Escolar Documentos
Profissional Documentos
Cultura Documentos
What's cisco
Cisco is from Sanfrancisco and it was founded in 1984 by a
small group of computer scientists from Stanford
.university
:Network
It's a group of components or devices connected together
to give the users a certain services (applications). A
network consists of two or more computers that are linked
in order to share resources (such as printers and CD-
ROMs), exchange files, or allow electronic
communications. The computers on a network may be
linked through cables, telephone lines, radio waves,
.satellites, or infrared light beams
:Importance of network
.Easy sharing of files and information -1
Sharing of expensive devices (servers and -2
.(printers
1
Modern techniques (VOIP, video conferencing, -3
.(net meeting
:Network components
:PC -1
Source of network aware applications, we use some S/Ws
loaded on PCs and servers to made these network aware
applications ex: HTTP(Hyper Text transfere protocol) for
browsing, FTP(File transfere protocol), SMTP(Simple Mail
Transfere Protocol) to send mails, POP3(Post Office
Protocol 3) to receive mails,Telnet Application
:Network devices -2
Hub, modem, switch, router, repeater, NIC(Network
.Interface Card), bridge
:Connectivity -3
.Cables – Wireless
:Network topologies
?What is a topology
The physical topology of a network refers to the
configuration of cables, computers, and other peripherals.
Physical topology should not be confused with logical
topology which is the method used to pass information
between workstations. Protocol
Point-to-point
The simplest topology is a permanent link between two
endpoints. Switched point-to-point topologies are the basic
model of conventional telephony. The value of a
permanent point-to-point network is the value of
guaranteed, or nearly so, communications between the
two endpoints, and in this topology one device send and
2
only one will received ex: leased lines, ISDN, analog dial-
.up
Bus topology
Bus networks (not to be confused with the system bus of a
.computer) use a common backbone to connect all devices
3
Not meant to be used as a stand-alone solution in a large
.building
:Ring topology
In a ring network, every device has exactly two neighbors
for communication purposes. All messages travel through
a ring in the same direction (either "clockwise" or
"counterclockwise"). A failure in any cable or device
breaks the loop and can take down the entire network.
Ring topologies are found in some office buildings or
school campuses ex: FDDI (Fiber Distributed Data
.(Interface
:Star topology
A star topology is designed with each node (file server,
workstations, and peripherals) connected directly to a
central network. hub or concentrator
4
or concentrator manages and controls all functions of the
network. It also acts as a repeater for the data flow. This
configuration is common with twisted pair cable; however,
it can also be used with coaxial cable or fiber optic cable
Many home networks use the star topology. A star
network features a central connection point called a "hub"
that may be a hub, switch or router Devices typically
connect to the hub with Unshielded Twisted Pair (UTP)
.Ethernet
:Mesh topology
A mesh network in which every device connects to every
other is called a full mesh. As shown in the illustration
below, partial mesh networks also exist in which some
devices connect only indirectly to others there's a
redundancy due to Multi backups ex: ATM, FR it's a
communication technique between far devices and
.Ethernet
:Network types
:The three basic types of networks include
(Local Area Network (LAN
(Metropditan Area Network (MAN
(Wide Area Network (WAN
5
ring, ATM (Asynchronous Transfere Mode) up to 40 Gbps
and Ethernet 10 Mbps. It is generally limited to a
geographic area such as a writing lab, school, or building.
Rarely are LAN computers more than a mile apart. In a
typical LAN configuration, one computer is designated as
the file server. It stores all of the software that controls
the network, as well as the software that can be shared by
the computers attached to the network. Computers
connected to the file server are called workstations. The
.workstations can be less powerful than the file server
6
Layer 7: Application layer
This layer supports applicationCommunication partners
are identified, quality of service is identified, user
authentication and privacy are considered, and any
constraints on data syntaxare identified. Everything at this
layer is application-specific. This layer provides application
services for file transfers, e-mailand other network
software services. Telnet and FTPare applications that
exist entirely in the application level. Tiered application
.architectures are part of this layer
7
This layer provides independence from differences in data
representation (e.g., encryption by translating from
application to network format, and vice versa. The
presentation layer works to transform data into the form
that the application layer can accept. This layer formats
and encrypts data to be sent across a providing freedom
.from compatibility problems
8
gains access to the data and permission to transmit it. The
LLC layer controls frame synchronization, flow control and
error checking.
