Ccna Overview
Ccna Overview
INTRODUCTION TO NETWORKING
COMMUNICATION MODES
1. 2. 3. Simplex (one way communication) Half Duplex (two way communication but not simultaneously) Full Duplex (two way communication simultaneously)
Page | 1
www.pakitsolutions.com
Modular Switch Such switches in which we can add the additional cards when need. Layer-2 Switches Such switches which only do switching. Examples: (CISCO Express 500) and (CISCO Catalyst 2940, 2950, 2960 series). Layer-3 Switches Such switches which can do switching as well as routing. Example: (CISCO Catalyst 3550, 360, 370, 4500, 6500 Series). ROUTER It is a internetworking device (WAN), they based on microprocessor. Cisco Switch And Router Hardware Components 1) RAM RAM It is such memory where the running configuration (user configuration) exists. NVRAM It is such memory where the data stored permanently and this configured data is refer by the term start-up-configuration. FLASH It is such memory where the IOS present and here the data also present permanently. ROM It is such memory where all modes of switch or router exist, these modes called the ROM monitor mode; they come after the IOS load. 2) NVRAM 3) FLASH 4) ROM
Page | 2
www.pakitsolutions.com
At Post point, the hardware is check. At Flash point, IOS files or IOS check.
There should be multiple data centers for easy data recovery There should be multiple backup links to reduce single point of failure.
Network Media
1. Guided media: Wired network. Examples are coaxial, UTP, STP, Fiber optic cable 2. Un-guided media: Wireless network.
UTP categorization
CAT 1: use only for voice CAT 2: use only for voice CAT 3: support data and voice CAT 4: data and voice, 4Mbps CAT 5: data and voice, 100Mbps CAT 5E / 6: 1000Mbps or up to 1Gbps
Page | 4
www.pakitsolutions.com
STP (shielded twisted pair cable) It has extra insulation It is use in special cases where EMI is more as in factories.
There are two categories of fiber optic cables 1. Multimode fiber (MM) 2. Single mode fiber (SM)
Multimode fiber
LED is used to inject the light In multimode fiber. Number of light rays is passing through reflection process in this mode of fiber. Data rate is up to 10Gbps in multimode fiber. Distance is 500m
Network topologies
Star topology Each device is connected to a central device which is a switch/hub. Switch is commonly used because it is an intelligent device as compare to hub. Also switch is a configurable device. Through switch we can manage whole network. Star topology is also called hub and spoke topology The PCs are connected to the central device through a cable normally UTP but we may use fiber optic etc. This is the topology which is used nowadays.
Page | 5
www.pakitsolutions.com
Bus topology Co-axial cable is used to connect the devices. The data rate of this cable is 10Mbps. There is a single point of failure means if any one cable is broken then whole network would be down. It transmits the electrical signal from one end of a cable to the other end of a cable This topology obsolete in early 90s. 10base2 network uses a bus topology 10baseT using hub network uses a bus topology 10baseT using switch network is a star topology
Ring topology This topology is used by IBM machines to communicate between them. Each device is connected directly to others so that the signal is repeated in one direction, creating ring or loop. There is a network interface card used called token ring NIC. An empty token is passed from one PC to another in clockwise direction. if any PC wants to send the data, it will grab the data, inject the data and then forward the token. The cable used for communication is called Shielded twisted pair (STP).
Disadvantages: This topology is very slow. There is a single point of failure. There is no centralized management.
Full Mesh topology It means that all the respective nodes in the network have a direct connection. It is more reliable due to having more paths. Database server needs more reliability, therefore it is recommended for it. Disadvantages: It is very complex to make mesh topology and also cost is very high. Partial Mesh topology In this topology some of the nodes in the network have a direct connection but others do not. It is very close to mesh topology.
Page | 6
www.pakitsolutions.com
ETHERNET
It is an IEEE standard for LAN. Also known as 802.3 Classification of Ethernet 1. 2. 3. 4. 5. 6. 10base2: bus topology, coaxial cable, thin net, 10Mbps, 185 km 10base5: bus topology, coaxial cable, thick net, 10Mbps, and 500km 10baseT (Ethernet): star topology, UTP, cat 5, 100m, 10Mbps 100baseT (Fast Ethernet): star topology, UTP, cat 5e/6, 100m, 10Mbps Gigabit Ethernet: Star topology, UTP cat 6, 100m, and 1000Mpbs. 10 Gigabit Ethernet: Star topology, UTP Cat 6a/fiber optic.
