complete hard copy of wan technology

151
8517 PCET I.T 8 th SYNOPSIS ON WAN TECHNOLOGY Submitted in partial fulfillment of the requirements for the award of degree of BACHELOR OF TECHNOLOGY IN INFORMATION TECHNOLOGY CSE/IT DEPARTMENT PUNJAB COLLEGE OF ENGG. & TECHNOLOGY Vill.- Malakpur, Laru Mandi, SAS Nagar Mohali (Punjab) 1 Navlesh Kumar Singh

Upload: navleshkumar-singh

Post on 12-Jan-2017

99 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

SYNOPSIS

ON

WAN TECHNOLOGYSubmitted in partial fulfillment of the requirements for the award of degree

of

BACHELOR OF TECHNOLOGY

IN

INFORMATION TECHNOLOGY

CSE/IT DEPARTMENT

PUNJAB COLLEGE OF ENGG. & TECHNOLOGY

Vill.- Malakpur, Laru Mandi, SAS Nagar Mohali (Punjab)

Submitted To:- Submitted By :-

Er. Kapil Diwan NAVLESH KUMAR

HOD (CS/IT, PCET) B. Tech (IT, 8th Sem)

1Navlesh Kumar Singh

Page 2: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Project Name - WAN TECHNOLOGY

H/W Requirements :- Routers, Switches, Computer Machines, Cables, Pins,

Connecters, Sockets, RAM, etc.

S/W Requirements :- CCNA (Cisco S/W), etc.

WAN TECHNOLOGY :- A large and complex WAN needs to be created with the use of WAN

technologies throughout its branches for better running of organization.

WANs are all about exchanging information across wide geographic areas. They

are also, as you can probably gather from reading about the Internet, about

scalability—the ability to grow to accommodate the number of users on the

network, as well as to accommodate the demands those users place on network

facilities. Although the nature of a WAN—a network reliant on communications

for covering sometimes vast distances—generally dictates slower throughput,

longer delays, and a greater number of errors than typically occur on a LAN, a

WAN is also the fastest, most effective means of transferring computer-based

information currently available.

A Wide Area Network (WAN) is a computer network that covers a large

geographic area such as a city, country, or spans even intercontinental distances,

using a communications channel that combines many types of media such as

telephone lines, cables, and air waves. A WAN often uses transmission facilities

provided by common carriers, such as telephone companies. WAN technologies

generally function at the lower three layers of the OSI reference model: the

physical layer, the data link layer, and the network layer

2Navlesh Kumar Singh

Page 3: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

The project is broken into a number of phases for better management of the

project.

Phase1-Addreessing the WAN

Phase 2-Configuring the Routes and OSPF

Phase 3-Configuring NAT, Frame Relay, Simulation, and ACLs

Phase 4- Configuring VLANs- and DHCP

Phase 5-Verification and Testing

Significance/ Scope of the ProjectWith the implementation of the project, company will be able to communicate

through a fast and efficient network. The project will have a great significance in

maximum running of the business. As branches will be able to communicate

faster, business processes will automatically become faster. WAN optimization

for future growth of the company will be an option, after the completion of the

project.

Employees will be able to access clients’ information and provide service to

clients at any of its branches. Simultaneously, clients can access company’s

service at any branch, no matter where they subscribed.

In addition, with the use of high-speed leased lines remote computers will be able

to transmit data quickly than ever before. Moreover, the company’s connection

lines will be free from congestion from outside data traffic.

3Navlesh Kumar Singh

Page 4: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Technology Used in Project:-Routing,

Switch & Router Configuration

IGRP (Interior Gateway Routing Protocol)

RIPv1 & RIPv2 (Routing Information Protocl)

EIGRP (Enhanced IGRP)

VLSM (Variable Length Subnet Masks)

Bibliography :-

Books-

DATA COMMUNICATION

COMPUTER NETWORK

ADVANCE INTERNET TECHNOLGY

CCNA Study Guide 6th Edition

JCHNE (MCITP) By JETKING

Helping Sits Links :-

google.com

technet.microsoft

wikipedia.org

wikibooks.org

wifinotes.com

compnetworking.about.com

cisco.com

ask.com

networkingknowldge.com

4Navlesh Kumar Singh

Page 5: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

ccna.networking.com

Conclusion

The wide area network has made it possible for companies to communicate internally in ways never before possible. Because of WANs, we (the consumers) can enjoy benefits from companies that we wouldn’t have been able to in the past.

So what, exactly, is it that makes something a wide area network (WAN) instead of a local area network (LAN)? Well, there’s obviously the distance thing, but these days, wireless LANs can cover some serious turf. What about bandwidth? Well, here again, some really big pipes can be had for a price in many places, so that’s not it either. So what the heck is it then?

One of the main ways a WAN differs from a LAN is that while you generally own a LAN infrastructure, you usually lease WAN infrastructure from a service provider. To be honest, modern technologies even blur this definition, but it still fits neatly into the context of Cisco’s exam objectives

What do you think of WANs? What’s next for connectivity ?

5Navlesh Kumar Singh

Page 6: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

ABSTRACT

With the implementation of the project, company will be able to communicate

through a fast and efficient network. The project will have a great significance in

maximum running of the business. As branches will be able to communicate

faster, business processes will automatically become faster. WAN optimization

for future growth of the company will be an option, after the completion of the

project. . Network enterprise network equipment are mature and ubiquitous, but

the quality of services provided by similar networks varies from city to city and

from country to country. In particular, the quality variation gap between most of

the cities in some developing nations and their counterparts in advanced nations is

very wide. This is due to the lack in developing nations of an adequate IT

infrastructure, which is taken for granted in developed nations. Planning an

enterprise network in a developing nation is almost like planning it in the middle

of a desert. This project briefly discusses the architecture of an enterprise

network. It examines the barriers to planning, designing and implementing an

enterprise network. This project also covers the methods to implement enterprise

level networks.

In this project we will start from working Basics of routers and switches then covering the Routing technologies required to route data between branches. After that we have implement WAN and Frame-relay is considered a good choice because it connects multiple location using single interface of router and reduce the hardware costs. So we have to study and implement FRAME-RELAY.

For Internet connectivity we are also using frame relay. In this setup NAT is very essential in which we have translate live IP into local and vice-versa.

In today’s LAN Wi-Fi is also an important part that we have to implement for laptop and wireless devices. In short we can say a lot of technologies are studied and implemented for the successful completion of the project. Following list of technologies that are required in this project.

6Navlesh Kumar Singh

Page 7: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Introduction

WAN TECHNOLOGYA large and complex WAN needs to be created with the use of WAN technologies

throughout its branches for better running of organization.

WANs are all about exchanging information across wide geographic areas. They

are also, as you can probably gather from reading about the Internet, about

scalability—the ability to grow to accommodate the number of users on the

network, as well as to accommodate the demands those users place on network

facilities. Although the nature of a WAN—a network reliant on communications

for covering sometimes vast distances—generally dictates slower throughput,

longer delays, and a greater number of errors than typically occur on a LAN, a

WAN is also the fastest, most effective means of transferring computer-based

information currently available.

A Wide Area Network (WAN) is a computer network that covers a large

geographic area such as a city, country, or spans even intercontinental distances,

using a communications channel that combines many types of media such as

telephone lines, cables, and air waves. A WAN often uses transmission facilities

provided by common carriers, such as telephone companies. WAN technologies

generally function at the lower three layers of the OSI reference model: the

physical layer, the data link layer, and the network layer…

7Navlesh Kumar Singh

Page 8: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Overview

Wide Area Network Technologies

A Wide Area Network ( WAN) is a computer network covering multiple distance areas, which may spread across the entire world. WANs often connect multiple smaller networks, such as local area networks (LANs) or metro area networks (MANs). The world's most popular WAN is the Internet. Some segments of the Internet are also WANs in themselves. The key difference between WAN and LAN technologies is scalability C WAN must be able to grow as needed to cover multiple cities, even countries and continents.

A set of switches and routers are interconnected to form a Wide Area Network. The switches can be connected in different topologies such as full mesh and half mesh. A wide area network may be privately owned or rented from a service provider, but the term usually connotes the inclusion of public (shared user) networks.

Both packet switching and circuit switching technologies are used in the WAN. Packet switching allows users to share common carrier resources so that the carrier can make more efficient use of its infrastructure. In a packet switching setup, networks have connections into the carrier's network, and many customers share the carrier's network. The carrier can then create virtual circuits between customers' sites by which packets of data are delivered from one to the other through the network.

Circuit Switching allows data connections to be established when needed and then terminated when communication is complete. This works like a normal telephone line works for voice communication. Integrated Services Digital Network (ISDN) is a good example of circuit switching. When a router has data for a remote site, the switched circuit is initiated with the circuit number of the remote network.

Examples of Wide Area Network Technologies

8Navlesh Kumar Singh

Page 9: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Wide Area Network WAN Topology

Virtual private network (VPN) is a tecnology widely used in a public switched network (PSTN) to provide private and secured WAN for an organization. VPN uses encryption and other techniques to make it appear that the organisation has a dedicated network, while making use of the shared infrastructure of the WAN.

WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer. Key technologies often found in WANs include SONET, Frame Relay, X.25, ATM and PPP.

ATM: A dedicated-connection switching technology that organizes digital data into 53-byte cell units. Individually, a cell is processed asyn-chronously relative to other related cells and is queued before being multi-plexed over the transmission path. Speeds on ATM networks can reach 10 Gbps.

Frame Relay: (FR). A high-speed packet-switched data communications service, similar to X.25. Frame relay is widely used for LAN-to-LAN in-terconnect services, and is well suited to the bursty demands of LAN envi-ronments.

SONET/SDH: Synchronous Optical Network is an international standard for high speed communication over fiber-optic networks. The SONET es-tablishes Optical Carrier (OC) levels from 51.8 Mbps to 10 Gbps (OC-192) or even higher. Synchronous Digital Hierarchy (SDH) is a European equivalent of SONET.

X.25: The X.25 protocol allows computers on different public networks to communicate through an intermediary computer at the network layer level.

PPP: A point-to-point link provides a single, pre-established WAN com-munications path from the customer premises through a carrier network, such as a telephone company, to a remote network. Point-to-point lines are usually leased from a carrier and thus are often called leased lines. For a point-to-point line, the carrier allocates pairs of wire and facility hardware to your line only.

IP can also be considered as a WAN technology in the packet switching environment.

9Navlesh Kumar Singh

Page 10: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Symbols of Network Architecture

Some network mapping symbols for network engineer. Provide a Common Graphics Technology for Network Mapping.

10Navlesh Kumar Singh

Page 11: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Investigation and Analysis of ‘WAN’ Technology of a Multinational Organisation project

11Navlesh Kumar Singh

Page 12: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

The Investigation and Analysis of ‘WAN’ Technology of a Multinational Organisation project deals with the WIDE AREA NETWORK technology in Networking. In this application a Multi National Company has been considered. This company has got the Head office at Australia and branch offices at Chicago in United States and at Hyderabad in India. The administration monitors the branch offices from the Head office Australia connected through Internet service Provider ‘ISP’ using routers. The branch offices have a number of systems within the organisation which are interconnected by using hub or switch. The importance of the project is that due to globalisation the world has become small. This leads to the need for new technology to be used to accomplish the requirements of having interaction across the world. One of such things is video conferencing. This helps in easy interaction and doing things across the nations irrespective of their presence at the site. This saves a lot of time and money.

OBJECTIVES:-

The main objective of the IEEE Engineering project is to analyze the performance of the WIDE AREA NETWORK by considering different topologies and network models. This project investigates the strength of the network structure and its functionality by changing different attributes and observing the obtained results. This also suggests the enhancements in the network structure and modelling as well as the attributes of the network scenarios so that the traffic flow, packets size everything would be in perfect way to give good results.

DEVELOPMENT:-

The objectives of the project can be achieved by planning what to do to model the network scenarios, perform research on the subject by referring to the materials, edit the attributes of the network, performing simulation considering different scenarios, obtaining the results, taking comparison of the results for different cases e.t.c. Thus this is the process of development of the project.

RESOURCES:-

The software required for this project is OPNET.The hardware being a system connected to net connection and having this software to simulate the scenarios to obtain the results.

12Navlesh Kumar Singh

Page 13: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

SCHEDULE:-

A well planned project is a perfect executed project. Hence scheduling the tasks is important for the project to give the results in a desired way.The schedule of this Final Year project involves planning, research, implementation, evaluation, review and documentation.

What is Network?In one network more than one computer connected with each other through centralized device. They can share files and resources with each other.

LAN

LAN stands for Local Area Network. The scope of the LAN is within one building, one school or within one lab. In LAN (Hub), media access method is used CSMA/CD in which each computer sense the carrier before sending the data over the n/w. if carrier is free then you can transmit otherwise you have to wait or you have to listen. In multiple access each computer have right that they can access each other. If two computers sense the carrier on same time then the collision occur. Each computer, in the network, aware about the collision. Now this stop transmitting and they will use back off algorithm. In which random number is generated. This number or algorithm is used by each computer. Who has short number or small number, he has first priority to transmit the data over the network and other computers will wait for their turn.

WAN

WAN stands for Wide Area Network, in which two local area networks are connected through public n/w. it may be through telecommunication infrastructure or dedicated lines. For e.g: - ISDN lines, Leased lines etc.In which we can use WAN devices and WAN technology. You can also connect with your remote area through existing Internetwork called Internet.

13Navlesh Kumar Singh

Page 14: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Devices

HubHub is centralized device, which is used to connect multiple workstations. There are two types of Hub: -

(i) Active Hub(ii) Passive Hub

it has no special kind of memory. It simply receives the frame (data) and forwards it to all its nodes except the receiving node. It always performs broadcasting. In case of hub, there is one collision domain and one broadcast domain. In case of hub, the media access method is used CSMA/CD (Carrier Sense Multiple Access/Collision Detection).

(i) Active Hub In Active hub, it receives the frame regenerate and then forward to all its nodes.(ii) Passive Hub In Passive hub, it simply receives the frame and forward to all its connected nodes.

You cannot perform LAN segmentation using hub.SwitchSwitch is also used to connect multiple workstations. Switch is more intelligent than hub. It has special kind of memory called mac address/filter/lookup table. Switch reads mac addresses. Switch stores mac addresses in its filter address table. Switch when receives frame, it reads the destination mac address and consult with its filter table. If he has entry in its filter table then he forwards the frame to that particular mac address, if not found then it performs broadcasting to all its connected nodes.

Every port has its own buffer memory. A port has two queues one is input queue and second is output queue. When switch receives the frame, the frame is received in input queue and forward from output queue. So in case of switch there is no chance or place for collisions. In case of switch, the media access method is used CSMA/CA (Carrier Sense Multiple Access/ Collision Avoidance). Switches provide more efficiency, more speed and security.

There are two types of switches: -

(i) Manageable switches (can be configured with console cable).

(ii) Non-manageable switches.

We can perform LAN segmentation by using switches.

14Navlesh Kumar Singh

Page 15: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Bridge

Bridge is a hardware device, which is used to provide LAN segmentation means it is used for break the collision domain. It has same functionality as performed by switch. We can use bridge between two different topologies. It has fewer ports. Each port has a own buffer memory. It works on Data Link Layer of OSI model. It also read mac address and stores it in its filter table. In case of bridge there is one broadcast domain.

Router

Router is hardware device, which is used to communicate two different networks. Router performs routing and path determination. It does not perform broadcast information. There are two types of routers: -

(i) Hardware Routers are developed by Cisco, HP.

(ii) Software Routers is configured with the help of routing and remote access. This feature is offered by Microsoft. This feature is by default installed, but you have to enable or configure it.

Hardware routers are dedicated routers. They are more efficient.

But in case of software routers, it has less features, slow performance. They are not very much efficient.

Lan Card

Lan card is media access device. Lan card provide us connectivity in the network. There is a RJ45 (Registered Jack) connector space on the Lan card. RJ45 is used in UTP cable. There is another led which is also called heartbeat of Lan card. When any activity occur it may be receiving or transmitting any kind of data. This led start blinking and also tell us the status of lan card.

Topologies

BUS Topology

Cable Type – Coaxial

Connector Type – BNC (Bayonet Neill-Concelman), T type, Terminator

Coaxial – Thick Maximum length – 500 meters

N/w devices 100

Coaxial – Thin Maximum length – 185 meters

N/w devices 30

15Navlesh Kumar Singh

Page 16: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Star Topology

Cable type - UTP

Connector type - RJ45

Maximum Length – 100 meters (with proper color coding)

16Navlesh Kumar Singh

Page 17: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

UTP (Unshielded Twisted Pair)

STP (Shielded Twisted Pair)

17Navlesh Kumar Singh

Page 18: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

In case of hub media access method will be CSMA/CD.

Ring Topology

Cable - UTP

There is token ring method used, so there is no collision chance.

