Sie sind auf Seite 1von 24

Network is the method to share hardware resources and software resources.

We can share the resources with the help of operating system like windows, Linux, UNIX etc. To connect multiple networks we have to use internetworking devices like router, bridge, layer 3, switches etc.

Administrator model for networking


Server software: - which software are used to giving services that are server software. Client software: - which gets services.

Server Software

Apache, IIS, Exchange 2003, FTP Server, Send Mail

Client Software

Internet Explorer, Outlook Express, Yahoo messenger, Cute FTP

P R O T O C O L Stack

TCP/IP, IPX/SPX, AppleTalk, Netbeui

P R O T O C O L Stack

NIC

NIC

Media

Media

If NIC are different then use bridge. If media is different then use Trans-Receive devices.

OSI (Open Systems Interconnection) Model


OSI model is the layer approach to design, develop and implement network. OSI provides following advantages: (i) Designing of network will be standard base. (ii) Development of new technology will be faster. (iii) Devices from multiple vendors can communicate with each other. (iv) Implementation and troubleshooting of network will be easy.

Software

Application Layer

Presentation Layer

Session Layer

Protocol Stack

Transport Layer

Network Layer NIC Data Link Layer

Media

Physical Layer

(1) Application Layer: Application layer accepts data and forward into the protocol stack. It creates user interface between application software and protocol stack.

(2) Presentation Layer: This layer decides presentation format of the data. It also able to performs other function like compression/decompression and encryption/decryption.

(3) Session Layer: This layer initiate, maintain and terminate sessions between different applications. Due to this layer multiple application software can be executed at the same time.

(4) Transport Layer: Transport layer is responsible for connection oriented and connection less communication. Transport layer also performs other functions like (i) Error checking (ii) Flow Control Buffering Windowing Multiplexing (iii) Sequencing (iv) Positive Acknowledgement (v) Response Connection Oriented Communication Sender Request for synchronize Virtual Connection Or Handshaking Negotiation Acknowledgement Send Send Data Transfer Acknowledgement Send Acknowledgement Terminate Or Receiver

Connection less Communication Sender Send (i) Error checking Transport layer generates cyclic redundancy check (CRC) and forward the CRC value to destination along with data. The other end will generate CRC according to data and match the CRC value with received value. If both are same, then data is accepted otherwise discard. Flow Control Flow control is used to control the flow of data during communication. For this purpose following methods are used: (a) Buffer Buffer is the temporary storage area. All the data is stored in the buffer memory and when communication ability is available the data is forward to another. (b) Windowing Windowing is the maximum amounts of the data that can be send to destination without receiving Acknowledgement. It is limit for buffer to send data without getting Acknowledgement. (c) Multiplexing Multiplexing means combining small data segment, which has same destination IP and same destination service. Sequencing Transport layer add sequence number to data, so that out of sequence data can be detected and rearranged in proper manner. Positive Acknowledgement and Response When data is send to destination, the destination will reply with Acknowledgement to indicate the positive reception of data. If Acknowledgement is not received within a specified time then the data is resend from buffer memory. Receiver

(ii)

(iii)

(iv)

(5) Network Layer


This layer performs function like logical addressing and path determination. Each networking device has a physical address that is MAC address. But logical addressing is easier to communicate on large size network.

Logical addressing defines network address and host address. This type of addressing is used to simplify implementation of large network. Some examples of logical addressing are: - IP addresses, IPX addresses etc. Path determination Network layer has different routing protocols like RIP, EIGRP, BGP, and ARP etc. to perform the path determination for different routing protocol. Network layer also perform other responsibilities like defining quality of service, fragmentation and protocol identification.

(6) Data Link Layer


The functions of Data Link layer are divided into two sub layers (i) Logical Link Control (ii) Media Access Control (i) (ii) Logical Link Control defines the encapsulation that will be used by the NIC to delivered data to destination. Some examples of Logical Link Control are ARPA (Ethernet), 802.11 wi-fi. Media Access Control defines methods to access the shared media and establish the identity with the help of MAC address. Some examples of Media Access Control are CSMA/CD, Token Passing.