1) Application Layer
Deals with the communication of software on different machines. For example: HTTP, FTP, SMTP, Telnet and DNS servers, all operating systems, web browsers, communication software (messengers, Skype etc).
2) Presentation Layer
Three activities are taking place at this layer: 1) Encryption: The process of converting the plain text in to cipher text for data confidentiality is called encryption. i.e. DES, 3DES and AES 2) Translation: Coverts protocol from one form to other. Like IPX to IP and vise versa. 3) Compression: It simply works with the compression of data like win zip.
Page | 7
www.pakitsolutions.com
3) Session Layer
A time period in which two machines communicate is called a session. This layer deals with: Session establishment: To establish a session before data communication. Session management: To manage the session throughout the communication. Session termination: To manually terminate the session or there is a network down.
4) Transport Layer
It uses protocols to transfer data from one machine to another machine. Two protocols work on this layer, TCP/IP and UDP.
Functions of TCP/IP 1. Multiplexing using port number TCP identifies applications by their port numbers. Multiplexing relies on the use of a concept called a socket Socket consist of three things 1. IP address 2. Transport protocol (TCP or UDP) 3. Port number Multiplexing helps in running multiple applications on a machine. PC keeps every application separate and transfers data accordingly. Every application and protocol has port number. Port number identifies data that which application this data belong to. Like: Telnet SMTP HTTP HTTPS DNS 23 25 80 443 53
Page | 8
www.pakitsolutions.com
2. Error recovery TCP numbers data bytes using the sequence and acknowledgement fields in the tcp header TCP sends data in sequence Sender also sends re-transmission timer.
3. Flow control using Windowing TCP implements flow control by taking advantage of sequence and acknowledgement fields in the TCP header. Window size is the number of packets sent before getting acknowledgement. It starts with smaller size of window than gradually increases until some error occurs.
UDP (user data gram protocol) It is connection less protocol. It also works at transport layer. It does not do any error recovery thus it takes less bandwidth. It perform Data transfer Data segmentation Multiplexing using port numbers
5) Network Layer It deals with the function of path selection and logical addressing The protocols use are: IP (internet protocol) in TCP/IP IPX in Novell DDR in AppleTalk Every network and host has IP address. IP define three different network classes: Class A 1-126 Class B 128-191 Class C 192-223 Router works on this layer
Page | 9
www.pakitsolutions.com
6) Data Link Layer This layer is divided into two sub-layers LLC Sub-layer: it create link between network and data link layer. For example ARP. Mac Sub-layer: it deals with error detection, addressing and orderly delivery of frames. Addressing: In many networks more than two devices are attached to the same physical network. Data link layer defines addresses to make sure that correct device listen and receive data. In Ethernet data link layer uses Media Access Control (MAC) address. It is 48-bit long address. It also performs error detection. It put a field of FCS (frame check sequence) in a frame. This field holds the value of CRC (cyclical redundancy check) algorithm. This CRC value is calculated by mathematical formula applied on data in the frame. Same value in generated on destination, if values are same than there is no error. It does not perform error recovery only error detection
7) Physical layer
It is pure hardware layer of OSI model. On this layer frame is converted into bits. Hubs, repeaters and all cables work on this layer.
Page | 10
www.pakitsolutions.com
MODULE 2
SWITCHING
Cisco Switches Series
Layer 2 switches
Cisco express Cisco catalyst Cisco catalyst Cisco catalyst 500 series 2940 series 2950 series 2960 series
Cisco catalyst Cisco catalyst Cisco catalyst Cisco catalyst Cisco catalyst
3550 series 3600 series 3700 series 4500 series 6500 series
Cisco catalyst 4500 and 6500 are called modular or core switches. In these switches we can add the additional cards. Layer 2 switches can only do switching while layer 3 switches can do switching as well as routing.
