Вы находитесь на странице: 1из 121

Ciscos Market Share

CISCO 60%

40%
D-Link
3 Com
Nortel
Cygnus
Etc..

Router is an internetworking
component, that connects networks
which are at different geographical
locations.

Diagram of 2501 series Router


Telephone
modem

Serial 1

Serial 0

V.35 modem

AUI
E0

Console AUX

PC

Interfaces on a Router

1. Ethernet It is a LAN interface. Some of the models have an


RJ45 port for 10baseT or 10/100. And some other have a 15 pin
female connector AUI (Attachment Unit Interface).

2. Serial
line

It is a 60 pin female WAN interface for leased

3. BRI/PRI

It is a RJ45 WAN interface for ISDN

4.Console It is a RJ45 Connector used to configure the


Router for the first time.
5. Auxiliary RJ45 Connector for remote access
administration.

Routers

Modular

Fixed

Modular Routers
These type of routers have up gradable slots, and the number
of ports can be increased just by adding cards in the slots.

Fixed Routers
These types of routers have fixed number of ports.

Cisco Routers Series


Cisco 700, 800, 1600, 1700, 2500, 2600,
3600, 4000, 5000, 7000,10000, 12000.

Fixed
700, 800,.2500

Modular
2600,.., 12000

1750 & 1751 exceptionally are Modular Routers.

Ciscos Hierarchical Model

Access Layer- Manage access control and policy, separate collision


domain, and also known as Desktop Layer.
700, , 2500
Distribution Layer- It is also called communication point between
core and access layer, Basic function is routing. Fault tolerance,
Implement Policies.
2600, , 5000
Core Layer- It is known as core of network and responsible to
transfer heavy traffic reliable and in quick manner, protect from
workgroup access support.
7000, , 12000

Transceiver

Internal Components of a Router

Boot ROM : It stores the mini IOS (Internet work Operating


System) image with extremely limited capabilities and POST
routines and core level OS for maintenance.
FLASH
: It is an EPROM chip that holds most of the IOS
Image. It maintains everything when router is turned off.
RAM
: RAM holds running IOS configurations and
provides caching. RAM is a volatile memory and looses its
information when router is turned off. The configuration present
in RAM is called Running configuration.
NVRAM : It is a re-write able memory area that holds routers
configuration file. NVRAM retains the information when ever
router is rebooted. Once configuration is saved, it will be saved in
NVRAM and this configuration is called Startup Configuration.

Configuration of a Router
Router for the first time is configured through the CONSOLE
port.COM port of a PC is connected to the console port of router
with a console cable by using a transceiver. Router is accessible by a
tool. In windows, it is called HYPER TEMINAL. As soon as the
router is powered on and accessed, the following things happen,
POST
BOOT STRAP
FLASH
NVRAM
Setup Mode

ROM (mini IOS)


If IOS is Corrupted

POST- A post is a program stored in ROM is


executed first. Checks hardware components of
the router first .
BOOTSTRAP- The program is stored in ROM that
is used to execute. This program find and locate
the IOS from possible location of IOS can be
Flash.TFTP server and mini IOS,by deafult IOS
loaded from flash memory in all cisco router.
Once he IOS is loaded. It finds and loads
configuration file stored in NVRAM. This file is
called Startup-configuration and is only there if
we copies to running-config file into NVRAM. If a
startup-config file is not in NVRAM, the router
will start the setup mode

In Setup mode, there will be a message,


Would You Like To Enter The Initial Configuration
[Y/N] :
If Y then, initial configuration starts.
If N would you like to terminate the auto
installation?
Press RETURN to get startedYou will land on the
default prompt of the Router ROUTER >.

Router>_

Working Modes Of a Router


1. User Mode (Default mode)
2. Privilege or Administrative Mode
3. Global Configuration Mode
4. Interface Configuration Mode
5. Line Configuration Mode
6. Router Mode
7. Sub-Interface Mode

USER MODE
Router> is the user mode, I,e the default prompt. It
means that when ever a router boots successfully it
lands into the user mode. Router cannot be
configured from this mode, but it is used for just
monitoring purpose. Router> en
Router #

PREVILEGE MODE
Router# it is the administrating mode, we can check
whether the settings and configurations made have been
implemented or not. Eg. Router # Sh int e0. If it is new
router all the interfaces are by default shut down, so the
message will be, Ethernet 0 is administratively down,
line protocol is down.

Global Configuration Mode


As the name indicates, it is a global configuration mode
I,e. we can configure any interface from this mode, just
by entering into the interface mode.
Router# Config t
Router (Config)#

The Clock Command


The clock command is used to set the clock of Router.
Syntax.
Router# clock set hh:mm:ss Day of week Month Year
E.g.
Router#clock set 16:35:00 1 April 2003
Note* This is the only configuration which can be done from
privilege mode,every other configuration should be done at global
configuration mode only.

