Professional Documents
Culture Documents
Table of Contents
Introduction 1
Advantages of OSI Layered Model 1
7 OSI Layers 1
WAN Data-Link Protocols 2
HDLC 2
SDLC 2
LAPB 2
X.25 2
SLIP 2
PPP 2
Frame-Relay 3
Ethernet & 802.3 3
CSMA/CD 3
CSMA/CD Steps for a NIC 3
Ethernet Broadcasts 3
FDDI 3
Token Ring 4
ATM 5
LAN Segmentation 5
LAN Switching Types 5
Switches 5
Switching Modes 5
Multilayer Switching 5
Layer 3 Switching 5
Layer 3 Switching Options 6
Layer 4 Switching 6
Cisco MLS (Multi-Layer Switching) 6
Spanning Tree Protocol (STP - 802.1d) 6
VLAN (Virtual LAN) 6
Frame Tagging 6
Half-Duplex Ethernet 7
Full-Duplex Ethernet 7
Crossover Ethernet Cabling 7
MDI/MDX Buttons 7
Fast Ethernet 7
DoD Reference Model 8
TCP/IP Protocol Suite 9
Telnet 9
7 OSI Layers
Application
-Network Applications: file, print, message, application, and database services
-examples: WWW, E-Mail gateways, EDI, SIG BBS, Gopher, WAIS, Yahoo, Financial applications such
as Oracle-based budgeting software, NT or Win2000 Server Applications.
Presentation (Translator)
-Compress/Decompress
-Encrypt/Decrypt
-SNMP uses ASN.1 Abstract Syntax Notation – standard data syntax used in this layer.
-PICT, TIFF, JPEG, MIDI, MPEG, WMA, QuickTime
Network (Routing)
-Sending packets from source network to destination network (finding path)
-Accomplished by packet switching via routers
-Network map created & used
-Interconnect independent networks
-Use of layer 3 addresses prevents layer 2 broadcasts
Data-link (Framing)
-Delivery of data to device
-Translates into bits for physical layer
Frame format:
-Preamble (start indicator)
-Destination address
-Source address
-Ethernet II: type field
-802.3: length field (assumed IPX for type) length is between here and FCS
-802.2: adds LLC info
-DATA
-FCS
HDLC
-Point-to-point or point-to-multipoint
-Most vendors implement HDLC differently
-Default for Cisco
-Cisco’s HDLC only compatible with Cisco
SDLC
-Originally for IBM mainframe
-Polling media access method between PRI & SEC
LAPB
-Use with X.25
-Defines frames & out-of-sequence, missing frames
-Frame: retransmission, exchange, acknowledgement
X.25
-point-to-point between DTE & DCE
-Supports SVCs & PVCs
-Precursor to frame-relay
SLIP
-Low speed serial for TCP/IP
PPP
-Adds login, password, error correction (on top of SLIP)
-Adds IPX, and Appletalk (on top of SLIP)
Physical (last layer - transmitting bits via signaling and physical protocols across actual media)
EIA/TIA 232 or 449 V.24 V.35 X.21 G.703 EIA-530 HSSI – High-Speed Serial Interface
Interface between DTE and DCE is defined.
-some hubs are “stackable”—connect to hub backplane via wide cable to “upstream hub” to avoid collision
logic present in ports. This will sometimes turn off the downstream hub lights. The uplink port can also be
used to stack hubs to avoid collision logic. The uplink port is still crossed like all other hub ports, but
might have a button to switch it to uncrossed MDI/MDX button.
CSMA/CD
-Carrier Sense Multiple Access with Collision Detect
-Solution to problem when Ethernet frames are transmitted simultaneously from more than one NIC
causing the frames to be garbled.
-Routers and bridges prevent transmission of Ethernet frames throughout the whole network.
-Multiple Access refers to the capability of any NIC to being transmitting a frame at any time.
Ethernet Broadcasts
-Ethernet broadcasts are frames addressed to the following destination MAC address: FF:FF:FF:FF:FF:FF
-This means that the frame is addressed to all NICs.
-IP, and all other network layers, have their own form of broadcasts.
FDDI
-Dual token ring 100Mbps over fiber
-Very long distances
-Good in electronically hostile areas
-High speeds
-1 ring in use at a time
-2nd ring is backup (goes in opposite direction)
-Some stations attached to both rings, which is a DAS – Dual Attached Station; They are usually servers.
DAC - Dual Attached Connection is the term used in the same situation, but a server is not used. Most are
only SAS – Single Attached Station)
-Cisco routers can attach via dual-homing
-Logical and physical ring
Token Ring
NAUN - Nearest Active Upstream Neighbor (this is the very last station that receives the token before the
station in question receives the token)
MSAU - Multi Station Access Unit (acts as a central physical hub for Token Ring)
-Each station waits for token frame with empty T-bit, then appends data to frame and sets T-bit (if has data
to send): this prevents collisions entirely.
-Receiving station copies frame, then tags frame as copied. When frame reaches originating station, frame
is removed.
-Usually only one frame on ring at a given moment is max. But, can use early token release to transmit
new token immediately after transmit.
-Priority bits: only stations equal to or greater than in priority bits can claim the token.
-Only stations with higher priority can reserve token for next pass.
-Stations must reinstate previous priority after transmitting is complete.
-Frame status field includes A & C bits (Address bit, Copied bit). Both are cleared when sending (also
means destination not found yet). When sending station receives frame back, bits are read to ensure data
was received correctly. A, C bits respectively:
-1,1 – station found (data read by station) or frame copied to another ring (via a bridge)
-0,1 -- (2nd bit, the copy bit, is on) frame was copied by the destination station, but not
acknowledged
Active monitor – a station that makes sure no more than 1 token, removes token from failed transmission
station
ATM
-Used for interactive media, real-time video, client/server databases, interconnection of existing networks.
-High-bandwidth, low delay
-Uses switching & multiplexing
-53-byte cells
-Works in both LANs & WANs
-Can allocate bandwidth on demand
-Not dependent on physical layer, but req. high-speed, high-bandwidth medium like fiber optics.
LAN Segmentation
-Bridge: 20-30% latency
-Router: 30-40% latency for ACK protocol 20-30% for sliding-window protocol
-Manageability – multiple routing protocols
-Increased functionality – flow, error, congestion control.
-Multiple active paths: using protocol, DSAPs, SSAPs, and path metrics to make informed routing
decisions
Switches
-Higher port density at lower cost than bridges.
-Layer 2 or layer 3 switches
-Numerous simultaneous conversations
-High-speed data exchanges
-Low-latency, high frame-forwarding rates
-Dedicated communication between devices
-Full-duplex communication
-Media rate adaptation 10/100 hosts on same network
-Works with 802.3 NICs & cabling
Switching Modes
Store and forward (a primary type) : copies entire packet, computes CRC. Discards if: CRC error, runt,
giant. Otherwise forwards (Catalyst 5000 series)
Cut-through (a primary type) : copies only destination address, then forwards.
Can be configured to operate below an error threshold on a per-port basis.
Fragment-free - waits for collision windows (64 bytes long). Errors almost always happen in 1st 64 bytes.
Better error checking than cut-through with almost no increase in latency
Multilayer Switching
-Switching based on layer 3 or even layer 4 address.
Layer 3 Switching
-Checks source and destination IP addresses, and switches accordingly
Layer 4 Switching
-Checks layer 4 ports, i.e. TCP port # or UDP port # and switches accordingly)
-Less expensive and faster than most routers because ASICs are used.
-all layer 3 switch features
-QoS (Quality of Service) on per user or per application basis.
