frame, perform error checking and then
start forwarding data.
(4) Adaptive cut-through
It changes its mode according the condition. If there are errors in frames
then it changes its mode to
Store & Forward.
Features of switch
- No. of ports - Speed of ports
- Type of media - Switching or Wire speed or Throughput
Hierarchal model
After using hierarchal model the most of LAN problem will be solved but one
problem still remain same that is all pc s will be in single broadcast domain. We
have to implement following solution for this problem.
(1) Physical Segmentation (2) Logical Segmentation
Trunking
When there are multiple switches then we have to use trunk links to connect
one switch with other. If we are not using trunk links then we have to connect
one cable from each VLAN to the corresponding VLAN of the other switch.
Normal: -
Vlan 1 7 3 1 3 7
In Trunking: - Vlan 1, 3, 7
1 7 3 1 3 7
Trunk Trunk
Switches will perform trunking with the help of frame tagging. The trunk port
will send data frames by adding a Vlan id information to the frame, at the
receiving end vlan id information is removing from the end and according to the
tag data is delivered to the corresponding vlan. There are two protocols to
perform frame tagging.
(1) Inter switch link (cisco propietry) (2) IEEE 802.1 q
Configuring Trunking
In cisco switches all switch ports may be configured in three modes
(1) Trunk desirable (default)
(2) Trunk on
(3) Trunk off
Switch#conf ter
Switch(config)#interface <type> <no>
Switch(config-if)#switchport mode <trunk|access|auto>
Switch(config-if)#exit on off desirable
Except <vlan>
VTP server
VTP server is a switch in which we can create, delete or modify Vlans. The
server will send periodic updates for VTP clients.
VTP client
On VTP client, we are not able to create, modify or delete Vlans. The client will
receive and forward vtp updates. The client will create same Vlans as defined in
vtp update.
VTP Transparent
Transparent is a switch, which will receive and forward VTP update. It is able to
create, delete and modify Vlans locally. A transparent will not send its own VTP
updates and will not learn any information from received vtp update.
VTP Transparent
Commands
Switch#conf ter
Switch(config)#vtp domain <name>
Switch(config)#vtp password <word>
Switch(config)#vtp mode <server|client|transparent>
Switch(config)#exit
By default in cisco switches the VTP mode is set as VTP server with no domain
and no password.
VTP Pruning
Pruning is the VTP feature through which a trunk link can be automatically
disable, for a particular Vlan if neighbor switch does not contain ports in that
Vlan. Vlan1 is not prun eligible.
Server
Vlan 1,3,5,7
Vlan 1 3 5 7 1 3 5 7 1 3 5 7
Inter Vlan Communication
After creating Vlans, each Vlan has own broadcast domain. If we want
communication from one Vlan to another Vlan then we need to perform routing.
There are three methods for inter vlan communication.
(1) Inter Vlan using router on a stick method
(2) Inter Vlan using layer 3 switch
(1) Inter Vlan using router on a stick method
In this method a special router is used for Inter Vlan. In this router, we can
create one interface for each Vlan. The physical interface of router will be
connected on trunk port switch. This router will route traffic on the same
interface by swapping vlan id information with the help of frame tagging
protocol.
Vlan 1, 3, 5
Trunk
T T T
T T T
1 3 5 1 3 5 1 3 5
Configuration on Pc
Configure IP and Gateway
Packets
Spanning Tree Protocol will solve this problem by blocking the redundancy
interface. So that only one path will remain active in the switches. If the primary
path goes down then disabled link will become enable and data will be
transferred through that path.
Working of STP
The STP will create a topology database in which one switch will be elected as
root switch. Path cost is calculated on the basis of bandwidth. The lowest path
cost link will be enable mode and another path will be disable.
Root Switch
1 Gb 1 Gb
Switch Switch
100 Mb 100 Mb
100 Mb
Switch Switch
Lowest cost
(Disable)
STP terminology
(1) Bridge id
It is the combination of bridge priority and base mac address. In Cisco
switches default priority no. is 32768.
