Download - College Reportpdf
-
8/2/2019 College Reportpdf
1/70
1 | P a g e
PART 1
INTRODUCTORY CHAPTERS
1.Next Generation Networks2.Routers3.Routing4.Address Translation5.
Access Control Lists
6.MPLS7.PHP
-
8/2/2019 College Reportpdf
2/70
2 | P a g e
1. NEXT GENERATION NETWORKSNext Generation Networking (NGN) is a broad term to describe some key architectural
evolutions in telecommunication core and access networks that will be deployed over the
next 5-10 years. The general idea behind NGN is that one network transports all information
and services (voice, data, and all sorts of media such as video) by encapsulating these into
packets, like it is on the Internet. NGNs are commonly built around the Internet Protocol, and
therefore the term "all-IP" is also sometimes used to describe the transformation towards
NGN.
According to ITU-T the definition is
A Next Generation Network (NGN) is a packet-based network able to provide
services including Telecommunication Services and able to make use of multiple
broadband, QoS-enabled transport technologies and in which service-related functions
are independent from underlying transport-related technologies. It offers unrestricted
access by users to different service providers. It supports generalized mobility which
will allow consistent and ubiquitous provision of services to users.
From a practical perspective, NGN involves three main architectural changes that need to be
looked at separately:
In the core network, NGN implies a consolidation of several (dedicated or overlay)transport networks each historically built for a different service into one core transport
network (often based on IP and Ethernet). It implies amongst others the migration of
voice from a circuit-switched architecture (PSTN) to VoIP, and also migration of
legacy services such as X.25, Frame Relay (either commercial migration of the
customer to a new service like IP VPN, or technical emigration by emulation of the
"legacy service" on the NGN).
In the wired access network, NGN implies the migration from the "dual" legacy voicenext to xDSL setup in the local exchanges to a converged setup in which we integrate
voice ports or VoIP, allowing removing the voice switching infrastructure from the
exchange.
-
8/2/2019 College Reportpdf
3/70
3 | P a g e
In cable access network, NGN convergence implies migration of constant bit ratevoice to Cable Labs Packet Cable standards that provide VoIP and SIP services. Both
services ride over DOCSIS as the cable data layer standard.
In an NGN, there is a more defined separation between the transport (connectivity)
portion of the network and the services that run on top of that transport. This means
that whenever a provider wants to enable a new service, they can do so by defining it
directly at the service layer without considering the transport layer - i.e. services are
independent of transport details. Increasingly applications, including voice, will tend
to be independent of the access network (de-layering of network and applications) and
will reside more on end-user devices (phone, PC, Set-top box).
1.1 System Architecture
The basic premise for NGN is architecture on several independent levels. These include the
access area, the core network area; the control level and the service management level. The
connection of subscribers and terminals to the NGN can be achieved with various access
technologies. The information and transmission formats of the various networks must be
converted into information that is comprehensible for the NGN. This calls for Gateways for
the connection of business and private customers. The core network of the NGN is an IP
network. This is a standardized transport platform consisting of various IP routers and
switches. The connection control of the individual components is carried out by the control
level. Standard and value-added services can then be provided via the service management
level.
MODULAR STRUCTURE OF NGN
-
8/2/2019 College Reportpdf
4/70
4 | P a g e
The aim of an NGN is to operate the current wide range of access and communications
technologies under a common umbrella in the future network on IP. This convergence allows
a transition from a vertical to horizontal service integration. In vertical network structures,
services (e.g. phone services, TV services) can only be received with suitable networks and
the relevant end devices. With a horizontal approach, on the other hand, users in future will
be given the possibility of using the desired services regardless of the platform and the
technologywith a single end device
AN ALL IP NETWORK
-
8/2/2019 College Reportpdf
5/70
5 | P a g e
1.2 Motivation for NGN
The heterogeneity of the infrastructure, the growing competition and the falling call sales can
be regarded at present as the primary threats to the telecommunications industry. Established
network operators are finding themselves forced to rethink their business models and to
convert their infrastructure to a fully IP-based platformthe Next Generation Network. The
overall aim is to reduce costs and to create new sources of income.
Reasons for the Migration to NGN
-
8/2/2019 College Reportpdf
6/70
6 | P a g e
1.3 Fundamental Characteristics of NGN
Separation of control functions among bearer capabilities,call/session, and application/ service
Decoupling of service provision from network, and provision ofopen interfaces
Support for a wide range of services, applications and mechanismsbased on service building blocks (including real time/ streaming/
non-real time services and multi-media, Triple- play)
Broadband capabilities with end-to-end QoS and transparency Inter working with legacy networks via open interfaces Generalized mobility support Unrestricted access by users to different service providers A variety of identification schemes which can be resolved to IP
addresses for the purposes of routing in IP networks
Unified service characteristics for the same service as perceived bythe user
Converged services between Fixed/Mobile Independence of service-related functions from underlying transport
technologies
Compliant with all Regulatory requirements, for example concerningaccess to emergency communications and securitymonitoring/privacy, etc.
-
8/2/2019 College Reportpdf
7/70
7 | P a g e
1.4 Advantages of NGN
Cost savings
With fewer components required (e.g. lines, routers, hubs and switches), NGNs are more
reliable and cheaper to run, as carriers are able to offer equipment and network economies of
scale by investing in high-end equipment and capacity. Increased flexibility also means that
expansion or modifying of networks through organic growth and acquisition becomes far
easier, and ultimately less expensive.
Productivity
Emerging services such as IP based voice, web conferencing, collaboration and unified
messaging can all be supported by NGN. NGNs also provide any time, any place informationflow and presence visibility, similar to MSN Messenger.
Scalability
Generally, without disruption to service, users, sites and communication services can be
added in line with varying business demand. Enterprises can deploy services in a series of
phases allowing for resource and budgetary constraints. The emergence of NGN points to the
end ofFork Lift upgrades to both voice and data infrastructures - a desired goal for many
organizations.
Business continuity
Through the use of a common (IP) based infrastructure, business continuity can be easily
engineered to deliver a more reliable and robust network. The flexibility offered by NGNs as
an underlying infrastructure means that risk can be mitigated and policies configured to
protect against service disruption. Traditionally this has often been managed as a separate
plan rather than as an integral part of the network design.
Continued technological development means that the traditional phone system can run via an
NGN, acting as a low cost back-up solution for disaster recovery sites. Increased flexibility of
design and the ability to merge legacy systems more easily into a manageable infrastructure
means that NGNs are also able to effectively eliminate single points of failure across the
network.
-
8/2/2019 College Reportpdf
8/70
8 | P a g e
2. ROUTERSA router is a device that forwards data packets across computer networks. Routers perform
the data "traffic directing" functions on the Internet. A router is connected to two or more
data lines from different networks. When data comes in on one of the lines, the router readsthe address information in the packet to determine its ultimate destination. When multiple
routers are used in interconnected networks, the routers exchange information about
destination addresses, using a dynamic routing protocol. Routers may also be used to connect
two or more logical groups of computer devices known as subnets, each with a different sub-
network address. A router has two stages of operation called planes.
Control plane: A router records a routing table listing what route should be used toforward a data packet, and through which physical interface connection. It does this by
using internal pre-configured addresses, called static routes.
Forwarding plane: The router forwards data packets between incoming and outgoinginterface connections. It routes it to the correct network type using information that the
packet header contains. It uses data recorded in the routing table control plane.
2.1 Router Passwords:
Console: The console port is where we would initially start to configure a new router.
Router(config)# line console 0
Router(config-line)# password secretcisco
Router(config-line)# login
Aux: This is short for auxiliary port. This is also a physical access port on the router.
Router(config)# line aux 0
Router(config-line)# password secretcisco
Router(config-line)# login
-
8/2/2019 College Reportpdf
9/70
9 | P a g e
VTY: We would use this line to Telnet or SSH into the router.
Router(config)# line vty 0 4
Router(config-line)# password secretcisco
Router(config-line)# login
Enable password: The enable password prevents someone from getting full access to the
router.
Router(config)# enable password secretcisco
Router(config)# exit
Enable secret: The enable secret password has the same function as the enable password, but
with enable secret, the password is stored in a much stronger form of encryption:
Router# configure terminal
Router(config)# enable secret password
-
8/2/2019 College Reportpdf
10/70
10 | P a g e
3.ROUTINGRouting is the main process used by Internet hosts to deliver packets. Internet uses a hop-by-
hop routing model, which means that each host or router that handles a packet examines the
Destination Address in the IP header, computes the next hop that will bring the packet one
step closer to its destination, and delivers the packet to the next hop, where the process is
repeated. There are three types of routing depending upon the type of routing table:
Static Routing Default Routing Dynamic Routing
3.1 Static Routing: A static routing table contains information entered manually. The
administrator enters the route for each destination into the table. When a table is created, it
cannot update automatically when there is a change in the Internet. The table must be
manually altered by the administrator. A static routing table can be used in smaller networks
that do not change very often. With a network that has hundreds of routes, static routes are
not scalable since one would have to configure each route on each router.
