Introduction To Cisco Networking Technologies (INTRO) : CCNA Self-Study
Introduction To Cisco Networking Technologies (INTRO) : CCNA Self-Study
CCNA Self-Study:
Introduction to Cisco Networking Technologies
(INTRO)
Edited by:
ciscopress.com Steve McQuerry, CCIE® No. 6108
learn
NOW
I HAVE THE POWER TO MAKE
YOU MORE PRODUCTIVE ON THE JOB.
I CAN PREPARE YOU TO MEET
NEW CHALLENGES.
It is the power to acquire new skillsets, and expand your capabilities. Only Cisco Learning Partners can put you ahead of Cisco Systems
the curve. Visit www.cisco.com/go/learningpartners.
Copyright © 2003, Cisco Systems, Inc. All rights reserved. Cisco Systems logo is a registered trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries.
CCNA Self-Study:
Introduction to Cisco Networking Technologies (INTRO)
Cisco Press
Cisco Press
800 East 96th Street
Indianapolis, Indiana 46240 USA
ii
CCNA Self-Study:
Introduction to Cisco Networking Technologies (INTRO)
Steve McQuerry, Editor
Copyright© 2004 Cisco Systems, Inc.
Published by:
Cisco Press
800 East 96th Street
Indianapolis, IN 46240 USA
All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic
or mechanical, including photocopying, recording, or by any information storage and retrieval system, without writ¬
ten permission from the publisher, except for the inclusion of brief quotations in a review.
ISBN: 1587051613
Library of Congress Cataloging-in-Publication Number: 2003108306
Printed in the United States of America 7890
Seventh Printing December 2006
The Cisco Press self-study book series is as described, intended for self-study. It has not been designed for Cisco Systems
use in a classroom environment. Only Cisco Learning Partners displaying the following logos are authorized Learning
Solutions
providers of Cisco curriculum. If you are using this book within the classroom of a training company that Partner
does not carry one of these logos, then you are not preparing with a Cisco trained and authorized provider.
For information on Cisco Learning Partners please visit:www.cisco.com/go/authorizedtraining. To provide Cisco Systems
Learning
Cisco with any information about what you may believe is unauthorized use of Cisco trademarks or Partner
copyrighted training material, please visit: http://www.cisco.com/logo/infringement.html.
Trademark Acknowledgments
All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capital¬
ized. Cisco Press or Cisco Systems, Inc., cannot attest to the accuracy of this information. Use of a term in this book
should not be regarded as affecting the validity of any trademark or service mark.
Feedback Information
At Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each book is crafted
with care and precision, undergoing rigorous development that involves the unique expertise of members from the
professional technical community.
Readers’ feedback is a natural continuation of this process. If you have any comments regarding how we could
improve the quality of this book, or otherwise alter it to better suit your needs, you can contact us through e-mail at
[email protected]. Please make sure to include the book title and ISBN in your message.
We greatly appreciate your assistance.
Cisco Systems
Cisco Systems has more than 200 offices in the following countries and regions. Addresses, phone numbers, and fax numbers are listed on the
Cisco.com Web site at www.cisco.com/go/offices.
Argentina • Australia • Austria • Belgium • Brazil • Bulgaria • Canada • Chile • China PRC • Colombia • Costa Rica • Croatia • Czech Republic
Denmark • Dubai, UAE • Finland • France • Germany • Greece • Hong Kong SAR • Hungary • India • Indonesia • Ireland • Israel • Italy
Japan • Korea • Luxembourg • Malaysia • Mexico • The Netherlands • New Zealand • Norway • Peru • Philippines • Poland • Portugal
Puerto Rico • Romania • Russia • Saudi Arabia • Scotland • Singapore • Slovakia • Slovenia • South Africa • Spam • Sweden
Switzerland • Taiwan • Thailand • Turkey • Ukraine • United Kingdom • United States • Venezuela • Vietnam • Zimbabwe
Cnnvrisht © 2003 Cisco Systems Inc All rights reserved. CCIP, CCSP, the Cisco Arrow logo, the Cisco Powered Network mark, the Cisco Systems Verified logo, Cisco Unity, Follow Me Browsing,
S06c»
Registrar’SHdeCast, SMARTnet, Strata View Plus, Stratm, SwitchProbe, TeleRouter, TransPath, and VCO are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain ot
countries.
All other trademarks mentioned in this document or Web site are the property of their respective owners. The use of the word partner does no, imply a partnership relationship between Cisco and any
other company. (0303R)
Dedications
I would like to dedicate this work to my loving wife Becky. As long as I can remember, you have always
been there for me. I could not have asked for a more perfect partner in life. I would also like to dedicate
this work to my children. Katie, you show a great spirit, work ethic, and determination. I am confident
you will achieve all of your goals in life. Logan, your sense of responsibility and fair play will give you
the leadership skills to be successful in anything you want to do. Cameron, you have energy and drive
that gives you the ability to do great things; I know that you will be able to do anything you desire. It is
said that children learn from their parents, I only wish I could take the credit for the roles you are grow¬
ing into. The truth is that I learn from you, everyday, and it is my wish that you will continue to teach me
all the wonder that life holds.
Acknowledgments
If you are reading this, you have probably been involved in some type of publishing process or know
someone who has. If you do not fall into one of these categories, let met thank you for taking the time to
find out about all the wonderful people behind this book. For anyone who has worked anywhere in the
publishing community, it is common knowledge that regardless of whose name is on the cover, there are
dozens of people behind a successful project, and this one is no exception. As a matter of fact, the peo¬
ple here deserve more credit for this project than I do. So as insignificant as these acknowledgments
seem, to me, they are among the most important words I can write in the entire work.
I would like to thank the technical editors: Steve Kalman, Don Johnston, and Jay Swan. Without their
keen eyesight and insight, my work would be much less polished.
I would like to thank all the wonderful people at Cisco Press. This is my sixth writing project in the past
five years and the second of this summer. I cannot begin to express in this paragraph how great it has
been to work with these fine professionals. I would not begin to think about writing without this fine
group. Thanks to Dayna Isley for keeping me on track and focused. It has been a joy to work with you
on this project, and I hope we get to work together again. Thanks to Brett Bartow, the acquisitions edi¬
tor, who back in 1998 gave me the opportunity to start in the technical-writing field. You have been a
guiding force in my writing career and I truly appreciate that. Thanks to Tammi Barnett, who puts up
with my relentless requests and keeps everything in the proper queues. Also, thanks to John Kane, Sheri
Cain, and Tim Wright—you are the best in the industry!
I would be remiss if I didn’t mention all the students and instructors I have had the pleasure of teaching
and working with over the past several years. Your questions, comments, and challenges offered many
of the tips, cautions, and questions for this book.
I would like to thank my family for their patience and understanding during this project and all of my
projects.
Most important, I would like to thank God for giving me the skills, talents, and opportunity to work in
such a challenging and exciting profession.
Contents at a Glance
Foreword xviii
Introduction xix
Glossary 477
Index 495
viii
Contents
Foreword xviii
Introduction xix
Chapter Summary 81
Modems 305
Analog Modems 305
Cable Modems 306
How Cable Modems Work 307
Advantages and Disadvantages of Cable Modems 308
Glossary 477
Index 495
xvi
S
L 1
“ ~w *
;!
Gateway
-
Router Bridge
i DSU/CSU FDDI
Foreword
CCNA Self-Study: Introduction to Cisco Networking Technologies (INTRO) is a Cisco authorized,
self-paced learning tool that helps you understand foundation concepts covered on the Cisco Certified
Network Associate (CCNA) exams. This book was developed in cooperation with the Cisco Internet
Learning Solutions Group, the team within Cisco responsible for the development of the CCNA exams.
As an early stage exam preparation product, this book presents detailed and comprehensive coverage of
the tasks that network engineers need to perform to build and support small- to medium-sized networks.
Whether you are studying to become CCNA certified or are simply seeking to gain a better understand¬
ing of networking fundamentals using the Open System Interconnection (OSI) seven-layer model
concepts, you will benefit from the information presented in this book.
Cisco Systems and Cisco Press present this material in text-based format to provide another learning
vehicle for our customers and the broader user community in general. Although a publication does not
duplicate the instructor-led or e-leaming environment, we acknowledge that not everyone responds in the
same way to the same delivery mechanism. It is our intent that presenting this material via a Cisco Press
publication will enhance the transfer of knowledge to a broad audience of networking professionals.
Cisco Press will present other books in the certification self-study series on existing and future exams to
help achieve Cisco Internet Learning Solutions Group’s principal objectives: to educate the Cisco com¬
munity of networking professionals and to enable that community to build and maintain reliable, scal¬
able networks. The Cisco Career Certifications and classes that support these certifications are directed
at meeting these objectives through a disciplined approach to progressive learning.
To succeed with Cisco Career Certifications and in your daily job as a Cisco certified professional, we
recommend a blended learning solution that combines instructor-led training with hands-on experience,
e-leaming, and self-study training. Cisco Systems has authorized Cisco Learning Partners worldwide,
which can provide you with the most highly qualified instruction and invaluable hands-on experience in
lab and simulation environments. To learn more about Cisco Learning Partner programs available in
your area, visit www.cisco.com/go/authorizedtraining.
The books Cisco Press creates in partnership with Cisco Systems meets the same standards for content
quality demanded of our courses and certifications. It is our intent that you will find this and subsequent
Cisco Press certification self-study publications of value as you build your networking knowledge base.
Thomas M. Kelly
Vice President, Internet Learning Solutions Group
Cisco Systems, Inc.
January 2004
xix
Introduction
Since the introduction of the personal computer in the early 1970s, businesses have found more uses and
applications for technology in the workplace. With the introduction of LANs, file sharing, and print
sharing in the 1980s, it became obvious that distributed computing was no longer a passing fad. By the
1990s, computers became less expensive, and innovations such as the Internet allowed everyone to con¬
nect to computer services worldwide. Computing services have become large and distributed. The days
of punch cards and greenbar paper are behind us, and a new generation of computing experts is being
asked to keep this distributed technology operational. These experts are destined to have a new set of
issues and problems to deal with, the most complex of them being connectivity and compatibility
between differing systems and devices.
The primary challenge with data networking today is to link multiple devices’ protocols and sites with
maximum effectiveness and ease of use for the end users. Of course, this must all be accomplished in a
cost-effective way. Cisco Systems offers a variety of products to give network managers and analysts
the ability to face and solve the challenges of internetworking.
In an effort to ensure that these networking professionals have the knowledge to perform these arduous
tasks, Cisco Systems has developed a series of courses and certifications that act as benchmarks for
internetworking professionals. These courses help internetworking professionals learn the fundamentals
of internetworking technologies along with skills in configuring and installing Cisco products. The cer¬
tification exams are designed to be a litmus test for the skills required to perform at various levels of
internetworking. The Cisco certifications range from the associate level, CCNA (Cisco Certified Net¬
work Associate), through the professional level, CCNP (Cisco Certified Network Professional), to the
expert level, CCIE (Cisco Certified Internetwork Expert). This book is a self-study product based on the
Cisco course “Introduction to Networking,” one of the two courses, the second being “Interconnecting
Cisco Network Devices,” used to ground individuals in the fundamentals of switched and routed inter¬
networks.
This book presents the foundation concepts and basic interface commands required to configure Cisco
switches and routers to operate in corporate internetworks. You are introduced to all the basic concepts
and configuration procedures required to build a multiswitch, multirouter, and multigroup internetwork
that uses LAN and WAN interfaces for the most commonly used routing and routed protocols.
INTRO is the first of a two-part introductory level series and is recommended for individuals who have
one to three years of internetworking experience and want to become familiar with basic internetwork¬
ing concepts and the TCP/IP protocol. This book also provides a working knowledge of the Cisco IOS
operating system.
Although the self-study book is designed for those who are pursuing the CCNA certification, it is also
useful for network administrators responsible for implementing and managing small and medium-sized
business networks. Network support staff who performs a help desk role in a medium- or enterprise¬
sized company will find this a valuable resource. Finally, Cisco customers or channel resellers and net¬
work technicians entering the internetworking industry who are new to Cisco products can benefit from
the contents of this book.
XX
Chapter Organization
This book is broken up into four parts. This book is designed to be read in order because many chapters
build on content from a previous chapter.
Part I, “Internetworking Basics,” includes chapters that explain the basic networking computing
concepts:
• Chapter 1, “Introduction to Internetworking,” reviews the components that make up a
computer network and some common numbering systems used in computing.
• Chapter 2, “Internetworking Devices,” explores the different components used to interconnect
various computer networks.
• Chapter 3, “Common Types of Networks,” describes many of the common network topologies
and media used in today’s network environments.
Part II, “The Internetworking Layers,” describes how internetworking devices provide services at the
lower three layers of the OSI model:
• Chapter 4, “Network Media (The Physical Layer),” looks at the different media used to con¬
nect network devices and describes where each should be deployed in an internetwork.
• Chapter 5, “Layer 2 Switching Fundamentals (The Data Link Layer),” discusses the process
used to forward frames in a Layer 2 environment. This chapter also discusses the problems
caused by Layer 2 forwarding and the solutions that contain these problems.
• Chapter 6, “TCP/IP (The Transport and Internetworking Layer Protocol),” describes the
basics of the TCP/IP protocol, including the use of ICMP, ARP, UDP, and TCP in internetwork
environments.
• Chapter 7, “IP Addressing and Routing (The Internetworking Layer),” describes the how IP
addresses are assigned and how Layer 3 devices use these address structures for the delivery of
packets throughout the internetwork.
xxi
Part III, “Administering Cisco Devices,” looks beyond the LAN and discusses connecting devices
across wide geographic locations and also discusses the Cisco IOS and management functions used in
configuring and managing internetworking devices:
• Chapter 8, “Using WAN Technologies,” provides an overview of WAN connectivity. This chap¬
ter discusses methods of connecting to remote sites using leased lines, circuit-switching, and
frame-switching services.
• Chapter 9, “Operating and Configuring Cisco IOS Devices,” describes how a router and switch
boots and how to use the command-line interpreter to configure a Cisco IOS switch or router.
• In Chapter 10, “Managing Your Network Environment,” you learn how to use tools like CDP,
ping, and traceroute to discover, map, and troubleshoot devices in the internetwork.
Part IV of this book includes the following:
• Appendix A, “Answers to the Chapter Review Questions and Quizzes,” provides answers to the
review questions at the end of each chapter and the quizzes throughout each chapter.
• The Glossary contains the definitions to commonly used internetworking terms throughout
this book.
Features
This book features actual router and switch output to aid in the discussion of the configuration of these
devices. Many notes, tips, and cautions are spread throughout the text. In addition, you can find many
references to standards, documents, books, and websites that help you understand networking concepts.
At the end of each chapter, your comprehension and knowledge are tested by questions reviewed by a
certified Cisco Systems instructor.
NOTE The operating systems used in this book are Cisco IOS version 12.2 for the routers, and
Cisco Catalyst 2950 is based on Cisco IOS version 12.1.13.EAlb.
Part
I
Internetworking Basics
Chapter 1 Introduction to Internetworking
Introduction to Internetworking
This chapter provides a baseline of knowledge for the understanding of computer
internetworking. It addresses the components of a computer and the role of computers in
an internetworking system. This chapter begins with the most basic component of the
internetwork, the computer. It also covers the numbering systems used by computers along
with a comparison to the decimal numbering system.
This chapter also explains how standards ensure greater compatibility and interoperability
between various types of networking technologies by discussing the basic functions that
occur at each layer of the Open System Interconnection (OSI) reference model. It also
discusses how information (or data) makes its way from application programs (such as
spreadsheets or e-mail) through a network medium (such as copper wiring) to other
application programs located on other computers in a network.
Network devices are products used to interconnect computer networks into what are
known as internetworks. Understanding, building, and managing internetworks are the
jobs of a networking professional. As computer internetworks grow in size and com¬
plexity, so do the network devices used to connect them. This chapter also discusses how
different network devices interconnect computer networks by operating at different layers
of the OSI model to appropriately separate and organize traffic patterns. In addition to
looking at the OSI module, the chapter references the TCP/IP standard used throughout
the world for network communications.
In particular, you should be familiar with the system components like the processor, bus,
storage units, and expansion cards. You should also have a basic understanding of how the
personal computer or desktop differs from a laptop computer. You also need to understand
6 Chapter 1: Introduction to Internetworking
how an expansion card known as the network interface card (NIC) interacts with
applications and network media to provide communications between devices. It is this
communication that defines a data network.
The CPU is a silicon-based microprocessor. The speed at which a computer can operate
depends on the type and speed of CPU that is installed. A CPU’s speed is typically
measured in gigahertz (GHz) or megahertz (MHz), which relates to the clock speed in
Network Computing Basics 7
cycles per second (hertz). The faster the CPU’s clock speed, the faster it can carry out
instructions and calculations from software.
Like a brain connects to the rest of the systems in the body, the CPU is connected to several
other components in a computer to create a whole unit known as the personal computer
(PC). The foundation that the CPU resides on is called the motherboard. Figure 1-2 shows
a typical motherboard.
The motherboard houses the base components of the computer system like the CPU. The
motherboard also provides connectors between the primary components and devices that
provide storage, input, output, and communications. The motherboard is built on what is
known as a printed circuit board (PCB). A PCB is a thin plate on which chips (integrated
circuits) and other electronic components are placed.
The motherboard also houses the key memory components of the system. Memory stores
applications and data for use by the CPU. Two main types of memory exist on the system
board: random-access memory (RAM) and read-only memory (ROM).
RAM is typically used by the CPU to write data from an application into its memory
locations as well as read that data out of the memory locations. These read-writes are
performed to allow an application to manipulate data. RAM is also known as read-write
memory. One of the major drawbacks of RAM is that it requires electrical power to
maintain data storage. If the computer is turned off or loses power, all data stored in RAM
is lost unless the data was saved to a storage location like a disk. Because of this, RAM is
considered volatile memory whose data is lost when the power is removed.
8 Chapter 1: Introduction to Internetworking
ROM is a memory device that contains information needed by the computer for operation.
ROM is maintained even when the computer does not have power. ROM usually contains
instructions used by the system during startup or can contain information that identifies a
system. Memory in ROM is considered permanent because it is not lost during power down.
Because RAM loses information during power down and because only limited amounts of
memory exist in a system, computers need storage devices so that the data can be saved and
recalled as needed. There are two main types of storage for computers: removable storage
and permanent storage. A floppy disk drive and compact disc read-only memory (CD-
ROM) are examples of removable storage devices. A hard disk drive is an example of a
permanent storage device.
Storage Devices
A floppy disk drive, like the one shown in Figure 1-3, can hold a limited amount of data on
a thin removable disk. The drive can read and write to a disk. The disk, and the information
on it, can then be inserted into a drive on another computer and be read by that device
as well.
A CD-ROM drive can read information from a compact disc. A compact disc can hold large
amounts of memory, but a CD-ROM drive can only read data and cannot write to the disc.
NOTE Many PCs also offer a derivative of the CD-ROM called a CD-R/W, or compact disc read/
write, which allows a user to read and write to the compact disc. The advantage of the CD
is that it stores more data than a floppy disk.
The hard disk drive is a read-write storage device typically located inside the computer.
This device is capable of holding very large amounts of data, but the device cannot be
removed easily and attached to another system so that the data can be used in another
device. The hard drive is also the common location for the PC’s operating system and
removal of the drive could prevent the computer from working.
Network Computing Basics 9
The CPU, memory, and storage are the key components in any computer system, but they
must be tied together to operate properly. On the motherboard is a collection of wires that
connects all the internal computer components to the CPU. This collection of conductors
through which data is transmitted from one part of the computer to another is called a bus.
Expansion Bus
A computer contains several types of buses, such as address, data, and control buses. Also,
some buses add components. These are called expansion buses. The Industry Standard
Architecture (ISA) and the Peripheral Component Interface (PCI) are two common types
of expansion buses.
The expansion bus also connects to openings called expansion slots on the motherboard.
(See Figure 1-4). You can install a printed circuit board called an expansion card in an
expansion slot to add new capabilities to the computer. Expansion cards typically add input/
output or communications capabilities to a computer. A modem and a NIC are two
examples of expansion cards.
The final component that a computer requires is power. The computer contains a power
supply that supplies all the power to the devices within the computer.
When all of these components are placed together it is called the system unit. The system
unit is the main part of a PC. It includes the chassis or case, microprocessor, main memory,
bus, and ports. The system unit does not include the keyboard, monitor, or any other
external devices connected to the computer.
10 Chapter 1: Introduction to Internetworking
The cards and services that provide these attachments are sometimes called backplane
components because they attach to the PC bus. A backplane is a large circuit board that
contains sockets for expansion cards and is another name for the motherboard and bus. The
cards or components of the backplane contain interfaces or ports. An interface is a piece of
hardware, such as a modem connecter, that allows two devices to be connected together. A
port is a socket or opening on the PC that allows a device to be connected to the PC for
input/output of data.
Several ports exist on a system unit, such as the keyboard port, mouse port, parallel port, and
serial port. The keyboard and mouse ports are designed to connect these devices to the PC
for input from a user. The parallel port is a port capable of transferring more than one bit of
data simultaneously across parallel paths. The parallel port connects to external devices like
a printer. The serial port is a port that transfers one bit at a time across the port. This type of
transfer is known as serial communications because the bits are transferred one after another.
Serial ports can be used to attach devices like modems or other asynchronous devices.
The backplane also contains devices for output such as the video card and sound card. The
video card can plug into an expansion slot or be built into the motherboard and gives the
PC its display capabilities. The sound card can also be an expansion card or a built-in card
that provides sound functions. Video and sound allow the user to get responses from the PC
about its operation.
To communicate with external devices, you have to attach your computer to a network
using a network interface card (NIC). A NIC is an expansion board inserted into a computer
so that the computer can be connected to a data network.
Once all these components have been powered and connected, a computer is ready for use.
All the items described here are critical to the operation of the PC and therefore required
for the computer to be networked.
Laptop Versus PC
Laptop and notebook computers have become increasingly popular devices within
computer networks because of their mobility. The components in a PC are also present
in a laptop computer. The main difference between PCs and laptops is that the laptop
components are smaller than those found in a PC. Also in a laptop, the expansion slots are
Personal Computer Memory Card International Association (PCMCIA) slots or PC card
slots, through which a NIC, modem, hard drive, or other useful device can be connected to
the system. A PCMCIA card is about the size of a credit card, but thicker. Figure 1-5 shows
a PCMCIA network interface card.
Network Computing Basics 11
Also called a LAN adapter, a NIC plugs into a motherboard and provides a port for
connecting to the network. The NIC constitutes the computer interface with the local-area
network (LAN).
12 Chapter 1: Introduction to Internetworking
The NIC communicates with the network through a serial connection and with the
computer through a parallel connection. When a NIC is installed in a computer, it requires
an interrupt request line (IRQ), an input/output (I/O) address, a memory space for the
operating system (such as Windows or Linux), and drivers to communicate between the
operating system and hardware.
An IRQ is a signal that informs a CPU that an event needing the CPU’s attention has
occurred. An IRQ is sent over a hardware line to the microprocessor. An example of an
interrupt being issued is when a key is pressed on a keyboard. The CPU must move the
character from the keyboard to RAM. An I/O address is a location in memory used to enter
or retrieve data from a computer by an auxiliary device.
When selecting a NIC for a network, you should consider the following items:
• T^pe of network—A 10/100 Ethernet NIC can be used for Ethernet LANs operating
at 10 or 100 Mbps. A 10-Mbps Ethernet NIC can be used only for an Ethernet segment
operating a 10 Mbps.
• Type of media—The type of port or connector used by the NIC for network
connection is specific to media type, such as twisted pair, fiber, and so on.
• Type of system bus—PCs can have PCI or ISA expansion slots. The Ethernet card
must match the expansion slot type the PC contains. Because ISA slots are slower than
PCI, many manufacturers are phasing out ISA slots in their computers.
The NIC enables hosts to connect to the network. The NIC is considered a key component
to the data network. To install a NIC into a computer, you need the following resources:
NOTE The plug-and-play features of most computers today automate the assignment of IRQ, I/O,
and DMA addresses so that you should have no conflicts. However, it is still important to
be able to recognize and possibly override these setting to correct possible conflicts.
Network Computing Basics Section Quiz 13
WARNING You should always be careful to use a static strap to avoid damage to the circuits when
handling PCBs.
1 Match each of the following definitions with the appropriate word. (Choose the best
answer.)
_A silicon based CPU
_Read-write memory that is lost when the power turned off
_ The main part of a PC, including the chassis, microprocessor, main memory, bus
and ports
_A printed circuit board that adds capabilities to a computer
A Motherboard
B Microprocessor
C ROM
14 Chapter 1: Introduction to Internetworking
D PCB
E Chassis
F System unit
G RAM
H NIC
I Expansion card
2 A laptop has the same main components as a PC, but they are typically smaller in size.
A True
B False
E A NIC can use DMA architecture to directly access the system memory without
using the CPU.
Computers can understand and process only data that is in the binary format. Binary is a
numbering system that is represented by Os and Is, which are referred to as binary digits
(bits). Os represent the off state and Is represent the on state of an electronic component.
The binary number system is also closely related to the hexadecimal numbering system,
which is used in programming and addressing. Understanding the numbering systems used
by computers and being able to relate these systems to the decimal numbering system used
by humans is an important tool in internetworking. Many of the addresses used by NICs
and network protocols are based on the binary and hexadecimal numbering systems.
Computer Numbering Systems 15
Most computer coding schemes use 8 bits to represent each number, letter, or symbol. A
series of 8 bits in memory is referred to as a byte. A byte also represents a single addressable
storage location in memory or a hard drive.
• Bit—The bit is smallest unit of storage in memory or on a storage device. A bit equals
1 or 0 and is the binary format in which data is processed by computers.
• Byte —A byte is equal to 8 bits of data and is the smallest storage unit in memory or
on a hard drive. A byte is the unit of measure used to describe the size of a data file,
the amount of space on a disk or other storage medium, or the amount of data being
sent over a network.
• kb (kilobit) —A kilobit is approximately 1000 bits.
• kB (kilobyte)—A kilobyte is approximately 1000 bytes (1024 bytes exactly).
• kbps (kilobits per second)—This is a standard measurement of the amount of data
in bits transferred over a network connection.
• kBps (kilobytes per second)—This is a standard measurement of the amount of data
in bytes transferred over a network connection.
• Mb (megabit)—A megabit is approximately 1 million bits.
• MB (megabyte)—A megabyte is approximately 1 million bytes (1,048,576 bytes
exactly). A megabyte is sometimes referred to as a “meg.”
• Mbps (megabits per second)—This is a standard measurement of the amount of data
transferred in bits over a network connection.
• MBps (megabytes per second)—This is a standard measurement of the amount of
data transferred in bytes over a network connection.
WARNING It is a common error to confuse kB with kb and MB with Mb. A capital B (byte) represents
8 lowercase b’s (bits). Remember to do the proper calculations when comparing
transmission speeds that are measured in bytes with those measured in bits. For example,
modem software usually shows the connection speed in kilobits per second, but popular
browsers display file-download speeds in kilobytes per second. This means that for a
modem with a45 kbps connection, the download speed would be a maximum of 5.76 kBps.
In reality, this download speed would not be achieved because of other factors like error
checking that consume the bandwidth at the same time as the transfer.
16 Chapter 1: Introduction to Internetworking
Another common set of measurements for computers relates to the frequency in time that
a clock state changes or the cycle of a waveform. These rates often describe CPU speeds
and also relate to how fast data can be transferred between the CPU and the expansion
cards. The following describe these clock rates:
• Hz (hertz)—A hertz is a unit of frequency. It is the rate of change in the state or cycle
in a sound wave, alternating current, or other cyclical waveform. It represents one
cycle per second.
• MHz (megahertz)—A megahertz is one million cycles per second. This is a common
measurement of the speed of a processing chip such as a computer microprocessor.
• GHz (gigahertz)—A gigahertz is one thousand million, or 1 billion (1,000,000,000),
cycles per second. This is a common measurement of the speed of a processing chip,
such as a computer microprocessor.
NOTE PC processors continue to get faster. The microprocessor used on PCs in the 1980s typically
ran under 10 MHz. (The original IBM PC was 4.77 MHz.) By 2000, PC processors were
approaching the speed of 1 GHz and have now passed that number.
Decimal-to-Binary Conversion
Computers recognize and process data using the binary, or base 2, numbering system. The
binary number system uses only 2 symbols (0 and 1) instead of the 10 symbols used in
the decimal numbering system. The position or place of each digit represents the number
2 (the base number) raised to a power (exponent) based on its position (2°, 21,22,23, 24,
25, and so on).
Computer Numbering Systems 17
Converting a decimal number to a binary number is one of the most common procedures
performed while working with network addresses such as IP addresses. IP addresses
identify a device on a network and the network to which it is attached. An IP address is
a binary number that is 32 bits long. To make them easy to remember, IP addresses are
usually written in dotted-decimal notation. This is accomplished by breaking the 32 bit
binary IP address into four 8 bit sections, expressing them as decimals and separating each
number by a dot. An example is the address 192.168.255.1. Keep in mind that a decimal
number is a base 10 number.
To convert the decimal number to binary you must first find the biggest power of 2 that fits
into the decimal number. Consider the number 35. Look at Figure 1-8 and determine which
is the greatest power of 2 that is less than or equal to 35. This would be 25 (decimal 32).
Place a 1 in that position of the decimal number and calculate how much is left over by
subtracting 32 from 35. The remainder is 3.
Number of
Symbols
Symbols
Base Exponent 24 23 22 21
m
Place Value
(Decimal Equivalent)
■mam nqm
Decimal Number
_
o
o
35 Expressed in o 0 1 0 1 1
Binary
mmmsm
■A' 6«*i J WSKtBm
Next, check to see if the next lowest power 24 (decimal 16) fits into 3. Since it does not, place
a 0 in that column. Continue this process for each next lowest power until you find a value
that the remainder fits into. Because the values 23 and 22 (decimal 8 and 4) are both larger
than 3, you place Os in those positions. The next lowest power of 2,21 (decimal 2), fits so
you place a 1 in this position and subtract 2 from 3. The remainder is 1 so you move to the
next lowest power of 2,2° (decimal 1), which is equal to the remainder and place a 1 in that
position. Because nothing is left over and this is the last position, you have completed the
task. Your result should be 100011 or if you put Os in the leading positions 00100011.
18 Chapter 1: Introduction to Internetworking
Figure 1-9 shows a flow chart that can be used to convert decimal numbers less than or
equal to 255 into binary numbers.
When working with binary numbers, you also need to be able to reverse the process to
convert them back to decimal numbers.
jtammi.
Subtract
64 From
Remainder
-1 NO |j|p#t§ a* YES
0 imSoMm 1
r Remainder?
Subtract
32 From
Remainder
continues
Computer Numbering Systems 19
Subtract
16 From
Remainder
I
NO 8 Fits YES
0 , Into t 1
Remainder?
Subtract
8 From
Remainder
Subtract
4 From
Remainder
Subtract
1 From
Remainder
Stop
20 Chapter 1: Introduction to Internetworking
Binary-to-Decimal Conversion
As with decimal-to-binary conversion, you usually have more than one way to solve the
conversion problem. You should use the method that is easiest for you. Perhaps one of the
easiest methods is to add the values of each place (or position) in the binary number. For
example, to convert the binary number 10111001 to a decimal number, you look to see
which power of 2 positions have Is in them. (Recall that Is indicate an on state.) Figure
1-10 shows the values of the positions in the on state for this decimal number.
Figure 1-10 shows that this binary number has the values 128, 32, 16, 8, and 1 in the on
position. This means that you would need to add these values up to get the decimal number
(128 + 32+ 16 + 8 + 1) = 185. Figure 1-11 shows a flowchart that can be used for binary-
to-decimal conversions.
Start With
Binary
Number
Total=0
Total
▼
continues
Computer Numbering Systems 21
Total
Total
Total
NO Place YES
Total = Total + 0 Holder Total = Total + 4
For
4=1?
continues
22 Chapter 1: Introduction to Internetworking
Total
NO Place YES
Total = Total + 0 Holder Total = Total + 2
__ For
■ HP
Total
Stop
Another numbering system that is used frequently when working with computers is the
base 16, or hexadecimal (hex) numbering system, which you learn about in the next
section. This system is used because it can represent binary numbers in a more readable
form. The computer performs computations in binary, but in several instances, the binary
output of a computer is expressed in hexadecimal to make it easier to read. For example,
the binary values 11110011 and 11110111 are hard to distinguish, but the hexadecimal
counterparts F3 and F7 are much easier to tell apart.
Computer Numbering Systems 23
Hexadecimal Conversions
Hexadecimal is referred to as base 16 because it uses 16 symbols. Combinations of these
symbols represent all possible numbers. Because only 10 symbols represent digits (0,1,2,
3,4,5,6,7,8,9) and base 16 requires 6 more symbols, the extra symbols are the letters A,
B, C, D, E, and F. These numbers represent the values shown in Table 1-2.
0 0
1 1
2 2
3 3
4 4
5 5
6 6
7 7
8 8
9 9
A 10
B 11
C 12
D 13
E 14
F 15
The position of each symbol (digit) in hex number represents that number multiplied by the
base number 16 raised to a power (exponent) based on its position. Moving from right to
left, the first position represents 16° (or 1), the second position represents 161 (or 16), the
third position represents 16^ (or 256), and so on. So the hex number 0xl2A would be
[(1 x 256) + (2 x 16) + (10 x 1)] = 298.
Converting a hexadecimal (commonly referred to as hex) number to binary, and vice versa,
is a common task when dealing with the configuration register in Cisco routers and
switches. A Cisco router has a configuration register that is 16 bits long. That 16-bit binary
number can be represented as a four digit hexadecimal number. For example,
0010 0001 0000 0010 in binary equals 2102 in hex.
24 Chapter 1: Introduction to Internetworking
Layer 2 Media Access Control (MAC) addresses, which identify the individual NIC, are
typically written in hex also. For Ethernet and Token Ring, these addresses are 48 bits, or
6 octets (1 octet is 1 byte, or 8 bits). Because these addresses consist of 6 distinct
octets, they can be expressed as 12 hex numbers. For example, instead of writing
10101010.11110000.11000001.11100010.01110111.01010001, the much shorter hex
equivalent can be written AA.F0.C1 JE2.77.51. To make handling hex versions of MAC
addresses even easier, the dots are placed only after each four hex digits, as in
AAF0.C1E2.7751.
The most common way for computers and software to express hexadecimal output is by
using Ox in front of the number. So when you see Ox, you know that the number that follows
is a hexadecimal number. For example, 0x1234 means 1234 in base 16.
While converting hex to decimal is somewhat cumbersome, converting binary to hex is easy
because base 16 (hexadecimal) is a power of base 2 (birrary). Every four binary digits (bits)
are equal to one hexadecimal digit, as shown in Table 1-3.
0000 0
0001 1
0010 2
0011 3
0100 4
0101 5
0110 6
0111 7
1000 8
1001 9
1010 A
1011 B
1100 C
1101 D
1110 E
mi F
Computer Numbering Systems 25
So, if you have a binary number that looks like 01011011, it can be broken into 2 groups of
4 bits and then converted. For the given number, the two groups would look like the
following: 0101 and 1011. When converting these two groups to hex the value of the first 4
bits is a 5 and the value of the second four bits is a B. So the hexadecimal equivalent to
01011011 is 5B. The decimal equivalent would be (64 + 16 + 8 + 2 + 1) or [(5 x 16) +
(11 x 1)], which is 91.
No matter how large the binary number, you can always apply the same conversion. Start
from the right of the binary number and break the digits into groups of four. If the number
of digits is not divisible by four, add zeros to the left end until four digits (bits) remain in
every group. Then, convert each group of four to its hexadecimal equivalent as shown in the
following conversion example:
100100100010111110111110111001001
Converts to:
oooi ooio oioo oioi mi 0111 1101 1100 1001
Converts to:
1 245 F 7 D C 9
Therefore:
100100100010111110111110111001001 binary = 1245F7DC9 hexadecimal
The conversion from hexadecimal to binary is the reverse process, as discussed in the
next section.
Hexadecimal-to-Binary Conversion
To convert from hexadecimal to binary, convert every hex digit into 4 binary digits (bits).
For example, to convert hex AC (OxAC) to binary, you first convert hexadecimal A, which
is 1010 binary, and then convert hexadecimal C, which is 1100 binary. Refer to Table 1-3
for the conversion values. Next, you need to place the binary digits in the proper order, A
(1010) followed by C (1100), so the conversion of hex AC is 10101100 binary.
The following example converts a hexadecimal number to a binary number, where 0x2102 =
0010 0001 0000 0010 in binary.
0x2102
Converts to:
2 10 2
0010 0001 0000 0010
Therefore:
2102 hexadecimal converts to 0010 0001 0000 0010 binary
Be especially careful to include 4 binary digits for each hexadecimal character, adding
zeros to the left of the number when necessary.
26 Chapter 1: Introduction to Internetworking
The basics of computer architecture and computer numbering systems are important to
internetworking. The more you know about these topics, the easier it is to understand
networks and internetworking devices. It is important to be familiar with the components
of a computer and to understand the functions of a network interface card. Because
computers can recognize and process data only by using the binary number system, it is
important to understand the relationship between the binary, hexadecimal, and decimal
numbering systems. After you have an understanding of these fundamentals, it is time to
apply that understanding to computer networks and internetworks.
1 Which of the following value expressions are true? (Choose all that apply.)
A 2000 kBps > 2 Mbps
A A
B G
C H
D F
E C
A 0x59AE8F
B 0xFlA595
C 0xF81F85
D 0xElFC2A
E 0xF4EA95
F 0x58F18F
Internetworking Fundamentals 27
Internetworking Fundamentals
The process of providing communications between data devices like computers is called
computer networking. A group of multiple computer networks connected together is called
an internetwork. The goal of the CCNA program is to make individuals proficient in basic
computer networking and internetworking technologies.
Many types of computer networks exist, and these networks vary based on media, protocol,
and topologies. However different these networks might be, some very common elements
bind them. These elements are the fundamentals that make up network communications.
These fundamentals include concepts like layered protocol stacks, addressing schemes, and
address mappings. The foundations of networking have changed little since the earliest data
networks, but the networks and protocols themselves have changed dramatically. To better
understand networking and be able to keep up with changes in technologies, a network
professional must have a solid grounding in the basic concepts of computer networks and
internetworks.
To achieve a foundation in internetworking concepts, you need to have a firm grasp of basic
networking terminology, understand the difference between computer applications and
networking applications, and understand the reasons for networking computers.
NOTE For a complete list of networking terms, refer to the Cisco Press title Dictionary of
Internetworking Terms and Acronyms (ISBN: 1587200457).
• Logical topology—The logical topology is the path that the signals take from one
computer to another. The logical topology might or might not correspond to the
physical topology. For example, a network can be a physical “star,” in which each
computer connects to a central hub, but inside the hub the data can travel in a circle,
making it a logical “ring.”
Internetworking Fundamentals 29
Networking Applications
Network applications are software programs that run between different computers
connected together on a network. Networking applications require a connection to a
networking service before these applications function.
Some of the more common uses of network applications include using a web browser
program to find content from the World Wide Web or using an e-mail program to send
e-mails over the Internet, as shown in Figure 1-12.
Server Server
Client A Client B
Network applications are selected based on the type of work that needs to be done. A
complete set of programs is available to interface with the Internet.. Each application
program type is associated with its own application protocol, including the following:
• Hypertext Transfer Protocol (HTTP)—The World Wide Web uses HTTP, which is
the communications protocol used to connect to web servers. Its primary function is
to establish a connection with a web server and transmit HTML pages to the client
browser.
• Post Office Protocol 3 (POP3)—E-mail programs support the POP3 application-
layer protocol for electronic mail. POP3 is a standard e-mail server commonly used
on the Internet. It provides a message storage container that holds incoming e-mail
until users log on and download it.
30 Chapter 1: Introduction to Internetworking
• File Transfer Protocol (FTP)—FTP is a simple file utility program for transferring
files between remote computers, which also provides for basic user authentication.
• Telnet—Telnet is a remote access application and protocol for connecting to remote
computer consoles, which also provides for basic user authentication. Telnet is not a
graphical user interface, but it is command-line driven or character mode only.
• Simple Network Management Protocol (SNMP)—Network management
programs use SNMP for monitoring the network device status and activities.
NOTE It is important to understand that the application layer is just another protocol layer in the
OSI model or TCP/IP protocol stack. The programs interface with application layer
protocols.
E-mail client applications (such as Eudora, Microsoft Mail, Pegasus, and Netscape Mail)
all work with the POP3 protocol. The same principle is true with web browsers. The two
most popular web browsers are Microsoft Internet Explorer and Netscape Communicator.
E-mail enables you to send messages between connected computers. The procedure for
sending an e-mail document involves two separate processes: sending the e-mail to the
user’s post office, which is a computer running the POP3 server software, and delivering
the e-mail from that post office to the user’s e-mail client computer, which is the recipient.
1 Match each of the following definitions with the appropriate word. (Choose the best
answer.)
_A set of rules by which computers communicate
_A high-speed network confined to a limited geographic region
_Devices used to connect cable segments, or subnets, into a larger internetwork
_The layout or physical shape of a network
A NOS
B Connectivity devices
C MAN
D WAN
Principles of Data Communications 31
E LAN
F Logical topology
G Protocol
H NIC
I Physical topology
J NIC
A Spreadsheet
B E-mail
C FTP
D Word processor
E Calculator
F Web browser
G PowerPoint
3 All corporate internetworks use the same components regardless of their business
structure.
A True
B False
Most languages have rules that specify how words are put together and then how they are
spoken or written. In many western languages, words are written from left to right, but in
some eastern languages words are written from right to left or even top to bottom. To be
able to effectively communicate, you must understand how to read the words and in what
order to read them.
32 Chapter 1: Introduction to Internetworking
Many of the computers and operating systems within an organization are manufactured by
different companies and use different types of programs to operate; however, if these
systems are going to communicate with one another, they must use a common set of rules
for data communications. The rules that define how systems talk to one another are called
protocols.
The next sections describe the purpose of the OSI model and the TCP/IP protocol stack.
You also learn how the OSI model facilitates data communication.
OSI Model
The OSI reference model is the primary model for network communications. The early
development of LANs, MANs, and WANs was chaotic in many ways. The early 1980s saw
tremendous increases in the number and sizes of networks. As companies realized that they
could save money and gain productivity by using networking technology, they added
networks and expanded existing networks as rapidly as new network technologies and
products were introduced.
By the mid-1980s, companies began to experience difficulties from all the expansions they
had made. It became more difficult for networks using different specifications and
implementations to communicate with each other. The companies realized that they needed
to move away from proprietary networking systems, those systems that are privately
developed, owned, and controlled.
NOTE In the computer industry, proprietary is the opposite of open. Proprietary' means that one
company or a small group of companies control(s) all usage of the technology. Open means
that free usage of the technology is available to the public.
To address the problem of networks being incompatible and unable to communicate with
each other, the ISO researched different network schemes. As a result of this research, the
ISO created a model that would help vendors create networks that would be compatible
with, and operate with, other networks.
The OSI reference model, released in 1984, was the descriptive scheme that the ISO had
created. It provided vendors with a set of standards that ensured greater compatibility and
interoperability between the various types of network technologies produced by companies
Principles of Data Communications 33
around the world. Although other models exist, most network vendors today relate their
products to the OSI reference model, especially when they want to educate customers on
the use of their products. The OSI model is considered the best tool available for teaching
people about sending and receiving data on a network.
The OSI reference model has seven layers, as shown in Figure 1-13, each illustrating a
particular network function. This separation of networking functions is called layering. The
OSI reference model defines the network functions that occur at each layer. More
important, the OSI reference model facilitates an understanding of how information travels
throughout a network. In addition, the OSI reference model describes how data travels from
application programs (for example, spreadsheets), through a network medium, to an
application program located in another computer, even if the sender and receiver are
connected using different network media.
[~7~ Application
[~6~ Presentation
[~5~ Session
[t Transport
[3] Network
[2 Data Link
[~t Physical
Dividing the network into these seven layers provides these advantages:
The practice of moving information between computers is divided into seven techniques in
the OSI reference model. Each of the seven techniques is represented by its own layer in
the model. The seven layers of the OSI reference model are as follows:
The boundary between the transport layer and the session layer can be thought of as the
boundary between application protocols and data-flow protocols. Whereas the application,
presentation, and session layers are concerned with application issues, the lower four layers
are concerned with data transport issues.
The transport layer attempts to provide a data-transport service that shields the upper layers
from transport implementation details. Specifically, issues such as reliability of transport
between two hosts are the concern of the transport layer. In providing communication service,
the transport layer establishes, maintains, and properly terminates virtual circuits. Transport
error detection and recovery and information flow control provide reliable service.
This method of passing data down the stack and adding headers and trailers is called
encapsulation. After the data is encapsulated and passed across the network, the receiving
device removes the information added, using the messages in the header as directions on
how to pass the data up the stack to the appropriate application.
Although encapsulation seems like an abstract concept, it is actually quite simple. Imagine
that you want to send a coffee mug to a friend in another city. How will the mug get there?
Basically, it will be transported on the road or through the air. You can’t go outside and set
the mug on the road or throw it up in the air and expect it to get there. You need a service
to pick it up and deliver it. So, you call your favorite parcel carrier and give them the mug.
But, that’s not all. Here’s the complete process:
Step 2 Place an address label on the box so the carrier knows where to deliver it.
Step 4 The carrier drives it down the road toward its final destination.
This process is similar to the encapsulation method that protocol stacks use to send data
across networks. After the package arrives, your friend has to reverse the process. He takes
the package from the carrier, reads the label to see who it’s from, and finally opens the
box and removes the mug. The reverse of the encapsulation process is known as de¬
encapsulation. The next sections describe the encapsulation and de-encapsulation
processes.
Principles of Data Communications 37
Encapsulation
Encapsulation on a data network is very similar. Instead of sending a coffee mug, however,
you send information from an application. The information sent on a network is referred to
as data or data packets.