Some of the important show commands in privilege


mode
Router#sh int (interface name eg e0)-Show interface
information.

#Sh history-Show routers history store by default 10 commands.


#Sh version-Show general information regarding router memory
and type of interface,IOS image and uptime.
#Sh running-config Show the content of RAM & IP.
# Sh startup-config-Show content of NVRAM
#Sh ip interface-Show summary of interfaces.
To save configuration from RAM TO NVRAM
Router#Copy Running-config Startup-config (or)
Router#Write Memory.
!!!!!!!!!- Symbol shows about successes in case of ping.
...- Symbol failures in case of ping.

Configuration Telnet Password- Telnet password


prevents access to operating system of router.
Router(Config)# line vty ?(Password length)
Router(Config-line)#line vty 0 to 5
Router(Config-line)#Password cisco
Router(Config-line)#Log in or no log in
Router(Config)#enable secret cisco (enable secret
password should be necessary to set for telnet.)
IN CMD- c:\>telnet router ip addr.
c:\>telnet 192.168.1.1

To configure Hostname (or)


Identification of Router over the
network.
Router#config t
Router(config)#Hostname R_2503
Router(config)#^Z

Previlege PASSWORDS

Enable Password

Enable Secret

Enable Password:- It is global command restricts access to


the previlege mode, the password is in clear text.
Router(config)#Enable password 123
Enable Secret:-Here the password is in encrypted form.
Router(config)#Enable secret cisco

CONFIGURING INTERFACES
LAN interface (ETHERNET Port)
WAN interface (SERIAL Port)

ETHERNET
Router(config)#Interface Ethernet 0
Router(config-if)#Ip Address 200.150.1.254 255.255.255.0
Router(config-if)#no shutdown
Router(config-if)#^Z
Router#Show Int E0

SERIAL
Router(config)#Interface Serial 0
Router(config-if)#Ip Address 150.10.1.1 255.255.0.0
Router(config)#clock rate 56000
Router(Config-if)# bandwidth 64
Router(config-if)#No shutdown
Router(config-if)#^Z

The CDP
Its a Cisco's proprietary protocol called the Cisco
Discovery Protocol, that gives you a summary of all the
directly connected Cisco devices. CDP is a L2 protocol,
that discovers neighbor regardless of which protocol suite
they are running. When a cisco device boots up, the CDP
is loaded by default, but can be disabled at interface level.
* The CDP is limited to the immediate neighbors only
The summary includes Device Identifier(eg. Switch
configured name or domain name), Port Identifier (eg.
Ethernet 0 and serial 0.), Capabilities list (eg. The device
can act as a source route bridge as well as a router),
Platform (eg. Cisco 2600).

CDP (Ciscos Discovery Protocol)

Backup & Restoring Routers IOS Image


Using TFTP
(Trivial File Transfer Protocol)
TFTP Server allows you to take backup, upload and save
your IOS Image and current configuration on it. TFTP is a
software program of 1.3Mb. This should be installed on that
TFTP server i.e., (Personnel Computer).
C:\Program files\cisco systems\cisco TFTP
* Note: Always while taking Backup or Restoration TFTP
software should execute on that particular computer.

Notification things
1) First assign IP address on routers
ethernet interface.
2) Assign an IP address of TFTP server in
LAN card setting. This address also of
PC on which we are working.
3) Ping both address successfully TFTP
server address and routers IP address.

Backup Sources :
1. Through Telnet Session.
2. Through Console Session.
3. Through Auxillary Port (Remote Session)

Backup of IOS Image


Router#Sh Flash
Router#Copy Flash:Tftp Address or name of the
remote host [] (TFTP server ip add 192.16.1.10 )
Destination file name [ ] ? (Press enter key or a
name)

Leased line WAN Setup


Case 1: The distance between the locations is greater than 5 Km.
Requirements
A pair of Routers, Leased line, pair of leased line modems V.35,
Pair of G.703 Modem.

Case 2: The distance between the two locations is less than 5Km.
Requirements
A pair of Routers, Leased line and pair of leased line modem.

Leased line Setup (< 5 km)


V.35
modem
V.35 Cable

Leased line
V.35
modem

Csu/
Dsu

S0
E0
Switch/hub
Internal Network

S0

Telephone
Exchange

Router

E0
Switch/hub

Internal Network

Routing
Routing is of three types.
Static - Static routing is done by the users. These paths
are stored in the routing table.
Advantage:No overhead on the router CPU,No
bandwidth usage between routers, Security(administrator
only allows routing to certain networks).
Disadvantage: If one network is added to the
internetwork the administrator must add a route to it on all
routers. It is not feasible network because it would be a
full time job.

