Network Administrator Presentation
Network Administrator Presentation
Network Administrator Presentation
Network devices include all the devices that connect the end-user
devices together to allow them to communicate.
Network Interface Card
A network interface card (NIC) is a printed circuit board that
provides network communication capabilities to and from a
personal computer. Also called a LAN adapter.
Networking Device Icons
Repeater
A repeater is a network device used to regenerate a signal.
Repeaters regenerate analog or digital signals distorted by
transmission loss due to attenuation. A repeater does not perform
intelligent routing.
Hub
Hubs concentrate connections.
In other words, they take a
group of hosts and allow the
network to see them as a
single unit.
The other part is the logical topology,which defines how the media
is accessed by the hosts for sending data.
Physical Topologies
Bus Topology
A bus topology uses a single backbone cable that is terminated at
both ends.
What was needed was a way for information to move efficiently and
quickly, not only within a company, but also from one business to
another.
Because it is a separate,
dedicated network, it avoids any
traffic conflict between clients
and servers.
Virtual Private Network
A VPN is a private network that is constructed within a public network
infrastructure such as the global Internet. Using VPN, a telecommuter can
access the network of the company headquarters through the Internet by
building a secure tunnel between the telecommuter’s PC and a VPN router in
the headquarters.
Bandwidth
Measuring Bandwidth
OSI MODEL
Why do we need the OSI Model?
The ISO created the OSI to make the IOS more efficient.
The “ISO” acronym is correct as shown.
PDU - Bits
Host Layers
7 Application These layers only
exist in the
6 Presentation
source and
5 Session destination host
4 Transport computers.
3 Network
2 Data Link
1 Physical
Media Layers
7 Application
6 Presentation
5 Session
4 Transport
These layers manage the
3 Network
information out in the
2 Data Link LAN or WAN between
1 Physical the source and
destination hosts.
Data Flow Through a Network
THE NETWORKING
MEDIA
LAN Physical Layer
Various symbols are used to represent media types.
10BASE-T
The T stands for twisted pair.
10BASE5
The 5 represents the fact that a signal can travel for approximately 500
meters 10BASE5 is often referred to as Thicknet.
10BASE2
The 2 represents the fact that a signal can travel for approximately 200
meters 10BASE2 is often referred to as Thinnet.
When performing
a back-to-back
router scenario in
a test
environment, one
of the routers will
be a DTE and the
other will be a
DCE.
Repeater
A repeater is a network device used to regenerate a signal.
Repeaters regenerate analog or digital signals distorted by
transmission loss due to attenuation.Repeater is a Physical Layer
device
The 4 Repeater Rule
The Four Repeater Rule for 10-Mbps Ethernet should be used as a
standard when extending LAN segments.
Hubs concentrate
connections.In other words,
they take a group of hosts and
allow the network to see them
as a single unit.
Hub is a physical layer
device.
Network Interface Card
The function of a NIC is to connect a host device to the network medium.
A NIC is a printed circuit board that fits into the expansion slot on the motherboard or
peripheral device of a computer. The NIC is also referred to as a network adapter.
NICs are considered Data Link Layer devices because each NIC carries a unique code
called a MAC address.
MAC Address
MAC address is 48 bits in length and expressed as twelve hexadecimal
digits.MAC addresses are sometimes referred to as burned-in addresses (BIA)
because they are burned into read-only memory (ROM) and are copied into
random-access memory (RAM) when the NIC initializes.
Bridge
Bridges are Data Link layer devices.Connected host
addresses are learned and stored on a MAC address
table.Each bridge port has a unique MAC address
Bridges
Bridging Graphic
Switch
cut-through
A switch starts to transfer the frame as soon as the destination MAC address is
received. No error checking is available.
Must use synchronous switching.
store-and-forward
At the other extreme, the switch can receive the entire frame before sending it
out the destination port. This gives the switch software an opportunity to verify
the Frame Check Sum (FCS) to ensure that the frame was reliably received
before sending it to the destination.
Must be used with asynchronous switching.
fragment-free
A compromise between the cut-through and store-and-forward modes.
Fragment-free reads the first 64 bytes, which includes the frame header, and
switching begins before the entire data field and checksum are read.
Full Duplex
Another capability emerges when only two nodes are connected. In a network that uses
twisted-pair cabling, one pair is used to carry the transmitted signal from one node to the
other node. A separate pair is used for the return or received signal. It is possible for signals
to pass through both pairs simultaneously. The capability of communication in both directions
at once is known as full duplex.
Switches – MAC Tables
Switches – Parallel Communication
Microsegmentation
A switch is simply a bridge with many ports. When only one node is connected to a switch
port, the collision domain on the shared media contains only two nodes. The two nodes in
this small segment, or collision domain, consist of the switch port and the host connected
to it. These small physical segments are called micro segments.
Peer-to-Peer Network
In a peer-to-peer network, networked computers act as equal partners, or peers.
As peers, each computer can take on the client function or the server function.
At one time, computer A may make a request for a file from computer B, which responds
by serving the file to computer A. Computer A functions as client, while B functions as the
server. At a later time, computers A and B can reverse roles.
In a peer-to-peer network, individual users control their own resources. Peer-to-peer
networks are relatively easy to install and operate. As networks grow, peer-to-peer
relationships become increasingly difficult to coordinate.
Client/Server Network
In a client/server arrangement, network services are located on a dedicated computer
called a server.
The server is a central computer that is continuously available to respond to requests from
clients for file, print, application, and other services.
7 Application
6 Presentation Application
5 Session
4 Transport Transport
3 Network Internet
2 Data Link Network Access
1 Physical
2 Models
Side-By-Side
7 Application
6 Presentation Application
5 Session
4 Transport Transport
3 Network Internet
2 Data Link Network Access
1 Physical
The Application Layer
The application
layer of the
TCP/IP model
handles high-
level protocols,
issues of
representation,
encoding, and
dialog control.
The Transport Layer
NOTE: TCP/IP transport layer using UDP does not always guarantee reliable
delivery of packets as the transport layer in the OSI model does.
Introduction to the Transport Layer
The primary duties of the transport layer, Layer 4 of the OSI model,
are to transport and regulate the flow of information from the source to
the destination, reliably and accurately.
Flow control avoids the problem of a transmitting host overflowing the buffers in the
receiving host.
3-Way Handshake
TCP requires connection establishment before data transfer begins.
For a connection to be established or initialized, the two hosts must
synchronize their Initial Sequence Numbers (ISNs).