Ethernet Family

Speed Base band10 Base 2 200-meter Coaxial cable10 Base 5 500-meter Thick Coaxial cable10 Base T 100 meter Twisted Pair (UTP)10/100(present) Base TX 100 meter UTP100 Base T4 100 meter UTP 4 Pairs used100 Base FX up to 4 kms Fiber Optic1000(Server) Base TX 100 meter UTP1000 Base FX up to 10 kms Fiber Optic10000 Base FX Fiber Optic

Color

18Navlesh Kumar Singh

Page 19: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Green – Green white

Orange – Orange white

Blue – Blue white

Brown – Brown white

Green cable has maximum twists.

Pin Configuration

Hub/Switch PC/Router/Online Printer Uplink port(Hub/Switch)

1 Rx+ Tx+ Tx+

2 Rx- Tx- Tx-

3 Tx+ Rx+ Rx+

4 NC NC NC

5 NC NC NC

6 Tx- Rx- Rx-

7 NC NC NC

8 NC NC NC

Cross Straight

1 3 1 1

2 6 2 2

3 1 3 3

6 2 6 6

Cross Hub Pc

Cable

Switch Router

Straight Cable

19Navlesh Kumar Singh

Page 20: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Straight Cable

1 Orange white - Orange white

2 Orange - Orange

3 Green white - Green white

4 Blue - Blue

5 Blue white - Blue white

6 Green - Green

7 Brown white - Brown white

8 Brown - Brown

Cross Cable

1 Orange white - Green white

2 Orange - Green

3 Green white - Orange white

4 Blue - Blue

5 Blue white - Blue white

6 Green - Orange

7 Brown white - Brown white

8 Brown - Brown

RJ45 Connector

IP Address v4

20Navlesh Kumar Singh

Page 21: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

IP address is a 32-bit address. It is divided into four octets. Each octet has 8 bits. It has two parts one is network address and second is host address. in local area network, we can used private IP address, which is provided by IANA (Internet Assigning Numbering Authority). IP addresses are divided into five classes.

Class Range N/w bits Host bits Subnet mask Total IP Valid IP

A 1 – 126 8 24 255.0.0.0 1677721616777214

B 128 – 191 16 16 255.255.0.0 65536 65534

C 192 – 223 24 8 255.255.255.0 256 254

D 224 – 239 it is reserved for multicast.

E 240 – 255 it is reserved for research/scientific use.

We can use first three classes. IANA provides private IP addresses from first three classes.

Class Private IP Range

A 10.0.0.0 – 10.255.255.255

B 172.16.0.0 – 172.31.255.255

C 192.168.0.0 – 192.168.255.255

One another range that is called APIPA (Automatic Private Internet Protocol Addressing)

169.254.0.0 – 169.254.255.255

We can assign IP address to our computer by two methods: -

(1) Statically or Manually

(2) Dynamically (by using DHCP Server – Dynamic Host Configuration Protocol)

But in case of your computer has no IP address then IP address is assigned to the computer from APIPA range. But communication is not possible when computer has IP address from APIPA range.

Loopback address = 127.0.0.1

21Navlesh Kumar Singh

Page 22: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Subnet Mask

Subnet mask is also 32-bit address, which tell us how many bits are used for network and how many bits are used for host address. In Subnet mask Network bits are always 1 and Host bits are always 0.

IP Addresses invalid or reserve IP Addresses

When we are going to assign IP addresses to our computers then we have to follow some rules.

Rules: -

(1) All Host bits cannot be 0 (10.0.0.0), because it represent network address which is reserved for router.

(2) All Host bits cannot be 1 (10.255.255.255), because this is broadcast address of that network (10th network).

(3) All bits cannot be 0 (0.0.0.0), because this address is reserved for Default routing. Default routing is used in case of Stub n/w (means our network has one exit point).

(4) All bits cannot be 1 (255.255.255.255), because this is reserved for Broadcasting.

(5) 127.0.0.1 - This is Loopback address, which is used for self-communication or troubleshooting purpose.

C:\>ipconfig

C:\>ipconfig/all

It shows all detail.

PING – Packet Internet Groper

This command is used to check the connectivity with other computer. Ping is performed with in network or outside of the network. In this process four packets are send to the destination address and four packets are received from the destination address. ICMP (Internet Control Message Protocol) protocol is used for this process.

C:\>Ping 10.0.0.5 –t (for continue ping)

Press Ctrl+C to stop ping.

EMI – Electromagnetic Interference

22Navlesh Kumar Singh

Page 23: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Wide Area Networks (WAN)

” Internet Bandwidth is like toothpaste in a tube, lets make sure the hole is big enough! “

Wide Area Networks is a simply a term to describe how you connect to the Internet, The plethora of way and means of connecting to the Internet are only limited by your budget (and sometimes geography) so choosing the right internet connection solution for your business requires knowledge and expertise.

23Navlesh Kumar Singh

Page 24: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

You can choose from 3G, 3.5G, ADSL, SDSL, EFM, MPLS, Leased Lines – Copper or Fibre from 2-1000megs to name the most common solutions.

Sherr Tehcnologies have delivered various different WAN solutions within the UK and Europe, and each country has unique idiosyncrasies when it comes to delivering telecoms and internet connections; for example in Spain, ADSL microfilters could only historically be bought from a Telefonica shop, in Gibraltar, ADSL lines cost 4 times more than the UK and leased lines are prohibitively expensive. So when considering connecting your business to the Internet the availability and cost are important factors.

Another important factor is the time to install your internet connection of choice, so if you’re opening a new site, and require a new internet connection it is always important to consider the time it will take the local telecoms provider to install and these times can vary wildly, so build it into your plans from the beginning to avoid a lack of internet from delaying your new venture.

Internet connections can easily become overloaded and harm the productivity if not managed correctly. Sherr Technologies 24×7 monitoring platform includes tools to measure bandwidth usage, identify users who are abusing the internet connection and provide reports on uptime and usage. This allows us to help identify the bottlenecks in your internet conenction before they occur and configure your routers with traffic management policies which will control the flow of traffic and ensure business critical data is given priority over casual internet browsing.

To give you a brief synopsis of the common wide area network options available

ADSL (Asymmetric DSL) – Standard broadband, faster download than upload, shared with upto 50 users, currently upto 100megs in the UK

SDSL (Symmetric DSL) – Same speed in both directions, usually dedi-cated for you, currently upto 2megs in the UK

24Navlesh Kumar Singh

Page 25: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

EFM (Ethernet First Mile) – Pretty much a rebranded SDSL product,

again symmetric and uncontended like SDSL, which can be bonded to provide upto 8 megs

Leased Lines – delivered over copper (upto 10megs) or fibre (upto 1000megs), symmetric and uncontended, ultra fast, but comes at a price, especially large if it has to be installed some distance from the exchange

3G/3.5G – mobile broadband, delivered across the mobile telephone net-work, speeds currently upto 14megs, but soon speeds of 42-84megs will be achievable

This list is not exhaustive, it is illustrative. We can help you analyse the options and choose the right solution, and work with the chosen delivery partner to get the internet connection you need, where you need it.

Your network may also require resiliency, bonded or load balanced which is an area Sherr Technologies have previously delivered solutions for their clients. Should you require bonded and load balanced ADSL, ADSL & SDSL bonding, ADSL backup to your leased line, 3G backup to your ADSL connection, or any variation in-between we can help design and deliver the right solutions, generally based on Cisco hardware and the technical skills to install and deliver your internet connection, where you need it.

If you need internet connenctions Sherr Technologies can provide this through many of our partner providers for one site or many, or should you require a more complicated or resilient network setup, please.

Glossary

10BaseT Part of the original IEEE 802.3 standard, 10BaseT is the Ethernet specification of 10Mbps baseband that uses two pairs of twisted-pair, Category 3, 4, or 5 cabling—using one pair to send data and the other to receive. 10BaseT has a distance limit of about 100 meters per segment. See also: Ethernet and IEEE 802.3.

25Navlesh Kumar Singh

Page 26: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

100BaseT Based on the IEEE 802.3u standard, 100BaseT is the Fast Ethernet specification of 100Mbps baseband that uses UTP wiring. 100BaseT sends link pulses (containing more information than those used in 10BaseT) over the network when no traffic is present. See also: 10BaseT, Fast Ethernet, and IEEE 802.3.

AARP AppleTalk Address Resolution Protocol: The protocol in an AppleTalk stack thatmaps data-link addresses to network addresses.

acknowledgment Verification sent from one network device to another signifying that anevent has occurred. May be abbreviated as ACK. Contrast with: NAK.

address mask A bit combination descriptor identifying which portion of an address refers to the network or subnet and which part refers to the host. Sometimes simply called the mask. See also: subnet mask.

Application layer Layer 7 of the OSI reference network model, supplying services to appli-cation procedures (such as electronic mail and file transfer) that are outside the OSI model. This layer chooses and determines the availability of communicating partners along with theresources necessary to make the connection, coordinates partnering applications, and forms aConsensus on procedures for controlling data integrity and error recovery. See also: Data Linklayer, Network layer, Physical layer, Presentation layer, Session layer, and Transport layer.

ARP Address Resolution Protocol: Defined in RFC 826, the protocol that traces IP addresses to MAC addresses. See also: RARP.

ATM Asynchronous Transfer Mode: The international standard, identified by fixed-length 53-byte cells, for transmitting cells in multiple service systems, such as voice, video, or data. Transit delays are reduced because the fixed-length cells permit processing to occur in the Hardware. ATM is designed to maximize the benefits of high-speed transmission media, such As SONET, E3, and T3.

ATM ARP server A device that supplies logical subnets running classical IP over ATM with Address-resolution services.

Auxiliary port The console port on the back of Cisco routers that allows you to connect a Modem and dial the router and make console configuration settings.

Basic Management Setup Used with Cisco routers when in setup mode. Only provides

26Navlesh Kumar Singh

Page 27: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Enough management and configuration to get the router working so someone can telnet into The router and configure it.

Binary A two-character numbering method that uses ones and zeros. The binary numbering System underlies all digital representation of information.

Classless routing Routing that sends subnet mask information in the routing updates. Class- less routing allows Variable-Length Subnet Masking (VLSM) and supernetting. Routing pro- tocols that support classless routing are RIP version 2, EIGRP, and OSPF.

CSU/DSU Channel service unit/data service unit: Physical layer device used in wide area net- works to convert the CPE digital signals to what is understood by the provider’s switch. A CSU/DSU is typically one device that plugs into a RJ-45 (8-pin modular) jack, known as the demarcation point.

Dynamic routing Also known as “adaptive routing,” this technique automatically adapts to traffic or physical network revisions.

HDLC High-Level Data-Link Control: Using frame characters, including checksums, HDLC designates a method for data encapsulation on synchronous serial links and is the default encapsulation for Cisco routers. HDLC is a bit-oriented synchronous Data Link layer protocol created by ISO and derived from SDLC. However, most HDLC vendor implementations (including Cisco’s) are proprietary. See also: SDLC.

Internet protocol (IP) Any protocol belonging to the TCP/IP protocol stack. See also: TCP/IP.

LAN Local area network: Broadly, any network linking two or more computers and related devices within a limited geographical area (up to a few kilometers). LANs are typically high- speed, low-error networks within a company. Cabling and signaling at the Physical and Data Link layers of the OSI are dictated by LAN standards. Ethernet, FDDI, and Token Ring are among the most popular LAN technologies. Compare with: MAN.

Network Address Used with the logical network addresses to identify the network segment in an internetwork. Logical addresses are hierarchical in nature and have at least two parts: Network and Host.An example of a hierarchical address is 172.16.10.5, where 172.16 isthe network and 10.5 is the host address.

NFS ( Network File System ): One of the protocols in Sun Microsystems’s widely used file system protocol suite, allowing remote file access across a network. The

27Navlesh Kumar Singh

Page 28: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

name is loosely usedto refer to the entire Sun protocol suite, which also includes RPC, XDR (External Data Rep-resentation), and other protocols.

NIC (Network interface card): An electronic circuit board placed in a computer. The NIC pro-vides network communication to a LAN.

NVRAM (Nonvolatile RAM): Random-access memory that keeps its contents intact while power is turned off.

OSI (Open Systems Interconnection): International standardization program designed by ISO and ITU-T for the development of data networking standards that make multivendor equip-ment interoperability a reality.

OSPF Open Shortest Path First: A link-state, hierarchical routing algorithm derived from an earlier version of the IS-IS protocol, whose features include multipath routing, load balancing, and least-cost routing. OSPF is the suggested successor to RIP in the Internet environment. See also: Enhanced IGRP, IGP, and IP.

PPP Point-to-Point Protocol: The protocol most commonly used for dial-up Internet access, superseding the earlier SLIP. Its features include address notification, authentication via CHAP or PAP, support for multiple protocols, and link monitoring. PPP has two layers: the Link Control Protocol (LCP) establishes, configures, and tests a link; and then any of various Network Control Protocols (NCPs) transport traffic for a specific protocol suite, such as IPX. See also: CHAP, PAP, and SLIP.

RIP Routing Information Protocol: The most commonly used interior gateway protocolin the Internet. RIP employs hop count as a routing metric. See also: Enhanced IGRP, IGP, OSPF, and hop count.

ROM Read-only memory: Chip used in computers to help boot the device. Cisco routers use a ROM chip to load the bootstrap, which runs a power-on self-test, and then find and load the IOS in flash memory by default.

RIP Routing Information Protocol: The most commonly used interior gateway protocolin the Internet. RIP employs hop count as a routing metric. See also: Enhanced IGRP, IGP, OSPF, and hop count.

Static Route A route whose information is purposefully entered into the routing table by an administrator and takes priority over those chosen by dynamic routing protocols.

28Navlesh Kumar Singh

Page 29: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Subnetting Used in IP networks to break up larger networks into smaller subnetworks.

Subnetwork (1) Any network that is part of a larger IP network and is identified by a subnet address. A network administrator segments a network into subnetworks in order to provide a hierarchical, multilevel routing structure, and at the same time protect the subnetwork from the addressing complexity of networks that are attached. Also known as a subnet.

TFTP (Trivial File Transfer Protocol): Conceptually, a stripped-down version of FTP; it’s the protocol of choice if you know exactly what you want and where it’s to be found. TFTP doesn’t provide the abundance of functions that FTP does. In particular, it has no directory browsing abilities; it can do nothing but send and receive files.

User Mode Cisco IOS EXEC mode that allows an administrator to perform very few commands. You can only verify statistics in user mode; you cannot see or change the router or switch configuration.

VLAN (Virtual LAN): A group of devices on one or more logically segmented LANs (configured by use of management software), enabling devices to communicate as if attached to the same physical medium, when they are actually located on numerous different LAN segments. VLANs are based on logical instead of physical connections and thus are tremendously flexible.

VLSM Variable Length Subnet Mask: Helps optimize available address space and specify a different subnet mask for the same network number on various subnets. Also commonly referred to as “subnetting a subnet.”

WAN (Wide area network): Is a designation used to connect LANs together across a DCE (data communications equipment) network. Typically, a WAN is a leased line or dial-up connection across a PSTN network. Examples of WAN protocols include Frame Relay, PPP, ISDN, and HDLC.

So what, exactly, is it that makes something a wide area network (WAN) instead of a local area network (LAN)? Well, there’s obviously the distance thing, but these days, wireless LANs can cover some serious turf. What about bandwidth? Well, here again, some really big pipes can be had for a price in many places, so that’s not it either. So what the heck is it then?One of the main ways a WAN differs from a LAN is that while you generally own a LANinfrastructure, you usually lease WAN infrastructure from a service provider. To be honest, modern technologies even blur this definition, but it still fits neatly into the context of Cisco’s exam objectives.

29Navlesh Kumar Singh

Page 30: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Network

Network is the method to share hardware resources and software resources. We can share the resources with the help of operating system like windows, Linux, UNIX etc. To connect multiple networks we have to use internetworking devices like router, bridge, layer 3, switches etc.

Administrator model for networking

Server software: - which software are used to giving services that are server software.Client software: - which gets services.

IP Terminology

Throughout this chapter you’ll learn several important terms vital to your understanding of the Internet Protocol. Here are a few to get you started:Bit A Bit is one digit, either a 1 or a 0.Byte A byte is 7 or 8 bits, depending on whether parity is used. For the rest of this chapter,always assume a byte is 8 bits.

Network Address Range: Class AThe designers of the IP address scheme said that the first bit of the first byte in a Class A network address must always be off, or 0. This means a Class A address must be between 0 and127 in the first byte, inclusive.Consider the following network address:0xxxxxxxIf we turn the other 7 bits all off and then turn them all on, we’ll find the Class A range of network addresses:00000000 = 001111111 = 127So, a Class A network is defined in the first octet between 0 and 127.

Example: Start IP address range is 1.0.0.1End IP address range is 127.0.0.1

Class A Valid Host IDsAll host bits off is the network address: 10.0.0.0.All host bits on is the broadcast address: 10.255.255.255.