Dynamic - In dynamic routing, the path is fixed by the


protocol. The paths will be changing depending on the
length of the path. Always the shortest path is
preferred. It is the process of using protocol to find and
update routing tables on routers, and easier than static
or default routing.
Autonomous No. It is group of router our network
under single administrative control. unique number
from 1-65,535 to differentiate for other AS. Routing
updates of one AS is normally no forwarded other AS.
Default - When the destination is known, static and
dynamic routing is done. For unknown destinations,
default routing is employed. It works on stub networks,
means have only one exit port out of the network. To
configure a default route, use wild cards in the network
address and mask locations of a static route.

Routing Protocol Used by router to learn or


find path by sending and receiving updates
and decided best path which specific
destination. E.g. RIP, EIGRP.
Routed Protocol Used to carry network
traffic such as file download, upload e-mails,
application data etc. e.g. IP, SPX
Permanent If the interface is shut down or
he router cannot communicate to the next
hop router, the route is automatically
discarded from the routing table choosing the
permanent option keeps the entry in the
routing table no matters what happens.

Administrative Distance by default static


routes have an administrative distance of 1.
We can change the default value by adding an
administrative weight at the end of the
command. 0 255, for static routing 0-1. It is
used to rate trustworthiness of routing
information received on a router for a neighbor
router. Where 0 is the most trusted and 255
means traffic will be passed via this route.
Lowest value reliable.
Default administrative Distance: Directly
connected interface --- 0; Static Route --- 0,1;
EIGRP --- 90; OSPF --- 110; IGRP --- 100; IS-IS --115;
RIP --- 120; External EIGRP --- 170;
Unknown Destination --- 255

Example:
10.0.0.1/8
S0
E 0 192.168.1.150/24

Switch/hub
192.168.1.0/24
Location A

S0

10.0.0.2/8

E 0 192.168.2.150/24

Switch/hub
192.168.2.0/24
Location B

Router(config)# ip routing
Router# sh ip route (it shows all the directly connected
networks).
C 192.168.1.0/24 directly connected to E0
C 10.0.0.0/8

S0

C indicates connected networks.


Static Routing
Syntax
Router(config)# ip route (dest-network) (subnet mask)
(next hop address)

Location A
Router(config)# ip routing
Router(config)# ip route 192.168.2.0 255.255.255.0 10.0.0.2
Note* if we dont know the address of next hop, we can just
write the name of the hop.
Router(config)# ip route 192.168.2.0 255.255.255.0 S0

Location B
Router(config)# ip routing
Router(config)# ip route 192.168.1.0 255.255.255.0 10.0.0.1

Router# sh ip route
C 192.168.1.0/24 directly connected to E0
C 10.0.0.0/8

S0

S 192.168.2.0/24 [1/0] via 10.0.0.2


S represents static. [a/b] ~ [1/0], here a=1 is the
administrative distance value and b has no significance in
static routing. For static and default routing b can be 0 or
1. Lesser the administrative distance value, higher the
preference.

Tracert, Trace Route and Route


C:\> tracert
print.
C:\> route print
Router# trace route (gives the complete route)
Router# sh arp (to check MAC addresses)

Default Routing
Router(config)# ip routing
Router(config)#ip route DA (S/N mask next) (next hop
address)
Router(config)# ip route 0.0.0.0 0.0.0.0 s1

Router# sh ip route
C 192.168.1.0/24 directly connected to E0
C 10.0.0.0/8

to S0

S* 0.0.0.0/0

to S0

METRIC Metric is used by


protocol to decide best path reach
specific destination different
protocol take different approach
and deciding best path.
e.g. RIP use hop count as metric
while OSPF use and IGRP used
bandwidth and delay.

Classification Of Routing Protocols


Distance Vector
Hybrid Routing
Link State
Distance Vector: the distance vector approach
determines the direction and the distance to any link in the
internetwork. When the topology in a distance vector
routing protocol changes, routing table updates in the router
must occur. This update process proceeds step-by-step
router to router. E.g. RIP and IGRP.It is use local broadcast
255.255.255.255 to exchange routing updates
Link State : it recreates the exact topology of the entire
network(at least the partition of the network where the
router is situated).Typically called shortest path first, the
routers each create three separate tables. One of these
tables keeps track of directly attached neighbor E.g. OSPF.