(7) Physical Layer


Physical Layer is responsible to communicate bits over the media this layer deals with the standard defined for media and signals. This layer may also perform modulation and demodulation as required.

Data Encapsulation
Data Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Data* Data** Data*** Transport Header | Data Network Header | Segment Header | Packet | Trailer 10

= Segment = Packet = Frame = Bits

Data => Segment => Packet => Frames => Bits

Devices at different Layers


Physical Layer Devices
Hub, Modem, Media, DCE (Data comm. Equipment), CSU/DSU, Repeater, Media converter

R DTE

DCE CSU | DSU

Channel Service Unit Data Terminal Equipment

Data Service Unit

Data Link Layer


NIC, Switch, Bridge

Network Layer Device


Router, Layer 3 Switch

All Layers Device


PC, Firewall

DCE: - DCE convert the bits into signal & send them on media.
FDDI Fiber Distributed Data Interface Switch forwards frames on the base of MAC address. Router forwards packets on the base of IP address.

LAN Technologies
LAN

Ethernet 10 10000 mbps 100 m

Token Ring 4 16 mbps 100m

FDDI 4 16 mbps up to 2 km

Wi-Fi 1 108 mbps up to 40 km

Ethernet
Ethernet is the most popular LAN technology. It can support verity of media like copper (UTP, Coaxial, fiber optic). This technology supports wide range of speed from 10mbps to 10000 mbps. Ethernet at Logical Link Control To create logical link control Ethernet uses ARPA protocol also called IEEE802.3. Ethernet adds source MAC, destination MAC, error checking information and some other information to data. Ethernet encapsulation explain as follows Preamble 64 start frame Delimiter 8 Destination MAC 48 Source MAC 48 Length 16 Data up to 1500 bytes Frame Check Sequence 16

1010101010..10

10101011

Ethernet at Media Access Control Ethernet at Media Access Control layer uses CSMA/CD protocol to access the shared media. In these days, we use Ethernet with switches and in switches the technology is made CSMA/CA (Collision Avoidance). So this reason Ethernet is best compare with Token Ring, FDDI & Wi-Fi. Sense the carrier

Receive data

Yes

Is carri er busy ? No Do we have any data to communicat e? Yes No

Send data over media

Back off Algorithm


This algorithm runs when a collision created. 7

Detect the Collision

Stop transmitting receiving data

Generate a random Number

Try to communicate after delay X r.no.

Ethernet Family
Speed 10 10 10 10/100(present) 100 100 1000(Server) 1000 10000 Base band Base 2 Base 5 Base T Base TX Base T4 Base FX Base TX Base FX Base FX 200-meter 500-meter 100 meter 100 meter 100 meter up to 4 kms 100 meter up to 10 kms Coaxial cable Thick Coaxial cable Twisted Pair (UTP) UTP UTP 4 Pairs used Fiber Optic UTP Fiber Optic Fiber Optic

Ethernet frame Preamble An alternating 1,0 pattern provides a 5MHz clock at the start of each packet, which allows the receiving devices to lock the incoming bit stream. Start Frame Delimiter (SFD)/Synch The preamble is seven octets and the SFD is one octet (synch). The SFD is 10101011, where the last pair of 1s allows the receiver to come into the alternating 1,0 pattern somewhere in the middle and still sync up and detect the beginning of the data. Length or type 802.3 uses a length field, but the Ethernet frame uses a type field to identify the network layer protocol. 802.3 cannot identify the upper-layer protocol and must be used with a proprietary LAN-IPX, for example

Ethernet Cabling
Coaxial cabling Requirement: T connector, Terminator, BNC connector, Coaxial cable, 10 base2 lan cards T Connector BNC