01111111.00000000.00000000.00000000Total Host =2n-2

30Navlesh Kumar Singh

Page 31: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

=224-2 =16777216-2=1677721401111111.00000000.00000000.00000000Total Network=2n-1=27-1=128-1=127

Network Address Range: Class B

In a Class B network, the RFCs state that the first bit of the first byte must always be turnedon but the second bit must always be turned off. If you turn the other 6 bits all off and thenall on, you will find the range for a Class B network:10000000 = 12810111111 = 191Class B network is defined when the first byte is configured from 128 to 191.

Example: Start IP address range is 128.10.0.1End IP address range is 191.10.0.1

Class B Valid Host IDs

All host bits turned off is the network address: 172.16.0.0.All host bits turned on is the broadcast address: 172.16.255.255.10111111.11111111.00000000.00000000Total Host =2n-2=216-2 =65536-2=6553410111111.11111111.00000000.00000000Total Network=2n-1=214-1=16384-1=16383

Network Address Range: Class CFor Class C networks, the RFCs define the first 2 bits of the first octet as always turned on, but the third bit can never be on. Following the same process as the previous classes, convert from binary to decimal to find the range. Here’s the range for a Class C network:11000000 = 19211011111 = 223

Example: Start IP address range is 192.168.0.1End IP address range is 223.168.0.Class Valid Host IDs C

Here’s an example of how to find a valid host ID in a Class C network:All host bits turned off is the network ID: 192.168.100.0.All host bits turned on is address: 192.168.100.255.

31Navlesh Kumar Singh

Page 32: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

11011111.11111111.11111111.00000000Total Host =2n-2=28-2 =256-2=25411011111.11111111.11111111.00000000Total Network=2n-1=221-1=2097152-1=2097151

So, if you see an IP address that starts at 192 and goes to 223, you’ll know it is a Class C IP address.

Network Address Ranges: Classes D and E

The addresses between 224 to 255 are reserved for Class D and E networks.Class D (224–239) is used for multicast addresses andClass E (240–255) for scientific purposes, but I’m not going into these types of addresses in this book (and you don’t need to know them).because the main class for our use A,B & C only.

Remember the Class A range.The IP range for a Class A network is 1–126. This provides 8 bits of network addressing and 24 bits of host addressing by default.Remember the Class B range.The IP range for a Class B network is 128–191. Class B addressing provides 16 bits of network addressing and 16 bits of host addressing by default.Remember the Class C range.The IP range for a Class C network is 192–223. Class C addressing provides 24 bits of network addressing and 8 bits of host addressing by default.

Subnet MasksSubnet address scheme to work, every machine on the network must know which part of the host address will be used as the subnet address.A subnet mask is a 32-bit value that allows the recipient of IP address and subnetmasks. The network administrator creates a 32-bit subnet mask composed of 1s and 0s. The 1s in the subnet mask represent the positions that refer to the network or subnet addresses. Not all networks need subnets, meaning they use the default subnet mask.

ExampleThis is basically subnet masks for Classes A, B, and C. These default masks cannot change. In other words, you can’t make a Class B subnet mask read 255.0.0.0. If you try, the host will read that address as invalid and usually won’t

32Navlesh Kumar Singh

Page 33: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

even let you type it in. For a Class A network, you can’t change the first byte in a subnet mask; it must read 255.0.0.0 at a minimum.

Class Format Default Subnet Mask

A network.host.host.host 255.0.0.0B network.network.host.host 255.255.0.0C network.network.network.host 255.255.255.0

Classless Inter-Domain Routing (CIDR)

Classless Inter-Domain Routing (CIDR) It’s basically the method that ISPs (Internet service providers) use to allocate a number of addresses to a company, a home—a customer. They provide addresses in a certain block size.You can see this IP 192.168.10.32/28. This is telling you what your subnet mask is. The slash notation (/) that means /28 is a network bits we can say network bits turn on bits. means how many bits are turned on (1s). Obviously, the maximum could only be /32 because a byte is 8 bits and there are 4 bytes in an IP address: (4×8 = 32). But keep in mind that the largest subnet mask can only be a /30 because you’ve got to keep at least 2 bits for host bits.

Example:Class A: default subnet mask, which is 255.0.0.0 (11111111.00000000.00000000.00000000)8 bits that are 1s—that is, 8 bits that are turned on and 24 bits 0s turn off bits or host bits.Class B: default mask would be 255.255.0.0, (11111111.11111111.00000000.00000000)which is a /16 because 16 bits are ones (1s):and host bits are 16(0s)

Formula:Host bits(0s) = total bits –network bits(1s) (32-network bits) Network bits(1s) = total bits-host bits(0s) (32-host bits)

Total Subnet Mask CIDR Value255.0.0.0 /8255.128.0.0 /9

33Navlesh Kumar Singh

Page 34: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

255.192.0.0 /10255.224.0.0 /11255.240.0.0 /12255.248.0.0 /13255.252.0.0 /14255.254.0.0 /15255.255.0.0 /16255.255.128.0 /17255.255.192.0 /18255.255.224.0 /19255.255.240.0 /20255.255.248.0 /21255.255.252.0 /22255.255.254.0 /23255.255.255.0 /24255.255.255.128 /25255.255.255.192 /26255.255.255.224 /27255.255.255.240 /28255.255.255.248 /29255.255.255.252 /30

Subnetting Class C AddressesThere are many different ways to subnet a network. First I will show you how to use the binary method.In a Class C address, only 8 bits are available for defining the hosts. Remember thatsubnet bits start at the left and go to the right, without skipping bits.

For Example:255.255.255.0/24 (11111111.11111111.11111111.00000000)In this example the underline value is 24 so CIDR value is /24

Binary Decimal CIDR

00000000 = 0 /2410000000 = 128 /2511000000 = 192 /2611100000 = 224 /2711110000 = 240 /2811111000 = 248 /2911111100 = 252 /30

Subnetting formulas

34Navlesh Kumar Singh

Page 35: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

1. How many subnets? = 2x

2. How many hosts per subnet? = 2n-23. What are the valid subnets?( you can say second subnet) = 256-subnet

mask4. Subnet range = 0,valid subnet (0 is a first subnet every subnet mask)5. IP Address range = 192.168.0.1 (this is class C ip address I use 0 subnet

and 1 host)

Practice Example #1C: 255.255.255.128 (/25)Since 128 is 10000000 in binary, there is only 1 bit for subnetting and 7 bits for hosts. We’regoing to subnet the Class C network address 192.168.10.0.192.168.10.0 = Network address255.255.255.128 = Subnet maskSince 128 is 1 bit on (10000000)X=1 N=7How many subnets? =2x

=21 =2How many hosts per subnet? =2N-2=27-2 =128-2 =126What are the valid subnet? =256-subnet mask=256-128 =128Subnet range =0,128IP Address range:- (0 subnet) =192.168.0.1……………………..126 192.168.0.126(128 subnet)=192.168.128.129………………..254 192.168.128.254

What Do We Know?

When you see a subnet mask or slash notation (CIDR), you should know the followingWhat do we know about a /25?255.255.255.128 mask1 bits on and 7 bits off (10000000)Block size of 1282 subnets, each with 126 hosts

What do we know about a /26?255.255.255.192 mask2 bits on and 6 bits off (11000000)Block size of 644 subnets, each with 62 hosts

What do we know about a /27?255.255.255.224 mask

35Navlesh Kumar Singh

Page 36: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

3 bits on and 5 bits off (11100000)Block size of 328 subnets, each with 30 hosts

What do we know about a /28?255.255.255.240 mask4 bits on and 4 bits offBlock size of 1616 subnets, each with 14 hosts

What do we know about a /29?255.255.255.248 mask5 bits on and 3 bits offBlock size of 832 subnets, each with 6 hosts

What do we know about a /30?255.255.255.252 mask6 bits on and 2 bits offBlock size of 464 subnets, each with 2 hosts

Subnetting Class B AddressesBefore we dive into this, let’s look at all the possible Class B subnet masks first. This class 16 bits network (1s) and 16 bits hosts(0s).this class range 16 bits to 30 bits.For example: 255.255.0.0 (11111111.11111111.00000000.00000000)255.255.0.0 (/16)255.255.128.0 (/17) 255.255.255.0 (/24)255.255.192.0 (/18) 255.255.255.128 (/25)255.255.224.0 (/19) 255.255.255.192 (/26)255.255.240.0 (/20) 255.255.255.224 (/27)255.255.248.0 (/21) 255.255.255.240 (/28)255.255.252.0 (/22) 255.255.255.248 (/29)255.255.254.0 (/23) 255.255.255.252 (/30)

Practice Example #1B: 255.255.255.128 (/17)Since 128 is 10000000.00000000 in binary, there is only 1 bit for subnetting and 15 bits for hosts. We’re going to subnet the Class B network address 128.16.0.0.128.16.0.0 = Network address255.255.128.0 = Subnet maskSince 128 is 1 bit on (10000000.00000000)X=1 N=15How many subnets? =2x

=21 =2

36Navlesh Kumar Singh

Page 37: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

How many hosts per subnet? =2N-2=215-2 =32768-2 =32768What are the valid subnet? =256-subnet mask=256-128 =128Subnet range =0,128IP Address range(0 subnet) =128.16.0.1……………………..254 192.168.0.254128.16.1.1……………………..254 128.16.1.254128.16.2.1……………………..254 192.168.2.254……..128.16.127.1……………………..254 128.16.127.254(128 subnet)=128.16.128.1……………………..254 128.16.128.254128.16.129.1……………………..254 128.16.129.254128.16.130.1……………………..254 128.16.130.254……128.16.255.1……………………..254 128.16.255.254

Practice Example #1C: 255.255.255.192 (/18)

Since 192 is 11000000.00000000 in binary, there is only 2 bit for subnetting and 14 bits for hosts. We’re going to subnet the Class C network address 192.168.10.0.192.168.10.0 = Network address255.255.255.192 = Subnet maskSince 192 is 2 bit on (11000000.00000000)X=2 N=14How many subnets? =2x

=22 =4How many hosts per subnet? =2N-2=214-2 =16384-2 =16382What are the valid subnet? =256-subnet mask=256-192 =64Subnet range =0=0+64=64=64+64=128=128+64=192Four subnet range (0,64,128,192)IP Address range(0 subnet) =128.16.0.1……………………..254 128.16.0.254128.16.1.1……………………..254 128.16.1.254128.16.2.1……………………..254 128.16.2.254……..128.16.63.1……………………..254 128.16.63.254(64 subnet)=128.16.64.1……………………..254 128.16.64.254128.16.65.1……………………..254 128.16.65.254128.16.66.1……………………..254 128.16.66.254……128.16.127.1……………………..254 128.16.127.254(128 subnet)=128.16.128.1……………………..254 128.16.128.254

37Navlesh Kumar Singh

Page 38: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

128.16.129.1……………………..254 128.16.129.254128.16.130.1……………………..254 128.16.130.254……..128.16.191.1……………………..254 128.16.191.254(192 subnet)=128.16.192.1……………………..254 128.16.192.254128.16.193.1……………………..254 128.16.193.254128.16.194.1……………………..254 128.16.194.254……128.16.255.1……………………..254 128.16.255.255

Subnetting Class A Addresses

Class A subnetting is not performed any differently than Classes B and C, but there are 24 bits to play with instead of the 16 in a Class B address and the 8 in a Class C address. This class 8 bits network (1s) and 24 bits hosts(0s).this class range 8 bits to 30 bits.

For example:-

255.0.0.0 (11111111.00000000.00000000.00000000)255.0.0.0 (/8)255.128.0.0 (/9) 255.255.240.0 (/20)255.192.0.0 (/10) 255.255.248.0 (/21)255.224.0.0 (/11) 255.255.252.0 (/22)255.240.0.0 (/12) 255.255.254.0 (/23)255.248.0.0 (/13) 255.255.255.0 (/24)255.252.0.0 (/14) 255.255.255.128 (/25)255.254.0.0 (/15) 255.255.255.192 (/26)255.255.0.0 (/16) 255.255.255.224 (/27)255.255.128.0 (/17) 255.255.255.240 (/28)255.255.192.0 (/18) 255.255.255.248 (/29)255.255.224.0 (/19) 255.255.255.252 (/30)

Practice Example #1A: 255.128.0.0 (/9)Since 128 is 11111111.10000000.00000000.00000000 in binary, there is only 1 bit for subnetting and 23 bits for hosts. We’re going to subnet the Class B network address 10.1.0.0.10.1.0.0 = Network address255.128.0.0 = Subnet maskSince 128 is 1 bit on (10000000.00000000.00000000)X=1 N=23How many subnets? =2x

=21 =2How many hosts per subnet? =2N-2=223-2 =8388608-2 =8388606What are the valid subnet? =256-subnet mask

38Navlesh Kumar Singh

Page 39: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

=256-128 =128Subnet range =0,128IP Address range(0 subnet) =10.0.0.1……………………..254 10.0.0.25410.0.1.1……………………..254 10.0.1.25410.0.2.1……………………..254 10.0.2.254……..10.0.255.1……………………..254 10.0.255.25410.1.0.1………………………..254 10.1.0.254

10.1.1.1…………………………254 10.1.1.25410.2.0.1…………………………. 10.2.255.25410.127.0.1……………………… 10.127.255.254(128 subnet)=10.128.0.1……………………..254 10.128.0.25410.128.1.1……………………..254 10.128.1.25410.128.2.1……………………..254 10.128.2.254……..10.129.255.1……………………..254 10.129.255.25410.129.0.1………………………..254 10.129.0.254

10.129.1.1…………………………254 10.129.1.25410.130.0.1…………………………. 10.130.255.25410.255.0.1……………………… 10.255.255.254

What Do We Know?

When you see a subnet mask or slash notation (CIDR), you should know the followingWhat do we know about a /9?255.128.0.0 mask1 bits on and 23 bits off (10000000.00000000.00000000)Block size of 1282 subnets, each with 8388606 hosts

What do we know about a /10?255.192.0.0 mask2 bits on and 22 bits off (11000000.00000000.00000000)Block size of 644 subnets, each with 4194302 hosts

What do we know about a /11?255.224.0.0 mask3 bits on and 21 bits off (11100000.00000000.00000000)Block size of 328 subnets, each with 2097150 hosts

What do we know about a /12?255.240.0.0 mask4 bits on and 20 bits off (11110000.00000000.00000000)

39Navlesh Kumar Singh

Page 40: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Block size of 1616 subnets, each with 1048574 hosts

What do we know about a /13?255.248.0.0 mask5 bits on and 19 bits off (11111000.00000000.00000000)

Define and describe the function of the MAC address

Media Access Control (MAC) address is the hardware address of the interface and it is burned in to the NIC card. This is a unique number issued by IEEE to the manufacturer. It is 6 bytes long and the first 24 bits represents the vendor and next 24 bits represents the serial number of the NIC card. This hardware address is used by the MAC layer of the Data Link layer to identify uniquely, the LAN device, to the network layer.

Variable Length Subnet Masks (VLSMs)I’m going to show you a simple way to take one network and create many networks using sub- net masks of different lengths on different types of network designs. This is called VLSM net- working, and it does bring up another subject I mentioned at the beginning of this chapter:

classful and classless networking.Classless routing protocols, however, do support the VLSM with routing protocols such as RIPv2, EIGRP, and OSPF. The benefit of this type of network is that you save a bunch of IP address space with it.

Example:- IP address of 7 hostHost = 24-2= 16-2 = 14

40Navlesh Kumar Singh

7 200 600

192.168.0.14 192.168.2.225 128.16.4.25

Page 41: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

That means host bits = 4Network bits = Total bits-Host bits= 32-4 =28So network bits are 28 bits we call this bits turn on bits,turn on bits CIDR valueCIDR value is /28You can creat subnet,host,valid subnet and ip address range of this value.Subnet mask : 255.255.255.224Subnets = 8Host = 14Subnet range = 0,32,64,96,128…………255IP range = 192.168.0.1………….14 192.168.0.14

(Note : Same matter to solve host 200, 600 hosts ip range,subnets,valid subnets etc.)

Troubleshooting IP Addressing

Packet InterNet Groper (ping) Uses ICMP echo request and replies to test if a node IP stack is initialized and alive on the network.Traceroute Displays the list of routers on a path to a network destination by using TTL time-outs and ICMP error messages. This command will not work from a DOS prompt.Tracert Same command as traceroute, but it’s a Microsoft Windows command and will not work on a Cisco router.arp –a Displays IP-to-MAC-address mappings on a Windows PC.show ip arp Same command as arp -a, but displays the ARP table on a Cisco router. Like the commands traceroute and tracert, they are not interchangeable through DOS and Cisco.ipconfig /all Used only from a DOS prompt, shows you the PC network configuration

The IOS User InterfaceThe Cisco Internetwork Operating System (IOS) is the kernel of Cisco routers and most switches.I’ll show you the Cisco IOS and how to configure a Cisco router using the command-line interface (CLI).Connecting to a Cisco RouterYou can connect to a Cisco router to configure it, verify its configuration, and check statistics. most often, the first place you would connect to is the console port. The console port is usually an RJ-45 (8-pin modular) connection located at the back of the router—by default, there’s may or may not be a password set. The new ISR routers use cisco as the username and cisco as the password by default.