Encapsulation wraps data with the necessary protocol information before network transit.
Therefore, as the data moves down through the layers of the OSI model, each OSI layer
adds a header (and a trailer, if applicable) to the data before passing it down to a lower layer.
The headers and trailers contain control information for the network devices and receiver
to ensure proper delivery of the data and to ensure that the receiver can correctly interpret
the data.
Figure 1-14 illustrates how encapsulation occurs. It shows the manner in which data travels
through the layers. These steps occur to encapsulate data:
Step 1 The user data is sent from an application to the application layer.
Step 2 The application layer adds the application layer header (Layer 7 header)
to the user data. The Layer 7 header and the original user data become
the data that is passed down to the presentation layer.
Step 3 The presentation layer adds the presentation layer header (Layer 6
header) to the data. This then becomes the data that is passed down to the
session layer.
Step 4 The session layer adds the session layer header (Layer 5 header) to the
data. This then becomes the data that is passed down to the transport
layer.
Step 5 The transport layer adds the transport layer header (Layer 4 header) to the
data. This then becomes the data that is passed down to the network layer.
Step 6 The network layer adds the network layer header (Layer 3 header) to the
data. This then becomes the data that is passed down to the data link
layer.
Step 7 The data link layer adds the data link layer header and trailer (Layer 2
header and trailer) to the data. A Layer 2 trailer is usually the frame check
sequence (FCS), which is used by the receiver to detect whether the data
is in error. This then becomes the data that is passed down to the physical
layer. The physical layer then transmits the bits onto the network media.
38 Chapter 1: Introduction to Internetworking
Sender
-4
T
HDR = Header
De-Encapsulation
When the remote device receives a sequence of bits, the physical layer at the remote device
passes the bits to the data link layer for manipulation. The data link layer performs the
following process, referred to as de-encapsulation:
Step 1 It checks the data-link trailer (the FCS) to see if the data is in error.
Step 3 If the data is not in error, the data-link layer reads and interprets the
control information in the data-link header.
Step 4 It strips the data link header and trailer and then passes the remaining
data up to the network layer based on the control information in the data-
link header.
User Data
L7
z] Application User Data
HDR
L6 L7
6] Presentation User Data
HDR HDR
5]
L5 Til L7 User Data
Session
HDR HDR HDR
L4 L5 L6 L7
4 Transport User Data
HDR! HDR! HDR HDR
L3 L4 L5 L6 L7
3J Network User Data
HDR HDR HDR HDR HDR
L2 L3 L4 L5 L6 L7
2 Data Link User Data
HDR HDR HDR HDR HDR HDR
1 | Physical Bits
HDR = Header
Think of de-encapsulation as the process of reading the address on a package to see whether it
is for you, and then opening and removing the contents of the package if it is addressed to you.
Peer-to-Peer Communication
For data to travel from the source to the destination, each layer of the OSI model at the
source must communicate with its peer layer at the destination. This form of communica¬
tion is referred to as peer-to-peer communication. During this process, the protocols at each
layer exchange information, called protocol data units (PDUs), between peer layers, as
shown in Figure 1-16.
Sender Receiver
40 Chapter 1: Introduction to Internetworking
Data packets on a network originate at a source and then travel to a destination. Each layer
depends on the service function of the OSI layer below it. To provide this service, the lower
layer uses encapsulation to put the PDU from the upper layer into its data field. It then adds
whatever headers the layer needs to perform its function. As the data moves down through
Layers 7 through 5 of the OSI model, additional headers are added. The grouping of data
at the Layer 4 PDU is called a segment.
The network layer provides a service to the transport layer, and the transport layer presents
data to the internetwork subsystem. The network layer moves the data through the internet¬
work by encapsulating the data and attaching a header to create a datagram (the Layer 3
PDU). The header contains information required to complete the transfer, such as source
and destination logical addresses.
The data link layer provides a service to the network layer by encapsulating the network
layer datagram in a frame (the Layer 2 PDU). The frame header contains the physical
addresses required to complete the data-link functions, and the frame trailer contains the
FCS.
The physical layer provides a service to the data link layer, encoding the data-link frame
into a pattern of 1 s and Os (bits) for transmission on the medium (usually a wire) at Layer 1.
Network devices such as hubs, switches, and routers work at the lower three layers. Hubs
are at Layer 1, switches are at Layer 2, and routers are at Layer 3.
The TCP/IP protocol stack has four layers. It is important to note that although some of the
layers in the TCP/IP protocol stack have the same names as layers in the OSI model, the
layers have different functions in each model, as is described in the following list:
• Transport layer—The transport layer deals with quality of service (QoS) issues of
reliability, flow control, and error correction. One of its protocols. Transmission
Control Protocol (TCP), provides for reliable network communications.
• Internet layer—The purpose of the Internet layer is to send source datagrams from
any network on the internetwork and have them arrive at the destination, regardless of
the path they took to get there.
• Network access layer—The name of this layer is broad and somewhat confusing. It
is also called the host-to-network layer. It includes the LAN and WAN protocols, and
all the details in the OSI physical and data link layers.
Similarities between the TCP/IP protocol stack and the OSI model include the following:
Some differences also exist between the TCP/IP protocol stack and the OSI model, such as
the following:
• TCP/IP combines the presentation and session layers into its application layer.
• TCP/IP combines the OSI data link and physical layers into the network access layer.
TCP/IP protocols are the standards around which the Internet developed, so the TCP/IP
protocol stack gains credibility just because of its protocols. In contrast, networks are not
typically built on the OSI model, even though the OSI model is used as a guide.
1 Match the layer of the OSI model with the appropriate function.
_Synchronizes dialogue between the presentation layers of the two hosts and
manages their data exchange.
_Defines the maximum transmission distance and data rates for a network.
_Provides connectivity and path selection between two host systems.
_Establishes, maintains, and terminates connectivity between devices.
A Layer 1
B Layer 2
C Layer 3
D Layer 4
E Layer 5
F Layer 6
G Layer 7
D Network devices operate at the upper three layers of the OSI model.
Chapter Summary
Computer networks are a vital part of almost every business organization today. Before you
can administer a company’s internetwork, you must first understand the basic components
of a computer and a computer network. You must also understand the language that is
spoken by computers and computer professionals. This chapter covered the basic com¬
ponents of a computer and the numbering systems used in computers and in computer
networks. This chapter also discussed many key terms used by internetworking
professionals to describe internetworking systems.
The OSI reference model was discussed to explain how a network protocol is used for data
communications. The chapter also covered the basic way that a computer uses a protocol to
communicate with other systems describing the process of data encapsulation and de¬
encapsulation. Finally the chapter discussed how the TCP/IP protocol compares to the OSI
reference model.
1 The_is a signal that informs a CPU that an event that needs its attention
has occurred.
A Fiber-optic pulse
B Frequency
C I/O address
D IRQ
2 What computer component allows the computer to communicate with the network?
A Sound card
B NIC
C Video card
D Port adapter
44 Chapter 1: Introduction to Internetworking
3 Today, what are the common measurements for the speed of a computer
microprocessor? (Choose two.)
A Hz
B Kbps
C MHz
D Mbps
E GHz
A 11110000
B 11101110
C 11111000
D 11101111
A 180
B 185
C 157
D 179
E 178
A HTTP
B FTP
C Telnet
D SMNP
A IEEE
B ISO
C DEC
D DIX
8 An e-mail message is sent from Host A to Host B on a LAN. To send this message,
the data must be encapsulated. Which of the following best describes the first step of
data encapsulation?
Internetworking Devices
Every internetwork exists because of the devices used to provide connectivity between
individual networked systems. Cisco Systems manufactures devices and operating systems
that are used in the integration and management of these internetworks. To effectively build,
manage, and troubleshoot an internetwork, you need to understand the roles that each of
these devices play.
You need to understand many concepts in internetworking. These include the differences
between a logical and physical network; how devices function at the physical, data link, and
network layers of the OSI model; and how internetworking devices are interconnected to
provide services that are beneficial to the organization that they serve. This chapter provides
you with a base knowledge of these fundamental internetworking concepts. After the
concepts are introduced, the remaining chapters provide more detail on how internet¬
working devices function within the OSI model.
Internetworks have changed how companies and employees are viewed. It is no longer
necessary to have everyone in the same location to access the information needed to do the
job. Because of this, many companies have changed their business strategy to utilize these
networks in the way that mirrors how the business operates. With a corporate internetwork,
a company optimizes its resources by grouping employees (users) in the following ways, as
illustrated in Figure 2-1:
• Main office—The main office is where everyone is connected to a LAN and where
the majority of the corporate information is located. A main office could have
hundreds or thousands of users who depend on the network to do their jobs. The main
office might be a building with many LANs or might be a campus of such buildings.
Because everyone needs access to central resources and information, it is common to
see a high-speed backbone LAN and a centralized data center with mainframe
computers and application servers.
48 Chapter 2: Internetworking Devices
To understand what types of equipment and services to deploy in your network and when,
it is important to understand business and user needs. You can then subdivide the network
into a hierarchical model that spans from the end user’s machine to the core (backbone) of
the network. Figure 2-2 shows how the different employee groups interconnect.
Mapping Business Needs to a Hierarchical Model 49
Remote Campus
Campus networks have traditionally placed basic network-level intelligence and services at
the center of the network and shared bandwidth at the user level. As businesses continue to
place more emphasis on the network as a productivity tool, distributed network services like
voice/video and switching continue to migrate to the desktop level.
User demands and network applications have forced networking professionals to use the
traffic patterns in the network as the criteria for building an internetwork. Networks
cannot be divided into smaller networks or subnetworks based only on the number of
users, but should also consider the types of traffic involved. The emergence of servers that
run global applications also has a direct impact on the load across the network. A higher
traffic load across the entire network results in the need for more efficient routing and
switching techniques.
50 Chapter 2: Internetworking Devices
Traffic patterns now dictate the type of services needed by end users in networks. To
properly build an internetwork that can effectively address a user’s needs, a three-layer
hierarchical model organizes traffic flow. (See Figure 2-3.)
End Station
Entry Point to ■
the Network
Routing,
Filtering, and
WAN Access
Switches Traffic
to the —
Appropriate
Service
• Access
• Distribution
• Core
Each of these layers serves a function in delivering network services, as described in the
following sections.
Access Layer
The access layer of the network is the point at which end users are connected to the
network. This is why the access layer is sometimes referred to as the desktop layer. Users,
and the resources they need to access most, are locally available. Traffic to and from local
resources is confined between the resources, switches, and end users. Multiple groups of
users and their resources exist at the access layer.
In many networks, it is not possible to provide users with local access to all services, such
as database files, centralized storage, or dial-out access to the web. In these cases, user
traffic for these services is directed to the next layer in the model, the distribution layer.
Mapping Business Needs to a Hierarchical Model 51
Distribution Layer
The distribution layer of the network (also referred to as the workgroup layer) marks the
point between the access layer and the core services of the network. This layer’s primary
function is to perform functions such as routing, filtering, and WAN access. In a campus
environment, the distribution layer represents a multitude of functions, including the
following:
Core Layer
The core layer (also called the backbone layer) switches traffic as fast as possible to the
appropriate service. Typically, the traffic being transported is to and from services common
to all users. These services are referred to as global or enterprise services. Examples of
these services are e-mail, Internet access, and videoconferencing.
When a user needs access to enterprise services, the request is processed at the distribution
layer. The distribution layer device then forwards the user’s request to the backbone. The
backbone simply provides quick transport to the desired enterprise service. The distribution
layer device provides controlled access to the core.
To properly build a network, you must first understand how your internetwork is used, your
business needs, and your user needs. Those needs can then be mapped into a model that can
be used to build your internetwork. One of the best ways to understand how to build an
internetwork is to first understand the way in which traffic is passed across the data network.
The following sections describe how networks are interconnected using different types of
internetworking devices.
52 Chapter 2: Internetworking Devices
The logical topology of a network refers to the logical paths that signals travel from one
point on the network to another (that is, the way in which data accesses media and transmits
packets across it).
The physical and logical topologies of a network can be the same. For example, in a
network physically shaped as a linear bus, the data travels along the length of the cable.
Therefore, it has both a physical bus topology and a logical bus topology.
A network can also have physical and logical topologies that are different. For example, a
physical topology in the shape of a star, where cable segments can connect all computers
to a central hub, can have a logical ring topology. Remember from Chapter 1, “Introduction
to Internetworking,” that in a ring the data travels from one computer to the next, and inside
the hub, the wiring connections are such that the signal actually travels around in a circle
from one port to the next, creating a logical ring. Therefore, you cannot always predict how
data travels in a network by simply observing its physical layout.
Token Ring uses a logical ring topology in either a physical ring or a physical star, whereas
Ethernet uses a logical bus topology in either a physical bus or a physical star. Star topology
is by far the most common implementation of LANs today. Token Ring is used in some
places; however, most LANs use Ethernet.
Bus
Commonly referred to as a linear bus, all the devices on a bus topology are connected by
one single cable. As illustrated in Figure 2-4, in a bus topology a cable proceeds from one
computer to the next, like a bus line going through a city.
With a physical bus topology, the main cable segment must end with a terminator that
absorbs the signal when it reaches the end of the line or wire. If no terminator exists, the
electrical signal representing the data bounces back at the end of the wire, causing errors in
the network.
When installed, the star topology resembles spokes in a bicycle wheel. It is made up of a
central connection point that is a device such as a hub, switch, or router, where all the
cabling segments meet. Each host in the network is connected to the central device with its
own cable.
Although a physical star topology might require more materials and labor to implement
than the physical bus topology, the advantages of a star topology make it worth the
additional cost. Each host is connected to the central device with its own wire, so that when
that cable has a problem, only that host is affected, and the rest of the network remains
operational. This benefit is extremely important and is the reason why almost every newly
designed Ethernet LAN has a star topology.
Star
54 Chapter 2: Internetworking Devices
Ring
The logical ring topology is another important topology in LAN connectivity. This
section describes both types of ring topology, single-ring and dual-ring, which are shown
in Figure 2-6.
Dual Ring
As the name implies, hosts are connected in the form of a ring. Unlike the physical bus
topology, it has no beginning or end that needs to be terminated. Data is transmitted in a
way unlike the logical bus topology. A token, which is a series of bits in a frame required
to send data, travels around the ring, stopping at each node. If a node wants to transmit data,
it adds that data and the destination address to the token. The data and token then continue
around the ring through each device until it arrives at the destination node, which takes the
data out of the token and sends the token back onto the ring. The advantage of using this
type of method is that no collisions of data packets occur.
In a single-ring topology, all the devices on the network share a single cable, and the data
travels in one direction only. Each device waits its turn to send data over the network.
In a dual-ring topology, two counter-rotating rings allow data to be sent in both directions.
This setup creates redundancy (fault tolerance), meaning that if one ring fails, data can be
transmitted in the other direction on the other ring. Dual rings are used in FDDI or CDDI.
The full-mesh topology connects all devices (nodes) to each other for redundancy and fault
tolerance. Implementing the full-mesh topology is expensive and difficult.
Network Topology Section Quiz 55
Partial Mesh
The technology and devices used at the lower two layers of the OSI model define a network
topology. In particular, physical and logical topologies are defined by the physical and data
link layer.
C A physical topology describes the paths that signals travel from one point on the
network to another.
3 Which topology has all its nodes connected directly to one center point and has
no other connections between nodes?
A Bus
B Ring
C Star
D Mesh
A Duplex
B Signaling
C Redundancy
This section describes the functions of each layer and how each device works to provide
internetwork services.
>. ■ y
The physical layer defines the media type, connector type, and signaling type. It specifies
the electrical, mechanical, procedural, and functional requirements for activating,
maintaining, and deactivating the physical link between end systems. The physical layer
also specifies characteristics such as voltage levels, data rates, maximum transmission
distances, and physical connectors. In the mug analogy used in Chapter 1, the physical
layer is the road on which the mug is carried. The roadway is a physical connection
between different cities that allows you to go from one place to another. Different roads
have different rules, such as speed limits or weight limits, just as different network
media have different bandwidths or maximum transmission units (MTUs).
The Ethernet and IEEE 802.3 (CSMA/CD) standards define a bus topology LAN that
operates at a baseband signaling rate of 10 megabits per second (Mbps), 100 Mbps, and
1000 Mbps. Figure 2-9 shows five defined physical layer wiring standards, defined as
follows:
• 10BASE2—Known as Thinnet. Allows network segments up to 185 meters at the data
rate of 10 Mbps on coaxial cable by interconnecting or chaining devices together.
• 10BASE5—Known as Thicknet. Allows network segments up to 500 meters at the
data rate of 10 Mbps on large coaxial cable with devices tapping into the cable to
receive signals.
58 Chapter 2: Internetworking Devices
The 10BASE5 and 10BASE2 standards provide access for multiple stations on the same
segment by physically connecting each device to a common Ethernet segment. 10BASE5
cables attach to the bus using a cable and an attachment unit interface (AUI). 10BASE2
networks chain devices together using coaxial cable and T-connectors to connect the
stations to the common bus.
Because the 10BASE-T standard provides access for a single station at a time, each station
must attach to a common bus structure to interconnect all the devices. The hub becomes the
bus of the Ethernet devices and is analogous to the segment.
100BASE-T segments can also be connected to a hub so that the hub becomes the bus.
100BASE-T is physically similar to 10BASE-T except it operates 10 times faster. It is
becoming more common to interconnect 100BASE-T or 100BASE-F devices using a
switch. With a switch, each segment becomes a separate collision domain off a star topology.
Functions of Internetworking Devices 59
NOTE 10BASE5 and 10BASE2 Ethernet standards are typically no longer used in corporate
networks. They are listed here for educational value to help explain the differences between
physical network types.
• Collision domain—A group of devices connected to the same physical media such
that if two devices access the media at the same time, the result is a collision of the
two signals
• Broadcast domain—A group of devices in the network that receive one another’s
broadcast messages
These terms help you understand the basic structure of traffic patterns and help define the
need for devices such as switches and routers.
Layer 1 Devices
Layer 1 devices are the most basic internetworking devices. They support physical layer
connectivity between networking devices. Several types of Layer 1 devices exist, but the
most common devices are the following:
• Repeaters
• Hubs
A repeater is a networking device that exists at Layer 1, the physical layer, of the OSI
reference model. As data leaves a source and goes out over a network, it is transformed into
either electrical or light pulses that pass along the networking media. These pulses are
referred to as signals. When signals leave a transmitting station, they are clean and easily
recognizable. However, the longer the cable length, the more the signals deteriorate. The
purpose of a repeater is to regenerate and retime network signals at the bit level, allowing
them to travel a longer distance on the media.
The term repeater originally referred to a device with a single “in” port and a single “out”
port. Today, multiport repeaters also exist. Repeaters are classified as Layer 1 devices in the
OSI model because they act only at the bit level and look at no other information.
60 Chapter 2: Internetworking Devices
The purpose of a hub is to regenerate and retime network signals. Because a hub performs
the same basic function as a repeater, it is also known as a multiport repeater. The difference
between a repeater and a hub is the number of cables that connect to the device. A repeater
typically has only 2 ports, whereas a hub generally has from 4 to 24 or more ports. A
repeater receives on one port and repeats on the other, whereas a hub receives on one port
and transmits on all other ports.
Many Ethernet segments today are devices interconnected with switches and occasionally
hubs. These devices allow the concentration of many Ethernet devices into a centralized
device that connects all the devices to the same physical bus structure in the hub or
backplane in a switch. This means that all the devices connected to a hub share the same
media and, consequently, share the same collision domain, broadcast domain, and
bandwidth. With a switch, the collision domain and bandwidth are separate for each
connected device; the broadcast domain is typically the same by default, but can be
configured otherwise. The resulting physical connection is that of a star topology as
opposed to a linear topology. Figure 2-10 shows a common connection to the hub.
A hub does not manipulate or view the traffic that crosses that bus; it is used only to extend
the physical media by repeating the signal it receives in one port out all the other ports. This
means that a hub is a physical layer device. It is concerned only with propagation of the
physical signaling, without any regard for upper-layer functions. This does not change the
rules of Ethernet, however. Stations still share the bus of the hub, which means that
contention still occurs.
Because all devices are connected to the same physical media, a hub is a single collision
domain. If one station sends out a broadcast, the hub propagates it to all other stations, so
it is also a single broadcast domain.
The Ethernet technology is known as carrier sense multiple access collision detect (CSMA/
CD). It means that multiple stations have access to the media, and before one station can
access that media, it must first “listen” (carrier sense) to make sure that no other station is
using the same media. If the media is in use, the station must wait before sending out any
data. If two stations both listen and hear no other traffic, and then they both try to transmit
at the same time, the result is a collision.
For example, in Figure 2-11, both cars try to occupy the same road at the same time, and
they collide. In a network, as with cars, the resulting collision causes damage. In fact, the
damaged frames become error frames, which the transmitting stations detect as a collision,
forcing both stations to retransmit their respective frames. A backoff algorithm determines
when the stations retransmit to minimize the chance of another collision. The more stations
that exist on an Ethernet segment, the greater the chance that collisions will occur. These
excessive collisions are the reason that networks are segmented (broken up) into smaller
collision domains using switches and bridges.
This layer provides the communications between workstations at the first logical layer
above the bits on the wire. As a result, many functions are provided by the data link layer.
The physical addressing of the end stations is done at the data link layer. To help the
network devices determine whether they should pass a message up the protocol stack, fields
exist in this layer to identify which upper-layer stack to pass the data to (such as IP, IPX,
AppleTalk, and so on). The data link layer provides support for connection-oriented and
connectionless services and provides for sequencing and flow control. With the addition of
802.IQ as a data link protocol, frames can now be marked with priority for classification of
services. All the Layer 2 fields are used by data link layer devices to control the flow of
traffic between devices.
To provide these functions, the Institute of Electrical and Electronic Engineers (IEEE) data
link layer is defined by two sublayers:
• Media Access Control (MAC) sublayer (802.3) — The MAC sublayer is responsible
for how the data is transported over the physical wire. This is the part of the data link
layer that communicates downward to the physical layer. It defines such functions as
physical addressing, network topology, line discipline, and error notification.
• Logical Link Control (LLC) sublayer (802.2)— The LLC sublayer is responsible
for logically identifying different protocol types and then encapsulating them to be
transmitted across the network. A type code or service access point (SAP) identifier
Functions of Internetworking Devices 63
does the logical identification. The type of LLC frame used by an end station depends
on what identifier the upper-layer protocol expects. Additional LLC options include
support for connections between applications running on the LAN, flow control to the
upper layer, and sequence control bits. For some protocols, LLC defines reliable or
unreliable services for data transfer instead of the transport layer. (Reliable and
unreliable services are discussed further in the section, “Transport Layer Functions.”)
# Bytes 8 6 6 2 Variable 4
Ethernet II
Uses"Type"
Here and
xx.xxxx Does Not Use
OOOO.OC
802.2
T T
T Sublayers
IEEE Vendor
Assigned Assigned
MAC Address
Figure 2-13 shows the standard frame structure to provide an example of how control
information transmits information at this layer. The definitions of the MAC sublayer fields
are as follows:
identifier (OUI). To ensure vendor uniqueness, the IEEE administers OUIs. The last 24
bits or 6 hexadecimal digits are administered by each vendor and often represent the
interface serial number.
The source address is always a unicast (single node) address, and the destination address
might be unicast, multicast (group of nodes), or broadcast (all nodes). In addition to the
Layer 2 addressing, the Layer 2 fields in the frame include the following:
• Length—In IEEE 802.3 frames, the 2-byte held following the source address is a
length held, which indicates the number of bytes of data that follow this held and
precede the frame check sequence (FCS) held.
• Type—For Ethernet Type II, the 2-byte held following the source address identihes
the EtherType. The EtherType is a hexadecimal held that identihes the upper-layer
protocol. For example, 0x0800 would be an EtherType of IP.
• Data—Following the length held is the data held, which includes the LLC. control
information, other upper-layer control information, and the user data, such as a Layer
3 datagram.
• FCS—A 4-byte FCS held containing a cyclic redundancy check (CRC) value follows
the data held. The CRC is created by the sending device and recalculated by the
receiving device to check for damage that might have occurred to the frame in transit.
For IEEE 802.3 frames, the sublayer helds provide additional services and identify the
upper-layer protocol. The LLC and SNAP sublayers are used in IEEE 802.3 frames.
• LLC header— The LLC header contains service access points that indicate the
upper-layer protocol. The destination SAP (DSAP) and source SAP (SSAP) fields are
1 byte each and act as pointers to the upper-layer protocols in a station. For example,
a frame with a SAP of 06 hex is destined for IP, and a frame with a SAP of E0 hex is
destined for IPX. From the perspective of these lower MAC sublayers, the SAP
process provides a convenient interface to the upper layers of the protocol stack.
These SAP entries allow the physical and data link connections to provide services for
many upper-layer protocols.
If a frame uses the SNAP fields, the SSAP and DSAP addresses are both set to AA
hex, and the control field is set to 03 hex. In addition to the SAP fields, a SNAP header
has a type code field that allows for the inclusion of the EtherType field. The
EtherType field defines which upper-layer protocol receives the data using the same
hexadecimal types used by Ethernet II.
Functions of Internetworking Devices 65
• SNAP header—In a SNAP frame, the first 3 bytes of the SNAP header after the
control field are the OUI vendor code. Following the OUI vendor code is a 2-byte field
containing the EtherType for the frame. Here is where the backward compatibility
with Ethernet Version II is implemented. As with the 802.3 frame, a 4-byte FCS field
follows the data field and contains a CRC value.
802.2 LLC
Sublayer
(SNAP)
1 1 1 or 2 3 2 Variable
802.2 LLC
OR
Sublayer (SAP)
1 1 or 2 Variable
Dest Source
SAP SAP
—--
Type
802. IQ NEW
DA SA or Data Field
TAG FCS
Length
Canonical Format
Identifier
(CFI)
VLAN ID
Data Link
Layer 2
Functions of Internetworking Devices 67
NOTE Although some Layer 3 and Layer 4 switches perform routing, this book uses the term
switch to refer to a Layer 2 device.
A bridge is a Layer 2 device designed to create two or more LAN segments, where each
segment is a separate collision domain. Therefore, by filtering traffic on a LAN to keep
local traffic local, yet allowing connectivity to other segments for traffic specifically
directed there, bridges make more bandwidth available for valid data exchange.
Every networking device has a unique MAC address on the NIC. The bridge keeps track of
which MAC addresses are on each side of the bridge and makes forwarding decisions based
on this MAC address list. Because bridges filter network traffic by looking only at the MAC
address, they are not concerned with the network layer protocol and can rapidly forward
frames regardless of their payload. The following are the important properties of bridges:
• Bridges are more “intelligent” than hubs. That is, they can analyze incoming frames
and forward (or drop) them based on address information.
• Bridges collect and pass packets between two or more LAN segments.
• Bridges create multiple collision domains, allowing more than one device to transmit
simultaneously without causing a collision.
• Bridges maintain MAC address tables.
When a bridge or switch receives a frame, it uses the data link information to process the
frame. In a transparent bridge environment, the bridge processes the frame by determining
whether it needs to be copied to other connected segments. A transparent bridge hears every
frame that crosses a segment and views each frame and source address field to determine
on what segment the source station resides. The transparent bridge stores this information
in memory in a forwarding table. The forwarding table lists each end station (from which
the bridge has heard a frame within a particular time period) and the segment on which it
resides. When a bridge hears a frame on the network, it views the destination address and
compares it to the forwarding table to determine whether to filter, flood, or copy the frame
onto another segment.
• If the destination device is on the same segment as the frame, the bridge blocks the
frame from going on to other segments. This process is known as filtering.
• If the destination device is on a different segment, the bridge forwards the frame to the
appropriate segment. This process is knows as forwarding.
• If the destination address is unknown to the bridge, the bridge forwards the frame to all
segments except the one on which it was received. This process is known as flooding.
68 Chapter 2: Internetworking Devices
Because a bridge learns all the station destinations by listening to source addresses, it never
learns the broadcast address. Therefore, all broadcasts are always flooded to all the
segments on the bridge or switch. Therefore, all segments in a bridged or switched
environment are considered to be in the same broadcast domain.
Like repeaters and hubs, another device, called a switch, is used as a concentrator for
multiple network devices. A switch, however, defines different physical connections for
each device using multiple bridge connections. A switch, also called a LAN switch, often
replaces hubs and works with existing cable infrastructures to provide minimal disruption
to existing networks.
Switches are data link layer devices that, like bridges, enable multiple physical LAN
segments to be interconnected into single larger networks. Like bridges, switches forward
traffic based on MAC addresses. Because switching is performed in hardware instead of
software, it is significantly faster. Think of each switch port as a microbridge. The process
of dividing large network segments into smaller network segments is called micro¬
segmentation. Thus, each switch port acts as a separate bridge and, when connected to an
individual host, gives the full bandwidth of the medium to that host.
NOTE This book focuses on transparent bridging because this is the function performed by the
Cisco Catalyst series of switches. This is also the most common form of bridging/switching
in Ethernet environments. It should also be noted that other types of bridges exist, such as
source-route bridging, in which the source determines the route to be taken through the
network, and translational bridging, which allows the frame to move from a source route to
a transparent environment between Ethernet and Token Ring.
A bridged/switched network provides excellent traffic management. The purpose of the Layer
2 device is to reduce collisions, which waste bandwidth and prevent packets from reaching
their destinations. Part A of Figure 2-17 shows how a switch reduces collisions by comparing
frames to cars. With a switch, each segment is given its own collision domain. Part B of Figure
2-17, using a car analogy, shows that when two or more packets need to get onto the same
segment, the traffic is stored in memory until the segment is available for use.
• All devices connected to the same bridge or switch are part of the same broadcast
domain, by default.
• All segments must use the same data link layer implementation, such as all Ethernet
or all Token Ring. If an end station must communicate with another end station on
different media, then some device, such as a router or translational bridge, must
translate between the different media types.
Functions of Internetworking Devices 69
In a switched environment, there can be one device per segment, and each device can send
frames at the same time, thus allowing the primary pathway to be shared.
•
802.2
Data Link •,* :
Layer 2
Ethernet
802.3
Physical
Layer 1
Logical addressing schemes identify networks in an internetwork and the location of the
devices within the context of those networks. These schemes vary based on the network
layer protocol in use. This book discusses the network layer operation for the TCP/IP
protocol stack.
Security numbering system, in which each person has a single, unique Social Security
number that they keep regardless of where they live. Figure 2-19 shows a sample
network layer address as defined within a network layer packet. In addition to
addressing, the Layer 3 protocol also defines fields which can identify the importance
of a frame. All Layer 3 fields are used by Layer 3 internetworking devices for the
delivery of frames.
Network Node
The logical address consists of two portions. One part uniquely identifies each network
within the internetwork, and the other part uniquely identifies the hosts on each of those
networks. Combining both portions results in a unique network address for each device.
This unique network address has two functions:
• The network portion identifies individual networks, allowing the routers to identify
paths through the network cloud. The router uses this address to determine where to
send network packets in the same manner that the ZIP code on a letter determines the
state and city that a package should be delivered to.
• The host portion identifies a particular device or a device’s port on the network in the
same manner that a street address on a letter identifies a location within that city.
Many network layer protocols exist, and they all share the function of identifying networks
and hosts throughout the internetwork structure. Most of these protocols have different
schemes for accomplishing this task. TCP/IP is a common protocol that is used in routed
networks. An IP address has the following components to identify networks and hosts:
• A 32-bit address, divided into four 8-bit sections called octets. This address identifies
a specific network and a specific host on that network by subdividing the bits into
network and host portions.
• A 32-bit subnet mask that is also divided into four 8-bit octets. The subnet mask
determines which bits represent the network and which represent the host. The bit
pattern for a subnet mask is a string of consecutive Is followed by the remaining bits,
which are Os. Figure 2-20 shows that the boundary between the Is and the Os marks
the boundary for the network and host portions of the address, the two components
necessary to define an IP address on an end device.
72 Chapter 2: Internetworking Devices
Address Mask
172.16. 122.204 255.255.0.0
255 255 0 0
Binary
11111111 11111111 00000000 00000000
Mask
Network Host
NOTE IP addresses are represented by taking the 8-bit octets, converting them to decimal, and then
separating the octets with dots or periods. This format is known as dotted decimal and is
done to simplify addressing for those of us who count in base 10.
TOS Field
Functions of Internetworking Devices 73
Because routers function at the network layer of the OSI model, they separate segments into
unique collision and broadcast domains. Each segment is referred to as a network and must
be identified by a network address to be reached by end stations. In addition to identifying
each segment as a network, each station on that network must also be uniquely identified
by the logical address. This addressing structure allows for hierarchical network
configuration but is defined by the network it is on as well as a host identifier (that is, a
station is not known merely by a host identifier). For routers to operate on a network, it is
required that each interface be configured on the unique network it represents. The router
must also have a host address on that network. The router uses the interface’s configuration
information to determine the network portion of the address to build a routing table.
74 Chapter 2: Internetworking Devices
In addition to identifying networks and providing connectivity, routers also perform other
functions:
Telecommuter
Mobile User
Branch Office
Routers support a variety of physical layer connectivity standards that allow you to build
WANs. In addition, they can provide the security and access controls that are needed when
interconnecting remote locations.
Functions of Internetworking Devices 75
Network IP IPX
• Allows end stations to assemble and disassemble multiple upper-layer segments into
the same transport layer data stream. This is accomplished by assigning upper-layer
application identifiers. Within the TCP/IP protocol suite, these identifiers are known
as port numbers. The OSI reference model refers to these identifiers as service access
points (SAPs). The transport layer uses these port numbers to identify application
layer entities such as FTP and Telnet. An example of a port number is 23, which
identifies the Telnet server application. Data with a destination transport port number
of 23 would be going to the Telnet application.
• Allows applications to request reliable data transport between communicating end
systems. Reliable transport uses a connection-oriented relationship between the
communicating end systems to accomplish the following:
— Ensure that segments delivered are acknowledged back to the sender
— Provide for retransmission of any segments that are not acknowledged
— Put segments back into their correct sequence order at the receiving station
— Provide congestion avoidance and control
At the transport layer, data can be transmitted reliably or unreliably. For IP, TCP is reliable
or connection-oriented and UDP is unreliable or connectionless. A good analogy to
connection-oriented versus connectionless is a phone call versus a postcard. With a phone
call, you establish a dialogue that lets you know how well you are communicating. A post¬
card offers no real-time feedback.
76 Chapter 2: Internetworking Devices
Like a phone call, to communicate with a connection-oriented service, you must first
establish the connection. To do this within the TCP/IP protocol suite, the sending and
receiving stations perform an operation known as a three-way handshake.
After the connection is established, the transfer of information begins. During the transfer,
the two end stations continue to communicate with their transport layer PDUs (headers) to
verify that the data is received correctly. If the receiving station does not acknowledge a
packet within a predefined amount of time, the sender retransmits the package. This ensures
reliable delivery of all traffic. After the data transfer is complete, the session is
disconnected.
Multilayer Devices
A multilayer switch works much like a Layer 2 switch. In addition to switching using Layer
2 MAC addresses, a multilayer switch can also use Layer 3 network addresses (IP).
Traditionally, Layer 3 functions have occurred only within routers. However, over the past
few years, improved hardware has allowed many Layer 3 routing functions to occur in
hardware. Layer 3 routing has traditionally been a software-bound process that creates
network bottlenecks. With the advent of high-speed, hardware-based multilayer switches,
Layer 3 functions can be performed as quickly as Layer 2 functions. Layer 3 no longer is
a bottleneck.
Layer 3 functions include added capability for quality of service (QoS) and for security.
Packets can be prioritized based on the network (IP) that they are coming from or the
network to which they are being sent. Traffic can also be prioritized based on the kind of
traffic, for example Voice over IP traffic could be given a higher priority than normal user
traffic. Traffic from specific networks can be barred from entering the network.
A multilayer switch can also examine Layer 4 information, including TCP headers that can
help identify the type of application from which the protocol data unit (PDU) came, or to
which the PDU is directed. Some examples of a multilayer switch would be the Cisco
Catalyst 3550,4500, and 6500 series switches.
The following list summarizes the factors for selecting internetworking devices:
Other factors, such as remote access, also play a role in product selection. When supporting
remote access requirements, you must first determine the kind of WAN services that meet
your needs. Then, you can select the appropriate device.
Services Devices
Recent networking trends have resulted in the development of new internetworking
devices. This section describes those devices.
• Voice gateways for handling converged packetized voice and data traffic
• Digital subscriber line access multiplexers (DSLAMs) used at the service provider’s
central office for concentrating DSL modem connections from hundreds of homes
• Optical platforms for sending and receiving data over fiber-optic cable, providing
high-speed connection
A voice gateway is a special-purpose device that performs an application layer conversion
of information from one protocol stack to another. The Cisco AS5400 Series Universal
Access Server provides cost-effective platforms that combine routing, remote access, voice
gateway, firewall, and digital modem functionality. The Cisco AS5400 Series Universal
Gateway offers high capacity in only two rack units. The Cisco AS5400 offers data, voice,
wireless, and fax services on any port at any time.
Several optical platforms are available on the market for the optical network. The Cisco
ONS 15454 is a dense wavelength-division multiplexing (DWDM) optical network system.
The Cisco ONS 15454 provides the functions of multiple network elements in a single
78 Chapter 2: Internetworking Devices
platform. Part of the Cisco IP+Optical product line, the Cisco ONS 15454 combines the
capacity of optical transport with the intelligence of IP to cost-effectively deliver next-
generation voice and data services.
DWDM increases bandwidth by using multiple discrete wavelengths, each carrying its own
data stream to share a single fiber. Coupled with the increased distance between repeaters
(amplifiers), this offers a huge cost benefit to WAN and MAN service providers.
Other common network devices that work at more than only the lower three layers include
firewalls and AAA servers. Figure 2-25 shows how firewalls and authentication,
authorization, and accounting (AAA) servers are used in internetwork connections.
California
5«No Access
• to HQ
Massachusetts
AAA Corporate
Server Headquarters
The term firewall refers to either a firewall program(s) running on a router or server, or a
special standalone hardware component of a network. A firewall protects the resources of
a private network from users in other networks.
Working closely with a router program, a firewall examines each network packet to
determine whether or not to forward it to its destination. Using a firewall is like using a
traffic cop to ensure that only valid traffic can enter or leave certain networks.
An AAA server is a program that handles user requests for access to computer and network
resources. It provides AAA services for an enterprise. The AAA server ensures that only
authenticated users can get into the network (authentication), that the users are allowed
access only to the resources they need (authorization), and that records are kept of
everything they do after they are allowed entry (accounting).
Functions of Internetwork Devices Section Quiz 79
An AAA server is like the credit card system. To put charges on a credit card, the
merchant must verify the credit card actually belongs to the person using it
(authentication). The merchant must also check to see if the credit card has enough credit
left for the requested charge amount (authorization) and then record the charge to the
user’s account (accounting).
Each device discussed in this chapter provides particular network services. All these
devices allow network administrators to build networks based on the needs of an
organization’s connectivity requirements.
1 Multiport repeaters can provide a simple solution for which of the following problems?
A Too many types of incompatible equipment on the network
3 Which of the following is true concerning bridges and their forwarding decisions?
C Bridges operate at OSI Layer 2 and use MAC addresses to make decisions.
D Bridges operate at OSI Layer 3 and use MAC addresses to make decisions.
80 Chapter 2: Internetworking Devices
B Switches combine the connectivity of a hub with the traffic regulation of a bridge.
C Switches combine the connectivity of a hub with the traffic direction of a router.
A A router matches information in the routing table with the destination IP address
of the data and sends incoming data to the correct next hop device or host.
B A router matches information in the routing table with the destination MAC
address of the data and sends incoming data to the correct subnetwork.
C A router matches information in the ARP table with the destination IP address
of the data and sends incoming data to the correct network address.
D A router matches information in the routing table with the source IP address
of the data and sends incoming data to the correct subnet.
B The Cisco AS5400 Series Universal Gateway offers high capacity in only two
rack units, with universal port data, voice, wireless, and fax services on any port
at any time.
B Ensure that the users are allowed access only to the resources they need
Chapter Summary
This chapter reviewed the core concepts of network devices. This chapter discussed the
roles of network devices in relation to business needs and how a network hierarchy can be
used to provide network services. This chapter also discussed the difference between a
physical and logical network and reviewed some basic network topologies. Next, you read
about how the different layers of the OSI model function in providing these services and
which devices operate at each layer. After you understand why and how these
internetworking devices operate, you can better understand the tasks associated in
configuring and maintaining an internetwork.
This chapter laid the groundwork for an in-depth look at each of the lower three layers of
the OSI model and how Cisco internetworking devices provide the services for an
organizations internetwork.
1 In a star topology, what happens when a cable between a device and the central device
fails?
A The entire network becomes disconnected.
A True
B False
A Access zone
B Distribution layer
C Core layer
D User layer
E Distribution zone
F Access layer
82 Chapter 2: Internetworking Devices
5 What universally unique identifier does each network device have at Layer 2?
A IP address
B Subnet address
C MAC address
D Layer 2 address
A Layer 1 bits
B Layer 2 frames
C Layer 3 datagrams
D Layer 4 segments
8 Which of the following characteristics do firewalls have? (Select all that apply.)
A Software-based
B Hardware-based
C Filter traffic
D Layer 2 device
Chapter Review Questions 83
9 Which OSI layer defines an address that consists of a network portion and a node
portion?
A Layer 1
B Layer 2
C Layer 3
D Layer 4
E Layer 5
F Layer 6
G Layer 7
A Layer 1
B Layer 2
C Layer 3
D Layer 4
E Layer 5
F Layer 6
G Layer 7
Upon completion of this chapter, you will be able to perform the following tasks:
LANs are high-speed data networks within a limited geographic area. The LAN is the most
common computer network because most user devices connect to a LAN. WANs are
networks that cover large geographic areas. Although the Internet is one of the most
familiar examples, a WAN can also be private, connecting the worldwide locations of a
corporation, an educational system, or government offices. WANs employ a number of
special devices, physical and data link protocols, and connections obtained from service
providers. A MAN is a type of high-speed WAN in a smaller geographic region, like a
single city or metropolitan area. SANs, CNs, and VPNs are all service networks that
provide some end service to the user or the organization.
This chapter provides you with an overview of these different types of networks and their
functions in a corporate internetwork. Learning about these networks and how they
function expands your understanding of how internetworks operate and how they meet
different data communication needs.
LANs Overview
Ethernet LANs are the most common local-area networks, and this term is often used to
refer to all types of LANs. Since Ethernet was first developed more than 20 years ago, it
has been upgraded several times to meet evolving technology demands. Therefore, different
types of Ethernet LAN technologies exist, including Ethernet, Fast Ethernet, and Gigabit
Ethernet.
Ethernet networks are found in most business environments. Learning about their standards
and functions gives you a working perspective about LAN components and technologies
and how internetworking devices provide services for these networks.
LANs are high-speed, low-error data networks that cover a relatively small geographic
area, up to a few thousand meters, or a few miles. LANs connect workstations, peripherals,
terminals, and other devices in a single building or other geographically limited area. This
section describes the standards that apply to LANs in relation to the OSI reference model.
86 Chapter 3: Common Types of Networks
LAN standards specify cabling and signaling at both the physical and data link layers of the
Open System Interconnection (OSI) model. Figure 3-1 shows how LAN protocols map to
the OSI reference model.
LLC
Sublayer IEEE 802.2
Data Link
Layer 0)Q.
MAC
Q. CM
Sublayer 0) O O
c N 0) X2 O 00
v.
<D m^ « E LU
c\) ® 8 |
-C
•4—»
ID
SI O £ C\i O
LU
LD Q
® o CO LU
§1 'g) D
UJ -C LU 2
UJ uj LD Q) LL
LU cb
Physical Physical LU “ UJ 3 ID ir
Layer Layer —O UJ LLJ c
5 <D
03
O)
b
|2
Ethernet, the most common type of LAN, was originally developed at Xerox. As it became
used in business communications, Digital Equipment Corporation, Intel, and Xerox agreed
upon some standards for interconnectivity. This agreed-upon type of Ethernet was called
DIX Ethernet after these three companies. Later, this came to be called thick Ethernet
because of the thickness of the cable used in this type of network. Thick Ethernet ran at 10
Mbps. The standard for Ethernet was updated in the 1980s to add more capability, and the
new version of Ethernet was referred to as Ethernet II, or thin Ethernet. The Type II frame
identifies the upper-layer protocol using an Ethertype field in the frame header.
As the technology became more widely used, it began to attract the attention of the
computing and communications industry. In 1980, the Institute of Electrical and Electronic
Engineers (IEEE), a professional organization that defines electronics and communication
standards, formed a working group to write industry wide standards for Ethernet. The IEEE
standards are the predominant and best-known LAN standards in the world today. When
the work group (referred to as IEEE 802.3) defined standards for Ethernet, the standard was
called Ethernet 802.3. The standard is based on a process called carrier sense multiple
access collision detect (CSMA/CD), which specifies the physical layer (Layer 1) and the
Media Access Control (MAC) portion of the data link layer (Layer 2). Today, this standard
is most often referred to as simply Ethernet.
The IEEE divides the OSI data link layer into these two separate sublayers:
The IEEE created the LLC sublayer to allow part of the data link layer to function
independently from existing technologies. This layer provides versatility in services to
network layer protocols that are above it, while communicating effectively with the variety
of MAC and Layer 1 technologies below it. The LLC, as a sublayer, participates in the
encapsulation process.
The LLC header tells the data link layer what to do with a packet when it receives a frame.
For example, a host receives a frame and then looks in the LLC header to understand that
the packet is destined for the IP protocol at the network layer.
The original Ethernet header (prior to IEEE 802.2 and 802.3) did not use an LLC header.
Instead, it used a Type field in the Ethernet header to identify the Layer 3 protocol being
carried in the Ethernet frame.