-memory requirements large since every port# is stored!
Frame Tagging
-Unique user-defined ID is placed in header of each frame (used only for identifying source VLAN).
(ONLY exists while in switch fabric (trunk lines)) Exception: ISL (Inter-Switch Link).
-ID is examined by each switch prior to any broadcasts or transmissions.
( 3000, 5000 series switches)
-Developed for multi-VLAN inter-switch communication
-Little processing or administrative overhead
Full-Duplex Ethernet
-Requires a switch port on “hub”.
-Can be used in 10BT, 100BT, 100BFL.
-Point-to-point -> collision free: doesn’t share bandwidth.
-Uses dedicated transmit wire for each NIC port: no chance of collision.
-Requires full-duplex NIC card & S/W drivers must support 2 simultaneous data paths.
-Requires Loopback & collision detection disabled on hub (makes it a switch port).
-Up to 200Mbps max (if both parties transmit 100Mbps at same time).
MDI/MDX Buttons
-Medium Dependent Interface
-MDI-X ports is normally what all hub (or switch) ports are permanently set to (no MDI/MDX button to
change it's type). This is because hubs (or switches) connect the TX to RX and vice versa.
-MDI ports is normally what all PC Ethernet ports (and router Ethernet ports) are permanently set to (no
MDI/MDX button to change it's type).
-MDI-X port connected to MDI port: use a straight-through connecting cable.
-MDI-X port connected to another MDI-X port, or MDI port connected to another MDI port: use a
crossover connecting cable.
-MDI/MDX autosense is available on some Cisco products
Fast Ethernet
100BaseT Fast Ethernet – 802.3u
100BaseFX Ethernet over fiber 100Mbps using 802.3 specs. Two strand 50/125 or 62.5/125 –micron
multimode fiber-optic cable.
100BaseT4 4-pair 100Mbps using 802.3 specs over CAT 3,4,5. RJ45 connector.
100BaseTX Fast Ethernet over CAT 5. To 802.3 specs. Alternate: 2 pair, 100 ohm STP or type 1 STP.
100BaseX means either 100BaseTX or 100BaseFX. Std approved for compatible: CSMA/CD& ANSI
X3T9.5
100VG AnyLan not compatible with 802.3 standards, Cisco does not support.
100BT Specifications
100BT uses same time slots as 10BT
-Round-trip must not exceed 512 bit-times for ANY Ethernet implementation. Longer times means too
many collisions than allowed by normal Ethernet operation.
for fast Ethernet, this means shorter distance
-Only 2 class II repeaters max. Not 5-4-3 rule!
100 BT Repeaters:
-100BaseFX repeaters reduce max distances due to slow conversion.
FastHub 300 – repeater compatible with IEEE 802.3u. 10X performace of 10BT hub. Slightly better than
previous two at max distances: A single repeater always has 200m max dist (same 10BT cable restriction of
100m) . Best combination : 2 FastHubs: 223m (100m cable length still in force for UTP). TX/FX
combination on hub(s) 216-308m.
DoD OSI
Session
––––––––––––––––––––––––––
Host to Host Transport Protocols for setting the level of transmission service for
applications. Create reliable end-to-end communication and
ensuring error-free data and packet sequencing.
––––––––––––––––––––––––––
Internet Network Logical transmission of packets over entire net. Adressiong of
hostst, hadles routing of packets across multiple networks, controls comm. Flow between 2 hosts.
––––––––––––––––––––––––––
Network Access Data Link Monitors data exchange between host and network. H/W
addressing. Defines protocols for physical transmission ofdata
Physical
Telnet
-Terminal emulation
-Telnet client access resources of telnet server
-Make telnet client appear as though it was a terminal attached to local network
-It’s a software image (virutal terminal) good for running apps or snooping around
FTP
-Uses telnet for transparent log in
-As a program: file/directory listing / manipulation / viewing
TFTP
-Transfers files with smaller blocks.
-No authentication.
-Need path/filename, web or IP address.
NFS
-File sharing for Unix
-Allows 2 different types of file systems to interoperate
-i.e. NFSserver on NT can provide Unix & NT files
-NFS can: execute remote files as programs
-Import & export material
-Manipulate apps. Remotely
SMTP
-Delivers email by queueing emails (usually to disk) on server from a host
X-Window
-Defines protocol for writing GUI client server apps.
-“Client” program on one host
-“Window server” program on another
SNMP
-Collects & manipulates valuable network information.
-Polls devices on netwrok from network management station
-When network is healthy, SNMP creates baseline
-Allerts managers to sudden changes
-Agents send alerts, “trap” to management station
-Agent’s threshold can be set usu. By examining baseline
-Software that uses SNMP:
-CiscoWorks (LAN/WAN monitoring of routers & switches))
-CWSI (CiscoWorks for Switched Networks) Monitoring for switched internetworks (monitoring
& managing switches & VLANs)
-NetCool
Host-to-Host
Shields upper layers (applications) from complexity of network
Creates virtual circuit (connection oriented)
Agree on size of window.
Source Port – port or socket of the application that sent the data
Destination Port – port or socket of application on the destination host
Sequence Number – used to put the data back in the correct order or retransmit missing or damaged data
Acknowledgment number – defines which TCP octet is expected next
HLEN – header length defines the number of 32-bit words in the header
Reserved – always set to zero.
Code bits – sets up and terminates a session
Window – the window size that the sender is willing to accept
Checksum – CRC, TCP doesn’t trust the lower layers.
Urgent pointer – indicates the end of urgent data.
Option – sets the maximum TCP segment size
Data – data handed down to TCP protocol.
UDP
-Scaled, down, economy model version of TCP (thin protocol) Æ lower overhead
-Much fewer options than TCP
-Unreliable
-Used with SNMP to avoid using up network bandwidth with TCP protocol overhead. SNMP are small
messages, no need for TCP to be used.
TCP UDP
Reliable Unreliable
Virtual circuit Connectionless
Sequenced Unsequenced
Acknowledgments Low overhead
IP (Internet Protocol)
-Packets are used on this layer.
-Which network is it on, what’s it’s ID on that network -> logical address (IP), hardware address
-IP address used for routing, each machine reads IP source, IP destination, routes based on these two.
-Fragments segments into packets (aka datagrams), and packets back to segments,
IP header
-Version: IP version number
-HLEN: header length in 32-bit words
-TOS: Type of Service tells how the datagram should be handled
-Total Length: the length of the packet including header and data.
-Identification, Flags, Frag Offset: These provide fragmentation and reassembly if the packet is too large to
put in a frame.
-TTL: Time to Live.
-Type or Protocol: port of upper-layer protocol ( TCP – port 6 , UDP – port 17)
-Header checksum: Cyclic Redundancy Check or Frame Check Sequence (FCS)
-Source IP Address: 32-bit IP address of sending station.
-Destination IP address: the 32-bit IP address of the station this packet is destined for.
-IP Option: used for network testing, debugging, security (i.e. PPTP encryption used in VPNs), and more.
Frames
-Ethernet_II : source, destination, type
-802.3: source, destination, length (IPX always assumed for type, but can be bound to IP instead). Novell
originally used 802.3.
-802.2 is an 802.3 frame with DSAP, SSAP fields (LLC sublayer).
-SSAP Source Service Access Point is used to define which network layer the source of the frame is using.
-DSAP Destination Service Access Point is used to define which network layer the frame's destination is
intended to go to.
-MAC sublayer has error detection, LLC sublayer has error correction (more efficient)
-Examples of implementation of this layer on LANs: Ethernet, Fast Ethernet, Token Ring.