Hybrid Routing : it combines aspects of


the link state and the distance vector
algorithm.
Functions of a distance vector routing
protocol.
Identification of source of information
Discovering routes
Select the best route
Maintain Route information

Note:
Maximum 15 paths.Hop count metric selects the
path. It is support load balancing updates 6 equal
cost path(By default 4 path)
Route updates are broadcast for every 30 seconds,
invalid period of 180 seconds and flush period is
240 seconds.
RIP works well in small networks but it is suffecient
on large networks with slow WAN links or on
networks with a large number of routers installed.
RIP Version1 uses only classful routing which means
that all devices in the network must use the same
subnet mask. This is because RIP Version1 does not
send updates with subnet mask information.

Enabling RIP Configuration


Router(config)# router rip
Router(config-router)# network (network ip S0, S1)
Router(config-router)# network (network ip e0)
Router# sh ip protocol (shows the current routing
protocol)
Router# sh ip route

IGRP
IGRP was created in part to overcome the
limitations of RIP (maximum hop count
of only 15, and a single routing metric)
when used within large networks. IGRP
supports multiple metrics for each
route. IGRP is considered a classful
routing protocol.

172.16.1.0

10.1.1.1
10.2.2.2
E0
S2 S2
S3
S3
10.1.1.2
10.2.2.3
172.16.1.1

Router rip
Network 172.16.0.0
Network 10.0.0.0

192.168.1.0
E0
192.168.1.1

Router rip
Network 10.0.0.0

Router rip
Network 192.168.1.0
Network 10.0.0.0

Syntaxes.

Configuring IGRP

Router(config)#router igrp autonomous number


This defines IGRP as the routing protocol.
Router(config-router)#Network network-ip
Selects directly connected networks.
Router(config-router)#variance multiplier
Configures unequal-cost load balancing by defining
difference between the best metric and the worst
acceptable metric.

Autonomous System 100


172.16.1.0

10.1.1.1
10.2.2.2
E0
S2 S2
S3
S3
10.1.1.2
10.2.2.3
172.16.1.1

Router igrp 100


Network 172.16.0.0
Network 10.0.0.0

Router igrp 100

192.168.1.0
E0
192.168.1.1

Router igrp 100

Network 10.0.0.0 Network 192.168.1.0


Network 10.0.0.0

IP Classless Command
Router(config)# ip classless
A router by default assumes that all the subnets of a
directly connected network should be present in the
routing table. If a packet is received with a destination
address, of an unknown subnet of directly attached
network, the router assumes that the subnet does not
exists and drops the packet. This happens even if
routing table has a default route.For the above condition
if IP Classless is configured, and if any packet is
received, then the router will match it to the default
route and forward it to the next hop specified by the
default route.

EIGRP
EIGRP is more of link state protocol.
EIGRP is still a distance vector protocol,
but it uses a different algorithm, called
the DUAL algorithm to calculate its
routes. Enhanced Interior Gateway
Routing Protocol (EIGRP) is considered
a scalable routing protocol. It is a
classless protocol permitting VLSMs,
route authentication and supernetting.
Routing updates are not performed
periodically.

Calculation of Wildcard Mask


WCM = BCM-SNM
1. 192.168.1.0/24
255.255.255.255
- 255.255.255. 0
0 . 0 . 0 .255
2. 192.168.1.0/27
255.255.255.255
- 255.255.255.224
0 . 0 . 0 . 31
3. 192.160.1.10

0.0.0.0

OSPF
OSPF(Open Short Path First) is of two types : 1) Single Area OSPF and
2) Multi Area OSPF.

Area0
S0
S0

Area2

IR
ABR

ABR

Internal Routers
IR

Area1

Area Border Router

OSPF under Single Area

S 0 192.168.1.195/252

Router A
E 0 1.33
192.168.1.32/
255.255.255.224

192.168.1.192/252 S 0

Router B
E 0 1.65
192.168.1.64/
255.255.255.224

(Config)# ip routing
(Config-Router)# router OSPF 6573
(Config-Router)# network 192.168.1.32 0.0.0.31 area 1
(Config-Router)# area 1 range 192.168.1.32
255.255.255.224
(Config-Router)# network 192.168.1.192 0.0.0.3 area 1
(Config-Router)# area 1 range 192.168.1.192
255.255.255.224

Configuration of Router B
--------------------------------

(Config)# ip routing
(Config-Router)# router OSPF 6573
(Config-Router)# network 192.168.1.64 0.0.0.31 area 1
(Config-Router)# area 1 range 192.168.1.64
255.255.255.224
(Config-Router)# network 192.168.1.195 0.0.0.3 area 1
(Config-Router)# area 1 range 192.168.1.195
255.255.255.252