The MAC sublayer deals with the physical media access. The IEEE 802.3 MAC specifica¬
tion defines MAC addresses, which uniquely identify multiple devices at the data link layer.
Each device must have a unique MAC address to participate on the network.
Ethernet
Ethernet signals, or frames, are transmitted to every station connected to the LAN, using a
special set of rules to determine which station can talk at any particular time. Ethernet
LANs manage the signals on a network by CSMA/CD.
In an Ethernet LAN, before transmitting, a computer first listens to the media. If the media
is idle, the computer sends its data. After a transmission is sent, the computers on the
network once again compete for the next available idle time in order to send another frame.
Because each computer waits for idle time before transmitting, no one station has an
advantage over another station on the network, but this also guarantees that no station in
particular gains access to the media. It is more or less first come, first serve.
Figure 3-2 shows the interaction of a CSMA/CD network. Stations on a CSMA/CD LAN
can access the network at any time. Before sending data, CSMA/CD stations listen to the
network to determine whether it is already in use. If it is, then they wait. If the network is
not in use, the stations transmit. A collision occurs when two stations listen for network
traffic, hear none, and transmit simultaneously. In this case, both transmissions are
damaged, and the stations must retransmit at some later time. CSMA/CD stations must be
able to detect collisions so that they know when they must retransmit.
88 Chapter 3: Common Types of Networks
Carrier IfMHi ■ —f
/
Sense
Multiple
Access
Collision
Collision
Detection
(Backoff
Algorithm)
When a station transmits, the signal is referred to as a carrier. The network interface card
(NIC) of the devices on the network “senses” the carrier and consequently restrains itself
from broadcasting a signal. If no carrier exists, a waiting station knows that it is free to
transmit. This is the carrier sense part of the protocol.
In the CSMA/CD process, priorities are not assigned to particular stations. Therefore, all
stations on the network have equal access. This is the multiple access part of the protocol.
If two or more stations attempt a transmission simultaneously, a collision occurs. The
stations are alerted of the collision by a JAM signal, and they execute a backoff algorithm
that randomly schedules retransmission of the frame. The JAM signal is generated by the
transmitting stations once the collision is detected. The primary purpose of the JAM signal
is to “reinforce” the collision to the other transmitting station. This scenario prevents the
machines from repeatedly attempting to transmit at the same time. Collisions are normally
resolved in microseconds. This is the collision detect part of the protocol. Figure 3-3 shows
the flow of the CSMA/CD process.
LANs Overview 89
Ethernet refers to the family of LAN protocols that includes these four popular
implementations:
• 10-Mbps Ethernet—These LAN specifications (IEEE 802.3 and Ethernet II) operate
at 10 megabits per second (Mbps) over coaxial or twisted-pair cable.
• 100-Mbps Ethernet—This single LAN specification (IEEE 802.3u), also known as
Fast Ethernet, operates at 100 Mbps over twisted-pair cable.
90 Chapter 3: Common Types of Networks
100BASE-FX
i i_i_j i_i
LAN Speed
100 Mbps
i t Inticates type of cable
and maximum length.
If a number, maximum
length = No. x 100 m
BASE = Baseband
Broad = Broadband
Fast Ethernet
The Fast Ethernet standard (IEEE 802.3u) raises the Ethernet speed from 10 Mbps to 100
Mbps with only minimal changes to the existing cable structure. Data can move from 10
Mbps to 100 Mbps without protocol translation or changes to application and networking
software and hardware. As mentioned in Chapter 1, “Introduction to Internetworking,” this
modular engineering is one of the advantages to a layered protocol. Because Ethernet is
defined at the lower two layers of the OSI model, a change to these layers does not require
a change to the protocol or application layers on the device. Table 3-1 shows the physical
specifications for the Fast Ethernet protocol.
LANs Overview 91
Maximum Segment
Protocol Length (Meters) Transmission Medium
Gigabit Ethernet
Gigabit Ethernet is an extension of the IEEE 802.3 Ethernet standard. IEEE 802,3z
specifies operations over fiber optics, and IEEE 802.3ab specifies operations over twisted¬
pair copper cable. Gigabit Ethernet builds on the Ethernet protocol but increases speed
tenfold over Fast Ethernet, to 1000 Mbps, or 1 Gbps. It has become a dominant player in
high-speed LAN backbones and server connectivity. Gigabit Ethernet uses Ethernet as its
basis, and network managers have been able to take advantage of their existing knowledge
to manage and maintain gigabit networks.
Gigabit Ethernet is often used for connecting buildings on the campus to a central multi¬
layer gigabit switch located at the campus data center. Servers located at the campus data
center would also be connected to the same gigabit multilayer switch that provides
connectivity to the entire campus. Table 3-2 outlines the physical specifications for
Gigabit Ethernet.
92 Chapter 3: Common Types of Networks
Maximum Segment
Protocol Length (Meters) Transmission Medium
Because Gigabit ports are so expensive, it is beneficial to have a way to change the medium
without having to special order a card or device. The industry-standard Cisco Gigabit
Interface Converter (GBIC) is a hot-swappable input/output device that plugs into a Gigabit
Ethernet port (slot), linking the port with the physical media used by the network. GBICs
can be used and interchanged on a wide variety of Cisco products and can be intermixed in
combinations of IEEE 802.3z-compliant 1000BASE-SX, 1000BASE-LX/LH, or
1000BASE-ZX interfaces on a port-by-port basis.
Cisco offers a 1000BASE-LX/LH interface that is fully compliant with the IEEE 802.3z
1000BASE-LX standard, but has the ability to go up to 10 kilometers (6.2 miles) over
single-mode fiber, which is 5 km (3.1 miles) farther than generic 1000BASE-LX interfaces.
As additional capabilities are developed, these modules make it easy to upgrade to the latest
interface technology, without buying new hardware. Figure 3-5 shows Cisco GBICs.
LANs are the most common networks in most internetworks. Ethernet has become the de-
facto standard for most corporate and private LANs. Understanding the physical and logical
components of these networks is the first step to building an internetwork.
LANs Overview Section Quiz 93
A TCP/IP
B CSMA/CD
C CMDA/CS
D CSMA/CA
A 5 Mbps
B 10 Mbps
C 100 Mbps
D 1000 Mbps
A 1000BASE-TX
B 1000BASE-FX
C 1000BASE-CX
D 1000BASE-LX
E 1000BASE-X
94 Chapter 3: Common Types of Networks
WANs Overview
WANs are networks that cover large geographic areas. Although the Internet is one of the
most familiar examples of a WAN, this type of network can also be private, connecting the
worldwide locations of a corporation, an educational system, or government offices. WANs
employ a number of special devices, physical and data link protocols, and connections
obtained from service providers.
Understanding how a WAN operates enables you to understand how networks can connect
users and services beyond the physical limitations of LANs. This section provides an
overview of how a WAN functions and how WAN technologies relate to the OSI reference
model.
The main way that a WAN differs from a LAN is that WAN members must subscribe to an
outside WAN service provider—such as a Regional Bell Operating Company (RBOC);
Post, Telephone, and Telegraph (PTT); or other service provider—to use WAN carrier
network services. A WAN uses data link layer protocols, such as Integrated Services Digital
Network (ISDN) and Frame Relay, that are provided by carriers to transmit data over wide
areas.
When you connect to the service provider network, you must be familiar with a number of
terms and equipment. The following are the most commonly used terms associated with
WAN services:
WAN technologies function at the three lowest layers of the OSI reference model: the
physical layer, the data link layer, and the network layer. Figure 3-6 illustrates the
relationship between the common WAN technologies and the OSI reference model.
Figure 3-6 WANs Operate at the Lower Three Layers of the OSI Model
Layer 3
Layer 2 Layer 2
Layer 1 Layer 1
Router
Layer 3
Layer 2 Layer 2
Layer 1 Layer 1
Router
Telephone and data services are the most commonly used WAN services, connected from
the building demarcation point (demarc) to the WAN provider’s central office (CO) or point
of presence (POP). The CO or POP is the local telephone company or service provider
location to which local loops, or connections between the user and CO, in a given area
connect, and in which circuit switching of subscriber lines occurs. Figure 3-7 shows
different service provider services between two data sites.
• Circuit switching—This access method gives each user a dedicated path to the
network. To operate, there is a call setup phase. This feature sets up and clears calls
between telephone users. Also called signaling, call setup uses a separate channel not
used for other traffic. The most commonly used call setup is Signaling System 7
(SS7), which uses call control messages and signals between the transfer points along
the way to the called destination. Most telephone calls are circuit switched.
• Time-division multiplexing (TDM)—Data from many sources has bandwidth
allocated on a single medium. Circuit switching uses signaling to determine the call
route, which is a dedicated path between the sender and the receiver. By multiplexing
traffic into fixed time slots, TDM avoids congested facilities and variable delays .ATI
or El is an example of a TDM link.
• Frame Relay—Information contained in frames shares bandwidth with other WAN
Frame Relay subscribers. Frame Relay is a statistical multiplexed service. Unlike
TDM, Frame Relay uses Layer 2 identifiers and permanent virtual circuits (PVCs).
WAN Devices
A variety of devices are involved in a WAN operation. Each device performs a particular
function in relationship to the internetwork and the layers of the OSI model. The devices
discussed in this book are as follows:
• Routers, which offer many services, including LAN and WAN interface ports
• WAN switches, such as an ATM switch, used for voice, data, and video communication
• Modems and channel service units/data service units (CSUs/DSUs), which are used
as interfaces between the end-user devices (such as PCs or routers) and the service
provider switches
• Access servers, which concentrate modem connections (for example, an ISP
needs access servers so that its dialup customers can call in and connect to its services.
Access servers usually contain many built-in modems)
Routers are devices that implement the network layer services. They provide a wide range
of interfaces, such as Ethernet, Fast Ethernet, and Gigabit Ethernet, and Token Ring for
LAN connections, and serial and Asynchronous Transfer Mode (ATM) interfaces for WAN
connections.
The Internet is a special WAN that contains many thousands of routers used to interconnect
users from around the world. Routers are like post offices and traffic cops in the Internet
that direct how a packet should travel to reach its destination.
A WAN switch is a multiport networking device that switches traffic such as Frame Relay,
X.25, and ATM. WAN switches usually operate at the data link layer of the OSI reference
model. Figure 3-8 illustrates two routers at remote ends of a WAN that are connected by
ATM WAN switches.
WANs Overview 97
A virtual circuit is used by the WAN switches to logically connect the two routers. It is
called a virtual circuit because the routers do not have a physical connection to each other.
Each router has only one physical connection to the ATM switch that it connects to directly.
The ATM switches in the ATM network establish a virtual circuit to logically connect the
two routers. ATM is one of the service types used to connect various networks, but before
you can connect to these services, you must have the appropriate equipment to interface
with the provider networks. To use WAN services, you need a device like a modem or CSU/
DSU to connect to the provider network.
A modem, as shown in Figure 3-9, is a device that interprets digital and analog signals by
modulating and demodulating the signals, enabling data to be transmitted over voice-grade
telephone lines. At the source, digital signals are converted to a form that is suitable for
transmission over analog communication facilities. At the destination, these analog signals
are returned to digital form. Figure 3-9 illustrates a simple modem-to-modem connection
through the Public Switched Telephone Network (PSTN).
‘——\
Modem
98 Chapter 3: Common Types of Networks
A CSU/DSU, as shown in Figure 3-10, is a digital interface device (or sometimes two
separate digital devices) that adapts the physical interface on a data terminal equipment
(DTE) device (such as a terminal) to the interface of a data circuit-terminating equipment
(DCE) device (such as a switch) in a switched-carrier network. Figure 3-10 illustrates the
placement of the CSU/DSU in a WAN implementation. Sometimes, CSUs/DSUs are
integrated in the router interface. CSU/DSUs connect to services like Frame Relay or
leased lines.
After the signal leaves the WAN interface, it uses the modem or CSU/DSU to send the
appropriate Layer 1 signals to the service provider network.
A key interface in the customer’s site occurs between the DTE and the DCE. Typically, the
DTE is the router, and the DCE is the device used to convert the user data from the DTE
into a form acceptable to the facility providing WAN services. As shown in Figure 3-12, the
DCE is the attached modem or CSU/DSU.
WANs Overview 99
CO Switch
■>
Modem or
CSU/DSU
Switches
The WAN path between the DTE and the DCE is called the link, circuit, channel, or line.
The DCE primarily provides an interface for the DTE into the communication link in the
WAN cloud. The DTE/DCE interface acts as a boundary where responsibility for the traffic
passes between the WAN subscriber and the WAN provider.
100 Chapter 3: Common Types of Networks
WAN links can be ordered from the WAN provider at various speeds, which are stated in
bits per second (bps). This bps capacity determines how fast data can be moved across the
WAN link. Table 3-3 lists WAN link types and bandwidth.
Table 3-3 WAN Link Types and Bandwidth
56 DSO 56 kbps
64 DSO 64 kbps
El ZM 2.048 Mbps
E3 M3 34.064 Mbps
J1 Y1 2.048 Mbps
The WAN physical layer also describes the interface between the DTE and the DCE.
Typically, the DCE is the connection to the service provider and the DTE is the attached
network device. In Figure 3-13, the services offered to the DTE are made available through
a modem or a CSU/DSU.
WANs Overview 101
EIA/TiA-232
V.35
X.21
HSSI
Others
DTE
Several physical layer standards define the rules governing the interface between the DTE
and the DCE:
NOTE The working groups of the Internet Engineering Task Force (IETF) develop standards
called Request for Comments (RFCs) that deal with the architecture and operation of the
Internet. You can find all RFCs online at http://www.ietf.org/rfc.html.
WAN data link protocols must be the same between two communicating systems and might
vary depending on the service provider connection. If two remote sites are connected via a
point-to-point leased line connection, the only requirement for the data-link protocol is that
both end devices (DTEs) understand the protocol. For two Cisco routers this protocol is
commonly Cisco HDLC, but can also be PPP or LABP, as shown in Figure 3-14.
WANs Overview 103
If you are connecting to a multiaccess service like X.25 or Frame Relay, as shown in Figure
3-15, you need to configure the DTE to communicate with the service provider switch using
the appropriate data link layer encapsulation.
Frame Relay is a WAN service that has become popular because of its flexibility. With
Frame Relay, you connect to a provider network and the provider can establish virtual
circuits between multiple sites. The benefit of this type of service is that like a LAN, a
device needs only one connection to the network to communicate with everyone.
The downside to WANs is speed. For the most part, WANs lack the speed and throughput
that is offered by a LAN. Although some services, like OC circuits, can operate at LAN
speeds, they are expensive. A high-speed alternative to the WAN is the MAN.
MANs Overview
A MAN is a network that spans a metropolitan area such as a city or suburban area. A MAN
usually consists of two or more LANs in a common geographic area, as shown in Figure 3-
16. For example, a bank with multiple branches might use a MAN. Typically, a service
provider connects two or more LAN sites using optical services or T3 connections. A MAN
can also be created using wireless bridge technology by transmitting signals across public
areas. The higher optical bandwidths that are currently available make MANs a more
functional and economically feasible option than it has been in the past.
Traditionally, most MANs have been designed using either SONET or a similar technology
known as Synchronous Digital Hierarchy (SDH). SONET and SDH are self-healing
network architectures that prevent interruption in service by rerouting traffic almost
instantaneously if a fiber is cut. A ring topology, however, requires provisioning for the
maximum bandwidth required in the network on every segment, regardless of the actual
load on the segment.
104 Chapter 3: Common Types of Networks
Customer
Premises
Customer
Core Premises
POP
WANs and MANs make it possible for a business to provide interconnections between
remote locations. This capability allows a business to provide the critical information
between employees regardless of their locations.
Global Internet
Another specialized network service is the global Internet. By definition, an internet, which
is short for internetwork, is a network of networks, and the Internet is the interconnection
of thousands of large and small networks all over the world. The Internet is essentially the
world’s largest WAN.
Using the analogy of the telephone system to explain the concept of the Internet, the
telephone system is really a collection of interconnected local phone service providers.
The Internet is practically the same thing: It is a collection of local network providers of
IP connectivity.
A hierarchy exists in the Internet, and the way it is deployed. The largest component of the
Internet is commonly referred to as the Internet backbone. No one entity can be pointed to
as the Internet backbone; it is a collection of large transit networks operated by many
different network service providers. This is the highest level of connectivity in the Internet.
From there, the Internet branches down to individual Internet service providers (ISPs),
which sell Internet access to businesses and individual consumers.
WANs Overview Section Quiz 105
A An internetwork
B A WAN
C ALAN
D A workgroup
A Router
B DTE
C Switch
D DCE
4 DCE and DTE equipment is found at which layer of the OSI reference model?
A Network
B Data link
C Physical
D Transport
106 Chapter 3: Common Types of Networks
A EIA/TIA-232
B V.35
C X.21
D G.703
A HDLC
B SLIP
C SDLS
D LAPF
Services Networks
Many types of networks besides LANs and WANs exist, each with its own purpose and
functions. Some of those other types of networks include the following:
SANs
A SAN, as shown in Figure 3-17, is a dedicated, high-performance network used to move
data between heterogeneous servers and storage resources. By building a separate
dedicated network, a SAN avoids any traffic conflict between clients and servers. Adopting
SAN technology through the use of Fibre Channel, hubs, and switches allows high-speed
server-to-storage, storage-to-storage, or server-to-server connectivity. The method of
providing a storage-area network uses a separate network infrastructure that relieves any
problems associated with existing network connectivity.
Services Networks 107
NOTE Fibre Channel is a technology for transmitting data between computer devices at a data rate
of up to 1 billion bits per second (Gbps). Fibre Channel is especially suited for connecting
computer servers to shared storage devices and for interconnecting storage controllers and
drives.
SANs also have the potential to allow cable lengths up to 500 meters (1640.4 feet) today,
and up to 10 kilometers (6.2 miles) in the future, so that servers in different buildings can
share external storage devices.
The Cisco SN 5420 Storage Router enables Internet Small Computer System Interface over
IP (iSCSI), which is the first storage networking implementation based on IP standards and
interoperability. It has the ability to automatically discover the storage devices on the
attached Fibre Channel and iSCSI networks. It also allows easy mapping of servers to
storage devices.
CNs
A content network (CN) is a globally coordinated network of devices designed to accelerate
the delivery of information over the Internet infrastructure. Figure 3-18 shows the
components involved in a CN.
Content
Delivery Web Hosting E-Commerce Streaming Applications
Services
L2/L3
Highly Available, Scalable, Performance Network at Layer 2/3
Networks
By taking advantage of content-aware services in the core IP network and OSI Layers 4
through 7, enterprises and service providers are able to accelerate and improve the use of
rich content such as streaming multimedia, which also improves network performance and
eliminates the stream of rich media on the infrastructure.
CNs bypass potential sources of congestion by distributing the load across a collection
of content engines, which are located close to the viewing audience. Rich web and multi-
media content is replicated to the content engines, and users are routed to an optimally
located content engine. For example, when you download a large movie from an ISP, if
the ISP is using the CN technology, the movie might take only minutes to download rather
than hours, because a CN can accelerate the delivery of information.
The Cisco content networking solution is a tiered solution that starts with highly reliable
Layer 2 and Layer 3 networks delivered by the Cisco IOS Software core network. The
Cisco content networking solution is defined in five major technology categories:
VPNs
A VPN is a private network that is constructed within a public network infrastructure, such
as the Internet, as shown in Figure 3-19. In a VPN, access is controlled to permit peer
connections only within a defined community of interest.
VPNs offer secure, reliable connectivity over a shared public network infrastructure such
as the Internet, maintaining the same security and management policies as a private
network. They are the most cost-effective method for establishing a point-to-point
connection between remote users and an enterprise customer’s network.
Several types of VPNs exist, each designed to satisfy certain requirements. These are the
three main types of VPNs:
• Access VPNs—Access VPNs provide remote access to a mobile worker, and a small
office/home office (SOHO) to the headquarters intranet or extranet over a shared
infrastructure. Access VPNs use analog, dialup, ISDN, digital subscriber line (DSL),
mobile IP, and cable technologies to securely connect mobile users, telecommuters,
and branch offices.
• Intranet VPNs—Intranet VPNs link regional and remote offices to the headquarter’s
internal network over a shared infrastructure using dedicated connections. Intranet
VPNs differ from extranet VPNs in that they allow access only to the enterprise
customer’s employees.
• Extranet VPNs—Extranet VPNs link business partners to the headquarters network
over a shared infrastructure using dedicated connections. Extranet VPNs differ from
intranet VPNs in that they allow access to users outside the enterprise.
Figure 3-20 shows how these VPNs can be used for connectivity between locations.
VPNs can be used to create secure private networks between devices that are both local to
the corporate network or members of a remote network.
Services Networks 111
Extranet
VPN
Business Partner
with Cisco Router
Main Site
Perimeter
Router
Remote Office
Intranet with Cisco Router
Cisco PIX VPN
VPNs Firewall n Concentrator
Regional Office
with Cisco PIX
jL " ( Corporate
Mobile Worker
Firewall
with Cisco Secure VPN
Client on Laptop Computer
SOHO with Cisco
ISDN/DSL Router Access vpNs
The addition of an intranet VPN on a network is just one of many features that can cause
an increase in the amount of bandwidth needed. New desktops and servers should be
outfitted with 100/1000-Mbps Ethernet NICs to provide the most configuration flexibility,
thus enabling network administrators to dedicate bandwidth to individual end stations as
needed. Some high-traffic servers might need to be outfitted with Gigabit Ethernet NICs.
Extranet VPNs refer to applications and services that are intranet based, but that provide
extended, secured access to external users or enterprises. This access is usually accom¬
plished through passwords, user IDs, and other application-level security mechanisms.
Therefore, an extranet is the extension of two or more intranet strategies with a secure
interaction between participant enterprises and their respective intranets.
112 Chapter 3: Common Types of Networks
The extranet maintains control of access to those intranets within each enterprise in the
deployment. Extranets link customers, suppliers, partners, or communities of interest to a
corporate intranet over a shared infrastructure using dedicated connections. Businesses use
the same policies as a private network, including security, QoS, manageability, and
reliability. Figure 3-21 shows how intranet and extranet VPNs can be deployed in an
internetworking structure.
Company A
Remote Site
Internet
Extranet VPN IP. FR, ATM
Company A
Core Site
VPN Firewall
| Company B | Router Appliance
Each of these service networks provides additional connectivity and features that are useful
for many corporate networks.
2 Which of the following does not correctly describe the features of CNs?
A CNs accelerate and improve the use of rich content and eliminate the stream
of rich content on the infrastructure.
B CNs utilize a collection of content engines, located close to the audience, to dis¬
tribute the content.
C The CN was designed to accelerate the delivery of information over the MAN
infrastructure.
3 What service offers secure, reliable connectivity over a shared public network
infrastructure?
A Internet
D Wide-area network
4 What links enterprise customer headquarters, remote offices, and branch offices to an
internal network over a shared infrastructure?
A Access VPNs
B Intranet VPNs
C Extranet VPNs
D Internet VPNs
5 What is the name for the part of the company’s LAN that is made available to select
parties such as employees, customers, or partners?
A The internet
B The extranet
C The intranet
D The LAN
114 Chapter 3: Common Types of Networks
Chapter Summary
This chapter reviewed the common types of networks and how they relate to internet¬
working technologies. The majority of the networks you encounter as a network
administrator are LANs. LAN technologies operate at Layers 1 and 2 of the OSI reference
model. To interconnect LAN services you use a service provider’s WAN or MAN network.
Like LANs, WANs operate at Layers 1 and 2 of the OSI model and require special
equipment, such as modems or CSU/DSUs, to connect to provider services.
Finally, this chapter reviewed some of the service networks that have been created to
enhance network performance. SANs provide high-speed storage locations for servers and
clients within a network structure. CNs provide a load-balancing technique to alleviate the
congestion associated with many users accessing the same content or device. VPNs provide
a method for securing connections within an internal or external network structure. Each of
these functions is important to understand because these are the services that are
interconnected to provide a corporate internetwork.
D To meet the need to have part of the data link layer function independently of
existing technologies
A 802,3z
B 802.10
C 802.3u
D 802.5
A Structured hierarchy
C Global carrier
D LANs
C It uses only Layers 1-4 (physical through transport) of the OSI model.
A The link
B The circuit
C The channel
9 Which two aspects of CNs make them better than traditional transmission over the
Internet? (Choose two.)
10 What is the name given to a private network that is constructed within a public
network infrastructure?
A The Internet
B ISDN
C Frame Relay
D VPN
11 What type of VPN links regional and remote offices to the headquarter’s internal
network?
A Access VPN
B Intranet VPN
C Dialup VPN
D Extranet VPN
12 An extranet is the extension of two or more intranet strategies with a secure interaction
between participant enterprises and their respective intranets.
A True
B False
{
Part
IS
0
Upon completion of this chapter, you will be able to perform the following tasks:
• Describe the primary types of network cabling, including shielded and unshielded
twisted-pair, coaxial, fiber optics (multimode and single-mode), and wireless
communications
• Describe types and characteristics of cabling and connectors used in an Ethernet LAN
• Describe the necessary components for enabling WAN connectivity over serial or
ISDN BRI, local loop using DSL, and a cable connection for a Cisco router
4
Network Media
(The Physical Layer)
This chapter examines several types of network media, including twisted-pair cable,
coaxial cable, fiber-optic cable, and wireless. It highlights the concepts and procedures for
assembling and cabling Cisco routers. This chapter also covers cabling and connectors used
to interconnect switches and routers in a LAN or WAN. Finally, it presents factors that you
should consider when selecting network devices.
Understanding the types of connections that can be used within a network provides a better
understanding of how networks function in transmitting data from one point to another.
Twisted-Pair Cable
Twisted-pair is a copper wire-based cable that can be either shielded or unshielded. Twisted¬
pair is the most common media for network connectivity.
Unshielded twisted-pair (UTP) cable, as shown in Figure 4-1, is a four-pair wire. Each of
the eight individual copper wires in UTP cable is covered by an insulating material. In
addition, the wires in each pair are twisted around each other. The advantage of UTP cable
is its ability to cancel interference, because the twisted-wire pairs limit signal degradation
from electromagnetic interference (EMI) and radio frequency interference (RFI). To further
reduce crosstalk between the pairs in UTP cable, the number of twists in the wire pairs
varies. UTP, as well as shielded twisted-pair (STP) cable, must follow precise specifications
as to how many twists or braids are permitted per meter.
122 Chapter 4: Network Media (The Physical Layer)
Twisted-Pair
Outer Jacket
Color-Coded
Plastic
Insulation
RJ-45 Connector
UTP cable is used in a variety of networks. When used as a networking medium, UTP cable
has four pairs of either 22- or 24-gauge copper wire. UTP used as a networking medium
has an impedance of 100 ohms, differentiating it from other types of twisted-pair wiring
such as that used for telephone wiring. Because UTP cable has an external diameter of
approximately 0.43 cm (0.17 inches), its small size can be advantageous during installation.
Also, because UTP can be used with most of the major networking architectures, it
continues to grow in popularity.
• Category 1—Used for telephone communications; not suitable for transmitting data
• Category 2—Capable of transmitting data at speeds of up to 4 Mbps
• Category 3—Used in 10BASE-T networks; can transmit data at speeds up to
10 Mbps
• Category 4—Used in Token Ring networks; can transmit data at speeds up to
16 Mbps
• Category 5—Capable of transmitting data at speeds up to 100 Mbps
• Category 5e—Used in networks running at speeds up to 1000 Mbps (1 Gbps)
• Category 6—Consists of four pairs of 24-gauge copper wires that can transmit data
at speeds up to 1000 Mbps
Shielded twisted-pair (STP) cable, as shown in Figure 4-2, combines the techniques of
shielding and the twisting of wires to further protect against signal degradation. Each pair of
wires is wrapped in a metallic foil. The four pairs of wires are then wrapped in an overall
metallic braid or foil, usually 150-ohm cable. Specified for use in Ethernet network
installations, STP reduces electrical noise both within the cable (pair-to-pair coupling, or
crosstalk) and from outside the cable (EMI and RFI). Token Ring network topology uses STP.
Cabling and Infrastructure 123
Color-Coded
Plastic
Insulation
RJ-45 Connector
When you consider using UTP and STP for your network media, consider the following:
Coaxial Cable
Coaxial cable consists of a hollow outer cylindrical conductor that surrounds a single
inner wire conducting element. This section describes the characteristics and uses of
coaxial cable.
As shown in Figure 4-3, the single inner wire located in the center of a coaxial cable is a
copper conductor, surrounded by a layer of flexible insulation. Over this insulating material
is a woven copper braid or metallic foil that acts both as the second wire in the circuit and
as a shield for the inner conductor. This second layer, or shield, can help reduce the amount
of outside interference. An outer jacket covers this shield. The BNC connector shown looks
much like a cable-television connector and connects to an older NIC with a BNC interface.
124 Chapter 4: Network Media (The Physical Layer)
Outer Jacket
Copper Conductor
BNC Connector
Coaxial cable supports 10 to 100 Mbps and is relatively inexpensive, although more costly
than UTP. Coaxial cable can be laid over longer distances than twisted-pair cable. For
example, Ethernet can run approximately 100 meters using twisted-pair cable, but 500
meters using coaxial cable.
Coaxial cable offers several advantages for use in LANs. It can be run with fewer boosts
from repeaters, which regenerate the signals in a network so that they can cover greater
distances between network nodes than either STP or UTP cable. Coaxial cable is less
expensive than fiber-optic cable, and the technology is well known. It has been used for
many years for all types of data communication.
When you work with cable, consider its size. As the thickness, or diameter, of the cable
increases, so does the difficulty in working with it. Cable must often be pulled through
existing conduits and troughs that are limited in size. Coaxial cable comes in a variety of
sizes. The largest diameter, frequently referred to as Thicknet, was specified for use as
Ethernet backbone cable because historically it had greater transmission length and noise
rejection characteristics. However, Thicknet cable can be too rigid to install easily in some
environments because of its thickness. Generally, the more difficult the network media is to
install, the more expensive it is to install. Coaxial cable is more expensive to install than
twisted-pair cable, and Thicknet cable is almost never used except for special-purpose
installations, where shielding from EMI or distance requires the use of such cables.
In the past, coaxial cable with an outside diameter of only 0.35 cm, sometimes referred to
as Thinnet, was used in Ethernet networks. It was especially useful for cable installations
that required the cable to make many twists and turns. Because Thinnet was easier to install,
it was also cheaper to install. Thus, it was also referred to as Cheapernet. However, because
the outer copper or metallic braid in coaxial cable comprised half the electrical circuit,
special care needed to be taken to ground it properly, by ensuring that a solid electrical
Cabling and Infrastructure 125
connection existed at both ends of the cable. Installers frequently failed to make a good
connection. Connection problems resulted in electrical noise, which interfered with signal
transmission. For this reason, despite its small diameter, Thinnet is no longer commonly
used in Ethernet networks.
Although coaxial cable offers some distance advantages over twisted-pair, the
disadvantages far outweigh the benefits. If a communications signal needs to travel
a greater distance at high rates of speed, it is more common to use fiber-optic cable.
Fiber-Optic Cable
Fiber-optic cable is a networking medium capable of conducting modulated light trans¬
mission. This section describes the types, characteristics, and uses of fiber-optic cable.
Fiber-optic cable used for networking consists of two fibers encased in separate sheaths.
Viewing it in cross section in Figure 4-4, you can see that each optical fiber is surrounded
by layers of protective buffer material: usually a plastic shield, then a plastic such as Kevlar,
and finally, an outer jacket that provides protection for the entire cable. The plastic
conforms to appropriate fire and building codes. The purpose of the Kevlar is to furnish
additional cushioning and protection for the fragile, hair-thin glass fibers. Where buried
fiber-optic cables are required by codes, a stainless steel wire is sometimes included for
added strength. Several connectors can connect fiber to the networking device; the most
common is a SC connector, which has two optics, one connecting to transmit and the other
connecting to receive.
Multimode Connector
The light-guiding parts of an optical fiber are called the core and the cladding. The core is
usually very pure glass with a high index of refraction. When a cladding layer of glass or
plastic with a low index of refraction surrounds the core glass, light can be trapped in the fiber
126 Chapter 4: Network Media (The Physical Layer)
core. This process is called total internal reflection, and it allows the optical fiber to act like a
light pipe, guiding light for long distances, even around bends. Fiber-optic cable is the most
expensive of the three types discussed in this lesson, but it supports higher rate line speeds.
Fiber-optic cable does not carry electrical impulses as copper wire does. Instead, signals
that represent bits are converted into pulses of light. Two types of fiber-optic cable exist:
• Single-mode —Single-mode fiber-optic cable allows only one mode (or wavelength)
of light to propagate through the fiber. This type of cable is capable of higher band¬
width and greater distances than multimode and is often used for campus backbones.
Single-mode cable uses lasers as the light-generating method and is more expensive
than multimode cable. The maximum cable length of single-mode cable is 60+ km
(37+ miles).
• Multimode—Multimode fiber-optic cable allows multiple modes of light to propa¬
gate through the fiber. Multimode cable is often used for workgroup applications,
using light emitting diodes (LEDs) as light-generating devices. The maximum length
of multimode cable is 2 km (1.2 miles).
The characteristics of the different media have a significant impact on the speed of data
transfer. Although fiber-optic cable is more expensive, it is not susceptible to EMI and is
capable of higher data rates than any of the other types of networking media discussed here.
Fiber-optic cable is also more secure because it does not emit electrical signals that could
be received by external devices.
NOTE Even though light is an electromagnetic wave, light in fibers is not considered wireless
because the electromagnetic waves are guided in the optical fiber. The term wireless is
reserved for radiated, or unguided, electromagnetic waves.
In some instances, it might not be possible to run any type of cable for network communi¬
cations. This situation might be the case in a rented facility or in a location where you do
not have the ability to install the appropriate infrastructure. In these cases, it might be useful
to install a wireless network, as discussed in the next section.
Wireless Communications
Wireless networks are becoming increasingly popular, and they utilize a different type of
technology. Wireless communication uses radio frequencies (RFs) or infrared waves to
transmit data between devices on a LAN. For wireless LANs, a key component is the
wireless hub, or access point, used for signal distribution. To receive the signals from the
access point, a PC or laptop needs to install a wireless adapter card, or wireless network
interface card (NIC). Figure 4-5 shows a number of wireless access points connected to an
Ethernet backbone to provide access to the Internet.
Cabling and Infrastructure 127
Wireless signals are electromagnetic waves that can travel through the vacuum of outer
space and through a medium such as air. No physical medium is necessary for wireless
signals, making them a versatile way to build a network. They use portions of the RF
spectrum to transmit voice, video, and data. Wireless frequencies range from 3 kHz to 300
GHz. The data-transmission rates range from 9 kbps to 54 Mbps. Figure 4-6 shows the
electromagnetic spectrum chart.
Frequency
in Hertz
Wavelength
in Meters
(i?) (io4'
<q
Longer Wavesj
t>
| Shorter Waves
128 Chapter 4: Network Media (The Physical Layer)
Maximum
Segment Comparative
Media Type Length Speed Cost Advantages Disadvantages
UTP 100 meters 10 Mbps Least expensive Easy to install, Susceptible to
100 Mbps widely available, interference; can
widely used cover only a limited
distance
STP 100 meters 10-100 Mbps More expen¬ Reduced Difficult to work
sive than UTP crosstalk, less with; can cover only
susceptible to a limited distance
EMI than UTP or
Thinnet
Cabling and Infrastructure Section Quiz 129
Maximum
Segment Comparative
Media Type Length Speed Cost Advantages Disadvantages
Coaxial 500 meters 10-100 Mbps Relatively Less susceptible Difficult to work
(Thicknet) inexpensive, to EMI than other with (Thicknet);
but more costly types of copper limited bandwidth;
185 meters
than UTP media limited application
(Thinnet)
(Thinnet); damage to
cable can bring down
entire network
The media you choose has an important impact on the network’s capabilities. You should
consider all the factors before making your final selection.
B 150 ft
C 100 m
D 1000 m
130 Chapter 4: Network Media (The Physical Layer)
B It is inexpensive.
B Multichannel
C Multiphase
A Radio frequencies
B LED-generated light
C Fiber optics
B It is easy to install.
Learning about the different types of cables and connectors in an Ethernet LAN and their
various functions can help you understand more about how a LAN works.
Choosing LAN Cabling Options 131
In many modern installations, infrastructure costs for cabling and adapters can be high.
Using the appropriate Ethernet connectivity provides the necessary speed for the parts of
the network that require it while controlling costs.
132 Chapter 4: Network Media (The Physical Layer)
In general, you can use Ethernet technologies in a campus network in several different ways:
• An Ethernet speed of 10 Mbps can be used at the access layer to provide adequate
performance for most users. In addition, 100-Mbps Fast Ethernet can be used for
high-bandwidth-consuming clients or servers.
• Gigabit Ethernet is typically used as the link between the access layer and network
devices, supporting the aggregate traffic from each Ethernet segment on the access link.
• To enhance client-server performance across the campus network and avoid
bottlenecks at the server, Fast Ethernet or Gigabit Ethernet links can be used to
connect enterprise servers. Gigabit Ethernet, in combination with switched Fast
Ethernet, creates an effective solution for avoiding slow networks.
• Gigabit Ethernet links can provide the connection between the distribution layer and
the core. Because the campus network model supports dual links between each
distribution layer router and core switch, you can load balance the aggregate traffic
from multiple-access switches across the links.
• Gigabit Ethernet (or 10 Gigabit Ethernet) should be used between switches and the
backbone. The fastest affordable media should be implemented between backbone
switches.
Table 4-2 outlines the recommendations for Ethernet deployment.
10 Gigabit
Network Ethernet Fast Ethernet Gigabit Ethernet Ethernet
Hierarchy Layer 10 Mbps 100 Mbps 1000 Mbps 10000 Mbps
Access layer Connects users Connects users with Connects servers Not currently
with low to high-speed with high usage recommended at
moderate requirements or this layer
bandwidth servers with low to
requirements moderate usage
NOTE Currently, some organizations are considering providing Gigabit Ethernet to the end user;
however, not many applications can take full advantage of this infrastructure, and providing
Gigabit Ethernet to the end user can potentially create a bottleneck between network
devices. You should consider this carefully before installing gigabit technology to the
end users.
The cable and connector specifications used to support Ethernet implementations are
derived from the Electronic Industries Alliance and (newer) Telecommunications Industry
Alliance (EIA/TIA) standards body. The categories of cabling defined for Ethernet are
derived from the EIA/TIA-568 (SP-2840) Commercial Building Telecommunications
Wiring Standards. EIA/TIA specifies an RJ-45 connector for UTP cable. The letters RJ
stand for registered jack, and the number 45 refers to a specific physical connector that has
eight conductors.
Table 4-3 compares the cable and connector specifications for the most popular Ethernet
implementations.
The important difference to note is the media used for 10-Mbps Ethernet versus 100-Mbps
Ethernet. In today’s networks, in which you see a mix of 10- and 100-Mbps requirements,
you must be aware of the need to change over to UTP Category 5 to support Fast Ethernet.
Connection Media
Several connection media can be used in an Ethernet LAN implementation. Figure 4-8
illustrates different connection types—attachment unit interface (AUI), RJ-45, and
gigabit—used by each physical layer implementation. The RJ-45 connector and jack are the
most prevalent. RJ-45 connectors are discussed in more detail later in this chapter.
In some cases, the type of connector on a NIC does not match the type of media that it needs
to connect to. As shown in Figure 4-8, an interface exists for the AUI connector on many
Cisco devices. The AUI is the 15-pin physical connector interface between a computer’s
NIC and coaxial Ethernet cable.
134 Chapter 4: Network Media (The Physical Layer)
U 1, E
_ Ui u P <u . O
O o O*
O < X E £ <N O U
T- CQ _l as m E tc VO CQ oo
<u co
x TD >/")
(/) o
O 00
iii V!
„ o M
§ W 'C a ~ a o .S c
O < cn -a 2 so _o '5 U
r- CD « c E c CN &< a, on
HI < £*
_ Ul
* 2 wo
_ 00
o *1 «
t- c a
t- ■'t
§3 3 £ d 2 CN 0^4
C3 O fD 5 '5 'o 00 00 S
p/
“ m M U a. on a. a< in 00
_ Ul O in
g (/> a, - r- 1*
§ < X H S3 O c-*- *—>
o o oo oo &
r- CD O on S SS C/D Oh Oh H 00 ^
<u
LU T3 Lh J-h
</> CN
O cn
o o
< o
CQ CN c* <D
0> O .£ c C
(N -O o 'o C
O X
SO £ s LC
o
Dh Oh s
O
o
X
Hi 00
Ul CN r~
(fl C n- cn r- _
< h
m OO T*
p tu Cu
o o S3 o 53
o a % H o on OS
W U P c/5
ui r-
< £? r- _
</) H 00 I/-}
TCable and Connector Specifications
< > U - Oh £ ^ 00 Tt
m
o S8tfc .b o3 2
O <N o *fi>
on C4
BUnD Oh 00
ui ■*t
U) s o 3
< -C [3 .5
CJ on c o
o ’>< rr
m 03 2 CS o SO
o o O 6 O 3 C3 o 3
VO o H d o o IT) CQ 5
CN
I
UJ
w 0)
s 3 c 00 3 ■tt Vh
< -C a wn E ^
m o ’S ’H 2 M U
o
c3 2
o O H a O 03
03 X) wo © o
oo ^5 9 z
o DC o o CQ < CQ
u
©
Table 4-3
1 ^ OX)
.2 | « 5 o ©
*3 S E “ G
S M fi I G
HH 4) « O
s 2 W3 P e5 U
Choosing LAN Cabling Options 135
A Gigabit Interface Converter (GBIC), like the one shown in Figure 4-9, is a hot-swappable
input/output device that plugs into a Gigabit Ethernet port. A key benefit of using a GBIC
is that GBICs are interchangeable. This allows users the flexibility to deploy other
1000BASE-X technology without needing to change the physical interface/model on
the router or switch. GBICs support UTP (copper) and fiber-optic media for Gigabit
Ethernet transmission.
Typically, GBICs are used in the LAN for aggregation and in the backbone. You also see
GBICs in SANs and MANs.
The fiber-optic GBIC is a transceiver that converts serial electric currents to optical signals
and optical signals to digital electric currents. Some of the optical GBICs include the
following:
UTP Implementation
In a UTP implementation, you must determine the EIA/'TIA type of cable and whether to
use a straight-through or crossover cable. This section describes the types of connectors
used in a UTP implementation and the characteristics and uses of straight-through and
crossover cables.
If you look at an RJ-45 transparent end connector, like the one in Figure 4-10, you can see
eight colored wires, twisted into four pairs. Four of the wires (two pairs) carry the positive
or true voltage and are considered tip (T1 through T4); the other four wires carry the inverse
of false voltage grounded and are called ring (R1 through R4). Tip and ring are terms that
originated in the early days of the telephone. Today, these terms refer to the positive and the
negative wires in a pair. The wires in the first pair in a cable or a connector are designated
as T1 and R1, the second pair is T2 and R2, and so on.
The RJ-45 plug is the male component, crimped at the end of the cable. As you look at the
male connector from the front (the side with the metal pins exposed), the pin locations are
numbered from 8 on the left to 1 on the right.
The RJ-45 jack, shown in Figure 4-11, is the female component in a network device, wall,
cubicle partition outlet, or patch panel.
Choosing LAN Cabling Options 137
In addition to identifying the correct EIA/TIA category of cable to use for a connecting
device (depending on what standard is being used by the jack on the network device), you
need to determine which of the following to use:
• A straight-through cable
• A crossover cable
The RJ-45 connectors on both ends show all the wires in the same order. If the two RJ-45 ends
of a cable are held side by side in the same orientation, the colored wires (or strips or pins)
are seen at each connector end. If the order of the colored wires is the same at each end, the
cable is straight-through. Figure 4-12 shows the wiring for a straight-through cable.
With crossover, the RJ-45 connectors on both ends show that some of the wires on one side
of the cable are crossed to a different pin on the other side of the cable. Specifically, for
Ethernet, pin 1 at one RJ-45 end should be connected to pin 3 at the other end. Pin 2 at one
end should be connected to pin 6 at the other end, as shown in Figure 4-13.
Hub/Switch Server/Router
i
TX+\ .. 1 TX+
TX-\X ,2
rx+'a
NC
NC
RX-
y
Y 4
/\5
3
TX-
RX+
NC
NC
wgwbwow br
g o b br
II
wowbwgw br
o g b br
Each device using RJ-45 connectors transmits or receives on particular pins depending on
the device type. A PC or router typically transmits on pins 1 and 2 while a switch or hub
receives on pins 1 and 2. You must follow certain guidelines when connecting these devices.
• Switch to router
• Switch to PC or server
• Hub to PC or server
Use crossover cables for the following cabling:
• Switch to switch
• Switch to hub
• Hub to hub
• Router to router
• PC to PC
• Router to PC
Choosing LAN Cabling Options 139
Occasionally, ports on network devices are marked with an X, like those in Figure 4-14. This
marking means that these devices receive on pins 1 and 2, or that they are crossed. When
connecting devices in a network, you might be required to use a variety of cable types.
NOTE Most hubs and some switches have a port that can be changed from X to not-X by moving
a switch or pressing a button. This feature enables you to use straight-through cables where
crossovers would ordinarily be required.
Being aware of the different cabling media types, specifications, and connectors is an
important step to interconnecting network devices.
140 Chapter 4: Network Media (The Physical Layer)
B 10BASE-T
C 100BASE-TX
D 1000BASE-CX
B Gigabit Ethernet as the link at the access layer to provide good performance
C Fast Ethernet as a link between the access layer and distribution layer devices to
support the aggregate traffic from each Ethernet segment on the access link
3 Which standard body created the cables and connector specification used to support
Ethernet implementation?
A ISO
B NSI
C EIA/TIA
D IETF
4 Which of the following statements does not correctly describe a media connector?
A RJ-45 connectors are 8-pin connectors that resemble telephone jacks.
C The GBIC is a transceiver that converts serial electric currents to optical signals
and vice versa.