Switch#conf ter
Switch(config)#interface <type> <no>
Switch(config-if)#switchport port-security
Switch(config-if)#switchport port-security maximum <no. of mac>
Switch(config-if)#switchport port-security violation <shutdown|restrict|reject>
Switch(config-if)#switchport port-security mac-address sticky
Switch(config-if)#switchport port-security mac-address sticky <mac address>
Switch(config-if)#exit
Access Control List
ACL are the basic security feature that is required in any network to
control the flow of traffic. Most of time our network may have servers and
clients for which traffic control is required. We can also use ACL to classify the
traffic. ACLs are used in features like QOS (Quality of Service), Prioritize traffic
and interesting traffic for ISDN.
A Packet is received
Yes
Yes
All any
Internet
Router(config)#access-list 25 permit
192.168.10.32 0.0..31
Router(config)#access-list 25 permit
192.168.10.64 0.0.0.3
Router
Router(config)#access-list 25 permit
192.168.10.68
Router(config)#access-list 25 permit
192.168.10.69
Router(config)#access-list 25 permit
192.168.10.70
Router#config ter
Router(config)#ip access-list standard <name>
Router(config-std-nacl)#<deny|permit> <source>
Router(config-std-nacl)#exit
200.100.175.x
Route
r
Route
r
200.100.100.x
Switch#conf ter
Switch(config)#mac access-list extended abc
Switch(config-ext-mac)#deny any host 000d.29bd.4b85
Switch(config-ext-mac)#permit any any
Switch(config-ext-mac)#do show access-list
Switch(config-ext-mac)#int f0/6
Switch(config-if)#mac access-group abc
Reflexive ACLs
These ACLs filter IP packets depending upon upper-layer session information,
and they often permit outbound traffic to pass but place limitations on inbound
traffic. You can not define reflexive ACLs with numbered or standard IP ACLs, or
any other protocol ACLs. They can be used along with other standard or static
extended ACLs, but they are only defined with extended named IP ACLs.
Time-Based ACLs
In this you can specify a certain time of day and week and then identity that
particular period by giving it a name referenced by a task. The reference
function will fall under whatever time constraints you have dictated. The time
period is based upon the router’s clock, but it is highly recommended that using
it in conjunction with Network Time Protocol (NTP) synchronization.
Router#conf ter
Router(config)#time-range no-http
Router(config-time-range)#periodic <Wednesday|weekdays|weekend> 06:00 to
12:00
Router(config-time-range)#exit
Router(config)#time-range tcp-yes
Router(config-time-range)#periodic weekend 06:00 to 12:00
Router(config-time-range)#exit
Router(config-ext-nacl)#interface f0/0
Router(config-if)#ip access-group time in
Router(config-if)#do show time-range
Remarks
Remarks are the comments or remarks regarding the entries you have made in
both your IP Standard and Extended ACLs.
Router#conf ter
Router(config)#access-list 110 remark <remark words>
permit rahul from admin only to sale
Router(config)#access-list 110 permit ip host 172.16.10.1 172.16.20.0
0.0.0.255
Router(config)#access-list 110 deny ip 172.16.10.0 0.0.0.255 172.16.20.0
0.0.0.255
(1) Hostname
(2) Device type
(3) Model/Platform
(4) IOS version
(5) Local connected interface
(6) Remote device connected interface
(7) Entry IP address etc.
WAN Encapsulation
WAN encapsulation is used to convert a packet into frame and transfer data to
WAN links, Different type of encapsulation are designed for different WAN
technologies. The general format of WAN encapsulation is: -
FH Packet FT
DB-60
Smart Serial
Serial
Router
Router
eth
RJ-45
* Distance depends on modems & mostly
up to 10-15 kms.