-Examples on WANs: Point-to-Point Protocol (PPP), X.25, Frame Relay
ARP steps
1. Destination IP checked to see if it’s local (via subnet mask). If local, the host system checks it’s ARP
cache for the MAC address
2. If not found in ARP cache, host sends Ethernet broadcast on subnet asking for MAC address with
given IP address.
3. A reply (containing the needed MAC address) from the host with that IP address is sent directly to the
hardware address of requesting host.
4. Requesting host appends this IP address to ARP cache. Communication can now take place since the
destination host’s MAC address is known.
-To see contents of ARP cache on a Windows machine, use arp –a from a DOS prompt.
Note: ARP entries on Windows last minutes. ARP entries in Cisco last for hours.
IP Addressing
-Hierarchical address (Net:Node), not "flat address". 32-bit (4 octets).
Class
A Net.Node.Node.Node 0 127
B Net.Net.Node.Node 10 128-191
C Net.Node.Node.Node 110 192-223
Private Addresses
-These are not routable on the Internet by default. They are used in private networks, typically behind a
Proxy server. They are also frequently NAT'ed (discussed later).
Class A: 10.0.0.0
Class B: 172.16-31.0.0
Class C: 192.168.0.0
network 127 Loopback tests. Designates the local node, and allows that node to send a test
packet to itself without generating network traffic.
entire ip address set to all 0s For Cisco routers, means default route.
entire ip address set to all 1s Broadcast to all nodes on the current network.
Subnetting a Nework
-Uses bits from host portion of an IP address to create a subnet.
-Subnetting is act of creating little subnetworks from a single, large parent network.
-An organization with a single network address can create a subnet for each physical network (most have
multiple physical networks, so this solves that problem)
Benefits
-Reduced network traffic
-Optimized network performance
-Simplified management (easier to find problems in a smaller group of networks)
-Facilitated spanning of large geographical distances.
Planning Subnetting
-Determine current requirements and future conditions
Subnet Masks
-Each machine on the network must know which part of the host address will be used as the subnet address.
-A subnet mask is assigned to each machine to do this.
-1’s refer to network or subnet address. 0’s refer to host part of the address.
-Default subnet masks are for networks without subnets, i.e. Class B network defaults to a 255.555.0.0
subnet mask. Also, when subnetting, this is the subnet mask’s minimum size.
-Invalid subnets (those that don’t have the minimum size) typically aren’t even allowed to be punched into
IP software.
-Normally, total number of subnet bit positions, 1’s, results in total number of possible subnets: 2^bits -2
-The -2 is there because all 1’s in last octet and all 0’s in last octet are reserved. There is a special Cisco
command to allow all 0’s ip subnet-zero... This will allow both the highest and lowest possible subnet
combinations as valid subnet numbers. Make sure all IP software recognizes this convention before using.
-Calculate valid subnets: 256 – subnet mask = first subnet. Keep adding first subnet to itself until subnet
mask reached (discarded).
-Incorrect mask on a workstation can cause the router to assume the workstation is on a different subnet...
-The result is the router won’t forward packets to it. Also, the workstation will send to the default gateway
when it shouldn’t.
-Calculate valid hosts: for each subnet, it’s all the numbers above the subnet number, minus the all hosts
broadcast.
-Very large subnet masks such as 255.255.255.252 (2 host) are common in networks with many WAN
links. They usually have a direct connection between each site, so only need two host addresses, one for
each router port. Only EIGRP, OSPF support VLSM, one subnet for the LAN, and a different one for the
WAN. Only EIGRP, OSPF transmit subnet masks in their routing tables.
Cisco Routers
-Configure by console port, aux port.
-The console port is used initially, then can telnet into an interface like e0.
Router Components
ROM: stores the bootstrap program, operating system, and POST. They are socketed for upgrade or
replacement
Flash: EEPROM that holds the operating system image and microcode. Allows upgrades without
replacing the ROM chip.
RAM: provides caching and packet buffering, routing tables, etc. Holds the operating system when the
router is turned on.
Interfaces: either on the motherboard or as separate modules. ISDN interfaces can be installed in the
router separately.
Startup Sequence
POST (Power On Self Test) - Checks the CPU, memory, and all interface circuitry.
1) Bootstrap program is stored in and executed from ROM on the CPU card, it searches for a valid
CISCO IOS image (from flash, TFTP server, or ROM)
2) Operating system source is determined from boot field setting in the router’s configuration register.
If flash or network load, boot commands in the configuration file specify exact location of the image.
FLASH is default.
3) Operating system image is loaded into low-addressed memory. Determines h/w, s/w components and
lists this on screen.
4) Configuration file in NVRAM is loaded into RAM, then executed line by line.
5) System configuration dialog (aka setup dialog) started if no valid configuration file exists in NVRAM.
Can be configured by console or TFTP at this dialog.
User mode: checking router’s status, viewing basic system information, connecting to remote devices,
temporary changes to terminal settings.
Privileged mode: used to change the configuration of the router. All commands in user mode, plus those
used to set operating system parameters, detailed information on router’s status, test and run debug
operations, and access global configuration modes.
After first logging into router, user Exec mode prompt: >
? for a list of commands any time.
-- more -- .. press return to view line by line. Press space bar to see the next screen.
exit & quit take you out of both the privileged and user modes and log you out of the router.
terminal no editing (this is the only command without no before the rest of the command)
-Terminal editing also scrolls the typed input to the left 10 characters when reaching column 78. When it
scrolls, it puts a $ on the very left of the line (after the prompt)_to show there is some missing on the left
side.
Router Commands
-Two configurations: startup and running.
-Running config is the same as the startup config except it includes all config changes since the router was
powered up.
show running-config shows the configuration that’s currently loaded into RAM and running.
erase startup-config erases the configuration in NVRAM, and puts it right back into initial configuration
dialog.
Passwords
enable secret password for the enable prompt that is encrypted. Has precedence over enable password
when it exists. Configure the password in global configuration mode or setup mode.
enable password is used when there is no enable secret and when using older software and boot images.
-Virtual terminal password is required for telnet sessions into the router.
Auxiliary password
(config)# line aux 0
(config-line)# login
(config-line)# password mypassword
(config-line)# ^Z
Console password
(config)# line con 0
(config-line)# login
(config-line)# password mypassword
(config-line)# ^Z
banner motd # Message of the day banner displayed whenever anyone attempts to login.
hostname [name] this changes the name of the router, it’s displayed at each prompt.
-If modular (i.e. catalyst 5000 switch), syntax is: type slot/port. i.e. e 4/2 meaning card in slot 4, port 2.
-Versatile Interface Processor (VIP) cards: one or two slots for each port adapter, each port adapter has
interfaces. They are found in 7000 and 7500 series routers.
DTE/DCE Cable
-Normally, Cisco routers default to DTE devices.
-CSU/DSU normally handles the clocking for synchronous communications. They normally plug into
Cisco serial ports, but can be integrated into the router.
-Cisco serial port has 60 pins, some pins are looped to distinguish between DTE or DCE cable.
show controllers serial [port number] shows whether DTE or DCE cable is attached.
-If three routers with serial connections between them are connected in series, the middle router has two
DCE serial interfaces. The other two routers have DTE serial interfaces.
-DCE is a modem or interface card used to connect end-user equipment (DTE) to a greater communication
network composed of DCEs.