5 For which of the following would you not need to provide a crossover cable?
A Connecting uplinks between switches
Learning about the different types of WAN serial and router connections and their functions
can help you understand more about how a WAN works.
:
>,
o CO
CD - ■
Q
CL cr ' : '■ ■, . -
Data Link X 0-
o n
CD ISDN BRI (with PPP) DSL Modem Cable Modem
Layer £
8 CO
b ul
:
RJ-48
F-Type
Note: ISDN BRI cable
EIA/TIA-232 RJ-11 Threaded
pinouts are different than
Physical EIA/TIA-449 Note: Works Connectors
the pinouts for Ethernet.
over Telephone
Layer X.21 V.24 V.35 The RJ-48 and RJ-45 Note: Works
Line over Cable TV
HSS, look the same, but the
pinouts are different. Line
■
_
142 Chapter 4: Network Media (The Physical Layer)
Serial connections support WAN services such as dedicated leased lines that run the Point-
to-Point Protocol (PPP) or Frame Relay. The speed of these connections ranges up to El
(2.048 Mbps).
Other WAN services, such as ISDN, offer dial-on-demand connections or dial backup
services. An ISDN BRI is composed of two 64-kbps bearer channels (B channels) for data,
and one 16-kbps data channel (D channel) for signaling and other link-management tasks.
PPP is typically used to carry data over the B channels.
With the increasing demand for residential broadband high-speed services, DSL and cable
modem connections are beginning to dominate. For example, typical residential DSL
service can offer a speed of up to 1.5 Mbps over the existing telephone line. Cable services,
which work over the existing coaxial cable TV line, also offer high-speed connectivity
matching or surpassing that of DSL.
Figure 4-16 shows all the different serial connector options available for Cisco routers.
Router Connections
Lal
End-User
Device
DCE
Modem or
CSU/DSU
Serial ports on Cisco routers use a proprietary 60-pin connector or smaller “smart serial”
connector. The type of connector on the other end of the cable is dependent on the service
provider or end-device requirements.
Frequencies, described in terms of their cycles per second (Hz), function as a band or
spectrum for communication. For example, the signals transmitted over voice-grade
telephone lines use up to 3 kHz. The size of this frequency range is called the bandwidth.
Another way to express bandwidth is to specify the amount of data in bits per second
that can be carried using two of the physical layer implementations (EIA/TIA-232 and
EIA/TIA-449). Table 4-4 compares physical standards for these two WAN serial
connection options.
2400 60 1250
4800 30 625
9600 15 312
19,200 15 156
38,400 15 78
Several types of physical connections allow you to connect to serial WAN services.
Depending on the physical implementation that you choose or the physical implementation
that your service provider imposes, you need to select the correct serial cable type to use
with the router.
Serial Connections
In addition to determining the cable type, you need to determine whether you need data
terminal equipment (DTE) or data circuit-terminating equipment (DCE) connectors for
your WAN equipment. The DTE is the endpoint of the user’s device on the WAN link. The
DCE is typically the point where responsibility for delivering data passes into the hands of
the service provider.
144 Chapter 4: Network Media (The Physical Layer)
As shown in Figure 4-17, if you are connecting directly to a service provider, or to a device
(like a channel/data service unit [CSU/DSU]) that performs signal clocking, the router is a
DTE and needs a DTE serial cable. This situation is typically the case for routers.
• •••• f Modem
CSU/DSU
DTE DCE
In some cases, the router needs to be the DCE. For example, if you are performing a back-
to-back router scenario in a test environment, one of the routers is a DTE, and the other is
a DCE. Figure 4-18 shows a back-to-back router configuration. To implement this, you
need a DTE cable for one router, and a DCE cable for another router. You might also be able
to buy a special back-to-back cable, which is wired with a DTE side and DCE side.
When you are cabling routers for serial connectivity, the routers have either fixed or
modular ports. The type of port being used affects the syntax that you use later to configure
each interface.
Figure 4-19 shows an example of a router with fixed serial ports (interfaces). Each port is
given a label of port type and port number, for example, Serial 0. To configure a fixed
interface, specify the interface using this convention.
Understanding WAN Cabling 145
Figure 4-20 shows examples of routers with modular serial ports. Usually, each port is
given a label of port type, slot (the location of the module), and port number. To configure
a port on a modular card, it is necessary to specify the interface using the convention “port
type slot number/port number.” For example, given serial 1/0, the type of interface is a serial
interface, the slot number where the interface module is installed is slot 1, and the port
referenced on that serial interface module is port 0.
Cisco 1630
Router—
Module
Cisco 3640
Router—
Rear View
146 Chapter 4: Network Media (The Physical Layer)
An NT1 device is an intermediate device between the router and the service provider ISDN
switch (cloud) that connects four-wire subscriber wiring to the conventional two-wire local
loop. In North America, the customer typically provides the NT1, while in the rest of the
world, the service provider provides the NT1 device.
You might find it necessary to provide an external NT1 if an NT1 is not integrated into the
router. Looking at the labeling on the router interface is the easiest way to determine if the
router has an integrated NT1. A BRI interface with an integrated NT1 is labeled BRI U, and
a BRI interface without an integrated NT1 is labeled BRI S/T. Because routers can have
multiple ISDN interface types, you must determine the interface needed when the router is
purchased. You can determine the type of ISDN connector that the router has by looking at
the port label.
Figure 4-21 shows the different port types for the ISDN interface. To interconnect the ISDN
BRI port to the service-provider device, use a UTP Category 5 straight-through cable.
WARNING It is important to insert a cable running from an ISDN BRI port only to an ISDN jack or an
ISDN switch. ISDN BRI uses voltages that can seriously damage non-ISDN devices.
DSL Connections
Routers can also be connected to an asymmetric digital subscriber line (ADSL). The Cisco
827 ADSL router has one ADSL interface. To connect an ADSL to the ADSL port on a
router, one end of the phone cable is connected to the ADSL port on the router. The other
end of the phone cable is connected to the external wall phone jack.
To connect a router for DSL service, you need a phone cable with RJ-11 connectors. The RJ-
11 connector is the same one used on a traditional telephone connection and is slightly smaller
than a RJ-45 connector. Figure 4-22 shows a connection to a phone jack with DSL services.
DSL works over standard telephone lines. It uses only two pins on the RJ-11 connector.
Wall Jack
Cable Connections
The Cisco uBR905 cable access router provides high-speed network access on the cable
television system to residential and small office/home office (SOHO) subscribers. The
uBR905 router has an F-connector coaxial cable interface that can be connected to a
cable system.
To connect the Cisco uBR905 cable access router to the cable system, a cable splitter/
directional coupler can be installed, if needed, to separate signals for TV and computer use.
If necessary, you can also install a high-pass filter to prevent interference between TV and
computer signals.
148 Chapter 4: Network Media (The Physical Layer)
The coaxial cable is connected to the F connector of the router, as shown in Figure 4-23.
The cable used between a terminal and a console port is a rollover cable, with RJ-45
connectors as illustrated in Figure 4-24.
(Labeled TERMINAL)
Understanding WAN Cabling 149
The rollover cable, also known as a console cable, has a different pinout than the straight-
through or crossover RJ-45 cables used with Ethernet or the ISDN BRI. The pinout for a
rollover cable is as follows:
1-8
2- 7
3- 6
4- 5
5- 4
6- 3
7- 2
8 1 -
To set up the connection between your terminal and the Cisco console port, you must
perform the following:
Step 1 Cable the device to the PC using a rollover cable. You might need an RJ-45-
to-DB-9 or and RJ-45-to-DB25 adapter for your PC or terminal.
Step 2 Configure terminal emulation software for the PC with the following
COM port settings: 9600 bps, 8 data bits, no parity, 1 stop bit, and no
flow control.
This connection to the console port provides you with access to the device’s executive process
command-line interface (CLI). From there, you can configure the device.
NOTE Many PCs and laptops are no longer manufactured with a 25- or 9-pin (legacy) serial
connector. Instead, most devices now ship with USB connectors. If you are working
with a USB connector, you need to obtain a USB-to-DB-9 converter cable to connect
to the console.
Auxiliary Connections
The auxiliary (AUX) port is another asynchronous connection that can provide out-of-band
management—management not using the network bandwidth—through a modem. To
provide out-of-band management, you can connect a modem directly to the AUX port.
When you dial the modem, you are connected to the AUX port and the executive process
CLI. The AUX port must be configured using the console port before it can be used in
this manner.
The AUX port can also be used as a dial-on-demand WAN port for passing user traffic.
150 Chapter 4: Network Media (The Physical Layer)
B ISDN
C Frame Relay
D Gigabit Ethernet
A Parallel
B Serial
C Single
D Multimode
3 Which of the following media interconnects the ISDN BRI port to the service
provider device?
A UTP straight-through
B UTP crossover
C Coaxial
D Fiber-optic
A RJ-45
B RJ-11
C BNC
D DB-9
Chapter Review Questions 151
A RJ-45
B RJ-11
C F-Type
D AUI
A Straight-through
B Rollover
C Crossover
D Coaxial
Chapter Summary
As you begin to build an internetwork, the first thing you have to consider is the physical
implementation of the LAN and WAN connections. These considerations include speed of
services, infrastructure, and physical interfaces. This chapter discussed how Ethernet
physical layer standards correlate to the infrastructure that you have to install to use the
services. This chapter also reviewed the connection differences for WAN connections and
how to connect to a console or AUX port for management of the device.
A 100 meters
B 185 meters
C 500 meters
D 1600 meters
152 Chapter 4: Network Media (The Physical Layer)
A 9-11 Mbps
B 9 kbps-54 Mbps
C 1-9 Mbps
D 1 kbps-9 Mbps
3 At which layer of the OSI model do the cabling aspects of a LAN exist?
A Transport
B Network
C Data link
D Physical
C Serial transmission sends data 1 bit at a time, and parallel transmission sends
several bits at one time.
A A DTE device
B A DCE device
7 If you are using an ISDN device that has an interface marked BRIS/T, what does
this imply?
sense multiple access collision detect (CSMA/CD) specifications for collision detection.
This means that when you connect users, you must consider how far they are located from
the network connection point, as shown in Figure 5-1.
Segment Length
Many organizations have buildings that span large distances vertically and horizontally.
When connecting devices to the network, you need to know where the users are located in
relation to the network devices. Table 5-1 shows the maximum segment length for some of
the common Ethernet standards.
1000BASE-CX 25 meters
Chapter 4 discussed segment length when considering physical media. One method of
extending the segment length is to install a hub, or repeater.
Understanding Shared Ethernet Technologies 157
A hub, or repeater, is a device that joins multiple Ethernet segments to extend the length.
Technology limits the distance a frame can travel on a segment before the signal degrades.
Adding a hub can overcome distance issues, as illustrated in Figure 5-2.
However, a timing issue regarding collision detection exists that hub technology cannot
improve, so hubs cannot be cascaded infinitely.
A hub extends the Ethernet LAN, but the bandwidth limitation of a shared technology
remains. Although each device has its own cable that connects into the hub, all users of a
given Ethernet segment compete for the same amount of bandwidth.
Hubs operate at Layer 1 in the Open System Interconnection (OSI) model. At the
physical layer, hubs support little in the way of sophisticated networking. Hubs do not
read any of the data passing through them and are not aware of the source or destination
of the frame. Essentially, a hub simply receives incoming bits, regenerates the electrical
signal, and transmits these bits out all ports except the incoming port to the other devices
on the network.
Unicast
Broadcast
Multicast
Because all devices on a segment have access at the same time, as the number of devices
increase, it is likely that two or more stations might try to communicate simultaneously. The
next sections discuss the potential effects of simultaneous transmission.
Collision Domains
A collision domain is a group of Ethernet devices that are directly connected by hubs. A
collision occurs when two stations transmit bits at the same time on the same Ethernet
segment. Ethernet device are in a collision domain within an Ethernet LAN. Figure 5-4
shows how collisions occur.
On a cable, like coaxial media, when you interconnect all the devices on a LAN, the
possibility of conflict, or more than one user sending data at the same time, is high. The
same is true if a nonfiltering device, such as a hub, interconnects segments of a LAN.
Within a single collision domain, only one device can transmit at any one time. When a
device is transmitting, all other devices in the collision domain listen or receive the frame.
If two or more stations on a shared media try to transmit at the same time, a collision results.
The more stations you have attempting to transmit data, the more collisions occur. The
more collisions that occur, the worse the congestion becomes, and network accessibility
can become slow or nonexistent. Although collisions are a natural part of the way Ethernet
works, they still create congestion and latency within a segment.
Hubs extend collision domains. Extending a run of cable with a hub results in a larger
collision domain.
Consuming Bandwidth
Bandwidth is an important consideration in the function of Ethernet LANs. This section
identifies several examples of bandwidth consumption.
Shared LAN segments have a fixed amount of bandwidth. As users are added, the amount
of bandwidth per user decreases. This reduction results in collisions, and collisions
reduce performance.
Table 5-2 lists the bandwidth consumption differences between text and graphics files.
1 What is the maximum distance for thin Ethernet without using a repeater?
A 185 meters
B 250 meters
C 500 meters
D 800 meters
6 What term describes the results of two or more stations on a network trying to transmit
simultaneously on a shared network segment?
A Filtering
B Collision
C Switching
D Propagation
E Broadcasting
A Short cables
D Bandwidth-intensive applications
162 Chapter 5: Layer 2 Switching Fundamentals (The Data Link Layer)
Bridges in LANs
Ethernet uses collision detection. As a result, a single collision domain with a large number
of users leads to excessive frame collisions. A Layer 2 device can reduce the size of
collision domains in an Ethernet LAN.
The potential for frame collision in an Ethernet LAN limits the effective size of a network.
The section, “Consuming Bandwidth,” earlier in this chapter illustrated how high-
bandwidth applications consume bandwidth. Layer 2 networking devices, such as bridges
and switches, reduce the size of collision domains as well provide dedicated bandwidth to
users through a process called segmentation.
When using Layer 2 devices, each device builds a frame-forwarding table, also referred to
as a Media Access Control (MAC) or content-addressable memory (CAM) table. When a
frame is transmitted from a node, the switch then compares the destination MAC address
against the MAC table and forwards the frame, without modification, to the appropriate
LAN segment.
Filtering is also performed based on the destination MAC address of the frame. The frame
is not forwarded if the destination is a station on the same segment where the frame
originated. If the frame is destined for a station on another LAN segment, the frame is
forwarded to the port that connects to the segment on which the node with that address
resides. This function creates a separate collision domain for each LAN segment, as shown
in Figure 5-5. Frame collisions are reduced when frames destined for MAC addresses
known to the switch are forwarded to only the port that leads to that device.
NOTE A special rule controls the interconnection of bridges or switches. Only one active path
exists between any two computers in a LAN containing bridges and switches. If more than
one parallel path exists, a loop is formed, and the bridges or switches continually transmit
frames over the loop. This action soon results in overload of the network. This situation is
discussed further in the section, “Preventing Loops,” later in this chapter.
Bridged and Switched Ethernet 163
A good analogy for the need for segmentation is a bike path that has too many bikers. A
single bike path has become saturated with the maximum number of bikes and traffic has
slowed down to a standstill. You widen the bike path to provide a total of 10 lanes. This
widening enables bikes to travel at maximum speed, each in their own lane. However, if
traffic continues to increase, even these lanes fill up, causing the bikes to slow down again
Layer 2 Switches
LAN switching, sometimes referred to as Layer 2 switching, operates at the data link layer
of the OSI model, as shown in Figure 5-6.
Application
Presentation
Session
Transport
Network
Data Link
Physical
164 Chapter 5: Layer 2 Switching Fundamentals (The Data Link Layer)
Functionally, LAN switches are virtually identical to bridges. Like bridges, switches
connect LAN segments, reduce traffic, and use a table of MAC addresses to determine the
segment on which a frame needs to be transmitted.
The difference between LAN switches and multiport bridges is in the internal hardware and
cost. LAN switches use either proprietary or third-party application-specific integrated
circuits (ASICs), which have the switching code optimized and embedded in hardware,
resulting in faster execution time. Switches operate at much higher speeds than bridges and
can support new functionality such as virtual LANs. Also, LAN switches provide much
higher port density at a lower cost than traditional bridges do.
Because the switch is receiving multiple frames at the same time, it must schedule the
delivery or forwarding of the frames between the different ports. Some Cisco switches use
the following two methodologies, as illustrated in Figure 5-7:
less than 64 bytes (runt) or more than 1518 bytes (giant), including the CRC. If the
frame does not contain any errors, the LAN switch looks up the destination address in
the forwarding, or MAC, table and determines the outgoing interface. The switch then
forwards the frame toward its destination.
• Cut-through—With cut-through switching, the LAN switch waits until it copies the
destination address, which is indicated in the first 6 bytes following the preamble, into
the onboard buffers of the switch. The switch then looks up the destination address in
the MAC table, determines the outgoing interface, and forwards the frame toward its
destination. The cut-through switching method reduces latency by eliminating error
checking and forwarding the frame as soon as the switch reads the destination address
and determines the outgoing interface. However, cut-through switching is not
supported with most of the more advanced Cisco switches.
Frame Frame
<—
Frame
A .
Frame
Store-and-Forward Cut-Through
Switching Switching
Because of the increased speed of the switching hardware and switching backplanes, most
Catalyst switches use store-and-forward switching. Switches perform differently based on
the types of hardware and software features that are available.
One important feature of switching is often overlooked. When you connect devices to
switches, it’s important to consider how many of the devices are accessing an uplink port
to a server, router, or switch. If all the ports on the switch are the same speed, your switch
encounters congestion because everyone is trying to access the same uplink port at the same
time. When installing switches into the network, you must make sure that you have the
appropriate amount of high-speed ports. Switches that are attached to end users at the
access layer of the network hierarchy typically have 1 or 2 high-speed ports to connect to
the distribution layer switches.
7 ]
{ 5 ]
s
4
J
3 )
( >
Data Link
1
Layer 2 _J Multilayer
Switch Switch
Bridged and Switched Ethernet 167
As mentioned before, a Layer 2 LAN switch is operationally similar to a bridge but has a
higher capacity and supports many new features, such as full-duplex operation. A Layer 2
LAN switch performs switching and filtering using only the OSI data link layer (Layer 2)
MAC address. As with bridges, the switch is completely transparent to network protocols
and user applications.
A multilayer switch can make switching and filtering decisions by using more than one
layer of OSI model. For example, most multilayer switches can use the data link layer
(Layer 2) or OSI network layer (Layer 3) addresses to make forwarding decisions. This type
of switch dynamically decides whether to switch (Layer 2) or route (Layer 3) incoming
traffic. A multilayer LAN switch switches within LAN segments and routes between
different networks.
Switching Frames
A Layer 2 LAN switch follows a specific procedure when forwarding frames. A switch
learns the location of devices within a network topology by analyzing the source address of
incoming frames from all attached networks. The following list and Figure 5-10 describe
the frame switching process:
1 The switch receives a frame from a network on the incoming port of the switch.
2 The switch enters the source MAC address and the switch port that received the frame
into the MAC table.
3 If the destination address is unknown, the switch floods the frame to all ports.
6 The switch can now switch frames between source and destination devices onto the
network without flooding.
The rules for Layer 2 frame forwarding are explicit. If the device does not know the
destination address, the frame is flooded to all ports on the network. Because addresses are
learned by the source address of the sending devices, some addresses are never learned. In
particular, broadcast and multicast addresses are always destination addresses and are never
learned by a switch. Because of this, and without special interaction by the administrator,
these frames are always flooded.
168 Chapter 5: Layer 2 Switching Fundamentals (The Data Link Layer)
Katie’s PC
Logan’s PC
In Figure 5-11, suppose that Katie’s PC sends a frame to Logan’s PC. Katie’s PC resides on
network Segment A, and Logan’s PC resides on network Segment B. Both switches have
connections to network Segment A and Segment B to ensure continual operations in the
case of a port or device failure. Both Switch 1 and Switch 2 receive a frame from Katie’s
PC and correctly learn that Katie’s PC is on Segment A. Each switch forwards the frame
onto Segment B.
Logan’s PC then receives two copies of the frame from Katie’s PC through Switch 1 and
Switch 2. However, both switches also receive the frame on their Segment B interfaces. The
switches now change their internal tables to indicate that Katie’s PC is on Segment B. If
Logan’s PC replies to Katie’s PC, both switches receive and subsequently drop the reply
frames because the MAC table in each switch indicates that the destination (Katie’s PC) is
on the same network segment as the source of the frame (Logan’s PC).
If the initial frame from Katie’s PC were a broadcast frame, both switches would forward
the frames endlessly, using all available network bandwidth and blocking the transmission
of other packets on both segments. This problem would exist on all Layer 2 bridged and
switched networks if there were not a method for preventing these loops.
170 Chapter 5: Layer 2 Switching Fundamentals (The Data Link Layer)
Preventing Loops
Spanning Tree Protocol (STP) is meant to resolve the problems caused by bridging loops
in a redundant network by preventing traffic from flowing across all network links. STP
allows path redundancy while preventing undesirable active loops in the network.
To allow path redundancy, STP defines a tree that spans all switches in a network. STP
forces certain redundant data paths into a standby state, like the one shown in Figure 5-12.
If one network segment becomes unreachable, the STP reconfigures the spanning-tree
topology and reestablishes the link by activating the standby path.
STP operation is transparent to end stations, which are unaware whether they are connected
to a single LAN segment or to a switched LAN of multiple segments.
4 Which statements accurately describe the two forwarding methods used by switches?
(Choose two.)
D Store-and-forward switching copies only the destination address into the buffers.
E Cut-through switching does not wait to receive the whole frame before forward¬
ing it to the destination.
F Cut-through switching discards frames of less than 64 bytes or more than 1518
bytes, including the CRC.
172 Chapter 5: Layer 2 Switching Fundamentals (The Data Link Layer)
A Multitasking switch
B Symmetrical switch
C Asymmetrical switch
D Store-and-forward switch
7 Number the frame-forwarding sequence in the correct order of occurrence for a switch
receiving a frame that has an unknown source address.
E The switch enters the source MAC address and the switch port that received
the frame into the MAC table.
F The switch receives a frame from the destination device and enters that MAC
address and the switch port that received the frame into the MAC table.
8 In which of the following conditions would a bridging loop most likely occur?
Virtual LANs
Although switches provide separation for collisions on a network, they do not, by default,
provide separation for broadcasts. As you read in the previous section, any broadcast
received on a port is flooded out all other ports. This means as networks grow, the
broadcasts common to all networks use valuable resources. To control these broadcasts,
switch manufactures created the concept of virtual LANs (VLANs).
This section defines VLANs, discusses their benefits, and explains what devices intercon¬
nect end users and resources. Understanding how VLANs function increases your overall
understanding of the operations of LANs and how they meet different requirements for
networking.
Defining a VLAN
VLANs provide an important connection function in a LAN. A VLAN is defined as a group
of Ethernet segments that have different physical connections but which communicate as if
the LANs are connected on a single network segment.
VLAN technology allows the grouping of switch ports, and the devices connected to them,
into logically defined communities of interest. These groupings can be coworkers within
the same department, as is illustrated in Figure 5-13, a cross-functional product team, or
diverse users sharing the same network application or software.
174 Chapter 5: Layer 2 Switching Fundamentals (The Data Link Layer)
VLANs divide the network into broadcast domains. A broadcast domain is group of devices
that all receive the same broadcast frames, which allows all devices within that domain to
receive broadcast frames originating from any device within that VLAN.
Port-Based MAC-Based
Membership Membership
VLAN 2
When a host device connected through a VLAN sends out packets, they use the same
method for connecting to other network devices as a host that is connected by a traditional
Ethernet segment, as is described in the following list and illustrated in Figure 5-15:
1 The sending device recognizes the IP address of the destination is not on the local
network.
2 The sending device then uses its IP default gateway’s MAC address as the destination
MAC address of the frames.
3 The default gateway (a router) forwards the packet towards the destination, which
might be a directly connected network or it might need to go through additional
routers.
D Devices are geographically dispersed but are on the same physical segment.
D Changing the VLAN membership of the devices to a new switch reduces port costs.
3 Which of these components is used as the entry point into the VLAN?
A Trunk port
B MAC port
C Switch port
D VLAN port
A MAC address
B Routing protocol
C Ethernet segment
A Hub
B Bridge
C Trunk
D Router
E Switch
Chapter Summary
This chapter introduced you to the concept of Layer 2 networking devices including bridges
and switches. This chapter reviewed how these devices use Layer 2 MAC addresses to
provide a separation of user traffic into different collision domains. This chapter also
discussed the need for the Spanning Tree Protocol and how it allows redundancy and
prevents loops. Finally, this chapter discussed how VLANs can be used to control broadcast
on a network and how routers or Layer 3 switches communicate between these VLANs.
Chapter Review Questions 179
1 Using a hub to interconnect devices has the same results as having the network
devices on one Ethernet 10BASE2 segment.
A True
B False
3 What type of traffic can cause the most overhead on an Ethernet network?
A Unicast
B Multicast
C Broadcast
D Amplifies and cleans signals before passing every frame along the network
A Session layer
B Physical layer
C Network layer
180 Chapter 5: Layer 2 Switching Fundamentals (The Data Link Layer)
E Transport layer
F Presentation layer
G Application layer
A A section of the network to which a group of devices share the same physical
media
8 What features do store-and-forward mode allow the switch to perform? (Choose two.)
A Broadcasting
B Error checking
C Cell switching
9 Which switching method looks at the destination address of the frame and then
forwards the frame without waiting to receive the entire frame?
A Cut-through
B Cut-throat
C Fragment-free
D Store-and-forward
10 What are the functions of the Spanning Tree Protocol? (Choose two.)
A Cut-through
B Fast-forward
C Fragment-free
D Store-and-forward
12 What function of a Cisco switch allows a user to create separate broadcast domains?
A VLAN
B Bridging
C Cut-through
D Store-and-forward
E Transparent bridging
A Reduced collision
B Decreased security
A Hub
B Bridge
C Router
D Switch
E Repeater
16 VLANs can be created according to which category? (Choose all that apply.)
A Ports
B Groups
C MAC addresses
D Functional teams
17 What is the result of segmenting a switch into multiple VLANS? (Choose two.)
To understand how to configure the functions of internetworking devices, you must have a
solid understanding of routed protocols and their functions. The most common protocol
used in data networks today is the TCP/IP protocol stack. TCP/IP interconnects devices in
corporate networks and is the protocol of the Internet.
The TCP/IP suite of protocols was developed as part of the research done by the Defense
Advanced Research Projects Agency (DARPA). Later, TCP/IP was included with the
Berkeley Software Distribution of UNIX.
The Internet protocols can be used to communicate across any set of interconnected
networks. They are equally well-suited for both LAN and WAN communication. The
Internet protocol suite includes not only Layer 3 and Layer 4 specifications (such as IP and
TCP), but also specifications for such common applications as e-mail, remote login,
terminal emulation, and file transfer.
The TCP/IP protocol stack maps closely to the OSI reference model in the lower layers. All
standard physical and data link protocols are supported. Figure 6-1 illustrates the TCP/IP
model in reference to the seven-layer OSI model.
NOTE The network interface layer of the TCP/IP stack shown in Figure 6-1 is sometimes
separated and called the physical and data link layers.
To understand the protocol stack, the next sections begin by looking at the network layer
and moving up.
186 Chapter 6: TCP/IP (The Transport and Internetworking Layer Protocol)
7 Application
6 Presentation Application
5 Session
Several protocols operate at the IP Internet layer, which corresponds to the OSI network
layer. The following list contains some of the protocols discussed in this book:
• Address Resolution Protocol (ARP)—Determines the data link layer address of the
destination device for known destination IP addresses.
IP is characterized as follows:
• IP packets are treated independently, with each packet carrying the addresses of the
receiver and the sender.
• The IP service does not guarantee packet delivery. A packet can be misdirected,
duplicated, or lost on the way to its destination.
• The IP protocol does not provide any special features that recover lost or corrupted
packets. These services are instead provided by the end systems.
An analogy of IP protocol services would be mail delivery by the postal service. For
example, a person lives in Lexington, Kentucky, and a friend lives in New York City. That
person writes three separate letters to the friend in New York. Each letter is sealed in a
separate envelope, is addressed to the friend, and has a return address in the upper-left
comer of the envelope.
The three letters are placed in the out-of-town mail slot at the local post office. The postal
service makes the best attempt to delivery the three letters to the friend in New York.
However, the postal service does not guarantee that the letters will arrive at their destin¬
ation. The postal service does not guarantee that all three letters will be handled by the same
carrier or take the same route. Finally, the postal service does not guarantee that the letters
will arrive in the order in which you mailed them.
This example is similar to the way the IP protocol works. IP transfers information through
the network in the form of a packet. The Internet Protocol defines the packet format. The
first 20 or 24 bytes of the packet are control information called the header.
Like the information on an envelope, the IP protocol header includes information about
where the packet is going (a destination address) and where it is coming from (a source
address). This information is placed in fields in the IP header, as shown in Figure 6-2.
By default, the header is five words long; the sixth word is optional. The length of the
header is variable, so the header includes a field called IP header length (IHL) that indicates
the length of the header in words.
The header contains all the information necessary to deliver the packet of information.
Table 6-1 documents the field definitions within the IP header illustrated in Figure 6-2.
188 Chapter 6: TCP/IP (The Transport and Internetworking Layer Protocol)
Version (4)
Header Priority & Type
Total Length (16)
A
Length (4) of Service (8)
Flags
Identification (16) Fragment Offset (13)
(3)
20
Source IP Address (32)
Bytes
IP Options (0 Or 32 If Any)
Number of
IP Header Field Description Bits
Version Version number. 4 bits
Priority (Differential How the datagram should be handled. The first 8 bits
Services) or Type of 3 bits are priority bits.
Service
Number of
IP Header Field Description Bits
Figure 6-3 shows a data capture of an Ethernet frame with the IP header field expanded.
As shown in Figure 6-4, the Protocol field determines the Layer 4 protocol being carried
within an IP datagram. Although most IP traffic uses TCP or User Datagram Protocol
(UDP), other protocols can use IP, such as Open Shortest Path First (OSPF), generic routing
encapsulation (GRE), and Enhanced Interior Gateway Routing Protocol (EIGRP).
Protocol
Numbers
Each IP header must identify the destination Layer 4 protocol for the datagram.
Transport layer protocols are numbered, similar to port numbers. IP includes the protocol
number in the Protocol field. Table 6-2 lists some sample protocol numbers for the
transport layer protocols.
IP version 6 (IPv6) 41
Many other Layer 4 protocols exist. The protocols presented here are not an exhaustive list.
Refer to www.iana.org for a more complete list of all Protocol field numbers.
The router reads the protocol number from the header of the datagram, compares it to the
entries in the transport protocol table, and then passes it to the appropriate protocol. For
example, if the protocol number is 6, IP delivers the datagram to TCP. If the protocol is 17,
the datagram is delivered to UDP.
IP Internet Layer Overview 191
Although most application traffic uses TCP or UDP, other protocols can use IP. Approxi¬
mately 100 transport layer protocols are registered for other special purposes. The numbers
used by TCP/IP protocols are assigned and published by a group called the Internet
Assigned Numbers Authority (IANA).
Many of the protocols and applications that are implemented in TCP/IP are administrative
or control protocols like ICMP or DHCP. These protocols provide basic services like
addressing and messaging.
ICMP defines a small number of messages used for diagnostic and management purposes.
ICMP depends on IP to move packets around the network. These are some of the functions
of ICMP:
• Destination Unreachable
• Time Exceeded
• Parameter Problem
• Subnet Mask Request
• Redirect
192 Chapter 6: TCP/IP (The Transport and Internetworking Layer Protocol)
NOTE The term ping describes an application that uses echo requests and echo replies to verify
reachability between devices in an IP network. The word used to describe this application
comes from the concept of sonar, which initially uses a unique tone (which audibly sounded
like a ping) to locate objects underwater.
ICMP packet delivery is unreliable, however, so hosts cannot depend on receiving ICMP
packets for any network problem.
The target recognizes itself by reading the broadcast packet and provides the required MAC
address in its reply. The address resolution procedure is completed when the originator
receives a response from the target containing the required MAC address and updates the
table containing all the known bindings, usually called the ARP cache. This table maintains
a correlation between each IP address and its corresponding MAC address. Figure 6-5
illustrates how ARP maps IP addresses to MAC sublayer addresses.
The term local ARP describes resolving an address when both the requesting host and the
destination host share the same medium or wire, which is the case in Figure 6-5.
IP Internet Layer Overview 193
Ethernet: 0800.0020.1111
NOTE Different networking devices retain their ARP cache entries for various lengths of times.
For example, most windows devices keep entries for 10 minutes, while most IOS routes
keep entries for 2 hours.
• ARP request
• ARP reply
Before a device can communicate with any other device on an IP network, it must first
perform the ARP so that it knows where to send the frames. Figure 6-6 and Figure 6-7 show
a data capture of an ARP request and ARP reply.
194 Chapter 6: TCP/IP (The Transport and Internetworking Layer Protocol)
Ethernet: 0800.0020.1111
IP: 172.16.3.25
ARP and RARP are implemented directly on top of the data link layer.
NOTE Because RARP has no port or addressing scheme at Layer 3, it requires a RARP server on
each subnet. Dynamic Host Configuration Protocol (DHCP) is a modern implementation
of RARP that can use a single server for all subnets.
default router, and to provide other configuration information, such as the addresses for
printer, time, and news servers. DHCP consists of two components:
The network layer of the TCP/IP protocol stack provides the key functions for
communications between devices. It also provides administrative protocols to help improve
services.
IP Internet Layer Overview Section Quiz 197
B ARP
C TFTP
D ICMP
E SMTP
F Uses the echo function to send a packet on a round trip between two devices
G Uses failed acknowledgments to alert the sender to slow down packet transmission
198 Chapter 6: TCP/IP (The Transport and Internetworking Layer Protocol)
A Window
B Code bits
C Total length
D Time-To-Live
E Sequence number
F Source IP address
G Acknowledgment number
The Transport Layer 199
The transport layer protocol places a header on data that is received from the application
layer. The purpose of this protocol is to identify the application from which the data was
received and create segments to be passed down to the internetwork layer. Some transport
layer protocols also perform two additional functions: flow control provided by sliding
windows and reliability provided by sequence numbers and acknowledgments. Flow
control is a mechanism that allows the communicating hosts to negotiate how much data is
transmitted each time. Reliability provides a mechanism for guaranteeing the delivery of
each packet.
1 The teacher is lecturing on a particular subject. The teacher stops to ask, “Are there
any questions?” This question is a broadcast message to all students.
2 You raise your hand. This action is an implicit message back to the teacher.
3 The teacher responds with “Yes, what is your question?” Here, the teacher has
acknowledged your message and signals you to send your next message.
4 You ask your question. You transmit your message to the teacher.
5 The teacher hears your question and answers it. The teacher receives your message
and transmits a reply back to you.
6 You nod to the teacher that you understand the answer. You acknowledge receipt of
the message from the teacher.
TCP provides transparent transfer of data between end systems using the services of the
network layer below to move packets between the two communicating systems. TCP is a
transport layer protocol. IP is a network layer protocol.
Similar to the OSI reference model, TCP/IP separates a full network protocol suite into a
number of tasks. Each layer corresponds to a different facet of communication. Concep¬
tually, it is useful to envision TCP/IP as a protocol stack.
The services provided by TCP run in the host computers at either end of a connection, not
in the network. Therefore, TCP is a protocol for managing end-to-end connections. Because
end-to-end connections can exist across a series of point-to-point connections, these end-
to-end connections are called virtual circuits. These are the characteristics of TCP:
An analogy of the TCP protocol services would be sending certified mail through the postal
service. For example, someone who lives in Lexington, Kentucky, wants to send this book
to a friend in New York City, but for some reason, the postal service only handles letters.
The sender could rip the pages out and put each one in a separate envelope. To ensure the
receiver reassembles the book correctly, the sender numbers each envelope. Then, the
sender addresses the envelopes and sends the first envelope certified mail. The postal
service delivers the first envelope by any truck and any route. Upon delivery of that
envelope, the carrier must get a signature from the receiver and return that certificate of
delivery to the sender.
The sender mails several envelopes on the same day. The postal service again delivers each
envelope by any truck using any route. The sender returns to the post office each day
sending several envelopes each requiring a return receipt. The receiver signs a separate
receipt for each envelope in the batch as they are received. If one envelope is lost in transit,
the sender would not receive a certificate of delivery for that numbered envelope. The
sender might have already sent the pages that follow the missing one, but would still be able
to resend the missing page. After receiving all the envelopes, the receiver puts the pages in
the right order and pastes them back together to make the book. TCP provides these levels
of services.
UDP is another transport layer protocol that was added to the TCP/IP protocol suite. This
transport layer protocol uses a smaller header and does not provide the reliability available
with TCP.
The early IP suite consisted only of TCP and IP, although IP was not differentiated as a
separate service. However, some end user applications needed timeliness rather than
accuracy. In other words, speed was more important than packet recovery. In real-time
voice or video transfers, a few lost packets are tolerable. Recovering packets creates
excessive overhead that reduces performance.
202 Chapter 6: TCP/IP (The Transport and Internetworking Layer Protocol)
To accommodate this type of traffic, TCP architects redesigned the protocol suite to include
the UDP. The basic addressing and packet-forwarding service in the network layer was IP.
TCP and UDP are in the transport layer on top of IP, and both use IP services.
UDP offers only minimal, non-guaranteed transport services and gives applications direct
access to the IP layer. UDP is used by applications that do not require the level of service
of TCP or that want to use communications services such as multicast or broadcast delivery,
not available from TCP.
An analogy of the UDP protocol services would be using the postal service to send fliers
notifying all of your neighbors of your garage sale. In this example, you make a flier
advertising the day, time, and location of your garage sale. You address each flier with the
specific name and address of each neighbor within a 2-mile radius of your house. The postal
service delivers each flier by any truck and any route. However, it is not important if a flier
is lost in transit or if a neighbor acknowledges receipt of the flier.
TCP/IP Applications
In addition to including the IP, TCP, and UDP protocols, the TCP/IP protocol suite also
includes applications that support other services such as file transfer, e-mail, and remote
login. This topic describes three of the TCP/IP applications.
• E-mail (SMTP)—Simple Mail Transfer Protocol allows users to send and receive
messages to e-mail applications throughout the internetwork.
Transport services allow users to segment and reassemble several upper-layer applications
onto the same transport layer data stream. This transport layer data stream provides end-to-
end transport services. The transport layer data stream constitutes a logical connection
between the endpoints of the internetwork—the originating or sending host and the
destination or receiving host.
Host Host
One machine initiates a connection that must be accepted by the other. Protocol software
modules in the two operating systems communicate by sending messages across the
network to verify that the transfer is authorized and that both sides are ready.
After successful synchronization has occurred, the two end systems have established a
connection and data transfer can begin. During transfer, the two machines continue to
verify that the connection is still valid.
The data container looks different at each layer, and at each layer the container goes by a
different name, as shown in Figure 6-11.
204 Chapter 6: TCP/IP (The Transport and Internetworking Layer Protocol)
Application Application
<- Message ->
Physical j Physical
The names for the data containers created at each layer are as follows:
To provide communications between the segments, each protocol uses a particular header,
as discussed in the next section.
The Transport Layer 205
Data (Varies)
Figure 6-13 shows a data capture of an Ethernet frame with the TCP header field expanded.
The TCP header is 20 bytes. Transporting multiple packets with small data fields results in
less efficient use of available bandwidth than transporting the same amount of data with
fewer, larger packets. This situation is like placing several small objects into several boxes,
which could hold more than one object, and shipping each box individually instead of
filling one box completely with all of the objects and sending only that box to deliver all
the objects.
Figure 6-14 illustrates the UDP segment header format, the field definitions for which are
described in Table 6-4. The UDP header length is always 64 bits.
Figure 6-15 shows a data capture of an Ethernet frame with the UDP header field expanded.
Protocols that use UDP include TFTP, SNMP, Network File System (NFS), and Domain
Name System (DNS).
208 Chapter 6: TCP/IP (The Transport and Internetworking Layer Protocol)
— Port
Numbers
The Transport Layer 209
Application software developers agree to use well-known port numbers that are
controlled by the I ANA. For example, any conversation bound for the FTP application
uses the standard port number 21. Conversations that do not involve an application with
a well-known port number are assigned port numbers randomly chosen from within a
specific range instead. These port numbers are used as source and destination addresses
in the TCP segment.
Some ports are reserved in both TCP and UDP, but applications might not be written to
support them. Port numbers have the following assigned ranges:
NOTE Some applications, such as DNS, use both transport layer protocols. DNS uses UDP for
name resolution and TCP for server zone transfers.
Figure 6-17 shows how well-known port numbers are used by hosts to connect to the
application on the end station. The figure also illustrates the selection of a source port so
that the end station knows how to communicate with the client application.
RFC 1700, “Assigned Numbers,” defines all the well-known port numbers for TCP/IP. For
a listing of current port numbers, refer to the IANA website at www.iana.org.
End systems use port numbers to select the proper application. Originating source port
numbers are dynamically assigned by the source host—some number greater than 1023.
The synchronization requires each side to send its own initial sequence number and to
receive a confirmation of its successful transmission within the acknowledgment (ACK)
from the other side. Here is the sequence of events:
1 Host A->Host B SYN—My sequence number is 100, ACK number is 0, and ACK bit
is not set. SYN bit is set.
2 Host A<-Host B SYN, ACK—I expect to see 101 next, my sequence number is 300,
and ACK bit is set. Host B to Host A SYN bit is set.
3 Host A—>Host B ACK—I expect to see 301 next, my sequence number is 101, and
ACK bit is set. SYN bit is not set.
NOTE The initial sequence numbers are actually large random numbers chosen by each host.
This exchange is called the three-way handshake and is illustrated in Figure 6-18.
Figure 6-19 shows a data capture of the three-way handshake. Notice the sequence numbers
in the three frames.
A three-way handshake is necessary because sequence numbers are not tied to a global
clock in the network, and TCPs might have different mechanisms for picking the initial
sequence number. Because the receiver of the first SYN has no way of knowing whether
the segment was an old delayed one, unless it remembers the last sequence number used on
the connection (which is not always possible), it must ask the sender to verify this SYN.
Figure 6-20 illustrates the acknowledgment process.
The Transport Layer 211
Host A Host B
SYN Received
Sender Receiver
Send 1
Receive 1
Send ACK 2
Receive ACK 2
Send 2 *
Receive 2
Send ACK 3
Receive ACK 3
Send 3
Receive 3
Send ACK 4
Receive ACK 4
Window Size = 1
The window size determines how much data, in bytes, the receiving station accepts at one
time before an acknowledgment is returned. With a window size of 1 byte (as shown in
Figure 6-20), each segment must be acknowledged before another segment is transmitted.
This results in inefficient use of bandwidth by the hosts.
TCP window sizes are variable during the lifetime of a connection. Each acknowledg¬
ment contains a window advertisement that indicates how many bytes the receiver can
accept. TCP also maintains a congestion control window that is normally the same size
as the receiver’s window but is cut in half when a segment is lost (for example, when you
have congestion). This approach permits the window to be expanded or contracted as
necessary to manage buffer space and processing. A larger window size allows more data
to be processed.
NOTE TCP window size is documented in RFC 793, “Transmission Control Protocol,” and RFC
813, “Window and Acknowledgment Strategy in TCP,” which you can find at http://
www.ietf.org/rfc.html.
In Figure 6-22, the sender sends three 1-byte packets before expecting an ACK. The
receiver can handle a window size of only 2 bytes (because of available memory). So, it
drops packet 3, specifies 3 as the next byte to be received, and specifies a window size of 2.
The sender resends packet 2 and also sends the next 1-byte packet, but still specifies its
window size of 3. (For example, it can still accept three 1-byte packets.) The receiver
acknowledges bytes 3 and 4 by requesting byte 5 and continuing to specify a window size
of 2 bytes.
Send 3
ACK 3 Packet 3 Is
Window Size = 2 Dropped
Window Size = 3
Send 3
Window Size = 3 .:w
Send 4
ACK 5
^-- Window Size = 2
214 Chapter 6: TCP/IP (The Transport and Internetworking Layer Protocol)
Many of the functions described in these sections, such as windowing and sequencing, have
no meaning in UDP. Recall from Figure 6-14 that UDP has no fields for sequence numbers
or window sizes. Application layer protocols can provide for reliability. UDP is designed
for applications that provide their own error recovery process. It trades reliability for speed.
The TCP, UDP, and IP protocols and their headers are key in the communications between
networks. Layer 3 devices use an internetwork protocol like TCP/IP to provide communi¬
cations between remote systems.
C A language that all the computers on a network must use to communicate with
each other
D A standard set of rules and conventions that determine how computers communi¬
cate with each other across networks
C A suite of protocols that defines rules for how packets of information are moved
across a network
D TCP numbers segments so that the destination can reorder received segments.
Transport Layer Section Quiz 215
F TCP gives applications direct access to the datagram service of the IP layer.
4 Which descriptions best define the differences between TCP and UDP? (Choose two.)
E UDP offers applications direct access to the datagram service of the IP layer.
5 Which applications are members of the TCP/IP protocol stack? (Choose two.)
A IP
B FTP
C ICMP
D RFTP
E TFTP
6 Place the steps for establishing a connection with a peer system in the correct order.
7 Which names correctly identify the encapsulation term at the transport layer?
(Choose two.)
A Frame
B Packet
C Segment
D Message
E Datagram
F Bit stream
A Priority
B Time-To-Live
C Window
D Checksum
E Identification
F Type of service
G Sequence number
A Priority
B Length
C Window
D Checksum
E Identification
F Type of service
G Sequence number
Transport Layer Section Quiz 217
A The pixel size of the monitor that must be set ahead of time so data can be viewed
B The maximum size of the window that a software program can have and still pro¬
cess data rapidly
C The size of the window opening on a monitor that is not always equal to the
monitor size
Select the statement that correctly orders the steps to establish a TCP connection.