Static Route Configuration:
Router(config)# ip route destination_network_# [subnet mask]
IP_address_of_next_hop_neighbor [administrative_distance] [permanent]
OR
Router(config)# ip route destination_network_# [subnet mask]
Interface_to_exit [administrative_distance] [permanent]
3.2 IP ROUTING: IP Routing is an umbrella term for the set ofprotocols that determine
the path that data follows in order to travel across multiple networks from its source to its
destination. Data is routed from its source to its destination through a series of routers, and
across multiple networks.
The Internet, for the purpose of routing, is divided into Autonomous Systems (ASs). An AS
is a group of routers that are under the control of a single administration and exchange
routing information using a common routing protocol. An AS can be classified as one of the
following three types.
-
8/2/2019 College Reportpdf
11/70
11 | P a g e
A Stub AS has a single connection to one other AS. Any data sent to, or receivedfrom, a destination outside the AS must travel over that connection. A small campus
network is an example of a stub AS.
A Transit AS has multiple connections to one or more ASs, which permits data thatis not destined for a node within that AS to travel through it. An ISP network is an
example of a transit AS.
A Multihomed AS also has multiple connections to one or more ASs, but it does notpermit data received over one of these connections to be forwarded out of the AS
again. In other words, it does not provide a transit service to other ASs.
An Interior Gateway Protocol (IGP) calculates routes within a single AS. The IGP enables
nodes on different networks within an AS to send data to one another. The IGP also enables
data to be forwarded across an AS from ingress to egress, when the AS is providing transit
services. Routes are distributed between ASs by an Exterior Gateway Protocol (EGP). The
EGP enables routers within an AS to choose the best point of egress from the AS for the data
they are trying to route.
The EGP and the IGPs running within each AS cooperate to route data across the Internet.The EGP determines the ASs that data must cross in order to reach its destination, and the
IGP determines the path within each AS that data must follow to get from the point of ingress
(or the point of origin) to the point of egress (or the final destination).
3.3 ROUTING PROTOCOLS: A routing protocol is used by a router to dynamically find
all the networks in the internetwork and to ensure that all the routers have the same routing
table. Basically a routing protocol determines the path of a packet through an internetwork.
Routing protocols used by the Internet Protocol suite include:
Routing Information Protocol (RIP) Open Shortest Path First (OSPF) Intermediate System to Intermediate System (IS-IS) Interior Gateway Routing Protocol (IGRP) Border Gateway Protocol (BGP)
http://www.inetdaemon.com/tutorials/internet/ip/routing/igrp/index.shtmlhttp://www.inetdaemon.com/tutorials/internet/ip/routing/igrp/index.shtml -
8/2/2019 College Reportpdf
12/70
12 | P a g e
3.4 Administrative distances (AD):
AD is used to rate the trustworthiness of routing information received on a router from a
neighbor router. An Administrative Distance is an integer from 0 to 255, where 0 is the most
trusted and 255 means no traffic will be passed via this route. The route with the lowest AD
will be placed in the routing table. If both advertised routes to the same network have the
same AD, then routing protocol metrics (such as hop count or bandwidth of the lines) will be
used to find the best path to the remote network.
Default Administrative Distance for a Cisco Router
Routing Source Default Administrative Distance
Connected interface 0
Static Route 1
EIGRP 90
IGRP 100
OSPF 110
RIP 120
External EIGRP 170
Unknown 255 (this route will never be used)
-
8/2/2019 College Reportpdf
13/70
13 | P a g e
3.5 Three classes of dynamic routing protocols:
1) Distance-Vector: These protocols find the best path to a remote network by judgingthe distance. The route with the least number of hops to the network is determined to
be the best route. Both RIP and IGRP are of this type.2) Link State: Also called shortest-path-first protocols. The routers each create three
separate tables. One of these tables keeps track of directly attached neighbors, one
determines the topology of the entire internetwork, and one is used as the routing
table. OSPF is a link state protocol. Link state protocols send updates containing the
state of their own links to all other routers on the network.
3) Hybrid: Hybrid protocols use the aspects of both distance vector and link stateprotocols. EIGRP is of this type.
Metrics: Metrics are used to weight the different paths to a destination. If there is more than
one way to the destination, the metric is used as a tie-breaker. The router will put the best
metric paths in its routing table. There are many different types of metrics, such as
bandwidth, reliability, load, frame size (MTU), delay, and hop-count. Each routing protocol
uses its own metric structure.
Metric Routing Protocols Description
Bandwidth EIGRP, IGRP The capacity of the link in Kbps
Cost OSPF Measurement in the inverse of the BW of the links
Delay EIGRP, IGRP Time it takes to reach the destination
Hop count RIP How many routes away from the destination
Load EIGRP, IGRP The path with the least utilization
Maximum
Transmission
Unit (MTU)
EIGRP, IGRP The path that supports the largest frame sizes
Reliability EIGRP, IGRP Path with the least amount of errors or downtime.
Ticks IPX RIP Measurement in delay (55 milliseconds)
-
8/2/2019 College Reportpdf
14/70
14 | P a g e
3.6 OPEN SHORTEST PATH FIRST PROTOCOL (OSPF)
It is a link state protocol that handles routing for IP traffic.
Features of OSPF:
Consists of areas and autonomous systems Minimizes routing update traffic Allows scalability Supports VLSM/CIDR Has unlimited hop count Allows multi-vendor deployment (open standard)
OSPF has the following main advantages:
It will run on most routers, since it is based on an open standard. It uses the SPF algorithm, developed by Dijkstra, to provide a loop-free topology. It provides fast convergence with triggered, incremental updates via Link State
Advertisements (LSAs).
It is a classless protocol and allows for a hierarchical design with VLSM and routesummarization.
Given its advantages, OSPF does have its share of disadvantages:
It requires more memory to hold the adjacency, topology, and routing tables. It requires extra CPU processing to run the SPF algorithm, which is especially true
when one first turns on the routers and they are initially building the adjacency and
topology tables.
For large networks, it requires careful design to break up the network into anappropriate hierarchical design by separating routers into different areas.
It is complex to configure.
Configuring OSPF:
Router(config)# router ospfprocess_ID
Router(config-router)# network IP_address wildcard_maskarea area_#
The process_ID is used to differentiate between different OSPF processes running on the
router. A wildcard mask tells the router what part of the address it should match on. It is 32
bits long and is an inverted subnet mask.
-
8/2/2019 College Reportpdf
15/70
15 | P a g e
4. ADDRESS TRANSLATIONAddress translation was originally developed to solve two problems: handling a shortage of
IP addresses and hiding network addressing schemes. Because of the huge Internet
explosions during the early 1990s, it was foreseen that the current IP addressing schemewould not accommodate the number of devices that would need public addresses.
Private Addresses: when devices want to communicate, each device needs a unique IP
address. The following table shows the range of private addresses:
CLASS Range Of Address
A 10.0.0.0 to 10.255.255.255
B 172.16.0.0 to 172.31.255.255C 192.168.0.0 to 192.168.255.255
One of the main issues of RFC 1918 addresses is that they can be used only internally within
a company and cannot be used to communicate to a public network such as the Internet. For
this reason they are commonly referred to asprivate addresses.
Address Translation: A second standard, RFC 1631, was created to solve this problem. It
defines a process which allows us to change an IP address in a packet to a different address.
Address translation allows us to translate the internal private addresses to public addresses
before these packets leave the network.
4.1 Common Address Translation Terms
TERM DEFINITION
Inside Networks located on the inside of private network
Outside Networks located on the outside of private network
Local The private IP address physically assigned to a device
Global The public IP address physically or logically assigned to a device
Inside local IP address An inside device with an assigned private IP address
Inside global IP address An inside device with a registered public IP address
Outside global IP address An outside device with a registered public IP address
Outside local IP address An outside device with an assigned private IP address
-
8/2/2019 College Reportpdf
16/70
16 | P a g e
4.2 Types of Address Translation:
Address translation comes in a variety of types, like Network Address Translation (NAT),
Port Address Translation (PAT), dynamic address translation, and static address translation.
4.2.1 Network Address Translation (NAT): NAT translates one IP address to another. This
can be a source address or a destination address. There are two basic implementations of
NAT: static and dynamic.
Static NAT: With static NAT, a manual translation is performed by an addresstranslation device, translating one IP address to a different one. The figure given
below shows a simple example of outside users trying to access an internal web server
with a private address 10.1.1.1. The web server needs to be presented as having a
public address. This is defined in the address translation device. The web server is
assigned an inside global IP address of 200.200.200.1 on the router and the DNS
server advertises this address to the outside users. When outside users send packets to
the 200.200.200.1 address, the router examines its translation table for a matching
entry. On finding the match, the router changes the destination IP address to 10.1.1.1
and forwards it to the inside web server.