2) NV-RAM (Non-volatile RAM) It is such memory where data stored permanently and this configured data is called start up configuration. Syntax is: #show startup-configuration Page | 11
www.pakitsolutions.com
To save the running configuration, the syntax is: #copy running-configuration startup-configuration
3) FLASH This is such a memory where IOS (internetwork operating system) is present and the data also present permanently.
4) ROM It is such a memory where all modes of switch/router exist, these modes are called ROM monitor mode. They come after IOS load.
SWITCH TECHNOLOGIES
Switches work in different Technologies. These are as under:
Cut Through
In this mode latency does not depend on frame size, because it does not store frame but forward it after seeing the MAC address. It does not perform error detection. Page | 12
www.pakitsolutions.com
Fragment Free
In this mode switch checks first 64 bytes of a frame. The CRC field also exist in this part of a frame, thus check out for any error. Latency is not dependent on the size of frame. Cisco 1900 series switches use this technology.
REDUNDENT TOPOLOGY
In this topology there is a backup link so that if one link fails than other is activated. Such switching network that has the backup path for data transmission is called redundant links. This topology has some issues due to switching loop, which are as under:
Broadcast Storming
When the destination host frame not found by the switch, so the switch start broadcast. Network become down and frame transmission start in looping.
Page | 13
www.pakitsolutions.com
It is an open standard of IEEE. Code 802.1d This protocol works on the data link layer of OSI reference model. This protocol is used to prevent the switching loops. It is by default enable on Cisco Switches.
STP Operation rules 1. 2. 3. 4. There is only one Root Bridge per network. There is only one root port per Non-root Bridge. Non-designated ports are un-used There should be at least one designated port per link.
Root Bridge Root Bridge is the master switch and controls all the STP operation. All other switches are non-root bridges and they use the best path. All the ports are designated and act in forward state.
Page | 14
www.pakitsolutions.com
Bridge ID
Combination of bridge priority and Mac address of a switch is called Bridge ID.
Bridge Priority
All the Cisco switches have default priority value of 32768.
MAC address
It is physical address of 24-bits.eg, (01c0.1111.0000) Root bridge decision first make at the lowest bridge priority of bridge ID If the Priority is same as normally happened. So the root bridge decision goes at the lowest Mac address values for example (01c0.1111.1111 < 01c0.111.222)
Root Port
It is such port that connects Non-root Bridge to the root bridge. There is only one root port presents in Non-root Bridge. All others are non-root ports.
Non-Root port
All other ports except one root port in Non-root Bridge are non-root ports. Non-designated ports cant forward packet. Can receive or listen packet. Page | 15
www.pakitsolutions.com
Listening State
Here the port receives the BPDU and decided the port nature also called discarding state.
Learning State
Here the port can receive and send and also the switch built the MAC table. Forwarding delay Time taken by port in shifting from one state to other.
Page | 16
www.pakitsolutions.com
Page | 17
www.pakitsolutions.com
Page | 18
www.pakitsolutions.com
Broadcast Domain
At how many ports the broadcast would be received All the ports of Switches are by default the part of vlan1. All the port of Vlan should be access port means they exist in the access mode not in trunk.
ADVANTAGES OF VLAN
. 1. Broadcast Control: Large broadcast is divided into sub networks. 2. Security: One vlans information can not transfer into another vlan. 3. Flexibility: Transfer of port from one vlan to another vlan through configuration. It improves performance and speed of data transmission by reducing the size of large broadcast
Trunk Port It is such port which carries the multiple Vlans traffic. It is not the part of any vlan.
Page | 19
www.pakitsolutions.com
Dynamic VLAN
These are such vlan which are configured by a server called VMPS (vlan management policy server) in a large network environment and not need to create at each switch. Benefit You dont need to manually configure every time for access your vlan through out the organization.
802.1q Standard
It is open standard as of IEEE, it use internal tagging process, this protocol is actually enable by default at Cisco router.
Note At both the end the encapsulation protocol must be same, otherwise the line protocol not up.
Page | 20
www.pakitsolutions.com
VTP MODES
There are three modes of VTP which are as following: 1) Server mode. Server Mode It is such mode where we can create, delete, modify and also synchronize the Vlan information. vlan information is permanently save in flash memory. Client mode It is such mode in which we cant create, delete, modify the vlan information but it can only synchronize and forward the vlan information. 2) Client mode. 3) Transparent mode.