Chapter Summary
This chapter introduced you to the common Layer 3 protocol TCP/IP. It introduced you to
the concept of using addressing for delivery of information and showed how network
services can be provided by this protocol. This chapter also defined transport layer
protocols, which provide reliable and unreliable services for network traffic. This chapter
discussed in detail the headers used in the provisioning of these services and how a
connection-oriented protocol used handshakes and windowing to provide guaranteed
delivery of packets.
B NFS
C TCP
D ARP
E ICMP
F DCHP
A Routes datagrams
B Forwards packets
C Guarantees delivery
E Acknowledges receipt
E It sequences packets to coordinate which data has been transmitted and received.
Chapter Review Questions 219
A Edits IP packets
B Provides IP routing
A To test connectivity
B To multiplex packets
7 Which of the following statements best describes the role of RARP in an IP network?
A Flags
B Length
C Protocol
D Source address
E Header checksum
E Identifies the number of hops and links over which the datagram can be routed
A Quality of devices
11 Which terms correctly correlate TCP/IP layers to OSI model layers? (Choose three.)
A Internet; network
B Transport; network
C Transport; transport
12 Which of the following are primary duties of Layer 4 TCP? (Choose two.)
A Connections
B Flow control
C Data transfer
D Multiplexing
E Fragment-free
F Reliable transfer
A UDP
B SAN
C FTP
D DHCP
E ICMP
C 1) A connection is established.
2) The sending application informs the operating system that a connection is to
be initiated.
D Only after the connection between two hosts has been determined to be reliable
A Bits
B Frames
C Packets
D Segments
E Messages
A Length
B Window
C Protocol
D Checksum
E Destination port
Chapter Review Questions 223
A Length
B Window
C Protocol
D Checksum
E Destination port
A ACKs
B Sockets
C Buffering
D Windowing
E Acknowledgments
22 What will the ACK bit of the first segment of the three-way handshake most likely be?
A 1.
B 0.
C There is no ACK.
D The well-known ports cover the range of possible port numbers from 0
through 1023.
• Describe the features and operations of interior and exterior routing protocols,
including Routing Information Protocol versions 1 and 2 (RIPvl and RIPv2), Interior
Gateway Routing Protocol (IGRP), Enhanced IGRP (EIGRP), Open Shortest Path
First (OSPF), and Border Gateway Protocol (BGP)
Chapter
7
IP Addressing and Routing
(The Internetworking Layer)
Among the protocols included in the TCP/IP protocol stack are a network layer protocol
and a transport layer protocol. The internetworking layer handles the routing of packets of
data by using IP addresses to identify each device on the network. Each computer, router,
printer, or any other device attached to a network has its own unique IP address that routes
packets of data.
Each IP address has a specific structure, and various classes of IP addresses exist. In
addition, subnetworks and subnet masks play a role in IP addressing schemes, and different
routing functions and protocols are involved in transmitting data from one network node to
another using IP addresses. This chapter covers the major functions of IP addressing, IP
subnetting, and routing protocols.
IP Network Addressing
Just as you use addresses to identify the specific locations of homes and businesses so that
mail can reach them efficiently, you use IP addresses to identify the location of specific
devices on a network so that data can be sent correctly to those locations. IP addressing has
various aspects, including the calculations for constructing an IP address, the classes of IP
addresses designated for specific routing purposes, and public versus private IP addresses.
Learning how IP addresses are structured and how they function in the operation of a
network provides an understanding of how data is transmitted through Layer 3 internet¬
working devices using TCP/IP. To facilitate the routing of packets over a network, the TCP/
IP protocol suite uses a 32-bit logical address known as an IP address. This address must
be unique for each device in the internetwork.
Each IP datagram includes a source IP address and destination IP address that identify the
source and destination network and host, as discussed in Chapter 6, “TCP/IP (The Trans¬
port and Internetworking Layer Protocol).”
• The high order, or leftmost, bits specify the network address component (network ID)
of the address.
• The low order, or rightmost, bits specify the host address component (host ID) of
the address.
228 Chapter 7: IP Addressing and Routing (The Internetworking Layer)
Every LAN or VLAN on the corporate internetwork is seen as a single network that must
be reached before an individual host within that company can be contacted. Each LAN or
VLAN has a unique network address. The hosts that populate that network share those same
bits, but each host is identified by the uniqueness of the remaining bits. Like a group of
houses along the same road, the street address is the same, but the house number is unique.
The IP address is 32 bits in length and is binary in nature, but is expressed in a format that
can be easily understood by the human brain. Basically, the 32 bits are broken into 4
sections of 8 bits each, known as octets or bytes. Each of these octets is then converted into
decimal numbers between 0 and 255 and each octet is separated from the following one by
dots. Figure 7-2 illustrates the format of an IP address using 172.16.122.204 as an example.
<-32 Bits->
Dotted
Decimal Network Host
Example
172 16 122 204
Decimal
Example
Binary 10101100 00010000 01111010 11001100
IP Network Addressing 229
The IP address format is known as dotted decimal notation. Figure 7-2 shows how the
dotted decimal address is derived from the 32-bit binary value:
IP Address Classes
When IP was first developed, no classes of addresses existed, because it was assumed that
254 networks would be more than enough for an internetwork of academic, military, and
research computers.
As the number of networks grew, the IP addresses were broken into categories called
classes to accommodate different sizes of networks and to aid in identifying them. These
classes are illustrated in Figure 7-3.
Class D: Multicast
Class E: Research
• Class A—The Class A address category was designed to support extremely large
networks. A Class A address uses only the first octet to indicate the network address.
The remaining three octets are used for host addresses.
230 Chapter 7: IP Addressing and Routing (The Internetworking Layer)
The first bit of a Class A address is always 0; therefore, the lowest number that can be
represented is 00000000 (decimal 0), and the highest number that can be represented
is 01111111 (decimal 127). However, these two network numbers, 0 and 127, are
reserved and cannot be used as a network address. Any address that starts with a value
between 1 and 126 in the first octet, then, is a Class A address.
NOTE The 127.0.0.0 network is reserved for loopback testing (routers or local machines can use
this address to send packets to themselves). Therefore, it cannot be assigned to a network.
• Class B—The Class B address category was designed to support the needs of
moderate- to large-sized networks. A Class B address uses two of the four octets to
indicate the network address. The other two octets specify host addresses.
The first two bits of the first octet of a Class B address are always binary 10. The
remaining 6 bits might be populated with either 1 s or 0s. Therefore, the lowest number
that can be represented with a Class B address is 10000000 (decimal 128), and the
highest number that can be represented is 10111111 (decimal 191). Any address that
starts with a value in the range of 128 to 191 in the first octet is a Class B address.
• Class C—The Class C address category is the most commonly used of the original
address classes. This address category was intended to support a lot of small networks.
A Class C address begins with binary 110. Therefore, the lowest number that can be
represented is 11000000 (decimal 192), and the highest number that can be
represented is 11011111 (decimal 223). If an address contains a number in the range
of 192 to 223 in the first octet, it is a Class C address.
• Class E—Although a Class E address category has been defined, the Internet
Engineering Task Force (IETF) reserves the addresses in this class for its own
research. Therefore, no Class E addresses have been released for use in the Internet.
The first 4 bits of a Class E address are always set to 1111. Therefore, the first octet
range for Class E addresses is 11110000 to 11111111, or 240 to 255.
IP Network Addressing 231
Bits: 1 89 16 17 24 25 32
Class D: 1110MMMM Multicast Group Multicast Group Multicast Group
Range (224—239)
Within each class the IP address is divided into a network address (or network identifier,
network ID) and the host address (or host identifier, host ID). The number of networks and
hosts vary by class. A bit or bit sequence at the start of each address, known as the high
order bits, determines the class of the address as shown in Figure 7-5.
Bits:
Class A: ONNNNNNN Host Host Host
Range (1-126)
Bits: 1 8 9 16 17 24 25 32
Bits: 1 8 9 16 17 24 25 32
; .A •' l V-
Figure 7-5 shows how the bits in the first octet identify the address class. The router uses
the first bits to identify how many bits it must match to interpret the network portion of the
address (based on the standard address class). Table 7-1 lists the characteristics of Class A,
B, and C addresses that address network devices.
The first bit is 0. The first two bits are 10. The first three bits are 110.
* The number of usable hosts is two less than the total number possible because the host portion must be nonzero
and cannot be all Is.
232 Chapter 7: IP Addressing and Routing (The Internetworking Layer)
An IP address that has binary Os in all host bit positions is reserved for the network address.
Therefore, as a Class A network example, 10.0.0.0 is the IP address of the network
containing the host 10.1.2.3. A router uses the network IP address when it searches its IP
route table for the destination network location. As a Class B network example, the IP
address 172.16.0.0 is a network address, as shown in the Figure 7-6.
32 Bits -►
The decimal numbers that fill the first two octets in a Class B network address are assigned.
The last two octets contain 0s because those 16 bits are for host numbers and are used for
devices that are attached to the network. The IP address in the example (172.16.0.0) is
reserved for the network address; it is never used as an address for any device that is
attached to it. An example of an IP address for a device on the 172.16.0.0 network would
be 172.16.16.1. In this example, 172.16 is the network-address portion and 16.1 is the host-
address portion.
If you wanted to send data to all the devices on a network, you would need to use a network
broadcast address. Broadcast IP addresses end with binary Is in the entire host part of the
address (the host field), as shown in Figure 7-7.
For the network in the example (172.16.0.0), in which the last 16 bits make up the host field
(or host part of the address), the broadcast that is sent out to all devices on that network
includes a destination address of 172.16.255.255.
IP Network Addressing 233
32 Bits
NETWORK HOST
N H
H
The network broadcast is also known as a directed broadcast and is capable of being routed,
because the longest match in the routing table would match the network bits. Because the
host bits would not be known, the router would forward this out all the interfaces that were
members of the major 172.16.0.0 network. Directed broadcast can be used to perform a
denial of services attack against routed networks. This behavior is not the default for Cisco
routers, however.
If an IP device wants to communicate with all devices on all networks, it sets the destination
address to all Is (255.255.255.255) and transmits the packet. This address can be used, for
example, by hosts that do not know their network number and are asking some server for it
as with Reverse Address Resolution Protocol (RARP) or Dynamic Host Configuration
Protocol (DHCP). This form of broadcast is never capable of being routed, because RFC
1812 prohibits the forwarding of an all networks broadcast. For this reason an all networks
broadcast is called a local broadcast because it stays local to the LAN segment or VLAN.
The network portion of an IP address is also referred to as the network ID. It is important
because hosts on a network can only directly communicate with devices in the same
network. If they need to communicate with devices with interfaces assigned to some other
network ID, there needs to be a Layer 3 internetworking device that can route data between
the networks. This is true even when the devices share the same physical media segment
or VLAN.
A network ID enables a router to put a packet onto the appropriate network segment. The
host ID helps the router deliver the Layer 2 frame encapsulating the packet to a specific host
on the network. As a result, the IP address is mapped to the correct MAC address, which is
needed by the Layer 2 process on the router to address the frame.
Specific guidelines exist for assigning IP addresses in a network. First, each device or
interface must have a nonzero host number. Figure 7-8 shows devices and routers with IP
addresses assigned.
234 Chapter 7: IP Addressing and Routing (The Internetworking Layer)
10.0.0.0 El
Each wire is identified with the network address. This value is not assigned, but it is
assumed. A value of 0 means “this network” or “the wire itself’ (for example, 172.16.0.0).
This is the information used by the router to identify each network. The routing table
contains entries for network or wire addresses; it usually does not contain any information
about hosts.
As soon as the network portion is determined by the classification, you can determine the
total number of hosts on the network by summing all available 1 and 0 combinations of the
remaining address bits and subtracting 2. You must subtract 2 because an address consisting
of all 0 bits specifies the network, and an address of all 1 bits is used for network broadcasts.
Figure 7-9 illustrates a Class B network, 172.16.0.0. In a Class B network, 16 bits are used
for the host portion. Applying the formula 2N - 2 (in this case, 216 - 2 = 65,534) results in
65,534 usable host addresses.
All classful addresses have only a network portion and host portion, so the router(s) within
the internetwork know it only as a single network, and no detailed knowledge of the internal
hosts is required. All datagrams addressed to network 172.16.0.0 are treated the same,
regardless of the third and fourth octets of the address.
IP Network Addressing 235
Network Host
172 16 0 0
to in •<t CO C\J T- o O) CO h- CD to rr CO C\1 T- JS^
Each class of a network allows a fixed number of hosts. In a Class A network, the first octet
is assigned for the network, leaving the last three octets to be assigned to hosts. The first host
address in each network (all Os) is reserved for the actual network address, and the final
host address in each network (all Is) is reserved for broadcasts. The maximum number
of hosts in a Class A network is 224 - 2 (subtracting the network and broadcast reserved
addresses), or 16,777,214.
In a Class B network, the first two octets are assigned for the network, leaving the final two
octets to be assigned to hosts. The maximum number of hosts in a Class B network is 2
- 2, or 65,534.
In a Class C network, the first three octets are assigned for the network. This leaves the final
octet to be assigned to hosts, so the maximum number of hosts is 28 - 2, or 254.
Internet stability depends directly on the uniqueness of publicly used network addresses.
Therefore, some mechanism is needed to ensure that addresses are, in fact, unique. This
responsibility originally rested within an organization known as the InterNIC (Internet
Network Information Center). This organization was succeeded by the Internet Assigned
Numbers Authority (IANA). IANA carefully manages the remaining supply of IP addresses
to ensure that duplication of publicly used addresses does not occur. Such duplication
would cause instability in the Internet and compromise its capability to deliver datagrams
to networks using the duplicated addresses.
236 Chapter 7: IP Addressing and Routing (The Internetworking Layer)
To obtain an IP address or block of addresses, you must contact an Internet service provider
(ISP). The ISP allocates addresses from the range assigned by their upstream registry or
their appropriate regional registry, as follows:
Although Internet hosts require a globally unique IP address, private hosts that are not
connected to the Internet can use any valid address, as long as it is unique within the private
network. Because many private networks exist alongside public networks, grabbing “just
any address” is strongly discouraged. Therefore, the IETF defined 3 blocks of IP addresses
(1 Class A network, 16 Class B networks, and 256 Class C networks) in RFC 1918 for
private, internal use. Addresses in this range are not routed on the Internet backbone, as
shown in Table 7-2. Internet routers are configured to discard private addresses as defined
by RFC 1918.
A 10.0.0.0 to 10.255.255.255
B 172.16.0.0 to 172.31.255.255
C 192.168.0.0 to 192.168.255.255
If you are addressing a nonpublic intranet, these private addresses can be used instead of
globally unique addresses. If you want to connect a network using private addresses to the
Internet, however, it is necessary to translate the private addresses to public addresses. This
translation process is referred to as Network Address Translation (NAT). A router is often
the network device that performs NAT.
Address Exhaustion
The growth of the Internet has resulted in enormous demands for IP addresses. This section
describes the capabilities of IP version 4 (IPv4) in relation to that demand.
When TCP/IP was first introduced in the 1980s, it relied on a two-level addressing scheme,
which at the time offered adequate scalability. The architects of TCP/IP could not have
predicted that their protocol would eventually sustain a global network of information,
commerce, and entertainment. Twenty years ago, IPv4 offered an addressing strategy that,
although scalable for a time, eventually resulted in an inefficient allocation of addresses.
IP Network Addressing 237
The Class A and B addresses make up 75 percent of the IPv4 address space, but a relative
handful of organizations (fewer than 17,000) can be assigned a Class A or B network
number. Class C network addresses are far more numerous than Class A and B addresses,
although they account for only 12.5 percent of the possible 4 billion IP addresses, as shown
in Figure 7-10.
Unfortunately, Class C addresses are limited to 254 hosts, not meeting the needs of larger
organizations that cannot acquire a Class A or B address.
• The Class B address category was on the verge of depletion, and the remaining,
unassigned IPv4 network addresses were nearly depleted at the time.
• As more Class C networks came online to accommodate the rapid and substantial
increase in the size of the Internet, the resulting flood of new network information
threatened the capability of Internet routers to cope effectively.
Over the past two decades, numerous extensions to IPv4 have been developed to improve
the efficiency with which the 32-bit address space can be used.
In addition, an even more extendable and scalable version of IP, IPv6, has been defined
and developed. An IPv6 address is a 128-bit binary value, which can be displayed as 32
hexadecimal digits. It provides 3.4 x 1038 IP addresses. This version of IP should
provide sufficient addresses for future Internet growth needs. Table 7-3 compares IPv4
and IPv6 addresses.
238 Chapter 7: IP Addressing and Routing (The Internetworking Layer)
IPv4 IPv6
4 octets 16 octets
11000000.10101000.11001001.01110001 11010001.11011100.11001001.01110001.110100
01.11011100.110011001.01110001.11010001.110
11100.11001001.01110001.11010001.11011100.1
1001001.01110001
192.168.201.113 A524:72D3:2C80:DD02:0029:EC7A:002B:EA73
After years of planning and development, IPv6 is slowly being implemented in select
networks. Eventually, IPv6 might replace IPv4 as the dominant internetwork protocol.
First introduced in 1993 and later deployed in 1994, CIDR dramatically improved
scalability and efficiency of IPv4, in the following ways:
• It replaced classful addressing with a more flexible and less wasteful scheme.
• It provided enhanced route aggregation, also known as supernetting. As the
Internet grows, routers on the Internet require huge memory tables to store all the
routing information. Supernetting helps reduce the size of router memory tables
by combining and summarizing multiple routing information entries into one
single entry. This reduces the size of router memory tables and also allows for
faster table lookup.
A CIDR network address looks like this:
192.168.54.0/23
The 192.168.54.0 is the network address itself and the /23 means that the first 23 bits are
the network part of the address, leaving the last 9 bits for specific host addresses. The effect
of CIDR is to aggregate, or combine, multiple classful networks into a single larger
network. This reduces the number of entries required in the IP routing tables, and allows
provisioning a larger number of hosts within the network. Both are done without using a
network ID from the next larger classful address group.
With the CIDR approach, if you need more than 254 host addresses, you can be assigned
a /23 address instead of wasting a whole Class B address that supports 65,534 hosts.
IP Network Addressing 239
Figure 7-11 shows an example of using CIDR. Company XYZ asks for an address block
from its ISP, not a central authority. The ISP evaluates company XYZ’s needs and
allocates address space from its own large “CIDR block” of addresses. CIDR blocks can
be, and are, assigned by the regional authorities to governments, service providers,
enterprises, and organizations.
NOTE Figure 7-11 shows an example using private IP addresses as defined in RFC 1918. These
addresses would never be used by an ISP for CIDR, but are shown here merely as an
illustration. Public addresses are not used in this example for security measures.
In this example, the ISP owns the 192.168.0.0/16 address block. The ISP announces only
this single 192.168.0.0/16 address to the Internet (even though this address block actually
consists of many Class C networks). The ISP assigns the smaller 192.168.54.0/23 address
block within the larger 192.168.0.0/16 address block to the XYZ company. This allows the
XYZ company to have a network that can have up to 510 hosts (29 - 2 = 510), or that
network can be subdivided into multiple smaller subnets by the XYZ company. (Subnetting
is discussed in the next section.)
Providers assume the burden of managing address space in a classless system. With this
system, Internet routers keep only one summary route, or supernet route, to the provider s
network, and only the individual provider keeps routes that are more specific to its own
customer networks. This method drastically reduces the size of internetwork routing tables
240 Chapter 7: IP Addressing and Routing (The Internetworking Layer)
A 16
B 32
C 48
D 64
3 In a Class B address, which of the octets are the host address portion and are
assigned locally?
A Class A
B Class B
C Class C
D Class D
IP Network Addressing Section Quiz 241
A 10.215.34.124
B 127.16.71.43
C 172.17.10.10
D 225.200.15.10
7 What percentage of the total IPv4 address allocation is made up of Class A addresses?
A 25
B 50
C 12.5
D 75
A 32
B 48
C 96
D 128
A Classful addressing
B No supemetting
D Route aggregation
242 Chapter 7: IP Addressing and Routing (The Internetworking Layer)
IP Subnetting
As discussed in the previous section, using classful addressing limits the amount of
networks and hosts available for assignment. A useful characteristic of IP addressing is
the ability to divide classful networks into smaller subnets. Subnetworks are common in
most internetworks, segmenting the network address space into smaller divisions that
have their own addresses. To create subnet addresses, some of the bits used for the host
portion of an IP address are “borrowed” to create the subnet address. Subnet masks
identify which bits identify the network ID portion of the address and which portions
identify the host portion.
Learning how subnet addresses and masks are created expands your understanding of
IP addressing overall, as well as your understanding of how data is transmitted in a
TCP/IP environment.
Figure 7-12 shows a Class B network without subnets. For this network, all devices would
be in the same broadcast domain.
Network 172.16.0.0
With the addressing scheme in Figure 7-12, the network can be segmented into more
granular segments using switches to increase the number of collision domains. However,
no way of distinguishing individual segments (wires) within the network by IP addressing
exists. A single large broadcast domain exists inside a network that has no subnetworks—
all systems on the network encounter all the broadcasts on the network. Although you might
IP Subnetting 243
In the extreme case, each of the 126 Class A networks would have 16,777,214 usable host
addresses. The Class B address space illustrated in Figure 7-12 defines one wire with
65,534 potential workstations on it. What is needed is a way to divide this wire into
segments. Subnets provide a way to address these individual segments.
Subnet Addresses
Breaking the network into smaller segments, or subnets, makes network address use more
efficient. The outside world sees no change in the network, but within the organization, an
additional structure exists.
In Figure 7-13, the network 172.16.0.0 is subdivided or broken into four subnets:
172.16.1.0,172.16.2.0,172.16.3.0, and 172.16.4.0. The third octet is being used as the
subnet address in each of these addresses. Routers determine the destination network using
the subnet address, limiting the amount of traffic on the other network segments.
Network 172.16.0.0
Subnets are an extension of the network number. Network administrators decide the size of
subnets based on organization and growth needs.
244 Chapter 7: IP Addressing and Routing (The Internetworking Layer)
Subnet Masks
A network device uses a subnet mask to determine what part of the IP address is used for
the network, the subnet, and the device (host) address, as illustrated in Figure 7-14. A
subnet mask is a 32-bit value containing a contiguous number of 1 bits for the network and
subnet ID and a contiguous number of 0 bits for the host ID. A device can also determine
the class of address it has been assigned from its own IP address. The subnet mask then tells
the device where the boundary is between the subnet ID and the host ID.
172.16.3.0 El
Notice that the routing table now identifies each wire by its subnet number. The router and
any hosts determine what the local segment is by making a logical comparison to the subnet
mask, as shown in Figure 7-15.
Network Host
-Xr
IP
172 16 0 0
Address
Network Host
◄
Default
Subnet 255 255 0 0
Mask 111111111 111111111 00000000 00000000
Also Written As “/16” Where 16 Represents the Number of 1 s in the Mask.
<->-x--
8-Bit
Subnet 255 255 255 0
Mask
Also Written As 724” Where 24 Represents the Number of Is in the Mask.
IP Subnetting 245
Subnet bits are taken from the host field of the address. The number of subnet bits taken
from the host field is identified by a subnet mask. The subnet mask is 32 bits in size, written
as four octets. Each bit in the subnet mask determines how the corresponding bit in the IP
address should be interpreted, as follows:
128 64 32 16 8 4 2 1
I I Y u i I I I
10 0 0 0 0 0 0
110 0 0 0 0 0
1110 0 0 0 0
1111 0 0 0 0
1111 10 0 0
1111 110 0
1111 1110
1111 1111
Subnet bits come from the high order bits of the host field. To determine a subnet mask for
an address, add up the decimal values of each position that has a 1 in it. For example:
224 = 128 + 64 + 32
Because the subnet mask is not defined by the octet boundary, but by bits, you need to
convert dotted decimal addresses to binary and back into dotted decimal.
An IP host, like a PC or router, uses the subnet mask to determine how to handle a datagram.
The device uses the assigned IP address and subnet mask of a particular interface or NIC to
determine which logical network or subnetwork that a port interface is connected to.
The IP device, which reads the IP addresses in binary format, performs a logical AND
operation to obtain the network number. A logical AND is a Boolean algebra operation
that allows for binary comparison. Table 7-4 shows the possible results for logical
AND comparisons.
246 Chapter 7: IP Addressing and Routing (The Internetworking Layer)
AND 0 1
0 0 0
1 0 1
A mask of 1 returns the same value that is contained in the interface address. Because the
subnet masks match high order bits, the bits that are masked with a 1 now return the
network ID associated with a given interface or NIC. This network ID is used by the device
to construct a table used for forwarding datagrams.
When a datagram is sent, the device examines the destination address and checks the table
of network IDs to find the longest possible match, that is the match with the most bits in
common starting with the high order bits. The sending device then sends the datagram out
the interface with the longest match.
Prior to the creation of subnet mask, networks were defined by the high order bits. That is,
if a Class B address were assigned to an interface, the device knew the network ID based
on the high order bits. For this reason, each class is now associated with what is known as
a default mask that specifies the network numbers that would match the class of the
network. For example, a Class B network that originally only used the first 16 bits as a
network ID would now have a default mask of 255.255.0.0. Figure 7-17, with no
subnetting, shows that the network number “extracted” using a default mask is 172.16.0.0,
which is the same as a Class B network.
Network Host
Network
172 16 0 0
Number
Figure 7-18 shows more bits turned on, extending the network portion and creating a
secondary field extending from the end of the standard mask and using 8 of the host
bits. This secondary field is the subnet field and represents wires (or subnetworks)
inside the network.
IP Subnetting 247
NetworK 1?2 | 16
Number 2 1 0
Subnetting does not have to occur between octets. An octet can be split into a subnet portion
and a host portion. Figure 7-19 illustrates 10 bits of subnetting with 6 bits remaining for the
host portion.
Network 16 128
172 2 i
Number
Broadcasts
Broadcasting is supported on networks. Broadcast messages are those you want every host
on the network to see. The broadcast address is formed by using all Is within all or portions
of the IP address. Networks devices support three kinds of broadcasts, as illustrated in
Figure 7-20:
• Flooding
• Directed broadcasts
• All subnets broadcast
248 Chapter 7: IP Addressing and Routing (The Internetworking Layer)
LL I_X, L....J
A<
172.16.3.0
172.16.4.0
._
172.16.1.0
172.16.3.255 16.2.0
(Directed Broadcast)
—> 255.255.255.255 - -►x
(Local Network Broadcast)
-> 172.16.255.255-►
(All Subnets Broadcast)
NOTE In Cisco IOS Release 12.0 and later, routers by default do not forward all subnets or
directed broadcast.
IP Subnetting 249
Identifying IP Addresses
Given an IP address and subnet mask, you can use the process illustrated in Figure 7-21 and
described in the following list to identify the subnet address, the broadcast address, the first
usable address, and the last usable address. (You can obtain the subnet address, the broadcast
address, the first usable address, and the last usable address in many ways. This is just one
method.) This method can be used to calculate the address space for your networks.
172 1 16 2 160
/o\
172.16.2.160 10101100 00010000 00000010 10 100000 Host©
This network has 8 bits of subnetting that provide up to 254 subnets and 254 host addresses.
Table 7-5 shows how subnet masks break up IP networks and the number of subnets and
hosts available when you use each mask.
Table 7-5 Class B Subnet Table
2 255.255.192.0 2 16,382
3 255.255.224.0 6 8190
4 255.255.240.0 14 4094
5 255.255.248.0 30 2046
6 255.255.252.0 62 1022
7 255.255.254.0 126 510
8 255.255.255.0 254 254
9 255.255.255.128 510 126
10 255.255.255.192 1022 62
11 255.255.255.224 2046 30
12 255.255.255.240 4094 14
13 255.255.255.248 8190 6
14 255.255.255.252 16,382 2
With subnets, you can still use the 2N - 2 (where N equals the number of bits) calculation
to determine the number of hosts.
IP Subnetting 251
Subnet Planning
The sample network shown in Figure 7-23 has been assigned a Class C address of
192.168.5.0. Assume 20 subnets are needed, with 5 hosts per subnet. Subdivide the last
octet into a subnet portion and a host portion and determine what the subnet mask is.
20 Subnets
5 Hosts Per Subnet
Class C Address:
192.168.5.0
Select a subnet field size that yields enough subnetworks. In this example, choosing a 5-bit
mask allows 20 subnets, each containing 32 hosts. The subnet addresses are all multiples
of 8, such as 192.168.5.16,192.168.5.32, and 192.168.5.48. This is because 8 addresses are
in each network, including the network number and broadcast address; therefore, each new
subnet is 8 greater than the previous one.
The remaining bits in the last octet are used for the host field. The 3 bits in our example
allow enough hosts to cover the required five hosts per wire. The host numbers are 1,2,3,
4, 5, and 6. Address 7 is the broadcast for this network, and the next subnet is the value 8.
The final host addresses are a combination of the network/subnet “wire starting address
plus each host value. The hosts on the 192.168.5.16 subnet would be addressed as
192.168.5.17,192.168.5.18, 192.168.5.19,192.168.5.20,192.168.5.21, and 192.168.5.22.
A host number of 0 is reserved for the “wire” address, and a host value of all Is is reserved
because it selects all hosts—a broadcast.
252 Chapter 7: IP Addressing and Routing (The Internetworking Layer)
As discussed previously, when an IP device is assigned an address and subnet mask, the
subnet is extracted using this information. An entry is then placed in a table on this device
to identify the subnetwork associated with the given interface. The extracted subnet number
should be typical of the subnets generated during this planning exercise. If you look at
Figure 7-24, you can see how to determine the subnet number, broadcast address, and
beginning and ending ranges of the address space for the address 192.168.5.121 with the
subnet 255.255.255.248.
In Figure 7-24, a Class C network is subnetted to provide 6 host addresses and 30 subnets.
Table 7-6 shows how subnet masks divide Class C networks and the number of subnets and
hosts available with each given subnet.
3 255.255.255.224 6 30
4 255.255.255.240 14 14
5 255.255.255.248 30 6
6 255.255.255.252 62 2
IP Subnetting Section Quiz 253
A Two
B Three
C Four
D Five
3 What is the practical maximum number of host bits you can borrow from a Class A
address for subnetting?
A 24
B 22
C 16
D 14
_ 2. Perform a logical AND operation on the IP address and the subnet mask.
5 How many octets does a Class A network have in the host field?
A 3
B 2
C 1
D 4
A 58
B 60
C 62
D 64
A 253
B 254
C 255
D 256
8 What is the maximum number of bits that can be borrowed to create a usable subnet
for a Class C network?
A 2
B 4
C 6
D 8
Routing Basics 255
Routing Basics
Routing is the function that transmits datagrams between networks or network segments,
using a router or a Layer 3 switch. The routing process uses network addressing to build
network routing tables and uses routing algorithms to determine the most efficient path for
transmitting a datagram from one router to another in the network until it reaches the
destination device. Figure 7-25 illustrates an example of connected routers. For a host on
the 10.120.2.0 subnet to communicate with a host on the 172.16.1.0 subnet, the routers
between them must maintain and choose the paths to be used.
A router or Layer 3 switch is a network layer device that generally uses routing tables to
determine the optimal path along which network traffic should be forwarded. (You learn
more about routing tables later in this chapter.) A router has these two key functions:
• It must maintain its routing tables and make sure that other routers know of changes
in the network. It does this by using a routing protocol to communicate network
information from its routing table with other routers.
• It must use the routing table to determine where to forward packets. It forwards them
to the appropriate interface, adds the necessary framing for the particular interface,
and then sends the packet.
To be able to route packets of information, a router (or any other entity that performs
routing, such as a UNIX workstation running the route daemon or a Layer 3 switch) needs
to know the following key information:
• Destination address—What is the destination (or address) of the item that needs to
be routed? This information is the responsibility of the host. (Network addressing was
covered in the section, “IP Network Addressing.”)
• Information sources—From which source (other routers) can the router learn the
paths to given destinations?
• Possible routes—What are the initial possible routes, or paths, to the intended
destinations?
256 Chapter 7: IP Addressing and Routing (The Internetworking Layer)
1 The router examines the frame to determine what type of network layer data is being
carried. If the router is configured to route, or forward, that protocol, it de-
encapsulates the frame by discarding the (data link layer) header and trailer. The
datagram is then sent to the appropriate network layer process (IP for example).
2 The network layer process examines the network layer header to determine the
destination network and then references the routing table that associates networks
to outgoing interfaces.
3 The packet is again encapsulated in the data link layer frame for the selected interface
and sent on to the next-hop device.
At the router connected to the network containing the destination host, the packet is
encapsulated in the destination LAN data-link frame type for delivery toward the
destination host (or next hop). Because the de-encapsulation stops at Layer 3 on a router or
Layer 3 switch, these devices are said to operate at Layer 3 of the OSI model.
The routing information that a router learns from its routing sources is placed in its routing
table. The router relies on this table to determine which outgoing port to use when forwarding
a packet toward its destination. The routing table is how a router knows about the networks.
Figure 7-26 illustrates how a router builds a routing table using connected networks.
/
Network Destination Exit
Protocol Network Interface
Connected 10.120.2.0 E0 Routed Protocol: IP
Learned 172.16.0.0 SO
Routing Basics 257
The entry in a routing table for a directly connected network comes from the addressing and
subnet mask, as is discussed in the previous sections. If the destination network is directly
connected, the router already knows which port to use when forwarding packets.
If destination networks are not directly attached, the router must learn about and compute
the best route to use when forwarding packets to these networks. The routing table is
populated through one of the following methods:
A muted protocol includes enough information in its network layer address to allow a router
to direct user traffic. The IP protocol and Novell’s IPX are examples of routed protocols.
A routing protocol supports a routed protocol by providing mechanisms for sharing routing
information, and allows the routers to communicate with other routers to update and
maintain the routing tables. Examples of routing protocols that support the IP routed
protocol include the Routing Information Protocol (RIP), Interior Gateway Routing
Protocol (IGRP), Open Shortest Path First (OSPF), Border Gateway Protocol (BGP), and
Enhanced IGRP (EIGRP).
A routing protocol is a network layer protocol that receives packets from other participants
to learn and maintain a routing table. In contrast, routed protocols, such as TCP/IP and
IPX, define the format and use of the fields within a packet to provide a transport
mechanism for user traffic. As soon as the routing protocol determines a valid path
between routers, the router can route a routed protocol. Routing protocols also describe
the following information:
During path determination, routers evaluate the available paths to a destination and
establish the preferred handling of a packet. Routing services use metrics and administra¬
tive distances when evaluating network paths. This information can be configured onto each
router by the network administrator statically (static routing), or it can be learned
dynamically (dynamic routing) by the routers using a routing protocol. After the router
determines which path to use, it can proceed with forwarding the packet by taking the
packet it accepted on one interface and forwarding it to another interface that reflects the
best path toward the destination.
After a frame reaches a router connected to the target, the attached router uses the Address
Resolution Protocol (ARP) to resolve the host or next hop address so that it can forward the
packet to the destination host.
Before the frame can be sent to the next host, however, a router must build the routing table.
The assembly and maintenance of the routing table is one of the primary functions of a
router and routing protocols, as discussed in the next section.
Routing Tables
To aid in the process of path determination, routing protocols dynamically maintain the
routing table, which contains route information. Route information varies, depending on
the routing protocol used. Figure 7-27 shows how routers keep this table of information to
aid in the traffic management and path determination.
Network
10.1.2.0
i « i Routing Table
Some of the design goals for routing protocols include the following:
• Rapid convergence—Convergence occurs when all routers share the identical view
or information of the network topology. When a network event causes changes in
link or router availability, recalculations are needed to reestablish network
connectivity. Routing algorithms that converge slowly can cause routing loops or
long network outages.
Figure 7-28 illustrates that a router can populate the routing table by learning and choosing
routes through dynamic routing protocols.
172.16.1.0
172.17.3.0
/
Network Destination Exit
Protocol Network Interface
Connected 10.120.2.0 E0
RIP 172.16.1.0 SO
IGRP 172.17.3.0 SI
Routed Protocol: IP
Routing Protocol: RIP, IGRP
Routing Metrics
Routing protocols use many different metrics to determine the best route, each interpreting
what is best in its own way. When a routing protocol updates a routing table, the primary
objective of the protocol is to determine the best information to include in the table. The
routing algorithm generates a number, called the metric value, for each path through the
network. Sophisticated routing protocols can base route selection on multiple metrics,
combining them in a single metric. Typically, the smaller the metric number is, the better
the path. Figure 7-29 shows some common metrics used by routing protocols.
Routing Basics 261
In this figure, depending on the metrics used, a datagram from Device A to Device B might
take different paths. While a user might prefer to use the T1 links, because it is faster, the
routing protocol might choose a different route based on its metric.
Routers use addressing to identify unique networks within a routed internetwork. These
routers de-encapsulate frames to examine the addresses and determine how to route frames
to the appropriate destination. These destinations are determined using routing protocols to
choose the best available route through the internetwork.
1 Which term best describes the operation of a router in evaluating available routes to a
destination and establishing the preferred handling of a packet?
A Data linkage
B Path determination
D Frame Relay
4 Which of the following contains routing information that helps a router in determining
the routing path?
A IP address
B MAC address
C Routing table
D Routed protocol
5 Which of the following are goals for routing protocols? (Choose three.)
A Optimization
B Flexibility
C Simplicity
D Rapid convergence
A Delay
B Bandwidth
C Length
D Load
Routing Protocols
In the routing process, protocols package data into a form that can be transmitted. Two
major types of routing protocols exist, internal protocols that route information within an
organization and external protocols that route information between networks. Each type of
routing protocol functions differently and provides different advantages for network data
transmission requirements.
Learning about the different types of routing protocols provides you with more
understanding of how data is transmitted over TCP/IP and which protocol is best suited for
a given environment.
264 Chapter 7: IP Addressing and Routing (The Internetworking Layer)
Autonomous system numbers can be obtained from the registry in your region. This
autonomous system number is a 16-bit number. An exterior routing protocol such as Border
Gateway Protocol (BGP) requires that you specify this unique, assigned autonomous
system number in your configuration.
IGPs route packets within an autonomous system. Examples of IGPs include the following:
• RIP
• IGRP
• EIGRP
• OSPF
EGPs route packets between autonomous systems. BGP4 is the only currently
supported EGP.
Most enterprises use IGPs to allow multiple routers to communicate information about
networks to route traffic between devices within the enterprise internetwork. EGPs are used
when connecting an enterprise to multiple ISPs, between ISPs, or in very large enterprise
deployments.
• Distance vector
• Link-state
• Hybrid
In this way, the algorithm accumulates network distances so that it can maintain a database
of internetwork topology information. Distance vector algorithms do not allow a router to
know the exact topology of an internetwork.
* RIP—A commonly used distance vector routing protocol, RIP uses hop count as its
routing metric. You learn more about RIP in the section, “RIPvl and RIPv2” later in
this chapter.
• IGRP—IGRP was developed by Cisco to address the issues associated with routing
in large, heterogeneous networks. IGRP uses bandwidth, delay, reliability, load, and
maximum transmission unit (MTU) as metrics to make the overall best path
determination. You learn more about this protocol in the section, “IGRP.”
Link-state protocols build routing tables based on a topology database. This database is
built from link-state packets that are passed between all the routers to describe the state of
a network. The database is used by the shortest path first algorithm to build the routing
table. Figure 7-32 shows the components of a link-state protocol.
When a link changes state, the device that detected the change creates a link-state advertise¬
ment (LSA) concerning that link (route), and that LSA is propagated to all OSPF routers.
Each OSPF router takes a copy of the LSA, updates its link-state (topological) database,
and forwards the LSA to all neighboring OSPF routers. This flooding of the LSA is required
to ensure that all OSPF routers update their databases before creating an updated routing
table that reflects the new topology.
The link-state database calculates the best paths through the network, by applying the
Dijkstra shortest path first (SPF) algorithm against the link-state database to build the
shortest-path-first tree. The best (shortest) paths are then selected from the shortest-
path-first tree and placed in the routing table. Whereas the distance vector algorithm
has nonspecific information about distant networks and no knowledge of distant
routers, a link-state routing algorithm maintains full knowledge of distant routers and
how they interconnect.
268 Chapter 7: IP Addressing and Routing (The Internetworking Layer)
• OSPF— An IETF standard link-state routing protocol for IP. This protocol uses cost
to choose the best path through the network and converges rapidly using link-state
updates. You learn more about this protocol in the section “OSPF” later in this chapter.
• IS-IS— IS-IS is an OSI standard link-state routing protocol for multiple Layer 3
protocols like IP and DECnet Phase IV. This protocol also uses cost to choose the best
path through a network and converges rapidly using link state updates. IS-IS is not
covered in this book.
As networks become larger in scale, link-state routing protocols become more attractive
because of the following:
• Link-state protocols send Flash updates of a topology change within the network.
• Periodic updates are more infrequent than those for distance vector protocols.
• Networks running link-state routing protocols can be segmented into area hierarchies,
limiting the scope of route changes.
The balanced hybrid routing protocol uses distance vectors with more accurate metrics to
determine the best paths to destination networks. However, it differs from most distance
vector protocols by using topology changes to trigger routing database updates as opposed
to periodic updates.
The balanced hybrid routing type converges more rapidly, like the link-state protocols.
However, it differs from these protocols by emphasizing economy in the use of required
resources such as bandwidth, memory, and processor overhead.
NOTE While introductory books often refer to EIGRP as a hybrid routing protocol, it would be
more accurately described as a diffused or DUAL protocol because it uses the Diffusing
Update Algorithm (DUAL) to choose a route and maintains feasible successors. The DUAL
routing protocol is discussed in greater detail in the Cisco Press book, CCNP Self-Study:
Building Scalable Cisco Internetworks (BSCI), Second Edition (Paquet and Teare, 2004).
No single best routing protocol exists for all internetworks. Network administrators must
weigh technical and nontechnical aspects of their networks to determine which is best.
The following sections describe some of the characteristics of the more commonly used
routing protocols.
If multiple paths to a destination exist, RIP selects the path with the smallest number of
hops. However, because hop count is the only routing metric used by RIP, it does not
necessarily select the fastest path to a destination. It counts only hops.
RIP allows routers to update their routing tables at programmable intervals; the default
interval is every 30 seconds. Because RIP is constantly sending routing updates to its
neighboring routers, this process can cause network traffic to build. A Cisco enhancement
to RIP also allows it to send triggered updates, which includes the entire routing table, when
a topology change occurs.
To prevent a packet from a condition known as looping, RIP has a hop-count limitation of
15 hops. If the destination network is more than 15 routers away as shown in Figure 7-33,
it is considered unreachable and the packet is dropped. This limitation creates a scalability
issue when routing in large, heterogeneous networks.
RIPvl is a classful routing protocol, which means that all devices in the same network must
use the same subnet mask, because RIPvl does not include the subnet mask information
with the routing update. RIPv2 provides what is called prefix routing and does send subnet
mask information with the route updates. This supports the use of classless routing. With
classless routing protocols, different subnets within the same network can have different
subnet masks. The use of different subnet masks within the same network is referred to as
variable-length subnet masking (VLSM).
270 Chapter 7: IP Addressing and Routing (The Internetworking Layer)
Hop Counter 15
/ J
.c. '—r"
" i—i
IGRP
IGRP is a distance-vector routing protocol developed by Cisco. It was developed
specifically to address problems associated with routing in large networks that were beyond
the scope of protocols such as RIP. While RIP selects the path with the fewest hops, IGRP
can select the fastest path, based on the delay, bandwidth, load, MTU, and reliability.
Network administrators can determine the importance given to any one of these metrics or
allow IGRP to automatically calculate the optimal path. By default, IGRP uses bandwidth
and delay metrics only. Like RIP, it supports only classful routing. IGRP also has a much
higher maximum hop-count limit than RIP, to allow the network to scale.
IGRP sends routing updates at 90-second intervals or when a topology change occurs,
advertising the network for a particular autonomous system. These are key design
characteristics of IGRP:
EIGRP
EIGRP is an advanced version of IGRP and is a proprietary Cisco protocol, providing
superior operating efficiency such as faster convergence and lower overhead bandwidth.
EIGRP combines the advantages of link-state protocols with those of distance vector
protocols. Thus, the term hybrid describes its algorithm.
While EIGRP uses the same default and configurable metrics as IGRP, five basic
components enhance its ability to route data:
OSPF
The OSPF protocol is a link-state protocol that was written to address the needs of large,
scalable internetworks beyond the capabilities of the RIP protocol. The IETF developed
OSPF in 1988. The most recent version is known as OSPF version 2 and is an open standard.
OSPF is an IGP, which means that it distributes routing information between routers
belonging to the same autonomous system. The large network issues it addresses include the
following:
• Speed of convergence—In large networks, RIP convergence can take several minutes
as the routing algorithm goes through a hold-down and route-aging period. With
OSPF, convergence is faster than it is with RIP because routing changes are flooded
immediately and computed in parallel.
• Support for VLSMs—RIPvl does not support VLSMs. OSPF is a classless routing
protocol, sending subnet mask information along with the routing updates, so it
supports VLSMs. (Note that RIPv2 also supports VLSMs.)
• Network reachability—OSPF has virtually no reachability limitations.
272 Chapter 7: IP Addressing and Routing (The Internetworking Layer)
BGP
BGP is an example of an EGP. It is the principal route advertising protocol used by major
companies and ISPs on the Internet. BGP exchanges routing information between
autonomous systems while guaranteeing loop-free path selection. Version 4 of BGP is the
first version of BGP that supports classless interdomain routing (CIDR) and route
aggregation. Unlike common IGPs such as RIP, OSPF, and EIGRP, BGP does not use
metrics such as hop count, bandwidth, or delay. Instead, BGP makes routing decisions
based on network policies using various BGP path attributes.