Terminator

Lan card

This is used by BUS topology with 10 mbs Base 2 and Base 5. it is not used currently. UTP Cabling In the UTP, we have used different topology to create the network. (1) Hub / Switch

PC

PC

In any Ethernet UTP topology we have to use one of the two types of cables (1) Straight cable (2) Cross cable TX RX

Structure Cabling Requirement: Rack, patch panel, Switch/ Hub( Rack Mounable), patch cord, I/O connector, I/O box, UTP cable

Tool: - Punching tool

Problems of Ethernet technology


(3) (4) (5) (6) In Ethernet only one pc is able to send data at a time, due to this the bandwidth of Ethernet will be shared. Not an equal access technology. One pc will send data, which will be received by the all devices of network. Due to this data communication will not be secured. Collision will occur in the network and collision will lead to other problems like latency, delay and reduce throughput. Latency time duration to send packet from start to end. Throughput speed to send data (output) All PCs will have single broadcast domain. Due to this the bandwidth will be reduced.

(7)

EMI Electro Magnetic Indication

LAN Segmentation of Ethernet Network


There are three methods to perform LAN segmentation (1) LAN segmentation using bridge. (2) LAN segmentation using switches. (3) LAN segmentation using Routers. LAN segmentation using bridge. Existing Hub Hub Hub

New Port1 Bridge Port3

10

Port2 Hub 1st collision domain Hub 2nd collision domain 1 broadcast domain Working of Bridge: Working of Bridge explains in following steps: (i) Bridge can receives a frame in the buffer memory. (ii) The source MAC address of frame this stored to the bridging table. Port number MAC address 1 2 3 (iii) According to the destination MAC address the frame will be forwarded or drop (a) If destination MAC address of the frame is known then frame is forwarded to the particular port. (b) If destination MAC address is unknown by bridging table then frame is forwarded to the all port except receiving port. (c) If destination MAC address is broadcast MAC address ff.ff.ff.ff.ff.ff. (d) If destination MAC address exist on the same port from which port received then frame is dropped. Collision domain A group of pc, in which collision can occur, is called a collision domain. Broadcast domain A group of pc in which broadcast message is delivered is called broadcast domain. LAN segmentation using Switches Due to perform Lan segmentation using switches. We have to remove hubs from the network and replace hub with switches the working of switches. The working of switch is exactly like a bridge. A multiport bridge can be used as a bridge. Hub 3rd collision domain

Switch

Switch

Switch

11

1 broadcast domain Collision domain = micro segmentation Switchs working is same like bridge Advantages: (1) Bandwidth will not be shared and overall throughput will depend on wire speed of the switch. Wire speed is also called switching capacity measured in mbps or gbps. Minimum port on switches = 4 Maximum port on switches = 48 (2) Any time access technology. (3) One to one communication so that network will be more secures. (4) Switches will perform micro segmentation and no collision will occur in network. Lan segmentation using router If we are facing high concession in the n/w due to the large number of broadcast then we can divide broadcast domain of network. So that number of broadcast message will be reduced. Exist: Switch | Hub Switch | Hub Switch | Hub

New: R

Switch | Hub

Switch | Hub

Switch | Hub

1st Broadcast Domain 2nd Broadcast Domain 3rd Broadcast Domain Router is unicast. We have to install router between multiple switches to divide the broadcast domain. Each broadcast domain has to used different network address and router will provide inter network communication between them. Router operation When a pc has to send data to a different network address, then data will be forwarded to the router. It will analysis IP address of the data and obtain a route from the routing table. According to the route data will be dropped, If route not available.