Likewise, when the web server sends traffic out to the public network, the router
compares the source IP address to entries in its translation table, and if it finds a
match, it changes the inside local IP address (10.1.1.1) to the inside global IP address
(200.200.200.1).
-
8/2/2019 College Reportpdf
17/70
17 | P a g e
Dynamic NAT: With static address translation, we need to manually build thetranslations. With dynamic NAT, we must manually define two sets of addresses on
the address translation device. One set defines which inside addresses are allowed to
be translated, and the other defines what these addresses are to be translated to.
4.2.2 Port Address Translation (PAT):
One problem with static or dynamic NAT is that it provides only a one-to-one address
translation. Therefore, if there are 5,000 internal devices with private addresses, and all 5000
devices try to reach the Internet simultaneously, we need 5000 public address inside the
global address pool. If we have only 1000 public addresses, only the first 1000 devices are
translated and the remaining 4000 will not be able to reach outside destinations.
To overcome this problem, we can use a process called address overloading. This process is
also known as Port Address Translation (PAT) and Network Address Port Translation
(NAPT).
Using the same IP address: With PAT, all machines that go through the address translation
device, have the same global IP address assigned to them and so the source port numbers are
used to differentiate the different connections. If two devices have the same source port
number, the translation device changes one of them to ensure uniqueness. The translation
table in PAT consists of the following items:
Inside local IP address (original source private IP) Inside local port number (original source port number) Inside global IP address (translated public source IP) Inside global port number (new source port number) Outside global IP address (destination public address) Outside global port number (destination port number)
-
8/2/2019 College Reportpdf
18/70
18 | P a g e
5. ACCESS CONTROL LISTS (ACLs)ACLs are basically a set of commands, grouped together by a number or name, that are used
to filter traffic entering or leaving an interface. ACL commands define specifically which
traffic is permitted and which is denied. When activating an ACL on an interface, we mustspecify in which direction the traffic should be filtered:
Inbound (as the traffic comes into an interface): With inbound ACLs, the routercompares the packet to the interface ACL before the router will forward it to another
interface.
Outbound (before the traffic exits an interface): With outbound ACLs, the packetis received on an interface and forwarded to the exit interface. The router thencompares the packet to the ACL.
One restriction that the ACLs have is that they cannot filter traffic that the router originates
itself. For example, if we execute a ping or if we telnet from the router to another device,
ACLs applied to the routers interfaces cannot filter these connections. However, if an
external device tries to ping or telnet to the router or through the router to a remote
destination, the router can filter these packets.
There are two main types of access lists:
Standard ACL: These can filter only on the source IP address inside a packet. Thismeans that standard access lists basically permit or deny an entire suite of protocols.
They do not distinguish between any of the many types of IP traffic such as web,
Telnet, UDP and so on.
Extended ACL: These can filter on the source and destination IP addresses in thepacket, the IP protocol (TCP, UDP, ICMP, and so on), and protocol information (such
as the TCP or UDP source and destination port numbers). With an extended ACL, we
can be very precise in the filtering.
-
8/2/2019 College Reportpdf
19/70
19 | P a g e
Some general access list guidelines that should be followed while creating and implementing
access lists on routers:
One can assign only one access list per interface per protocol per direction. Thismeans that when creating IP access lists we can have only one inbound access list and
one outbound access list per interface.
Order of statements is important: organize the access list so that the more restrictivetests are at the top of the access list.
Any time a new entry is added to the access list, it will be placed at the bottom of thelist.
The router cannot filter traffic that it itself originates. ACL statements are processed top-down until a match is found, and then no more
statements in the list are processed.
If no match is found in the ACL, the packet is dropped (implicit deny). In order for anACL to have an implicit deny statement, we need at least one actual permit or deny
statement.
Unless the access list ends with a permit any command, all packets will be discardedif they do not meet any of the lists tests. Every list must have at least one permit
statement or it will deny all traffic.
Applying an empty ACL to an interface permits all traffic by default. Each ACL needs either a unique number or a unique name.
ACL Types and Numbers
ACL TYPE ACL NUMBERS
IP Standard 1-99, 1300-1999 (expanded range)
Standard Vines 1-99
IP Extended 100-199, 2000-2699 (expanded range)
Extended Vines 100-199
DECnet 300-399
AppleTalk 600-699
48-bit MAC Address Access List 700-799
Extended 48-bit MAC Address Access List 1100-1199
-
8/2/2019 College Reportpdf
20/70
20 | P a g e
Basic ACL Configuration:
Router(config)# access-list ACL_# permit|deny conditions
Activating an ACL:
Router(config)# interface type [slot_#] port_#
Router(config-if)# ip access-group ACL_# in|out
5.1 Standard Numbered ACLs
Basic Configuration:
Router(config)# access-list1-99/1600-1999 permit/deny
source_IP_address [wildcard_mask] [log]
Activation:
Router(config)# interface type [slot_#] port_#
Router(config-if)# ip access-group ACL_# in/out
Examples:
Router(config)# access-list 1 permit 192.168.1.1
Router(config)# access-list 1 deny 192.168.1.2
Router(config)# access-list 1 permit 192.168.1.0 0.0.0.255
Router(config)# access-list 1deny any
Router(config)# interface serial 0
Router(config-if)# ip access-group 1 in
5.2 Extended Numbered ACLs
Command Syntax:
Router(config)# access-list 100-199/2000-2699 permit/deny
IP_protocol
source_address Source_wildcard_mask
[protocol_information]
Destination_address destination_wildcard_mask
[protocol_information] [log]
-
8/2/2019 College Reportpdf
21/70
21 | P a g e
6.Multiprotocol Label Switching6.1 Problems that led to the development of MPLS:
Traditional IP forwarding based on:
Routing protocols used to distribute Layer 3 routing information Forwarding based on the destination address only Routing lookups performed on every hop Every router may need full Internet routing information (more than 100,000 routes)
Let us consider a simple service provider network. The following figure (a) shows four POPs
(Points of Presence): Delhi, Mumbai, Chennai, and Kolkata. At each of these POPs, the
routers are connected to ATM switches that are fully meshed, creating the core of the service
provider network.
Another way to represent the network is to show the POP locations connected to a cloud in
figure (b). The cloud is a way to demonstrate the problem faced when integrating ATM and
IP-based routers. The ATM switches are only concerned with moving traffic based on
VPI/VCI values of which the IP-based POP routers are unaware. IP-based POP routers are
Layer 3 devices, concerned with forwarding packets based on information contained in the
packet, of which the ATM switches are unaware.
Another problem experienced by service providers is scalability. To allow for maximum
redundancy and optimum routing, a full mesh of virtual circuits (VCs) must be created,
resulting in an overlay. For four POP routers connected together with a full mesh of VCs, six
VCs are required. If two more POP routers are added a total of 15 VCs are required to
-
8/2/2019 College Reportpdf
22/70
22 | P a g e
provide full-mesh connectivity. As more and more POP routers are added to this core, more
and more VCs will be required to provide a full mesh.
Not only are there scalability problems with the number of VCs required implementing a full
mesh, but there are also scalability problems associated with the routing protocols in use in
the network. As more and more VCs are created, more and more routers must form
adjacencies with one another to ensure redundancy. All of these routers must exchange
routing table updates with every router, thus creating a great deal of traffic that is merely
updating routing tables. This excessive traffic can utilize significant resources on the routers
and slow them down.
The ATM world has a rich feature set that is used for traffic engineering. Traffic engineering
is simply a process by which traffic is optimized to follow certain paths based on specified
requirements. The IP world also has features, although not nearly as extensive as ATM, to
provide for traffic engineering. The problem experienced by service providers is how to
combine the traffic engineering of IP with the traffic engineering of ATM. Since ATM and IP
are totally separate technologies, it is difficult to implement combined end-to-end traffic
engineering.
Both IP and ATM have Quality of Service (QoS) capabilities. The difference between the
two has to do with their operation. IP is connectionless and ATM is connection-oriented.
Again, the problem experienced by a service provider is how to combine these two different
ways of implementing QoS into a firm end-to-end solution.
MPLS, as a technology, evolved from early attempts to glue the IP world and ATM world
together. What we know as MPLS today is, for the most part, a standardized version of
Ciscos proprietary tag switching.
MPLS is a new forwarding mechanism in which packets are forwarded based onlabels.
Labels usually correspond to IP destination networks (equal to traditional IPforwarding)
Labels can also correspond to other parameters, such as QoS or source address MPLS was designed to support forwarding of other protocols as well
-
8/2/2019 College Reportpdf
23/70
23 | P a g e
6.2 MPLS architecture:
MPLS has two major components:
1) Control Plane:Exchanges Layer 3 routing information and labels. Control plane contains complex
mechanisms to exchange routing information, such as OSPF, EIGRP, IS-IS and BGP, and to
exchange labels such as TDP, LDP, BGP and RSVP.
