Beruflich Dokumente
Kultur Dokumente
We can share the resources with the help of operating system like windows, Linux, UNIX etc. To connect multiple networks we have to use internetworking devices like router, bridge, layer 3, switches etc.
Server Software
Client Software
P R O T O C O L Stack
P R O T O C O L Stack
NIC
NIC
Media
Media
If NIC are different then use bridge. If media is different then use Trans-Receive devices.
Software
Application Layer
Presentation Layer
Session Layer
Protocol Stack
Transport Layer
Media
Physical Layer
(1) Application Layer: Application layer accepts data and forward into the protocol stack. It creates user interface between application software and protocol stack.
(2) Presentation Layer: This layer decides presentation format of the data. It also able to performs other function like compression/decompression and encryption/decryption.
(3) Session Layer: This layer initiate, maintain and terminate sessions between different applications. Due to this layer multiple application software can be executed at the same time.
(4) Transport Layer: Transport layer is responsible for connection oriented and connection less communication. Transport layer also performs other functions like (i) Error checking (ii) Flow Control Buffering Windowing Multiplexing (iii) Sequencing (iv) Positive Acknowledgement (v) Response Connection Oriented Communication Sender Request for synchronize Virtual Connection Or Handshaking Negotiation Acknowledgement Send Send Data Transfer Acknowledgement Send Acknowledgement Terminate Or Receiver
Connection less Communication Sender Send (i) Error checking Transport layer generates cyclic redundancy check (CRC) and forward the CRC value to destination along with data. The other end will generate CRC according to data and match the CRC value with received value. If both are same, then data is accepted otherwise discard. Flow Control Flow control is used to control the flow of data during communication. For this purpose following methods are used: (a) Buffer Buffer is the temporary storage area. All the data is stored in the buffer memory and when communication ability is available the data is forward to another. (b) Windowing Windowing is the maximum amounts of the data that can be send to destination without receiving Acknowledgement. It is limit for buffer to send data without getting Acknowledgement. (c) Multiplexing Multiplexing means combining small data segment, which has same destination IP and same destination service. Sequencing Transport layer add sequence number to data, so that out of sequence data can be detected and rearranged in proper manner. Positive Acknowledgement and Response When data is send to destination, the destination will reply with Acknowledgement to indicate the positive reception of data. If Acknowledgement is not received within a specified time then the data is resend from buffer memory. Receiver
(ii)
(iii)
(iv)
Logical addressing defines network address and host address. This type of addressing is used to simplify implementation of large network. Some examples of logical addressing are: - IP addresses, IPX addresses etc. Path determination Network layer has different routing protocols like RIP, EIGRP, BGP, and ARP etc. to perform the path determination for different routing protocol. Network layer also perform other responsibilities like defining quality of service, fragmentation and protocol identification.
Data Encapsulation
Data Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Data* Data** Data*** Transport Header | Data Network Header | Segment Header | Packet | Trailer 10
R DTE
DCE: - DCE convert the bits into signal & send them on media.
FDDI Fiber Distributed Data Interface Switch forwards frames on the base of MAC address. Router forwards packets on the base of IP address.
LAN Technologies
LAN
FDDI 4 16 mbps up to 2 km
Ethernet
Ethernet is the most popular LAN technology. It can support verity of media like copper (UTP, Coaxial, fiber optic). This technology supports wide range of speed from 10mbps to 10000 mbps. Ethernet at Logical Link Control To create logical link control Ethernet uses ARPA protocol also called IEEE802.3. Ethernet adds source MAC, destination MAC, error checking information and some other information to data. Ethernet encapsulation explain as follows Preamble 64 start frame Delimiter 8 Destination MAC 48 Source MAC 48 Length 16 Data up to 1500 bytes Frame Check Sequence 16
1010101010..10
10101011
