Professional Documents
Culture Documents
Systems, Inc.
Inc. All
All rights
rights reserved.
reserved.
2004,
2005 Cisco
WAN
2005 Cisco Systems, Inc. All rights reserved.
WAN Overview
2- Circuit Switching :
The link is available but only for the duration of call.
Need call setup procedures before transmitting data.
Only support point-to-point connection.
Cheaper when connectivity is not needed all the time ( Variable Cost ).
Useful for backup connection.
Example : Analog Dial-up Connection ( MODEM )
Digital Dial-up Connection ( ISDN )
WAN Protocols
HDLC ( High level Data Link Control Protocol )
It is the default encapsulation on serial interfaces of Cisco routers.
Router (config-if) # encapsulation hdlc
- Per Vendor Protocol.
- Has no options.
2- Callback.
3- Multi-Link.
Frame Relay
Frame Relay is data link layer ( Layer 2 ).
FR is a packet switching technology.
FR support Multiple Access technology depending on the concept of
Virtual Circuit ( VC )
Virtual Circuit : is a logical connection between two devices.
Frame Relay
Data Link Connection Identifier ( DLCI )
Each VC has a unique local address called DLCI.
DLCI is locally significant.
Local Management Interface ( LMI )
Signaling protocol between Router & FR Switch ( Keep alive & VC Status ).
LMI is locally significant.
LMI Types
1- Cisco ( Default on Cisco Devices )
2- Q933a ( Standard )
3- Ansi ( American )
10
Wireless Communication
Ethernet LAN
IEEE 802.3
Electrical Signal
or Pulses of light
Wireless LAN
IEEE 802.11
Radio Waves
Wireless Standard
IEEE 802.11a 54 Mbps
IEEE 802.11b 11 Mbps ( Commonly Used )
IEEE 802.11g 54 Mbps
Wireless Access Point ( WAP ) communicate like a Hub.
2005 Cisco Systems, Inc. All rights reserved.
11
Wireless Communication
Wireless Modes
1- Ad-hoc Mode :
2 Devices communicate directly ( No AP is needed )
Independent Basic Service Set ( IBSS )
2- Infra Structure Mode:
One AP Basic Service Set ( BSS ) .
More than one AP Extended Service Set ( ESS )
12
Types of Attacks
Types of Attacks:
1- Denial Of Service ( DOS ) Attack :
Break things , erase data ( Destroyers , crashers ).
Flood network with a packet ( Flooders ).
Active Attack.
2- Reconnaissance Attack :
Gather Information ( IP address ,..) .
Passive Attack.
2005 Cisco Systems, Inc. All rights reserved.
13
Security Tools
Security Tools:
1- IDS ( Intrusion Detection System ) :
receive a copy of data via monitoring port.
Detect only ( No action )
2- IPS (Intrusion Prevention System ) :
In the packet forwarding path but react & filter traffic.
Detect & Prevent ( action ).
14
Cisco Systems,
Systems, Inc.
Inc. All
All rights
rights reserved.
reserved.
2005,
2005 Cisco
15
15