OSPF under Different Areas

Area 0
Area 2

Area 1

192.168.1.0

Router A

Router B

E0

E0

1.50

5.50

192.168.5.0

Configuration of Router A
-------------------------------(Config)# ip routing
(Config-Router)# router OSPF 6573
(Config-Router)# network 192.168.1.0 0.0.0.255 area 1
(Config-Router)# area 1 range 192.168.1.0 255.255.255.0
(Config-Router)# network 172.16.0.0 0.0.255.255 area 0
(Config-Router)# area 0 range 172.16.0.0 255.255.0.0

Configuration of Router B
-------------------------------(Config)# ip routing
(Config-Router)# router OSPF 6573
(Config-Router)# network 192.168.5.0 0.0.0.255 area 2
(Config-Router)# area 2 range 192.168.5.0 255.255.255.0
(Config-Router)# network 172.16.0.0 0.0.255.255 area 0
(Config-Router)# area 0 range 172.16.0.0 255.255.0.0

Access Control List


It is also called Network Traffic Control
Management (NTCM). We can provide restrictions to
individual users, subnets and services etc.

ACL

Standard ACL

Extended ACL

Any access list is identified by its number.


S. A. L

1 99

Ex. A. L

100 - 199

Rules for creating and implementing


Access List
1. Access list must begin with the Deny Statements (If
exists) then Permit Statements must follow.
2. There must be at least one Permit Statement as an
Implicit Deny All always exists.
3. While Implementation of Access list, There must be
only one Access list per Interface, per direction and
per protocol.

Standard Access List


S 0 172.16.1.1
Router A

E 0 1.50
1.4

1.1

1.3

1.2

172.16.1.2 S 0
Router B

E 0 5.50
5.4

5.1

5.3

5.2

Syntax
Router(config)# Access-list ALNO P/D Src

Src-WCM

Router(config)# Int <name of interface>


Router(Config-if)#Ip Access-Group <Direction>

Configuration Standard Access-list For


Router A

Restricting particular user


(Config)# Access-list 1 deny 192.168.1.3 0.0.0.0
(Config)# Access-list 1 permit 0.0.0.0
255.255.255.255
or
Access-list 1 permit any
Restricting a Network
(Config)# Access-list 1 deny 192.168.3.0 0.0.0.255
(Config)# Access-list 1 permit any

Extended Access List

S 0 172.16.1.1

Router A
E 0 1.50

172.16.1.2 S 0

Router B
E 0 5.50

1.4

1.1

5.4

5.1

1.3

1.2

5.3

5.2

1.20

Configuration of Router A
(Config)# Access-list 101 deny TCP 192.168.5.0 0.0.0.255
192.168.1.20 0.0.0.0 eq FTP
(Config)# Access-list 101 permit IP any any

Implementation
(Config)#int E0
(config-if)# IP Access-group 101 Out

NAT(Network Address Translation)

S 0 172.16.1.1

Router A
E 0 1.50
1.4
192.168.1.3

172.16.1.2 S 0

Router B
E 0 5.50

1.1

5.4

5.1

1.2

5.3

5.2

Note : 192.168.1.3 is denied from entering the network of 5.0.So it will enter
with mask.

Configuration of Router A
-------------------------------# Config t
(Config)# int E 0
(Config-if)# ip address 192.168.1.50 255.255.255.0
(Config-if)# no shut
(Config-if)# exit
(Config)# int S 0
(Config-if)# ip address 172.16.1.1 255.255.0.0
(Config-if)# clock rate 56000
(Config-if)# bandwidth 64
(Config-if)# no shut
(Config-if)# exit
(Config)# ip routing
(Config-Router)# ip route 192.168.5.0 255.255.255.0 172.16.1.2
(Config)# int E 0
(Config-if)# ip nat inside

(Config)# int S 0
(Config-if)# ip nat outside
(Config)# access-list 1 permit 192.168.1.3 0.0.0.0
(Config)# ip nat inside source list 1 int S 0 overload

Configuration of Router B
-------------------------------# Config t
(Config)# int E 0
(Config-if)# ip address 192.168.5.50 255.255.255.0
(Config-if)# no shut
(Config-if)# exit
(Config)# int S 0
(Config-if)# ip address 172.16.1.2 255.255.0.0
(Config-if)# clock rate 56000
(Config-if)# bandwidth 64
(Config-if)# no shut
(Config-if)# exit

(Config)# ip routing
(Config-Router)# ip route 192.168.1.0 255.255.255.0 172.16.1.1
(Config)# access-list 10 deny 192.168.1.3 0.0.0.0
(Config)# access-list 10 permit any
(Config)# int E 0
(Config-if)# ip access-group 10 out

Note : Only Public IP can go to the Internetworking world.