Ethernet at Media Access Control Ethernet at Media Access Control layer uses CSMA/CD protocol to access the shared media. In these days, we use Ethernet with switches and in switches the technology is made CSMA/CA (Collision Avoidance). So this reason Ethernet is best compare with Token Ring, FDDI & Wi-Fi. Sense the carrier
Receive data
Yes
Ethernet Family
Speed 10 10 10 10/100(present) 100 100 1000(Server) 1000 10000 Base band Base 2 Base 5 Base T Base TX Base T4 Base FX Base TX Base FX Base FX 200-meter 500-meter 100 meter 100 meter 100 meter up to 4 kms 100 meter up to 10 kms Coaxial cable Thick Coaxial cable Twisted Pair (UTP) UTP UTP 4 Pairs used Fiber Optic UTP Fiber Optic Fiber Optic
Ethernet frame Preamble An alternating 1,0 pattern provides a 5MHz clock at the start of each packet, which allows the receiving devices to lock the incoming bit stream. Start Frame Delimiter (SFD)/Synch The preamble is seven octets and the SFD is one octet (synch). The SFD is 10101011, where the last pair of 1s allows the receiver to come into the alternating 1,0 pattern somewhere in the middle and still sync up and detect the beginning of the data. Length or type 802.3 uses a length field, but the Ethernet frame uses a type field to identify the network layer protocol. 802.3 cannot identify the upper-layer protocol and must be used with a proprietary LAN-IPX, for example
Ethernet Cabling
Coaxial cabling Requirement: T connector, Terminator, BNC connector, Coaxial cable, 10 base2 lan cards T Connector BNC
Terminator
Lan card
This is used by BUS topology with 10 mbs Base 2 and Base 5. it is not used currently. UTP Cabling In the UTP, we have used different topology to create the network. (1) Hub / Switch
PC
PC
In any Ethernet UTP topology we have to use one of the two types of cables (1) Straight cable (2) Cross cable TX RX
Structure Cabling Requirement: Rack, patch panel, Switch/ Hub( Rack Mounable), patch cord, I/O connector, I/O box, UTP cable
(7)
10
Port2 Hub 1st collision domain Hub 2nd collision domain 1 broadcast domain Working of Bridge: Working of Bridge explains in following steps: (i) Bridge can receives a frame in the buffer memory. (ii) The source MAC address of frame this stored to the bridging table. Port number MAC address 1 2 3 (iii) According to the destination MAC address the frame will be forwarded or drop (a) If destination MAC address of the frame is known then frame is forwarded to the particular port. (b) If destination MAC address is unknown by bridging table then frame is forwarded to the all port except receiving port. (c) If destination MAC address is broadcast MAC address ff.ff.ff.ff.ff.ff. (d) If destination MAC address exist on the same port from which port received then frame is dropped. Collision domain A group of pc, in which collision can occur, is called a collision domain. Broadcast domain A group of pc in which broadcast message is delivered is called broadcast domain. LAN segmentation using Switches Due to perform Lan segmentation using switches. We have to remove hubs from the network and replace hub with switches the working of switches. The working of switch is exactly like a bridge. A multiport bridge can be used as a bridge. Hub 3rd collision domain
Switch
Switch
Switch
11
1 broadcast domain Collision domain = micro segmentation Switchs working is same like bridge Advantages: (1) Bandwidth will not be shared and overall throughput will depend on wire speed of the switch. Wire speed is also called switching capacity measured in mbps or gbps. Minimum port on switches = 4 Maximum port on switches = 48 (2) Any time access technology. (3) One to one communication so that network will be more secures. (4) Switches will perform micro segmentation and no collision will occur in network. Lan segmentation using router If we are facing high concession in the n/w due to the large number of broadcast then we can divide broadcast domain of network. So that number of broadcast message will be reduced. Exist: Switch | Hub Switch | Hub Switch | Hub
New: R
Switch | Hub
Switch | Hub
Switch | Hub
1st Broadcast Domain 2nd Broadcast Domain 3rd Broadcast Domain Router is unicast. We have to install router between multiple switches to divide the broadcast domain. Each broadcast domain has to used different network address and router will provide inter network communication between them. Router operation When a pc has to send data to a different network address, then data will be forwarded to the router. It will analysis IP address of the data and obtain a route from the routing table. According to the route data will be dropped, If route not available.