2- TCP/IP model
Application Layer
9
for the World-Wide-Web, and File Transfer Protocol (FTP).
Most application level protocols are associated with one or
.more port number
Transport Layer
In TCP/IP there are two Transport Layer protocols. The
Transmission Control Protocol (TCP) guarantees that
information is received as it was sent. The User Datagram
.Protocol (UDP) performs no end-to-end reliability checks
Internet Layer
In the OSI Reference Model the Network Layer isolates the
upper layer protocols from the details of the underlying
network and manages the connections across the
network. The Internet Protocol (IP) is normally described
as the TCP/IP Network Layer. Because of the Inter-
Networking emphasis of TCP/IP this is commonly referred
to as the Internet Layer. All upper and lower layer
communications travel through IP as they are passed
.through the TCP/IP protocol stack
10
defining its own. Most RFCs that refer to the Data Link
Layer describe how IP utilizes existing data link protocols
such as Ethernet, Token Ring, FDDI, HSSI, and ATM. The
characteristics of the hardware that carries the
communication signal are typically defined by the Physical
.Layer
11
:Shielded Twisted Pair (STP) Cable
:Coaxial Cable
Coaxial cable
12
Rollover cable:
:rule 5-4-3
This rule is used to manage max. no of repeaters that may
.be used without collision occurrence
max. no of segments = 5 :5
max. no of repeaters = 4 :4
max. no of populated segments = 3 :3
13
:Hub -2
14
d- Devices connected to a hub operate half duplex (either
Tx or Rx at a time), not full duplex (Tx and Rx at the
.same time), else a collision will happen
Base T …. This means that the port speed 10 -
.at half duplex = 10 Mbps
If we have 4 port, then the speed will be 10 Mbps -
because we're allowed to transmit from only one port at
.a time
MM-MM-MM-SS-SS-SS
15
:MAC address for Ethernet
bit address burnt on the ROM of the NIC of the 48 -
(DTE(physical or H/W address
.Serial interface of the router has no MAC address -
-.Ethernet interface of the router has MAC address
(bits is 12 hexadecimals(0,1,2,3,…..,9,A,B,C,D,E,F 48 -
.bits are divided into into two parts each of 24 bits 48 -
16
.IP address: Consists of 32 bits
IPv4 is a connection less protocol i.e best -
.effort delivery
IP classes
:Reserved IP Address
17
The IANA assigned a range of private addresses, that can -
be given to devices in an internal network (LAN) and
that address can be repeated in any other LAN with no
restrictions ex: 10.0.0.0
NAT (Network Address Translation) is a certain protocol -
used to change private address that can be used on the
.internet
Network Address
:Subnetting
In subnetting, a network is divided into smaller subnets -
with each subnet having its own subnet address.
- Dividing a major network into multiple subnetworks,
.where each subnet is a separate network
This can be achieved by giving part of host bits to -
.network bits
Now we can divided the major net into 28 subnetworks -
.aech is considered a separate network
18
Most IP address assignments were not used very •
.efficiently
.Broadcast problem •
Many sites were requesting multiple network numbers •
.due to variable amounts of networks at their sites
:Subnet mask
19
:When a PC is up and it needs to send data, it should know 4 information
:Src MAC
.It's a H/W physical add -
Burnt on the ROM of the NIC and the PCC can read it at
.startup
:Src IP
:Manual(static) method -1
Write the IP (usually the private IP), mask, default
.gateway and DNS IP
:Automatic -2
:(Reverse Address Resolution Protocol (RARP(2.1)
Resolve unknown IP to known MAC.It's a S/W, when it's
setuped on a certain PC then this certain PC becomes a
.(RARP server (gives IPs for PCs
.RARP is a layer 2 protoco, i.e it hides in an Ethernet frame
The RARP server will form a table between different MACs
of the PCs and certain allowed IPs but this table should be
.filled manually and we should know all the MACs
.It's still static IP, as we wrote it on the table
RARP request:
20
Boot P is layer 7 protocol or S/W, when it's setuped on a -
.certain - PC it becomes Boot P server
For a Boot P server we should fill a table betweem MACs -
.vs IPs
Boot P request is B.C and the Boot P reply is unicast -
.(contains (IP, mask and gateway
Boot P is layer 7 and so it hides the IP -
so the Boot P server may be in other
.LAN
.If any device is power off, the DHCP take the IP from him
DHCP server has a DHCP pool and it may be in another -
.LAN
.DHCP deals with UDP when it need -
.DHCP may be loaded on a router -
21
DHCP offer:
dst IP:
1- Manually:
dst MAC:
22
.(Case (1) If dst is in the same LAN(segment
ARP request:
:Transport layer
PDU = segment -
.(host to host communication layer (L2 and L3 devics -
:Segmentation -1
.Error detection: Using CRC -2