G703
G704 Mux Exchange Mux
Modem Modem
Line
Line
Modem Modem
V.35
RS 232, EIA/TIA 530
SS, DB-60
R R
MLLN MLLN
MUX Exchange MUX
MLLN MLLN
Modem Modem
Route Route
r r
Antenna
Radio Radio
V.35 Modem Modem
RS 232
EIA 530
DB-60
Smart Serial
Router Router
Radio Radio
Modem Modem
ODU ODU
UTP or
Coaxial
Radio Radio
Route Modem Modem
r
IDU IDU
Route
r
ODU – Out Door Unit
IDU – In Door Unit
Line
4 Wire 2 Wire
1 ------- 1
2 ------- Loop 1 2
3 3
4 ------- Loop2 4 ------- Signal
5 ------ - 5 -------
6 6
7 7
8 8
172.16.0.1 172.16.0.2
192.168.5.1 10.0.0.1
WAN Encapsulation
Two routers interfaces in Point-to-Point WAN must required to have same WAN
encapsulation. Two types of WAN encapsulation are supported in this type of
network.
(1) HDLC
(2) PPP
HDLC
PPP
Same Manufacturer
PPP
Different Manufacturer
By default, Cisco routers will use Cisco HDLC encapsulation. We can change
encapsulation by following command: -
Router#conf ter
Router(config)#interface <type> <no>
Router(config-if)#encapsulation ppp|hdlc
HDLC
High Level Data Link Control
HDLC is the modified form of SDLC (Synchronous Data Link Control). SDLC was
developed by IBM for router to main frame communication. HDLC is modified for
router-to-router communication. Most of manufacturer has developed their
proprietary HDLC protocol. So HDLC from one manufacturer is not compatible
for other.
HDLC encapsulation is designed for Point-to-Point router communication.
In HDLC no addressing is required, but still all station address is used in
encapsulation. HDLC provides only basic features and error checking for the
frame.
A
P TCP/IP
S IPX/SPX
T
N PPP
Lan, Wan Protocols DL HDLC
P LAPB
EE 8023 ARPA
Network
D
A NCP
T -------------------
A
LCP PPP
L
I --------------------
N
K HDLC
Physical
S1
S0
Router 1
Router#config ter
Router(config)#int serial 0
Router(config-if)# encapsulation ppp
Router(config-if)# ppp authentication chap
Router(config-if)#ip address 10.0.0.1 255.0.0.0
Router(config-if)#no sh
Router(config-if)#exit
Router(config)#hostname chd
Router(config)#username ldh password net123
Router(config)#exit
Router 2
Router#config ter
Router(config)#int serial 1
Router(config-if)#encapsulation ppp
Router(config-if)#ppp authentication chap
Router(config-if)#ip address 10.0.0.2 255.0.0.0
Router(config-if)#no sh
Router(config-if)#exit
Router(config)#hostname ldh
Router(config)#username chd password net123
Router(config)#exit
To display Compression
Router#show compress
LCP Open
LCP Closed
LCP Request sent
LCP Listen
IPCP Open
IPCP Closed
CDPCP Open
CDPCP Closed
Circuit Switching
In Circuit Switching, all users are connected to the Circuit Switching. Exchange
cloud depending upon user request. A circuit is established between two
locations and then data is transferred. A signaling protocol is used to establish
the connectivity then data is transferred with the help of protocol used Point-to-
Point WAN.
Examples of Circuit Switching are: -
ISDN (Integrated Services Digital Network)
PSTN (Public Switched Telephone Network)
ISDN
PRI BRI
2 B Channels
1 D Channel
E1 T1
30 B Channels 23 B Channels
1 D Channel 1 D Channel
B1 S1 B2 S D Ch S B1 S B2 S --
T
B1 ------- 64 kbps
B2 ------- 64 kbps
D Ch ------- 16 kbps
S ------- 48 kbps
TE 2 R TA
NT 1 Network Termination 1
Send/Receive ISDN BRI Signals
NT 2 Network Termination 2
Share ISDN between multiple users
TE 1 Terminal Equipment 1
ISDN compatible device
TE 2 Terminal Equipment 2
Non-ISDN device
TA Terminal Adapter
Connects ISDN line with Non-ISDN device
Topology 1: - Voice
ISDN ISDN
NT 1
Phone 1 4 2 wire Cloud
4
ISDN
Phone 2
Topology 2: - Voice
Phone 1
TA NT 1 ISDN
Cloud
Phone 1
USB ISDN
PC TA NT 1
Serial Cloud
Ph 1 Ph 2
Topology 3: - Data
ISDN ISDN
Route BRI NT 1
r Cloud
S/T
ISDN
ISDN
RouterNT 1 Cloud
BRI
U
Configuring ISDN BRI
We will configure ISDN BRI for following two scenarios: -
(1)ISDN Branch office to Branch office connectivity.