12
Pc Architecture
Processor Memory controller RAM BIOS ROM HDD CMOS RAM FD CD D I/O Controller
K/B Controller
Keyboard
V.D.U
Router Architecture LAN I/O Controller Memory Controller BIOS ROM RAM WAN Ports
Processor
Incomplete IOS NVRAM Startup Configuration Non-Volatile RAM (1) Processor Speed: - 20 MHz to 1GHz Architecture: - RISC Reduce Instruction set computer Manufacturers: - Motorola, IBM, Power PC, Texas, Dallis, Intel. (2) Flash RAM Flash Ram is the permanent read/write memory. This memory is used to store one or more copies of router o/s. Router o/s is also called IOS (Internetwork Operating System). Flash Ram stores the only o/s. The size of flash ram in the router is 4mb to 128mb. The flash ram may be available in one of the following three packages: SLMM Flash: - Single Line Memory Module PCMCIA Flash: - Personal Computer Memory Card Interface Architecture Compact Flash: - (Small Memory) IOS
(3) NVRAM NVRAM is a Non Volatile Random Access Memory. It is used to store the configuration of the Router. The size of NVRAM is 8 KB to 512 KB. (4) RAM Ram of the router is divided into two logical parts. (i) Primary RAM (ii) Shared RAM Primary RAM Primary RAM is used for: (a) Running copy of IOS. (b) Running configuration (c) Routing table (d) ARP table (IP address to MAC address) 14
(e) Processor & other data structure Shared RAM Shared RAM is used as a buffer memory to shared the data received from different interfaces. Size of ram in a router may vary from 2 mb to 512 mb. The types of memory that may be present in a ram are: (a) DRAM -> Dynamic RAM (b) EDORAM -> Extended Data Out Ram (c) SDRAM -> Synchronous Dynamic Ram (5) BIOS ROM The BIOS ROM is the permanent ROM. This memory is used to store following program & Routines: (i) Boot strap loader (doing booting) (ii) Power on self test routines (iii) Incomplete IOS (iv) ROM Monitor (ROM-MON) Booting difference between router & Pc Router ROM-MON Incomplete IOS FLASH
15
T1-1.5 mbps Smart Serial BRI ISDN VOIP SS RJ45 RJ11 blue orange white 192 kbps -
Technology like Leased Lines, Radio link, Frame Relay, X.25, ATM to connect ISDN Basic Rate Interface to connect Phones, Fax, EPABX
AUI Attachment Unit Interface EPABX Electronic Private Automatic Branch PSTN Public Switched Telephone Network Router Ports Port Console Auxiliary Connector RJ45 RJ45 Color sky blue black Speed 9600bps depend on Modem Details used for configuration Using PC to connect remote router using PSTN line to connect remote router with telnet protocol via interface
Types of routers:(1) Fixed configuration router (2) Modular router (3) Chassis based router
Other interfaces:(1) Token Ring RJ45 Violet To connect Token Ring network. (2) E1/T1 controller RJ45 White (3) ADSL RJ11 (Asynchronous Digital Subscriber Line) 4/16 mbps E1-2048 kbps T1-1544 kbps up-640 kbps Down-8 mbps
16
User mode In this mode, we can display basic parameter and status of the router we can test connectivity and perform telnet to other devices. In this mode we are not enable to manage & configure router. Privileged mode In this mode, we can display all information, configuration, perform administration task, debugging, testing and connectivity with other devices. We are not able to perform here configuration editing of the router. The command to enter in this mode is enable. We have to enter enable password or enable secret password to enter in this mode. Enable secret has more priority than enable password. If both passwords are configured then only enable secret will work. Global configuration This mode is used for the configuration of global parameters in the router. Global parameters applied to the entire router. For e.g: - router hostname or access list of router The command enter in this mode is configure terminal. Line configuration mode This mode is used to configure lines like console, vty and auxiliary. There are main types of line that are configured. (i) Console router(config)#line console 0 (ii) Auxiliary router(config)#line aux 0 (iii) Telnet or vty router(config)#line vty 0 4 Interface configuration mode This mode is used to configure router interfaces. For e.g:- Ethernet, Serial, BRI etc. Router(config)#interface <type> <number> Router(config)#interface serial 1 Routing configuration mode This mode is used to configure routing protocol like RIP, EIGRP, OSPF etc. Router(config)#router <protocol> [<option>] Router(config)#router rip
17
Router(config)#router eigrp 10
Configuring Password
There are five types of password available in a router (1) Console Password router#configure terminal router(config)#line console 0 router(config-line)#password <word> router(config-line)#login router(config-line)#exit to erase password do all steps with no command. (2) Vty Password router>enable router#configure terminal router(config)#line vty 0 4 router(config-line)#password <word> router(config-line)#login router(config-line)#exit (3) Auxiliary Password router#configure terminal router(config)#line Aux 0 router(config-line)#password <word> router(config-line)#login router(config-line)#exit (4) Enable Password router>enable router#configure terminal router(config)#enable password <word> router(config)#exit (5) Enable Secret Password Enable Password is the clear text password. It is stored as clear text in configuration where as enable secret password is the encrypted password with MD5 (Media Digest 5) algorithm. Router>enable Router#configure terminal Router(config)#enable secret <word> Router(config)#exit