RouterA#sh controllers s 0
HD unit 0, idb = 0x0011d1, driver structure at 0x101de0
buffer size 1524 HD unit 1, V.35 DTE cable
cbp = 0xE1, eda = 0X3140, cda = 0x3000
RouterA#sh controllers s 1
HD unit 1, idb = 0x003de1, driver structure at 0x11ee0
buffer size 1524 HD unit 1, V.35 DCE cable
cbp = 0xE2, eda = 0X2840, cda = 0x2700
Routing Basics
IP routing – the process of sending data from a host on one network to a remote host on another network
through a router or routers.
Routing table contains the IP addresses of router interfaces that connect to the other networks.
Routing table is consulted for a path to the network that is indicated by the packet’s destination address.
If a path isn’t found, the packet is sent to the router’s default route address (if configured).
(Know how a hop across a router is accomplished by changing MAC address at the router)
Initially, a router only knows how to reach networks or subnets directly connected.
Then a router learns new networks by:
Static routing
Default routing
Dynamic routing
Static routers – require routing tables to be built and updated manually. Static routers do not
automatically share information when a change occurs.
show ip route
C 172.16.50.0 is directly connected, Ethernet0
S – static I- IGRP, R-RIP, M – mobile, B – BGP, D-EIGRP, EX – EIGRP external, O – OSPF...
-This shows one directly connected route.
Default route
-aka router or gateway of last resort)
-If the router doesn’t know the path to a certain network, it can use it just like a host uses a default gateway.
-If a Cisco router doesn’t have the subnet’s number and there’s no network default route, packets are tossed
even though the packet falls within the subnet-addressing scheme.
-To get the Cisco IOS to forward packets to obscure subnets, use ip classless.
-In other words, it tells Cisco IOS to forward the packet to subnets unknown to its routing table. It will use
a directly connected network or default route for the packet.
Dynamic Routing
-Ideal for large internetworks; maintaining static routes would be overwhelming.
-Minimal configuration required for dynamic routing.
-Routing protocols maintain the routing tables used between routers. Routing protocols don’t send end-
user data from network to network, they only pass routing information.
-Routers support multiple independent routing protocols, and can do this for all routed protocols
simultaneously.
-Many networks over the same media are possible this way (IP and IPX on same physical network).
-Most network communication occurs within small groups, routing systems follow this by creating logical
groups: domains, autonomous systems, or areas.
-If the internetwork is connected via Internet, the NIC will assign you a unique 16-bit AS number.
-Convergence: time for all routers to update their tables when a change occurs.
-update every 30 (RIP) to 90 seconds. All routers pass entire routing tables to all other known routers.
-when routers power up, they get to know the neighbors: learn metrics (hops) to all other routers out int.
-Discover (via these updates) best paths to destination networks based on number of hops the routers are
from each neighbor.
-Whenever network topology changes, routing table updates occur by each router sending out its entire
routing table in the form of a broadcast to all other routers.
-Hop-counts used (only) when making routing decisions. Sometimes have to lie to router about hops
(change hop count) when a high speed line is available.
-Routing loops occur. Happens because every router is not updated at close to the same time.
-Routing loops also known as counting to infinity (exceeding TTL). This is the result of wrong information
being communicated and propagated.
-Distance vector permits a maximum hop count of 15 to keep packets from staying in a loop forever.
-Split horizon: reduces incorrect routing information and routing overhead in distance-vector network by:
not allowing information to be sent back in the direction from which it was received.
-Route Poisoning: When a directly connected network goes down, that router changes the table entry for
that network to show 16 or unreachable aka infinite. This stops incorrect updates about that network for
this router. This router will keep it in this state until the network is back up, at that point it will trigger an
update to be sent out (don’t have to wait 30 seconds).
-Hold Downs: Used with Route Poisoning to prevent regular update messages from reinstating a down
route. They use triggered updates, which reset the hold-down timer.
Link state
-Maintains a more complex table of topology information (complete understanding and view of all the links
of distant routers)
-Uses LSP link-state packets to inform other routers of distant links.
-Uses topological databases, the shortest path first SPF algorithm, and a routing table.
-Path choice based not just on hop count, but also: available bandwidth, and congestion.
-Handles convergence differently than distance-vector. When topology changes, routers that are aware of
the change first send information to all other routers with same link-state algorithm or to a special
consultative router (Designated router, DR).
-Whenever router receives LSP packet, router recalculates the best paths and updates the routing tables
accordingly.
-Consider issues of processing power, memory usage, and bandwidth requirements.
-Most bandwidth consumed when routers come on initially; regular updates sent every two hours on avg.
(configurable). Otherwise, broadcasts are sent only when a change occurs.
-LSP time stamps, sequence numbers, and aging schemes used to avoid spread of inaccurate LSP info.
Balanced Hybrid
Uses the best of both distance-vector and link-state algorithms.
-Uses distance vectors with more accurate metric counts.
-Uses link-state triggers
-More efficient link-state protocol (not so much processor, memory, and bandwidth required).
-Link State, aka shortest path first: knows entire network better than distance-vector. Never listens to
secondhand information. More accurate and informed routing decisions.
-RIP good for small to moderate sized homogenous internetworks (due to small hop count and single
metric)
RIP Timers
Routing Update Timer - interval between sending complete routing table to all neighbors. (usu. 30 sec.)
Route Invalid Timer - time before router considers a route invalid. (hasn’t heard any updates about the
route. In that time). Router will then send update to all neighbors informing of invalid route.
Route Flush Timer - time between route becoming invalid and removal from the routing table (usu. 240
sec.). Router informs all neighbors of routes impending flushing. Route invalid < route flush
-All above can be used for routing decisions, and administrators can adjust IGRP settings.
Hold-downs - Prevents regular update messages from reinstating a downed link. If a link goes down
during convergence, it will prevent routers that haven’t heard of the news of the downed link from
misinforming other routers that they have a path to the route. Hold downs prevent any changes that might
affect stated routes for a specific period of time (slightly greater than time necessary to update the entire
network).
Split Horizons - information is never sent back to the router from which it came to prevent routing loops.
Hold downs prevents routing loops, IGRP uses split horizons as well for extra algorithm stability.
Poison Reverse Updates - for larger loops. Increased routing metrics usu. means a routing loop. Poison
reverse removes the problem route (via assigning very high metric) and places it in hold-down.
IGRP timers
-To control performance:
IGRP routes
Administrative distance or metric can be used to represent trust-worthiness of the routing update source
Each type of route and routing protocol is assigned an administrative distance. The higher value, the less
trusted the source.
Default distance
Directly Connected Interface 0
Static Route 1
Enhanced IGRP Summary Route 5
External BGP 20
Internal Enhance IGRP 90
IGRP 100
OSPF 110
IS-IS 115
RIP 120
EGP 140
Internal BGP 200
Unknown 255
EIGRP includes
-Fast convergence
-Variable-length subnet masks
-Partial-bounded updates
-Multiprotocol support: IP/IPX/Appletalk
EGP Functions
-EGP routers establish a set of neighbors which they share accessibility info.
-EGP routers send polls to their neighbors to see if they are alive
-EGP routers send update messages containing accessibility information on the network within their
autonomous system.
Configuring Routing
Configuring RIP
sh ip route
-In config mode: Remove static entries: no ip router 172.16.50.0
In configuration mode:
router rip
(config-router)#network 172.16.0.0
^Z
Passive RIP – used to disable RIP advertisements out a particular interface (usu. The interface to the
internet)
config t
(config)# router rip
(config-router)# network 172.16.0.0
(config-router)# passive serial 1 Å new command
(config-router)# exit
-Opposite of passive RIP (will send RIP broadcasts across a wan link (non-broadcast network));
This sends rip broadcasts to the router specified in neighbor command
config t
(config)# router rip
(config-router)# network 172.16.0.0
(config-router)# neighbor 172.18.3.10 Å new command
(config-router)# exit
Monitoring RIP
sh ip route
-It is used if two routing protocols advertise the same route to the same router.