Basic Windowing
Data packets must be
delivered to the
recipient in the same
order in which they
were transmitted to
have a reliable,
connection-oriented
data transfer.
The protocol fails if any
data packets are lost,
damaged, duplicated, or
received in a different
order.
An easy solution is to
have a recipient
acknowledge the receipt
of each packet before
the next packet is sent.
Sliding Window
Sliding Window
with Different Window Sizes
TCP Sequence & Acknowledgement
TCP
Transmission Control Protocol (TCP) is a connection-oriented Layer 4 protocol
that provides reliable full-duplex data transmission.
101102 = (1 x 24 = 16) + (0 x 23 = 0) + (1 x 22 = 4) +
(1 x 21 = 2) + (0 x 20 = 0) = 22
Converting Decimal to Binary
The graphic below shows the IP address range of the first octet both
in decimal and binary for each IP address class.
IPv4
As early as 1992, the Internet Engineering Task
Force (IETF) identified two specific concerns:
Exhaustion of the remaining, unassigned IPv4
network addresses and the increase in the size of
Internet routing tables.
A 100.0.0.0 100.255.255.255
B 150.75.0.0 150.75.255.255
C 200.100.50.0 200.100.50.255
Public IP Addresses
Unique addresses are required for each device on a network.
InterNIC no longer exists and has been succeeded by the Internet Assigned
Numbers Authority (IANA).
No two machines that connect to a public network can have the same IP address
because public IP addresses are global and standardized.
However, private networks that are not connected to the Internet may use
any host addresses, as long as each host within the private network is
unique.
Mixing Public and
Private IP Addresses
Private IP addresses can be intermixed, as shown in the graphic, with public IP
addresses.This will conserve the number of addresses used for internal
connections. Connecting a network using private addresses to the Internet
requires translation of the private addresses to public addresses. This
translation process is referred to as Network Address Translation (NAT).
Introduction to Subnetting
Subnetting a network means to use the subnet mask to divide the network
and break a large network up into smaller, more efficient and manageable
segments, or subnets.
Subnet addresses include the network portion, plus a subnet field and a host
field.The ability to decide how to divide the original host portion into the new
subnet and host fields provides addressing flexibility for the network
administrator.
The 32-Bit
Binary IP Address
Numbers That Show Up In Subnet
Masks (Memorize Them!)
Addressing with Subnetworks
Obtaining an Internet Address
Static Assignment of an IP Address
The administrator
manually assigns and
tracks IP addresses for
each computer, printer,
or server on the intranet.
Network printers,
application servers, and
routers should be
assigned static IP
addresses.
ARP
(Address Resolution Protocol)
Host A
ARP Request - Broadcast to all hosts
SIEMENS
NIXDORF
„What is the hardware address for IP address 128.0.10.4?“
ARP Reply
SIEMENS
NIXDORF
SIEMENS
NIXDORF
Host B
IP Address: 128.0.10.4
HW Address: 080020021545
Fig. 32 How does ARP work? (TI1332EU02TI_0004 The Network Layer, 47)
Fig. 33 The ARP command (TI1332EU02TI_0004 The Network Layer, 47)
1 Network = 1 Broadcast Domain
A
B
Router R
Reverse Address Resolution Protocol (RARP) associates a known MAC addresses with an IP
addresses.
A network device, such as a diskless workstation, might know its MAC address but not its IP
address. RARP allows the device to make a request to learn its IP address.
Devices using RARP require that a RARP server be present on the network to answer RARP
requests.
BootP
The bootstrap protocol (BOOTP) operates in a client-server environment and only
requires a single packet exchange to obtain IP information.
However, unlike RARP, BOOTP packets can include the IP address, as well as the
address of a router, the address of a server, and vendor-specific information.
One problem with BOOTP, however, is that it was not designed to provide dynamic
address assignment. With BOOTP, a network administrator creates a configuration file
that specifies the parameters for each device.The administrator must add hosts and
maintain the BOOTP database.
Even though the addresses are dynamically assigned, there is still a one to one
relationship between the number of IP addresses and the number of hosts.
This means that for every host on the network there must be a BOOTP profile with an IP
address assignment in it. No two profiles can have the same IP address.
DHCP
Unlike BOOTP, DHCP allows a host to obtain an IP address dynamically without the network
administrator having to set up an individual profile for each device.
All that is required when using DHCP is a defined range of IP addresses on a DHCP server.As
hosts come online, they contact the DHCP server and request an address.
With DHCP, the entire network configuration of a computer can be obtained in one message.
This includes all of the data supplied by the BOOTP message, plus a leased IP address and a
subnet mask.
The major advantage that DHCP has over BOOTP is that it allows users to be mobile.
Introduction to Routers
A router is a special type of computer. It has the same basic components as a standard
desktop PC. However, routers are designed to perform some very specific functions. Just as
computers need operating systems to run software applications, routers need the
Internetwork Operating System software (IOS) to run configuration files. These configuration
files contain the instructions and parameters that control the flow of traffic in and out of the
routers. The many parts of a router are shown below:
RAM
Random Access Memory, also called dynamic RAM (DRAM)
Types of interfaces:
• Ethernet
• Fast Ethernet
• Serial
• Token ring
• ISDN BRI
• Loopback
• Console
• Aux
Internal Components of a 2600 Router
External Components of a 2600 Router
External Connections
Fixed Interfaces
When cabling routers for serial connectivity, the routers will either have fixed
or modular ports. The type of port being used will affect the syntax used later
to configure each interface. Interfaces on routers with fixed serial ports are
labeled for port type and port number.
Modular Serial Port Interfaces
Interfaces on routers with modular serial ports are labeled for port type, slot, and port number.The
slot is the location of the module.To configure a port on a modular card, it is necessary to specify the
interface using the syntax “port type slot number/port number.” Use the label “serial 0/1,” when the
interface is serial, the slot number where the module is installed is slot 0, and the port that is being
referenced is port 1.
Routers & DSL Connections
The Cisco 827 ADSL router has one asymmetric digital subscriber
line (ADSL) interface. To connect a router for DSL service, use a
phone cable with RJ-11 connectors. DSL works over standard
telephone lines using pins 3 and 4 on a standard RJ-11 connector.
Computer/Terminal Console Connection
Modem Connection to Console/Aux Port
HyperTerminal Session Properties
Establishing a
HyperTerminal Session
Take the following steps to
connect a terminal to the
console port on the router:
In the setup mode, default answers appear in square brackets [ ] following the question.
Press the Enter key to use these defaults.
During the setup process, Ctrl-C can be pressed at any time to terminate the process.