A Scenario of providing Net access to the IP's of Router B


172.16.1.1

172.16.1.2

Routing
1.50

Router A

Switch
Leased line

192.168.1.99

Natting

5.50
Routing

Router B
5.0

Configuration of Router A
-------------------------------# Config t
(Config)# int E 0
(Config-if)# ip address 192.168.1.50 255.255.255.0
(Config-if)# no shut
(Config-if)# exit
(Config)# int S 0
(Config-if)# ip address 172.16.1.1 255.255.0.0
(Config-if)# clock rate 56000(for DCE)
(Config-if)# bandwidth 64
(Config-if)# no shut
(Config-if)# exit
(Config)# ip routing
(Config-Router)# ip route 0.0.0.0 0.0.0.0 192.168.1.99

(Config)# int E 0
(Config-if)# ip nat outside
(Config-if)# no shut
(Config-if)# exit
(Config)# int S 0
(Config-if)# ip nat inside
((Config-if)# exit
(Config)# access-list 10 permit 172.16.0.0 0.0.255.255
(Config)# ip nat inside source list 10 int E 0 overload

Configuration of Router B
-------------------------------# Config t
(Config)# int E 0
(Config-if)# ip address 192.168.5.50 255.255.255.0
(Config-if)# no shut
(Config-if)# exit

(Config)# int S 0
(Config-if)# ip address 172.16.1.2 255.255.0.0
(Config-if)# clock rate 56000
(Config-if)# bandwidth 64
(Config-if)# no shut
(Config-if)# exit
(Config)# int E 0
(Config-if)# ip nat inside
(Config-if)# no shut
(Config-if)# exit
(Config)# int S 0
(Config-if)# ip nat outside
(Config-if)# exit
(Config)# ip routing
(Config-Router)# ip route 0.0.0.0 0.0.0.0 172.16.1.1
(Config)# access-list 10 permit 192.168.5.0 0.0.0.255
(Config)# ip nat inside source list 10 int E 0 overload

PPP(Point-to-Point) using PAP protocol

Internet based leased line


S 0 172.16.1.1

Router A
(ISDN)
E 0 1.50

172.16.1.2 S 0

Router B
(Zoom)
E 0 5.50

1.4

1.1

5.4

5.1

1.3

1.2

5.3

5.2

NOTE : Passwords of both should be same.

Configuration of Router A
-------------------------------# Config t
(Config)# int E 0
(Config-if)# ip address 192.168.1.50 255.255.255.0
(Config-if)# no shut
(Config-if)# exit
(Config)# int S 0
(Config-if)# ip address 172.16.1.1 255.255.0.0
(Config-if)# clock rate 56000(for DCE)
(Config-if)# bandwidth 64
(Config-if)# no shut
(Config-if)# exit
(Config)# ip routing
(Config-Router)# ip route 192.168.5.0 255.255.255.0 172.16.1.2
(Config)# int S 0
(Config-if)# encapsulation ppp
(Config-if)# ppp authentication PAP
(Config-if)# ppp PAP sent-username zoom password cisco

Configuration of Router B
--------------------------------

# Config t
(Config)# int E 0
(Config-if)# ip address 192.168.5.50 255.255.255.0
(Config-if)# no shut
(Config-if)# exit
(Config)# int S 0
(Config-if)# ip address 172.16.1.2 255.255.0.0
(Config-if)# clock rate 56000(for DCE)
(Config-if)# bandwidth 64
(Config-if)# no shut
(Config-if)# exit
(Config)# ip routing
(Config-Router)# ip route 192.168.1.0 255.255.255.0 172.16.1.1
(Config)# int S 0
(Config-if)# encapsulation ppp
(Config-if)# ppp authentication PAP
(Config-if)# ppp PAP sent-username ISP password cisco

PPP(Point-to-Point) using CHAP protocol

Internet based leased line


S 0 172.16.1.1

Router A
(ISDN)
E 0 1.50

172.16.1.2 S 0

Router B
(Zoom)

E 0 5.50

1.4

1.1

5.4

5.1

1.3

1.2

5.3

5.2

NOTE : Passwords of both should be same.