-Will show time since last update, i.e. 00:00:06
sh ip protocol : RIP timers, network for which RIP is assigned, and routing information sources (“Gateway
Information Sources”)
debug ip rip shows the routing updates as they’re send/rec’d undebug rip
Configuring IGRP
(config)#no router rip
-IGRP includes delay, bandwidth, reliability and load in update packets (even MTU), all to consider best
route or for load balancing. The IGRP packet is sent every 90 seconds.
Monitoring IGRP
-(same commands as RIP)
bandwidth command used on interfaces, IGRP uses this bandwidth value… default is 1544 Kbit (T1).
sh ip interface how an int. is configured & display status and global parameters for an interface.
-Events is terse: displays IP address /serial sending or receiving update, and number of interior, system and
exterior in update
-Transactions is more verbose: includes the actual subnets sent / received in update with metric and
neighbor number.
Router Configuration
IOS Sources
-IOS source varies depending on hardware.
-Default is flash memory (EEPROM). TFTP & fallback routine are alternates.
copy flash tftp backup copy stored in TFTP server, can be used to verify same as original file.
-Will ask for address or name of remote host, then source, destination file name.
-Rarely enough room in flash for more than one version, so it will ask if ok to erase.
show flash verifies size matches original file. (size of files and amount of free flash)
delete does not remove flash files on external flash cards, only marks as deleted. Use squeeze to complete.
-Those three commands above will be tried in sequence to find the IOS.
-Default location set by Configuration Register, usually set for first file in flash.
ROM typically lacks protocols, features, and configurations of full Cisco IOS s/w.
show version displays IOS version. Use this instead of show flash if more than one IOS file is stored.
Also shows router uptime and how was restarted, and where loaded from, hw config info, and configuration
register.
-This router gives the router it’s ip address and uses helper address to forward UDP broadcasts—TFTP
broadcast in this case, for a TFTP server. Also can be used to forward DHCP requests to a DHCP server.
-The new router will then look for a DNS (or TFTP) server to resolve it’s ip address to it’s host name.
-If from TFTP server, server sends “network-config” (applies to all routers) file: contains new hostname.
-Router requests “hostname-config” (applies to particular router), if not available, “router-config” – need to
telnet and make remaining changes manually.
-The file will then be downloaded from the TFTP server & loaded into running configuration.
IOS commands
sh proc
Shows active processes. CPU utilization for five seconds, one minute, and five minutes.
PID – Id # of each process
Q – queue (high, medium, low) priority
TY – is a status of the process.
sh mem
How management system allocated memory for different purposes
Also can make a block by block listing of memory use: Address, bytes, prev, next, ref, prev F, next F, What
sh stacks – monitors the stack use of processes and interrupt routines, if reboot was result of crash has
reason
sh buff – reveals size of small, middle, big, very big, large and huge buffers.
Buffer elements:
500 in free list (500 max allowed)
726 hits, 0 misses, 0 created
show running-config
show startup-config
sh int – shows interfaces and their status., h/w address, network address. sh int e0 – shows particular
interface Ethernet #0.
sh prot - which protocols are configured on the router.. will list each interface and it’s IP address (or other
protocol)
Global values:
Internet Protocol routing is enabled
Ethernet0 is up, line protocol is down
Internet address is 172.16.30.1 255.255.255.0
…
sh ip prot
Routing protocol is ‘rip’
Sending updates every 30 seconds, next due in 22 seconds
Invalid after 180 seconds, hold down 180, flushed after 240
Outgoing update filer list for all interfaces is not set
Incoming update filter list for all interfaces is not set
Redistributing: rip
Routing for Networks:
-CDP starts by default on v10.3 and later, discovers neighboring Cisco routers running CDP via Data Link
broadcast.
-CDP caches information gained, which includes information about network layer protocols. Old CDP
information is discarded.
sh cdp int – interface information and encapsulation. This is the default encapsulation for the interface.
Also shows timers for CDP.
sh cdp entry * - shows CDP information from all routers. replace * with a router name for just a specific
router
Displays router’s name, entry’s IP address, platform [i.e. Cisco 2500], Capabilities: Router Interface:
Serial0, port ID (outgoing port): Serial0
Holdtime: 130 sec
Version
sh cdp traffic amount of CDP packets sent and received among neighbors, plus packet errors
Password:
RouterC>exit
[ Connection to 172.16.50.1 closed by foreign host]
To return to originating router without terminating the session to remote router: CTRL+SHIFT+6 then X
Then to see sessions:
RouterC# sh sessions
Hostnames
-Router can be configured to resolve hostnames like a hosts file in Unix --OR-- use a DNS server.
config t
ip host ?
WORD Name of host
routerc
Trying RouterC (172.16.40.2)…Open
Password:
RouterC>exit
ip domain-lookup enabled by default – router will try to broadcast for a DNS server to resolve the name.
no ip domain-lookup stops the router from long timeouts before failing to find a DNS server.
ip name-server 172.16.30.8 is used with IP domain-lookup so the router can lookup hostnames.
Basic Testing
-Follow layers of OSI model: Telnet – Application layer, ping / trace / show ip route – Network layer, show
interface – physical
-If can’t telnet, use ping to test physical network connectivity. Can be used with IPX, AppleTalk, Apollo,
VINES, and DECnet. PING is short for “Packet InterNet Groper”.
Extended ping: more options, can use IP, AppleTalk, IPX, & only avail. in privileged mode.
RouterC# ping
Protocol [ip]:
Target IP address: 172.16.10.2
Repeat count [5]:
Datagram size [100]:
Timeout in seconds [2]:
Extended commands [n]: y
Source address or interface: 172.16.40.2
Type of service [0]:
Set DF bit in IP header? [no]: y
Validate reply data? [no]: y
Data patter [0Xabcd]:
Loose, Strict, Record, Timestamp, Verbose [none[: v
Seep range of sizes [n]:
-Trace command starts out by sending a TTL of 1 so 1st router will receive packet and send back an error.
Keeps sending out packets with incrementing TTL until the complete path, distance, and time is measured
between each router.
trace ip 172.16.40.2
Trace Responses
-Carrier Detect brings up the serial port (physical layer okay). Keepalives bring up the line protocol (data-
link framing okay – means have correct frame type and are communicating end to end).
Note: Link light will go out when loopback is not activated on Ethernet jack on the other end of the cable.
This could also be an indication that the Ethernet wiring to the Ethernet jack on the other end is bad. In
these two cases, show int command will show: int down, line prot down.
sh int shows real-time statistics of an interface: input errors – problem with link or if equipment is faulty.
clear counters
-Debug command – see earlier section where it is used for tracking RIP and IGRP. Track network
problems, and discover which protocol messages are being sent / recd.
NOTE: debugging live network could cause severe slowdown. Do not leave it on- diagnose then turn off.
undebug all
debug ?
RouterC#config t
Enter configuration commands….
RouterC(config)#logging 172.16.10.1 – logs messages to a log file on a Unix or NT host instead of
console terminal.
Syslog logging: enabled (0 messages dropped, 0 flushes, 0 overruns)
-Internetwork Packet Exchange used since early 80s, similar to XNS, likeness to TCP/IP.
IPX is a family of protocols.
-IPX developed for performance rather than strict compliance to existing standards or models.
IPX doesn’t map directly to OSI model, but still functions in layers.
Server-Sever Communication
-More complicated, & maintains tables of avail network resources.
-Each server must be able to locate any resource.