Transparent mode It is such mode where we can create, delete, modify the vlan information but it can not synchronize but forward the information of vlan.
PORT SECURITY
When A port broadcast so the data will go to B as well as C port. The destination address is B but C will also capture the data using the sniffer software, so to resolve this issue we use switch. By using switch point to point communication is taking place between A&B. But when the Mac table becomes full so the switch will broadcast the data. MAC FLOODING ATTACK It is such process which is used for hacking which becomes possible by the overflow the MAC table; this process uses the software called the sniffer software. So to prevent the switch by this attack we use the security feature called port security. Sniffer Software It is the software which is used by hacker for capturing the data in the plain text form.
Page | 21
www.pakitsolutions.com
Macof It is term used for flooding the Mac table by sending 300 to 400 Mac addresses in 1sec.
Page | 22
www.pakitsolutions.com
There is a central device for example AP (Access Point). AP can connect to a switch with cable. 2. Ad hoc Mode There is no centralized device all PCs are connected together. AP works in half duplex mode Information Antenna Data Radio Signal (Radio waves/ Electromagnetic waves) Electrical
UNII (Unlicensed National Information Infrastructure) 802.11 802.11b 802.11a 802.11g 802.11n in 1997 in 1999 in 1999 in 2003 2.4 GHz 2Mbps 2.4GHz 11 Mbps 5 GHz 54Mbps 2.4GHz 54Mbps 5GHz/2.4GHz 300Mbps
Page | 23
www.pakitsolutions.com
WLAN
Enterprise Class AP Aironet (AP manufacturer) Cisco Aironet Series AP Consumer Class AP Linksys (bought by Cisco)
1000 Series
1100 Series
1200 Series
When waves strike with edgy material they become scattered. Absorption: Water absorb the radio waves
Page | 24
www.pakitsolutions.com
2. WPA (WiFi Protected Access) WPA Encryption TKIP (Temporal key Integrated Protocol) Authentication 802.1x
User use EAP (extensible authentication protocol) to authenticate on AP. AP is using RADIUS to transfer authentication information from/to server. RADIUS (Remote Access Dialing Users) Authentication server form CISCO is called Cisco ACS.
Page | 25
www.pakitsolutions.com
MODULE 3
IP ADDRESSING
It is network address used for the communication between the nodes at LAN as well as WAN. These addresses are assigning by the IANA (Internet assigned numbering authority) There are two types of IP addressing, IPV4 and IPV6.
IPV4 address It is total 32 bits address scheme these bits are divided into four octets, this address scheme has two segments or portions (Host and Network).
IPV4 address classes This address is classified into the classes on the bases of network and host segment. Class A In this class the network segment have 8-bits and the host segments have24-bits. Its range is from 01 up to 126 and total host exist 17millions. Subnet mask is 255.0.0.0
Class B In this class the each segment (host, network) have 16-bits. Its range is from 128 up to 191 and total host exist 65,534. Subnet mask is 255.255.0.0
Class C In this class the network segment have 24-bits and host segment 16-bits. Its range is from 192 up to 223 and total host exist 254. Subnet mask is 255.255.255.0
Class D It range is from 224 up to 239. Class E It range is from 240 up to 255. Note: After the class E IPV4 addressing range become end, after that we use IPV6 addressing. Page | 26
www.pakitsolutions.com
SUBNETTING
It is the process of dividing the single network ID into further various different network IDs.
SUBNETMASK
It is the actually the group of network and host segment. It actually tells that how many bits are used for network and how many bits are used for host.
Q) How to simplify this IP address? Ans: 1) In IPv6 leading zeros can be eliminated e.g. 10C0: FD: 9C5:C509:0:0:0:509F 2) Consecutive zero field can be replaced by (::) but it can be used once in IPv6 address e.g. 10C0: FD: 9C5:C509::509F
IPV6 ADDRESS TYPES Unicast: One to one communication. 2) Multicast: one to many communication. There is no broadcast address IPv6 3) Any cast :
1) By using any cast multiple devices can share same IP address. Router will forward the packet to nearest any cast IP. Shared devices should have same application e.g. all application should be web server/SMTP etc.