TDP: The Tag Distribution Protocol (TDP) is Ciscos proprietary protocol that is used to
bind tags (which are the same as MPLS labels) to network routes in the routing table.
LDP: The Label Distribution Protocol (LDP) is the IETF version of Ciscos TDP. LDP is
used to bind labels to network routes. The label information base (LIB) is a mapping of
incoming labels to outbound labels, along with outbound interface and link information.
Forwarding Equivalence Class (FEC):
FEC is a grouping of IP packets that are treated in the same way. For example, a destination
subnet could correspond to an FEC. Labels are bound to FECs. FECs can be based on a
number of criteria, including IP ToS bits, IP protocol ID, port numbers, etc.
2) Forwarding or Data plane:An MPLS-enabled router switches IP packets instead of forwarding them traditionally. The
forwarding component of the MPLS architecture (known as the forwarding plane or data
plane) is where information created and maintained from the control plane is actually used.
The routing table is built in the control plane and cached in the forwarding plane. For labels,
the LIB is built in the control plane, and only those labels in use reside in the label
forwarding information base (LFIB). The LFIB is a subset of the LIB. An additional
component that resides in the forwarding plane is the forwarding information base (FIB). The
FIB is built by Cisco Express Forwarding (CEF). The FIB is essentially a cached version of
the IP routing table that eliminates the need for a route-cache. For Cisco MPLS or tag
switching to work, CEF must be enabled.
-
8/2/2019 College Reportpdf
24/70
24 | P a g e
6.3 MPLS Network Components:
CE: A customer edge (CE) device. This is a router that connects to the customer network and
to a service provider.
PE: A provider edge (PE) device. This is a service provider piece of equipment that connects
to a customer and into the provider (P) network.
P: A provider (P) device. This is a service provider piece of equipment that exists entirely in
the provider (P) network and only connects to other service provider devices (not to
customers).
In addition, the PE and P routers are label switch routers. There are two types of label switch
routers:
LSR: A label switch router (LSR) is a Cisco IOS router/switch that is capable of forwarding
packets based on labels. The CE, or customer, devices are not LSRs and can handle regular
unlabeled IP packets.
Functions:
Exchange routing information Exchange labels Forward packets (LSRs and edge-LSRs) or cells (ATM LSRs and ATM edge-LSRs) Insert (push) a label or a stack of labels on ingress Swap a label with next hop label or a stack of labels in the core Remove (pop) a label on the egress
-
8/2/2019 College Reportpdf
25/70
25 | P a g e
Edge-LSR: An edge label switch router (edge-LSR) is a more specific term for the PE
routers. The Edge-LSR may have interfaces that are MPLS-enabled and also has interfaces
that are not MPLS-enabled. It primarily labels IP packets and forwards them into the MPLS
domain, or removes labels and forwards IP packets out of the MPLS domain.
A label-switched path (LSP) is a unidirectional set of LSRs that the labeled packet must flow
through in order to get to a particular destination.
Usually only one label is assigned to a packet. The following scenarios may produce more
than one label:
MPLS VPNs (two labels: the top label points to the egress router and the second labelidentifies the VPN)
MPLS TE (two or more labels: the top label points to the endpoint of the trafficengineering tunnel and the second label points to the destination)
MPLS VPNs combined with MPLS TE (three or more labels)
-
8/2/2019 College Reportpdf
26/70
26 | P a g e
6.4 Applications of MPLS:
MPLS and ATM: By turning a standard ATM Forum ATM switch into an ATM label
switch router (ATM-LSR), it is possible to merge the ATM and IP worlds to provide end-to-end solutions. An ATM-LSR is an ATM switch that is capable of forwarding packets based
on labels.
Quality of Service: MPLS addresses QoS by allowing packets to be classified at the network
edge. Standard IP packets enter the network at an edge-LSR. The Experimental (EXP) field
of the MPLS label stack is used to hold QoS information for use by MPLS-enabled devices
along the LSP. The Experimental field is three bits in size. With three bits, a total of eight
values are possible, but only six values are available for QoS. (The remaining two values are
reserved for internal network use only.)
Traffic Engineering: Traffic engineering is described as the process of controlling how
traffic flows through a network to optimize resource utilization and network performance.
TE is basically concerned with two problems that occur from routing protocols that only use
the shortest path as the parameter when they construct a routing table. The shortest paths
from different sources overlap at some links, causing congestion on those links. The traffic
from a source to a destination exceeds the capacity of the shortest path, while a longer path
between these two routers is under-utilized. MPLS can be used as a traffic engineering tool to
direct traffic in a network in a more efficient way then original IP shortest path routing.
MPLS can be used to control which paths traffic travels through the network and therefore a
more efficient use of the network resources can be achieved. Paths in the network can be
reserved for traffic that is sensitive, and links and router that is more secure and not known to
fail can be used for this kind of traffic.
6.5 Advantages of MPLS:
Traffic can be forwarded based on other parameters (QoS, source, etc). Load sharing across unequal paths can be achieved.
-
8/2/2019 College Reportpdf
27/70
27 | P a g e
7.PHPPHP is the web development language written by and for web developers. PHP stands for
PHP: Hypertext Preprocessor. The product was originally named Personal Home Page
Tools, and many people still think thats what the acronym stands for, but as it expanded in
scope, a new and more appropriate (albeit GNU-ishly recursive) name was selected by
community vote. PHP is currently in its sixth major rewrite, called PHP6 or just plain PHP.
PHP is a server-side scripting language, usually used to create web applications in
combination with a web server, such as Apache. PHP can also be used to create command-
line scripts akin to Perl or shell scripts, but such use is much less common than PHPs use as
a web language.
Cost
PHP is one of the Ps in the popular LAMP stack. The LAMP stack refers to the popular
combination of Linux, Apache, MySQL, and PHP/Perl/Python that runs many web sites and
powers many web applications. Many of the components of the LAMP stack are free, and
PHP is no exception. PHP is free, as in there is no cost to develop in and run programs made
with PHP. Though MySQLs license and costs have changed, we can obtain the Community
Server edition for free. MySQL offers several levels of support contracts for their database
server. Both PHP and MySQL run on a variety of platforms, including many variants of
Linux, Microsoft Windows, and others. Running on an operating system such as Linux gives
the opportunity for a completely free web application platform, with no up-front costs. Years
of real-world experience with Linux, Apache, MySQL, and PHP in production environments
has proved that the total cost of maintaining these platforms is lower, many times much
lower, than maintaining an infra- structure with proprietary, non-free software
-
8/2/2019 College Reportpdf
28/70
28 | P a g e
HTML-embeddedness: A Sample PHP program: PHP can be embedded within
HTML. In other words, PHP pages are ordinary HTML pages that escape into PHP mode
only when necessary. Here is an example:
Example.com greeting
Hello,
. We know who you are! Your first name is .
You are visiting our site at
Here is a link to your account management page: />s account
management page
When a client requests this page, the web server preprocesses it. This means it goes through
the page from top to bottom, looking for sections of PHP, which it will try to resolve. For one
thing, the parser will suck up all assigned variables (marked by dollar signs) and try to plugthem into later PHP commands (in this case, the echo function). If everything goes smoothly,
-
8/2/2019 College Reportpdf
29/70
29 | P a g e
the preprocessor will eventually return a normal HTML page to the clients browser, as
shown in
A result of preprocessed PHP
the View menu will look like this:
Example.com greeting
Hello,Ms. Park. We know who you are! Your first name is Joyce.
You are visiting our site at 2002-04-21 19:34:24
Here is a link to your account management page: Joyces account management page
This code is exactly the same as if we were to write the HTML by hand.
-
8/2/2019 College Reportpdf
30/70
30 | P a g e
The HTML-embeddedness of PHP has many helpful consequences:
PHP can quickly be added to code produced by WYSIWYG editors. PHP lends itself to a division of labor between designers and programmers. Every line of HTML does not need to be rewritten in a programming language. PHP can reduce labor costs and increase efficiency because of its shallow learning
curve and ease of use.
Cross-platform compatibilityo PHP and MySQL run native on every popular flavor of Linux/Unix (including
Mac OS X) and Microsoft Windows.
o PHP is compatible with the leading web servers: Apache HTTP Server forLinux/Unix and Windows and Microsoft Internet Information Server.
o It also works with several lesser-known servers.
Stability : The word stable means two different things in this context:o The server doesnt need to be rebooted or restarted often.o The software doesnt change radically and incompatibly from release to
release. To our advantage, both of these connotations apply to both MySQL
and PHP.
o Apache Server is generally considered the most stable of major web servers,with a reputation for enviable uptime percentages. Most often, a server reboot
isnt required for each setting change. PHP inherits this reliability; plus, its
own implementation is solid yet lightweight.