BGP updates are carried using TCP on port 179. In contrast, RIP updates use User
Datagram Protocol (UDP) port 520, while OSPF uses neither TCP nor UDP (it has its own
network layer protocol number of 89). Because BGP requires TCP, IP connectivity must
exist between BGP peers, and TCP connections must be negotiated between them before
updates can be exchanged. Therefore, BGP inherits the reliable, connection-oriented
properties of TCP.
BGP is used extensively in the Internet today to connect ISPs and to connect enterprises to
ISPs.
Routing protocols all provide the same basic services to allow packets to be routed through
an internetwork. Routing protocols have different characteristics and network
administrators must choose a protocol that is best suited for their own environment.
Routing Protocols Section Quiz 273
AS PATH
AS = Autonomous System
B RIP
C BGP
D EIGRP
5 In the IP RIP routing protocol, how often are periodic routing updates sent?
A Every 30 seconds
B Every 60 seconds
C Every 90 seconds
D Rapid convergence
Chapter Review Questions 275
D Supports VLSM
C Routing protocol
D Routed protocol
Chapter Summary
The fundamental principles of building and maintaining internetworks are based on Layer
3 protocols. This chapter presented an overview of Layer 3 IP addressing and routing. In
this chapter, you learned about how each IP address has a portion that identifies the network
and another portion that identifies the host. You also learned how classes and subnet masks
identify these portions of the address. This chapter also discussed how routing protocols
determine the location of each individual network address within an internetwork to pass
packets to the appropriate end device. Finally, this chapter compared and contrasted the
different types of routing protocols.
A True
B False
276 Chapter 7: IP Addressing and Routing (The Internetworking Layer)
A 0.0.0.0
B 191.168.32.0
C 127.0.0.0
D 172.16.0.0
A DHCP
B DNS
C WINS
D NAT
4 Which is the IP protocol that is being implemented to increase the number of network
addresses available?
A IPv2
B IPv4
C IPv6
D IPv8
5 How many host addresses are available if the IP subnet address is 206.15.8.0/20?
A 4088
B 4098
C 4094
D 4096
Chapter Review Questions 277
B Better performance
D Increased collisions
E Increased traffic
7 If you were going to borrow four bits to create a subnet mask for a Class B address,
what would the subnet mask be?
A 255.255.224.0
B 255.255.255.0
C 255.255.240.0
D 255.255.0.0
A 8
B 16
C 32
D 62
E 128
9 What are the key functions of a router? (Choose all that apply.)
B Use routing tables to determine the optimal path for network traffic
A The network layer process examines the network layer header to determine the
destination network.
B The router de-encapsulates and examines the frame to determine what type of
network layer data is being carried.
C The packet is re-encapsulated in the data link layer frame for the selected inter¬
face and transmitted.
D The router translates the frame into the network layer protocol associated with
the outgoing interface and forwards to the next hop.
11 What are some informational items contained in a routing table? (Choose two.)
A Destination/next-hop associations
B Routing metric
C Segment length
D Ticks
A RIP
B BGP
C IP
D IGRP
E OSPF
13 A router compares the destination network address to a routing table to select a path.
A True
B False
Chapter Review Questions 279
14 For a Cisco router, which of the following is used by the Cisco IOS to help
measure delay?
A Cost
B Bandwidth
C Hop
D Load
A Advanced configurations
B Routing protocols
C IP addresses
D Signals
A Routing tables
B LSA
C OSPF
D Metrics
A 6
B 10
C 15
D No hop-count limitation
18 Which of the following are benefits of IGRP when compared to RIP? (Choose two.)
B Fewer metrics
A It supports VLSM.
A WAN is a data communications network that covers a relatively broad geographic area
and uses transmission facilities provided by a service provider, or carrier, such as a
telephone or cable company. WAN connections connect a variety of users in different
locations together, as shown in Figure 8-1.
The connection technologies in WAN environments can be classified into three major
categories:
• Circuit switched—Using switched circuits, data connections are initiated when
needed and terminated when the transmission is completed. A regular telephone line
is an example of a circuit-switched connection.
• Packet switched—In a packet-switched environment, the carrier resources are shared
among many customers who connect to the carrier's network (often referred to as a
cloud). Packets of data are transmitted through the carrier's network from one
customer site to another.
• Point to point—This technology is sometimes called a leased line because the lines
are leased from a carrier (usually a telephone company) and are dedicated for use by
the company leasing the lines. Companies pay for a continuous connection between
two remote sites, and the line is active 24 hours a day, 7 days a week.
286 Chapter 8: Using WAN Technologies
San Jose
Headquarters
Denver
Branch Office
Mobile Worker
Circuit Switching
Switched circuits allow connections to be initiated when transmission is needed and
terminated when the transmission is completed. With circuit switching a logical circuit is
temporarily dedicated to the call. While it does not change while the call is in progress, the
carrier multiplexes other customers’ data onto the parts inside the cloud. Only the access
path is completely dedicated to a single customer. Figure 8-2 shows an example of circuit
switching using modems across the telephone company network for WAN connectivity.
Circuit switching operates much like a normal dialup telephone call and is used extensively
in telephone company networks. The Public Switched Telephone Network (PSTN) and
ISDN are examples of circuit-switched WAN connection technology.
WAN Technology Basics 287
Packet Switching
Packet switching is a switching method in which users share common carrier resources
for data transmission. Packet switching allows the carrier to make more efficient use of
its infrastructure, so the cost to the customer is generally lower than with point-to-point
leased lines.
Point to Point
A point-to-point (or serial) communication link provides a single, pre-established WAN
communications path from the customer premises through a carrier network, such as a
telephone company, to a remote network. Point-to-point lines are usually leased from a
carrier and are often called leased lines. For a point-to-point line, the carrier dedicates fixed
transport capacity and facility hardware to a customer's line. The carrier still uses multi¬
plexing technologies within the network. These circuits are generally priced based on
bandwidth required, as well as the distance between the two connected points. Point-to-
point links are generally more expensive than shared services such as Frame Relay. Figure
8-4 shows a leased line connection.
Service Provider’s
Network
288 Chapter 8: Using WAN Technologies
When leased line connections are made, a router interface is required for each connection.
If a serial interface is used, a channel service unit/data service unit (CSU/DSU) is also
required. The purpose of the CSU/DSU is to provide a clocked signal to the customer
equipment interface from the DSU and terminate the carrier’s channelized transport media
on the CSU. It also provides diagnostic functions such as loopback. Most T1 or El time-
division multiplexing (TDM) interfaces on current routers include approved CSU capabil¬
ities. Typically, the two devices are packaged as a single unit.
If you select a leased line connection, one of the decisions that needs to be made is how
much bandwidth is needed to support the network applications.
Bandwidth
Point-to-point connections can be purchased or leased in a variety of speeds, or bandwidths.
Bandwidth refers to the speed at which data is transferred over the communication link. It
is usually expressed as a DS number (DSO, DS1, and so forth), in North America, that
technically refers to the rate and format of the signal. The most fundamental line speed is
64 kbps (DSO), which is the bandwidth required for an uncompressed, digitized phone call.
Serial connection bandwidths can be incrementally increased to accommodate the need for
faster transmission, as shown in Figure 8-5.
1 DSO
Jt = 64 kbps
/ ^
24 DSOs DS1 orTI = 1.536 Mbps
As shown, 24 DSOs can be bundled to get a DS1 line (also called a T1 line) with a speed of
1.536 Mbps (1.544 Mbps after the addition of the line signaling). Then, 28 DSls (or 627
DSOs) can be bundled to get a DS3 (also called a T3 line) with a speed of 43.008 Mbps
(44.736 Mbps after the addition of the line signaling).
NOTE El (2.048 Mbps) and E3 (34.368 Mbps) are European and South American standards
similar to T1 and T3, but they possess different bandwidths and frame structures.
WAN Technology Basics 289
Multiplexing
Multiplexing is a process of sharing in which multiple data channels are combined into a
single data or physical channel for transmission. Multiplexing can be implemented at any
of the OSI layers. After the channels are combined at the source, at the receiving end of the
transmission the data is “demultiplexed” into its original, separate forms. This process
allows multiple transmissions to be handled by only one line, as shown in Figure 8-6.
The following are the primary types of multiplexing that operate at the physical layer:
In TDM, the physical layer attribute used for sharing is based on time.
->
Frequency
In FDM, the physical layer attribute used for sharing is based on frequency.
WAN Technology Basics Section Quiz 291
With wavelength-division multiplexing (WDM) and dense WDM (DWDM), the physical
layer attribute used for sharing is based on wavelength (inverse of frequency).
Packets, frames, and cells could all be considered a form of statistical multiplexing because
they allocate access to the link based on when a particular link needs to transmit.
Each form of WAN connectivity and the bandwidths offered provide a unique advantage
for connecting sites together. With a better understanding of the advantages and
disadvantages, you are able to more effectively choose a WAN service.
A ISDN
B Frame Relay
C PPP
D HDLC
C Operates much like a normal dialup telephone call and is used extensively in tele¬
phone company networks
B Point-to-multipoint
C Analog
D Digital
A 24
B 28
C 48
D 64
WAN Access Technologies 293
6 Which of the following is a type of physical-layer multiplexing? (Choose all that apply.)
A TDM
B FDM
C WDM
D Frame Relay
After you learn the basics about how WANs function overall, learning about how the
different kinds of WAN function provides you with a deeper understanding of the various
methods of transmitting data over WANs.
Several protocols are used in transmitting data over point-to-point or switched communi¬
cation links. Two of the most common are the Point-to-Point Protocol (PPP) and High-
Level Data Link Control (HDLC).
PPP
PPP was created to solve remote Internet connectivity problems. Additionally, PPP was
needed to support the dynamic assignment of IP addresses and to allow the use of multiple
routed protocols over a serial link. PPP provides router-to-router and host-to-network
connections over both synchronous and asynchronous circuits. An example of an
asynchronous connection is a dialup connection. An example of a synchronous connection
is a leased line.
PPP provides a standard method for encapsulating and transporting multiprotocol
datagrams over point-to-point links, as shown in Figure 8-10.
I- CSU,D8UH
PPP
The authentication phase of a PPP session is optional. After the link has been established
and the authentication protocol chosen, the peer can be authenticated. If it is used,
authentication takes place before the network layer protocol configuration phase begins.
The authentication options require that the calling side of the link enter authentication
information to help ensure that the user has the network administrator’s permission to make
the call. Peer routers exchange authentication messages.
HDLC
HDLC is a standard data link layer protocol. HDLC specifies an encapsulation method for
data on synchronous serial data links using frame character and checksum. HDLC supports
both point-to-point and multipoint configurations. Standard HDLC is compatible between
all vendors; however, some vendors, like Cisco, might have a variant of HDLC that is not
compatible with the standard form of the protocol.
Cisco has an implementation of HDLC that is proprietary and is the default encapsulation
for serial lines. This implementation is very streamlined; it has no windowing or flow
control, and only point-to-point connections are allowed. The Cisco HDLC implementation
includes proprietary extensions in the data field, as shown in Figure 8-12.
WAN Access Technologies 295
<->
HDLC
HDLC
Cisco HDLC
Address Control Proprietary t FCS Flag
Cisco HDLC does not communicate with other HDLC implementations. HDLC
encapsulations vary, however, so PPP should be used when interoperability with other
vendors is required.
ISDN
ISDN is a circuit-switched connection technology. It is an efficient alternative to dialup for
connecting over basic telephone service.
Figure 8-13
296 Chapter 8: Using WAN Technologies
ISDN was developed to permit faster access over existing telephone systems without the
additional call setup time. Because ISDN uses existing phone lines, it requires that the
central office (CO) be within a certain distance, which limits service availability.
ISDN offers two types of services: Basic Rate Interface (BRI) and Primary Rate Interface
(PRI). The ISDN BRI service, intended for the home and small enterprise, provides two B
channels (128 kbps) and one D channel (16 kbps). The BRI B channels carry user data,
while the BRI D channel carries control and signaling information.
The ISDN PRI service, intended for larger installations, delivers 23 B channels and one D
channel in North America for a total bit rate of up to 1.544 Mbps (Tl). In Europe, Australia,
and other parts of the world, ISDN PRI provides 30 B channels and one D channel, for a
total bit rate of up to 2.048 Mbps (El). Figure 8-14 shows the bandwidth available for the
different ISDN services.
2B A 64 kbps
. ) 64 kbps
BRI 144 kbps
D J— .> 16 kbps
DSL
DSL technology is a circuit-switched connection technology that uses existing technology
lines to transport high-bandwidth data, such as multimedia and video, to service sub¬
scribers. DSL uses existing phone lines, so it requires CO access equipment (digital
subscriber line access multiplexer [DSLAM]) to connect the DSL line to the network and
has distance restrictions that might limit service availability. Figure 8-15 shows a typical
DSL connection scenario.
End User
DSL
DSL provides a full-time connection. As soon as users turn on their computers connected
to the DSL modem, they are connected. This setup removes the time and effort of dialing
in to establish a connection.
The two primary types of DSL technologies are asymmetric (ADSL) and symmetric. All
forms of DSL service are categorized as one or the other, and numerous varieties of each
type exist. The term xDSL sometimes refers generically to any of the various forms of DSL.
Figure 8-16 shows the relationship of the different DSL components and services.
Down Up Down Up
Downstream information, such as requested web pages, comes from the internetwork to the
user (from the CO to the subscriber). Upstream information is sent from the user to the
internetwork (from the subscriber to the CO). Asymmetric types of DSL generally use
analog transmission encoding (modulation) technology, while symmetiic forms generally
use digital transmission encoding techniques.
A number of standards are associated with DSL. Table 8-1 lists each DSL technology and the
relevant standards organizations and standard numbers associated with those technologies.
298 Chapter 8: Using WAN Technologies
Modulation/
Encoding Distance
DSL Types Standards Technique Speed Limit
Full-Rate ANSI DMT or CAP Downstream speeds 18,000 feet
ADSL/ T1.413 of 384 kbps to 1
G.DMT issue 2 Mbps; upstream
slower up to 1.024
Mbps
Very High ETSI and DMT/QAM 12.96 Mbps to 52.8 4500 feet
Data Rate ANSI in process Mbps for both
DSL(VDSL) upstream and
downstream
ISDN DSL ETSI ETR 080 2B1Q 144 kbps for both 18,000 feet
(IDSL) upstream and
downstream
Not all the DSL technologies listed have a standard associated with them. Also listed is
the modulation or encoding standard(s) used by the DSL modems to place digital data
bits onto the wire. The most important standards listed in the table are asymmetric DSL
standards G.992.1 (G.DMT) and G.992.2 (G.Lite), as well as symmetric standard
G.991.2 (G.SHDSL). All vendors who are currently building DSL support these
international standards.
DSL service can be added incrementally in any area. That means that the service provider
can literally start up with a handful of clients and upgrade the bandwidth to coincide with
the growth in numbers of subscribers. DSL is also backward compatible with analog voice
and makes good use of the existing local loop. This means that little needs to be done to use
the DSL service simultaneously with normal phone service.
• Most DSL service offerings currently require the customer to be within 18,000 feet of
the provider’s CO location.
• The older, longer loops present problems with line noise.
• Upstream (upload) speed is usually considerably slower than the downstream
(download) speed.
Frame Relay
Frame Relay is a frame-switching connection technology and is implemented using virtual
circuits. Several devices and components are involved in providing Frame Relay services.
DTE
300 Chapter 8: Using WAN Technologies
Frame Relay operates over virtual circuits, which are logical connections created to enable
communication between two remote devices across a network. Virtual circuits provide a
bidirectional communications path from one DTE device to another. A data-link connection
identifier (DLCI) within the Frame Relay address header uniquely identifies a virtual
circuit. The DLCI is specific only to the router or Frame Relay switch where it is
configured. A virtual circuit can pass through any number of intermediate DCE devices
located within the network. Numerous virtual circuits can be multiplexed into a single
physical circuit for access to and transmission across the network.
To illustrate how Frame Relay works. Figure 8-18 shows a hub-and-spoke topology used to
connect a headquarters router to three remote routers.
New York
Even though the San Jose Headquarters router has only one physical connection to the
service provider, that physical connection is logically divided into three separate
connections (virtual circuits), each virtual circuit connecting to a different remote router.
The physical connection at the remote routers contains only one virtual circuit because the
remote routers need to connect to the router only at the San Jose Headquarters.
Frame Relay works at Layer 2 of the OSI reference model. An identifier, or DLCI, within
the Frame Relay header indicates which virtual circuit a frame belongs to. The Frame Relay
service provider also makes its switching decision based on the DLCI. In Figure 8-18, the
Frame Relay connection at San Jose Headquarters is provisioned with three virtual circuits.
The San Jose Headquarters router uses DLCI 102 in the Frame Relay header for sending
data to the Los Angeles router, DLCI 101 for the New York router, and DLCI 100 for the
Chicago router.
WAN Access Technologies 301
In the ATM cell header is a field called the virtual path/channel identifier (VPI/VCI) that
indicates which virtual circuit an ATM cell belongs to. At the physical layer, ATM can run
over a variety of physical media, including fiber optics using SONET framing and coaxial
cable using digital signal level 3 (DS3).
ATM cells are always a fixed length of 53 bytes, whereas the sizes of frames and packets vary.
The 53-byte ATM cell is made up of a 5-byte ATM header followed by 48 bytes of ATM
payload (user data). Small, fixed-length, 53-byte cells are well suited for carrying data, voice,
and video traffic because voice and video traffic are intolerant of delay that can result from
having to wait for a larger data packet to be transmitted ahead of a voice or video packet.
An ATM switch is responsible for cell transit through an ATM network. It accepts the
incoming cell from an ATM endpoint or another ATM switch. It then reads and updates
the cell header information and quickly switches the cell to an output interface toward
its destination.
302 Chapter 8: Using WAN Technologies
An ATM virtual circuit is a logical connection created between two ATM endpoints across
an ATM network. ATM virtual circuits fall into two categories:
A virtual circuit can pass through any number of intermediate ATM switches in the ATM
network. Numerous virtual circuits can be multiplexed into a single physical circuit for
transmission across the network.
SONET
SONET is a physical layer protocol that provides for high-speed transmission using
fiber-optic media. For example, ATM can run over SONET to achieve very high data
transfer rates.
The term Synchronous Digital Hierarchy (SDH) refers to the optical technology outside the
United States. The SONET signal rate is measured by optical carrier (OC) standards. Table
8-2 outlines the OC levels and their signal transmission rates.
TIP Each OC value is a multiple of the base rate. For example, an 0C-3 is 3 times the base rate
of 51.84. 3 x 51.84 = 155.52. So, all you have to know is that an OC-1 is 51.84 Mbps and
then multiply by the OC value to obtain the bandwidth.
OC-192 10 Gbps
OC-768 40 Gbps
WAN Access Technologies Section Quiz 303
When you provide WAN service, it is important to understand how the technologies and
encapsulations interconnect the sites. Being able to understand the issues associated with
each technology enables you to choose, implement, and troubleshoot the various
technologies more effectively.
1 Which protocol does PPP use for establishing and maintaining point-to-
point connections?
A HDLC
B LCP
C LAPD
D Cisco IETF
2 Which is the default encapsulation type for serial interfaces on a Cisco router?
A PPP
B HDLC
C Frame Relay
D X.25
D Wireless transmission
304 Chapter 8: Using WAN Technologies
6 Which of the following standards organizations and industries have contributed to the
evolution of DSL? (Choose all that apply.)
A ANSI
B ITU-T
C IEEE
D IETF
E ETSI
8 How does Frame Relay handle multiple conversations on the same physical
connection?
D ATM cells are always a fixed length of 35 bytes, whereas the sizes of frames and
packets vary.
10 Name the family of very high-speed physical layer technologies that offers a series of
data rates with special designations implemented at different transmission rates
ranging from 51.84 Mbps to 40 Gbps.
A ADSL
B ATM
C SONET
D ISDN
Modems
To establish a WAN connection over phone lines, you must use a modem to convert digital
data from a computer to analog form to travel over phone lines. Although analog modems
have long been the most commonly used type of modems, cable modems have become
increasingly popular as WAN users connect through cable service providers.
After you know how WANs operate and how data is transmitted over their connections,
learning about the devices that enable those connections adds to your understanding of
WAN operations.
Analog Modems
An analog modem is a device used to transmit electronic data through telephone lines.
The term modem is derived from the function of these devices, converting (or
modulating) digital signals to analog signals at the transmission source and reconverting
the signals (demodulating) at the termination point. Figure 8-20 shows the operation of
an analog modem.
306 Chapter 8: Using WAN Technologies
Modem Modem
EIA/TIA-232 EIA/TIA-232
Host
Modems can be either internal or external to the communicating devices. External modems
are typically connected to the device using an EIA/TIA 232 serial line (COM port) or the
Universal Serial Bus (USB). The modem then connects to the telephony network. Internal
modems allow a communicating device to be connected directly to the telephony network.
An internal modem can be built into the system or added with an internal expansion card
or Personal Computer Memory Card International Association (PCMCIA) device.
Modems work at OSI Layer 1. At the data link layer, PPP is often used. V.22bis was the first
true international standard, but is now obsolete. Starting before 1998, most new modems
have supported 56 kbps rates downstream. This was standardized by V.90. The maximum
upstream rate was increased to 48 kbps in ITU-T recommendation V.92.
Cable Modems
If a WAN is connected through a cable service provider, the connection is to a cable system.
A different type of modem, a cable modem, is required for this connection. Cable modems
enable two-way, high-speed data transmissions using the same coaxial lines that transmit
cable television.
Some cable service providers are promising data speeds up to 6.5 times that of T1 leased
lines. This speed makes cable an attractive medium for transferring large amounts of digital
information quickly, including video clips, audio files, and large chunks of data.
Information that would take 2 minutes to download using ISDN BRI can be downloaded in
2 seconds through a cable modem connection.
Cable modem access provides speeds superior to leased lines with lower costs and simpler
installation. When the cable infrastructure is in place, a company can connect through
installation of a modem or router. Additionally, because cable modems do not use the
telephone system infrastructure, you incur no local-loop charges.
Modems 307
Cable modems provide a full-time connection. As soon as users turn on their computers,
they are connected to the Internet. This setup removes the time and effort of dialing in to
establish a connection.
►-■
Coax
Coaxial
Cable
Otto
Legend
Pad
Amplifier
Splitter
Tap
NOTE QAM is a method for encoding digital data in an analog signal in which each combination
of phase and amplitude represents one of many digital bit patterns.
308 Chapter 8: Using WAN Technologies
With a cable modem, a subscriber can continue to receive cable television service while
simultaneously receiving data to be delivered to a personal computer. This is accomplished
with the help of a simple one-to-two splitter, as shown in Figure 8-22.
One-to-Two
Splitter
The advantage of using the high-speed access of cable modems is that coaxial cable wiring
offers greater bandwidth using broadband for more applications to the home network LAN.
Additionally, cable lines are already in place in most of the country because of the wide
deployment of cable television in the last few decades. Therefore, cable modem high-speed
Internet access is more readily available in most areas than DSL.
Modems provide a necessary connection between the service provider network and the
local user network. Understanding where these components are placed in the network and
how they function is an important part of a network administrator’s job function.
Modems Section Quiz 309
A V.32
B V.34
C V.42
D V.90
3 Which of the following media are used by a cable modem to transport data?
D Existing TV antennas
B Because cable modems exist in a shared-media structure, the more users who
come on the network, the more bandwidth is available for each user.
C Coaxial cable wiring offers greater bandwidth using broadband for more applica¬
tions to the home network.
D Cable modems allow you to display data onto your cable connected television.
Chapter Summary
After completing this chapter, you should have a basic understanding of the major types of
WAN services available for use in connecting remote networks. You should be able to
compare and contrast dedicated, circuit-switched, and cell-switched services and the
protocols and standards used by each service. Finally, you should have an understanding of
how modems connect devices to provider services.
B False
2 Which of the following are true about a point-to-point link? (Choose three.)
B It is usually leased from a carrier and thus is often called a leased line.
C It is generally priced based on bandwidth required and distance between the two
connected points.
D The cost of leased line solutions is not significant when they connect many sites.
3 Which of the following statements are true about bandwidth? (Choose three.)
A TDM
B ATM
C STM
D FDM
5 Which of the following is not true regarding permanent virtual circuits (PVCs)?
B Data communication across a PVC requires call setup and termination states.
C In PVCs, the DTE devices can begin transferring data whenever they are ready.
A 48 bytes
B 53 bytes
C 32 bytes
D 64 bytes
A 16 kbps
B 64 kbps
C 128 kbps
D 144 kbps
312 Chapter 8: Using WAN Technologies
8 Which of the following is data-link encapsulation for a WAN? (Choose all that apply)
B FDDI
E Frame Relay
C G .SHDSL
D ADSL
E SDSL
A PPP
B Ethernet
C ATM
D IP
A True
B False
12 Which was the first true worldwide standard for modems that allowed 2400 bits per
second (bps) at 600 baud?
A V.12
B V.42
C V.32
D V.90
E V.22bis
Chapter Review Questions 313
>
13 Which of the following statements about cable modems are true? (Choose three.)
A Cable modems use the same coaxial lines that transmit cable television.
B Cable modem access provides speeds that are superior to leased lines.
• Describe and use the command modes to interact with the Cisco IOS Software
• Use the online help facilities associated with the command-line interface to modify
the configuration of a device
• Use the Cisco switch and router show commands to determine fundamental
operational characteristics of the switch
Chapter
9
Operating and Configuring
Cisco IOS Devices
Cisco IOS is software that operates on most Cisco network devices. Cisco IOS Software is
internetwork system software that provides the features and processes necessary to
interconnect networked systems.
In this chapter, you learn the process of starting and configuring a Cisco IOS switch and
router. You also learn to perform tasks using the Cisco IOS Software user interfaces. To
install Cisco devices in your network, you need to understand the startup of the Cisco
switch and router and describe and recognize a normal boot sequence. It is also important
to provide an initial configuration for the switch and apply a basic initial configuration to
the router using the setup facility.
After you establish an initial setup, you need to describe and use the command modes to
interact with the Cisco IOS Software. You learn to use the online help facilities associated
with the command-line interface (CLI) to modify the configuration of a device. Finally, you
need to use the Cisco switch and router show commands to determine fundamental
operational characteristics of the switch.
The following sections discuss the initial startup of a new router and the application and/or
modes used to configure the device for operation.
The setup dialog allows you to configure the device with the following information:
• Protocol addressing and parameter settings, such as configuring the IP address and
subnet mask on an interface
• Options for administration and management and passwords for remote access and
control of the device modes
• Network policy of the functions required, such as enabling the required routing
protocol to support the network requirements
In this chapter, you set up a minimal device configuration for routers and switches. You also
learn how to make changes to these minimal or default configurations to meet your
particular network requirements. These tasks constitute much of the work required of a
network administrator.
When a Catalyst switch or Cisco router starts up, three main operations are performed on
the networking device, as follows:
1 The device performs hardware checking routines. A term often used to describe this
initial set of routines is Power-On Self-Test (POST).
2 After the hardware has been shown to be in good working order, the device performs
system startup routines. These initiate the switch or router operating software load.
3 After the operating system is loaded, the device tries to find and apply software
configuration settings that establish the details needed for network operation.
Configuration Sources
After the device has booted, you must initially configure a switch or router from the console
port. After the initial configuration is completed, you can access a router from a remote
location without a router being connected to a network by dialing directly to a modem
attached to the console or auxiliary port on a device. In general, the console port is
recommended because it displays router startup messages, whereas the auxiliary port does
not provide this information and does not exist on most Catalyst switches. You can
configure a switch and a router from the following locations:
Basic Operation of the Cisco IOS Software 317
NOTE Not all network devices have all the ports options discussed. For example, most Cisco IOS
switches and some Cisco small-office and home-office routers do not have an auxiliary port.
318 Chapter 9: Operating and Configuring Cisco IOS Devices
When you access the IOS device, the software that runs on the console or a remote terminal
provides an interface known as the EXEC process. The EXEC process interprets the
commands you enter and carries out the corresponding operations.
To enter commands into the CLI, you type or paste your entries within one of the several
console command modes. The Enter key instructs the device to parse and execute
(interpret) the command. Each command mode is indicated with a distinctive prompt.
Cisco IOS Software uses a hierarchy of commands in its command-mode structure. Each
command mode supports specific Cisco IOS commands related to a type of operation on
the device.
For security purposes, the EXEC has the following two levels of access to commands:
• User mode—Typical tasks include those that check the device status.
• Privileged mode—Typical tasks include those that change the device configuration.
To connect to a Cisco IOS device, attach to the console and press the Enter key. If the device
is configured for login options, you must log in to the device with a username and password
or just a password depending on the configuration. This brings the device to a user EXEC
mode prompt.
By default, a prompt appears to signify the user EXEC mode. The greater than symbol (>)
in the prompt indicates that the router or switch is at the user EXEC level:
hostname>
Type exit or quit to close the session from the user EXEC mode.
In user EXEC mode, you are able to issue commands that allow you to interact with the
device. EXEC commands available in user mode are a subset of the EXEC commands
available in privileged mode. For the most part, these commands allow you to display
information without changing device configuration settings.
To access the full set of commands, you must first enable privileged mode; by default, your
EXEC prompt shows as a pound sign (#) while you are in this mode. From the privileged
level, you can also access global configuration mode and the other specific configuration
modes including interface, subinterface, line, router, route-map, and several others. Use the
disable command to return to user EXEC mode from privileged EXEC mode, as demon¬
strated in Example 9-1.
Basic Operation of the Cisco IOS Software 319
wg_ro_c>
wg_ro_c>enable
wg_ro_c#
wg_ro_c#disable
wg_ro_c>
wg_ro_c>l°gout
Typing a question mark (?) at the user EXEC mode prompt or the privileged EXEC mode
prompt displays a handy list of commonly used commands, as shown in Example 9-2.
wg_r°_c>?
Exec commands:
access-enable Create a temporary Access-List entry
atmsig Execute Atm Signalling Commands
cd Change current device
clear Reset functions
connect Open a terminal connection
dir List files on given device
disable Turn off privileged commands
disconnect Disconnect an existing network connection
enable Turn on privileged commands
exit Exit from the EXEC
help Description of the interactive help system
lat Open a lat connection
lock Lock the terminal
login Log in as a particular user
logout Exit from the EXEC
-- More --
Notice the - More - at the bottom of Example 9-2. It indicates that multiple screens are
available as output and that more commands follow. Whenever the More prompt appears,
you can proceed as follows:
NOTE Screen output displayed varies with Cisco IOS Software level and device configuration.
320 Chapter 9: Operating and Configuring Cisco IOS Devices
Type enable to enter privileged mode. If the device is so configured, you might be prompted
for a password.
Typing a question mark (?) at the user prompt or the privileged prompt displays a much
longer list of EXEC commands, as illustrated in Example 9-3.
Example 9-3 Getting Help with Privileged EXEC Mode Commands
wg_r°_c#?
Exec commands:
access-enable Create a temporary Access-List entry
access-profile Apply user-profile to interface
access -template Create a temporary Access-List entry
bfe For manual emergency modes setting
cd Change current directory
clear Reset functions
clock Manage the system clock
configure Enter configuration mode
connect Open a terminal connection
copy Copy from one file to another
debug Debugging functions (see also 'undebug')
delete Delete a file
dir List files on a filesystem
disable Turn off privileged commands
disconnect Disconnect an existing network connection
enable Turn on privileged commands
erase Erase a filesystem
exit Exit from the EXEC
help Description of the interactive help system
-- More --
To return to the user EXEC level, enter disable at the hostname# prompt. To exit the EXEC
process, use the command quit or exit.
Screen output varies with Cisco IOS Software level and device configuration.
TIP You can abbreviate commands in the Cisco IOS by entering enough of the command to be
unique. For example, instead of typing the command show interface, you could type sh int.
Table 9-1 lists some of the error messages you might encounter while using the CLI on the
Cisco IOS device.
Error
Message Meaning How to Get Help
% Ambiguous You did not enter enough Reenter the command followed by a question
command: characters for your switch mark (?) with no space between the command
“show con” to recognize the and the question mark.
command. The possible keywords that you can enter with
the command are displayed.
% Incomplete You did not enter all the Reenter the command followed by a question
command keywords or values mark (?) with a space between the command
required by this and the question mark.
command.
% Invalid You entered the command Enter a question mark (?) to display all the
input detected incorrectly. The caret (A) commands that are available in this command
at ‘A ’ marker marks the point of the mode.
error.
322 Chapter 9: Operating and Configuring Cisco IOS Devices
This feature is particularly useful for recalling long or complex commands or entries. With
the command history feature, you can complete the following tasks:
By default, command history is enabled, and the system records 10 command lines in its
history buffer. To change the number of command lines, the system records during the
current terminal session, use the terminal history size or history size command. The
maximum number of commands is 256.
Although you can store the last 256 commands you entered, it is unwise to do so. These
commands waste valuable memory resources and are flushed at the end of each executive
session.
To recall commands in the history buffer beginning with the most recent command, press
Ctrl-p or the up-arrow key (on some terminal settings). Repeat the key sequence to recall
successively older commands.
To return to more recent commands in the history buffer after recalling commands, use
Ctrl-n or the down-arrow key. Repeat the key sequence to recall successively more
recent commands.
Router> terminal history size lines Sets session command buffer size
Basic Operation of the Cisco IOS Software 323
You can use context-sensitive help to give you the command by typing just the first part, cl
and a ? without a space (in other words, cl?). The device then return the commands that
start with the letters cl.
If you now type the correct command, clock, and press Return, the device gives you
another error, % Incomplete command, meaning that you need to give the device more
information. If you do not know what this information is, type a space and a ? after the
command (for example, clock ?). Help tells you that you need the keyword set.
After entering the set command, you can see that the device requires more information,
such as the time in hh:mm:ss format. You can use the ? character as an argument after any
command string to see what options or requirements the device has for this string.
Example 9-4 documents the process of finding the correct clock command, as described in
the preceding paragraphs.
Example 9-4 Using Cisco IOS CLI Help to Resolve Command Problems
Router# clok
Translating "CLOK"
% Unknown command or computer name, or unable to find computer address
Router# cl?
clear clock
Router# clock
% Incomplete command.
Router# clock ?
set set the time and date
You can use last-command recall to retrieve the portion of the command you typed
previously, so that you won’t have to retype the command. Last-command recall occurs
when you press Ctrl-p or use the up arrow (if supported by the terminal emulation
program). This automatically repeats the previous command entry. Example 9-4 shows
that after last-command recall, the administrator adds a space and a ? to reveal the
additional arguments.
324 Chapter 9: Operating and Configuring Cisco IOS Devices
Example 9-5 illustrates the command structure needed for setting the clock, continued from
Example 9-4.
Example 9-5 Setting the Router Clock
Command prompting works as follows: When you see the Cisco IOS Software prompter
indicating that the command entered is incomplete, enter the year using the correct syntax
and press the Return key to execute the command.
Syntax checking uses the caret symbol (A) as an error location indicator. The caret symbol
character appears at the point in the command string where you have entered an incorrect
command, keyword, or argument. The error location indicator and interactive help system
allow you to find and correct syntax errors easily.
The editing command set provides a horizontal scrolling feature for commands that extend
beyond a single line on the screen. When the cursor reaches the right margin—69
characters by default-the command line shifts 10 spaces to the left. You cannot see the first
10 characters of the line, but you can scroll back and check the syntax at the beginning of
the command.
This command entry extends beyond one line. The dollar sign ($) indicates that the line has
been scrolled to the left. Each time the cursor reaches the end of the line, the line is again
shifted 10 spaces to the left. To scroll back, press Ctrl-b or the left-arrow key repeatedly
until you are at the beginning of the command entry, or press Ctrl-a to return directly to the
beginning of the line.
The key sequences listed in Table 9-3 are shortcuts or hot keys provided by the CLI to
navigate the command line. The Ctrl and Esc key sequences are based on the key sequences
used by the Emacs editor in the UNIX operating system. Use these features to move the
cursor around on the command line for corrections and changes.
Command-Line
Editing Key
Sequence Description
Ctrl-r Refreshes the command line and everything typed up to this point.
After you understand how to use Cisco IOS and navigate the different modes, you are able
to provide administration and configuration for the Cisco IOS devices and switches.
326 Chapter 9: Operating and Configuring Cisco IOS Devices
From the privileged EXEC mode, you can enter global configuration mode with the
configure terminal command. From the global configuration mode, you have access to the
specific configuration modes, which include but are not limited to the following:
When you are in a subconfiguration mode, if you enter exit, the router backs out one level,
eventually allowing you to log out. In general, enter exit from one of the specific
configuration modes to return to global configuration mode. Press Ctrl-Z or enter the
command end to leave configuration mode completely and return the router to the
privileged EXEC mode.
If syntax errors occur, the command is executed and stored in the running configuration
and is effective immediately.
Commands that affect the entire router are called global commands. The hostname and
enable password commands are examples of global commands.
Commands that point to or indicate a process or interface that is to be configured are called
major commands. When entered, major commands cause the CLI to enter a specific
configuration mode. Major commands have no effect unless you immediately enter a
subcommand that supplies the configuration entry. For example, the major command
interface serial 0 has no effect unless it is followed by a subcommand that tells what you
want to do to that interface.
Understanding how to access and use the different user and configuration modes of the
Cisco IOS device is critical in being able to operate and administer the device.
Basic Operation of the Cisco IOS Software Section Quiz 327
1 When you configure Catalyst switches from the user interface that runs on the console
or a remote terminal, the Cisco IOS software provides a CLI called the_.
A EXEC
B LOGIN
C ENABLE
D CONSOLE
D Interprets the commands you enter and carries out the corresponding operations
3 What should you type to display a list of commands that begin with the letter a on a
Catalyst switch?
A a?
B a?
C help a
D help a*
4 What should you type to display the command syntax help so that you can see how to
complete a command that begins with show?
A show?
B show ?
C help show
D help show*
328 Chapter 9: Operating and Configuring Cisco IOS Devices
5 Which Cisco IOS command takes you from the Router> prompt to the Router#
prompt on a Cisco router?
A user
B config
C enable
D privilege
6 When the information displayed on a Cisco router is more than one page in length,
what should you do to display the next page?
A Type more.
B You did not enter all of the keywords or values required by the command.
C You are running the Cisco IOS Software from Flash memory, not from RAM.
D You did not enter enough characters for the router to recognize the command.
A Enter help and follow the instructions that appear on your screen.
B Enter a question mark (?) to display all of the commands or parameters that are
available in this mode.
C Reenter the command followed by a question mark (?) with no space between the
command and the question mark.
D Reenter the command followed by a question mark (?) with a space between the
command and the question mark.
Basic Operation of the Cisco IOS Software Section Quiz 329
9 What does the Cisco IOS CLI do when you enter a command that is longer than
allowed on a single line?
A The router truncates the command because commands longer than one line are
not allowed.
B The router automatically scrolls the line to the left and uses a dollar sign ($) to
indicate that the beginning of the line is elsewhere.
C The router automatically moves the cursor to the next line and uses a caret (A)
symbol to indicate that the beginning of the line is elsewhere.
D The router automatically shortens the command to the smallest number of char¬
acters that still make the character string unique yet allow it to fit on one line.
10 What happens when you press the Tab key when working in the CLI?
11 Which tasks can you complete using the Cisco IOS command history feature?
(Choose three.)
A Recall commands
12 Which of the following recall commands displays what is in history buffer beginning
with the most recent command? (Choose two.)
A Ctrl-N
B Ctrl-P
C Up arrow
D show history
E Down arrow
330 Chapter 9: Operating and Configuring Cisco IOS Devices
13 What happens when you start a Cisco IOS device that has no configuration
in memory?
D The device uses a dialog called enable to prompt for the configuration.
18 How do you know which command mode you are using on a Cisco device?
D You see an error message if you are operating in the wrong command mode.
19 Which Cisco IOS command lists the commands that are available in the privileged
EXEC mode?
A ?
B dir
C list
D help
20 Which EXEC mode allows you to configure and debug a Cisco router?
A User
B Enable
C Normal
D Privileged
332 Chapter 9: Operating and Configuring Cisco IOS Devices
Recognizing the correct device startup is the first step in deploying an IOS device. The
device must start successfully and have a default configuration to operate on the network.
Step 2 Attach the power cable plug to the switch power supply socket.
The switch starts. Some Catalyst switches, including the Catalyst 2950,
have no on/off switch on some.
This book focuses on the Catalyst 2950 series switches only. Switch information and
configuration commands presented are specific to the Catalyst. Although most of the
commands are platform independent, commands on your switch might differ somewhat.
Hardware-specific items such as POST apply only to the Catalyst 2950.
The Catalyst 2950 series switches have several status LEDs that are generally lit in green
when the switch is functioning normally but turn amber when a malfunction occurs.
The LED locations on the Catalyst 2950-12 and 2950-24 are shown Figure 9-1.
Redundant Power
Supply LED
Redundant power supply Off: Redundant power supply is off or is not installed.
LED Green: Redundant power supply is operational.
Catalyst switch port LEDs have several modes of operation. The initial startup routines use
LEDs to display POST status.
334 Chapter 9: Operating and Configuring Cisco IOS Devices
If the switch is up and running, press the Mode button, as shown in the figure, to toggle
through other LED display modes. The three modes indicate the following:
• Port status
• Bandwidth utilization for the switch
• Full-duplex support
• Port Speed
The port LED display modes are indicated in Table 9-5, with information about the various
LED colors or lighting.
Alternating green and amber: Link fault. Error frames can affect
connectivity. Excessive collisions and cyclic redundancy check (CRC),
alignment, and jabber errors are monitored for a link-fault indication.
Amber: Port not forwarding because the port was disabled by
management, suspended because of an address violation, or suspended
by Spanning Tree Protocol (STP) because of network loops.
Bandwidth utilization Green: Current bandwidth utilization displayed over the amber LED
(UTL LED on) background on a logarithmic scale.
• If the LED for GBIC module slot 2 is off, the switch is using more
than 25 but less than 50 percent of the total bandwidth. If LEDs for
both GBIC module slots are off, the switch is using less than 25
percent of the total bandwidth, and so on.
Full duplex (FDUP LED on) Green: Ports configured in full-duplex mode.
Speed (Speed LED on) Green: Port speed set to 100 Mbps or operational at 10 Mbps.
The Catalyst POST is executed when the switch is powered up. The POST uses the switch
port LEDs to indicate test progress and status.
Initially, all port LEDs are green. This condition indicates the start of the POST and that the
LEDs are functioning properly. Each of the first 16 port LEDs (lx through 16x) is
associated with one of the POST tests, as described in Table 9-6.
LED 16x Embedded control unit (ECU) dynamic random-access memory (DRAM):
Fatal.
continues
336 Chapter 9: Operating and Configuring Cisco IOS Devices
LED 5x Real-time clock: Nonfatal. If this test fails, the switch forwards packets.
However, if the switch unexpectedly shuts down, it cannot restart itself
automatically.
LED 4x Console port: Nonfatal. If this test fails, you cannot access the management
console through the console port. You can still use Telnet to access the
management console.
LED 2x Bumed-in address: Nonfatal. If this test fails, the switch uses the default
Ethernet address of the switch and begins forwarding packets.
LED lx Port loopback: Nonfatal. If this test fails, some functionality to one or more
ports is lost. The switch disables any ports that failed this test, and the failure
message on the Menu Console Logon screen indicates which ports did not
pass this test. Connect only to ports that passed this test.
After each POST test, the LED for that test indicates the test results in the following manner:
• If the test completes without failure, the LED for that test turns off.
• If the test turns up a failure, the LED for that test turns amber and the system LED
also turns amber.
On successful POST completion, the port LEDs blink and then turn off.
If fatal failures occur, as indicated in Table 9-6, the switch is not operational. The switch is
still operational with nonfatal failures, but might have limited functionality.
During initial startup, if POST test failures are detected, they are reported to the console.
If POST completes successfully, you can configure the switch.
If POST completes successfully on a Catalyst 2950 switch, you are prompted to enter the
initial configuration for the switch. You can use an automatic setup program to assign
switch IP information, host and cluster names, and passwords, and to create a default
configuration for continued operation. Later, you can use CLI to customize your config¬
uration. To run the setup program, access the switch from the PC terminal that you
connected to the console port.
Booting a Cisco IOS Device 337
At any point you may enter a question mark '?' for help.
Use ctrl-c to abort configuration dialog at any prompt.
Default settings are in square brackets '[ ]'.
Continue with configuration dialog? [yes/no]: yes
Enter IP address: 172.16.1.101
Enter IP netmask: 255.255.255.0
Would you like to enter a default gateway address? [yes]: yes
IP address of the default gateway: 172.16.1.1
Enter a host name: SwitchA
Enter enable secret: secret_password
Would you like to configure a Telnet password? [yes] yes
Enter Telnet password: cisco
Would you like to enable as a cluster command switch? no
After you enter the required settings, the setup program displays the configuration for you
to confirm, as shown in Example 9-7.
Example 9-7 Setup Output
The following configuration command script was created:
ip subnet-zero
interface VLAN1
ip address 172.16.1.101 255.255.255.0
ip default-gateway 172.16.1.1
hostname host_name
enable secret 5 $1$M3pS$cXtAlkyR3/6Cn8/
line vty 0 15
password cisco
snmp community private rw
snmp community public ro
cluster enable cls_name
End
Use this configuration? [yes/no]: y_
Enter y to load this script and complete the initial configuration using setup.
Recognizing the correct router startup is the first step in deploying a Cisco router. The
router must start successfully and have a valid configuration to operate on the network.
The startup of a Cisco router requires that you verify the physical installation, power up the
router, and view the Cisco IOS software output on the console. To start router operations,
the router completes the following tasks:
When a Cisco router powers up, it performs a POST. During the POST, the router executes
diagnostics to verify the basic operation of the CPU, memory, and interface circuitry.
After verifying the hardware functions, the router proceeds with software initialization,
where it finds and loads the IOS image, and then finds and loads the configuration file, if
one exists.
The initial startup of a Cisco router requires that you complete the following steps:
Step 3 Observe the boot sequence and the Cisco IOS Software output on
the console.
When the router starts up, it looks for a device configuration file. If it does not find one, the
router executes a question-driven initial configuration routine, called setup.