-Servers exchange 2 types of info, using 2 protocols:
-SAP (Service Advertising Protocol)
-RIP (Routing Information Protocol)
-RIP in IPX is a completely separate routing protocol than RIP in TCP/IP, it’s not the same routing
protocol.
IPX Addressing
-10 bytes (80 bits)
-hierarchical: network / node portions 4 byte network (8 hex) / 6 byte node (12 hex):
00007c80.0000.8609.33e9
-network portion assigned by administrators and must be unique on IPX internetwork
-node addresses automatically assigned (usu. MAC address used); no need for DHCP or manual
configuration
-because MAC is used for client address, no need for TCP/IP ARP equivalent in IPX.
-Customary to drop leading 0’s in network portion: 7c80
-Commonly node is divided into 3 sections of four hex digits.
-Networks running both TCP/IP and IPX administrators freq use TCP/IP’s 8 hex digits as the IPX network
address on that segment.
Encapsulation - Process of taking packets from upper layer protocols and building frames around them to
transmit. In an IPX network, encapsulation is when IPX datagrams have layer 2 frames built around them.
-Netware has four different frame types, each incompatible with the other (but a router can make
communication possible but only across the router).
Note: segmentation can refer to Ethernet (token ring, etc.) segments or cable segments.
-Can create three virtual networks on the same Ethernet segment by using three different frame types; This
requires 3 unique IPX network addresses for each frame type. Communication between same frame type is
possible.. A router is needed to facilitate communication between different frame types. If configuring a
router, get the frame type and IPX network address for each segment, type config at the server console.
config t
int e0
ipx network 2100
int s0
ipx network 2200
-Make sure Novell servers are running the same network number as router’s interface.
-Better way: use subinterfaces— allows creation of virtual interfaces: can use for sec IP, IPX, etc.
interface ethernet slot/port.number from e0.0 to e0.4billion.. note: each one takes memory!
int e0.100
ipx network 2300 encap sap
^Z
%SYS-5-CONFIG_I: Config…
sh prot e0
Ethernet0 is up, line protocol is up
Internet address is 172.16.10.1/24
IPX address is 2100.0000.0c8d.5c9d
sh prot e0.100
Ethernet0.100 is up, line protocol is up
IPX address is 2300.0000.0c8d.5c9d
sh ipx route
Codes: C – Connected primary network, c – Connected secondary network, S – Static, F- Floating static, L
– Local (internal), W – IPXWAN, R – RIP, E – EIGRP, N – NLSP, X- External, A – Aggregate, s –
seconds, u – uses
6 Total IPX routes. Up to 1 parallel paths and 16 hops allowed. *SEE BELOW
- should see internal IPX network along with external IPX network on this list. Use configuration
screen at server console also.
Note: With parallel IPX paths, by default CISCO IOS does not learn alternative equal-cost paths.
Cisco will do per-packet load-sharing by default over parallel paths. Packets are sent round-robin on equal
cost lines.
IPX per-host-load-share to ensure certain destinations go over only one particular interface.
sh ipx traffic –summary of the number and type of IPX packets sent/recd, shows IPX RIP & SAP updates.
sh ipx int e0
Extended Ping
RouterC# sh prot e0
Ethernet0 is up, line protocol is up
Internet address is 172.16.50.1/24
IPX address is 5200.0000.0c3f.1d86
RouterA# ping
Protocol [ip]: ipx
Target IPX address: 5200.0000.0c3f.1d86
Repeat count [5]:
Datagram size[100]:
Timeout in seconds [2]:
Verbose [n]:
Novell Standard Echo [n]: y
Type escape sequence to abort.
Sending 4, 100-byte IPX Novell Echoes to
5200.0000.0c3f.1d86, timeout is 2 seconds:!!!!!
Success rate is 100 percent (5/5), roundtrip min/avg/max = 4/7/12 ms
config t
int e0
ip access-group 10 out – this applies the list to an interface on outgoing traffic .
^Z
-Only one access list per protocol is allowed to be applied on inbound (or outbound) traffic.
Wildcard Masking
config t
access-list 11 permit 172.16.50.2 0.0.0.0
access-list 11 permit 172.16.30.0 0.0.0.255 (binary 1’s in mask means any)
int e0
ip access-group 11 out
Note: common practice is to enter a new list, apply it, then remove old one.. then later, cycle back.
(apparently the book says that these counters are only on extended access lists)
-Administrators typically move the most used lines up in the list for efficiency, be careful not to change
functionality by doing so.
clear access-list counter (s)? clears counters for show access-list commands.
show ip interface e0 – shows IP settings for interface & access list applied to it.
show running config – shows router’s current configuration & access list applied to each interface.
-To allow all IPX nets except 50 you would: deny 50 10 then: permit -1 –1
-The -1 means any IPX network (like the any keyword for IP access lists)
VLAN - logical group (location ,department, security, layer 3 protocol, application, etc.) of resources and
users to switch ports that is configured by an administrator.
-Behaves like a subnet because it defines the limits of an broadcast domain (Ethernet broadcast domain,
Token Ring broadcast domain, etc.)
-Lower costs, easier administration, smaller broadcast domain, separation of traffic and services,
security, flexibility, scalability.
VLAN Types
end-to-end: most traffic remains on VLAN (80/20 rule). VLANs by job function or department. Users do
not have to be in the same switch block.
local VLANs: based on geographic locations (demarcation at a switch block boundary) 20/80 rule is
typically followed. These are used when the network is growing fast & is constantly changing.
Broadcasts
-Today, switched networks are often preferred over backbones, since they are often cheaper.
-Broadcasts make it through switches by default.
Security
-With backbone networks (instead of switch networks), security was provided by the router. This means
that each of the LAN segments connected to the router did not have security within the LAN segment itself.
Example: A network analyzer attached to a hub port on a LAN segment can see all the traffic going into the
hub.
-VLANs, by contrast, have control over each user, each port, MAC address, protocols, applications, & size
of broadcast domains.
-VLANs can be assigned on a per resource basis, allowing a network management station to alert
administrators of unauthorized access.
Inter
-VLAN security is done on the router or RSM.
Distribution of Traffic
-80/20 rule: 80% of traffic stays on local broadcast domain – when using bridges or VLANs.
VLAN Features
-Static or Dynamic VLANs
-Frame Filtering
-Frame Tagging methods (for VLAN identification) supported by CISCO:
-ISL (Inter-Switch Link) for Ethernet/Fast Ethernet (Cisco proprietary technology)
-Special Ethernet NIC that understands/creates tagging
-Driver creates many logical cards
-Network addresses configurable for each VLAN
-Protocol analyzers can be used to examine frames on ISL trunk segments.
-Adds : 26 byte header, 4 byte trailer (CRC)
-Uses ASICs and processors to deal with 100Mbps frame tagging
-IEEE 802.1Q for Ethernet/Fast Ethernet
-Standardized frame tagging by IEEE
-Modifies frame (frame size kept same) :
-Tag Protocol Identifier (TPID) (4 byte)
-“fast backbone” means Fast Ethernet, ATM, or FDDI, these are transport protocols used for a
trunked link Æ port(s) assigned to many VLAN(s). Must have at least 100Mbps Ethernet for trunk port.
-Switches using VTP advertise their management domain, known VLANs with their boundary, & configure
revision number on their trunk ports.
-The connected VTP devices that have the same VTP domain name defines a VTP domain.
-A switch can only be assigned to 1 VTP domain
In a VTP domain:
-All VLANs are maintained by its servers and clients.
-VTP domain sets boundaries of all VLANs in it.