Configuration of Router A
--------------------------------

# Config t
(Config)# int E 0
(Config-if)# ip address 192.168.1.50 255.255.255.0
(Config-if)# no shut
(Config-if)# exit
(Config)# int S 0
(Config-if)# ip address 172.16.1.1 255.255.0.0
(Config-if)# clock rate 56000(for DCE)
(Config-if)# bandwidth 64
(Config-if)# no shut
(Config-if)# exit
(Config)# ip routing
(Config-Router)# ip route 192.168.5.0 255.255.255.0 172.16.1.2
(Config)# int S 0
(Config-if)# encapsulation ppp
(Config-if)# ppp authentication CHAP
(Config-if)# ppp CHAP hostname zoom
(Config-if)# ppp CHAP password cisco

Configuration of Router B
--------------------------------

# Config t
(Config)# int E 0
(Config-if)# ip address 192.168.5.50 255.255.255.0
(Config-if)# no shut
(Config-if)# exit
(Config)# int S 0
(Config-if)# ip address 172.16.1.2 255.255.0.0
(Config-if)# clock rate 56000(for DCE)
(Config-if)# bandwidth 64
(Config-if)# no shut
(Config-if)# exit
(Config)# ip routing
(Config-Router)# ip route 192.168.1.0 255.255.255.0 172.16.1.1
(Config)# int S 0
(Config-if)# encapsulation ppp
(Config-if)# ppp authentication CHAP
(Config-if)# ppp CHAP hostname ISP
(Config-if)# ppp CHAP password cisco

DDR(Dial on Demand Routing)


ISP

S 0 172.16.1.1

172.16.1.2 S 0

Router A
E 0 1.50

Router B
E 0 5.50

1.4

1.1

5.4

5.1

1.3

1.2

5.3

5.2

# Config t
(Config)# isdn switch-type basic-net 3
(Config)# int E 0/1
(Config-if)# ip address 192.168.1.50 255.255.255.0
(Config-if)# no shut
(Config-if)# exit
(Config)# int Bri 1/0
(Config-if)# no ip address
(Config-if)# encapsulation ppp
(Config-if)# no cdp enable
(Config-if)# no shut
(Config-if)# exit
(Config)# int dialer 1
(Config-if)# ip address negotiated
(Config-if)# encapsulation ppp
(Config-if)# no cdp enable
(Config-if)# ppp authentication CHAP PAP callin
(Config-if)# ppp CHAP hostname unicomin@hd2
(Config-if)# ppp CHAP password password

(Config-if)# ppp PAP sent-username unicomin@hd2 password password


(Config-if)# dialer in-band
(Config-if)# dialer string 3328400
(Config-if)# dialer idle-time out 180
(Config-if)# dialer hold-queue 10
(Config-if)# exit
(Config)# access-list 1 permit 192.168.1.0 0.0.0.255
(Config)# dialer-list 1 protocol ip permit
((Config)# int bri 1/0
(Config-if)# dialer rotary-group 1
(Config-if)# no shut
(Config-if)# exit
(Config)# int dialer 1
(Config-if)# dialer-group 1
(Config-if)# exit
(Config)# ip routing
(Config-router)# ip route 0.0.0.0 0.0.0.0 dialer 1 2

(Config)# ip name-server 202.54.30.2


(Config)# ip name-server 202.54.2.30
(Config)# int E 0
(Config-if)# ip nat inside
(Config-if)# no shut
(Config-if)# exit
(Config)# int Bri 1/0
(Config-if)# ip nat outside
(Config-if)# no shut
(Config-if)# exit
(Config)# int dialer 1
(Config-if)# ip nat outside
(Config-if)# exit
(Config)# ip nat inside source list 1 int dialer 1 overload

Iso(OSI)
International organization for standardization
Iso has designed a reference model called osi reference model
(open system interconnection). It has 7 layers. It says that
Any n/w for comunication needs 7 layers
1. Application layer
The user uses application layer to send the data. The protocols
@ this layer are ftp,http,smtp(e-mail) telenet etc.
2. Presentation layer
Presentation layer takes the data from application layer and present
In different formats for securing reason. The services offered @
This layer are
Compression decompression
Coding decoding
Encryption - decryption

3. Session layer
Establishing the session or the conectivity n/w n/w 1 & n/w 2 is done
By the session layer.
It
1. Establishes a session
2. maintains it &
3. Terminates it b/w the application
4. Transport layer
End-end connectivity during a session b/w two application is done
By the transport layer. It also decides the type of connection like tcp
or udp i.e. connection oriented or connection less.
Services:
Sequencing
Flow ctrl, error detection & correction
Transport layer info + data is called segment.

5. Netwrok layer
Logical addressing is done at thenetwork layer i.e. source address &
destination address are attached to the data.
Protocols @network layer
Routed protocols
Eg: ip,ipx

routing protocols
eg: rip,igrp,ospf

Routed protocols: they always carry the data along with them
Routing protocol: they identify the path for routed protocol to
carry the data
At this layer routers & layer 3 switches forms packets.