Page | 27
www.pakitsolutions.com
MODULE 4
ROUTING
Routing Static Routing Default Route:
# Ip route 0.0.0.0 0.0.0.0 OR #Ip route 0.0.0.0 0.0.0.0 s0/0 #show ip route S* 0.0.0.0/0 s0/0
Dynamic Routing
Page | 28
www.pakitsolutions.com
Distance Vector
Link State
Hybrid
Distance Vector
They exchange complete routing tables with each other after periodic time period E.g. RIP (30 sec) and IGRP (60 sec). Distance vector protocols have only best route information to the destination. If best path is down than they recalculate the best path.
Link State
Link state routing protocol only send routing updates whenever there is some change in network topology. They are less bandwidth consumer because they only send routing updates not the whole routing table means they efficiently utilize the bandwidth. These protocols have complete network topology information. These protocols are more intelligent because they have all routes information to the destination E.g. OSPF, IS-IS. Disadvantage: CPU and memory intensive.
Hybrid
It is a combination of both distance vector and link state.
RIP can perform routing up to 15 hops. RIP enable routers exchange complete routing table after 30 sec. RIP can perform equal cost load balancing, by default 4 paths and maximum 6 paths.
RIP version 2
The features of RIPv2 are: It is class-less routing protocol. RIPv2 is authentication supported.
KHI (config)# router rip KHI (config-router)# Network 10.0.0.0 KHI (config-router)# Network 11.0.0.0 LHR (config)# router rip LHR (config-router)# Network 20.0.0.0 LHR (config-router)# Network 11.0.0.0
Page | 30
www.pakitsolutions.com
EIGRP TABLES
It creates 3 tables: Neighbor table Topology table Routing table
Neighbor Table
In EIGRP directly connected routers maintain neighbor relationship. They exchange HELLO PACKETS for maintaining the neighbor relationship.
Topology Table
This table contains the complete network information. Router# show ip eigrp topology
Routing Table
This table contains the information of best route to the destination. Router # show ip route
Page | 31
www.pakitsolutions.com
KHI (config)# router eigrp 50 KHI (config-router)# Network 10.0.0.0 KHI (config-router)# Network 11.0.0.0 LHR (config)# router eigrp 50 LHR (config-router)# Network 20.0.0.0 LHR (config-router)# Network 11.0.0.0 50 is Autonomous system number. Two routers must be in same AS to communicate.
Page | 32
www.pakitsolutions.com
OSPF TABLES
1. Neighbor table. 2. Topology table 3. Routing table
Neighbor Table
It contains the information of directly connected routers just like eigrp. Neighbor routers exchange HELLO PACKETS. In OSPF neighbor table is also referred as Adjancy database. Router #show ip ospf neighbor
Topology Table
This table contains complete topology information. In OSPF topology table is referred as Link state database (LSDB). Router #show ip ospf database
Routing Table
This table contains the information of best routes to the destination. In OSPF routing table is also referred as forwarding database Router #show ip route In OSPF interfaces are refer as links SPF algorithm applies on LSDB and best path moved in routing table.
OSPF Router ID
In OSPF every router is recognized by its router ID. By default the highest IP address configured on any active interface of router will become its router ID. Let suppose Router ID is 192.168.0.1 goes down then next highest IP address become router ID and when again 192.168.0.1 is up then it will become router ID. Means when WAN is flipping then best practices is that we do not keep the physical address as router ID so we make a logical address called loopback address. Router(config)# interface loopback 0 Router(config)# ip address 1.1.1.1 255.0.0.0 Router(config-if)# no shutdown Now loopback address is router ID.
Page | 33
www.pakitsolutions.com
OSPF AREAS
Area 0 (zero) is called back bone area. All other areas are called regular areas. Every area should be directly connected with area 0. Routers working in regular areas are called Internal Routers. Routers in backbone area are called backbone router. Area Border Router (ABR): Router which connect regular area to backbone area.