-
8/2/2019 College Reportpdf
31/70
31 | P a g e
Role of PHP in our project:In our project we are using one of the most interesting
features of PHP. We are using server side scripting which will be discussed in detail later. We
will host our dynamic webpages using server side scripting also known as a CGI (Common
Gateway interface). The technological aspects and screenshots are given below for a much
clearer understanding
Server-side web scripting is mostly about connecting web sites to backend servers,
processing data and controlling the behavior of higher layers such as HTML and CSS. This
enables the following types of two-way communication:
Server to client: Web pages can be assembled from backend-server output.
Client to server: Customer-entered information can be acted upon.
Server-side scripting products consist of two main parts: the scripting language and the
scripting engine (which may or may not be built into the web server). The engine parses and
interprets pages written in the language.
What Is Server-Side Scripting Good For? Server-side scripting languages such as PHP
perfectly serve most of the truly useful aspects of the web, such as the items in this list:
Content sites (both production and display)
Community features (forums, bulletin boards, and so on)
Customer-support and technical-support systems
Advertising networks
Directories and membership rolls
Surveys, polls, and tests
Filling out and submitting forms online
Personalization technologies
Catalog, brochure, and informational sites
CGI Script: The Common Gateway Interface (CGI) is a standard (method for web server
software to delegate the generation of web pages to executable files. Such files are known as
CGI scripts; they are programs, often stand-alone applications, usually written in a scripting
language.
-
8/2/2019 College Reportpdf
32/70
32 | P a g e
PART 2
PROJECT DESCRIPTION
Our project is mainly based on emulation of Next Generation Networks i.e. IP-based network
designed for providing scalable converged Triple play services. The project is mainly a small
depiction of core and access part of a network. Security is provided by means of service
policies and end-to-end QoS is provided by means of class maps.
Backbone of our network is Cisco 7200 Advanced Enterprise Router connected in a mesh
topology and main protocol is MPLS-TE. Aggregation and Access is Cisco 36745 IVS router
and routing protocol is OSPF v2. Provider Edge Routers are connected to Costumer Routers
by BGP4 and CME routers are equipped with Cisco Call Manager Express which is capable
of handling 180 IP Phones. Video Access is provided by means of DVMP tunnel from source
to connecting Access routers. This project can serve a small or medium Organization which
does not need very high level of security though communication to other sites is possible by
means of VPN or GRE tunnels
1.
-
8/2/2019 College Reportpdf
33/70
33 | P a g e
CORE NETWORK
A core network, or network core, is the central part of a telecommunication network that
provides various services to customers who are connected by the access network. It typically
provides the following functionality:
1. Aggregation: The highest level of aggregation in a service provider network. Thenext level in the hierarchy under the core nodes is the distribution networks and then
the edge networks. Customer Premise Equipment (CPE) does not normally connect to
the core networks of a large service provider.
2. Authentication: The function to decide whether the user requesting a service fromthe telecom network is authorized to do so within this network or not.
3. Call Control/Switching: Call control or switching functionality decides the futurecourse of call based on the call signaling processing.
4. Charging: This functionality handles the collation and processing of charging datagenerated by various network nodes.
5. Service Invocation: Core network performs the task of service invocation for itssubscribers. Service invocation may happen based on some explicit action (e.g. call
transfer) by user or implicitly (call waiting).
6. Gateways: Gateways shall be present in the core network to access other networks.Gateway functionality is dependent on the type of network it interfaces with.
The core in the project is MPLS-based with various Quality of Service functionalities. The
routing protocol used is OSPF.
-
8/2/2019 College Reportpdf
34/70
34 | P a g e
1.1 Configuring OSPF:
Router(config)# router ospfprocess_ID
Router(config-router)# network IP_address wildcard_maskarea area_#
e.g. Router(config)# router ospf100Router(config-router)# network 192.168.1.1 0.0.0.255 area 0
1.2 MPLS on providing backbone:
Router(config)# ip cef
Router(config)# mpls label protocol [ldp | tdp | both]
Router(config)# interface {int}
Router(config-if)# mpls ip
MPLS QoS:
Router(config)# mls qos
Router(config)# interface {int}
Router(config-if)# mls qos
1.3 VPN Routing and Forwarding (VRF):
VRF is a technology that allows multiple instances of tables to co-exist on the same router.
Each instance operates independently and provides isolation between different clients running
the same address space. A VRF consists of a separate RIB (Routing Information Base), FIB
(Forwarding Information Base) and LFIB (Label Forwarding Information Base) table per
instance. It is locally significant to a router. Traffic that enters on a VRF enabled interface
will belong to that VRF instance. Each interface can only be assigned to one VRF, but a VRF
can have many interfaces assigned.
Configuring MPLS VPN:
Router(config)# ip vrf {name}
Router(config-vrf)# ip vrf{vrf-name}Router(config-vrf)# rd {router-distinguisher}
-
8/2/2019 College Reportpdf
35/70
35 | P a g e
Router(config-vrf)# route-target export {rt}
Router(config-vrf)# route-target import {rt}
Router(config-vrf)# import map {route-map}
Router(config-vrf)# export map {route-map}
Router(config-vrf)# vpn id {vpn-index}
Router(config-vrf)# maximum routes {limit} [warn-thres | warn-only]
Router(config)# interface {int}
Router(config-if)# ip vrf forwarding {name}
1.4 Configuring MP-BGP:
Router(config)# router bgp as-number
Router(config-router)# no bgp default ipv4-unicast
Router(config-router)# neighbor {ip-address}remote-asas-number
Router(config-router)# address-family nsap [unicast]
Router(config-router-af)# neighborip-address activate
1.5 MPLS and service policing on each Interface
PER_1(config-if)#mpls ip
PER_1(config-if)#mpls bgp forwarding
PER_1(config-if)#mpls traffic-eng flooding thresholds down
PER_1(config-if)#mpls label protocol ldp
PER_1(config-if)#service-policy output VOICEPER_1(config-if)#traffic-shape rate 800000 1000000
R1(config-if)#bgp-policy accounting input
Global config settings
PER_1(config)#username gaurav secret cisco
PER_1(config)#aaa new-modelPER_1(config)#aaa authentication login default local enable
-
8/2/2019 College Reportpdf
36/70
36 | P a g e
PER_1(config)#aaa authentication enable default enable line
PER1(config)#aaa authorization exec default if-authenticated
PER_1(config)#router ospf 100
PER_1(config-router)#network 10.10.10.0 0.0.0.255 area 0
PER_1(config-router)#network 192.168.1.0 0.0.0.255 area 0
PER_1(config-router)#network 2.2.2.2 0.0.0.255 area 0
R1(config-router)#redistribute bgp 100 subnets
R1(config-router)#redistribute bgp 200 subnets
R1(config-router)#redistribute connected subnets
R1(config-router)#log-adjacency-changes detail
PER_1(config)#mpls ip
PER_1(config)#mpls traffic-eng path-selection metric te
PER_1(config)#ip access-list extended VOICE
PER_1(config-ext-nacl)#permit ip 192.168.10.0 0.0.0.255 any
PER_1(config-ext-nacl)#permit ip 192.168.10.0 0.0.0.255 any
PER_1(config)#class-map VOICE
PER_1(config-cmap)#match access-group name VOICE
PER_1(config)#policy-map VOICE
PER_1(config-pmap)#class VOICE
PER_1(config-pmap-c)#shape average percent 30
PER_1(config-pmap-c)#shape fr-voice-adapt
PER_1(config-pmap-c)#fair-queue
ER_1(config)#router bgp 100
PER_1(config-router)#neighbor 192.168.1.2 remote-as 200
PER_1(config-router)#redistribute ospf 100
-
8/2/2019 College Reportpdf
37/70
37 | P a g e
2.AGGREGATION
Link aggregation describe various methods of combining (aggregating) multiple network
connections in parallel to increase throughput beyond what a single connection could sustain,
and to provide redundancy in case one of the links fails.
Link aggregation offers an inexpensive way to set up a high-speed backbone network that
transfers much more data than any one single port or device can deliver. This allows several
devices to communicate simultaneously at their full single-port speed while not allowing any
one single device to monopolize all available backbone capacity.
Link aggregation also allows the network's backbone speed to grow incrementally as demand
on the network increases, without having to replace everything and buy new hardware.
The figure above shows the aggregation used in our project. The core network connects to
Provider Edge Router 1 with the network address of 192.168.1.0 with a subnet of /32 and
Provider Edge Router 2 with the network address of 192.168.1.0 with a subnet of /32
-
8/2/2019 College Reportpdf
38/70
38 | P a g e
3.ACCESS NETWORKAn access network is that part of a telecommunications network which connects subscribers
to their immediate service provider. It is contrasted with the core network, which connects
local providers to each other.