When setup is terminated using Ctrl-C, all interfaces will be administratively shutdown.
When the configuration process is completed in setup mode, the following options will be
displayed:
The startup process of the router normally loads into RAM and executes one of
these operating environments. The configuration register setting can be used by
the system administrator to control the default start up mode for the router.
To see the IOS image and version that is running, use the show version
command, which also indicates the configuration register setting.
IOS File System Overview
Initial Startup of Cisco Routers
A router initializes by loading the bootstrap, the operating system, and a
configuration file.
Upon completion of the setup mode a backup copy of the configuration file may
be saved to nonvolatile RAM (NVRAM).
The goal of the startup routines for Cisco IOS software is to start the router
operations. To do this, the startup routines must accomplish the following:
• Make sure that the router hardware is tested and functional.
• Find and load the Cisco IOS software.
• Find and apply the startup configuration file or enter the setup mode.
When a Cisco router powers up, it performs a power-on self test (POST). During
this self test, the router executes diagnostics from ROM on all hardware modules.
After the Post…
After the POST, the following events occur as the router initializes:
Step 1
The generic bootstrap loader in ROM executes. A bootstrap is a simple set of instructions
that tests hardware and initializes the IOS for operation.
Step 2
The IOS can be found in several places. The boot field of the configuration register
determines the location to be used in loading the IOS. If the boot field indicates a flash or
network load, boot system commands in the configuration file indicate the exact name and
location of the image.
Step 3
The operating system image is loaded.
Step 4
The configuration file saved in NVRAM is loaded into main memory and executed one line
at a time. The configuration commands start routing processes, supply addresses for
interfaces, and define other operating characteristics of the router.
Step 5
If no valid configuration file exists in NVRAM, the operating system searches for an
available TFTP server. If no TFTP server is found, the setup dialog is initiated.
Step in Router Initialization
Router LED Indicators
Cisco routers use LED indicators to provide status information. Depending
upon the Cisco router model, the LED indicators will vary. An interface
LED indicates the activity of the corresponding interface. If an LED is off
when the interface is active and the interface is correctly connected, a
problem may be indicated. If an interface is extremely busy, its LED will
always be on. The green OK LED to the right of the AUX port will be on
after the system initializes correctly.
Enhanced
Cisco IOS Commands
The show version Command
The show version command displays information about the Cisco IOS software
version that is currently running on the router. This includes the configuration
register and the boot field settings.
Use the show version command to identify router IOS image and boot source. To
find out the amount of flash memory, issue the show flash command.
Router User Interface Modes
The Cisco command-line interface (CLI) uses a hierarchical structure. This
structure requires entry into different modes to accomplish particular tasks.
Each configuration mode is indicated with a distinctive prompt and allows only
commands that are appropriate for that mode.
As a security feature the Cisco IOS software separates sessions into two access
levels, user EXEC mode and privileged EXEC mode. The privileged EXEC mode
is also known as enable mode.
Overview of Router Modes
Router Modes
User Mode Commands
Privileged Mode Commands
NOTE:
There are
many more
commands
available in
privileged
mode.
Specific Configuration Modes
CLI Command Modes
All command-line interface (CLI) configuration changes to a Cisco router are
made from the global configuration mode. Other more specific modes are entered
depending upon the configuration change that is required.
The following command moves the router into global configuration mode
When specific configuration modes are entered, the router prompt changes to
indicate the current configuration mode.
Typing exit from one of these specific configuration modes will return the router to
global configuration mode. Pressing Ctrl-Z returns the router to all the way back
privileged EXEC mode.
Configuring a Router’s Name
A router should be given a unique name as one of the first
configuration tasks.
Router(config)#hostname Tokyo
Tokyo(config)#
Router(config)#line console 0
Router(config-line)#password <password>
Router(config-line)#login
Configuring a Modem Password
If configuring a router via a modem you are most likely connected to
the aux port.
The method for configuring the aux port is very similar to configuring
the console port.
Router(config)#line aux 0
Router(config-line)#password <password>
Router(config-line)#login
Configuring Interfaces
An interface needs an IP Address and a Subnet Mask to be configured.
All interfaces are “shutdown” by default.
The DCE end of a serial interface needs a clock rate.
Router#config t
Router(config)#interface serial 0/1
Router(config-if)#ip address 200.100.50.75 255.255.255.240
Router(config-if)#clock rate 56000 (required for serial DCE only)
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#int f0/0
Router(config-if)#ip address 150.100.50.25 255.255.255.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#exit
Router#
On older routers, Serial 0/1 would be just Serial 1 and f0/0 would be e0.
s = serial e = Ethernet f = fast Ethernet
Configuring a Telnet Password
A password must be set on one or more of the virtual terminal (VTY)
lines for users to gain remote access to the router using Telnet.
The following commands are used to set the same password on all
of the VTY lines:
Router(config)#line vty 0 4
Router(config-line)#password <password>
Router(config-line)#login
Examining the show Commands
There are many show commands that can be used to examine the contents of files in the
router and for troubleshooting. In both privileged EXEC and user EXEC modes, the
command show ? provides a list of available show commands. The list is considerably
longer in privileged EXEC mode than it is in user EXEC mode.
show interfaces – Displays all the statistics for all the interfaces on the router. show int
s0/1 – Displays statistics for interface Serial 0/1
show controllers serial – Displays information-specific to the interface hardware
show clock – Shows the time set in the router
show hosts – Displays a cached list of host names and addresses
show users – Displays all users who are connected to the router
show history – Displays a history of commands that have been entered
show flash – Displays info about flash memory and what IOS files are stored there
show version – Displays info about the router and the IOS that is running in RAM
show ARP – Displays the ARP table of the router
show start – Displays the saved configuration located in NVRAM
show run – Displays the configuration currently running in RAM
show protocol – Displays the global and interface specific status of any configured
Layer 3 protocols
Ethernet Overview
Ethernet is now the dominant LAN technology in the world.
All LANs must deal with the basic issue of how individual stations
(nodes) are named, and Ethernet is no exception.
Token Ring
logical ring topology (information flow is
controlled in a ring) and a physical star
topology (in other words, it is wired as a
star)
FDDI
logical ring topology (information flow is
controlled in a ring) and physical dual-ring
topology(wired as a dual-ring)
Collision Domains
After a collision occurs and all stations allow the cable to become
idle (each waits the full interframe spacing), then the stations that
collided must wait an additional and potentially progressively
longer period of time before attempting to retransmit the collided
frame.