41Navlesh Kumar Singh

Page 42: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Hyper terminal installation to console the router interfaces

1.Start2.All programs3.Accessories4.Communication5.Hyper terminal6.New connection choose the icon do you want to select7.Enter connection name than choose OK8.Connect to com port 1 by default than choose OK9.Press restore default button the press OKCreate your connection successfully

Open your save connection

1.Start2.All programs3.Accessories4.Communication5.Hyper terminal and select your connection

Setup mode

At first change router config registerRouter(config)#config-register 0x2142Router#copy run startAnd then reload router

------------- system configuration ----------

Would you like to enter the initial configuration dialog? [yes/no] yWould you like to enter basic management setup? [yes/no] nFirst, would you like to see the current interface summary? [yes] enterConfiguring global parameters:Enter host name [router] : IICT

42Navlesh Kumar Singh

Page 43: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Enter enable secret : iictEnter enable password : iict1Enter virtual terminal password : iictConfigure SNMP network management? [yes] noConfigure ip address : noPort permeation : yes or noAfter this configuration you can see router user IICT>

IICT#

User exec mode and Privileged mode

After the interface status messages appear and you press Enter,Router> prompt will appear. This is called user exec modeYou can only view and change the configuration of a Cisco router in privileged exec mode(privileged mode), which you can enter with the enable command.Here’s how:Router> enableRouter#? (we can show all commands of this mode)you can both view and change the router’s configuration. You can go backfrom privileged mode into user mode by using the disable command, as seen here:Router# disableRouter>? (we can show all commands of this mode )

At this point, you can type logout from either mode to exit the console:Router> logout

Router con0 is now availablePress RETURN to get started.

Overview of Router ModesYou can type config from the privileged-mode prompt and then just press Enter to take the default of terminal, as seen here:IICT#configConfiguring from terminal, memory, or network [terminal]? [press enter]Enter configuration commands, one per line. End with CNTL/Z.IICT(config)#? (we can show all commands of this mode)yourname(config)#exit or press cntl-zyourname#config ?At this point, you make changes that affect the router as a whole (globally), hence the term global configuration mode. To change the running-config—the current configuration running in dynamic RAM (DRAM)—you use the configure terminal command, as I just demonstrated.

43Navlesh Kumar Singh

Page 44: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

To change the startup-config—the configuration stored in NVRAM.

InterfacesTo make changes to an interface, you use the interface command from global configu- ration mode:IICT(config)#interface ?IICT(config)#interface fastEthernet 0/0IICT(config-if)#IICT(config)#interface ?IICT(config)#interface serial 0/0IICT(config-if)#Subinterfaces

Subinterfaces allow you to create logical interfaces within the router. The prompt then changes to IICT(config-subif)#:IICT(config-if)#interface f0/0.1IICT(config-subif)#

Line CommandsTo configure user-mode passwords, use the line command. The prompt then becomes yourname(config-line)#:yourname#config tEnter configuration commands, one per line. End with CNTL/Z.IICT(config)#line ?<0-0> First Line numberaux Auxiliary lineconsole Primary terminal linevty Virtual terminal

Console Password

(console password use to creat device console password any one can’t use without password)IICT(config)#line console 0IICT(config-line)#password iictIICT(config-line)#login

Auxiliary Password

(aux password use to creat modem password any one can’t use without password)IICT(config)#line auxiliary 0IICT(config-line)#password iictIICT(config-line)#login

Telnet Password

44Navlesh Kumar Singh

Page 45: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

(vty password use to creat telnet password any one can’t use without password)IICT(config)#line vty 0 4IICT(config-line)#password iictIICT(config-line)#login

Routing Protocol Configurations

To configure routing protocols such as RIP and EIGRP, you’ll use the prompt IICT(config-router#):IICT#config tEnter configuration commands, one per line. End with CNTL/Z.IICT(config)#router ripIICT(config-router)#version 2IICT(config-router)#

Set Router clock

IICT#clock ?read-calendar Read the hardware calendar into the clockset Set the time and dateupdate-calendar Update the hardware calendar from the clockIICT#clock set ?hh:mm:ss Current TimeIICT#clock set 11:15:11 ?<1-31> Day of the monthMONTH Month of the yearIICT#clock set 11:15:11 25 aug ?<1993-2035> YearIICT#clock set 11:15:11 25 aug 2007 ?<cr>IICT#clock set 11:15:11 25 aug 2007

(Clock rate command set from this command we can show clock and some other commands)IICT#show clockIICT#show s0/0IICT#show protocolsIICT#show interfaceIICT#show interface briefIICT#show sh controllersIICT#show running-configIICT#show startup-config

45Navlesh Kumar Singh

Page 46: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Command Meaning

Ctrl+A Moves your cursor to the beginning of the lineCtrl+E Moves your cursor to the end of the lineEsc+B Moves back one wordCtrl+B Moves back one characterCtrl+F Moves forward one characterEsc+F Moves forward one wordCtrl+D Deletes a single characterBackspace Deletes a single characterCtrl+R Redisplays a lineCtrl+U Erases a lineCtrl+W Erases a wordCtrl+Z Ends configuration mode and returns to EXECCtrl+P or up arrow Shows last command enteredCtrl+N or down arrow Shows previous commands enteredshow history Shows last 10 commands entered by defaultshow terminal Shows terminal configurations and history buffer sizeterminal history size Changes buffer size (max 256)

IICT#show version (to show router information)

Router and Switch Administrative Configurations

I’m going to lead you through configuring commands that will help you administer your network.The administrative functions that you can configure on a router and switch are as follows:HostnamesBannersPasswordsInterface descriptions

HostnamesYou can set the identity of the router with the hostname command.Here’s an example:Router#config tRouter(config)#hostname IICTIICT(config)#hostname SAIFISAIFI(config)#hostname ToddIICT(config)#

46Navlesh Kumar Singh

Page 47: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

BannersTodd(config)#Message of the day (MOTD) is the most extensively used banner. It gives a message to every person dialing into or connecting to the router via Telnet or an auxiliary port, or even through a console port as seen here:Todd(config)#banner motd ?LINE c banner-text c, where ‘c’ is a delimiting characterTodd(config)#banner motd #Enter TEXT message. End with the character ‘#’.$ Hello from mahboob from IICT $#IICT(config)#^ZIICT#Press RETURN to get started.IICT#exitRouter con0 is now available

$ Hello from mahboob from IICT $

IICT#

Enable Passwords

You set the enable passwords from global configuration mode like this:Password Sets the enable password on older, isn’t ever used if an enable secret is set. Assign the privileged level password.Secret encrypted password that overrides the enable password if it’s set.

IICT(config)#enable password IICTIICT(config)#enable secret IICT1

Encrypting Your PasswordsBecause only the enable secret password is encrypted by default, you’ll need to manually configure the user-mode and enable passwords for encryption.Here’s an example of how to do it:IICT#config tEnter configuration commands, one per line. End with CNTL/Z.IICT(config)#service password-encryptionIICT(config)#exitIICT#sh run

(To remove this service)

IICT#config t

47Navlesh Kumar Singh

Page 48: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

IICT(config)#no service password-encryptionIICT(config)#^ZIICT#

DescriptionsThe description command is a helpful one because you can, for instance, use it to keep track of circuit numbers.Here’s an example:IICT#config tIICT(config)#int s0/0IICT(config-if)#description IICT computerIICT(config-if)#int fa0/0IICT(config-if)#description Sales departmentIICT(config-if)#^ZIICT#Open interface serial and fast Ethernet

IICT#IICT#config tIICT(config)#int s0/0IICT(config-if)#no shutdown

IICT#IICT#config tIICT(config)#int fa0/0IICT(config-if)#no shutdown

Serial Interface commands for router interfaceInterface configuration is one of the most important router configurations because without interfaces, a router is pretty much a completely useless object.IICT(config)#int serial ?<0-9> Serial interface number Now it’s time to choose the interface you want to configure.Once you to choose serial port 5, for example:IICT(config)#int serial 5IICT(config)-if)#The 2522 router has one Ethernet 10BaseT port, and typinginterface ethernet 0

Configuring an IP Address on an InterfaceIICT(config)#int f0/1IICT(config-if)#ip address 172.16.10.2 255.255.255.0

To add a secondary IP address, just use the secondary parameter:IICT(config-if)#ip address 172.16.20.2 255.255.255.0

48Navlesh Kumar Singh

Page 49: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

IICT(config-if)#ip address 172.16.20.2 255.255.255.0 secondaryIICT(config-if)#^ZIICT(config-if)#do sh run

Serial Interface CommandsConfigure a serial interface, you need some key information like knowing that the interface will usually be attached to DTE/DCE type of device that provides clocking for the line to the router,You configure a DCE serial interface with the clock rate command:IICT#config tEnter configuration commands, one per line. End with CNTL/Z.IICT(config)#int s0/0IICt(config-if)#clock rate ?Speed (bits per second)12002400480096008000000<300-8000000> Choose clockrate from list aboveIICT(config-if)#clock rate 1000000The clock rate command is set in bits per second. Besides looking at the cable end to check for a label of DCE or DTE, you can see if a router’s serial interface has a DCE cable con- nected with the show controllers int command:IICT#sh controllers s0/0

Viewing, Saving, and Erasing Configurations

You can manually save the file from DRAM to NVRAM by using the copy running-config startup-config command (you can use the shortcut copy run start also):IICT#copy running-config startup-configDestination filename [startup-config]? [press enter]Building configuration...[OK]IICT#You can view the files by typingIICT#show running-configIICT#show startup-config

You can delete the startup-config file by using the erase startup-config command:IICT#erase startup-configErasing the nvram filesystem will remove all configuration files!Continue? [confirm][enter][OK]

49Navlesh Kumar Singh

Page 50: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Erase of nvram: completeIICT#reloadProceed with reload? [confirm ]System configuration has been modified.Save? [ yes/no]: n

The Internal Components of a Cisco Router

To configure and troubleshoot a Cisco internetwork, you need to know the major components of Cisco routers and understand what each one does. Cisco Router Component Description Bootstrap Stored in the microcode of the ROM, the bootstrap is used to bring a router up during initialization. It will boot the router and then load the IOS.

POST (power-on self-test) Stored in the microcode of the ROM, the POST is used to check the basic functionality of the router hardware and determines which interfaces are present.

ROM monitor Stored in the microcode of the ROM, the ROM monitor is usedfor manufacturing, testing, and troubleshooting.

RAM (random access memory) Used to hold packet buffers, ARP cache, routing tables, and also the software and data structures that allow the router to function.Running-config is stored in RAM, and most routers expand the IOS from flash into RAM upon boot.

NVRAM (Nonvolatile RAM) Used to hold the router and switch configuration. NVRAM is not erased when the router or switch is reloaded. Does not store an IOS. The configuration register is stored in NVRAM.

Configuration register Used to control how the router boots up. This value can be found as the last line of the show version command output and by default is set to 0x2102, which tells the router to load the IOS from flash memory as well as to load the configuration from NVRAM

Changing the Configuration Register

Router(config)#config-register 0x2101Router(config)#^Z

Router#sh version (to show router information)[output cut]

Recovering Passwords

50Navlesh Kumar Singh

Page 51: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Cisco ISR/2600 Series CommandsTo change the bit value on a Cisco ISR/2600 series router, you just enter the command at thePress control+break key when router reloadrommon 1> prompt:rommon 1 >confreg 0x2142You must reset or power cycle for new config to take effectrommon 2 >reset

Cisco 2500 Series CommandsTo change the configuration register on a 2500 series router, type oafter creating a break sequence on the router. This brings up a menu of configuration register option settings.To change the configuration register, enter the command>o/r>o/r 0x2142>i (to reload a router)The router will reload and ask if you want to use setup mode (because no startup-config is used). Answer no to entering setup mode, press Enter to go into user mode, and then type enable to go into privileged mode.Viewing and Changing the ConfigurationNow you’re past the point where you would need to enter the user-mode and privileged-mode passwords in a router. Copy the startup-config file to the running-config file:copy startup-config running-configOr use the shortcut:copy start runThe configuration is now running in random access memory (RAM) , and you’re in privileged mode, meaning that you can now view and change the configuration. But you can’t view the enable secretsetting for the password since it is encrypted. To change the password, do this:config tenable secret iictconfig-register 0x2102copy run start (to save changes on router )

Configuring IP Routing in Our Network

Our network is good to go—right? After all, it’s been correctly configured with IP addressing, administrative functions, and even clocking (automatically on the ISR routers). But how does a router send packets to remote networks when the only way it can send them is by looking at the routing table to find out how to get to the remote networks? Our configured network and what process of sending data

51Navlesh Kumar Singh

Page 52: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

with router . You’ll learn about the following types of routing in the following sections:Static routingDefault routing

Static Routing

Static routing occurs when you manually add routes in each router’s routing table. There are Pros and cons to static routing, but that’s true for all routing processes.Static routing has the following benefits: There is no overhead on the router CPU, which means you could possibly buy a cheaper Router than you would use if you were using dynamic routing. There is no bandwidth usage between routers, which means you could possibly save Money on WAN links. It adds security because the administrator can choose to allow routing access to certain networks only.

Static Routing and Default Routing

IICT_1

Router Con0 is now available

Press RETURN to get started!

Router>en

52Navlesh Kumar Singh

Page 53: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Router#conf tEnter configuration commands, one per line. End with CNTL/ZRouter(config)#hostname IICT_1IICT_1(config)#enable secret mahboobIICT_1(config)#interface serial0/0IICT_1(config-if)#ip address 192.168.0.1 255.255.255.0IICT_1(config-if)#no shut12:28:47 %LINK-3-UPDOWN: Interface Serial0/0, changed state to up12:28:47 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up

IICT_1(config-if)#clock rate 64000IICT_1(config-if)#interface fastethernet0/0IICT_1(config-if)#ip address 192.168.2.1 255.255.255.0IICT_1(config-if)#no shut12:30:12 %LINK-3-UPDOWN: Interface Fastethernet0/0, changed state to up12:30:12 %LINEPROTO-5-UPDOWN: Line protocol on Interface Fastethernet0/0, changed state to up

IICT_1(config-if)#ctrl+ZIICT_1#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.0.0/24 is directly connected, Serial0/0C 192.168.2.0/24 is directly connected, FastEthernet0/0IICT_1#

IICT_1>enPassword:IICT_1#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.0.0/24 is directly connected, Serial0/0

53Navlesh Kumar Singh

Page 54: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

C 192.168.2.0/24 is directly connected, FastEthernet0/0IICT_1#conf tEnter configuration commands, one per line. End with CNTL/ZIICT_1(config)#ip route 192.168.3.0 255.255.255.0 192.168.0.2IICT_1(config)#ip route 192.168.1.0 255.255.255.0 192.168.0.2IICT_1(config)#ip route 192.168.4.0 255.255.255.0 192.168.0.2IICT_1(config)#ctrl+ZIICT_1#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setS 192.168.1.0 [1/0] via 192.168.0.2C 192.168.0.0/24 is directly connected, Serial0/0S 192.168.4.0 [1/0] via 192.168.0.2C 192.168.2.0/24 is directly connected, FastEthernet0/0S 192.168.3.0 [1/0] via 192.168.0.2IICT_1#

IICT_2

Router Con0 is now available

Press RETURN to get started!