Depending on the technology used for accessing NGN services, the access network includes
functions related to:
1) Cable access
2) xDSL access
3) Wireless access (e.g. IEEE 802.11 and 802.16 technologies, and 3G RAN access)
4) Optical access
-
8/2/2019 College Reportpdf
39/70
39 | P a g e
4.INTERNET ACCESS
-
8/2/2019 College Reportpdf
40/70
40 | P a g e
5.IPTVInternet Protocol television (IPTV) is a system through which television services are
delivered using the Internet protocol suite over a packet-switched network such as
the Internet, instead of being delivered through traditional terrestrial, satellite signal,and cable television formats.
IPTV is represented by a profile of closed, proprietary TV systems such as those present
today on cable services but delivered via IP-based secure channels representing a sharp
increase in control of content distribution.
5.1 MULTICASTING settings
WWW(config)#ip multicast auto-enableWWW(config)#ip multicast-routing
WWW(config)#ip pim rp-address 192.168.99.1
Interface fa 0/0
WWW(config-if)#ip pim sparse-dense-mode
WWW(config)#int tunnel 0
WWW(config-if)#ip address 172.16.10.1 255.255.255.0
WWW(config-if)#tunnel source fastEthernet 0/0
WWW(config-if)#tunnel mode dvmrp
-
8/2/2019 College Reportpdf
41/70
41 | P a g e
5.2 DHCP configuration
CME_2(config)#ip dhcp pool IP
CME_2(dhcp-config)#network 192.168.10.0 255.255.255.0
CME_2(dhcp-config)#option 150 ip 192.168.10.1
CME_2(dhcp-config)#default-router 192.168.10.1
-
8/2/2019 College Reportpdf
42/70
42 | P a g e
6.VOIPVoice over IP (VoIP) commonly refers to the communication protocols, technologies,
methodologies, and transmission techniques involved in the delivery of voice
communications and multimedia sessions over Internet Protocol (IP) networks, such as
the Internet. Other terms commonly associated with VoIP areIP telephony,Internet
telephony, voice over broadband(VoBB), broadband telephony, and broadband phone.
There are several advantages to using Voice Over IP, including advanced features that
standard telephone systems are not capable of and the ability to have a phone number usually
associated with a particular local area anywhere in the world. But the biggest single
advantage VoIP has over standard telephone systems is cost. In addition, international calls
using VoIP are usually very inexpensive. One other advantage, which will become much
more pronounced as VoIP use climbs, calls between VoIP users are usually free.
-
8/2/2019 College Reportpdf
43/70
43 | P a g e
6.1 Telephony Service
CME_2(config)#telephony-service
CME_2(config-telephony)#max-dn 10
CME_2(config-telephony)#max-ephones 10
CME_2(config-telephony)#max-conferences 4 gain -6
CME_2(config-telephony)#auto-reg-ephone
CME_2(config-telephony)#moh music.wav
CME_2(config-telephony)#ip source-address 192.168.10.1 port 20
CME_2(config)#ephone 1
CME_2(config-ephone)#codec g7129r8
CME_2(config-ephone)#type cIPC
CME_2(config-ephone)#button 1:2
CME_2(config)#ephone-dn 1
CME_2(config-ephone-dn)#number 1001
CME_2(config-ephone-dn)#label PHN
CME_2(config-ephone-dn)#call-waiting beep
CME_2(config-ephone-dn)#name PHONE 2
-
8/2/2019 College Reportpdf
44/70
44 | P a g e
PART 3CONCLUSION
The traditionally familiar market boundaries between fixed networks, mobile telephony and
data networks are disappearing more and more quickly. This gives the customer the
advantage that he can call on an extremely wide range of services, regardless of his access
technology. Next Generation Networks will help in this development.
The market already features individual examples of a general trend toward the convergence
of various technologies, communications channels and media. Particularly remarkable isVoIP, which has developed strongly in the last two years, with its use of the Internet for
phone calls (which was not actually designed for this purpose).
At the end of the day, the network convergence will also lead to a convergence of the end
devices, depending on the actual needs. Multimedia-compatible computers will be given
telephone and video communication functions, data services will be available by telephone
and Internet access via the television (browsing using an Internet-compatible setup box) and
the cell-phone will be common.
In our project we have fully tried to emulate the Next Generation Networks. In the course of
the project development we have come across several hurdles like implementing BGP,
creating a dynamic webpage using PHP and also implementing the servers using Apache. We
also faced problems in implementing VOIP and IPTV. Most of the time it was because we
had forgotten to activate an interface or set up an IP address properly. With practice, we
improved our skills as well as our knowledge in network designing.
One of the aspects that our project does not cover is IPTV billing or IP phone usage. Also,
Layer 2 emulation is also not possible so switches are not used in the project.
This network design can be used for small and medium businesses with only one switch.
FUTURE PROSPECTS: Upgrading from IPv4 to IPv6 for future prospects can be achieved.
Addition of physical Access switches to the topology to provide more security and VLAN
support which is very important in large organizations can also be done.
-
8/2/2019 College Reportpdf
45/70
45 | P a g e
APPENDICES
APPENDIX A: About GNS3
APPENDIX B: Running Configurations
APPENDIX C: Abbreviations
APPENDIX D: Definitions
-
8/2/2019 College Reportpdf
46/70
46 | P a g e
APPENDIX A: About GNS3
GNS3 is a graphical network simulator that allows simulation of complex networks. It
allows us to run a Cisco IOS in a virtual environment on our computer. To allow complete
simulations, GNS3 is strongly linked with:
Dynamips, the core program that allows Cisco IOS emulation. Dynagen, a text-based front-end for Dynamips. It runs on top of dynamips to create a
more user-friendly text-based environment.
Qemu, a generic and open source machine emulator and virtualizer.
Features:
Design of high quality and complex network topologies Emulation of many Cisco router platforms and PIX firewalls Simulation of simple Ethernet, ATM and Frame Relay switches Connection of the simulated network to the real world Packet capture using Wireshark
Advantages:
Emulation is possible for a long list of router platforms and PIX firewalls There are a number of router simulators on the market, but they are limited to the
commands that the developer chooses to include. In these simulators we are only
seeing a representation of the output of a simulated router. While with GNS3 we are
running an actual Cisco IOS, so we will see exactly what the IOS produces and will
have access to any command or parameter supported by the IOS.
GNS3 is an open source, free program that may be used on multiple operatingsystems, including Windows, Linux, and MacOS X.
Drawbacks:
We need our own Cisco IOS images in order to make use of the simulator. GNS3does not come with built-in IOS images and explicitly states on the front of their page
that users must provide their own IOS images.
Another drawback would be the amount of CPU resources used by GNS3. When anIOS is running, it will consume up to 100% of the CPU time. This will cause the
computer to become very sluggish and will prevent building more complextopologies.
-
8/2/2019 College Reportpdf
47/70
47 | P a g e
Configuring the location for a Cisco IOS
1) On the Edit menu choose IOS images and hypervisors.
2) Under the IOS Images tab, click and find the Cisco IOS file and clickOpen.
3) Click the drop-down arrow next to Platform and choose the platform thatcorresponds to the IOS file.
-
8/2/2019 College Reportpdf
48/70
48 | P a g e
4) Click the drop-down arrow next to Model and choose the model corresponding to theIOS file.
GNS3 Window:
It is divided into four panes: The left-most pane lists the type of nodes available. The right-most pane will provide a topology summary. The top pane of the middle section is the work area where topology may be
graphically built.
The bottom pane of the middle section is called the Console and shows the Dynagenat work.
-
8/2/2019 College Reportpdf
49/70
49 | P a g e
APPENDIX B: Running Configurations
R1: Hostname > P1
!
upgrade fpd auto
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname P1
!
boot-start-marker
boot-end-marker
!
logging message-counter syslog
enable secret 5 $1$oEaL$0/t0JEboLpr6RDUuPGph7.
!
aaa new-model
!
aaa authentication username-prompt Enter
aaa authentication login default local enable
aaa authentication enable default enable line
aaa authorization exec default if-authenticated
!
aaa session-id common
ip source-route
ip cef
!
no ip domain lookup
no ipv6 cef
!
multilink bundle-name authenticated
!
rtsp client rtpsetup enable
!
memory-size iomem 0
username gaurav secret 5$1$hp6V$S8KwBLU5eS2TDDXC2NqUh/
archive
log config
hidekeys
!
crypto isakmp key cisco address 192.168.5.0255.255.255.0
!
class-map match-all VOICE
match access-group name VOICE
class-map match-all class1
description class map for core router
match any
match protocol appletalk
!