• Addresses are the same as in the route summarization figure, except that
Class B network 172 has been replaced by Class C network 192.
CIDR Example
Anatomy of an IP Packet
IP packets consist of the data from upper layers plus an IP
header. The IP header consists of the following:
Administrative Distance
The administrative distance is an optional parameter that gives a measure of the
reliability of the route. The range of an AD is 0-255 where smaller numbers are
more desireable.
The default administrative distance when using next-hop address is 1, while the
default administrative distance when using the outgoing interface is 0. You can
statically assign an AD as follows:
Sometimes static routes are used for backup purposes. A static route can be
configured on a router that will only be used when the dynamically learned route
has failed. To use a static route in this manner, simply set the administrative
distance higher than that of the dynamic routing protocol being used.
Configuring Default Routes
Default routes are used to route packets with destinations that do not
match any of the other routes in the routing table.
A default route is actually a special static route that uses this format:
Router
Switch
Router Router
Router
Router
Switch
What is
an optimal
route ?
Routing Protocols
Routing protocols
includes the following:
Examples of routing
protocols that support
the IP routed protocol
are:
RIP, IGRP,
OSPF, BGP,
and EIGRP.
Routed Protocols
Protocols used at the network layer that transfer data from one host to another across a router
are called routed or routable protocols. The Internet Protocol (IP) and Novell's Internetwork
Packet Exchange (IPX) are examples of routed protocols. Routers use routing protocols to
exchange routing tables and share routing information. In other words, routing protocols
enable routers to route routed protocols.
Autonomous System An Autonomous System (AS) is a group of IP networks, which has a
single and clearly defined external routing policy.
EGP
Exterior Gateway
Protocols are used
for routing between
Autonomous Systems
AS 1000 AS 3000
IGP
Interior Gateway Protocols are
used for routing decisions
AS 2000 within an Autonomous System.
AS 1000 AS 3000
EGP
EGP IGP
EGP
AS 2000
Fig. 49 The use of IGP and EGP protocols (TI1332EU02TI_0004 The Network Layer, 67)
IGP and EGP
An autonomous system is a network or set of networks under
common administrative control, such as the cisco.com domain.
Categories of Routing Protocols
Most routing algorithms can be classified into one of two categories:
• distance vector
• link-state
The link-state approach, also called shortest path first, recreates the
exact topology of the entire internetwork.
Distance Vector
Routing Concepts
Distance Vector Routing (DVR)
Routing table contains the addresses
Destination Distance
of destinations and the distance
192.16.1.0 1 of the way to this destination.
192.16.5.0 1
192.16.7.0 2
2 Hops
1 Hop 1 Hop
192.16.5.0
Routing Tables Graphic
Distance Vector
Topology Changes
Router Metric Components
Distance Vector Routing (DVR)
192.16.3.0
192.16.2.0 192.16.6.0
192.16.5.0
192.16.7.0 2 C 192.16.1.0 2 B
Fig. 53 Distribution of routing information with distance vector routing protocol (cont.) (TI1332EU02TI_0004 The Network Layer, 71)
RIPv1
Distance Vector Routing Protocol,
classful
130.24.25.0/24 Router A
RIP-1: 130.24.0.0
Port 2 200.14.13.0/24
130.24.36.0/24 200.14.13.2/24
Fig. 60 RIP-1 permits only a single subnet mask (TI1332EU02TI_0004 The Network Layer, 83)
Router Configuration
The router command starts a routing process.
GAD(config)#router rip
GAD(config-router)#network 172.16.0.0
The router that detects a topology change immediately sends an update message
to adjacent routers that, in turn, generate triggered updates notifying their
adjacent neighbors of the change.
When a route fails, an update is sent immediately rather than waiting on the
update timer to expire.
Triggered updates, used in conjunction with route poisoning, ensure that all
routers know of failed routes before any holddown timers can expire.
Triggered Updates Graphic
Solution: Holddown Timers
IGRP
Interior Gateway Routing Protocol (IGRP) is a proprietary
protocol developed by Cisco.
Holddowns
Holddowns are used to prevent regular update messages from inappropriately reinstating a
route that may not be up.
Split horizons
Split horizons are derived from the premise that it is usually not useful to send information
about a route back in the direction from which it came.
Today, IGRP is showing its age, it lacks support for variable length subnet masks (VLSM).
Rather than develop an IGRP version 2 to correct this problem, Cisco has built upon
IGRP's legacy of success with Enhanced IGRP.
Configuring IGRP
Routing Metrics Graphics
Link State Concepts
Link State Topology Changes
Link State Routing (LSR)
LSP: LSP:
„My links to SPF „My links to R1 and R3 are up.
R2 and R4 are up“ My link to R2 is down.“
Routing
Table
Router 1 Router 4
Router 2 Router 3
1
Router A Router C 4
2 2 Router E
1
4
Router B Router D
A B C D
B C A D D A E C B
D C E E B A
E
Link State Routing Features
Link-state algorithms are also known as Dijkstras algorithm or as SPF (shortest path first) algorithms.
The distance vector algorithm are also known as Bellman-Ford algorithms. They have
nonspecific information about distant networks and no knowledge of distant routers.
A link-state routing algorithm maintains full knowledge of distant routers and how they interconnect.
Link-state routing uses:
• Topological database
A topological database is a collection of information gathered from LSAs.
• SPF algorithm
The shortest path first (SPF) algorithm is a calculation performed on the
database resulting in the SPF tree.
– Neighbor table:
• Also known as the adjacency database
(list of recognized neighbors)
– Topology table:
• Typically referred to as LSDB
(routers and links in the area or network)
• All routers within an area have an identical LSDB
– Routing table:
• Commonly named a forwarding database
(list of best paths to destinations)
OSPF vs. RIP
RIP is limited to 15 hops, it converges slowly, and it sometimes chooses slow
routes because it ignores critical factors such as bandwidth in route
determination. OSPF overcomes these limitations and proves to be a robust
and scalable routing protocol suitable for the networks of today.
OSPF Terminology
The next several slides explain various OSPF terms -one
per slide.
OSPF Term: Link
OSPF Term: Link State
OSPF Term: Area
OSPF Term: Link Cost
OSPF Term: Forwarding Database
OSPF Term: Adjacencies Database
OSPF Terms: DR & BDR
Link-State Data Structure:
Network Hierarchy
•Link-state routing requires a hierachical
network structure that is enforced by OSPF.
•This two-level hierarchy consists of the
following:
• Transit area (backbone or area 0)
• Regular areas (nonbackbone areas)
OSPF Areas
Area Terminology
LS Data Structures: Adjacency
Database
– Routers discover neighbors by exchanging
hello packets.