Addressing through port no's: (Process address or -3
.(session address
Multiplexing many session using port number (i.e Socket -4
(.no = IP + port no
Many PCs can browsing a page on the same HTTP server -
.at the same time
23
Any PC can open a twice page on the HTTP server and it -
can do any action on any page and the reply will be on
.the same page
:reliability (6.2.2)
Error connection: By discarding the error segment(6.2.3)
.and asking the src for retransmission
:Flow control(6.2.4)
((Windowing = Positive ACK with Retransmission (PAR)
Window size: Number of segments that can be sent -
before waiting ACK and this information is sent in
.SYN message at 3 way hand shake
:Routing introduction
Basic Router Configuration:
24
(R#conf t (enable/privilege mode
(R(config)# hostname X (configuration or global mode
X(config)# enable password ____ (this password is seen
(.when viewing the running config
X(config)# enable secret _____ (this password is not seen
(.when viewing the running config
X(config)#line con 0
(X(config-line)# password ____ (line mode
X(config-line)# login
X(config-line)# line aux 0
____ X(config-line)# password
X(config-line)# login
X(config-line)#line vty 0 4
____ X(config-line)# password
X(config-line)#login
(Also: R(config-int)# (Interface mode
(R(config-router)# (router mode
<R
R>enable
R#conf t
R(config)# interface serial 0
(R(config-int)# ip address x.x.x.x(IP) x.x.x.x (subnet mask
(R(config-int)# no shutdown (opening the port
R(config-int)# description ____ (description of the network
(this interface is connected to
R(config-int)# bandwidth x Kbps (limiting speed [useful
([when using bad cables
R(config-int)# clockrate
:Routing protocol
It's the exchange of information between routers, sa as -
each router can tell other routers about network it
.can reach
.(It's final target is to form the routing table (RTG table -
.Example: Rip, OSPF, IGRP, BGP, EIGRP -
25
Each router sends to other neighbor routers information -
.about the network that it can reaches
:Routed protocol
:It's the protocol that is responsible for -
.i- End-To-End delivery
.ii- Logical addressing for every device
.Example: IP, IPx, Apple talk -
:Static routing
.Build the RTG table manually with fixed entries -
:Dynamic routing
.If multiple paths to dst are available -
"IGP category" Work within autonomous system -1
:Administrative distance
26
A number between 0 to 255 given to every protocol
.indicating the trustfulness of this protocol
:Best path
:Metric may be
.Hop: Less hops to dst is better
.B.W: Choose the widely road to the destination
.Delay: Path gives less delay is better
.Load: We may have large BW but used by all people
.Cost: According to BW and delay
Reliability: How many times the network dropped and start
.up again
MTU: Maximum Transmission Unit as it's large, then we
.don't have to divide the data and that's better
27
.Build your routing table manually -
This is used with the internet service provider's routers -
.((ISP
:Dynamic route(2)
:(Distance vector(DV
28
each router detects its direct connected networks and
form its initial routing table routers pass periodic copies of
routing table to neighbor routers and learn the best paths
to all networks ( the paths with the least metric ) and form
the final routing table (convergence) after convergence
periodic updates (full routing table) are sent to indicate
. any change in the topology
:Problems
:Slow convergence -1
If any router may sense that any port of any other router
.(is failure (down) after many seconds (at minimum 30 sec
Routing loop -2
:Solutions
TTL expire: TTL of the PCK starts with 255 and when it -1
.reaches zero the PCK will be discarded
Triggered update: - We don't wait until 30 sec (RIP) but -2
whenever the update occurs the router will forward it's full
.RTG table
Any routers receives this update will forward it and will -
.reply with an AC
:Split horizon -3
route learned from interface can never be advertised
.(sent) back on the same interface
(Hold down timer: (RIP=180 sec, IGRP=280 sec -4
The router that learns about a failed route will never try
:to learn about it unless
a- The router is learned from the same source with the
.same metric
29
b- The router is learned from another source with better
.metric
.c- Hold time down is expired
The router will accept the B.C msg and of course it will -
not pass it as a B.C msg, but it will take an action, like
updating his routing table when the router understands
.that this is a rip msg
Ripv1 deals with UDP and most protocols deals with UDP -
.send B.C
30
:Support solutions -10
(Triggered update+ poisoned route+ poison reverse(ACK -
Split horizon -
.Hold down timer = 180 sec -
(Advanced (D.V
Ripv2: Is the same protocol as Ripv1 but changes are in
.the updating and it's a layer 7 protocol