Router>enRouter#config tEnter configuration commands, one per line. End with CNTL/ZRouter(config)#hostname IICT_2IICT_2(config)#enable secret hasanIICT_2(config)#interface serial0/0IICT_2(config-if)#ip address 192.168.0.2 255.255.255.0IICT_2(config-if)#no shut12:35:25 %LINK-3-UPDOWN: Interface Serial0/0, changed state to up12:35:25 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up

IICT_2(config-if)#interface serial0/1IICT_2(config-if)#ip address 192.168.1.1 255.255.255.0IICT_2(config-if)#no shut

54Navlesh Kumar Singh

Page 55: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

12:37:53 %LINK-3-UPDOWN: Interface Serial0/1, changed state to up12:37:53 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/1, changed state to up

IICT_2(config-if)#clock rate 64000

IICT_2(config)#interface fastethernet0/0IICT_2(config-if)#ip address 192.168.3.1 255.255.255.0IICT_2(config-if)#no shut12:39:45 %LINK-3-UPDOWN: Interface Fastethernet0/0, changed state to up12:39:45 %LINEPROTO-5-UPDOWN: Line protocol on Interface Fastethernet0/0, changed state to up

IICT_2(config-if)#ctrl+ZIICT_2#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.3.0/24 is directly connected, FastEthernet0/0C 192.168.0.0/24 is directly connected, Serial0/0C 192.168.1.0/24 is directly connected, Serial0/1IICT_2#

IICT_2>enPassword:IICT_2#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.3.0/24 is directly connected, FastEthernet0/0C 192.168.0.0/24 is directly connected, Serial0/0C 192.168.1.0/24 is directly connected, Serial0/1IICT_2#conf tEnter configuration commands, one per line. End with CNTL/ZIICT_2(config)#ip route 192.168.2.0 255.255.255.0 192.168.0.1

55Navlesh Kumar Singh

Page 56: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

IICT_2(config)#ip route 192.168.4.0 255.255.255.0 192.168.1.2IICT_2(config)#ctrl+ZIICT_2#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.3.0/24 is directly connected, FastEthernet0/0S 192.168.4.0 [1/0] via 192.168.1.2C 192.168.0.0/24 is directly connected, Serial0/0C 192.168.1.0/24 is directly connected, Serial0/1S 192.168.2.0 [1/0] via 192.168.0.1IICT_2#

IICT_3

Router Con0 is now available

Press RETURN to get started!

Router>enRouter#conf tEnter configuration commands, one per line. End with CNTL/ZRouter(config)#hostname IICT_3IICT_3(config)#enable secret saifiIICT_3(config)#interface serial0/0IICT_3(config-if)#ip address 192.168.1.2 255.255.255.0IICT_3(config-if)#no shut12:42:36 %LINK-3-UPDOWN: Interface Serial0/0, changed state to up12:42:36 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up

IICT_3(config-if)#interface fastethernet0/0IICT_3(config-if)#ip address 192.168.4.1 255.255.255.0IICT_3(config-if)#no shut12:43:58 %LINK-3-UPDOWN: Interface Fastethernet0/0, changed state to up12:43:58 %LINEPROTO-5-UPDOWN: Line protocol on Interface Fastethernet0/0, changed state to up

56Navlesh Kumar Singh

Page 57: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

IICT_3(config-if)#ctrl+ZIICT_3#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.1.0/24 is directly connected, Serial0/0C 192.168.4.0/24 is directly connected, FastEthernet0/0IICT_3#IICT_3>enPassword:IICT_3#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.1.0/24 is directly connected, Serial0/0C 192.168.4.0/24 is directly connected, FastEthernet0/0IICT_3#conf tEnter configuration commands, one per line. End with CNTL/ZIICT_3(config)#ip route 192.168.3.0 255.255.255.0 192.168.1.1IICT_3(config)#ip route 192.168.0.0 255.255.255.0 192.168.1.1IICT_3(config)#ip route 192.168.2.0 255.255.255.0 192.168.1.1IICT_3(config)#ctrl+Z(default routing you can use this router without static routing only this router orFirst router only coz this routing use only first or last router only)IICT_3(config)#ip route 0.0.0.0 0.0.0.0 192.168.1.1IICT_3#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not set

57Navlesh Kumar Singh

Page 58: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

C 192.168.1.0/24 is directly connected, Serial0/0S 192.168.0.0 [1/0] via 192.168.1.1C 192.168.4.0/24 is directly connected, FastEthernet0/0S 192.168.3.0 [1/0] via 192.168.1.1S 192.168.2.0 [1/0] via 192.168.1.1

IICT_3#

Host_AIp address : 192.168.2.2Subnet mask : 255.255.255.0Default gateway : 192.168.2.1

Host_BIp address : 192.168.2.3Subnet mask : 255.255.255.0Default gateway : 192.168.2.1Host_CIp address : 192.168.3.2Subnet mask : 255.255.255.0Default gateway : 192.168.3.1Host_DIp address : 192.168.3.3Subnet mask : 255.255.255.0Default gateway : 192.168.3.1Host_EIp address : 192.168.4.2Subnet mask : 255.255.255.0Default gateway : 192.168.4.1Host_FIp address : 192.168.4.3Subnet mask : 255.255.255.0Default gateway : 192.168.4.1

Host_FC :/> ping 192.168.2.2 ping success

Routing Information Protocol (RIP)

Routing Information Protocol (RIP) is a true distance-vector routing protocol. RIP sends the complete routing table out to all active interfaces every 30 seconds. RIP only uses hop count to determine the best way to a remote network, but it has a maximum allowable hop count of 15 by default, meaning that 16 is deemed unreachable. RIP works well in small networks, but it’s inefficient on large

58Navlesh Kumar Singh

Page 59: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

networks with slow WAN links or on networks with a large number of routers installed.RIP version 1 uses only classful routing, which means that all devices in the network must use the same subnet mask. This is because RIP version 1 doesn’t send updates with subnet mask information in tow. RIP version 2 provides something called prefix routing and does send subnet mask information with the route updates. This is called classless routing.

RIPv1 vs. RIPv2

RIPv1 RIPv2

Distance vector Distance vectorMaximum hop count of 15 Maximum hop count of 15Classful ClasslessBroadcast based Uses multicast 224.0.0.9No support for VLSM Supports VLSM networksNo authentication Allows for MD5 authenticationNo support for discontiguous networks Supports discontiguous networks

Rip Routing with Telnet (RIPv1 & RIPv2)

59Navlesh Kumar Singh

Page 60: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

IICT_1

Router Con0 is now availablePress RETURN to get started!Router>enRouter#conf tEnter configuration commands, one per line. End with CNTL/ZRouter(config)#hostname IICT_1IICT_1(config)#enable secret mahboobIICT_1(config)#interface serial0/0IICT_1(config-if)#ip address 192.168.10.1 255.255.255.0IICT_1(config-if)#no shut12:28:47 %LINK-3-UPDOWN: Interface Serial0/0, changed state to up12:28:47 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up

IICT_1(config-if)#clock rate 64000IICT_1(config-if)#interface fastethernet0/0IICT_1(config-if)#ip address 192.168.30.1 255.255.255.0IICT_1(config-if)#no shut12:30:12 %LINK-3-UPDOWN: Interface Fastethernet0/0, changed state to up12:30:12 %LINEPROTO-5-UPDOWN: Line protocol on Interface Fastethernet0/0, changed state to up

IICT_1(config-if)#ctrl+ZIICT_1#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.10.0/24 is directly connected, Serial0/0C 192.168.30.0/24 is directly connected, FastEthernet0/0IICT_1#IICT_1#conf tEnter configuration commands, one per line. End with CNTL/ZIICT_1(config)#line vty 0 4IICT_1(config-line)#password iictIICT_1(config-line)#loginIICT_1(config-line)#ctrl+ZIICT_1#

60Navlesh Kumar Singh

Page 61: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

IICT_1#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.10.0/24 is directly connected, Serial0/0C 192.168.30.0/24 is directly connected, FastEthernet0/0IICT_1#conf tEnter configuration commands, one per line. End with CNTL/ZIICT_1(config)#router ripIICT_1(config-router)#network 192.168.10.0IICT_1(config-router)#network 192.168.30.0(IICT_1(config-router)#version 2)if you want do rip version 2 enter this commandIICT_1(config-router)#ctrl+ZIICT_1#sh ip route

IICT_2

Router Con0 is now available

Press RETURN to get started!

Router>enRouter#config tEnter configuration commands, one per line. End with CNTL/ZRouter(config)#hostname IICT_2IICT_2(config)#enable secret hasanIICT_2(config)#interface serial0/0IICT_2(config-if)#ip address 192.168.10.2 255.255.255.0IICT_2(config-if)#no shut12:35:25 %LINK-3-UPDOWN: Interface Serial0/0, changed state to up12:35:25 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up

IICT_2(config-if)#interface serial0/1IICT_2(config-if)#ip address 192.168.20.1 255.255.255.0IICT_2(config-if)#no shut

61Navlesh Kumar Singh

Page 62: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

12:37:53 %LINK-3-UPDOWN: Interface Serial0/1, changed state to up12:37:53 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/1, changed state to up

IICT_2(config-if)#clock rate 64000

IICT_2(config)#interface fastethernet0/0IICT_2(config-if)#ip address 192.168.40.1 255.255.255.0IICT_2(config-if)#no shut12:39:45 %LINK-3-UPDOWN: Interface Fastethernet0/0, changed state to up12:39:45 %LINEPROTO-5-UPDOWN: Line protocol on Interface Fastethernet0/0, changed state to up

IICT_2(config-if)#ctrl+ZIICT_2#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.40.0/24 is directly connected, FastEthernet0/0C 192.168.10.0/24 is directly connected, Serial0/0C 192.168.20.0/24 is directly connected, Serial0/1IICT_2#IICT_2#conf tEnter configuration commands, one per line. End with CNTL/ZIICT_2(config)#line vty 0 4IICT_2(config-line)#password iict1IICT_2(config-line)#loginIICT_2(config-line)#ctrl+ZIICT_2#

IICT_2#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.20.0/24 is directly connected, Serial0/1

62Navlesh Kumar Singh

Page 63: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

C 192.168.40.0/24 is directly connected, FastEthernet0/0C 192.168.10.0/24 is directly connected, Serial0/0IICT_2#conf tEnter configuration commands, one per line. End with CNTL/ZIICT_2(config)#router ripIICT_2(config-router)#network 192.168.20.0IICT_2(config-router)#network 192.168.40.0IICT_2(config-router)#network 192.168.10.0(IICT_2(config-router)#version 2)if you want do rip version 2 enter this commandIICT_2(config-router)#ctrl+ZIICT_2#sh ip route

IICT_3

Router Con0 is now available

Press RETURN to get started!

Router>enRouter#conf tEnter configuration commands, one per line. End with CNTL/ZRouter(config)#hostname IICT_3IICT_3(config)#enable secret saifiIICT_3(config)#interface serial0/0IICT_3(config-if)#ip address 192.168.20.2 255.255.255.0IICT_3(config-if)#no shut12:42:36 %LINK-3-UPDOWN: Interface Serial0/0, changed state to up12:42:36 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up

IICT_3(config-if)#interface fastethernet0/0

63Navlesh Kumar Singh

Page 64: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

IICT_3(config-if)#ip address 192.168.50.1 255.255.255.0IICT_3(config-if)#no shut12:43:58 %LINK-3-UPDOWN: Interface Fastethernet0/0, changed state to up12:43:58 %LINEPROTO-5-UPDOWN: Line protocol on Interface Fastethernet0/0, changed state to up

IICT_3(config-if)#ctrl+ZIICT_3#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.20.0/24 is directly connected, Serial0/0C 192.168.50.0/24 is directly connected, FastEthernet0/0IICT_3#IICT_3#conf tEnter configuration commands, one per line. End with CNTL/ZIICT_3(config)#line vty 0 4IICT_3(config-line)#password iict2IICT_3(config-line)#loginIICT_3(config-line)#ctrl+ZIICT_3#

IICT_3#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.20.0/24 is directly connected, Serial0/0C 192.168.50.0/24 is directly connected, FastEthernet0/0IICT_3#config tEnter configuration commands, one per line. End with CNTL/ZIICT_3(config)#router ripIICT_3(config-router)#network 192.168.20.0IICT_3(config-router)#network 192.168.50.0(IICT_3(config-router)#version 2)if you want do rip version 2 enter this command

64Navlesh Kumar Singh

Page 65: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

IICT_3(config-router)#ctrl+ZIICT_3#sh ip route

Host_AIp address : 192.168.30.2Subnet mask : 255.255.255.0Default gateway : 192.168.30.1

Host_BIp address : 192.168.30.3Subnet mask : 255.255.255.0Default gateway : 192.168.30.1Host_CIp address : 192.168.40.2Subnet mask : 255.255.255.0Default gateway : 192.168.40.1Host_DIp address : 192.168.40.3Subnet mask : 255.255.255.0Default gateway : 192.168.40.1Host_EIp address : 192.168.50.2Subnet mask : 255.255.255.0Default gateway : 192.168.50.1

Interior Gateway Routing Protocol (IGRP)

Interior Gateway Routing Protocol (IGRP) is a Cisco-proprietary distance-vector routing protocol. This means that to use IGRP in your network, all your routers must be Cisco routers. Cisco created this routing protocol to overcome the problems associated with RIP.IGRP has a maximum hop count of 255 with the default being 100 (same as EIGRP). This is helpful in larger networks and solves the problem of 15 hops being the maximum possible in a RIP network.

IGRP vs. RIP

IGRP RIP

Can be used in large internetworks Works best in smaller networks

65Navlesh Kumar Singh

Page 66: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Uses an autonomous system number for Does not use autonomous system numbersactivation

Gives a full route table update every Gives a full route table update every 30 seconds90 seconds

Has an administrative distance of 100 Has an administrative distance of 120

IGRP (Interior Gateway Routing Protocol)

IICT_1Router Con0 is now availablePress RETURN to get started!Router>enRouter#conf tEnter configuration commands, one per line. End with CNTL/Z

66Navlesh Kumar Singh

Page 67: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Router(config)#hostname IICT_1IICT_1(config)#enable secret mahboobIICT_1(config)#interface serial0/0IICT_1(config-if)#ip address 192.168.10.1 255.255.255.0IICT_1(config-if)#no shut12:28:47 %LINK-3-UPDOWN: Interface Serial0/0, changed state to up12:28:47 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up

IICT_1(config-if)#clock rate 64000IICT_1(config-if)#interface fastethernet0/0IICT_1(config-if)#ip address 192.168.30.1 255.255.255.0IICT_1(config-if)#no shut12:30:12 %LINK-3-UPDOWN: Interface Fastethernet0/0, changed state to up12:30:12 %LINEPROTO-5-UPDOWN: Line protocol on Interface Fastethernet0/0, changed state to up

IICT_1(config-if)#ctrl+ZIICT_1#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.10.0/24 is directly connected, Serial0/0C 192.168.30.0/24 is directly connected, FastEthernet0/0IICT_1#IICT_1#conf tEnter configuration commands, one per line. End with CNTL/ZIICT_1(config)#line vty 0 4IICT_1(config-line)#password iictIICT_1(config-line)#loginIICT_1(config-line)#ctrl+ZIICT_1#

IICT_1#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

67Navlesh Kumar Singh

Page 68: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Gateway of last resort is not setC 192.168.10.0/24 is directly connected, Serial0/0C 192.168.30.0/24 is directly connected, FastEthernet0/0IICT_1#conf tEnter configuration commands, one per line. End with CNTL/ZIICT_1(config)#router igrp 10IICT_1(config-router)#network 192.168.10.0IICT_1(config-router)#network 192.168.30.0IICT_1(config-router)#ctrl+ZIICT_1#sh ip route

IICT_2

Router Con0 is now available

Press RETURN to get started!

Router>enRouter#config tEnter configuration commands, one per line. End with CNTL/ZRouter(config)#hostname IICT_2IICT_2(config)#enable secret hasanIICT_2(config)#interface serial0/0IICT_2(config-if)#ip address 192.168.10.2 255.255.255.0IICT_2(config-if)#no shut12:35:25 %LINK-3-UPDOWN: Interface Serial0/0, changed state to up12:35:25 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up

IICT_2(config-if)#interface serial0/1IICT_2(config-if)#ip address 192.168.20.1 255.255.255.0IICT_2(config-if)#no shut12:37:53 %LINK-3-UPDOWN: Interface Serial0/1, changed state to up12:37:53 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/1, changed state to up

IICT_2(config-if)#clock rate 64000

IICT_2(config)#interface fastethernet0/0IICT_2(config-if)#ip address 192.168.40.1 255.255.255.0IICT_2(config-if)#no shut12:39:45 %LINK-3-UPDOWN: Interface Fastethernet0/0, changed state to up

68Navlesh Kumar Singh

Page 69: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

12:39:45 %LINEPROTO-5-UPDOWN: Line protocol on Interface Fastethernet0/0, changed state to up

IICT_2(config-if)#ctrl+ZIICT_2#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.40.0/24 is directly connected, FastEthernet0/0C 192.168.10.0/24 is directly connected, Serial0/0C 192.168.20.0/24 is directly connected, Serial0/1IICT_2#IICT_2#conf tEnter configuration commands, one per line. End with CNTL/ZIICT_2(config)#line vty 0 4IICT_2(config-line)#password iict1IICT_2(config-line)#loginIICT_2(config-line)#ctrl+ZIICT_2#

IICT_2#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.20.0/24 is directly connected, Serial0/1C 192.168.40.0/24 is directly connected, FastEthernet0/0C 192.168.10.0/24 is directly connected, Serial0/0IICT_2#conf tEnter configuration commands, one per line. End with CNTL/ZIICT_2(config)#router igrp 10IICT_2(config-router)#network 192.168.20.0IICT_2(config-router)#network 192.168.40.0IICT_2(config-router)#network 192.168.10.0IICT_2(config-router)#ctrl+ZIICT_2#sh ip route

69Navlesh Kumar Singh

Page 70: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

IICT_3

Router Con0 is now available

Press RETURN to get started!