– Routers declare neighbors to be up after checking
certain parameters or options in the hello packet.
– Point-to-point WAN links:
• Both neighbors become fully adjacent.
– LAN links:
• Neighbors form an adjacency with the DR and BDR.
• Maintain two-way state with the other routers (DROTHERs).
– Routing updates and topology information are only passed between
adjacent routers.
OSPF Adjacencies
Router(config-router)#
network address inverse-mask area [area-id]
Router#
show ip ospf
Router#
show ip ospf neighbor [detail]
show ip route
show ip ospf neighbor detail
Unlike IGRP, which is a classful routing protocol, EIGRP supports CIDR and
VLSM.
Each EIGRP router maintains a neighbor table that lists adjacent routers.
This table is comparable to the adjacency database used by OSPF. There
is a neighbor table for each protocol that EIGRP supports.
When a neighbor sends a hello packet, it advertises a hold time. The hold
time is the amount of time a router treats a neighbor as reachable and
operational. In other words, if a hello packet is not heard within the hold
time, then the hold time expires.
When the hold time expires, the Diffusing Update Algorithm (DUAL), which
is the EIGRP distance vector algorithm, is informed of the topology change
and must recalculate the new topology.
Topology Table
The topology table is made up of all the EIGRP routing tables in the autonomous
system.
DUAL takes the information supplied in the neighbor table and the topology table
and calculates the lowest cost routes to each destination. By tracking this
information, EIGRP routers can identify and switch to alternate routes quickly.
The information that the router learns from the DUAL is used to determine the
successor route, which is the term used to identify the primary or best route.
A copy is also placed in the topology table.
Every EIGRP router maintains a topology table for each configured network
protocol. All learned routes to a destination are maintained in the topology table.
Routing Table
The EIGRP routing table holds the best routes to a destination. This information is
retrieved from the topology table. Each EIGRP router maintains a routing table for
each network protocol.
There can be up to four successor routes for any particular route. These can be of
equal or unequal cost and are identified as the best loop-free paths to a given
destination.
EIGRP relies on hello packets to discover, verify, and rediscover neighbor routers.
Rediscovery occurs if EIGRP routers do not receive hellos from each other for a hold time
interval but then re-establish communication.
EIGRP routers send hellos at a fixed but configurable interval, called the hello interval. The
default hello interval depends on the bandwidth of the interface.
Each router constructs a topology table that contains information about how to
route to a destination network.
The Topology heading identifies the preferred primary route, called the successor
route (Successor), and, where identified, the backup route, called the feasible
successor (FS). Note that it is not necessary to have an identified feasible
successor.
FS Route Selection Rules
DUAL Example
Configuring EIGRP
Verifying the EIGRP Configuration
ACLs can be created for all routed network protocols, such as Internet
Protocol (IP) and Internetwork Packet Exchange (IPX).
If ACLs are not configured on the router, all packets passing through
the router will be allowed onto all parts of the network.
ACLs Filter Traffic Graphic
How ACLs Filter Traffic
One List per Port, per
Destination, per Protocol...
How ACLs work.
Creating ACLs
ACLs are created in the global configuration mode. There are many
different types of ACLs including standard, extended, IPX, AppleTalk, and
others. When configuring ACLs on a router, each ACL must be uniquely
identified by assigning a number to it. This number identifies the type of
access list created and must fall within the specific range of numbers that
is valid for that type of list.
{ in | out }
ACL Example
Basic Rules for ACLs
These basic rules should be followed when creating and applying access lists:
While subnet masks start with binary 1s and end with binary 0s, wildcard
masks are the reverse meaning they typically start with binary 0s and end
with binary 1s.
In the examples that follow Cisco has chosen to represent the binary 1s in
the wilcard masks with Xs to focus on the specific bits being shown in
each example.
You will see that while subnet masks were ANDed with ip addresses,
wildcard masks are ORed with IP addresses.
.
Wildcard Mask Example #1
Wildcard Mask Example #2
Wildcard Mask Example #3
Wildcard Mask Example #4 - Even IPs
Wildcard Mask Example #5 - Odd IP#s
The any and host Keywords
Verifying ACLs
There are many show commands that will verify the content and
placement of ACLs on the router.
The comparison will result in either permit or deny access for an entire protocol suite,
based on the network, subnet, and host addresses.
The standard version of the access-list global configuration command is used to define a
standard ACL with a number in the range of 1 to 99 (also from 1300 to 1999 in recent IOS).
The no form of this command is used to remove a standard ACL. This is the syntax:
Router(config)#no access-list access-list-number
Extended ACLs
Extended ACLs are used more often than standard ACLs because they provide a greater
range of control. Extended ACLs check the source and destination packet addresses as
well as being able to check for protocols and port numbers.
The syntax for the extended ACL statement can get very long and often will wrap in the
terminal window.
The wildcards also have the option of using the host or any keywords in the command.
At the end of the extended ACL statement, additional precision is gained from a field that
specifies the optional Transmission Control Protocol (TCP) or User Datagram Protocol
(UDP) port number.
Logical operations may be specified such as, equal (eq), not equal (neq), greater than (gt),
and less than (lt), that the extended ACL will perform on specific protocols.
Extended ACLs use an access-list-number in the range 100 to 199 (also from 2000 to 2699
in recent IOS).
Extended ACL Syntax
Extended ACL Example
This extended ACL will allow people in network 200.100.50.0 to
surfing the internet, but not allow any other protocols like email, ftp,
etc.
NOTE: Just like all Standard ACLs end with an implicit "deny any",
all Extended ACLs end with an implicit "deny ip any any" which
means deny the entire internet from anywhere to anywhere.
ip access-group
The ip access-group command links an existing standard or
extended ACL to an interface.
Remember that only one ACL per interface, per direction, per
protocol is allowed.
Named ACLs are not compatible with Cisco IOS releases prior to Release 11.2.