-
8/2/2019 College Reportpdf
50/70
50 | P a g e
policy-map pol1
class class1
policy-map VOICE
class VOICE
shape average percent 30
!
interface FastEthernet0/0
no ip address
shutdown
duplex half
!
interface GigabitEthernet1/0
ip address 10.10.10.1 255.255.255.252
negotiation auto
mpls ip
traffic-shape rate 800000 1000000 1000000 1000
bgp-policy accounting input
!
interface GigabitEthernet2/0
ip address 10.10.10.5 255.255.255.252
negotiation auto
mpls ip
!
interface GigabitEthernet3/0
ip address 10.10.10.9 255.255.255.252
negotiation auto
mpls ip
!
interface FastEthernet4/0
description INTERFACE TO SERVERS ORBACKHAND
ip address 192.168.99.1 255.255.255.252
duplex auto
speed auto
mpls ip
!
interface FastEthernet4/1
no ip address
shutdown
duplex auto
speed auto
!
router ospf 100
log-adjacency-changes
redistribute connected subnets
redistribute bgp 100
network 10.10.10.0 0.0.0.255 area 0
network 192.168.99.0 0.0.0.255 area 10
!
ip forward-protocol nd
no ip http server
no ip http secure-server
!
-
8/2/2019 College Reportpdf
51/70
51 | P a g e
ip access-list extended VOICE
permit ip 192.168.10.0 0.0.0.255 any
permit ip 192.168.5.0 0.0.0.255 any
!
control-plane
!
mgcp fax t38 ecm
!
gatekeeper
shutdown
!
line con 0
exec-timeout 0 0
logging synchronous
stopbits 1
line aux 0
stopbits 1
line vty 0 4
exec-timeout 180 0
password cisco
login authentication cisco
line vty 5 100
exec-timeout 180 0
password cisco
login authentication cisco
!
end
R2: Hostname > PER_1
!
upgrade fpd auto
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname PER_1
!
boot-start-marker
boot-end-marker
!
logging message-counter syslog
enable secret 5$1$enmu$qjDDVkFEqWIpZSgzwzHZI1
-
8/2/2019 College Reportpdf
52/70
52 | P a g e
!
aaa new-model
!
aaa authentication login default local enable
aaa authentication enable default enable line
aaa authorization exec default if-authenticated
!
aaa session-id common
ip source-route
ip cef
!
no ip domain lookup
no ipv6 cef
!
multilink bundle-name authenticated
mpls traffic-eng fast-reroute backup-prot-preemptoptimize-bw
!
memory-size iomem 0
username gaurav secret 5$1$IGJm$bvRXfu9CuKMnxE2E7R7j/.
archive
log config
hidekeys
!
interface FastEthernet0/0
no ip address
shutdown
duplex half
!
interface GigabitEthernet1/0
ip address 10.10.10.2 255.255.255.252
negotiation auto
mpls bgp forwarding
mpls ip
!
interface GigabitEthernet2/0
ip address 10.10.10.13 255.255.255.252
negotiation auto
mpls label protocol ldp
mpls ip
!
interface GigabitEthernet3/0
ip address 10.10.10.17 255.255.255.252
negotiation auto
mpls ip
!
-
8/2/2019 College Reportpdf
53/70
53 | P a g e
interface FastEthernet4/0
ip address 192.168.1.1 255.255.255.252
duplex auto
speed auto
mpls ip
!
interface FastEthernet4/1
no ip address
shutdown
duplex auto
speed auto
!
router ospf 100
log-adjacency-changes
redistribute connected subnets
network 10.10.10.0 0.0.0.255 area 0
network 192.168.1.0 0.0.0.255 area 1
!
ip forward-protocol nd
no ip http server
no ip http secure-server
!
control-plane
!
mgcp fax t38 ecm
!
gatekeeper
shutdown
!
line con 0
exec-timeout 0 0
logging synchronous
stopbits 1
line aux 0
stopbits 1
line vty 0 4
!
end
-
8/2/2019 College Reportpdf
54/70
54 | P a g e
R3: Hostname > PER_2
!
upgrade fpd auto
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname PER_2
!
boot-start-marker
boot-end-marker
!
ip cef
!
logging message-counter syslog
enable secret 5$1$YmUc$NYMJDvxcmjGO4zjwtCpP7.
!
aaa new-model
!
aaa authentication login default local enable
aaa authentication enable default enable line
aaa authorization exec default if-authenticated
-
8/2/2019 College Reportpdf
55/70
55 | P a g e
!
aaa session-id common
cef table consistency-check IPv4
ip source-route
no ip domain lookup
no ipv6 cef
!
multilink bundle-name authenticated
mpls traffic-eng logging lsp path-errors
mpls traffic-eng fast-reroute backup-prot-preemptoptimize-bw
!
memory-size iomem 0
username gaurav secret 5$1$x8JN$mSD/Chy.DyNSdEstjtteg.
archive
log config
hidekeys
!
interface FastEthernet0/0
no ip address
shutdown
duplex half
!
interface GigabitEthernet1/0
ip address 10.10.10.14 255.255.255.252
negotiation auto
mpls ip
!
interface GigabitEthernet2/0
ip address 10.10.10.6 255.255.255.252
negotiation auto
mpls ip
!
interface GigabitEthernet3/0
ip address 10.10.10.21 255.255.255.252
negotiation auto
mpls ip
!
interface FastEthernet4/0
ip address 192.168.2.1 255.255.255.252
duplex auto
speed auto
mpls ip
!
interface FastEthernet4/1
no ip address
shutdown
duplex auto
speed auto
-
8/2/2019 College Reportpdf
56/70
56 | P a g e
!
router ospf 100
log-adjacency-changes
redistribute connected subnets
network 10.10.10.0 0.0.0.255 area 0
network 192.168.2.0 0.0.0.255 area 2
!
ip forward-protocol nd
no ip http server
no ip http secure-server
!
control-plane
!
mgcp fax t38 ecm
!
gatekeeper
shutdown
!
line con 0
exec-timeout 0 0
password cisco
logging synchronous
stopbits 1
line aux 0
stopbits 1
line vty 0 4
password cisco
line vty 5 100
password cisco
!
end
R4: Hostname > CER_1
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname CER_1
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$VFQv$E19pdcz9j.psmA54y8JG2.
!
aaa new-model
-
8/2/2019 College Reportpdf
57/70
57 | P a g e
!
aaa authentication login default local enable
aaa authentication enable default enable line
aaa authorization exec default if-authenticated
!
aaa session-id common
memory-size iomem 5
ip cef
!
multilink bundle-name authenticated
!
rtsp client rtpsetup enable
!
username gaurav secret 5$1$VeLT$wCwV8fkvWQcK5jvz3S7j90
archive
log config
hidekeys
!
class-map match-all VOICE
match access-group name VOICE
!
!
policy-map VOICE
class VOICE
shape average percent 30
!
police cir percent 30
conform-action set-dscp-transmit af11
!
interface FastEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
service-policy output VOICE
!
interface FastEthernet1/0
no ip address
shutdown
duplex auto
speed auto
!
ip forward-protocol nd
!
ip http server
shutdown
-
8/2/2019 College Reportpdf
58/70
58 | P a g e
ip access-list extended VOICE
permit ip 192.168.10.0 0.0.0.255 any
!
control-plane
!
gatekeeper
!
line con 0
line aux 0
line vty 0 4
!
end
R5: Hostname > CER_2
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname CER_2
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$nP9k$T0S5shIj0.4X0KRaD/rFL/
!
aaa new-model
!
aaa authentication login default local enable
aaa authentication enable default enable line
aaa authorization exec default if-authenticated
!
aaa session-id common
memory-size iomem 5
ip cef
!
multilink bundle-name authenticated
!
rtsp client rtpsetup enable
!
username gaurav secret 5
$1$tlCL$xjyy710dBMJMlJknGmhRI/
archive
log config
hidekeys
!