After a router completes the POST and loads a Cisco IOS image, it looks for a device
configuration file in its nonvolatile RAM (NVRAM). The router’s NVRAM is a type of
memory that retains its contents even when power is turned off. If the router has a
configuration file in NVRAM, the user-mode prompt (hostname>) appears.
Setup is not intended as the mode for entering complex protocol features in the router. You
use setup to create a minimal configuration. Instead of setup, network administrators use
various configuration-mode commands for most router configuration tasks.
Many of the prompts in the dialog of the setup command facility have default answers
in square brackets ([ ]) following the question. Pressing the Enter key enables you to
use the defaults.
When the setup dialog begins, you can choose not to continue with the system configuration
by entering No at the prompt. To begin the initial configuration process, enter Yes.
You can press Ctrl-c to terminate the process at any time. Ctrl-c returns you to the user
EXEC prompt (Router>) without making any configuration changes. If you want to start
the dialog again, type the setup command at the privileged EXEC prompt (Router#setup).
Normally, you answer no to the basic management setup question illustrated in Example
9-8 so that you can enter extended setup and be able to configure the system interfaces.
Example 9-8 System Configuration Dialog
Router#setup
At any point you may enter a question mark '?' for help.
Use ctrl-c to abort configuration dialog at any prompt.
Default settings are in square brackets
During setup, you are prompted for global parameters at the console. You use the
configuration values you have determined for your router to enter the global
parameters at the prompts. Example 9-9 shows the screen that prompts you for the
initial global parameters.
340 Chapter 9: Operating and Configuring Cisco IOS Devices
The first global parameter allows you to set the router host name. This host name precedes
the Cisco IOS prompt in all configuration modes. The factory default router name is shown
between the square brackets as [Router].
In the dialog box, the questions that immediately follow the system name are global
parameters that set the various passwords used on the router.
You must enter an enable secret password. When you enter a string of password characters
at the Enter enable secret prompt, the characters are processed by an MD5-based
encryption algorithm, which can enhance the security of the password string. Whenever
anyone lists the contents of the router configuration file, this enable secret password
appears as a meaningless string of characters. Next, the enable password is entered into the
configuration in plain text. The differences in these passwords are discussed in the section
“Configuring a Router from the Command Line.”
TIP Setup recommends, but does not require, that the enable password be different from the
enable secret password. If you choose the same password, this password is listed in plain
text in the configuration file and could easily tip off anyone who might see this file.
NOTE MD5 stands for message digest 5 and is defined by RFC 1321. MD5 is a one-way
cryptographic algorithm used for encoding data.
Booting a Cisco IOS Device 341
As you continue through the setup dialog, you are prompted for additional global para¬
meters at the console, as illustrated in Example 9-10. You use the configuration values you
have determined for your router to enter the global parameters at the prompts.
Example 9-10 Router Configuration: Initial Protocol Configurations
When you answer yes to a prompt, additional subordinate questions about that protocol
might appear, as shown in Example 9-11.
Example 9-11 Router Configuration: Additional Protocol Configurations
You are prompted for parameters for each installed interface. Use the configuration values
you have determined for your router interfaces to enter the interface-specific parameters at
the prompts.
342 Chapter 9: Operating and Configuring Cisco IOS Devices
When you complete the configuration process for all installed interfaces on your router, the
setup command presents the configuration command script that was created. Example
9-12 shows one example.
Example 9-12 Router Configuration Command Script
hostname Router
enable secret 5 $1$/CCk$4r7zDwDNeqkxF0.kJxC3G0
enable password sanfran
line vty 0 4
password sanjose
no snmp-server
1
no appletalk routing
no decnet routing
ip routing
no clns routing
no ipx routing
no vines routing
no xns routing
no apollo routing
isdn switch-type basic-5ess
interface BRI0
shutdown
no ip address
I
interface Ethernet©
no shutdown
ip address 10.1.1.31 255.255.255.0
no mop enabled
!
interface Serial©
shutdown
no ip address
Itext omitted for brevity
end
At this point, the router has not yet been configured, but you are presented with
three options:
• [0] —Go to the EXEC prompt without saving or using the created configuration.
• [1] —Go back to the beginning of setup without saving the created configuration.
• [2]—Accept and use the created configuration, save it to NVRAM, and exit to
privileged EXEC mode.
Booting a Cisco IOS Device Section Quiz 343
If you select option [2], the router is configured with this script and the script is saved to
NVRAM, allowing this script to be used the next time the router is restarted. After you have
made this choice, your system is ready for use.
The script file generated by the setup command is additive. You can turn on features with
setup, but you cannot turn them off. In addition, setup does not support many of the
advanced features of the router or those features that require a more complex configuration.
After the device has booted and you have established a base configuration, you cannot use
the IOS CLI to provide verification of operation and to enter more configuration parameters.
D Attach the power cable plug to the switch power supply socket.
2 When you start the switch or router, what should you see on the console output?
A Port status
B CPU utilization
C Switch throughput
D Full-duplex support
E Bandwidth utilization
344 Chapter 9: Operating and Configuring Cisco IOS Devices
4 After a successful completion of the initial hardware testing, what do the port LEDs
on a Catalyst switch do?
C The LEDs blink after the tests are complete and then turn off.
D The LEDs blink after the tests are complete and then turn green.
A System configuration
7 If POST completes successfully on the Catalyst 2950 switch, what happens next?
D You are prompted to enter the initial configuration for the switch.
8 When the router starts up, which actions do the startup routines perform?
(Choose three.)
A Run POST.
C Make sure that the router can reach other routers on the same network.
D Enter privileged EXEC mode so the network administrator can configure it.
E Find and load the Cisco IOS software that the router uses for its operating system.
To configure global switch parameters like the switch host name or the switch IP address
used for switch management purposes, use the global configuration mode. To configure a
particular port (interface), use the interface configuration mode.
One of the first tasks in configuring your switch is to name it. Naming your switch helps
you to better manage your network by being able to uniquely identify each switch within
the network. The name of the switch is considered to be the host name and is the name
displayed at the system prompt. You assign the switch name in global configuration mode.
In Example 9-13, the switch name is set to wg_sw_c.
Switch#config terminal
Switch(config)#hostname wg_sw_c
wg_sw_c(config)#_
To configure the default IP address and subnet mask on the switch, use the ip address
command at the VLAN 1 interface configuration mode. An IP address is required on a
Layer 2 switch ONLY for management purposes. For example, an IP address must be
assigned if you plan to use a Telnet connection, or if you plan to use the Simple Network
346 Chapter 9: Operating and Configuring Cisco IOS Devices
Management Protocol (SNMP) to manage the switch. Example 9-14 shows how to set the
management address on a Catalyst 2950.
Example 9-14 Setting the Switch Management Address
wg_sw_c(c°nfig)#interface vlan 1
wg_sw_c(config-if)#ip address 172.16.1.101 255.255.255.0
wg_sw_c(c°nfig-if)#no shutdown
NOTE The no shutdown command is required to activate the management address. A Layer 2
switch can have only one active management address any given time.
If you are going to Telnet to the switch from a different VLAN or subnet than the one it is
addressed in, you need a default gateway. To configure a default gateway for your switch,
use the ip default-gateway command. Enter the IP address of the next-hop router interface
that is directly connected to the switch where a default gateway is being configured. The
default gateway receives IP packets with unresolved destination IP addresses from the
switch CPU. Example 9-15 shows how to configure the default gateway.
Example 9-15 Setting a Default Gateway
wg_sw_c(config-if)#exit ~
wg_sw_c(config)#ip default-gateway 172.16.101.1
After the default gateway is configured, the switch has connectivity to the remote networks
with which a host needs to communicate.
NOTE For a multilayer switch like a 4500,6500, or 3550 running IOS Software that is configured
to route with IP, you do not need to have a default gateway set if the device knows the route
to the destination network.
After logging in to a Catalyst switch, you can verify the switch initial startup status using
the following switch status commands:
• show version—Displays the configuration of the system hardware and the software
version information.
wg_sw_c#show version
Cisco Internetwork Operating System Software
IOS (tm) C2950 Software (C2950-I6Q4L2-M), Version 12.1(11)EA1, RELEASE SOFTWARE
(fcl)
Copyright (c) 1986-2002 by cisco Systems, Inc.
Compiled Wed 28-Aug-02 10:25 by antonino
Image text-base: 0x80010000, data-base: 0x80528000
wg_sw_c# ___
Table 9-7 describes the key output fields from the show version command.
348 Chapter 9: Operating and Configuring Cisco IOS Devices
Output Description
Switch uptime Current days and time since the system was last booted. In the
example, the switch uptime is 2 minutes.
The show interfaces command displays physical layer status and statistics information
on the network interfaces of the switch. Example 9-17 shows the output for a show
interfaces command.
wg_sw_c#
Configuring a Switch from the Command Line 349
Table 9-8 shows some significant fields shown in Example 9-17 that are useful for checking
on fundamental switch details.
Output Description
Fast Ethernet 0/1 is down, Indicates the current status of the interface. The possibilities are
line protocol is down as follows:
Address is Shows the Media Access Control (MAC) address that identifies
the interface hardware.
MTU 1500 bytes Shows the size of the maximum transmission unit (MTU) for
this interface.
Auto-Duplex, Auto-Speed Shows the speed and duplex for the interface.
Additional display from this command includes counters of the number and type of frames
passing through the interface and any errors that have occurred.
The problem with the show interfaces command is that you have to go through many pages
to see all the interface information. A more compact command for viewing output is the
show interfaces status command used in Example 9-18.
Example 9-18 show interfaces status Command
Notice in this command you can get a quick overview of all the interfaces; however, you do
not get to see any counter information. You use the show interfaces and show interfaces
status commands frequently while configuring and monitoring switches.
Use the show ip interface brief command to verify the IP address, and use the show ip
default command to verify the default-gateway settings on the switch. Example 9-19 shows
the output of these two commands.
Example 9-19 Displaying Switch IP Configuration
wg_sw_c#sh°w ip interface brief
Interface IP-Address OK? Method Status Protocol
Vlanl 172.16.1.101 YES manual up up
FastEthernet0/1 unassigned YES unset down down
FastEthernet0/2 unassigned YES unset down down
FastEthernet0/3 unassigned YES unset up up
FastEthernet0/4 unassigned YES unset down down
FastEthernet0/5 unassigned YES unset down down
FastEthernet0/6 unassigned YES unset down down
FastEthernet0/7 unassigned YES unset down down
FastEthernet0/8 unassigned YES unset down down
FastEthernet0/9 unassigned YES unset down down
FastEthernet0/10 unassigned YES unset down down
wg_sw_c#show ip default
172.16.1.1
wg_s\A/_c#
Using the commands listed here, you should be able to move around a switch to provide
basic configuration parameters and verification.
1 Which Cisco IOS command displays the configuration of the system hardware and
software version information on a Cisco device?
A show version
B show interfaces
C show startup-config
D show running-config
Configuring a Router from the Command Line 351
2 After you configure the IP address on an interface, how do you change the state from
administratively down to up?
A Enter exit.
B Enter shutdown.
C Enter no shutdown.
3 Which Cisco IOS command displays the interface bandwidth on a Cisco switch?
A show interfaces
B show bandwidth
4 Match each data-link protocol status to the message that appears with the show
interfaces command.
1 Operational A Serial 1 is up, line protocol is up.
Recall that two variations of EXEC mode exist: user EXEC mode and privileged EXEC
mode. From privileged EXEC mode, you can enter global configuration mode with the
configure terminal command. From global configuration mode, you have access to
specific configuration modes, which include the following:
Commands that affect the entire router are called global commands. The hostname and
enable password commands are examples of global commands.
Commands that point to or indicate a process or interface that is to be configured are called
major commands. When entered, major commands cause the CLI to enter a specific
configuration mode. Major commands have no effect unless they are immediately followed
by a subcommand that supplies the configuration entry. For example, the major command
interface serial 0 has no effect unless it is followed by a subcommand that says what you
want to do to that interface.
The following are examples of major commands and the subcommands that go with them:
Router(config)#interface serial 0 (major command)
Router(config-if)#shutdown (subcommand)
Notice that entering a major command switches you from one configuration mode to
another. However, you must know the syntax of the major command. The help function
does not list major commands when in a subcommand configuration mode.
One of the first things you want to configure on your router is a name. Naming your router
helps you better manage your network by being able to uniquely identify each router within
the network. The name of the router is considered to be the host name and is the name
displayed at the system prompt. If no name is configured, the default router name is Router.
You assign the router name in global configuration mode. Example 9-20 demonstrates the
process of naming the router.
Example 9-20 Naming the Router
Router(config)#hostname wg_ro_c
wg_ro_c(config)#
Configuring a Router from the Command Line 353
You can also add a description of up to 80 characters in length to an interface to help you
remember specific information about that interface, such as the network serviced by that
interface’s services. This description is meant solely as a comment to help identify how the
interface is being used. The description appears in the output when you display the
configuration information that exists in router memory and in a show interfaces command
display. Example 9-22 demonstrates how to configure a router interface description.
Example 9-22 Configuring the Router’s Interface Description
wg_no_c(config)#interface ethernet 0
wg_ro_c(config-if)#description Engineering LAN, Bldg. 18_
You can secure your router by using passwords to restrict access. Passwords can be
established both on individual lines and to privileged EXEC mode. Passwords are
case-sensitive.
Example 9-23 uses the line console 0 command followed by the login and then the
password subcommands to establish a login password for the console terminal. The
purpose here is to establish the need for a user to log in to the console before gaining access
to the router, console 0 designates the router’s console connection, and login prompts a user
for a password before allowing console connectivity.
Example 9-23 Configuring the Router’s Console Password
Router(config)#line console 0
Router(config-line)#login
Route r( conf ig-line )#password cisco__
As demonstrated in Example 9-24, the line vty 0 4 command followed by the password
subcommand establishes a login password on incoming Telnet sessions.
Example 9-24 Configuring the Router’s Virtual Terminal Password
Routerfconfig)#line vty 0 4
Router(config-line)#password sanjose_
354 Chapter 9: Operating and Configuring Cisco IOS Devices
NOTE You do not have to enter the login command on the vty lines, because it is already there by
default. This is why you cannot immediately Telnet to a router just by putting it on the
network, assigning an IP address to the network interface, and enabling that interface. If
you try to do so, you get the following message:
Password required, but none set.
This message occurs because login processing is already enabled on all the vty lines.
The enable password global command restricts access to privileged EXEC mode.
Example 9-25 demonstrates how to configure the enable password. You can also assign an
encrypted form of the enable password called the enable secret password. Just enter the
enable secret command with the desired password at the global configuration mode
prompt, as demonstrated in Example 9-26. If you configure both of these passwords, the
enable secret password is used instead of the enable password.
Example 9-25 Configuring the Router Enable Password
Router(config)#enable password cisco
You can also add a further layer of security, which is particularly useful for passwords that
are in configuration files stored on a TFTP server. Cisco provides a feature that allows you
to use encrypted passwords. Passwords can be encrypted through the use of the service
password-encryption command in global configuration mode. The encryption scheme
used by this command is not as strong as the one used by the enable secret command.
To disable passwords, use the no form of the specific password command in global
configuration mode, as shown in Example 9-27.
Routerfconfig)#line console 0 ‘ “ --
Router(config-line)#exec-timeout 0 0
Configuring a Router from the Command Line 355
The logging synchronous console line command is useful whenever console messages are
being displayed at the same time that you are attempting to input EXEC or configuration
commands. Instead of the console messages being intermingled with your input, your input
is redisplayed on a single line at the finish of each console message that “interrupts” your
input. This makes reading your input and the message much easier. Example 9-29
demonstrates how to enter this command.
Router(config)#line console 0
Router(config-line)#logging synchronous
Many features are enabled on a per-interface basis. Interface configuration mode com¬
mands modify the operation of Ethernet, Token Ring, FDDI, serial, HSSI, loopback, dialer,
null, async, ATM, BRI, and tunnel interface types. When you issue the interface type
number command at the Router(config)# prompt, you must define both the interface type
and number. The number is assigned to each interface at the factory or by the physical
location of the interface hardware in the router and is used to identify each interface. This
identification is critical when you have multiple interfaces of the same type in a single
router. Here are some examples of an interface type and number:
Router(config)#interface serial 0
Router(config)#interface ethernet 1
You specify an interface in Cisco 2600,3600,4000,7000, and 7200 series routers (modular
routers) by the physical slot in the router and the port number on the module in that slot.
Here’s an example:
Router(config)#interface ethernet 1/0
You define an interface in the Cisco 7000 and 7500 series routers with VIP cards by slot,
port adapter (a module on the VIP card), and the port number on the port adapter. Here’s
an example:
Router(config)#interface ethernet 1/0/0
To configure an interface, select the appropriate interface type and location and enter
the appropriate commands to modify the parameters. When you want to leave interface
configuration mode and return to global configuration mode, type exit at the
356 Chapter 9: Operating and Configuring Cisco IOS Devices
Step 2 When in global configuration mode, you must identify the specific
interface against which you will be issuing commands by entering the
appropriate major command. As shown in the following command lines,
the interface is serial 0.
Router(config)#interface serial 0
Router(config-if)#
Step 3 Enter the specified bandwidth for the interface. The bandwidth
command overrides the default bandwidth that is displayed in the show
interfaces command and is used by some routing protocols, such as
IGRP. The default bandwidth for synchronous serial lines is T1 speed
(1.544 Mbps). The bandwidth entered has no effect on the actual speed
of the line. Instead, it is used to compute routing metrics and the load of
the link. The following command lines show how to set the bandwidth
for the router interface:
Router(config-if)#bandwidth 64
Router(config-if)#exit
Router(config)#exit
Router#
NOTE Serial links have two sides. One side of the link is responsible for clocking and is called a
DCE. The other side of the link is called the data terminal equipment (DTE). The DCE
cable has a female connector, and the DTE has a male connector. In a production network,
the DCE interface is provided by the service provider and is typically a connection to a
channel service unit/data service unit (CSU/DSU). Routers are typically the DTE side of
the serial interface. In environments where you want to simulate a serial connection, you
Configuring a Router from the Command Line 357
can connect two routers back-to-back with a DTE and DCE cable. To simulate the
environment, one of these devices must provide clocking. Clocking is the function of the
router with the DCE cable. Clock rates that can be configured on serial interfaces are
typically the following:
1,200; 2,400; 4,800; 9,600; 19,200; 38,400; 56,000; 64,000; 72,000; 125,000; 148,000;
500,000; 800,000; 1,000,000; 1,300,000; 2,000,000; and 4,000,000
However, this can vary with the type of serial interface you have in your router.
After you configure the router, you use show commands to verify the configuration
changes.
The show interfaces serial 0 command shown in Example 9-30 shows the changes issued
in the initial serial interface configuration. Notice in the highlighted text that the interface
is up and that the bandwidth, shown here as BW, is set to 64 Kbps.
Example 9-30 Verifying Router Interface Configuration Changes with show interface
You might need to set the media type on an Ethernet interface. Ethernet interfaces have
different types of physical connections. For example, you might have an attachment unit
interface (AUI) option and a 10BASE-T connector, as in the case of a Cisco 4000 series
router. This router series has both of these physical connectors on a network interface
module. The default connector is an AUI. Some routers might autosense the connection, but
some might require that you select the connector in the configuration. Example 9-31
demonstrates how you would set the media type on an Ethernet interface.
Example 9-31 Setting the Router’s Ethernet Interface Media Type
Router(config)#interface ethernet 2
Router(config-if)#media-type IQbaset_____
358 Chapter 9: Operating and Configuring Cisco IOS Devices
You might need to disable an interface. This function is useful when you need to perform
maintenance on a particular network segment. You might also choose to do this to isolate a
network problem.
Router#configure terminal
Router(config)#interface serial 0
Router(config-if)#shutdown
%LINK-5-CHANGED: Interface Serial©, changed state to administratively down
%LINEPR0T0- 5
Router#configure terminal
Router(config)#interface serial 0
Router(config-if)#no shutdown
%LINK-3-UPD0WN: Interface Seria0, changed state to up
%LINEPR0T0-5 -UPDOWN:
Line P
TIP Whenever you first configure an interface, unless in setup mode, you must use the no
shutdown command to administratively enable the interface before it can be used to
transmit packets.
The show interfaces command displays statistics for the network interfaces on the router,
as demonstrated in Example 9-34.
Example 9-34 Displaying Statistics for Router Interfaces
Output Description
Ethernet...is {up 1 downl Indicates whether the interface hardware is currently active and
administratively down} whether it has been taken down by an administrator.
line protocol is {up 1 Indicates whether the software processes that handle the line
down} protocol consider the interface usable (that is, whether keepalives
are successful). If the interface misses three consecutive
keepalives, the line protocol is marked as down.
Hardware Hardware type (for example, MCI Ethernet, SCI, LANCE) and
physical address.
Output Description
Last input Number of hours, minutes, and seconds since the last packet was
successfully received by an interface. Useful for knowing when a
dead interface failed.
Output Number of hours, minutes, and seconds since the last packet was
successfully transmitted by an interface. Useful for knowing when
a dead interface failed.
Last clearing Time at which the counters that measure cumulative statistics
shown in this report (such as the number of bytes transmitted and
received) were last reset to zero. Note that variables that might
affect routing (for example, load and reliability) are not cleared
when the counters are cleared. *** indicates that the elapsed time
is too large to be displayed.
Output queue, input Number of packets in output and input queues. Each number is
queue,drops followed by a slash, the maximum size of the queue, and the
number of packets dropped because of a full queue.
5 minute input rate, 5 Average number of bits and packets transmitted per second in the
minute output rate last 5 minutes.
bytes input Total number of bytes, including data and MAC encapsulation, in
the error-free packets received by the system.
Output Description
Runts Number of packets that are discarded because they are smaller than
the minimum packet size. For example, any Ethernet packet that is
less than 64 bytes is considered a runt. Runts are usually caused by
collisions. More than one runt per million bytes received should
be investigated.
Giants Number of packets that are discarded because they exceed the
maximum packet size. For example, any Ethernet packet that is
greater than 1518 bytes is considered a giant.
Once you have configured and verified the settings on your switch or router, you then need
to save the parameters to be used each time the device reloads with the command copy
running-configuration startup-configuration.
1 What should you do if you make an error during the system configuration dialog on a
Cisco router?
A Type Ctrl-C to abort the process and start over.
D Use Ctrl-P or the Up Arrow to repeat the last command and make any corrections.
A hostname hostname
3 What must you configure to ensure that anyone accessing your router from the
console port is prompted for a password?
4 Which Cisco IOS command configures Ethernet port 1 on a fixed port router?
A Ethernet interface 1
B interface Ethernet 1
5 Which Cisco IOS command do you use to bring up an interface on a Cisco router that
is “administratively down”?
A admin up
B shutdown
C no shutdown
D no admin shutdown
The show startup-config command displays the saved configuration in NVRAM. The
show running-config command displays the current (running) configuration in RAM.
Example 9-35 shows the output of a show running-config.
Example 9-35 show running-config Command
g_sw_c#sh°w running-configuration
Building configuration...
interface FastEthernet0/2
no ip address
- -More - -
The Building configuration... output indicates that the running configuration is being
extracted from system RAM and converted into text to be displayed to the user.
After the running configuration is built from RAM, the Current configuration: message
appears to indicate that this is the current configuration running in RAM.
The first line of the show startup-config command output indicates the amount of
NVRAM used to store the configuration; for example, Using 1359 out of 32762 bytes
indicates that the total size of the NVRAM is 32762 bytes and the current configuration
stored in NVRAM takes up 1359 bytes. Example 9-36 shows the output from a show
startup-config command.
364 Chapter 9: Operating and Configuring Cisco IOS Devices
wg_sw_c#show startup-configuration
Using 921 out of 32768 bytes
j
version 12.1
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
i
hostname wg_sw_c
I
enable secret 5 $1$JY1/$4Mo5/WHMt/XqXowakvfpS1
j
ip subnet-zero
i
After you have made configuration changes, you must save the active configuration to
NVRAM if you want the router to use these changes the next time it is restarted.
To save your configuration to NVRAM, you enter the command copy running-
configuration startup-configuration. (Use write memory or write in pre-Software
Release 10.3.) If you do not save your configuration changes, they are lost if the router is
powered off or reloaded. Example 9-37 shows how to copy the router’s current configura¬
tion to NVRAM.
Example 9-37 Copying the IOS Device’s Current Configuration to NVRAM
wg_ro_c#
Chapter Summary 365
1 Which Cisco IOS command saves the current configuration to be the starting
configuration of the router?
A configure memory
B configure terminal
3 Which Cisco IOS command displays the current active configuration settings
on a Catalyst switch?
A show version
B show interfaces
C show startup-configuration
D show running-configuration
Chapter Summary
In this chapter, you explored the startup and initial configurations of Cisco Catalyst
switches and Cisco routers. You learned how to maneuver through the EXEC mode of the
switches and routers. You discovered help functions to aid in the use of Cisco IOS Software.
You also explored the other modes and the syntax of the Cisco IOS and learned how to get
a base configuration on a router using setup. As you perform advanced configurations on
the routers and switches, you continue to use the basic functions and syntax learned here.
366 Chapter 9: Operating and Configuring Cisco IOS Devices
B An EXEC session
C A terminal session
D A privileged session
A Security
B Reliability
C Scalability
D User interface
A Flash
B RAM
C POST
D TFTP
4 When a Catalyst switch or Cisco router starts up, what is the first
operation performed?
jt
A CD-ROM
B TFTP server
C Console terminal
D Modem connection
A LAN port
B Uplink port
C Console port
D Auxiliary port
7 Which access level allows a person to access all router commands and can be
password protected to allow only authorized individuals to access the router?
8 How do you instruct a Cisco device to parse and execute an entered command?
9 Which CLI prompt indicates that you are working in privileged EXEC mode?
A Hostname#
B Hostname>
C Hostname-exec>
D Hostname-config
10 Which command would you enter in the privileged EXEC mode to list the
command options?
A ?
B init
C help
D login
11 Match each step of the physical Catalyst switch startup process to its description.
1 Step 1 A Attach the power cable plug to the switch power supply
socket.
2 Step 2 B Observe the boot sequence, including the Cisco IOS Software
output text on the console.
3 Step 3 C Verify that all cable connections are secure, the terminal is
connected to the console port, and the console terminal appli¬
cation is selected.
12 How do you start a Catalyst 2950 switch?
D Attach the power cable plug to the switch power supply socket.
Chapter Review Questions 369
13 What color is the Catalyst 2950 switch redundant power supply LED if the redundant
power supply is plugged in but not functioning correctly?
A Green
B Amber
C Flashing green
D Flashing amber
14 During a Catalyst switch POST test, what is the result of the console port test failing?
A This is a fatal error, and you will not be able to access the switch.
B This is a nonfatal error, but one or more ports will not be operational.
C This is a nonfatal error, and you will be able to Telnet to the management console.
D This is a nonfatal error, but the switch will not be able to restart itself automati¬
cally in case of a failure.
15 What should you type to display a list of commands that begin with the letter c on a
Catalyst switch?
A C?
B C ?
C help c
D help c*
16 What should you type to display the command syntax help so that you can see how to
complete a command that begins with config?
A config?
B config ?
C help config
D help config*
370 Chapter 9: Operating and Configuring Cisco IOS Devices
A User mode
18 When you use the show interfaces command to display the status and statistics for
the interfaces configured on a Catalyst switch, which output field indicates the MAC
address that identifies the interface hardware?
B Hardware is . . . 10BASE-T
C Address is 0050.BD73.E2C1
19 Which show command requires that you have privileged EXEC mode access?
A show ip
B show version
C show running
D show interfaces
D Attach the power cable plug to the router power supply socket.
Chapter Review Questions 371
21 When you start a Cisco router, what should you see on the console?
23 Which statement best describes what the user EXEC mode commands allow you to
configure on a Cisco router?
A You cannot configure anything; the user mode commands are used to
display information.
B The user EXEC mode allows you to perform global configuration tasks that
affect the entire router.
C The user EXEC mode commands allow you to enter a secret password so you can
configure the router.
D The user EXEC mode commands allow you to configure interfaces, subinter¬
faces, lines, and routers.
24 Which Cisco IOS command is used to return to user EXEC mode from the privileged
EXEC mode?
A exit
B quit
C disable
D userexec
372 Chapter 9: Operating and Configuring Cisco IOS Devices
25 Match each type of help available with the Cisco IOS CLI to its description.
A Ctrl-A
B Ctrl-F
C Ctrl-R
D Ctrl-W
B Redisplays a line
28 Which Cisco IOS command sets the session command buffer size?
A set buffer
B show history
29 Which command returns to more recent commands in the history buffer after
recalling commands?
A Ctrl-N
B Ctrl-P
C show history
D show terminal
Chapter Review Questions 373
>
31 Which Cisco IOS command displays the configuration of the system hardware and the
software version information?
A show version
B show interfaces
C show startup-config
D show running-config
1 line
A Router(config-if)#
2 router
B Router(config-line)#
3 interface
C Router(config-subif)#
4 controller
D Router(config-router)#
5 subinterface
E Router(config-controller)#
34 Which Cisco IOS command creates a message to be displayed upon router login?
A hostname hostname
35 If both the enable secret and the enable password commands are configured on your
router, how do you get to the # prompt?
D Enter both the enable secret and the enable password commands.
36 Which Cisco IOS command do you use to prevent a console session from timing out?
A no exec
B no timeout
C timeout 0 0
D exec-timeout 0 0
B interface serial 0 1
D serial 0 1 interface
38 Which Cisco IOS command should you use to set the clock speed to 64 kbps on a
serial interface on a Cisco router?
A clock rate 64
B clock speed 64
39 Which Cisco IOS commands correctly configure the IP address and subnet mask for
Ethernet interface 1 in slot 1 ?
A interface FastEthernet 11
ip address 192.168.1.1 mask 255.255.255.0
C interface FastEthernet 11
ip address 192.168.1.1 255.255.255.0
40 What is a runt?
A An Ethernet frame that has been discarded because it has a CRC error
C An Ethernet frame that has been discarded because it is smaller than the mini¬
mum Ethernet frame size
D An Ethernet frame that has been ignored by the interface because the interface
hardware ran low on internal buffers
41 A serial interface displays “Serial 1 is up, line protocol is down”. Which situations
might cause this error? (Choose three.)
E The encapsulation type on the other end is different than on your end.
Upon completion of this chapter, you will be able to perform the following tasks:
This chapter covers the management of a Cisco network device, including using CDP to
build a network map and working with configuration file management and Cisco IOS
image management.
Table 10-1 TCDP Operates Across Multiple Protocol Suites and Media Types
Cisco Proprietary CDP discovers and shows information about directly connecte d Cisco
Data Link Protocol devices.
CDP is an information-gathering tool that enables you to access a summary of protocol and
address information about other Cisco devices (regardless of which protocol suite they are
running) that are directly connected to the device where you issue the command.
CDP runs over the data link layer, independent of the physical media to the upper-layer
protocols. Because CDP operates at this level, two or more CDP devices that support
different network layer protocols (for example, IP and Novell IPX) can learn about
each other.
Physical media supporting the Subnetwork Access Protocol (SNAP) encapsulation connect
CDP devices. These can include all LANs, Frame Relay and other WAN technologies, and
ATM networks.
When a Cisco device boots up, CDP starts by default. Then, CDP can automatically
discover neighboring Cisco devices running CDP, regardless of which protocol suite or
suites are running.
NOTE CDP runs on routers with Cisco IOS Release 10.3 or later and on Cisco switches and hubs.
Figure 10-1 is an example of how CDP exchanges information with its directly connected
neighbors. You can display the results of this CDP information exchange on a console
connected to a network device configured to run CDP on its interfaces.
Router_A
Getting Information About Neighboring Devices 379
• Device identifiers—For example, the switch’s configured name and domain name
(if any).
• Address list—Up to one address for each protocol supported.
• Port identifier—The name of the local and remote port (in the form of an ASCII
character string, such as ethemetO).
• Capabilities list—Supported features. For example, the device acts as a source-route
bridge and a router.
• Platform—The device’s hardware platform; for example, Cisco 7000.
CDP version 2 (CDPv2) is the most recent release of the protocol and provides more
intelligent device tracking features. These features include a reporting mechanism, which
allows for more rapid error tracking, thereby reducing costly downtime. Reported error
messages can be sent to the console or to a logging server and cover instances of mis¬
matching native virtual LAN (VLAN) IDs (IEEE 802.IQ) on connecting ports and
mismatching port duplex states between connecting devices.
You can view the CDP output via the show cdp command. CDP itself has several keywords
that enable you to get different types of information and different levels of detail, as
demonstrated in Example 10-1. CDP is designed and implemented as a simple, low-
overhead protocol. A CDP packet can be as small as 80 octets, mostly made up of the ASCII
strings that represent information such as the device name, protocol addressing
information, port connectivity information, and device operating system information.
RouterA#show cdp ?
<cr>
RouterA(config)interface serialO
CDP functionality is enabled by default on all CDP compatible interfaces, but it can be
disabled at the device level. To prevent other non-CDP-capable devices from getting
information about your device, use the global configuration command no cdp run. This
command disables the CDP protocol for the entire device. Use the no cdp enable command
to disable CDP on a given interface. This would be useful to conserve bandwidth when
connecting to a non-Cisco device. To re-enable CDP on an interface, use the cdp enable
interface configuration command.
Although CDP frames are Layer 2 multicast, those frames are not forwarded by any Cisco
switch. Two routers connected to a Cisco switch would show only the switch as a neighbor
and not the other router. Disabling CDP on a switch would not allow it to forward packets
from a router, only stop sending and receiving CDP on that port.
Running the show cdp neighbors command on RouterA results in the output shown in
Example 10-2.
Example 10-2 show cdp neighbors Command Output for RouterA in Figure 10-2
NOTE SwitchA in Example 10-2 also provides its MAC address as part of the system name.
Getting Information About Neighboring Devices 381
For each local port, the display (as demonstrated in Example 10-2) shows the following:
• Neighbor device ID
• Local interface
• The holdtime value in seconds
• Neighbor device capability code
• Hardware platform of the neighbor
• Neighbor’s remote port ID
The holdtime value indicates how long the receiving device should hold the CDP packet
before discarding it.
The format of the show cdp neighbors output varies between types, but the available
information is generally consistent across devices.
The show cdp neighbors command can be used on the Catalyst switch to display the CDP
updates received on the local interfaces. Note that on a switch, the local interface is referred
to as the local port.
Entry address(es):
IP address: 10.1.1.2
continues
382 Chapter 10: Managing Your Network Environment
Example 10-3 show cdp entry * Command Output for Router A (Continued)
Version :
IOS (tm) 2500 Software (C2500-JS-L), Version 12.0(3), RELEASE SOFTWARE (fci)
Entry address(es):
IP address: 10.3.3.2
Version :
V8.01
The output from the show cdp entry command displays the following information:
• Neighbor device ID
• Layer 3 protocol information (for example, IP addresses)
• The device’s platform
• The device’s capabilities
• The local interface type and outgoing remote port ID
• The holdtime value in seconds
• IOS type and version
The output from the show cdp entry command includes all the Layer 3 addresses
configured on neighbor device if configured (up to one Layer 3 address per protocol).
CDP counters :
The show cdp traffic command shows the number of CDP packets sent and received,
as well as the number of errors for the following error conditions:
• Syntax error
• Checksum error
• Failed encapsulations
• Out-of-memory conditions
• Invalid packets
• Fragmented packets
Encapsulation HDLC
The show cdp interface command displays the following status fields:
You can use topology documentation to validate design guidelines and to better understand
the network for future design, change, or troubleshooting. Topology documentation should
include both logical and physical documentation for these components:
• Connectivity
• Addressing
384 Chapter 10: Managing Your Network Environment
• Media types
• Devices
• Rack layouts
• Card assignments
• Cable routing
• Cable identification
• Termination points
• Power information
• Circuit identification information
Maintaining accurate network topology documentation is the key to successful config¬
uration management. To create an environment where topology documentation
maintenance can occur, the information must be available for updates. It is always a good
practice to update topology documentation whenever a network change occurs.
2 Which network layer protocol must two CDP devices run to learn about each other?
A IP
B IPX
C AppleTalk
A Link speed
B Port identifier
C Capabilities list
E Destination address
A no cdp run
B no cdp enable
7 Which Cisco IOS command produces the same result as show cdp entry
8 If the letters R and B appear in the Capabilities column in the output of the show cdp
neighbors command, it indicates that the specified device is acting as both a_
and a_.
A Router; switch
B Repeater; switch
A cdp enable
10 What information is included in the output of the command show cdp traffic?
A Remote port ID
B Holdtime value
11 Which CDP commands can you use to display the network layer address information
of the CDP neighbor? (Choose two.)
A cdp enable
A Yearly
B Weekly
C Monthly
13 Which pieces of information should you include in a network map? (Choose three.)
A Addressing
B Rack layouts
C Serial numbers
D Performance data
E Cable identification
RouterA#telnet 10.2.2.2
SwitchB>
To verify your Telnet connectivity, you should use the show sessions command, as
demonstrated in Example 10-7.
Example 10-7 show sessions Command Verifies Telnet Connectivity
RouterA#show sessions
The output of the show sessions command displays a list of hosts to which you have
established Telnet connectivity. Information in the show sessions output displays the host
name, the IP address, the byte count, the amount of time the device has been idle, and the
connection name assigned to the session. If you have multiple sessions in progress, the
asterisk (*) helps by indicating which was your last session and to which session you return
if you press the Enter key.
Use the show user command to show whether the console port is active, and to list all active
Telnet sessions, with the IP address or IP alias of the originating host, on the local device,
as demonstrated in Example 10-8.
Getting Information About Remote Devices 389
Example 10-8 show user Command Lists Active Telnet Sessions and Verifies Console Port Activity
RouterA#show user
* 0 con 0 10.2.2.2 3
10.3.3.2 2
In the show user output, the line con represents the local console, and vty represents a
remote connection. If multiple users exist, the asterisk (*) denotes the current terminal
session user.
TIP Although they aren’t documented, most versions of Cisco IOS support the UNIX
commands who and where. The who command is equivalent to the IOS show users
command, and the where command is the equivalent of the IOS show sessions command.
RouterB#<Ctrl-Shift-6>x
RouterA#show session
Conn Host Address Byte Idle Conn Name
RouterA#resume 1
RouterB# __
• Press the Enter key followed by a Ctrl-R to return to the previous device prompt.
• Type the resume command if you have only one session. (Typing resume without a
sessionnumber takes you back to the last active session.)
• Use the show sessions command to find the session number, as demonstrated in
Example 10-9.
• Use the resume sessionnumber command to reconnect to a specific Telnet session, as
shown in Example 10-9.
390 Chapter 10: Managing Your Network Environment
Just as you have more than one way of resuming a connection, you can end a Telnet session
on a Cisco device using one of the following methods:
• Enter the exit or logout EXEC command while on the remote device. This logs you
out of the Telnet session of the remote device and returns you to the EXEC process of
the local device. If you open a Telnet session to a device, from that device Telnet to a
second device, and you suspend the connection, you return to the executive process of
the original device.
• Another way to end a Telnet session from the local device is to use the disconnect
EXEC command while on the local device, as demonstrated in Example 10-10. If you
have multiple sessions, you can disconnect from a single session using the disconnect
[sessionname] [sessionnumber] command from the local device.
Example 10-10 Using the disconnect Command to End a Telnet Session Opened by the Local Device
RouterA#disconnect
• If you suspect a Telnet session from a remote user is causing bandwidth or other types
of problems, ask the user to close the session. Alternatively, you can terminate the
session from your EXEC prompt. To close a Telnet session from a foreign host, use
the clear line command, as demonstrated in Example 10-11. At the other end of the
connection, the user gets a notice that the connection was “closed by a foreign host.”
To determine which line to clear, use the show users command, illustrated in Example
10-8, to determine from where the connection is coming.
Example 10-11 Using the clear line Command to End a Telnet Session Opened by a Remote Device
RouterA#clear line 11
[confirm]
[OK]
The ping command verifies connectivity. The term originates from the practice in which
naval vessels send out sonar pings to locate or verify other vessels or obstructions. The ping
command also tells you the minimum, average, and maximum times it takes for ping
packets to find the specified system and return. This gives you an idea of the reliability of
the path to the specified system. Example 10-12 shows output from a ping command.
Getting Information About Remote Devices 391
Example 10-12 Use the ping Command to Verify Device Connectivity to the Network
Router#ping 10.1.1.10
j ! ! i |
Table 10-2 lists the possible output characters from the ping facility.
Character Description
Use the traceroute command to see the outgoing routes that packets take between devices,
as shown in Example 10-13.
Example 10-13 Use the trace Command to Display Packet Routes Between Devices
Router#traceroute 10.1.1.10
Router# _____
392 Chapter 10: Managing Your Network Environment
The traceroute command shows the actual routes the packets take between devices. The
device sends out a sequence of User Datagram Protocol (UDP) datagrams to an invalid port
address at the remote host. Three datagrams are sent, each with a Time-To-Live (TTL) field
value set to 1. The TTL value of 1 causes the datagram to time out as soon as it hits the first
router in the path. This router then responds with an Internet Control Message Protocol
(ICMP) Time Exceeded Message (TEM) indicating that the datagram has expired.
Another three UDP messages are then sent, each with the TTL value set to 2, which causes
the second router to return ICMP TEMs. This process continues until the packets actually
reach the other destination. Because these datagrams are trying to access an invalid port at
the destination host, ICMP Port Unreachable messages are received, indicating an unreach¬
able port. This event signals the traceroute program that it is finished. The purpose behind
this is to record the source of each ICMP TEM to provide a trace of the path the packet took
to reach the destination.
Table 10-3 lists the characters that can appear in the trace command output.
Character Description
nn msec For each node, the round-trip time in milliseconds for the specified
number of probes
u Port unreachable
H Host unreachable
N Network unreachable
P Protocol unreachable
T Timeout
NOTE Because IP domain name lookup is enabled by default, the router attempts to reconcile each
IP address to a name, which can cause the traceroute command to take some time.
Getting Information About Remote Devices Section Quiz 393
1 Which Cisco IOS command opens a Telnet connection from a Cisco router to a device
with the IP address 10.1.1.1?
A open 10.1.1.1
B telnet 10.1.1.1
C 10.1.1.1 telnet
D 10.1.1.1 connect
2 You use the show users command to display all active Telnet sessions and to
determine if_•
A Telnet is enabled
A <Ctrl-Alt-6>x
B <Ctrl-Shift-x>6
C <Ctrl-Shift-6>x
D <Ctrl-Shift-9>x
C Pressing <Ctrl-Shift-6>x
5 Which commands end a Telnet session when entered on the remote device?
(Choose two.)
A exit
B logout
C clear line
D disconnect
A exit
B logout
C clear line
D disconnect
7 Which pieces of information are displayed as the result of the ping command?
(Choose three.)
A Failure rate
B Success rate
A Bandwidth
B Connectivity
C Functionality
When power is initially applied to a router, the following events occur in the order shown:
3 Find the IOS Software—The bootstrap code determines where the IOS Software to
be run is located. The Flash memory is the normal place where the IOS image is
found. The configuration register and configuration file in NVRAM help determine
where the IOS images are and what image file should be used.
4 Load the IOS Software—After the bootstrap code has found the proper image, it
loads that image into RAM and starts the IOS running. Some routers (such as the 2500
series) do not load the IOS image into RAM, but execute it directly from Flash
memory.
5 Find the configuration—The default is to look in NVRAM for a valid configuration.
A parameter can be set to have the router attempt to locate a configuration file from
another location, such as a TFTP server.
6 Load the configuration—The desired configuration for the router is loaded and
executed. If no configuration exists or is being ignored, the router enters the setup
utility or attempts an Autoinstall. Autoinstall is attempted if a router is connected to a
functioning serial link and can resolve an address through a process of SLARP (Serial
Line Address Resolution Protocol).
Router Components
The following list describes the major components of a router (most are hardware):
• RAM—Random-access memory contains the software and data structures that allow
the router to function. The principal software running in RAM is the Cisco IOS image
and the running configuration. Some routers, such as the 2500 series, run IOS from
Flash and not RAM.
• Configuration register—The configuration register controls how the router boots up.
• Interfaces—The physical connections to the external world for the router. These
interfaces include the following types:
— Ethernet and Fast Ethernet
— Asynchronous and synchronous serial
— Token Ring
ROM Microcode
The four major areas of microcode that are contained in ROM are as follows:
• Bootstrap code—The code used to bring the router up during initialization. It reads
the configuration register to determine how to boot and then, if instructed to do so,
loads the Cisco IOS Software.
• Power-On Self-Test code—The microcode used to test the basic functionality of the
router hardware and to determine what components are present.
• A “partial” or “mini” IOS - A subset of the IOS. This partial IOS can be used to
load a new software image into Flash memory and to perform some other maintenance
operations. It does not support IP routing and most other routing functions.
Sometimes, this subset of the IOS is referred to as rxboot code or the bootloader.
Router Booting Sequence and Verification Commands 397
The bootstrap code has the responsibility of locating the IOS Software. Here is the
sequence of events it follows to find the image:
1 Check the boot field of the configuration register. The boot field is the lower 4 bits of
the configuration register. It specifies how the router is to boot. These bits can point to
Flash for the IOS image, and then the saved configuration (if one exists) is searched
for commands that tell the router how to boot. The field can indicate that the router
should load the rxboot image, or it can specify that no IOS is to be loaded and to just
start the ROM monitor image. The rest of the configuration register bits perform other
functions as well, such as selecting console baud rate and choosing whether to use the
configuration in NVRAM.
For example, a configuration register value of 0x2102 (the Ox indicates that the digits
that follow are in hexadecimal notation) has a boot field value of 0x2. (The far-right
digit in the register value is 2, and it represents the lower 4 bits of the register.)
2 If the configuration register boot field value is from 0x2 to OxF, the bootstrap code
parses any configuration in NVRAM for boot system commands that specify the
name and location of the IOS image to load. Several boot system commands can be
in sequence to provide a fault-tolerant boot-up plan.