.Its advanced protocol -1
31
.It sends updates on multicast address 224.0.0.9 -2
How to know whether our router works Ripv1 or Ripv2 and both have
?"symbol "R
32
i.e they should also path the DUAL exam) but they're oh)
.(higher metric (as metric decrease it is better
.Send update in multicast address 224.0.0.10 -7
.Classless: Sends the mask with the update -8
."Symbol in RTG table id "D -9
.(Admin distance = 90 (the best -10
(Metric of EIGRP (32 bit) = 256 * metric of IGRP (24 bits -11
Maximum hop count = 224 hop, we may use 255 -12
.routers in series
Support equal and non-equal load sharing (non-equal -13
.(load balancing
Support routing for multiple network layered routed -14
.(protocols (IP, IPx, Apple talk
IP pck, IPx pck,Apple talk pck are different and so IP, IPx -
.and Apple talk can't understand each other
:EIGRP terminology
"Neighbor table: "List of all neighbors -1
"Routing table: "List of best routes to dst -2
"Topology table: "List of all routers to all destinations -3
.Your neighbors RTG table -
"Successor (S): "Best path -4
"Feasible successor (FS): "Backup path -5
Feasible distance (FD): "Metric between src router and -6
"dst router
Advertised distance (AD): "Metric between my neighbor -7
"and dst
(…,AD = y metric is function of (delay, B.W
.(N.B: RTG table shows successor by certain AD (best path
33
Each router will then draw a tree from its LSDB called -4
.LSDB tree
:At convergence
Each router will only send periodic LSA every 30 min or
.more to make LSDB refreshment
:At change
34
Router that feels change will send triggered partial -
.update
Assume network on Eo is down then "W" will send the -
.following
Each neighbor will take a copy of this LSA and updates its -
LSDB and redraw the LSDB tree and then redraw the SPF
tree and reform his RTG table and in the same time
.forward the LSA of W as it is to the following neighbors
35
.Use Dijkstra algorithm to calculate the RTG table -6
.Classless and reliable -7
.classless: Transmit the mask during update -
.reliable: Transmit ACK -
Sends periodic update every 30 min (LSDB -8
.(refreshment
.(Support hierarchical design (divide AS to areas -9
Each router can know full details about its area and -
.know only summary about other areas
:Hierarchical design
.(More complex design (disadvantages -1
Network instability will affect only the area and not the -2
.(entire network (advantages
.(Less CPU usage (advantages -3
.(Less memory utility (advantages -4
:Process ID
As if we divide our router into number of routers each
:interface can flow a process
.Number that identify a unique LSDB on the local router -1
Locally significant (affect the local router only and not -2
.(advertised to other routers
36
Multiple access means that more than 1 neighbor on 1 -
.interface
:N.B
High speed is large than (T1 = 1.54 Mpbs): Hello every 5 -
.sec and dead every 15 sec
Low speed is less than (T1 = 1.54 Mpbs): Hello every 60 -
sec and dead every 180 sec
37
(Election for designated router (DR) and Backup designed router (BDR
:How to elect a DR
First router to boot up: The routers that boots before -1
.others by 40 seconds
.Router having highest priority per interface -2
By default the priority = 1 and we can change it by -
.(configuration from (0 to 255
.If priority = 0 then the router can't be DR and BDR -
.(Router having highest RID (Router ID -3
:Router ID
.Highest IP address configured in loop back interface -
Highest IP configured on active interface -
.(if the loop back doesn't exist)
:Loop back interface -
.Virtual S/W interface -
."Always up, need no "no shutdown -
Used in DNS table, because if we use a physical interface -
.it may be down any time
.We may use from 0 to 4 milliards loop back interfaces -
38
.NAT is a software loaded on routers or servers -
:NAT terminology
:Inside local IP -1
Internet device with private IP, i.e the local IP of a
.device exist in my network
:Inside global IP -2
Internal device with public IP, i.e the global IP of a
.device exist in my network
:Outside local IP -3
External device with local IP, i.e the local IP of a device
.doesn't exist in my network
:Outside global IP -4
External device with public IP, i.e the global IP of a
.device doesn't exist in my network
2-Dynamic NAT :
39
.Define the pool of IPs-1
Define which inside addresses are allowed to be -2
(translated. (ACL
Switch:
Forwarding is based on Hardware ASIC (Application-
.(specific integrated circuit
Switches are faster than bridges that the switching-
.function is hardware based
:Transparent Switching
The hosts don’t aware of the presence of the switch in the-
.LAN
.The switch doesn’t change the frame-
:Bridges VS switches
Bridges were introduced by DEC in the 80’s as a low-cost,
low
complexity way to improve network performance.