18
Encryption all passwords All passwords other than enable secret password are clear text password. We can encrypt all passwords using level 7 algorithm. The command to encrypt all password are Router#configure terminal Router(config)#service password-encryption
Managing Configuration
There are two types of configuration present in a router (1) Startup Configuration (2) Running Configuration (1) Startup configuration is stored in the NVRAM. Startup configuration is used to save settings in a router. Startup configuration is loaded at the time of booting in to the Primary RAM. (2) Running Configuration is present in the Primary RAM wherever we run a command for configuration, this command is written in the running configuration. To save configuration Router#copy running-configuration startup-configuration Or Router#write To abort configuration Router#copy startup-configuration running-configuration To display running-configuration Router#show running-configuration To display startup configuration Router#show startup-configuration To erase old configuration Router#erase startup-configuration Router#reload Save[y/n]:n
19
Click start=> program=> accessories=> comm.(communication)=> hyperterminal Type any name Select com port Set settings Speed 9600 stop bit 1 Data bits 8 Parity no Click ok Press shift+home to default prompt
Configuring HostName
Router#configure terminal Router#hostname <name> <name>#exit or end or /\z
Configuration Interfaces
Interfaces configuration is one of the most important part of the router configuration. By default, all interfaces of Cisco router are in disabled mode. We have to use different commands as our requirement to enable and configure the interface. Configuring IP, Mask and Enabling the Interface Router#configure terminal 20
Router(config)#interface <type> <no> Router(config-if)#ip address <ip> <mask> Router(config-if)#no shutdown Router(config-if)#exit Interface Numbers Interface numbers start from 0 for each type of interface some routers will directly used interface number while other router will use slot no/port no addressing technique. Eth 0 Serial 0 Serial 1 Slot 1 Serial 1/0 Serial 1/1 Slot 0 Serial 0/0
To configure Interface description Router#configure terminal Router(config)#interface <type> <no> Router(config-if)#description <line> Configuring optional parameter on LAN interface Router#configure terminal Router(config)#interface <type> <no> Router(config-if)#duplex <half|full|auto> Router(config-if)#speed <10|100|auto> Router(config-if)#end Configuring optional parameter on WAN interface Router#configure terminal Router(config)#interfac <type> <no> Router(config-if)#encapsulation <protocol> Router(config-if)#clock rate <value> Router(config-if)#end
To display interface status Router#show interfaces (to show all interfaces) Router#show interface <type> <no> This command will display following parameters about an interface 1) Status 2) Mac address 3) IP address 4) Subnet mask 5) Hardware type / manufacturer 6) Bandwidth 7) Reliability
21
Encapsulation ARP type (if applicable) Keep alive Queuing strategy Input queue details Output queue details 15) Traffic rate (In packet per second, bit per second) 16) Input packet details 17) Output packet details 18) Modem signals (wan interface only) 19) M.T.U maximum transmission rate (mostly 1500 bytes) Configuring sub interface Sub interface are required in different scenario. For e.g:- in Ethernet we need sub interface for Vlan communication and in frame relay we need sub interface for multipoint connectivity. Sub interface means creating a logical interface from physical interface. Router#config ter Router(config)#interface <type> <no> <subint no> Router(config-subif)# Router(config-subif)#end Router(config)#interface serial 0.2 Configuring secondary IP Router#config terminal Router(config)#interface <type> <no> Router(config-if)#IP address 192.168.10.5 255.255.255.0 Router(config-if)#IP address 192.168.10.18 255.255.255.0 secondary Router(config-if)#no shutdown (to enable the interface because they always shutdown) Router(config-if)#exit Router#show run (to display secondary IP)
22
To display history size Router#show terminal To change history size Router#config terminal Router(config)#line console 0 Router(config-if)#history size <value(0-256)> Router(config-if)#exit
Configuring Banners
Banners are just a message that can appear at different prompts according to the type. Different banners are: Message of the day (motd) This banner appear at every access method Login Appear before login prompt Exec Appear after we enter to the execution mode Incoming Appear for incoming connections Syntax:Router#config terminal Router(config)#banner <type> <delimation char> Text Massage <delimation char> Router(config)# Example:Router#config terminal Router(config)#banner motd $ This router is distribution 3600 router connected to Reliance $ Router(config)# To configure synchronous logging on console Router#config terminal Router(config)#line console 0 Router(config)#logging synchronous Router(config)#exit
23
24