12

Pc Architecture

Processor Memory controller RAM BIOS ROM HDD CMOS RAM FD CD D I/O Controller

K/B Controller

Keyboard

Display Card Serial Parallel USB Sound Card

V.D.U

Router Architecture LAN I/O Controller Memory Controller BIOS ROM RAM WAN Ports

Processor

Flash RAM O/S 13

Incomplete IOS NVRAM Startup Configuration Non-Volatile RAM (1) Processor Speed: - 20 MHz to 1GHz Architecture: - RISC Reduce Instruction set computer Manufacturers: - Motorola, IBM, Power PC, Texas, Dallis, Intel. (2) Flash RAM Flash Ram is the permanent read/write memory. This memory is used to store one or more copies of router o/s. Router o/s is also called IOS (Internetwork Operating System). Flash Ram stores the only o/s. The size of flash ram in the router is 4mb to 128mb. The flash ram may be available in one of the following three packages: SLMM Flash: - Single Line Memory Module PCMCIA Flash: - Personal Computer Memory Card Interface Architecture Compact Flash: - (Small Memory) IOS

(3) NVRAM NVRAM is a Non Volatile Random Access Memory. It is used to store the configuration of the Router. The size of NVRAM is 8 KB to 512 KB. (4) RAM Ram of the router is divided into two logical parts. (i) Primary RAM (ii) Shared RAM Primary RAM Primary RAM is used for: (a) Running copy of IOS. (b) Running configuration (c) Routing table (d) ARP table (IP address to MAC address) 14

(e) Processor & other data structure Shared RAM Shared RAM is used as a buffer memory to shared the data received from different interfaces. Size of ram in a router may vary from 2 mb to 512 mb. The types of memory that may be present in a ram are: (a) DRAM -> Dynamic RAM (b) EDORAM -> Extended Data Out Ram (c) SDRAM -> Synchronous Dynamic Ram (5) BIOS ROM The BIOS ROM is the permanent ROM. This memory is used to store following program & Routines: (i) Boot strap loader (doing booting) (ii) Power on self test routines (iii) Incomplete IOS (iv) ROM Monitor (ROM-MON) Booting difference between router & Pc Router ROM-MON Incomplete IOS FLASH

PC CMOS Setup Bootable Floppy/CD O/S From HDD

Router Interfaces & Ports


Interface is used to connect LAN networks or wan networks to the router. Interface will use protocol stacks to send/receive data. Ports are used for the configuration of routers. Ports are not used to connect different n/ws. The primary purpose of port is the management of router. Router Interfaces Interface Connector Ethernet RJ45 AUI Fast Ethernet Serial DB15 RJ45 DB60 color yellow yellow yellow blue Speed 10 mbps 10 mbps 100 mbps E1-2 mbps Use to connect Ethernet LAN Using UTP media to connect Ethernet LAN Using Trans-Receiver to connect Ethernet LAN to connect WAN

15

T1-1.5 mbps Smart Serial BRI ISDN VOIP SS RJ45 RJ11 blue orange white 192 kbps -

Technology like Leased Lines, Radio link, Frame Relay, X.25, ATM to connect ISDN Basic Rate Interface to connect Phones, Fax, EPABX

AUI Attachment Unit Interface EPABX Electronic Private Automatic Branch PSTN Public Switched Telephone Network Router Ports Port Console Auxiliary Connector RJ45 RJ45 Color sky blue black Speed 9600bps depend on Modem Details used for configuration Using PC to connect remote router using PSTN line to connect remote router with telnet protocol via interface

Virtual terminal Vty

Types of routers:(1) Fixed configuration router (2) Modular router (3) Chassis based router

Other interfaces:(1) Token Ring RJ45 Violet To connect Token Ring network. (2) E1/T1 controller RJ45 White (3) ADSL RJ11 (Asynchronous Digital Subscriber Line) 4/16 mbps E1-2048 kbps T1-1544 kbps up-640 kbps Down-8 mbps

Router Access Modes


When we access router command prompt the router will display different modes. According to the modes, privileges and rights are assigned to the user.