Router>enRouter#conf tEnter configuration commands, one per line. End with CNTL/ZRouter(config)#hostname IICT_3IICT_3(config)#enable secret saifiIICT_3(config)#interface serial0/0IICT_3(config-if)#ip address 192.168.20.2 255.255.255.0IICT_3(config-if)#no shut12:42:36 %LINK-3-UPDOWN: Interface Serial0/0, changed state to up12:42:36 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up

IICT_3(config-if)#interface fastethernet0/0IICT_3(config-if)#ip address 192.168.50.1 255.255.255.0IICT_3(config-if)#no shut12:43:58 %LINK-3-UPDOWN: Interface Fastethernet0/0, changed state to up12:43:58 %LINEPROTO-5-UPDOWN: Line protocol on Interface Fastethernet0/0, changed state to up

IICT_3(config-if)#ctrl+ZIICT_3#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.20.0/24 is directly connected, Serial0/0C 192.168.50.0/24 is directly connected, FastEthernet0/0IICT_3#IICT_3#conf tEnter configuration commands, one per line. End with CNTL/ZIICT_3(config)#line vty 0 4IICT_3(config-line)#password iict2IICT_3(config-line)#login

70Navlesh Kumar Singh

Page 71: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

IICT_3(config-line)#ctrl+ZIICT_3#

IICT_3#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.20.0/24 is directly connected, Serial0/0C 192.168.50.0/24 is directly connected, FastEthernet0/0IICT_3#config tEnter configuration commands, one per line. End with CNTL/ZIICT_3(config)#router igrp 10IICT_3(config-router)#network 192.168.20.0IICT_3(config-router)#network 192.168.50.0IICT_3(config-router)#ctrl+ZIICT_3#sh ip route

Host_AIp address : 192.168.30.2Subnet mask : 255.255.255.0Default gateway : 192.168.30.1

Host_BIp address : 192.168.30.3Subnet mask : 255.255.255.0Default gateway : 192.168.30.1Host_CIp address : 192.168.40.2Subnet mask : 255.255.255.0Default gateway : 192.168.40.1Host_DIp address : 192.168.40.3Subnet mask : 255.255.255.0Default gateway : 192.168.40.1Host_EIp address : 192.168.50.2Subnet mask : 255.255.255.0Default gateway : 192.168.50.1Host_FIp address : 192.168.50.3

71Navlesh Kumar Singh

Page 72: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Subnet mask : 255.255.255.0Default gateway : 192.168.50.1

Host_FC :\> ping 192.168.30.2 ping successC:\>telnet 192.168.10.1Connecting To 192.168.10.1 ...

User Access Verification

Password:

IICT_1>enPassword:IICT_1#config tEnter configuration commands, one per line. End with CNTL/ZIICT_1(config)#

EIGRP Features and Operation

Enhanced IGRP (EIGRP) is a classless, enhanced distance-vector protocol that gives us a real edge over another Cisco proprietary protocol, Interior Gateway Routing Protocol (IGRP). But unlike IGRP, EIGRP includes the subnet mask in its route updates. And as you now know, the advertisement of subnet information allows us to use Variable Length Subnet Masks (VLSMs) and summarization when designing our networks! EIGRP is sometimes referred to as a hybrid routing protocol because it has characteristics ofboth distance-vector and link-state protocols.For example, EIGRP has link-state characteristics as well—it synchronizes routing tables between neighbors at startup and then sends specific updates only when topology changes occur. This makes EIGRP suitable for very large networks. EIGRP has a maximum hop count of 255 (the default is set to 100).

EIGRP features

Support for IP and IPv6 (and some other useless routed protocols) via protocol dependent modulesConsidered classless (same as RIPv2 and OSPF)Support for VLSMSupport for CIDR valueSupport for summaries and discontiguous networksEfficient neighbor discovery

72Navlesh Kumar Singh

Page 73: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

EIGRP (enhanced Interior Gateway Routing Protocol)

IICT_1

Router Con0 is now available

Press RETURN to get started!

Router>enRouter#conf tEnter configuration commands, one per line. End with CNTL/ZRouter(config)#hostname IICT_1IICT_1(config)#enable secret mahboobIICT_1(config)#interface serial0/0IICT_1(config-if)#ip address 192.168.10.1 255.255.255.0IICT_1(config-if)#no shut12:28:47 %LINK-3-UPDOWN: Interface Serial0/0, changed state to up12:28:47 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up

IICT_1(config-if)#clock rate 64000IICT_1(config-if)#interface fastethernet0/0IICT_1(config-if)#ip address 192.168.30.1 255.255.255.0IICT_1(config-if)#no shut

73Navlesh Kumar Singh

Page 74: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

12:30:12 %LINK-3-UPDOWN: Interface Fastethernet0/0, changed state to up12:30:12 %LINEPROTO-5-UPDOWN: Line protocol on Interface Fastethernet0/0, changed state to up

IICT_1(config-if)#ctrl+ZIICT_1#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.10.0/24 is directly connected, Serial0/0C 192.168.30.0/24 is directly connected, FastEthernet0/0IICT_1#IICT_1#conf tEnter configuration commands, one per line. End with CNTL/ZIICT_1(config)#line vty 0 4IICT_1(config-line)#password iictIICT_1(config-line)#loginIICT_1(config-line)#ctrl+ZIICT_1#

IICT_1#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.10.0/24 is directly connected, Serial0/0C 192.168.30.0/24 is directly connected, FastEthernet0/0IICT_1#conf tEnter configuration commands, one per line. End with CNTL/ZIICT_1(config)#router eigrp 100IICT_1(config-router)#network 192.168.10.0IICT_1(config-router)#network 192.168.30.0IICT_1(config-router)#ctrl+ZIICT_1#sh ip route

IICT_2

74Navlesh Kumar Singh

Page 75: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Router Con0 is now available

Press RETURN to get started!

Router>enRouter#config tEnter configuration commands, one per line. End with CNTL/ZRouter(config)#hostname IICT_2IICT_2(config)#enable secret hasanIICT_2(config)#interface serial0/0IICT_2(config-if)#ip address 192.168.10.2 255.255.255.0IICT_2(config-if)#no shut12:35:25 %LINK-3-UPDOWN: Interface Serial0/0, changed state to up12:35:25 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up

IICT_2(config-if)#interface serial0/1IICT_2(config-if)#ip address 192.168.20.1 255.255.255.0IICT_2(config-if)#no shut12:37:53 %LINK-3-UPDOWN: Interface Serial0/1, changed state to up12:37:53 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/1, changed state to up

IICT_2(config-if)#clock rate 64000

IICT_2(config)#interface fastethernet0/0IICT_2(config-if)#ip address 192.168.40.1 255.255.255.0IICT_2(config-if)#no shut12:39:45 %LINK-3-UPDOWN: Interface Fastethernet0/0, changed state to up12:39:45 %LINEPROTO-5-UPDOWN: Line protocol on Interface Fastethernet0/0, changed state to up

IICT_2(config-if)#ctrl+ZIICT_2#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.40.0/24 is directly connected, FastEthernet0/0C 192.168.10.0/24 is directly connected, Serial0/0

75Navlesh Kumar Singh

Page 76: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

C 192.168.20.0/24 is directly connected, Serial0/1IICT_2#IICT_2#conf tEnter configuration commands, one per line. End with CNTL/ZIICT_2(config)#line vty 0 4IICT_2(config-line)#password iict1IICT_2(config-line)#loginIICT_2(config-line)#ctrl+ZIICT_2#

IICT_2#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.20.0/24 is directly connected, Serial0/1C 192.168.40.0/24 is directly connected, FastEthernet0/0C 192.168.10.0/24 is directly connected, Serial0/0IICT_2#conf tEnter configuration commands, one per line. End with CNTL/ZIICT_2(config)#router eigrp 100IICT_2(config-router)#network 192.168.20.0IICT_2(config-router)#network 192.168.40.0IICT_2(config-router)#network 192.168.10.0IICT_2(config-router)#ctrl+ZIICT_2#sh ip route

IICT_3

Router Con0 is now available

Press RETURN to get started!

Router>enRouter#conf tEnter configuration commands, one per line. End with CNTL/ZRouter(config)#hostname IICT_3IICT_3(config)#enable secret saifiIICT_3(config)#interface serial0/0IICT_3(config-if)#ip address 192.168.20.2 255.255.255.0

76Navlesh Kumar Singh

Page 77: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

IICT_3(config-if)#no shut12:42:36 %LINK-3-UPDOWN: Interface Serial0/0, changed state to up12:42:36 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up

IICT_3(config-if)#interface fastethernet0/0IICT_3(config-if)#ip address 192.168.50.1 255.255.255.0IICT_3(config-if)#no shut12:43:58 %LINK-3-UPDOWN: Interface Fastethernet0/0, changed state to up12:43:58 %LINEPROTO-5-UPDOWN: Line protocol on Interface Fastethernet0/0, changed state to up

IICT_3(config-if)#ctrl+ZIICT_3#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.20.0/24 is directly connected, Serial0/0C 192.168.50.0/24 is directly connected, FastEthernet0/0IICT_3#IICT_3#conf tEnter configuration commands, one per line. End with CNTL/ZIICT_3(config)#line vty 0 4IICT_3(config-line)#password iict2IICT_3(config-line)#loginIICT_3(config-line)#ctrl+ZIICT_3#

IICT_3#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.20.0/24 is directly connected, Serial0/0C 192.168.50.0/24 is directly connected, FastEthernet0/0IICT_3#config t

77Navlesh Kumar Singh

Page 78: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Enter configuration commands, one per line. End with CNTL/ZIICT_3(config)#router eigrp 100IICT_3(config-router)#network 192.168.20.0IICT_3(config-router)#network 192.168.50.0IICT_3(config-router)#ctrl+ZIICT_3#sh ip route

Host_AIp address : 192.168.30.2Subnet mask : 255.255.255.0Default gateway : 192.168.30.1

Host_BIp address : 192.168.30.3Subnet mask : 255.255.255.0Default gateway : 192.168.30.1Host_CIp address : 192.168.40.2Subnet mask : 255.255.255.0Default gateway : 192.168.40.1Host_DIp address : 192.168.40.3Subnet mask : 255.255.255.0Default gateway : 192.168.40.1Host_EIp address : 192.168.50.2Subnet mask : 255.255.255.0Default gateway : 192.168.50.1Host_FIp address : 192.168.50.3Subnet mask : 255.255.255.0Default gateway : 192.168.50.1

Host_FC :\> ping 192.168.30.2 ping successC:\>telnet 192.168.10.1Connecting To 192.168.10.1 ...

User Access Verification

Password:

IICT_1>enPassword:IICT_1#config t

78Navlesh Kumar Singh

Page 79: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Enter configuration commands, one per line. End with CNTL/ZIICT_1(config)#

Open Shortest Path First (OSPF) Basics

Open Shortest Path First (OSPF) is an open standard routing protocol that’s been imple- mented by a wide variety of network vendors, including Cisco. If you have multiple routers and not all of them are Cisco (what!), then you can’t use EIGRP, can you? So your remaining CCNA objective options are basically RIP, RIPv2, and OSPF. If it’s a large network, then, really, your only options are OSPF .OSPF converges quickly, although perhaps not as quickly as EIGRP, and it supports multiple, equal-cost routes to the same destination. Like EIGRP, it does support both IP and IPv6 routed protocols.OSPF provides the following features:Consists of areas and autonomous systems .Minimizes routing update trafficSupports VLSM/CIDR Has unlimited hop countAllows multi-vendor deployment (open standard) OSPF is the first link-state routing protocol that most people are introduced to, so it’s useful to see how it compares to more traditional distance-vector protocols such as RIPv2 and RIPv1.

OSPF and RIP comparison

Characteristic OSPF RIPv2RIPv1

Type of protocol Link state Distance vecterDistance vector

Classless support Yes Yes No

VLSM support Yes Yes No

Auto-summarization No YesYes

Manual summarization Yes No No

Discontiguous support Yes Yes No

Route propagation Multicast on change Periodic multicastPeriodic broadcast

Path metric Bandwidth HopsHops

79Navlesh Kumar Singh

Page 80: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Hop count limit None 15 15

Convergence Fast SlowSlow

Peer authentication Yes Yes No

Hierarchical network Yes(using areas) No(flat only)No(flat only)

80Navlesh Kumar Singh

R1

R2

Page 81: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

OSPF(Open Shortest Pathe First)

IICT_1

Router Con0 is now available

Press RETURN to get started!

Router>enRouter#conf tEnter configuration commands, one per line. End with CNTL/ZRouter(config)#hostname IICT_1IICT_1(config)#enable secret mahboobIICT_1(config)#interface serial0/0IICT_1(config-if)#ip address 192.168.10.1 255.255.255.0IICT_1(config-if)#no shut12:28:47 %LINK-3-UPDOWN: Interface Serial0/0, changed state to up12:28:47 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up

IICT_1(config-if)#clock rate 64000IICT_1(config-if)#interface fastethernet0/0IICT_1(config-if)#ip address 192.168.30.1 255.255.255.0

81Navlesh Kumar Singh

Page 82: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

IICT_1(config-if)#no shut12:30:12 %LINK-3-UPDOWN: Interface Fastethernet0/0, changed state to up12:30:12 %LINEPROTO-5-UPDOWN: Line protocol on Interface Fastethernet0/0, changed state to up

IICT_1(config-if)#ctrl+ZIICT_1#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.10.0/24 is directly connected, Serial0/0C 192.168.30.0/24 is directly connected, FastEthernet0/0IICT_1#IICT_1#conf tEnter configuration commands, one per line. End with CNTL/ZIICT_1(config)#line vty 0 4IICT_1(config-line)#password iictIICT_1(config-line)#loginIICT_1(config-line)#ctrl+ZIICT_1#

IICT_1#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.10.0/24 is directly connected, Serial0/0C 192.168.30.0/24 is directly connected, FastEthernet0/0IICT_1#conf tEnter configuration commands, one per line. End with CNTL/ZIICT_1(config)#router ospf 1IICT_1(config-router)#network 192.168.10.0 0.0.0.255 area 0IICT_1(config-router)#network 192.168.30.0 0.0.0.255 area 0IICT_1(config-router)#ctrl+ZIICT_1#sh ip route

82Navlesh Kumar Singh

Page 83: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

IICT_2

Router Con0 is now available

Press RETURN to get started!