-Clients and servers send and receive information through trunks to other switches (belonging to other VTP
domain(s))
Static VLANs
-Most common, most secure VLAN type
-Switch ports assigned to a VLAN by an administrator will stay that way until an administrator changes it.
Dynamic VLANs
-Decides which VLAN a node belongs to automatically using management software.
-Makes administration easy after initial configuration, and users can move easily.
-MAC address, various ports., and sometimes applications can be automatically assigned to a dynamic
VLAN
-MAC address – to – VLAN # & VLAN configuration database is created for VLAN management
software. If a node with one of these MAC addresses is attached to an unassigned VLAN port, the VLAN
management software will configure the switch port for the MAC address’ corresponding VLAN number
and VLAN configuration.
-VMPS (VLAN Management Policy Server is an example of a MAC address – to – VLAN # database.
N – Domain Name – sets a management domain name (before VLAN creation). Default = no domain
name. Switch can receive an advertisement with management domain name (and set it automatically that
way)
V – VTP Mode Control – [T] ransparent or [S] erver (default). Default Server mode, receives
advertisements on trunk port. Switch will change from VTP server mode to VTP client (transparent) mode
if advertisement with over 128 VLANs comes in.
F – VTP Pruning Mode – restrict flood traffic of VLAN to just switches that are members of the VLAN.
Each trunk has a configured list of pruning eligible VLANs.
A – Add VLAN – Adds VLAN to list of allowed VLANs for the trunk. Default=allow all VLANs on one
trunk.
Choose type 1 = Ethernet
N - set VLAN number
V - set VLAN name
I - set 802.10 SAID value (has to be in range displayed & can’t be duplicated)
M - set MTU size
T – set VLAN state to enabled (enabled/disabled)
T – Trunk Configuration – menu for Configuring VLAN trunks – carry multiple VLAN traffic between
switches and/or VLAN enabled routers. VLANs are able to get to multiple switches this way.
Choose trunk port A or B, enable trunking on that port via T then 1.
-Servers and Clients communicate via ALL VLAN trunks (including all types of trunks).
-Servers are responsible for all VLAN adds, changes, & deletions. They do this by multicast
advertisements to all other servers & clients.
-Server is default mode for Catalyst switches.
-Clients only accept changes from servers.
-Servers save VLAN information in NVRAM. Clients do not save VLAN information in NVRAM.
-Transparent mode switches do not belong to a management domain.
-Transparent mode switches forward VTP information to other switches.
-Transparent mode switches can do VLAN adds, changes, & deletions (but this is NOT SHARED with
other switches)
Note: clear config all clears switch configuration from NVRAM, but not the VTP information from
NVRAM ! use reset system or power cycle the switch instead (the revision number will also be set to 0
when you do this.)
When Connecting a new switch to existing network that uses VTP, you must clear VTP information first:
-Catalyst 5000: clear config all
-1900/2820: delete nvram
-2900XL: delete flash:config_file_name
-Then, power cycle the switch
-Then, configure VTP settings
-Finally, add it initially as a client.
VTP Advertisements
-See also VTP advertisements above
-Have revision information (helps determine if it is new information or already known information)
-Never sent to root bridge. Sent downstream to VTP neighbors.
VTP Pruning
-Reduces unnecessary multicast, broadcast, and unknown destinations across trunk ports: sends that kind of
traffic only to trunk links which have ports belonging to the VLAN in question.
-Disabled by default.
-Requires a management domain.
-All VLANs can be pruned (default), or can specify a range which can be pruned.
VTP statistics:
summary advts received 8
subset advts received 6
request advts received 0
summary advts transmitted 501
subset advts transmitted 51
request advts transmitted 28
No of config revision errors 0
No of config digest errors 0
FDDI trunked links Æ 802.10 VLAN ID field found in FDDI SAID header (also has a protected and clear
header) . VLAN ID found in the 802.10 SAID header can have up to 4.29 billion values
CST
-Only one instance of STP on all VLANs
-STP runs in default management VLAN (usually VLAN 1)
Advantages over PVST:
-Only one set of BPDUs for STP
-Changes tracked for just one instance of STP
Disadvantages
-Likely to make non-optimal paths
-Convergence problems become worse as network grows
PVST
-One instance of STP per VLAN (solves scalability and convergence issues)
-means each VLAN has a root, priorities, port costs, path costs
-STP can be tuned per VLAN.
-STP topology smaller (only uses switches that connect a VLAN together: decreases convergence time and
increase scalability)
-Switch ports with o a VLAN not included in STP topology (but VTP pruning needs to be enabled)
-Any VLAN can be added to a member switch's port easily.
Disadvantages
-Switch multicasts BPDUs on each VLAN.
-Topology database on each switch for each VLAN.
-Optimal configuration requires manual tuning of each VLAN.
PVST+
-Cisco extension to PVST protocol.
-IEEE 802.1Q CST & Cisco's PVST can work on the same switch network.
-Automatic (no configuration).
-Detects CST & PVST, and makes adjustments.
STP disabling/enabling
-STP enabled by default for all VLANs
-or globally enabled or disabled per VLAN
-STP highly recommended by Cisco even if no loop problems currently exist.
Catalyst 5000
Console> (enable) set spantree enable | disable [vlan_number | all]
sample result: Spantree 10 enabled.
Catalyst 1900/2820
Switch(config)# [no] spanning-tree list_of_vlans
2900XL configuration (access layer device, meaning it's rarely a root bridge)
SwitchA(config)# [no] spanning-tree [vlan list_of_vlans] priority new_priority
-Default switch priority is 32,768 (choose something smaller for the root)
1900/2920
Switch(config)# [no] spantree-template bridge_template_identifier priority new_priority
-Templates are created/modified using this command.
Switch(config)# [no] spantree-template bridge_template_identifier vlan list_of_vlans
-Templates need to be applied using the above command (to take effect).
-Max 4 templates
-Template 1 is the default template used by VLANs. Template 1 does not require the above application
command to take effect.
-If bridge_template_identifier=1, the next command is not necessary.
STP Verification
-This shows a root bridge's configuration ("Bridge ID MAC ADDR" and "Designated Root" are same
proving that it is a root bridge):
VLAN 1
Spanning tree enabled
Spanning tree type ieee
Catalyst 2900XL
SwitchA# show spanning-tree [vlan vlan_number]
-it will show vlan 1 if vlan_number is not specified, like the below sample output:
-for Catalyst 1900/2820 use show spantree (Catalyst 5000's command). Output is same format as above.
Serial transmission - transmission one bit at a time through a single wire. Reception is done on a separate
single wire, one bit at a time. Virtually all WANs use serial ports that use serial transmission.
Parallel transmission - 8 bits at a time through 8 wires. Alternatively, this is done in multiples of 8.
Synchronous transmission - uses a clocking signal to define beginning & end of bits (or frames).
Asynchronous transmission - does not use a clocking signal to define beginning & end of bits (or frames).
Leased lines - point to point dedicated connections. Most are synchronous serial connections up to
45Mbps. No setup/tear-down procedure needed for communication.
Circuit switching - setup like a phone call (choosing physical circuits) needed for communication,
Dial-up modems and ISDN use this.
Packet switching - Packets from many different companies are switched by a packet switch provider.
Shares bandwidth with other companies to save money. Can only be used if traffic is bursty. If traffic is
constant, you need a leased line instead. Frame relay, and X.25 are two standards that are packet switched
by providers.
Demarc – boundary between customer’s wiring and service provider’s wiring. It’s demarcation point, or
end of responsibility for the service provider.