Router(config)# int e0
Router(config-if)# ip access-group 1 in
or
Router(config-if)# ip access-group 1 out
Denying a Single Host
Router(config)# access-list 1 deny 200.100.50.23 0.0.0.0
Router(config)# access-list 1 permit 0.0.0.0 255.255.255.255
or
Router(config)# access-list 1 deny host 200.100.50.23
Router(config)# access-list 1 permit any
Router(config)# int e0
Router(config-if)# ip access-group 1 in
or
Router(config-if)# ip access-group 1 out
Permitting a Single Network
Class C
Router(config)# access-list 1 permit 200.100.50.0 0.0.0.255
or
Class B
Router(config)# access-list 1 permit 150.75.0.0 0.0.255.255
or
Class A
Router(config)# access-list 1 permit 13.0.0.0 0.255.255.255
Router(config)# int e0
Router(config-if)# ip access-group 1 in
or
Router(config-if)# ip access-group 1 out
Denying a Single Network
Class C
Router(config)# access-list 1 deny 200.100.50.0 0.0.0.255
Router(config)# access-list 1 permit any
or
Class B
Router(config)# access-list 1 deny 150.75.0.0 0.0.255.255
Router(config)# access-list 1 permit any
or
Class A
Router(config)# access-list 1 deny 13.0.0.0 0.255.255.255
Router(config)# access-list 1 permit any
Process:
32-28=4 2^4 = 16
1st Usable Subnet address range it 200.100.50.16-31
2nd Usable Subnet address range it 200.100.50.32-47
3rd Usable Subnet address range it 200.100.50.48-63
Process:
32-27=5 2^5=32
1st Usable Subnet address range it 192.68.72.32-63
2nd Usable Subnet address range it 192.68.72.64-95
Process:
Since exactly 8 bits are borrowed the 3rd octet will denote the
subnet number.
129th Usable Subnet address range it 150.75.129.0-255
Process:
32-22=10 (more than 1 octet) 10-8=2 2^2=4
1st Usable Subnet address range it 160.88.4.0-160.88.7.255
2nd Usable Subnet address range it 160.88.8.0-160.88.11.255
Process:
32-12=20 20-16=4 2^4=16
1st Usable Subnet address range is 111.16.0.0-111.31.255.255
13*16=208
13th Usable Subnet address range is 111.208.0.0-111.223.255.255
Process:
Since exactly 16 bits were borrowed the 2nd and 3rd octet will denote
the subnet.
or
or
or
Fig. 2 Address shortage and possible solutions (TI1332EU02TI_0003 New Address Concepts, 5)
NAT: Network Address Translator
NAT
Translates between local addresses and public ones
Many private hosts share few global addresses
translate reserve
To be pool
translated
map
NAT
exclude exclude
NAT Router
Fig. 8 How does NAT know when to return the public IP address to the pool? (TI1332EU02TI_0003 New Address Concepts, 15)
NAT Addressing Terms
• Inside Local
– The term “inside” refers to an address used for a host inside an
enterprise. It is the actual IP address assigned to a host in the
private enterprise network.
• Inside Global
– NAT uses an inside global address to represent the inside host
as the packet is sent through the outside network, typically the
Internet.
– A NAT router changes the source IP address of a packet sent
by an inside host from an inside local address to an inside
global address as the packet goes from the inside to the
outside network.
NAT Addressing Terms
• Outside Global
– The term “outside” refers to an address used for a host
outside an enterprise, the Internet.
– An outside global is the actual IP address assigned to a
host that resides in the outside network, typically the
Internet.
• Outside Local
– NAT uses an outside local address to represent the
outside host as the packet is sent through the private
enterprise network.
– A NAT router changes a packet’s destination IP address,
sent from an outside global address to an inside host, as
the packet goes from the outside to the inside network.
WAN
Router
10.47.10.10 192.50.20.5
SA = 138.76.28.4 SA = 138.76.29.7
DA =138.76.29.7 DA = 138.76.28.4
Router
SA = 10.0.0.10 SA = 138.76.29.7
DA = 138.76.29.7 DA = 10.0.0.10
Net A
10.0.0.0/8
10.0.0.10
Router
Net A
10.0.0.0/8
10.0.0.10
single public
IP address
private IP network
WAN
(e.g. SOHO)
local IP @,
mapping registered IP @,
local TU port #
assigned TU port #
TU....TCP/UDP
Fig. 10 NAPT (TI1332EU02TI_0003 New Address Concepts, 19)
NAT&PAT
Network Address Translation &
Port Address Transation
Fig. 2 Address shortage and possible solutions (TI1332EU02TI_0003 New Address Concepts, 5)
NAT: Network Address Translator
NAT
Translates between local addresses and public ones
Many private hosts share few global addresses
translate reserve
To be pool
translated
map
NAT
exclude exclude
NAT Router
Fig. 8 How does NAT know when to return the public IP address to the pool? (TI1332EU02TI_0003 New Address Concepts, 15)
NAT Addressing Terms
• Inside Local “Private address”
– The term “inside” refers to an address used for a host inside an
enterprise. It is the actual IP address assigned to a host in the
private enterprise network.
Fig. 2 Address shortage and possible solutions (TI1332EU02TI_0003 New Address Concepts, 5)
WAN
Router
10.47.10.10 192.50.20.5
SA = 138.76.28.4 SA = 138.76.29.7
DA =138.76.29.7 DA = 138.76.28.4
Router
SA = 10.0.0.10 SA = 138.76.29.7
DA = 138.76.29.7 DA = 10.0.0.10
Net A
10.0.0.0/8
10.0.0.10
Fig. 2 Address shortage and possible solutions (TI1332EU02TI_0003 New Address Concepts, 5)
Static NAT
• With static NAT, the NAT router simply
configures a one-to-one mapping between the
private address and the registered address
that is used on its behalf.
Fig. 2 Address shortage and possible solutions (TI1332EU02TI_0003 New Address Concepts, 5)
Static NAT Configuration
• See Example
Fig. 2 Address shortage and possible solutions (TI1332EU02TI_0003 New Address Concepts, 5)
Dynamic NAT
• Like static NAT, the NAT router creates a one-
to-one mapping between an inside local and
inside global address and changes the IP
addresses in packets as they exit and enter
the inside network.
Fig. 2 Address shortage and possible solutions (TI1332EU02TI_0003 New Address Concepts, 5)
Dynamic NAT
Fig. 2 Address shortage and possible solutions (TI1332EU02TI_0003 New Address Concepts, 5)
Dynamic NAT Configuration
• See Example
Fig. 2 Address shortage and possible solutions (TI1332EU02TI_0003 New Address Concepts, 5)
PAT
Port Address Translator
Router
Net A
10.0.0.0/8
10.0.0.10
Fig. 2 Address shortage and possible solutions (TI1332EU02TI_0003 New Address Concepts, 5)
PAT with e.g. a single public IP address
single public
IP address
private IP network
WAN
(e.g. SOHO)
local IP @,
mapping registered IP @,
local TU port #
assigned TU port #
TU....TCP/UDP
Fig. 2 Address shortage and possible solutions (TI1332EU02TI_0003 New Address Concepts, 5)
PAT Configuration
• See Example
Fig. 2 Address shortage and possible solutions (TI1332EU02TI_0003 New Address Concepts, 5)
Ethernet Access with Hubs
Ethernet Access with Bridges
Ethernet Access with Switches
Today's LAN
Full Duplex Transmitting
Full-duplex Ethernet allows the transmission of a packet and the reception of a different
packet at the same time.