– Replace a hub with a bridge or a switch and now
many PCs can
transmit at the same time.
– Some people once thought bridges would
replace routers
– But they’re not “smart enough”: bridged
networks don’t scale to
large sizes.
– Switches are basically high speed bridges that
can be
partitioned into logical sub-bridges.
– VLANs (covered later) are how we partition a
switch.
– Logically, switches and bridges are the same.
– They both use the same MAC learning strategy and
both use Spanning Tree Protocol (STP).
40
Host A transmits a frame to Host E
41
sent out the appropriate ports
42
Collision and broadcast domains:
An Ethernet segment, or multiple segments with hubs and
repeaters, form a collision domain.
– Two devices on such a segment will have a collision if
they transmit at the same time.
– Each port of a bridge or switch is a separate collision
domain.
– May be a single device or multiple devices attached to
the switch via a hub.
– The switch or collection of switches forms a broadcast
domain.
– Broadcasts flood all ports in the interconnected bridges
or switches.
43
STP is a loop-prevention protocol. allows L2 devices to
communicate with each other to discover physical loops in
the
network. specifies an algorithm that L2 devices can use
to create a loop-free logical topology. creates a tree
structure of loop-free leave and branches that spans the
entire Layer 2
network.
Spanning tree algorithm:
STP executes an algorithm called STA.
STA chooses a reference point, called a root bridge, and
then determines the available paths to that reference
point.
- If more than two paths exists, STA picks the best path
and blocks the rest
BPDUS
1- All switches using STP must exchange Bridge Protocol
Data Units (BPDU)
with other switches.
2- Sent every 2 seconds on every active port
3- The exchange of BPDU messages results in the
following:
44
What's a BID?
Consists of 2 components:
_ A 2-byte priority:
Cisco switch defaults to 32,768 or 0x8000.
_ A 6-byte MAC address
Used to elect a root bridge.
45
If all devices have the same priority, the bridge with the lowest
MAC address becomes the root bridge.
Blocked:
All ports start in blocked mode in order to prevent the bridge from
creating a bridging loop. The port stays in a blocked state if
Spanning Tree determines that there is a better path to the root
bridge.
46
Listen:
The port transitions from the blocked state to the listen state
_ Attempts to learn whether there are anyother paths to
the root bridge
_ Listens to frames but cannot send o receive data,
or add to its table.
_ Listens for a period of time called the forward delay.
Learn:
The learn state is very similar to the listen state, except that the
port can add information it has learned to its address table.
Still not allowed to send or receive data
Learns for a period of time called the forward delay
Forward:
The port can send and receive data.
A port is not placed in the forwarding state unless there are no
redundant links or it is determined that it has the best path to the
root.
Disabled:
The port is shutdown manually by an administrator.
STP timers:
The default value of the forward delay (15 seconds) was originally
derived assuming a maximum network size of seven bridge hops,
47
a maximum of three lost BPDUs, and a hello-time interval of 2
seconds.
The STP change process requires the switch to clear the table
faster in order to get rid of unreachable physical addresses.
If a switch detects a change, it can send a topology change BPDU
out its root port.
48