(2)ISDN Branch office to ISP Connectivity.
306306 288288
192.168.10.5 192.168.10.6
R1 R2
Encapsulation - PPP
Authentication - CHAP
172.16.0.1 Hostname R1 - Chd 172.30.0.1
Hostname R2 - Del
Password – net123
Routing - Static
172.16.X.X 172.30.X.X
R1
Router#config ter
Router(config)#int eth0
Router(config-if)#ip address 172.16.0.1 255.255.0.0
Router(config-if)#no sh
Router(config-if)#exit
Router(config)#ip route 172.30.0.0 255.255.0.0 192.168.0.6
Router(config)#ip route 192.168.0.6 255.255.255.255 BRI 0
Router(config)#int bri 0
Router(config-if)#encapsulation ppp
Router(config-if)#ppp authentication chap
Router(config-if)#ip address 192.168.10.5 255.255.255.0
Router(config-if)#dialer map ip 192.168.10.6 name Del 288288
Router(config-if)#dialer hold-queue 10 (no. of packets range 1 – 100)
Router(config-if)#dialer-group 8
Router(config-if)#dialer idle-timeout 180
Router(config-if)#no sh (if no response from the dialer connection break)
Router(config-if)#exit
R2
Router#config ter
Router(config)#int eth0
Router(config-if)#ip address 172.30.0.1 255.255.0.0
Router(config-if)#no sh
Router(config-if)#exit
Router(config)#int bri 0
Router(config-if)#encapsulation ppp
Router(config-if)#ppp authentication chap
Router(config-if)#ip address 192.168.10.6 255.255.255.0
Router(config-if)#dialer map ip 192.168.10.5 name Chd 306306
Router(config-if)#dialer hold-queue 10
Router(config-if)#dialer-group 8
Router(config-if)#dialer idle-timeout 180
Router(config-if)#no sh
Router(config-if)#exit
Internet
E1/T1
ISDN RAS
Cloud 383843
R
Basic-net3
NT1
DNS Authentication
Accounting
Route Authorization
r
ISP Parameter
Ph no.
Username
Password
ISDN Service Provider Switch Type
Router#config ter
Router(config)#int eth 0
Router(config-if)#ip address 10.0.0.1 255.0.0.0
Router(config-if)#no sh
Router(config-if)#exit
Router(config)#int bri 0
Router(config-if)#ip address negotiated
Router(config-if)#encapsulation ppp
Router(config-if)#ppp authentication chap pap call in
Router(config-if)#ppp pap sent-username <ispuser> password <word>
Router(config-if)#ppp chap hostname <ispuser>
Router(config-if)#ppp chap password <word>
Router(config-if)#dialer string 383843
Router(config-if)#dialer-group 7
Router(config-if)#dialer-idle timeout 180
Router(config-if)#dialer hold-queue 10
Router(config-if)#no sh
Router(config-if)#exit
Layer1 = Active
Layer2 Multiple frame established
Layer3 1 Active layer call or
2 Active layer 3 call
Debug Commands
Interesting traffic or dialer
Router#debug dialer events
Router#debug dialer packets
ISDN problem
Router#debug isdn events
Router#debug isdn 2921
Error code at cisco.com
Router#debug isdn 2931
PPP problem
Router#debug ppp negotiation
Router#debug ppp authentication
Router#debug ppp error
Configuring ISDN multi-link
An ISDN multiple channels can be combined to dial the same location and
transport data for this purpose. We will use PPP multi-link and Cisco bandwidth
on demand configuration.