16

User mode In this mode, we can display basic parameter and status of the router we can test connectivity and perform telnet to other devices. In this mode we are not enable to manage & configure router. Privileged mode In this mode, we can display all information, configuration, perform administration task, debugging, testing and connectivity with other devices. We are not able to perform here configuration editing of the router. The command to enter in this mode is enable. We have to enter enable password or enable secret password to enter in this mode. Enable secret has more priority than enable password. If both passwords are configured then only enable secret will work. Global configuration This mode is used for the configuration of global parameters in the router. Global parameters applied to the entire router. For e.g: - router hostname or access list of router The command enter in this mode is configure terminal. Line configuration mode This mode is used to configure lines like console, vty and auxiliary. There are main types of line that are configured. (i) Console router(config)#line console 0 (ii) Auxiliary router(config)#line aux 0 (iii) Telnet or vty router(config)#line vty 0 4 Interface configuration mode This mode is used to configure router interfaces. For e.g:- Ethernet, Serial, BRI etc. Router(config)#interface <type> <number> Router(config)#interface serial 1 Routing configuration mode This mode is used to configure routing protocol like RIP, EIGRP, OSPF etc. Router(config)#router <protocol> [<option>] Router(config)#router rip

17

Router(config)#router eigrp 10

Configuring Password
There are five types of password available in a router (1) Console Password router#configure terminal router(config)#line console 0 router(config-line)#password <word> router(config-line)#login router(config-line)#exit to erase password do all steps with no command. (2) Vty Password router>enable router#configure terminal router(config)#line vty 0 4 router(config-line)#password <word> router(config-line)#login router(config-line)#exit (3) Auxiliary Password router#configure terminal router(config)#line Aux 0 router(config-line)#password <word> router(config-line)#login router(config-line)#exit (4) Enable Password router>enable router#configure terminal router(config)#enable password <word> router(config)#exit (5) Enable Secret Password Enable Password is the clear text password. It is stored as clear text in configuration where as enable secret password is the encrypted password with MD5 (Media Digest 5) algorithm. Router>enable Router#configure terminal Router(config)#enable secret <word> Router(config)#exit

18

Encryption all passwords All passwords other than enable secret password are clear text password. We can encrypt all passwords using level 7 algorithm. The command to encrypt all password are Router#configure terminal Router(config)#service password-encryption

Managing Configuration
There are two types of configuration present in a router (1) Startup Configuration (2) Running Configuration (1) Startup configuration is stored in the NVRAM. Startup configuration is used to save settings in a router. Startup configuration is loaded at the time of booting in to the Primary RAM. (2) Running Configuration is present in the Primary RAM wherever we run a command for configuration, this command is written in the running configuration. To save configuration Router#copy running-configuration startup-configuration Or Router#write To abort configuration Router#copy startup-configuration running-configuration To display running-configuration Router#show running-configuration To display startup configuration Router#show startup-configuration To erase old configuration Router#erase startup-configuration Router#reload Save[y/n]:n

Access Router using console


Com/Port--------DB9------------------------Console Cisco Console RJ45 Router In windows

19

Click start=> program=> accessories=> comm.(communication)=> hyperterminal Type any name Select com port Set settings Speed 9600 stop bit 1 Data bits 8 Parity no Click ok Press shift+home to default prompt

CISCO command line shortcuts


Tab to auto complete command ? To take help Ctrl+P to recall previous command Ctrl+N next command Ctrl+Z alternate to end command Ctrl+C to abort Q to quit Ctrl+Shift+6 to break connection

Command line editing shortcuts


Ctrl+A to move cursor at start of line Ctrl+E to move cursor at end of line Ctrl+ B to move cursor one character back Ctrl+F to move cursor one character forward Ctrl+W to delete word one by one word back Ctrl+D to delete one character Ctrl+U to delete one line Esc+B to take cursor one word back Esc+F to take cursor one word forward

Configuring HostName
Router#configure terminal Router#hostname <name> <name>#exit or end or /\z

Configuration Interfaces
Interfaces configuration is one of the most important part of the router configuration. By default, all interfaces of Cisco router are in disabled mode. We have to use different commands as our requirement to enable and configure the interface. Configuring IP, Mask and Enabling the Interface Router#configure terminal 20