This simultaneous transmission and reception requires the use of two pairs of wires in the
cable and a switched connection between each node. This connection is considered point-
to-point and is collision free.
The full-duplex Ethernet switch takes advantage of the two pairs of wires in the cable by
creating a direct connection between the transmit (TX) at one end of the circuit and the
receive (RX) at the other end.
Ethernet usually can only use 50%-60% of the available 10 Mbps of bandwidth because of
collisions and latency. Full-duplex Ethernet offers 100% of the bandwidth in both directions.
This produces a potential 20 Mbps throughput.
Collision Domains
Segmentation with Bridges
Segmentation with Routers
Segmentation with Switches
Basic Operations of a Switch
Switching is a technology that decreases congestion in Ethernet, Token Ring, and
FDDI LANs. Switching accomplishes this by reducing traffic and increasing
bandwidth. LAN switches are often used to replace shared hubs and are
designed to work with existing cable infrastructures.
Switching equipment performs the following two basic operations:
• Switching data frames
• Maintaining switching operations
Switching Methods
1. Store-and-Forward
The entire frame is received before any forwarding takes place. Filters are applied
before the frame is forwarded. Most reliable and also most latency especially
when frames are large.
2. Cut-Through
The frame is forwarded through the switch before the entire frame is received. At
a minimum the frame destination address must be read before the frame can be
forwarded. This mode decreases the latency of the transmission, but also reduces
error detection.
3. Fragment-Free
Fragment-free switching filters out collision fragments before forwarding begins.
Collision fragments are the majority of packet errors. In a properly functioning
network, collision fragments must be smaller than 64 bytes. Anything > 64 bytes
is a valid packet and is usually received without error.
Frame Transmission Modes
Benefits of Switching
How Switches and Bridges
Learn Addresses
Bridges and switches learn in the following ways:
The CAM stores host MAC addresses and associated port numbers.
The CAM compares the received destination MAC address against
the CAM table contents. If the comparison yields a match, the port is
provided, and switching control forwards the packet to the correct
port and address.
Shared vs. Dedicates Bandwidth
If a hub is used, bandwidth is shared. If a switch is used, then bandwidth is dedicated. If a
workstation or server is directly connected to a switch port, then the full bandwidth of the
connection to the switch is available to the connected computer. If a hub is connected to a
switch port, bandwidth is shared between all devices connected to the hub.
Microsegmentation of a Network
Microsegmentation
3 Methods of Communication
Switches & Broadcast Domains
When two switches are connected, the broadcast domain is increased.
The overall result is a reduction in available bandwidth. This happens because all devices
in the broadcast domain must receive and process the broadcast frame.
Routers are Layer 3 devices. Routers do not propagate broadcasts. Routers are used to
segment both collision and broadcast domains.
Broadcast Domain
Overview
To design reliable, manageable, and scalable networks, a network
designer must realize that each of the major components of a network has
distinct design requirements.
Good network design will improve performance and also reduce the
difficulties associated with network growth and evolution.
Each of these LAN design layers requires switches that are best suited for
specific tasks.
The Access Layer
The access layer is the entry point for user workstations and servers to the
network. In a campus LAN the device used at the access layer can be a
switch or a hub.
An access layer switch should provide this functionality with low cost
and high port density.
The distribution layer isolates network problems to the workgroups in which they occur. The
distribution layer also prevents these problems from affecting the core layer. Switches in
this layer operate at Layer 2 and Layer 3.
Distribution Layer Switches
The distribution layer switch must have high performance.
For these reasons distribution layer switches operate at both Layer 2 and
Layer 3 of the OSI model.
The following Cisco switches are suitable for the distribution layer:
• Catalyst 2926G
• Catalyst 5000 family
• Catalyst 6000 family
The Core Layer
The core layer is a high-speed switching backbone.
This layer of the network design should not perform any packet manipulation. Packet
manipulation, such as access list filtering, would slow down the process.
Providing a core infrastructure with redundant alternate paths gives stability to the network
in the event of a single device failure.
The core can be designed to use Layer 2 or Layer 3 switching. Asynchronous Transfer
Mode (ATM) or Ethernet switches can be used.
Core Layer Switches
The switches in this layer can make use of a number of Layer 2
technologies. Provided that the distance between the core layer switches
is not too great, the switches can use Ethernet technology.
In a network design, the core layer can be a routed, or Layer 3, core. Core
layer switches are designed to provide efficient Layer 3 functionality when
needed.
The following Cisco switches are suitable for the core layer:
• Catalyst 6500 series
• Catalyst 8500 series
• IGX 8400 series
• Lightstream 1010
Physical Startup of the Catalyst Switch
Switches are dedicated, specialized computers,
which contain a CPU, RAM, and an operating
system.
• System LED
• Remote Power Supply (RPS) LED
• Port Mode LED
• Port Status LEDs
The System LED shows whether the system is receiving power and functioning
correctly.
The RPS LED indicates whether or not the remote power supply is in use.
The Mode LEDs indicate the current state of the Mode button.
The Port Status LEDs have different meanings, depending on the current value
of the Mode LED.
Verifying Port LEDs During Switch POST
Once the power cable is connected, the switch initiates a series of
tests called the power-on self test (POST).
Broadcasts and multicasts frames are flooded out all ports, except the one on which
the frame was received.
The switches continue to propagate broadcast traffic over and over. This is called a
broadcast storm. This will continue until one of the switches is disconnected. The
network will appear to be down or extremely slow.
Multiple Frame Transmissions
In a redundant switched network it is possible for an end device to receive multiple
frames. Assume that the MAC address of Router Y has been timed out by both
switches. Also assume that Host X still has the MAC address of Router Y in its ARP
cache and sends a unicast frame to Router Y. The router receives the frame because
it is on the same segment as Host X. Switch A does not have the MAC address of
the Router Y and will therefore flood the frame out its ports. Switch B also does not
know which port Router Y is on. Switch B then floods the frame it received causing
Router Y to receive multiple copies of the same frame. This is a cause of
unnecessary processing in all devices.