Page | 34
www.pakitsolutions.com
MODULE 5
SECURITY
ACCESS CONTROL LIST (ACL)
It is a security feature on a router. You can control access between two different networks by the help of access control list. There are two types of ACL
Standard ACL
In this type of ACL traffic is flittered on the basis of source ip address The range of standard ACL is from 1 99 There are two types of actions performed in this type of ACL: 1. Permit 2. Deny
Example
Router (config)# access-list 1 permit host 10.0.0.1 Router (config)# int fa0/0 Router (config)# ip access-group 1 in These statements will permit host 10.0.0.1 to access Internet where as all other hosts would be denied. This access list is applied on Fa0/0 inbound. A single ACL can have multiple statement If a packet does not match with any statement of ACL it will discard this packet Default behavior of ACL is to discard anything that does not match ACL. Default behavior = implicit deny If a packet does match with ACL statement than this packet would not be compared with other statements below in that ACL. i.e. Router (config)# access-list 10 permit host 10.0.0.1 Router (config)# access-list 10 deny host 10.0.0.1 Page | 35
www.pakitsolutions.com
This ACL will not deny host 10.0.0.1 because it is permitted in first statement
Access list filter traffic from and to router but do not filter traffic originating from router. Most restrictive statement of ACL should be on top Any for all destinations. Any any for all sources and all destinations One ACL can be applied at one interface and in one direction
Extended ACL
This type of ACL filters the traffic on the basis of 1. Source ip 2. Destination ip 3. Protocol 4. Port number The range of this ACL is from 100 199. Actions performed by this ACL are: 1. Permit 2. Deny
Direction of ACL
Inbound direction
Traffic entering from 10.2 than for e0 it is inbound and traffic coming from Internet toward 10.2 than it is out bound for e0.
Router (config)# Access-list 101 permit tcp 10.0.0.1 0.0.0.49 host 1.1.1.1 eq 80 Router (config)# Access-list 101 permit tcp 10.0.0.1 0.0.0.49 host 2.2.2.2 eq 25 Router (config)# Access-list 101 permit ip 10.0.0.51 0.0.0.49 any Router (config)# Int fa 0/0 Router (config-int)# ip access-group 101 in This will permit hosts from 10.0.0.1 to 10.0.0.50 to communicate pc 1.1.1.1 via tcp protocol and Internet browser.
Example Router (config)# ip access-list extended (or standard) cttc (any name) Router (config-ext-nacl)# permit tcp 10.0.0.1 0.0.0.49 host 1.1.1.1 eq 80 Router (config-ext-nacl)# permit tcp 10.0.0.1 0.0.0.49 host 1.1.1.1 eq 25 Router (config-ext-nacl)# permit ip 10.0.0.51 0.0.0.49 any Router (config)#int fa 0/0 Router (config-int)# ip access-group cttc in
Page | 37
www.pakitsolutions.com
Types of NAT
1. Dynamic NAT We buy a pool of ip addresses e.g 1.1.1.1 to 1.1.1.64
2. Static NAT In static NAT one public ip address is mapped on one private ip address. We permanently bind one private ip to one public ip address
3. NAT Overload This is also called Port Address Translation It performs many to one translation Source port number is randomly assigned and always greater than 1025. 1-1024 source port numbers are assigned to well define operations. PAT can be configured on routers Microsoft Linux We can configure dynamic NAT, Static NAT and NAT overload simultaneously #show ip nat translation
Page | 38
www.pakitsolutions.com
1. DES (Data Encryption Standard) 2. 3 DES (3 Data Encryption Standard) 3. AES (Advanced Encryption standard) Page | 39
www.pakitsolutions.com
AES (ADVANCE ENCRYPTION STANDARD) It is a standard of NIST (National Institute of Standards and Technologies).
Page | 40
www.pakitsolutions.com
2) DATA INTEGRITY
Data integrity is achieved by an algorithm called HASHING.
HASHING ALGORITHM
MD-5 (Message Digest - 5) algorithm) 128 bit Hash SHA-1 (Secure hashing 160 bits Hash Strong but slow
3) PEER AUTHENTICATION In peer authentication a Pre shared key is used called IKE (Internet Key
Exchange) protocol. Legitimate peers can make VPN If at both routers keys are same then VPN can be made. IP SEC traffic cannot be transported through TCP/UDP because TCP/UDP only contain IP traffic while IP SEC contain Encryption, security etc . IP SEC uses its own transport protocols.