-
8/2/2019 College Reportpdf
59/70
59 | P a g e
class-map match-all VOICE
match access-group name VOICE
!
policy-map VOICE
class VOICE
shape average percent 30
police cir percent 30
conform-action set-dscp-transmit af11
!
interface FastEthernet0/0
no ip address
shutdown
duplex auto
speed auto
service-policy output VOICE
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet1/0
no ip address
!
interface FastEthernet1/0
no ip address
shutdown
duplex auto
speed auto
!
ip forward-protocol nd
!
ip http server
!
ip access-list extended VOICE
permit ip 192.168.10.0 0.0.0.255 any
!
control-plane
!
gatekeeper
shutdown
!
line con 0
line aux 0
line vty 0 4
!
end
-
8/2/2019 College Reportpdf
60/70
60 | P a g e
R6: Hostname > P2
!
upgrade fpd auto
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname P2
!
boot-start-marker
boot-end-marker
!
logging message-counter syslog
enable secret 5 $1$JG0f$gWVBswqosZBSlQazvj9zv1
!
aaa new-model
!
aaa authentication login default local enable
aaa authentication enable default enable line
aaa authorization exec default if-authenticated
!
aaa session-id common
cef table consistency-check IPv4
ip source-route
ip cef
!
no ip domain lookup
no ipv6 cef
!
multilink bundle-name authenticated
mpls traffic-eng logging lsp path-errors
mpls traffic-eng fast-reroute backup-prot-preempt
optimize-bw
!
memory-size iomem 0
username gaurav secret 5$1$BBbT$obzM5CmGg9SDwR75qBmq3.
archive
log config
hidekeys
!
class-map match-all VOICE
description VOICE CLASS
match access-group name VOICE
!
policy-map VOICE
class VOICE
shape average percent 30
set qos-group dscp
-
8/2/2019 College Reportpdf
61/70
61 | P a g e
!
interface FastEthernet0/0
no ip address
shutdown
duplex half
!
interface GigabitEthernet1/0
ip address 10.10.10.18 255.255.255.252
negotiation auto
mpls ip
!
interface GigabitEthernet2/0
ip address 10.10.10.22 255.255.255.252
negotiation auto
mpls ip
!
interface GigabitEthernet3/0
ip address 10.10.10.10 255.255.255.252
negotiation auto
mpls ip
!
router ospf 100
log-adjacency-changes
redistribute connected subnets
network 10.10.10.0 0.0.0.255 area 0
!
ip forward-protocol nd
no ip http server
no ip http secure-server
!
ip access-list extended VOICE
permit ip 192.168.10.0 0.0.0.255 any
!
control-plane
!
mgcp fax t38 ecm
!
gatekeeper
shutdown
!
line con 0
exec-timeout 0 0
logging synchronous
stopbits 1
line aux 0
stopbits 1
line vty 0 4
password cisco
line vty 5 100
password cisco
!
end
-
8/2/2019 College Reportpdf
62/70
62 | P a g e
R7: Hostname > CME_1
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname CME_1
!
boot-start-marker
boot-end-marker
!
enable secret 5$1$onbJ$nWDak5EfgMGgQwTCkixIW/
!
aaa new-model
!
aaa authentication login default local enable
aaa authentication enable default enable line
aaa authorization exec default if-authenticated
!
aaa session-id common
memory-size iomem 5
ip cef
!
multilink bundle-name authenticated
!
rtsp client rtpsetup enable
!
username gaurav secret 5$1$eKp5$jf1y7NNm3.7fexjqRMPAr/
archive
log config
hidekeys
!
class-map match-all VOICE
match access-group name VOICE
!
policy-map VOICE
class VOICE
shape average percent 30
police cir percent 30
conform-action set-dscp-transmit af11
!
interface FastEthernet0/0
no ip address
shutdown
duplex auto
speed auto
service-policy output VOICE
!
-
8/2/2019 College Reportpdf
63/70
63 | P a g e
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
ip forward-protocol nd
!
ip http server
!
ip access-list extended VOICE
permit ip 192.168.10.0 0.0.0.255 any
!
control-plane
!
gatekeeper
shutdown
!
line con 0
line aux 0
line vty 0 4
!
end
R8: Hostname > CME_2
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname CME_2
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$AB.4$8tCoJvV7BurrYdMHJx3.b0
!
aaa new-model
!
aaa authentication login default local enable
aaa authentication enable default enable line
aaa authorization exec default if-authenticated
!
aaa session-id common
memory-size iomem 5
ip cef
!
-
8/2/2019 College Reportpdf
64/70
64 | P a g e
multilink bundle-name authenticated
!
rtsp client rtpsetup enable
!
username gaurav secret 5$1$p4xA$Eoy9vu0kbJDFLUjCdNzaC.
archive
log config
hidekeys
!
class-map match-all VOICE
match access-group name VOICE
!
policy-map VOICE
class VOICE
shape average percent 30
police cir percent 30
conform-action set-dscp-transmit af11
interface FastEthernet0/0
no ip address
shutdown
duplex auto
speed auto
service-policy output VOICE
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
service-policy output VOICE
ip forward-protocol nd
ip http server
ip access-list extended VOICE
permit ip 192.168.10.0 0.0.0.255 any
!
control-plane
!
gatekeeper
shutdown
telephony-service
max-ephones 10
max-dn 10
max-conferences 8 gain -6
transfer-system full-consult
ephone-dn 1
!
ephone 1
!
line con 0
line aux 0
line vty 0 4
!
end
-
8/2/2019 College Reportpdf
65/70
65 | P a g e
R9: Hostname > www
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname WWW
!
boot-start-marker
boot-end-marker
!
enable secret 5$1$nNYj$eeDHCYEB0yTd1SD0k4c900
!
aaa new-model
!
aaa authentication login default local enable
aaa authentication enable default enable line
aaa authorization exec default if-authenticated
!
aaa session-id common
memory-size iomem 5
ip cef
!
no ip domain lookup
ip multicast-routing
ip multicast auto-enable
ip dvmrp interoperability
multilink bundle-name authenticated
!
username gaurav secret 5$1$x.jM$WssJq23vUm2sKZ47nbJgB1
archive
log config
hidekeys
!
class-map match-all VOICE
match access-group name VOICE
!
policy-map VOICE
class VOICE
shape average percent 30
police cir percent 30
conform-action set-dscp-transmit af11
!
interface Loopback1
ip address 9.9.9.9 255.255.255.255
!
interface Tunnel0
description TUNNEL TO MULTICAST
-
8/2/2019 College Reportpdf
66/70
66 | P a g e
ip address 172.16.10.1 255.255.255.0
tunnel source FastEthernet0/0
tunnel destination 192.168.5.0
tunnel mode dvmrp
!
interface FastEthernet0/0
ip address 192.168.100.2 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 192.168.98.1 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet1/0
ip address 192.168.99.2 255.255.255.252
duplex auto
speed auto
!
router ospf 100
log-adjacency-changes
redistribute connected subnets
network 9.9.9.9 0.0.0.0 area 10
network 192.168.98.0 0.0.0.255 area 10
network 192.168.99.0 0.0.0.255 area 10
network 192.168.100.0 0.0.0.255 area 10
!
ip forward-protocol nd
!
no ip http server
!
ip access-list extended VOICE
permit ip 192.168.10.0 0.0.0.255 any
!
control-plane
!
gatekeeper
shutdown
!
line con 0
exec-timeout 0 0
logging synchronous
line aux 0
line vty 0 4
!
end
-
8/2/2019 College Reportpdf
67/70
67 | P a g e
APPENDIX C: Abbreviations
AD: Administrative Distance
ATM-LSR: ATM label switch router
CE: Customer Edge
CEF: Cisco Express Forwarding
FEC: Forward Equivalence Class
FIB: Forwarding Information Base
LDP: Label Distribution Protocol
LER: Label Edge Router
LFIB: Label Forwarding Information Base
LIB: Label Information Base
LSP: Label Switched Path
LSR: Label Switch Router
MP-BGP: MultiprotocolBorder Gateway Protocol
P: Provider
PE: Provider Edge
QoS: Quality of Service
RD: Route Distinguisher
TDP: Tag Distribution Protocol
TE: Traffic Engineering
VPN: Virtual Private Network
VRF: VPN Routing and Forwarding (or) Virtual Routing and Forwarding
-
8/2/2019 College Reportpdf
68/70
68 | P a g e
APPENDIX D: Definitions
Area border router (ABR): An OSPF router that has interfaces configured for two or more
areas.
Autonomous system boundary router (ASBR): An OSPF router that has at least one
interface in the OSPF domain and one interface connecting to an external network.
Backbone area: The OSPF Area 0.
Backbone router: An OSPF router that has at least one interface in Area 0.
Cisco Express Forwarding (CEF): CEF creates an optimized, cached version of the
routing table. CEF is a requirement for MPLS and tag switching.
Control plane: A component of the MPLS architecture that is responsible for binding a label
to network routes and distributing those bindings among other MPLS-enabled routers.
Data plane: A component of the MPLS architecture where information that is created and
maintained from the control plane is actually used. Also known as theforwarding plane.
Egress router: An edge router where packets leave the network.
Forwarding equivalence class (FEC): An FEC is a grouping of IP packets that are all
treated the same way
Forwarding information base (FIB): A FIB is essentially a cached version of the IP routing
table that eliminates the need for a route-cache.Ingress router: An edge router where packets enter the network.
Internal router: An OSPF router that has all configured interfaces in the same OSPF area.
Label Distribution Protocol (LDP): The Label Distribution Protocol (LDP) is the IETF
version of Ciscos TDP. LDP is used to bind labels to network routes.
Label forwarding information base (LFIB): The LIB is built in the control plane, and only
those labels in use reside in the LFIB. The LFIB is a subset of the LIB.
Label imposition: The point in the transit of a packet through a service provider network
where the label is applied by a router and used by subsequent devices to label-switch the
packet.
Label information base (LIB): A mapping of incoming labels to outbound labels, along
with outbound interface and link information.
Label stacking: An MPLS feature where more than one label can be carried. Label stacking
is useful for applications such as traffic engineering