Router>enRouter#config tEnter configuration commands, one per line. End with CNTL/ZRouter(config)#hostname IICT_2IICT_2(config)#enable secret hasanIICT_2(config)#interface serial0/0IICT_2(config-if)#ip address 192.168.10.2 255.255.255.0IICT_2(config-if)#no shut12:35:25 %LINK-3-UPDOWN: Interface Serial0/0, changed state to up12:35:25 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up

IICT_2(config-if)#interface serial0/1IICT_2(config-if)#ip address 192.168.20.1 255.255.255.0IICT_2(config-if)#no shut12:37:53 %LINK-3-UPDOWN: Interface Serial0/1, changed state to up12:37:53 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/1, changed state to up

IICT_2(config-if)#clock rate 64000

IICT_2(config)#interface fastethernet0/0IICT_2(config-if)#ip address 192.168.40.1 255.255.255.0IICT_2(config-if)#no shut12:39:45 %LINK-3-UPDOWN: Interface Fastethernet0/0, changed state to up12:39:45 %LINEPROTO-5-UPDOWN: Line protocol on Interface Fastethernet0/0, changed state to up

IICT_2(config-if)#ctrl+ZIICT_2#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

83Navlesh Kumar Singh

Page 84: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Gateway of last resort is not setC 192.168.40.0/24 is directly connected, FastEthernet0/0C 192.168.10.0/24 is directly connected, Serial0/0C 192.168.20.0/24 is directly connected, Serial0/1IICT_2#IICT_2#conf tEnter configuration commands, one per line. End with CNTL/ZIICT_2(config)#line vty 0 4IICT_2(config-line)#password iict1IICT_2(config-line)#loginIICT_2(config-line)#ctrl+ZIICT_2#

IICT_2#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.20.0/24 is directly connected, Serial0/1C 192.168.40.0/24 is directly connected, FastEthernet0/0C 192.168.10.0/24 is directly connected, Serial0/0IICT_2#conf tEnter configuration commands, one per line. End with CNTL/ZIICT_2(config)#router ospf 2IICT_2(config-router)#network 192.168.20.0 0.0.0.255 area 0IICT_2(config-router)#network 192.168.40.0 0.0.0.255 area 0IICT_2(config-router)#network 192.168.10.0 0.0.0.255 area 0IICT_2(config-router)#ctrl+ZIICT_2#sh ip route

IICT_3Router Con0 is now availablePress RETURN to get started!Router>enRouter#conf tEnter configuration commands, one per line. End with CNTL/ZRouter(config)#hostname IICT_3IICT_3(config)#enable secret saifiIICT_3(config)#interface serial0/0

84Navlesh Kumar Singh

Page 85: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

IICT_3(config-if)#ip address 192.168.20.2 255.255.255.0IICT_3(config-if)#no shut12:42:36 %LINK-3-UPDOWN: Interface Serial0/0, changed state to up12:42:36 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up

IICT_3(config-if)#interface fastethernet0/0IICT_3(config-if)#ip address 192.168.50.1 255.255.255.0IICT_3(config-if)#no shut12:43:58 %LINK-3-UPDOWN: Interface Fastethernet0/0, changed state to up12:43:58 %LINEPROTO-5-UPDOWN: Line protocol on Interface Fastethernet0/0, changed state to up

IICT_3(config-if)#ctrl+ZIICT_3#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered route

Gateway of last resort is not setC 192.168.20.0/24 is directly connected, Serial0/0C 192.168.50.0/24 is directly connected, FastEthernet0/0IICT_3#IICT_3#conf tEnter configuration commands, one per line. End with CNTL/ZIICT_3(config)#line vty 0 4IICT_3(config-line)#password iict2IICT_3(config-line)#loginIICT_3(config-line)#ctrl+ZIICT_3#

IICT_3#sh ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate defaultU - per-user static route, o - ODR, P - periodic downloaded static routeT - traffic engineered routeGateway of last resort is not setC 192.168.20.0/24 is directly connected, Serial0/0C 192.168.50.0/24 is directly connected, FastEthernet0/0IICT_3#config t

85Navlesh Kumar Singh

Page 86: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Enter configuration commands, one per line. End with CNTL/ZIICT_3(config)#router ospf 3IICT_3(config-router)#network 192.168.20.0 0.0.0.255 area 0IICT_3(config-router)#network 192.168.50.0 0.0.0.255 area 0IICT_3(config-router)#ctrl+ZIICT_3#sh ip routHost_AIp address : 192.168.30.2Subnet mask : 255.255.255.0Default gateway : 192.168.30.1

Host_BIp address : 192.168.30.3Subnet mask : 255.255.255.0Default gateway : 192.168.30.1Host_CIp address : 192.168.40.2Subnet mask : 255.255.255.0Default gateway : 192.168.40.1Host_DIp address : 192.168.40.3Subnet mask : 255.255.255.0Default gateway : 192.168.40.1Host_EIp address : 192.168.50.2Subnet mask : 255.255.255.0Default gateway : 192.168.50.1Host_FIp address : 192.168.50.3Subnet mask : 255.255.255.0Default gateway : 192.168.50.1

Host_FC :\> ping 192.168.30.2 ping successC:\>telnet 192.168.10.1Connecting To 192.168.10.1 ...

User Access Verification

Password:

IICT_1>enPassword:IICT_1#config tEnter configuration commands, one per line. End with CNTL/Z

86Navlesh Kumar Singh

Page 87: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

IICT_1(config)#

Layer 2 Switching

Three Switch Functions at Layer 2

There are three distinct functions of layer 2 switching (you need to remember these!): address learning, forward/filter decisions, and loop avoidance.Address learning Layer 2 switches and bridges remember the source hardware address ofeach frame received on an interface, and they enter this information into a MAC databasecalled a forward/filter table.Forward/filter decisions When a frame is received on an interface, the switch looks at thedestination hardware address and finds the exit interface in the MAC database. The frame is only forwarded out the specified destination port.

Bridging vs. LAN Switching

Layer 2 switches really are pretty much just bridges that give us a lot more ports, but there are some important differences you should always keep in mind: Bridges are software based, while switches are hardware based because they use ASIC chips to help make filtering decisions. A switch can be viewed as a multiport bridge. There can be only one spanning-tree instance per bridge, while switches can have many. (I’m going to tell you all about spanning trees in a bit.) Switches have a higher number of ports than most bridges. Both bridges and switches forward layer 2 broadcasts. Bridges and switches learn MAC addresses by examining the source address of each frame received. Both bridges and switches make forwarding decisions based on layer 2 addresses.

Switch configurationSwitch>enSwitch#config tEnter configuration commands, one per line. End with CNTL/Z.Switch(config)#hostname IICT_SIICT_S (config)#enable secret saifiIICT_S (config)#int f0/1IICT_S (config-if)#description 1st Connection to Core SwitchIICT_S (config-if)#int f0/2

87Navlesh Kumar Singh

Page 88: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

IICT_S (config-if)#description 2nd Connection to Core SwitchIICT_S (config-if)#int f0/3IICT_S (config-if)#description Connection to HostAIICT_S (config-if)#int f0/4IICT_S (config-if)#description Connection to PhoneAIICT_S (config-if)#int f0/8IICT_S (config-if)#description Connection to IVRIICT_S (config-if)#line console 0IICT_S (config-line)#password consoleIICT_S (config-line)#loginIICT_S (config-line)#exitIICT_S (config)#line vty 0 ?<1-15> Last Line number<cr>IICT_S (config)#line vty 0 15IICT_S (config-line)#password telnetIICT_S (config-line)#loginIICT_S (config-line)#int vlan 1IICT_S (config-if)#ip address 192.168.10.17 255.255.255.240IICT_S (config-if)#no shutIICT_S (config-if)#exitIICT_S (config)#banner motd # This is the S1 switch #IICT_S (config)#exitIICT_S #copy run startDestination filename [startup-config]? [enter]Building configuration...[OK]

Data Terminal Equipment and Data Communication Equipment

By default, router interfaces are data terminal equipment (DTE), and they connect into data communication equipment (DCE) like a channel service unit/data service unit (CSU/DSU). The CSU/DSU then plugs into a demarcation location (demarc) and is the service provider’s last responsibility. Most of the time, the demarc is a jack that has an RJ-45 (8-pin modular) female connector located in a telecommunications closet. Actually, you may already have heard of demarcs. If you’ve ever had the glorious experi- ence of reporting a problem to your service provider, they’ll usually tell you everything tests out fine up to the demarc, so the problem must be the CPE, or customer premises equipment. In other words, it’s your problem not theirs.

High-Level Data-Link Control(HDLC) Protocol

The High-Level Data-Link Control (HDLC) protocol is a popular ISO-standard, bit-oriented, Data Link layer protocol. It specifies an encapsulation method for

88Navlesh Kumar Singh

Page 89: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

data on synchronous serial data links using frame characters and checksums. HDLC is a point-to-point protocol used on leased lines. No authentication can be used with HDLC. In byte-oriented protocols, control information is encoded using entire bytes. On the other hand, bit-oriented protocols use single bits to represent the control information. Some common bit-oriented protocols include SDLC, LLC, HDLC, TCP, and IP.

Configuring and Monitoring HDLCRouterA#config tRouterA(config)#hostname RouterARouterA#config tRouterA(config)#int s0RouterA(config-if)#encapsulation hdlc

Point-to-Point Protocol (PPP)

Let’s spend a little time on Point-to-Point Protocol (PPP). Remember that it’s a Data Link layer protocol that can be used over either asynchronous serial (dial-up) or synchronous serial (ISDN) media. It uses Link Control Protocol (LCP) to build and maintain data-link connections. Network Control Protocol (NCP) is used to allow multiple Network layer protocols (routed protocols) to be used on a point-to-point connection. Since HDLC is the default serial encapsulation on Cisco serial links and it works great, why and when would you choose to use PPP? Well, the basic purpose of PPP is to transport layer 3 packets across a Data Link layer point-to-point link, and it’s nonproprietary.

Configuring PPP Encapsulation and AuthenticationRouterA#config tRouterA(config)#hostname RouterARouterA#Config tRouterA(config)#int s0/0RouterA(config-if)#Encap ppp

89Navlesh Kumar Singh

Page 90: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Knowledge of OSI Reference Model

Identify and describe the functions of each of the seven layers of the OSI refer-ence model.

Open Systems Interconnection (OSI)

OSI consists of two environments; the OSI environment, which is made up of seven layers of OSI protocols and the local system environment, which is the end computer system. The reason for dividing the environment in this way was to avoid interfering with the innovation of the design and implementation of computer systems. OSI facilitates a vehicle to communicate between dissimilar or similar computer based systems. The local computer system environment has a closed operating system and performs its designed functions within these bounds. All application processes that do not require communicating with other systems to complete its tasks, will provide, the end result with out any problems. However when an application process needs to communicate with another application process located in a remote system, both systems must become open to the OSI environment Many operations and concepts are involved in this process. There is interaction between peer entities within a layer and interaction between layers.

Important concepts to understand OSI Layering are:

Each layer performs unique and specific task A layer only has knowledge of its immediately adjacent layers A layer uses services of the layer below A layer performs functions and provides services to the layer above A layer service is independent of the implementation.

The Application layer is unique among the seven layers in that, it has no layer above. The application consists of ‘Service Elements’ that are incorporated within the application process when it needs to become a part of the OSI environment.

90Navlesh Kumar Singh

Page 91: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

CONCEPT OF A LAYER

Each layer contains a logical groupings of functions that provide specific services for facilitating a communication. A function, or a group of functions, making up a functional unit is a logical entity that accepts one or more inputs (arguments) and produces a single output (value) determined by the nature of the function. Functions can be grouped in a collective unit, which is then defined as (N) layer having (N+1) layer an upper layer boundary and (N-1) layer as a lower boundary. The N layer receives services from N-1 layer and provides services to N+1 layer.

SEVEN LAYERS OF THE OSI MODEL AND THEIR FUNCTIONS

Layer 7 is the APPLICATION layer: provides services directly to applica-tions. Responsible for identifying and establishing the availability of the in-tended partner, and required resources. It is also responsible for determining if there exist sufficient communication resources to reach the remote partner.

Layer 6 is the PRESENTATION layer: Data encryption, decryption, compres-sion and decompression are functions of this layer. It does this by using Ab-stract Syntax Notation 1 (ASN.1) ASN.1 standardization allows differing computer architectures to exchange data that are from differing computer ar-chitectures.

Layer 5 is the SESSION layer: facilitates a dialog between communicating systems and controls the dialog. Offers three different dialogs, simplex, half-duplex and full duplex. Session is set up by connection establishment, data transfer and connection release.

Layer 4 is the TRANSPORT layer: Segments data and also reassembles data from upper layers. Delivers data in a connection and connection less modes. Includes simplex (one way) half duplex (both ways one at a time) full duplex (both ways simultaneously). Also flow control and error recovery.

91Navlesh Kumar Singh

Page 92: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Layer 3 is the NETWORK layer: Establishes a connection between two nodes

by physical and logical addressing. Includes routing and relaying data through internetworks. This layer’s primary function is to deliver packets from the source network to the destination network.

Layer 2 is the DATA LINK layer: Ensures hardware addressing of the device, and delivery to the correct device. Translates data messages from upper layers to frames, enabling hardware to transmit upper layer messages as a bit stream. Provides flow control to the layer 2. Also carries a Frame Check Sequence to make sure the frame received is identical to the one transmitted.

Logical Link Control (LLC) Sublayer of the Data Link Control layer pro-vides flexibility to Network Layer and the Media Access Control (MAC) layer. It runs between Network Layer and the MAC sublayer of the data Link Layer.

Media Access Control (MAC) Sub Layer of the Data Link Layer is responsi-ble for framing. It builds frames from the 1s and 0s that the Physical Layer picks up from the wire.

Layer 1 is the PHYSICAL layer: Which transmits the raw bit stream and in-cludes electrical signaling and hardware interface.

The two protocols involved in the connection establishment of the end system is Transmission Control Protocol (TCP) for reliable connection and User Datagram Protocol UDP for unreliable connection.

TCP is defined in the RFC 793 and defines a reliable, connection orientated full duplex byte stream for a user process. TCP creates a CONNECTION orientated service by contacting the end system and establishing a set of guidelines both can support. Such agreements as how much data segments can be transferred before an acknowledgement is received. TCP takes large blocks of data coming from upper layers and segments them. Then it adds numbers to the segments so the end system can sequence them at arrival and assemble the original block before sending it to the upper layer. When TCP creates a connection between two end systems, it is called a VIRTUAL CIRCUIT. This virtual circuit is created at the time the one system needs to send a data stream to the end system and takes it down when the data transfer is completed.The three phases of the TCP are CONNECTION ESTABLISHMENT, CONNECTION MAINTENANCE and CONNECTION TIREDOWN.

UDP is defined in RFC 768. It is the protocol that does not consume system resources as much as TCP but it unreliable and transfers data to the destination system with out establishing a connection and hence, connectionless protocol. UDP sends data to the destination system in numbered segments same as TCP but it can not retransmit erred segments if they get lost or damaged.

92Navlesh Kumar Singh

Page 93: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Key differences between connection orientated network service and con-

nection less network service.

Packet header: Connection orientated service Connection less service

Source Port, Destination Port Source Port, Destination Port

Sequence number No Sequence Number

Acknowledgement Number No Acknowledgement number

Data offset No data offset

Length of data Variable length of data

Flags No flags

Window No window

Check sum Check sum

Urgent pointer No Urgent pointer

Options and Padding No Options and Padding

Both TCP and UDP use the concept of ports and sockets to identify a connection between two communicating computers. A connection-orientated service is mainly used for secure and reliable data transfer, where the requirement is also transfer of data in timely manner. If the underlying network, drops data packets because the network is congested or the end system buffers overflow, a connection orientated service can recover, but the connection less service cannot recover from such faults because, once the data frame leaves the sending systems buffer, it is cleared by the sending system and there are no acknowledgement sent to the sending system. To get the high reliability with the connection orientated system, large amount of system resources has to be allocated for buffers and CPU time. As for the connection less service it is analogous to mailing a letter and is not resource intensive. The buffers can be much smaller because the frame that is transmitted does not have to wait for an acknowledgment before been discarded. CPU utilization is much less for connectionless service because of the absence windowing mechanism.

93Navlesh Kumar Singh

Page 94: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

(3) Describe Data Link addresses and Network Address, and identify the key differences. Data Link addresses are the source address and the destination address of the 48 bit BIA of the hardware NIC card. At each interface these addresses change because, on route to the destination a frame has to pass may INC cards. Address Resolution Protocol (ARP) finds the MAC address when it moves to a different segment. Network layer address has a source and a destination address, which are end points of the transmitting and receiving systems. It provides routing and relaying functions to achieve it goal. It provides a transparent path to the transport layer for a best end to end packet delivery service.

(4) Identify at least three reasons why industry uses a layered model Layered model avoids interfering with the innovation of design and implementation of computer systemsFacilitates communication between dissimilar systems Allow changes to one layer with out changing other layers Facilitate systematic network trouble shootingReduce the complexity of networking into more manageable layers and sub layers

(5) Define and explain the five conversion steps of data encapculation

User information is converted to data Data is converted to segments Segments are converted to packets or datagrams Packets or datagrams are converted to frames Frames are converted to bits (1s and 0s)

(6) Define Flow Control and describe the three basic methods used in networkig

Flow control stops a sending station from flooding the receiver station buffers, if it has no resources to match the speed of data arriving from the receiving station. Once the buffers are emptied at the receiver, it sends a message to the transmitter to start sending again. It is called windowing and controls how much data is transmitted from one end to the other.

Has a fixed window say 7, the transmitting station sends seven packets before waiting for an acknowledgement packet. Once the acknowledgement is received at the receiver, it sends another seven packets.Window size of one. Every packet sent to the receiver has to be acknowledged before the transmitter can send the next packet.Variable window, if the receiving station for some reason finds difficult to catch up with buffer emptying, it then tells receiver to reduce the window size and the sender does so.

94Navlesh Kumar Singh

Page 95: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

(7) List the key internetworking functions of the OSI network layer and how they are performed in a router.Network layer of the OSI seven layer model conations many protocols that a router use to evaluate the best route it should take and it is updated regularly so the best route is available for the packet to be transported. Network layers primary function is to send packets from the originating network to destination network. After the router has decided the best path from source to the destination network, the router switches the packet to it. This is known as packet switching. Essentially, this is forwarding the packet received by the router on one network interface (NIC card), or port to the port that connects to the best path through the network cloud. An internetwork must continually designate all paths of its media connections. All routers in the internetwork cloud are connected by media (cables), each line connecting a router to another is numbered. Routers use these numbers as network addresses. These addresses posses and convey important information about the path of the media connections. They are used by routing protocols to pass packets from a source onward towards to its destination. The network layer creates a composite “network map” and a communication strategy model by combining information about the sets of links into an internetwork with path discrimination, path switching and route processing functions. It can also use these addresses to provide relay capability and to interconnect independent networks. Routers using network layer protocols streamline network performance by not letting unnecessary broadcasts get into the internetwok cloud.