Router(config)#interface <type> <no> Router(config-if)#ip address <ip> <mask> Router(config-if)#no shutdown Router(config-if)#exit Interface Numbers Interface numbers start from 0 for each type of interface some routers will directly used interface number while other router will use slot no/port no addressing technique. Eth 0 Serial 0 Serial 1 Slot 1 Serial 1/0 Serial 1/1 Slot 0 Serial 0/0

To configure Interface description Router#configure terminal Router(config)#interface <type> <no> Router(config-if)#description <line> Configuring optional parameter on LAN interface Router#configure terminal Router(config)#interface <type> <no> Router(config-if)#duplex <half|full|auto> Router(config-if)#speed <10|100|auto> Router(config-if)#end Configuring optional parameter on WAN interface Router#configure terminal Router(config)#interfac <type> <no> Router(config-if)#encapsulation <protocol> Router(config-if)#clock rate <value> Router(config-if)#end

To display interface status Router#show interfaces (to show all interfaces) Router#show interface <type> <no> This command will display following parameters about an interface 1) Status 2) Mac address 3) IP address 4) Subnet mask 5) Hardware type / manufacturer 6) Bandwidth 7) Reliability

21

8) 9) Rx load) 10) 11) 12) 13) 14)

Delay Load ( Tx load

Encapsulation ARP type (if applicable) Keep alive Queuing strategy Input queue details Output queue details 15) Traffic rate (In packet per second, bit per second) 16) Input packet details 17) Output packet details 18) Modem signals (wan interface only) 19) M.T.U maximum transmission rate (mostly 1500 bytes) Configuring sub interface Sub interface are required in different scenario. For e.g:- in Ethernet we need sub interface for Vlan communication and in frame relay we need sub interface for multipoint connectivity. Sub interface means creating a logical interface from physical interface. Router#config ter Router(config)#interface <type> <no> <subint no> Router(config-subif)# Router(config-subif)#end Router(config)#interface serial 0.2 Configuring secondary IP Router#config terminal Router(config)#interface <type> <no> Router(config-if)#IP address 192.168.10.5 255.255.255.0 Router(config-if)#IP address 192.168.10.18 255.255.255.0 secondary Router(config-if)#no shutdown (to enable the interface because they always shutdown) Router(config-if)#exit Router#show run (to display secondary IP)

Managing Command Line History


We can use CTRL+P & CTRL+N shortcuts to display command history. By default router will up to 10 commands. In the command line history, we can use following commands to edit this setting To display commands present in history Router#show history

22

To display history size Router#show terminal To change history size Router#config terminal Router(config)#line console 0 Router(config-if)#history size <value(0-256)> Router(config-if)#exit

Configuring Banners
Banners are just a message that can appear at different prompts according to the type. Different banners are: Message of the day (motd) This banner appear at every access method Login Appear before login prompt Exec Appear after we enter to the execution mode Incoming Appear for incoming connections Syntax:Router#config terminal Router(config)#banner <type> <delimation char> Text Massage <delimation char> Router(config)# Example:Router#config terminal Router(config)#banner motd $ This router is distribution 3600 router connected to Reliance $ Router(config)# To configure synchronous logging on console Router#config terminal Router(config)#line console 0 Router(config)#logging synchronous Router(config)#exit

23

Configuring Router Clock


We can configure router clock with the help of two methods. (1) Configure clock locally (2) Configure clock on NTP server (Network Time Protocol) Router does not have battery to save the clock setting. So that clock will reset to the default on reboot. To display clock Router#show clock To configure clock Router#clock set hh:mm:ss day month year 00-23: 00-59:00-59 1-31 JAN-DEC 1993-2035 To configure clock from NTP server Router#config terminal Router(config)#ntp server <IP address> Router(config)#exit C:\>ping pool.ntp.org To get ntp server ip from internet C:\>route print

24

Das könnte Ihnen auch gefallen