MAC Database Instability
A switch can incorrectly learn that a MAC address is on one port, when it is actually
on a different port. In this example the MAC address of Router Y is not in the MAC
address table of either switch. Host X sends a frame directed to Router Y. Switches
A & B learn the MAC address of Host X on port 0. The frame to Router Y is flooded
on port 1 of both switches. Switches A and B see this information on port 1 and
incorrectly learn the MAC address of Host X on port 1. When Router Y sends a frame
to Host X, Switch A and Switch B will also receive the frame and will send it out port
1. This is unnecessary, but the switches have incorrectly learned that Host X is on
port 1.
Using Bridging Loops
for Redundancy
Logical Loop Free Topology
Created with STP
NOTE:
Don’t confuse Spanning Tree Protocol
(STP) with Shielded Twisted Pair (STP).
Spanning Tree Protocol - 1
Ethernet bridges
and switches can
implement the IEEE
802.1D Spanning-
Tree Protocol and
use the spanning-
tree algorithm to
construct a loop
free shortest path
network.
Shortest path is
based on
cumulative link
costs.
Link costs are
based on the speed
of the link.
Spanning Tree Protocol - 2
The Spanning-Tree Protocol establishes
a root node, called the root
bridge/switch.
The BID consists of a bridge priority that defaults to 32768 and the switch
base MAC address.
When a switch first starts up, it assumes it is the root switch and sends
BPDUs. These BPDUs contain the switch MAC address in both the root and
sender BID. As a switch receives a BPDU with a lower root BID it replaces
that in the BPDUs that are sent out. All bridges see these and decide that
the bridge with the smallest BID value will be the root bridge.
root switch.
• Select ports that are part of the spanning tree, the
designated ports. Non-designated ports are blocked.
Spanning Tree Operation
When the network has stabilized, it has converged and there is one spanning tree
per network. As a result, for every switched network the following elements exist:
• One root bridge per network
• One root port per non root bridge
• One designated port per segment
• Unused, non-designated ports
Root ports and designated ports are used for forwarding (F) data traffic.
Non-designated ports discard data traffic.
Non-designated ports are called blocking (B) or discarding ports.
Spanning Tree Port States
Spanning Tree Recalculation
A switched internetwork has converged when all the switch and bridge
ports are in either the forwarding or blocked state.
VLANs can also be used to provide security by creating the VLAN groups
according to function and by using routers to communicate between VLANs.
This limits the size of the broadcast domains and uses the router to determine
whether one VLAN can talk to another VLAN.
NOTE: This is the only way a switch can break up a broadcast domain!
Setting up VLAN Implementation
VLAN Communication
VLAN Membership Modes
• All users attached to same switch port must be in the same VLAN.
Configuring VLANs in Global Mode
Switch#configure terminal
Switch(config)#vlan 3
Switch(config-vlan)#name Vlan3
Switch(config-vlan)#exit
Switch(config)#end
Configuring VLANs
in VLAN Database Mode
Switch#vlan database
Switch(vlan)#vlan 3
VLAN 3 added:
Name: VLAN0003
Switch(vlan)#exit
APPLY completed.
Exiting....
Deleting VLANs in Global Mode
Switch#configure terminal
Switch(config)#no vlan 3
Switch(config)#end
Deleting VLANs
in VLAN Database Mode
Switch#vlan database
Switch(vlan)#no vlan 3
VLAN 3 deleted:
Name: VLAN0003
Switch(vlan)#exit
APPLY completed.
Exiting....
Assigning Access Ports to a VLAN
Switch(config)#interface gigabitethernet 1/1
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1 enet 100001 1500 - - - - - 1002 1003
2 enet 100002 1500 - - - - - 0 0
51 enet 100051 1500 - - - - - 0 0
52 enet 100052 1500 - - - - - 0 0
…
• Displays the MAC address table information for the specified interface
in the specified VLAN
Implementing VLAN Trunks
. . .
Implementing VLAN Trunk Protocol
• Cannot create,
change, or delete • Creates, modifies, and
VLANs deletes VLANs locally only
• Forwards • Forwards
advertisements advertisements
• Synchronizes VLAN • Does not
configurations synchronize VLAN
• Does not save in configurations
NVRAM • Saves configuration in
NVRAM
VTP Operation
• VTP advertisements are sent as multicast frames.
• VTP servers and clients are synchronized to the latest update identified revision
number.
• VTP advertisements are sent every 5 minutes or when there is a change.
VTP Pruning
Switch(config)#vtp server
Switch(config)#vtp pruning
Switch#configure terminal
Switch(config)#vtp server
VTP Version : 2
Configuration Revision : 247
Maximum VLANs supported locally : 1005
Number of existing VLANs : 33
VTP Operating Mode : Client
VTP Domain Name : Lab_Network
VTP Pruning Mode : Enabled
VTP V2 Mode : Disabled
VTP Traps Generation : Disabled
MD5 digest : 0x45 0x52 0xB6 0xFD 0x63 0xC8 0x49 0x80
Configuration last modified by 0.0.0.0 at 8-12-99 15:04:49
Switch#
Verifying the VTP Configuration
(Cont.)
Switch#show vtp counters
VTP statistics:
Summary advertisements received : 7
Subset advertisements received : 5
Request advertisements received : 0
Summary advertisements transmitted : 997
Subset advertisements transmitted : 13
Request advertisements transmitted : 3
Number of config revision errors : 0
Number of config digest errors : 0
Number of V1 summary errors : 0
• Leased lines
– It is a pre-established WAN communications path from
the CPE, through the DCE switch, to the CPE of the
remote site, allowing DTE networks to communicate at
any time with no setup procedures before transmitting
data.
• Circuit switching
– Sets up line like a phone call. No data can transfer
before the end-to-end connection is established.
WAN Connection Types
• Packet switching
– WAN switching method that allows you to share bandwidth
with other companies to save money. As long as you are
not constantly transmitting data and are instead using
bursty data transfers, packet switching can save you a lot
of money.
Maximum
WAN Type
Speed
Asynchronous Dial-Up 56-64 Kbps
ISDN – PRI E1 / T1
• To configure Compression
– Router(Config-if)#compress [predictor|stack|mppc]
Frame Relay
Video
DLCI=16
FR-network
R
DLCI=17
DLCI=16 DLCI=16
DLCI=21 R
Virtual circuit
R Router
B Bridge
• Static Mapping
– Using the frame-relay map command but you
should first disable the inverse arp using the
command no frame-relay inverse-arp
Integrated Services Digital Network
(ISDN)