Knowledge of WAN protocols

Differentiate between the following WAN services: FRAME RELAY, ISDN/LAPD, HDLC and PPPFrame relay is used to connect large number of sites in the network because it is relatively inexpensive to do so. The service provider gives you a frame relay circuit and is charged for the amount of data and the bandwidth you use as oppose to T1 circuit that charges with a flat monthly rate whether you use partial bandwidth or the full bandwidth regardless. Frame relay is a high performance WAN protocol that operates at the Data Link layer and the Physical layer of the OSI model.

Integrated Services Digital Network (ISDN) is designed to run over existing telephone networks. It can deliver end to end digital service carrying voice and data. ISDN operates at OSI model, physical layer, data link layer and network layer. It can carry multimedia and graphics with all other voice, data services. ISDN supports all upper layer protocols and you can choose PPP, HDLC or LAPD as your encapsulation protocol. It has two offerings, Primary rate which is 23B+D channels. 23, 64 kbps and one 64kbps mainly used for signaling. The other is the Basic Rate which has 2B+D channels two 64kbps and one 16kbps.

95Navlesh Kumar Singh

Page 96: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

At data link layer ISDN supports two protocols; LAPB and LAPD. LAPB is used to mainly transfer data from upper layers and has three types of frames. I-Frames carry upper layer information and carries out sequencing, flow control, error detection and recovery. S- Frames carry control information for the I-frame. LAPD provides an additional multiplexing function to the upper layers enabling number of network entities to operate over a single physical access. Each individual link procedure acts independently of others. The multiplex procedure combines and distributes the data link channels according to the address information of the frame. Each link is associated with a specific Service Access Point (SAP), which is identified in the part of the address field.

High Level Data Link Control (HDLC) is a bit oriented data link layer frame protocol that has many versions similar to LAP, LAPB, and LAPD. CISCO routers default encapsulation is HDLC, but it is proprietary to CISCO.

Point to Point Protocol (PPP) is a Data Link Layer protocol that can be used over ether asynchronous (dial up) or synchronous (ISDN) lines. It uses Link Control Protocol (LCP) to build and maintain data link connections. Included in PPP is the authentication protocols, PAP and CHAP, and data compression. It supports IP, IPX, AppleTalk, DECnet and OSI/CLNS.

CISCO routers use the following type of memory:

Random Access Memory (RAM) stores the running configuration when the router is running and it is cleared when switched off. Also provides cashing, routing tables and packet buffering. The IOS oper-ates from RAM.

Flash Memory is an electrically erasable, re-programmable ROM that holds the operating system image and microcode. This facilitates the upgrades to the operating system with out replacing the chips on the motherboard.

Read Only Memory (ROM) is used by the router to store bootstrap program, operation system software and Power On Self Test (POST). The ROM chips are installed in sockets on the router’s motherboard, so that they can be replaced or upgraded. ROM holds the smaller ver-sion of IOS and is loaded during power up so the router can boot up.

Nonvolatile RAM (NVRAM) This memory does not loose its informa-tion when the router is powered down. Stores the systems start up con-figuration file and the virtual configuration register.

96Navlesh Kumar Singh

Page 97: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Cisco Discovery Protocol (CDP) is CISCO’s proprietary protocol that allows you to access configuration on other routers with a single command. By running Sub Network Access Protocol (SNAP) at the data link layer, two devices running different Network Layer protocols can communicate and learn about each other. These devices include all LAN and some WANs. CDP starts by default on any router version 1.3 earlier and discovers neighboring CISCO routers running CDP by doing a Data Link broadcasts. It does not matter what protocol is running at the network layer. Once CDP has disproved a router, it can then display information about the upper layer protocols, such as IP and IPX. The router caches the information it receives from its CDP neighbors. Any time a router receives up dated information that a CDP neighbor has changed, it discards the old information in favor of the broadcast.

Network Protocols

The 32 bit structure of the IP address is comprised of a network address and host address. Number of bits assigned to each of these components varies with the address class. IP addressing is analogues to the address of a letter. Street address is analogues to the network address and the house number is analogues to the host address. The concept of subnetting allows the network portion of the address to be subdivided in to number of logical sections; subnets. With subnetting the two part IP address becomes a three part address, a network address, subnetwork address and a host address. In Class A address, the most significant bit of the first octet is set to 0 and first octet is set for the network address, leaving 24 bits for the host address. This corresponds to possible network addresses of 0 to 127. The reserved values are 0 and 127, leaving 1 to 126 for network addressing in class A.In Class B address, the most significant bit and one after it is set to 10 leaving 16 bits for the network address and 16 bits for the host address. This corresponds to possible network address of 128 to 191.In Classes C address, the most significant bit and two bits after are set to 110 leaving 24 bits for network address and 8 bits for host address. This corresponds to possible network address of 192 to 223.

Class D and Class E is not required for the CCNA examination.

Create different classes of IP addresses (and subnetting)

For the subnet address scheme to work, every host on the network must know which part of the host address will be used as the subnet address. This is accomplished by assigning a subnet mask to each host. Following are the subnet masks for each Class

Class A net.node.node.node default subnet mask 255.0.0.0

97Navlesh Kumar Singh

Page 98: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Class B net.net.node.node default subnet mask 255.255.0.0 Class C net.net,net,node default sunet mask 255.255.255.0

Configure IP addresses

Following commands will configure the IP address for the Ethernet interface 0Router#config tRouter(config)#int e0Router(config-if)#ip address 172.16.50.10 255.255.255.0Router(config-if)#no shut

Verify IP addresses

Router#sh ip int e0 will display the following:Ethernet0 is up, line protocol is upInternet address is 172.16.50.10 255.255.255.0Broadcast address is 255.255.255.255Also many other interface details

List required IPX addresses and encapsulation type

IPX performs functions at layer 3 and 4 of the OSI model. It controls the assignment of IPX addresses (software addressing) on individual nodes, governs packet delivery across networks, and make routing decisions based on information provided by routing protocols, RIP or NLS. IPX is a connectionless protocol and it does not require an acknowledgement from the destination node. To communicate with upper layer protocols, IPX uses sockets. These are similar to TCP/IP ports, in that they are used to address, multiple independent applications running on the same machine.

Sequence Packet eXchange (SPX) is a connection-orientated protocol as oppose to IPX. Through it upper layers can be assured that the data was delivered from the source to the destination. SPX works by creating virtual circuits or connections between machines, with each connection having a specific connection ID, included in the SPX header.

Routing Information Protocol (RIP) is a distance vector routing protocol used to discover IPX routes through internetworks. It employs ticks (1/8 th of a second) and the hop count (number of routers between nodes) as metric for determine preferred routes.

Service Advertising Protocol (SAP) allows servers to advertise the services they provide on the network. There are three types of SAP packets defined: Periodic updates, service quires and service response.

98Navlesh Kumar Singh

Page 99: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Netware Link Services Protocol (NLSP) is an advanced link state routing protocol, intended to replace Novell RIP and SAP.

Netware Core Protocol (NCP) provides clients with server resources such as file access, security and printing.

IPX addressing is somewhat different from IP addressing. The administrator assigns the network part of the address and the node part is automatically assigned. IPX address has 80 bits or 10 bytes. It is divided in to network address, which is 4 bytes and the node address which is the remaining 6 bytes. An example of an IPX address is as follows:0000.7C80.0000.8609.33E9. The first 8 hex digits (0000.7C80) represents the network part of the address, next 8 hex digits (0000.8609) represents the node part of the address and the last 4 hex digits (33E9) represents the socket.

Encapsulation or framing is the process of taking packets from upper layer protocols and building frames to transmit across the network. Encapsulation takes IPX datagarms fromLayer 3 and builds frames at layer 2 to transmit on one of the supported media.

Encapsulation on following media is as follows:

Ethernet Cisco Key-word

Netware Frame: Ethernet_802.3 novell-ether (defaultNetware 3.11)

Ethernet_802.2 sap

Ethernet_II arpa

Ethernet_snap snap

Token Ring

Netware Frame: Token-Ring sap (default)

Token-Ring_snap snap

FDDI

99Navlesh Kumar Singh

Page 100: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Netware Frame: fddi_snap snap (default)

Fddi_802.2 sap

Fddi_raw novell-fddiIdentify functions of the TCP/IP Transport layer

The Transport layer protocol equivalent to the layer in the DOD model is the Host to Host protocol. Its main purpose is to shield the upper layer applications from the complexities of the network. Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) operate at this layer. TCP is a connection-orientated protocol, which means that it first establishes a connection on a virtual circuit between source and destination, before sending user data. UDP is a connection less protocol, which means the source is not concerned whether the datagram it sent to the destination, did arrive there or not. TCP and UDP both receive large chunks of data form the upper layers and they break them down to manageable segments so that they can be transmitted to their destinations. Each segment is numbered so that at the destination they can be reassembled. Only TCP keeps tract of this reassembly process, by requesting the missing segment from the source. If a segment is missing from a UDP transmission, the destination does not have a mechanism request it from the source. Therefore UDP is a unreliable protocol. TCP carries out error checking, and requests a retransmission, also through a windowing mechanism it controls the data flow so that receiver buffers are not flooded by the source. TCP is a full duplex, connection orientated, reliable and accurate protocol.

Identify the functions of the TCP/IP network layer protocol.

At network layer, the TCP/IP protocol suit has the Internet Protocol (IP) in operation. The function of IP includes, packet routing and providing a single network interface to the upper layers. The lower layers do not carry out any routing and routing occurs at the IP internet layer. To route, IP looks at each packet’s IP address, then using a routing table it decides where a packet is to be sent next, choosing the best path. All hosts on a network has an IP address and it contains the required routing information to enabling the packet to travel to the destination. IP receive data segments from the next upper layer, which is the Host to Host layer and fragments them to datagrams or packets. Each datagram is assigned an IP address of the sender and the IP address of the recipient. Each machine that receives the datagram makes a routing decision based upon the packet’s destination IP address. The IP packet has a header and in it there is a field which carries an IP type number. This number indicate the socket number that the IP datagram should use to pass the data to upper layer which is the Host to Host layer. Data travelling on the internet layer is, either a TCP datagrma or a UDP datagram

100Navlesh Kumar Singh

Page 101: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Identify Functions performed by ICMP

Internet Control Message Protocol (ICMP)is a management protocol and a messaging service provider for IP. Its messages are carried as IP datagrams. RFC 1256 ICMP Router Discovery Messages is an annex to ICMP, which affords hosts extend capability in discovering routes to gateways. Periodically, router advertisements are announced over the network, reporting IP addresses for its network interfaces. Hosts listens for these network infomercials to acquire route information. A router solicitation is a request for immediate advertisement and may be sent by a host when it starts up. Following are some common events and messages that ICMP relates to:

Destination Unreachable: If a router cannot send an IP address any fur-ther, it uses ICMP to send a message back to the sender advertising it of the situation. For example if the router receives a packet destined to a network that the router does not know about, it will send an ICMP Destination Unreachable message back to the sending station.

Buffer full: If a router’s memory buffer for receiving in coming data-grams is full, it will use ICMP to send out this message.

Hops: Each IP datagram is allotted a certain number of routers that it may go through, called Hops. If it reaches its limit of hops before ar-riving at its destination, the last router to receive that datagram deletes it. The executioner router then uses ICMP to send an message to the originator that the datagram is dead.

Ping: Packet Internet Groper uses ICMP echo message to check the physical connectivity of machines on an internetwork.

Routing

Add the RIP routing protocol to your configuration

Route Information Protocol (RIP) is a distance vector routing protocol that practices classfull routing, which is used to discover the cost of a given route in terms of hops and stores that information on a routing table.

101Navlesh Kumar Singh

Page 102: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

The router can then consult the table to select the least costly most efficient route to a destination. It gathers information by watching for routing table broadcasts by other routers and updating its own table in the event that a change occurs. RIP routing tables has following minimum entries: IP destination address, A metric (1 to 15) indicative of the total cost in hops, of a particular route to a destination, IP address of a the next router that a datagram would reach , on the path to its destination, A maker signaling recent changes to a route, Timers, which are used to regulate performance, Flags, which indicate whether the information about the routers has recently changed, Hold-downs used to prevent regular update messages from reinstating a route that is no longer functional, Split horizon used to prevent routing loops. A poison reverse updates used to prevent routing loops. RIP sends out routing updates at regular intervals and whenever a network topology changes occurs. And uses the following timers to regulate its performance.

Routing table update timer typically 30 secondsRoute invalid timer 90 secondsRoute flush timer 240 secondsTo add RIP routing to a router type in the following:Router#config tRouter(config)#router ripRouter(config-router)#network 172.16.0.0Router(config-router)#^ZRouter#wr mem (write to the running configration)

Add the IGRP routing protocol to your configuration

Interior Gateway Routing Protocol (IGRP) is a CISCO proprietary, distance vector interior routing protocol that was designed by CISCO to overcome the limitations presented by RIP. IGRP hop count is 255 as oppose to RIP’s limited 15 hop count.

IGRP advertises three types of routes:

Interior: These are routes between subnets. If a network is not subnetted then IGRP will not advertise the interior routes.

System: These are routes to networks within an Autonomous System. They are derived from directly connected interfaces, other IGRP routes, or access servers. They do not include subnet information.

Exterior: These are routes to networks out side of the Autonomous System. They are considered when identifying a gateway of last resort. The gateway of last resort is chosen from the list of exterior routes that IGRP provides.

102Navlesh Kumar Singh

Page 103: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Type in the following to add IGRP routing

Router(config)#router igrp 10 (10 is the Autonomous System number it can be any number from 1 to 65535)Router(config-router)#network 172.16.0.0Router(config-router)#^ZRouter#wt mem

Explain the services of separate and integrated multiprotocol routing

A separate protocol routing is when the routing device, eg: a switch uses a routing table based on MAC address, and can accommodate only one encapsulation type. This type of routing is carried out at the data link, MAC sublayer.

Multiprotocol routing is carried out mostly by routers and similar devices because, the routing decisions are made at network layer and the routing tables are at network layer. At network layer there can exist, many different protocols and with them comes their own associated routing tables. So a router can have a IP routing table, IPX routing table and a Apple Talk routing table.

A bridge or a switch connects two or more physical networks into a single logical network, where as routers connects two or more logical networks and routes between them using information that is built by routing protocols and kept in routing tables. The advantage of a router as compared to a bridge or a switch is that it physically and logically breaks a network in to multiple manageable pieces, allows for control of routed packets, and routes network layer protocols at the same time.

Describe the benefits of network segmentation with routers

Routers filter by both the hardware and network addresses. Routers only forward packets to the network segment that the packet is destined for. The benefits of network segmentation could be summarized as follows:

Manageability: Multiple routing protocols give the flexibility of designing for optimum requirements of the network.

103Navlesh Kumar Singh

Page 104: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Increased functionality: CISCO routers addresses the issues of flow control, error control congestion control and fragmentation, Also efficient control over packet lifetime.

Multiple active paths: Using the protocols DSAPs, SSAPs and path metrics, routers can make informed routing decisions as well as interpret the next layer protocol. CISCO routers can have more than on active link between routers.

Network Security

Configure standard and extended access lists to filter IP

Access lists are used to control access via a router to the network or from the network to another network or to a device attached to the router. Packet filtering is performed by the access lists, to either, entering packets to the router, or exiting packets from the router. Apart from providing security to the network, access lists provide valuable static on packet flow.Access lists are a list of conditions that the network designer can enforce to get total control of access to the network and exit from the network. When you apply the access list to the router interface, it has the total control of packets entering and leaving the interface. Configuring the Standard IP access list and applying to the interface is as follows: First you configure the access list then you apply it to the interface.Configure access list as follows using the template:

Access-list (number) (permit or deny) (source address)Router(configt)#access-list 10 permit 172.16.30.2Access list number for standard IP access list is any number from 1 to 99Now we apply it to the interface as follows:Router(config)#int e0Router(config-if)#access-group 10 outout at the end of the command means that the restriction is for the packets going out of the e0 interface.

Monitor and verify selected access lists

Router#sh access –1 Will show all the access lists running on the router. Following example will show the output;Extended access list 110Permit tcp 172.16.50.2 host 172.16.10.2 eq 8080 (34 matches)What the above two lines show is as follows: first line gives the access number, which is 110 an extended IP access list (any number from 100 to 199). The second line shows the number of packets that matched.

Router#sh ip access-list Will show only the IP access lists as shown below

104Navlesh Kumar Singh

Page 105: COMPLETE HARD COPY of WAN Technology

8517 PCET I.T 8th

Extended IP access list 110Permit tcp host 172.16.50.2 host 172.16.10.2 eq 8080 (15 matches)If the log command was used on the access list the console will then display the following:Access list number, Source address, Source port, Destination address Destination address, Number of packets.When monitoring access lists it is important to find out which interface an access list applied to. The two commands to display this information isRouter#sh int e0 and Router#sh run.

105Navlesh Kumar Singh