CPE – Customer premise equipment – all wiring and equipment on customer’s side of demarc.
CO (Central Office) – point where local loop gains access to the service providers high-speed trunk lines.
AKA POP – point of presence.
Toll Network – Trunk lines in a WAN provider. Many switches are connected to them.
Physical media
-T1s are almost always STP cabling with RJ45 connectors on each end.
-T3s are almost always coax cabling with BNC connectors on each end.
-Frame relay uses various cabling, typically 2 pair UTP, with ”smartjacks” (which are RJs other than RJ11
and RJ45)
secondary station – controlled by primary station. If a secondary is polled, it is allowed to transmit only to
the primary station (“speak when spoken to”- IBM).
Show int s0
Serial0 is up, line protocol is up
Hardware is HD64570
Internet address is 172.16.20.1/24
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, rely 255/255, load 1/255
Encapsulation HDLC, loopback not set, keepalive set (10 sec)
Last input 00:00:05, output 00:00:01, output hang never
Last clearing of “show interface” counters never
[Queues, then conversations, packet statistics, carrier transitions, and DSR, DTR, RTS, CTS]
-DDR great for per-min ISP links, and fully functional backup system.
-Versatile DDR can be used over several different types of connections (IOS v9+): IP, IPX, AppleTalk,
DECnet, OSI/CLNS, and others.
-DDR can be used over different interfaces: sync ser., asynchronous serial, ISDN.
-No dynamic routing information learned from these interfaces (they are usu. inactive) -> Need static routes
-Static routes have admin. distance of 0 (override any dynamically learned route)! – acts like a primary
route! Use: ip route 10.1.2.3 255.255.255.0 10.5.6.7 <1-255> to specify admin distance. Choose 200+
because EIGP default is 170; then DDR will only be used if all other routes absent or unreachable
-Bad idea to use OSPF, BGP, or IS-IS in DDR environment. These protocols require ACK from neighbor
before updates are sent - DDR is usually inactive when ACK needs to be sent. USE DDR as backup
connection with static routes
X.25
-Born before today’s digital networks – built for noisy analog circuits, it’s overbuilt for today’s needs.
-Addressing defined by X.121 (1-14 decimal digits). 1st 4 bits – DNIC Data Network Identifier Code,
remaining bits set by administrator.
-DCE connects to the service provider’s network with the goal of establishing a virtual circuit between two
DTE devices.
-X.25 supports both switched and permanent virtual circuits.
-X.25 heavily used in PSN packet-switched networks of telcos that charge on use.
In 70’s need for WAN protocols that could connect PDN public data networks, X.25 now administered by
ITU-T.
Packet Switching Exchange (PSE): Switches that constitute the majority of a carrier’s network and
handle the transfer of data between DTE devices via the X.25 packet-switched network.
X.25 Sessions
Sessions used for DTE – DTE communication:
X.21bis
-Used in X.25 at physical layer –electrical and mechanical properties for media.
-Activation / Deactivation of physical media between DTE, DCEs.
-Max 19.2Kbps
-Point-to-point, synchronous, full-duplex, four-wire media.
-X.121 addresses aren’t burned into ROM, need to assign it to an X.25 serial int.
int s0
x25 address 12345678
sh int s0
Serial 0 is admin….
..
MTU…
Encapsulation X25, loopback not set
LAPB DTE, modulo 8, k 7, N1 12056, N2 20
T1 3000, interface outage (partial T3) 0, T4 0
State DISCONNECT, VS 0, VR 0, Remote VR 0,
Retransmissions 0
Queues: U/S frames 0, I frames 0, unack. 0, reTx 0
IFRAMEs 0/0 RNRs 0/0 REJs 0/0 SABM/Es 0/0 FRMRs 0/0 DISCs 0/0
X25 DTE, address 12345678, state R1, modulo 8,k timer 0
Defaults: cisco encapsulation, idle 0, nvc 1
Input/output window sizes 7/7, packet sized 256/256
Timers: T20 180, T21 200, T22 180, T23 180, TH 0
Channels: Incoming-only none, Two-way 1-1024, Outgoing-only none
RESTARTs 0/0 CALLs 0+0/0+0/0+0 DIAGs 0/0
Frame Relay
-One of the most popular WAN protocols. Inexpensive way to connect large number of sites.
-A reason for popularity shared bandwidth through frame relay cloud.
-Data traffic is bursty, so 100’s of users can share various leased lines, etc.
-Less expensive for telcos and customers this way.
-Two sites can be connected with up to T1 speeds via frame relay cloud; will be T1 as long as not saturated.
-Much cheaper than T1 in this case.
-The frame relay provider would allow bursting to T1 in this scenario,
-And also provide a CIR (committed information rate) – a minimum guarantee.
-1.5 CIR would loose price advantage over a 1.5 leased line.
-Default LMI type is Cisco. ANSI, Q.933a (ITU-T) also avail, check with frame relay provider.
frame-relay [lmi-type]
lmi-types available: cisco, ansi, Q933a
Subinterfaces
-Can have each virtual circuit on a single interface be treated as a single interface – subinterface.
-Subinterface is a virtual interface defined by IOS software.
-Each subinterface can have different network-layer characteristics.(and therefore virtual circuit, also), i.e.
IP on one, and IPX on another.
1.
encap frame-relay ietf
no inverse-arp
ip address…
frame-relay map ip 172.16.30.17 30 cisco broadcast
frame-relay map ip 172.16.30.18 50 broadcast – will use ietf from above
frame-relay map ip 172.16.30.19 40 –will use ietf from above
2.
Use inverse-arp function – dynamic mapping of IP address to DLCI number
int s0.16
encap frame-relay ietf
ip address 172.16.30.1 255.255.255.0
Note: this method is not as stable as map command! – configuration errors occur because virtual circuits
can be mapped to unknown devices.
sho int s0 also shows general (fewer LMI stats) packet statistics after “Encapsulation FRAME-RELAY”.
Configuration
In interface configuration mode:
Encapsulation ppp
-Additional commands:
ppp [authentication] | [bridge] | [chap] | [compression] | [multilink] | [pap] | [quality] | [reliable-link] |
[timeout] | [use-tacacs]
show int s0
…
Hardware is HD64570
ISDN - set of protocols from telcos. Simultaneous data, text, voice, music, graphics, video over existing
telephone. ITU-T standardized to cover physical, data link, & network layers.
ISDN Terminals
Devices connecting to ISDN network are terminals:
Need a SPID to configure each B-channel (just like a phone number for each B channel).
ISDN devices send SPID to ISDN switch in order to gain PRI or BRI access.
Sometimes SPIDs are auto-sensed (used a special “config SPID” command)
Without SPID, many ISDN switches don’t allow an ISDN device to place a call on network.
-ISDN supports almost all upper-layer protocols: IP, IPX, AppleTalk, etc.
-Choose PPP, HDLC, or LAPD as encapsulation protocol.
-Know switch type when configuring, use isdn switch-type ? to see which are avail. Each manufacturer
has proprietary protocol. for signaling.
-For each PRI interface, specify data-link-specific information for T1 controller. This is how PRI
communicates with ISDN switch.
RouterA(Config)#controller T1 1/0
RouterA(Config-if)#framing esf
RouterA(Config-if)#linecode b8zs
RouterA(Config-if)#pri-group timeslots 1-24
-Extended SuperFrame Framing (ESF) is used on T1 circuits: 24 frames, 192 data bits each, #193 for
timing, other.
-B8ZS binary eight-zero substitution line-coding that guarantees density of 1s over a link by substituting a
special code whenever eight consecutive 0s are sent, then removing code at the remote end.