Data link layer


MAC
Media access control
data

LLC
logical link control framing of

Ip address is lik the pincode & MAC address is like house number.
Here layer2 switches are used.
Wab protocols used at this layer are PPP,HDLC,FP,X.25 etc.
Here error checking CRC bits are added to the packets
DLL info+ packets --> frames

7 physical layer
Takes care of physical connectivity i.e connector,cable etc. here
Frames are converted to bits (1s & 0s).
The devices like hubs, repeaters,cables & connectors are used at
this layer.
I P Addressing
Now a days ip ver4 is followed. It is a 32-bit addressing scheme.
32bits are divided into 4 octets of 8 bits each.
i.e 8-8-8-8. i.e (1s & 0s)-(1s & 0s)-(1s & 0s)-(1s & 0s).
(binary format). The ip address is maximum of 255 & min of 0.
In future ip ver 6 is expected. It is 128 bit scheme.
Ip adresses are clsassified into different classes.

Class
Class
Class
Class
Class

A
B
C
D
E

0
128
192
224
240

127
191
223
239
255

8-8-8-8
M.S.O Most Significant Ocate considering MSO

Through out class A, the MSB 0 is constant in class B the


Msbs are 101 constant through out.
Class D & E are not used for internetworking class D is used for
Multicast network.
E research.
class A
0-0-0-0 should not be assigned for any divice
127-0-0-0 is reserved for loopback
127-0-0-1
127-0-0-
127-0-0-
usually reserved for loopback
127-0-0-
127-255-255-254

Hence 0 & 127 cannot be used for adressing so actual range will be
1 to 126.
All ip addresses are divided into two.
1.network I.d
2.host I.d
in class a address there is 1n\w I.d postion & 3 host I.d postion I,e
N-H-H-H..
Class A
N-H-H-H
Class B
N-N-H-H
Class C
N-N-N-H
Network Ids are represented by 1s & host ids are by 0s.

Types of ip adresses
IP address
public ip address

private ip address

Public network: the public address is defined with routing over the
Internet it is given by I.S.P & routing table is created on the internet.
Private network: for internal network I,e intranet, all the ip addresses
Are governed by a body called INTERNIC. If we are a part of asia
Pacefic then it is governed by APNIC.
We can run our private network with any ip addresses of our choice
But it should not be connected to internet.

Range of addresses for private network


Class A
10.0.0.0
to
10.255.255.255
Class B
172.16.0.0
to
172.31.255.255
Class C
192.168.0.0 to
192.168.255.255
Private ip addresses donot have routing.
To meet the demand of no.of networks, the network is broken
Into smaller networks called subnets.
Eg: find no.of subnets, hosts/s.n subnet mask & valid ip addresses
For a class c address.
192.168.1.0/24
24 shows the network bits
24= 3 octate position bits are enough, therefore no need to
borrow
Any bits from host position.
=24 network & no host
Default subet mask is 255.255.255.0 & valid ip addresses are

Switch
An essential component of lan. Switches are of different types like
Layer 2 layer 3, layer 4, layer 5..
Layer 2 switch :
Switch
hub
Layer 2
layer 1
b.w is equal @ all ports
b.w is shared
Identifies source with MAC
cannot identifiy the source
Broad cast occur, till mac table
alwaysbroad cast
Is built
Collision occur when both A&B
Many collisions
Wants to reach D.
1 broad cast domain 4 collision
1 broad cast domain 1 collision
Domains
domain

Switches
Access layer

Distribution layer

Core layer

Access layer swithc: catalyst 1912


Catalyst manufacturer, but it is now owned by cisco.
12 port switch

Switch
standard edition

enterprise edition

To configure VLANS,go for enterprose edition as standard edition


Will not support VLAN.
For uplinking or cascading 100mbps is minimum required.
Functions of switch
1. Adress learning
2. Filter & forwarding
3. Loop avoidance
1. Address learning
Booting
1.blocking state (15 secs)
2.Listening state (15 secs)
3.Learning stage (20 secs)
4.Forwarding stage (20 secs)

The switch will always learn the MAC address from the source itself
The source should atleast communicate once to learn the MAC address
2. Filter & forwarding :
store & forward
cut through
fragment free
On access layer the default is fragment free we can change to any
Of the3 mentioned above.
1.store & forward: it stores the whole information (1500 bytes
Ethernet) into buffer, then checks for errors, looks for destination
In MAC table and then forward.
2. Cut through: no error checking.as soon as a packet arrives
It looks into MAC table & forward.

3.loop avoidance: consider a scenario where pc1 wants to


communicate To pc2. Switch a makes entry of pc1 in its MAC
table as it is a new Switch. This looping is before the MAC table
I s made. This is called Initial flood or broad cast storm.
STP: spanning tree protocol. To avoid loops in case of a cascaded
Switch stp is enabled by default.

Вам также может понравиться