AH (Authentication Header) Data confidentiality is not supported Origin authentication and data integrity
Page | 41
www.pakitsolutions.com
MODULE 6
Advantages There is a dedicated Bandwidth. Security Service provider does not contain any layer 2 or 3 connection.
Circuit switching In this type of switching, we can communicate through traditional phone lines. No data is forwarded before an end-to-end connection is established. Examples are PSTN and ISDN.
Page | 42
www.pakitsolutions.com
Public Switched Telephone Network (PSTN) It is same as Normal dial-up connection. Speed is very low e.g.56kbps
Integrated Service Digital Network (ISDN) It is a set of digital services that transmit voice and data over phone lines. It is a cost effective solution and also speed is high than normal dial up connection. It is also good to use it as a back-up link for other types of links like frame relay and T1 connection. There are two types of ISDN. o PRI (Primary rate interface) o BRI (Basic rate interface) Basic Rate Interface (PRI) It contains 2B and 1D channel. B and D are logical channels. B channel is used for voice and data both and D channel is used for signaling and control. B Channel bandwidth is 64kbps and D channel bandwidth is 16kbps.
Primary Rate Interface (PRI) PRI is of two types e.g. E1 and T1. E1 T1
It is used in Europe and rest of the world. It contains 30 b and 1 d channel. The bandwidth of B and D channel is 64kbps. It means the total bandwidth provided by E1 is 2Mbps. It is used in USA and Canada. It contains 23B and 1D channel.
Page | 43
www.pakitsolutions.com
The bandwidth of B and D channel is 64 kbps. It means the total bandwidth provided by T1 is 1.54 mbps.
Cisco HDLC It is by default enable on Cisco routers. It supports multiple network layer protocols. It does not support open standard HDLC. HDLC doesnt provide any authentication.
Open standard HDLC Only supports single network layer protocol It is open standard protocol.
If at both ends there are Cisco routers than use HDLC otherwise use PPP.
Page | 44
www.pakitsolutions.com
PPP Authentication
There are two types of PPP authentication: 1) Password authentication protocol (PAP) 2) Challenging handshake authentication protocol (CHAP) Password Authentication Protocol (PAP) 1st router sends its password to 2nd router and 2nd router check its on password. If both passwords are same than line protocol is up. Its disadvantage is that information sharing is in clear text.
Page | 45
www.pakitsolutions.com
Challenging Handshake Authentication Protocol (CHAP) There is a 3-way handshaking concept. 1st router sends CHAP signal to 2nd router which says thyat I want to communicate to you, send your password. 2nd router will send its password to 1st router in encrypted form. 1st router will check its on password hash value. If both hash values are same than line protocol is up. There should be same password at both ends
Page | 46
www.pakitsolutions.com
Frame Relay
It is a Standard of ITU-T. It works on data link layer of OSI reference model. This is an example of packet switching.X.25,Frame relay,ATM Frame relay is working from POP to customer. Router of customer is called Frame relay router. The device in POP is called Central office Switch (CO Switch). It is cost effective b/c there is a bandwidth-sharing concept within the cloud The aim of frame relay is to connect customer router to Point of presence (POP) of service provider. Frame service provider provides service 1 connectivity as well as layer 2 connectivity. For layer 2 connectivity we have to configure Frame Relay. In case of frame relay, at layer 1 we can use any type of media.
Page | 47
www.pakitsolutions.com
Page | 48
www.pakitsolutions.com
Page | 49
www.pakitsolutions.com
LMI Types
1. CISCO (Cisco propriety) 2. ITU-T (Open standard) 3. ANSI LMI type should be same between switch and router to communicate. You have to ask the service provider which LMI type you have configured The LMI type of service provider & customer must be same otherwise link would be down because line protocol not become up. After version 11.3 of OSI, LMI type is auto detected.
LMI States
They help in troubleshooting by this we can see the segment status of Frame relay Active state: means connection is OK Deleted state: means there is a problem b/w your router and switch. Inactive state: means there is a problem b/w remote end switch and remote end router.
Page | 50
www.pakitsolutions.com