Router#conf ter
Router(config)#int bri 0
Router(config-if)#ppp multilink
Router(config-if)#dialer load-throshold <value> either (inbound or outbound)
1-255
Router(config-if)#exit
Packet Switching
Packet Switching is the wan technology in which all devices are connected to
the packet switching exchange. The devices will request packet switching
exchange to create a virtual connection then data is transferred over the virtual
connection. It is possible to create more than one virtual connection and
transfer data over them one by one.
Example of Packet Switching Technology are: -
(1) X.25 (2) Frame Relay
Frame Relay
Frame Relay is the Packet switching technology in which virtual connections are
established. The frame relay supports only permanent virtual connections.
Frame used special addresses called DLCI to create common and virtual
connections.
FR V.35
Modem 232
4 wire Tp 530
Line
Local loop
FR Line
Modem
V.35, RS232, EIA 530
Route
Virtual Circuit
r
In packet switching technology there are two types
of virtual circuits: -
(1) Switched Virtual Circuit (SVC)
(2) Permanent Virtual Circuit (PVC)
R R
Cisco FR
IETF FR
Cisco Cisco
R R
IETF FR
Router(config)#int serial 0
Router(config-if)#encapsulation frame-relay
Router(config-if)#frame-relay lmi-type cisco
Router(config-if)#ip address 192.168.10.1 255.255.255.0
Router(config-if)#frame-relay interface-dlci 300
Router(config-dlci)#exit
Router(config-if)#frame-relay map ip 192.168.10.2 300
Router(config-if)#no sh
Router(config-if)#exit
R2
Router#config ter
Router(config)#int eth0
Router(config-if)#ip address 172.30.0.1 255.255.0.0
Router(config-if)#no sh
Router(config-if)#exit
Router(config)#ip route 172.16.0.0 255.255.0.0 192.168.10.1
Router(config)#int serial 0
Router(config-if)#encapsulation frame-relay
Router(config-if)#frame-relay lmi-type cisco
Router(config-if)#ip address 192.168.10.2 255.255.255.0
Router(config-if)#frame-relay interface-dlci 400
Router(config-dlci)#exit
Router(config-if)#frame-relay map ip 192.168.10.1 400
Router(config-if)#no sh
Router(config-if)#exit
Cisco SW SW ANSI
FR
M M
encap: - Cisco FR
M M
192.168.10.1 192.168.10.2
R1 R2
172.16.0.1 172.30.0.1
Network Address Translation
NAT is the feature that can be enable in a Router, Firewall or a Pc. With the help of NAT, we
are able to translate network layer addresses that are IP addresses of packets. With Port Address
Translation, we are also able to translate port numbers present in transport layer header.
Advantage of NAT
There are two reasons due to which we use NAT: -
NAT Terms:
Inside Interface: The interface connected to inside local network
Outside Interface: The interface connected to outside internet.
Inside Local: IP address assigned to local network by administrator from Private IP range.
Inside Global: IP address assigned by ISP for Local LAN from Public IP range.
10.0.0.5
Internet
10.0.0.6 10.0.0.1 200.100.100.12
Switch NAT
10.0.0.7
10.0.0.8
10.0.0.5
200.100.100.12
1080
10.0.0.6
200.100.100.12
1085
10.0.0.7
200.100.100.12 Port Translation
1024 1100
10.0.0.8
200.100.100.12
1024
Types of NAT
Static NAT
This NAT is used for servers in which one Live IP is directly mapped to one Local IP. This NAT
will forward on the traffic for the Live IP to the Local PC in the n/w.
Static NAT
200.1.1.5 = 192.168.10.6
Internet
Route
r
Live 200.1.1.5
Local 192.168.10.6
Port Based Static NAT
This NAT is also used for servers. It provides port-based access to the servers with the help of NAT.
Web DNS
192.168.10.6 192.168.10.7
Route
r