The boot system command is a global configuration command that allows you to
specify the source of the IOS Software image to load. Some of the syntax options
available include the following:
— boot system flash [filename]
3 If no boot system commands exist in the configuration, the router defaults to loading
the first file in Flash memory and running it.
4 If no valid file is found in Flash, the router attempts a netboot using the boot field value
as a pointer for the name of the file to request to be downloaded.
NOTE netboot is a seldom-used method of loading an IOS Software image. If netboot fails, and
the configuration register is set to the default settings, the router boots the rxboot file from
ROM.
5 If no rxboot (mini-IOS) file exists, or if it is corrupted, the router boots the ROM
monitor (ROMMON) from ROM.
398 Chapter 10: Managing Your Network Environment
The flowchart shown in Figure 10-3 displays the sequence of events that occur during router
boot.
Before you alter the configuration register, you should determine how the router is currently
loading the software image. Use the show version command to obtain the current
configuration register value, as illustrated in Example 10-14. The last line of the display
from the show version command contains the configuration register value.
Example 10-14 Use show version to Display Current Router Configuration Register Value
wg_ro_a#show version
I0S (tm) 2500 Software (C2500-JS-L), Version 12.0(3), RELEASE SOFTWARE (fcl)
Example 10-14 Use show version to Display Current Router Configuration Register Value (Continued)
--More--
If you are in ROM monitor mode, use the o or the config-register command to list the
configuration register setting. The command to use is processor- and platform-dependent.
You can determine which command to use by using a ? at the rommon> prompt.
You can change the default configuration register setting with the global configuration
mode command config-register, as demonstrated in Example 10-15.
Example 10-15 Use the config-register Command to Change the Router Default Configuration Register Setting
Router#configure terminal
Router(config)#config-register 0x2102
[Ctrl-Z]
Router#reload _(_
NOTE Configuration parameters changed in configuration mode are dynamic and do not require a
reload. This is not the case for the config-register command. This change alters a memory
stack of the router and requires a reload before the value is set. Because this value is
checked only during the boot process, it is not critical to reload the router immediately after
changing the register.
The configuration register is a 16-bit register. The lowest 4 bits of the configuration register
(bits 3, 2,1, and 0) form the boot field. A hexadecimal number is used as the argument to
set the value of the configuration register.
400 Chapter 10: Managing Your Network Environment
• Set the boot field to 0 (0x0) to enter ROM monitor mode automatically upon next
reboot. This value sets the boot field bits to 0-0-0-0. The router displays the > or the
rommon> prompt in this mode. You can boot manually using the b or reset command.
• Set the boot field to 1 (0x1) to configure the system to boot automatically from ROM.
This value sets the boot field bits to 0-0-0-1. The router displays the Router(boot)>
prompt in this mode.
• Set the boot field to any value from 2 to F (0x2 to OxF) to configure the system to use
the boot system commands in NVRAM. This is the default. These values set the boot
field bits to 0-0-1-0 through 1-1-1-1.0x2 is the default setting.
Use the show version command to verify your changes in the boot field setting, as
demonstrated previously in Example 10-14.
WARNING When you use the config-register command, you set all 16 bits of the configuration
register. Be careful to change only the bits that you are trying to change (the boot field, for
example) and leave the other bits as they were. Remember that the other configuration
register bits perform functions that include the selection of console baud rate and whether
to use the configuration in NVRAM.
When the specified IOS image file is located, the image is normally loaded into RAM to
run. Some routers, including the Cisco 2500 series, do not have an architecture that would
accommodate the IOS image, system tables, and system buffers in RAM, and therefore run
• (execute the IOS software) directly from Flash memory.
If the image is to be loaded from Flash into RAM, it must first be decompressed. The files
are compressed in Flash memory to save space. The IOS image file starts after it is decom¬
pressed into RAM. Figure 10-4 illustrates this process.
RAM
Console
Router Booting Sequence and Verification Commands 401
The show flash command displays the contents of Flash memory, which includes the image
filenames and sizes, as shown in Example 10-16.
Example 10-16 show flash Command Displays Flash Memory Contents
wg_r°_a#sh°w flash
1 10084696 c2500-js-l_120-3.bin
in NVRAM that the router uses on the next restart. Example 10-17 and Example 10-18
demonstrate some sample output for the show running-config and show startup-conflg
commands, respectively.
Example 10-17 show running-config Command Displays the Current Router Configuration Running in RAM
wg_ro_c#sh°w running-config
Building configuration...
Current configuration:
I
version 12.0
I
-- More --
Example 10-18 show startup-config Command Displays the Router Configuration Saved in NVRAM
w9_r°_c#show startup-config
version 12.0
i
-- More --
You know that you are looking at the active configuration file when you see the words
Current configuration at the top of the display, as highlighted in Example 10-17.
You know that you are looking at the stored configuration file when you see a message at
the top telling you how much nonvolatile memory has been used, as highlighted in Example
10-18.
The IOS copy commands move configurations from one component or device to another,
as illustrated in Figure 10-6.
Router Booting Sequence and Verification Commands 403
Figure 10-6 IOS copy Commands Move Configurations Between Routers/Router Components
config term
(merge)
n
jpwBiMatfay
Console
Blank
000000
000000
The syntax of the copy command requires that the first argument indicate the source (from
where the configuration is to be copied) and then the destination (to where the configuration
is to be copied). For example, in the command copy running-configuration tftp (copy run
tftp), the running configuration in RAM is to be copied to a TFTP server.
You can copy a running configuration to NVRAM to be saved with the copy running-
configuration startup-configuration (copy running startup) command. This command
is used any time you make a configuration change and want to save it. Going the other way,
you can copy the saved configuration in NVRAM back into RAM with copy startup-
configuration running-configuration (copy startup running). Note that the commands
can be abbreviated.
Analogous commands exist for copies between a TFTP server and either NVRAM or RAM.
NOTE When a configuration is copied into RAM from any source, the configuration merges with,
or overlays, any existing configuration in RAM rather than overwriting it. New configur¬
ation parameters are added, and changes to existing parameters overwrite the old para¬
meters. RAM configuration commands for which there are no corresponding commands in
NVRAM are untouched.
404 Chapter 10: Managing Your Network Environment
Configurations are created interactively from the console (or remote terminal) with the
configure terminal (config t) command.
Commands entered from configuration mode or files copied into a running configuration
are merged with the existing information. If a file is copied into NVRAM, it is a complete
overwrite. If you need to delete the NVRAM file, the erase startup-configuration
command writes Os into NVRAM and thereby deletes the saved configuration.
TFTP servers can be used to store configurations in a central place. These devices must be
set up and configured before the upload. The upload process allows centralized manage¬
ment and updates of configuration files.
The copy running-config tftp command allows you to upload and save your current
configuration to a TFTP server. You are required to supply the TFTP server’s address or
name and to specify a filename for your uploaded configuration, as demonstrated in
Example 10-19.
Example 10-19 copy running-config tftp Command Uploads and Saves the Local Router Configuration to a TFTP
Server
In the display, the series of exclamation marks shows the progress of the upload.
The copy tftp running-config command downloads a configuration file from the TFTP
server to running memory. Again, you must specify the address or name of the TFTP server
and the filename of the configuration you want to download. Remember that this is a merge
process, not an overwrite. Example 10-20 demonstrates sample output from the copy tftp
running-config command.
Example 10-20 copy tftp running-config Command Downloads a Configuration File from a TFTP Server to Active
Router Configuration
1 The router IOS is usually found in_, and the saved configuration file
(startup-config) is usually found in_.
A Flash memory; RAM
A Load IOS
B Load bootstrap
C Find configuration
D Load configuration
3 Which router component is used primarily to contain the Cisco IOS Software image?
A RAM
B NVRAM
C Flash memory
D Configuration register
4 Which component tests the basic functionality of the router hardware and determines
which components are present?
A POST
B Bootstrap
C Mini-IOS
D ROM monitor
406 Chapter 10: Managing Your Network Environment
5 When a Cisco router starts up, where does it look to find the Cisco IOS Software, by
default, if the saved configuration file in NVRAM does not contain boot system
commands?
A ROM
B RAM
C NVRAM
D Flash memory
6 During the boot process, which of the following describes where the device boots
from if the boot field value is 0x2?
7 Which Cisco IOS command displays the current value of the configuration register?
A show config
B show version
C show startup-config
D show config-register
8 If the configuration register value is 0x2100, what does the router do the next time it
boots?
One key feature of the IFS is the use of the Universal Resource Locator (URL) convention
to specify files on network devices and the network. For example, the command to copy
from NVRAM to a TFTP server would be as follows:
Switch#copy startup-configuration tftp://I72.16.100.15/config.txt
172.16.100.15 is the IP address of the TFTP server, and config.txt is the name of the file to
be saved.
Table 10-4 lists some commonly used URL prefixes for Cisco network devices.
Prefix Description
flash: Flash memory. This prefix is available on all platforms. For platforms that
do not have a device named flash:, the flash: prefix is aliased to slotO:.
Therefore, you can use the flash: prefix to refer to the main Flash memory
storage area on all platforms.
nvram: NVRAM.
system: Contains the system memory, including the mnning configuration in RAM.
NOTE Commands presented in this book were the most commonly used formats at the time of
publication.
Table 10-5 lists the old and new commands used for configuration file movement and
management.
Production internetworks usually span wide areas and contain multiple routers. For any
network, it is always prudent to retain a backup copy of your Cisco IOS Software image in
case the system image in your router becomes corrupted.
Widely distributed routers need a source or backup location for software images. Using a
network server allows image and configuration uploads and downloads over the network.
The network server can be another router, a workstation, or a host system.
Before you copy software from Flash memory in the router to the network server, you
should perform the following tasks:
Step 1 Check to make sure that you have access to the network server.
Step 2 Verify that the server has sufficient room to accommodate the Cisco IOS
Software image.
Step 4 Create the destination file to receive the upload if required. This step is
network server operating system-dependent.
The show flash command is an important tool for gathering information about your router
memory and image file. With the show flash command, you can determine the following:
wg_ro_a#show flash
The name of the Cisco IOS image file contains multiple parts, each with a specific meaning.
For example, the filename c2500-js-l_120-3.bin (shown in Example 10-21) contains the
following information:
• The first part of the image name identifies the platform on which the image runs.
In this example, the platform is Cisco 2500 series router.
• The second part of the name identifies the special capabilities of the image file.
A letter or series of letters identifies the features supported in that image. In this
example, the j indicates that this is an enterprise image, and the s indicates that it
contains extended capabilities.
• The third part of the name specifies where the image runs and if the file is compressed.
In this example, 1 indicates that the file can be relocated and is not compressed.
• The fourth part of the name indicates the version number. In this example, the version
number is 120-3.
• The final part of the name is the file extension. The .bin extension indicates that this
file is a binary executable file.
The Cisco IOS Software naming conventions, field meaning, image content, and other
details are subject to change. Refer to your sales representative, distribution channel, or the
Cisco website for updated details.
Example 10-22 Using the copy flash tftp Command to Back Up Current Image Files Prior to Updating Flash
wg_ro_a#copy flash tftp
<output omitted>
wg_ro_a#
Cisco IOS File System and Devices 411
The copy tftp flash command requires you to enter the IP address of the remote host
and the name of the source and destination system image file, as demonstrated in
Example 10-23.
Example 10-23 copy tftp flash Command Copies the IOS Image File to the Network Server
Accessing tftp://10.1.1.1/c2500-js-l_120-3.bin...
Erasing the flash filesystem will remove all files! Continue? [confirm]
(output omitted)
wg_ro_a#
The copy tftp flash command prompts you for the IP address of the remote host and the
name of the source and destination system image file. Enter the appropriate filename of the
update image as it appears on the server.
After you confirm your entries, the procedure asks if you want to erase Flash. Erasing Flash
makes room for the new image. You should perform this task if you have insufficient Flash
memory for more than one Cisco IOS image.
If no free Flash memory space is available, or if the Flash memory has never been written
to, the erase routine is required before new files can be copied. The system informs you of
these conditions and prompts you for a response.
Each exclamation point (!) means that one User Datagram Protocol (UDP) segment has
been successfully transferred. Example 10-24 shows the complete syntax for copying a new
412 Chapter 10: Managing Your Network Environment
image from the TFTP server into Flash memory. Note that the image file is erased from
Flash memory before the new image is loaded. The output also displays a message that the
image already exists.
Example 10-24 copy tftp flash Command Copies an IOS Image File from the Network Server to the Router
Erasing the flash filesystem will remove all files! Continue? [confirm]
Step 2 Configure administrative access for the console, auxiliary, and virtual
terminal (vty) interfaces, as appropriate.
Step 3 Configure passwords for privileged EXEC mode for the device. For
privileged EXEC mode on a router, use the enable secret command so
that the password displayed in the configuration is encrypted.
Cisco IOS File System and Devices 413
Step 4 Configure the network management access to the device. If your site uses
Simple Network Management Protocol (SNMP) to manage network
devices, configure the appropriate SNMP parameters on the router.
Step 6 Configure the new device with the appropriate configuration to meet the
network requirements. The specific configuration depends on the
network requirements.
• Determine what to do with obsolete equipment. If it is to be put on the shelf for spares or
placed in a lab, you should erase the configuration after you complete the following tasks:
— Determine which devices connect to the equipment being moved.
— Determine if the move and reconfiguration affects the current security
policy.
— Determine if this device plays a role in the network that no other devices
play. For example, is a modem attached, and if so, will it be moved to
another device? Does this device also act as a TFTP server for Cisco IOS
images? If so, what will replace it?
— Review the facility considerations of the new location. Is there sufficient
power and cooling? Do you have rack space for your new equipment? How
is the wiring closet accessed? Is it secure from passersby?
— After the move and reconfiguration, test network connectivity.
Configuration changes are a regular part of any network maintenance plan and might reflect
changes in network topology, security policy, and preferred routes, as well as changes in
routing protocols.
• Power down the equipment when doing upgrades. Many Cisco routers support hot-
swapping, called online insertion and removal (OIR). Check the latest release notes
for your specific chassis to see if you need to power down the device before you add
new hardware.
• Have the appropriate modules available before scheduling the upgrade.
• Read the hardware installation manual and verify that you have the necessary
antistatic mat and grounding cable to prevent static discharges from ruining new
equipment. Some new hardware modules might require a minimum version of IOS to
operate. Check the requirements of your system before physically upgrading.
• Verify your organization’s policies and plans to make sure the hardware change
conforms.
414 Chapter 10: Managing Your Network Environment
If you are upgrading the Cisco IOS Software, review the release notes prior to installation.
Evaluate the following questions:
• Does the new version support all of the features you are currently using? Does it
support the features you plan on adding in the future?
• Does your platform have sufficient Flash memory to hold the new image? Does your
platform have sufficient RAM to support the feature set?
debug commands Check the flow of protocol traffic for problems, protocol bugs,
or misconfigurations
Table 10-6 describes the major differences between the show and debug commands.
Command Description
show Provides a static collection of information about the status
of a network device, neighboring devices, and network
performance. Use show commands when you are
gathering facts for isolating problems in an internetwork,
including problems with interfaces, nodes, media, servers,
clients, or applications.
debug
Provides a flow of information about the traffic being seen
(or not seen) on an interface, error messages generated by
nodes on the network, protocol-specific diagnostic
packets, and other useful troubleshooting data. Use debug
when you want to see process operations on the router or
network to determine if events or packets are working
properly.
Use debug commands to isolate problems, not to monitor normal network operation.
Because the high overhead of debug commands can disrupt router operation, you should
use debug commands only when you are looking for specific types of traffic or problems
and have narrowed your problems to a likely subset of causes.
Cisco IOS File System and Devices 415
• Be aware that the debug commands might generate too much data that is of little use
for a specific problem. You normally need to have knowledge of the protocol(s) being
debugged to properly interpret the debug outputs.
• Because the high CPU overhead of debug commands can disrupt network device
operation, you should use debug commands only when you are looking for specific types
of traffic or problems and have narrowed your problems to a likely subset of causes.
• When using the debug troubleshooting tools, be aware that output formats vary with
each protocol. Some generate a single line of output per packet, whereas others
generate multiple lines of output per packet.
• If running debug from a Telnet connection, you must enter the command terminal
monitor to see the output on the telnet privileged EXEC session.
• Use of debug commands is suggested for obtaining information about network traffic
and router status. Use these commands with great care.
• If you are unsure about the impact of a debug command, check the Cisco website for
details or consult with a technical support representative.
You should use three commands if you plan to use a debug command for troubleshooting.
Table 10-7 describes the use of these commands.
Command Description
show processes Displays the CPU utilization for each process. This
data can influence your decision about using a
debug command, if it indicates that the production
system is already too heavily used for adding a
debug command.
no debug all or undebug all Disables all debug commands. This command can
free up system resources after you finish debug.
Because the problem condition is an abnormal situation, you might be willing to temporarily
trade off switching efficiency for the opportuni ty to rapidly diagnose and correct the problem.
To effectively use debugging tools, you need to know about the following:
• How to minimize the impact of your troubleshooting in other processes competing for
resources on the network device
• How to stop the troubleshooting tool when you are finished diagnosing so that the
router can resume its most efficient switching.
It is one thing to use debug to troubleshoot a lab network that lacks end user application
traffic. It is another thing to use debug on a production network that users depend on for
data flow. Without proper precautions, the impact of a broadly focused debug could make
matters worse.
With the proper, selective, and temporary use of these tools, you can easily obtain
potentially useful information without needing a protocol analyzer or other third-party tool.
• Ideally, it is best to use debug commands during periods of lower network traffic and
fewer users. Debugging during these periods reduces the effect these commands have
on other users on the system.
When you interpret the information you need from the debug command and undo the
debug (and any other related configuration setting if any), the router can resume its
faster switching and you can resume your problem-solving, create a better targeted
action plan, and be better able to take the action that fixes the network problem.
All debug commands are entered in privileged EXEC mode, and most debug commands
take no arguments.
WARNING Do not use the debug all command because this can cause a system crash.
To list and see a brief description of all the debugging command options, enter the
debug ? command in privileged EXEC mode.
By default, the network server sends the output from debug commands and system error
messages to the console. You can use syslog to monitor debug messages rather than using
the console port. To redirect debugging output, use the logging command options within
configuration mode. Possible destinations include the console, virtual terminals, internal
buffer, and UNIX hosts running a Syslog server. The Syslog format is compatible with 4 3
Berkeley Standard Distribution (BSD) UNIX and its derivatives. Syslog is also available for
Windows products.
Cisco IOS File System and Devices Section Quiz 417
1 What is the Cisco IOS 12.0 IFS name for the running-config file?
A running-config
B RAM:running-config
C systenr.running-config
D memory:running-config
2 Which Cisco IOS command(s), starting in Cisco IOS Release 12.0, deletes the startup
configuration?
A erase nvram:
B delete nvram:
C erase startup-config
D delete startup-config
3 Which Cisco IOS command creates a backup copy of the IOS image file on a TFTP
server?
4 Which command displays the size of the IOS image file in Flash memory?
A show flash
5 For which reasons would you copy configuration files from a TFTP, RCP, or FTP
server to the running configuration or startup configuration of a router? (Choose
three.)
E To load the same configuration commands onto all the routers in your network
6 Which Cisco IOS command merges a configuration file from a TFTP server into the
current configuration?
8 When adding new equipment to the network, what is the final step you should take?
C Configure administrative access for the console, auxiliary, and vty interfaces.
D Configure the new device with the appropriate configuration to meet the network
requirements.
Chapter Summary 419
9 When you make a hardware change to your router, should you power down the
device?
A Never
B Always
10 Which type of Cisco IOS command should you use to create a snapshot of network
conditions to troubleshoot problems with interfaces, media, or network performance?
A debug commands
B trace commands
C show commands
D config commands
11 Which type of Cisco IOS command should you use to view a process operating on a
router or the network for troubleshooting purposes?
A trace commands
B show commands
C config commands
D debug commands
Chapter Summary
In this chapter, you learned commands that help you determine names and addresses of
neighboring devices. You also learned how to use CDP to obtain information remotely,
given an operational switch and router. You also saw how to use information gathered using
CDP, Telnet, and Cisco IOS commands to create a simple network map of their environ¬
ment, given operational Cisco network devices. Finally, this chapter discussed how to move
configuration files between system components and network file servers, given an
operational Cisco router.
420 Chapter 10: Managing Your Network Environment
3 How could you obtain CDP information about a nondirectly connected remote
device?
4 Which pieces of information are included in a CDP update packet? (Choose two.)
A Platform
B Routing updates
C Device identifiers
A no run cdp
B no cdp run
C no cdp enable
D no cdp execute
7 Which Cisco IOS command produces the same result as show cdp neighbors detail?
8 What keyword do you add to the show cdp neighbors command to obtain additional
information in the output?
A full
B detail
C verbose
D complete
9 Which Cisco IOS command displays the frequency at which packets are sent?
10 What information is included in the output of the command show cdp interface?
A Remote port ID
B Remote device ID
C Encapsulation type
13 Which statements identify the primary uses of a network map? (Choose three.)
14 Which Cisco IOS commands open a Telnet session from a router to a device with the
host name switch 123 and the IP address 10.1.1.2? (Choose two.)
A open 10.1.1.2
B telnet 10.1.1.2
D 10.1.1.2 connect
E telnet switch!23
F switch!23 connect
15 Which Cisco IOS command displays a list that includes all Telnet sessions currently
connected to other devices?
A show logins
B show telnet
C show sessions
D show connections
16 What does an asterisk (*) mean in the output of the show sessions command?
D Makes three attempts to resume the most recently suspended Telnet session
19 When you have multiple active Telnet sessions and enter the command resume, which
Telnet session is continued?
20 At what level of the Cisco CLI do you execute the disconnect command?
22 Which pieces of information are displayed as the result of the ping command?
(Choose three.)
A Packets lost
C Source address
23 Which Cisco IOS command would you use to display the path a packet takes to a
specific destination?
A ping
B trace
Chapter Review Questions 425
C show path
D show sessions
A POST
25 Which stage of the Cisco router bootup process verifies that all router components are
operational?
A POST
B Find IOS
C Find bootstrap
D Find configuration
26 Which Cisco router component is used primarily to store the startup configuration?
A RAM
B ROM
C NVRAM
D Flash memory
E Configuration register
A POST
B Bootstrap
C Partial-IOS
28 During the Cisco router boot process, what does the router do if the boot field value
is 0x2?
29 What happens if the router cannot find a valid startup configuration file in NVRAM
during router bootup?
30 On most routers, the IOS Software is loaded into_to run, but on some it is run
directly from_.
A RAM; NVRAM
31 From the ROM monitor, which should you enter to determine the current value of the
configuration register?
A o
B V
C show version
D show config-register
B RAM
Chapter Review Questions 427
C NVRAM
D Flash memory
33 Which bits of the configuration register value make up the boot field?
A Lowest octet
B Highest octet
C Lowest 4 bits
D Highest 4 bits
34 Which Cisco IOS command downloads a copy of the IOS image file from a TFTP
server?
35 Given the system image file c25Q0-js-l_120-3.bin, which part of the name indicates
the platform?
A 1
B js
C 120-3
D c2500
36 Which Cisco mIOS command displays the amount of Flash memory available on your
router?
A show flash
B show nvram
C show memory
D show running-config
428 Chapter 10: Managing Your Network Environment
A Flash
B RAM
C NVRAM
D Bootflash
38 Which Cisco IOS command merges a configuration file from NVRAM into the
configuration in RAM?
D Merges the configuration in RAM with the configuration file on a TFTP server
40 When you copy a configuration from another source into RAM, what happens to the
existing configuration?
A It is overwritten.
C It is merged with the new configuration, with the existing configuration taking
precedence.
D It is merged with the new configuration, with the new configuration taking
precedence.
Chapter Review Questions 429
T
41 You should use debug commands to_problems, not to monitor normal network
operation.
A Test
B Repair
C Isolate
D Duplicate
43 Which Cisco IOS command adds a time stamp to a debug or log message?
A timestamps debug
B debug timestamps
C service timestamps
45 Which Cisco IOS command enables a Telnet session to receive console messages?
A terminal monitor
A Lower; more
B Lower; fewer
C Higher; more
D Higher; fewer
Part
IV
Appendixes
Appendix A Answers to the Chapter Review Questions and Quizzes
Glossary
Appendix
A. True
3 Which of the following are true statements about a NIC?
B. E-mail
C. FTP
F. Web browser
3 All corporate internetworks use the same components regardless of their business
structure.
B. False
-A_Defines the maximum transmission distance and data rates for a network.
_C_Provides connectivity and path selection between two hosts systems.
_Establishes, maintains, and terminates connectivity between devices.
2 For peer-to-peer communications, which of the following statements are true?
E. 0xF4EA95
B. NIC
3 Today, what are the common measurements for the speed of a computer
microprocessor? (Choose two.)
C. MHz
E. GHz
4 Convert the decimal number 240 into binary.
A. 11110000
5 What is the binary number 10111001 in decimal?
B. 185
6 Which of the following is an application-layer protocol?
B. ISO
8 An e-mail message is sent from Host A to Host B on a LAN. To send this message,
the data must be encapsulated. Which of the following best describes the first step of
data encapsulation?
Chapter 2
C. Star
4 What is the primary purpose of the second ring in a dual-ring network?
C. Redundancy
5 In a complete, full-mesh topology, every node
3 Which of the following is true concerning bridges and their forwarding decisions?
C. Bridges operate at OSI Layer 2 and use MAC addresses to make decisions.
4 Which of the following is true concerning the function of switches?
A. True
3 Which three functions are defined by the Cisco hierarchical model?
B. Distribution layer
C. Core layer
F. Access layer
4 Which of the following is a characteristic of a hub?
C. MAC address
6 Which of the following does a router forward?
C. Layer 3 datagrams
7 What does DSLAM stand for?
A. Software-based
B. Hardware-based
C. Filter traffic
9 Which OSI layer defines an address that consists of a network portion and a node
portion?
C. Layer 3
10 Which OSI layer defines a flat address space?
B. Layer 2
440 Appendix A: Answers to the Chapter Review Questions and Quizzes
Chapter 3
B. CSMA/CD
3 Fast Ethernet supports up to what transfer rate?
C. 100 Mbps
4 Identify two Gigabit Ethernet cable specifications.
C. 1000BASE-CX
D. 1000BASE-LX
A. An internetwork
D. DCE
4 DCE and DTE equipment is found at which layer of the OSI reference model?
C. Physical
C. X.21
B. SLIP
2 Which of the following does not correctly describe the features of CNs?
C. The CN was designed to accelerate the delivery of information over the MAN
infrastructure.
3 What service offers secure, reliable connectivity over a shared public network
infrastructure?
B. Intranet VPNs
5 What is the name for the part of the company’s LAN that is made available to select
parties such as employees, customers, or partners?
B. The extranet
C. 802.3u
4 What is the transmission medium for 1000BASE-SX?
D. VPN
11 What type of VPN links regional and remote offices to the headquarters’ internal
network?
B. Intranet VPN
12 An extranet is the extension of two or more intranet strategies with a secure interaction
between participant enterprises and their respective intranets.
A. True
Chapter 4
A. Radio frequencies
C. Fast Ethernet as a link between the access layer and distribution layer devices
to support the aggregate traffic from each Ethernet segment on the access
link
3 Which standard body created the cables and connector specification used to support
Ethernet implementation?
C. EIA/TIA
4 Which of the following statements does not correctly describe a media connector?
B. Serial
3 Which of the following media interconnects the ISDN BRI port to the service-
provider device?
A. UTP straight-through
4 What type of connector is used for DSL connection?
B. RJ-11
5 What type of connector connects a router and cable system?
C. F-Type
6 What type of cable connects a terminal and a console port?
B. Rollover
444 Appendix A: Answers to the Chapter Review Questions and Quizzes
B. 9 kbps-54 Mbps
3 At which layer of the OSI model do the cabling aspects of a LAN exist?
D. Physical
4 Which of the following are not optical GBICs?
A. A DTE device
7 If you are using an ISDN device that has an interface marked BRIS/T, what does this
imply?
Chapter 5
B. Collision
7 Which condition is a likely cause of network congestion?
D. Bandwidth-intensive applications
D. Store-and-forward switch
6 Which functionality best fits a Layer 2 switch?
7 Number the frame forwarding sequence in the correct order of occurrence for a switch
receiving a frame that has an unknown source address.
D, E, A, B, F, C
8 In which of the following conditions would a bridging loop most likely occur?
C. Switch port
A. MAC address
D. Router
C. Broadcast
Chapter 5 447
A. A section of the network to which a group of devices share the same physical
media
7 Which statement is not a characteristic of LAN switching?
B. Error checking
D. Full receipt of all bits before forwarding the frame
9 Which switching method looks at the destination address of the frame and then
forwards the frame without waiting to receive the entire frame?
A. Cut-through
10 What are the functions of the Spanning Tree Protocol? (Choose two.)
D. Store-and-forward
12 What function of a Cisco switch allows a user to create separate broadcast domains?
A. VLAN
13 Identify the benefits of using a VLAN. (Choose two.)
C. Router
15 Which statement pertaining to VLANs is false for Cisco switches?
16 VLANs can be created according to which category? (Choose all that apply.)
A. Ports
B. Groups
C. MAC addresses
D. Functional teams
E. Users sharing an application
17 What is the result of segmenting a switch into multiple VLANS? (Choose two.)
Chapter 6
IP Internet Layer Overview Section Quiz
1 Which of the following protocols operates at the TCP/IP network layer? (Choose
two.)
B. ARP
D. ICMP
C. Total length
D. Time-To-Live
F. Source IP address
8 Which statement best describes the function of a Protocol field in an IP diagram?
B. FTP
E. TFTP
6 Place the steps for establishing a connection with a peer system in the correct order.
3, 2, 4,1
450 Appendix A: Answers to the Chapter Review Questions and Quizzes
7 Which names correctly identify the encapsulation term at the transport layer?
(Choose two.)
B. Packet
C. Segment
8 Which terms identify a component of the TCP header? (Choose three.)
C. Window
D. Checksum
G. Sequence number
9 Which terms identify a component of the UDP header? (Choose two.)
B. Length
D. Checksum
10 Which statement best describes window size?
A. Routes datagrams
B. Forwards packets
D. Provides best-effort delivery
A. To test connectivity
6 What is the purpose of an ARP?
A. Flags
C. Protocol
E. Header checksum
9 What is the purpose of the Protocol field in an IP header?
A. Internet; Network
C. Transport; Transport
E. Network Access; Physical-Data Link
12 Which of the following are primary duties of Layer 4 TCP? (Choose two.)
A. Connections
B. Flow control
E. Fragment-free
14 Which application is supported by TCP?
C. FTP
452 Appendix A: Answers to the Chapter Review Questions and Quizzes
D. Segments
18 Which components are found in a TCP header? (Choose three.)
B. Window
D. Checksum
E. Destination port
19 Which components are found in a UDP header? (Choose two.)
A. Length
E. Destination port
20 What flow control method does TCP implement?
D. Windowing
22 What will the ACK bit of the first segment of the three-way handshake most likely be?
B. 0
D. The well-known ports cover the range of possible port numbers from 0
through 1023.
Chapter 7
B. 32
3 In a Class B address, which of the octets are the host address portion and are assigned
locally?
B. Class B
5 Which of the following is true of a broadcast address?
A. 10.215.34.124
C. 172.17.10.10
7 What percentage of the total IPv4 address allocation is made up of Class A addresses?
B. 50
8 How many bits are there in an IPv6 address?
D. 128
9 Which of the following is a feature of CIDR?
D. Route aggregation
A. Two
2 What is the function of a subnet mask?
3 What is the practical maximum number of host bits you can borrow from a Class A
address for subnetting?
B. 22
4 List the steps for determining a subnetwork number in order.
3,1,2,4
5 How many octets does a Class A network have in the host field?
A. 3
6 Using 6 subnet bits, how many usable subnets are created?
C. 62
7 How many host addresses can be used in a Class C network?
B. 254
8 What is the maximum number of bits that can be borrowed to create a useable subnet
for a Class C network?
C. 6
3 Which of the following statements about the path determination process is not
correct?
4 Which of the following contains routing information that helps a router in determining
the routing path?
C. Routing table
5 Which of the following are goals for routing protocols? (Choose three.)
A. Optimization
C. Simplicity
D. Rapid convergence
Chapter 7 455
C. Length
A. Every 30 seconds
6 By default, which of the following is a routing metric used by IGRP?
C. Routing protocol
C. 127.0.0.0
3 What is the translation of private addresses to public addresses referred to as?
D. NAT
456 Appendix A: Answers to the Chapter Review Questions and Quizzes
4 Which is the IP protocol that is being implemented to increase the number of network
addresses available?
C. IPv6
5 How many host addresses are available if the IP subnet address is 206.15.8.0/20?
C. 4094
C. 255.255.240.0
8 How many subnets could be created if six bits are borrowed?
D. 62
9 What are the key functions of a router? (Choose all that apply.)
B. Use routing tables to determine the optimal path for network traffic
C. Determine where to forward a packet of data
D. Add necessary framing for an interface
C. The packet is re-encapsulated in the data link layer frame for the selected
interface and transmitted.
11 What are some informational items contained in a routing table? (Choose two.)
A. Destination/next-hop associations
B. Routing metric
12 Which of the following is not a routing protocol?
C. IP
13 A router compares the destination network address to a routing table to select a path.
A. True
14 For a Cisco router, which of the following is used by the Cisco IOS to help measure
delay?
B. Bandwidth
B. Routing protocols
Chapter 8 457
B. LSA
17 When using RIP, what is the hop-count limitation?
C. 15
18 Which of the following are benefits of IGRP when compared to RIP? (Choose two.)
Chapter 8
A. ISDN
3 Which of the following phrases describes a packet-switching protocol?
A. A switching method in which users share common carrier resources for data
transmission
4 A leased line is a_link that provides a single, preestablished
WAN communication path from the customer to a remote network.
C. STM
5 How many DSOs can be bundled to get a DS1/T1 line?
A. 24
6 Which of the following is a type of physical-layer multiplexing? (Choose all that
apply.)
A. TDM
B. FDM
C. WDM
458 Appendix A: Answers to the Chapter Review Questions and Quizzes
B. HDLC
3 Which of the following statements pertaining to ISDN is false?
A. ANSI
B. ITU-T
E. ETSI
D. ATM cells are always a fixed length of 35 bytes, whereas the sizes of frames
and packets vary.
10 Name the family of very high-speed physical layer technologies that offers a series of
data rates with special designations implemented at different transmission rates
ranging from 51.84 Mbps to 40 Gbps.
C. SONET
D. Y.90
3 Which of the following media are used by a cable modem to transport data?
C. Coaxial cable wiring offers greater bandwidth using broadband for more
applications to the home network.
B. ATM
5 Which of the following is not true regarding permanent virtual circuits (PVCs)?
B. Data communication across a PVC requires call setup and termination states.
A. 48 bytes
7 What is the aggregate speed of the B channels for ISDN BRI?
C. 128 kbps
460 Appendix A: Answers to the Chapter Review Questions and Quizzes
8 Which of the following is data-link encapsulation for a WAN? (Choose all that apply)
D. ADSL
10 Which of the following protocols do not operate at Layer 2?
D. IP
A. True
12 Which was the first true worldwide standard for modems that allowed 2400 bits per
second (bps) at 600 baud?
E. V.22bis
13 Which of the following statements about cable modems are true? (Choose three.)
A. Cable modems use the same coaxial lines that transmit cable television.
B. Cable modem access provides speeds that are superior to leased lines.
C. Cable modems provide a full-time connection.
Chapter 9
D. Interprets the commands you enter and carries out the corresponding
operations
3 What should you type to display a list of commands that begin with the letter a on a
Catalyst switch?
A. a?
4 What should you type to display the command syntax help so that you can see how to
complete a command that begins with show?
B. show ?
Chapter 9 461
5 Which Cisco IOS command takes you from the Router> prompt to the Router#
prompt on a Cisco router?
C. enable
6 When the information displayed on a Cisco router is more than one page in length,
what should you do to display the next page?
B. You did not enter all of the keywords or values required by the command.
8 What should you do if you receive a % Ambiguous command message on your Cisco
router?
C. Reenter the command followed by a question mark (?) with no space between
the command and the question mark.
9 What does the Cisco IOS CLI do when you enter a command that is longer than
allowed on a single line?
B. The router automatically scrolls the line to the left and uses a dollar sign ($)
to indicate that the beginning of the line is elsewhere.
10 What happens when you press the Tab key when working in the CLI?
A. Recall commands
C. Set the command history buffer size
E. Display the contents of the command buffer
12 Which of the following recall commands displays what is in history buffer beginning
with the most recent command? (Choose two.)
B. Ctrl-P
C. Up arrow
13 What happens when you start a Cisco IOS device that has no configuration in
memory?
A. ?
20 Which EXEC mode allows you to configure and debug a Cisco router?
D. Privileged
3 Which LED display modes of operation are used on a Catalyst switch? (Choose
three.)
A. Port status
D. Full-duplex support
E. Bandwidth utilization
4 After a successful completion of the initial hardware testing, what do the port LEDs
on a Catalyst switch do?
C. The LEDs blink after the tests are complete and then turn off.
5 When a Cisco router powers up, it performs a_
7 If POST completes successfully on the Catalyst 2950 switch, what happens next?
D. You are prompted to enter the initial configuration for the switch.
8 When the router starts up, which actions do the startup routines perform?
(Choose three.)
A. Run POST.
E. Find and load the Cisco IOS software that the router uses for its operating
system.
F. Find and apply the configuration statements about router-specific attributes,
protocol functions, and interface addresses.
9 Why would you use the setup dialog on a Cisco device?
C. Enter no shutdown.
3 Which Cisco IOS command displays the interface bandwidth on a Cisco switch?
A. show interfaces
4 Match each data-link protocol status to the message that appears with the show
interfaces command.
A. hostname hostname
3 What must you configure to ensure that anyone accessing your router from the
console port is prompted for a password?
4 Which Cisco IOS command configures Ethernet port 1 on a fixed port router?
B. interface Ethernet 1
5 Which Cisco IOS command do you use to bring up an interface on a Cisco router that
is “administratively down”?
C. no shutdown
3 Which Cisco IOS command displays the current active configuration settings on a
Catalyst switch?
D. show running-configuration
B. Reliability
4 When a Catalyst switch or Cisco router starts up, what is the first operation
performed?
C. Console terminal
7 Which access level allows a person to access all router commands and can be
password protected to allow only authorized individuals to access the router?
A. Hostname#
10 Which command would you enter in the privileged EXEC mode to list the command
options?
A. ?
11 Match each step of the physical Catalyst switch startup process to its description.
D. Attach the power cable plug to the switch power supply socket.
13 What color is the Catalyst 2950 switch redundant power supply LED if the redundant
power supply is plugged in but not functioning correctly?
B. Amber
14 During a Catalyst switch POST test, what is the result of the console port test failing?
B. This is a nonfatal error, but one or more ports will not be operational.
15 What should you type to display a list of commands that begin with the letter c on a
Catalyst switch?
A. c?
16 What should you type to display the command syntax help so that you can see how to
complete a command that begins with config?
B. config ?
17 Which configuration mode do you use to configure a particular port on a switch?
C. Address is 0050.BD73.E2C1
19 Which show command requires that you have privileged EXEC mode access?
C. show running
466 Appendix A: Answers to the Chapter Review Questions and Quizzes
A. You cannot configure anything; the user mode commands are used to display
information.
24 Which Cisco IOS command is used to return to user EXEC mode from the privileged
EXEC mode?
C. disable
25 Match each type of help available with the Cisco IOS CLI to its description.
1-A, 2-C, 3-B
26 When you enter Cisco IOS commands on a router, which CLI editing key sequence
redisplays a line?
C. Ctrl-R
28 Which Cisco IOS command sets the session command buffer size?
29 Which command returns to more recent commands in the history buffer after recalling
commands? '
A. Ctrl-N
30 What information does the show running-config command provide on a Cisco router?
31 Which Cisco IOS command displays the configuration of the system hardware and the
software version information?
A. show version
D. exec-timeout 0 0
37 Which Cisco IOS command configures serial port in slot 0, port 1 on a modular
router?
40 What is a runt?
C. An Ethernet frame that has been discarded because it is smaller than the
minimum Ethernet frame size
41 A serial interface displays Seriall is up, line protocol is down. Which situations
might cause this error? (Choose three.)
Chapter 10
B. Port identifier
C. Capabilities list
5 Which command disables CDP on a specific interface?
B. no cdp enable
6 What does the command no cdp run do?
7 Which Cisco IOS command produces the same result as show cdp entry *?
8 If the letters R and B appear in the Capabilities column in the output of the show cdp
neighbors command, it indicates that the specified device is acting as both a
and a_.
10 What information is included in the output of the command show cdp traffic?
11 Which CDP commands can you use to display the network layer address information
of the CDP neighbor? (Choose two.)
A. Addressing
B. Rack layouts
E. Cable identification
C. <Ctrl-Shift-6>x
4 Which actions continue a suspended Telnet session? (Choose two.)
A. exit
B. logout
6 Which command ends an incoming Telnet session from a remote device?
C. clear line
7 Which pieces of information are displayed as the result of the ping command?
(Choose three.)
B. Success rate
D. Average round-trip time
E. Minimum round-trip time
470 Appendix A: Answers to the Chapter Review Questions and Quizzes
B. Connectivity
B. Load bootstrap
3 Which router component is used primarily to contain the Cisco IOS software image?
C. Flash memory
4 Which component tests the basic functionality of the router hardware and determines
which components are present?
A. POST
5 When a Cisco router starts up, where does it look to find the Cisco IOS Software, by
default, if the saved configuration file in NVRAM does not contain boot system
commands?
D. Flash memory
6 During the boot process, which of the following describes where the device boots
from if the boot field value is 0x2?
7 Which Cisco IOS command displays the current value of the configuration register?
B. show version
8 If the configuration register value is 0x2100, what does the router do the next time it
boots?
2 Which Cisco IOS command(s), starting in Cisco IOS Release 12.0, deletes the startup
configuration?
A. erase nvram:
C. erase startup-config
Chapter 10 471
3 Which Cisco IOS command creates a backup copy of the IOS image file on a TFTP
server?
A. show flash
5 For which reasons would you copy configuration files from a TFTP, RCP, or FTP
server to the running configuration or startup configuration of a router? (Choose
three.)
D. Configure the new device with the appropriate configuration to meet the
network requirements.
9 When you make a hardware change to your router, should you power down the
device?
C. show commands
11 Which type of Cisco IOS command should you use to view a process operating on a
router or the network for troubleshooting purposes?
D. debug commands
472 Appendix A: Answers to the Chapter Review Questions and Quizzes
3 How could you obtain CDP information about a nondirectly connected remote
device?
B. no cdp run
6 What does the command cdp enable do?
7 Which Cisco IOS command produces the same result as show cdp neighbors detail?
B. show cdp entry *
8 What keyword do you add to the show cdp neighbors command to obtain additional
information in the output?
B. detail
9 Which Cisco IOS command displays the frequency at which packets are sent?
C. show cdp interface
10 What information is included in the output of the command show cdp interface?
C. Encapsulation type
13 Which statements identify the primary uses of a network map? (Choose three.)
B. telnet 10.1.1.2
E. telnet switchl23
15 Which Cisco IOS command displays a list that includes all Telnet sessions currently
connected to other devices?
C. show sessions
16 What does an asterisk (*) mean in the output of the show sessions command?
A. Packets lost
D. Maximum round-trip time
E. Size of the ICMP echo packets
23 Which Cisco IOS command would you use to display the path a packet takes to a
specific destination?
B. trace
474 Appendix A: Answers to the Chapter Review Questions and Quizzes
A. POST
26 Which Cisco router component is used primarily to store the startup configuration?
C. NVRAM
28 During the Cisco router boot process, what does the router do if the boot field value
is 0x2?
30 On most routers, the IOS software is loaded into_to run, but on some it is run
directly from_.
31 From the ROM monitor, which should you enter to determine the current value of the
configuration register?
A. o
33 Which bits of the configuration register value make up the boot field?
34 Which Cisco IOS command downloads a copy of the IOS image file from a TFTP
server?
35 Given the system image file c2500-js-l_120-3.bin, which part of the name indicates
the platform?
D. c2500
Chapter 10 475
36 Which Cisco IOS command displays the amount of Flash memory available on your
router?
A. show flash
37 Where is the IOS device’s running conhguration always stored?
B. RAM
38 Which Cisco IOS command merges a configuration file from NVRAM into the
configuration in RAM?
D. It is merged with the new configuration, with the new configuration taking
precedence.
41 You should use debug commands to_problems, not to monitor normal network
operation.
C. Isolate
42 Why must you be careful when using debug commands?
C. service timestamps
44 Which action can lead to software reload on a Cisco device?
A. Terminal monitor
46 It is best to use debug commands during periods of_network traffic and-
users.
B. Lower; fewer
Glossary
ATM. Asynchronous Transfer Mode. The international standard for cell relay in
which multiple service types (such as voice, video, or data) are conveyed in fixed-
length (53-byte) cells. Fixed-length cells allow cell processing to occur in
hardware, thereby reducing transit delays. ATM is designed to take advantage of
high-speed transmission media, such as E3, SONET, and T3.
478 AUI
AUI. attachment unit interface. IEEE 802.3 interface between a media attachment
unit (MAU) and a network interface card (NIC). The term AUI also can refer to the
rear panel port to which an AUI cable might attach. Also called transceiver cable.
B
backplane. The internal connections between ports or interfaces on a switch or
router usually in the form of several buses.
BPDU. bridge protocol data unit. A Spanning Tree Protocol hello packet that is
sent out at configurable intervals to exchange information among bridges in the
network.
bridge. A device that connects and passes packets between two network
segments that use the same communications protocol. Bridges operate at the data
link layer (Layer 2) of the OSI reference model. In general, a bridge filters,
forwards, or floods an incoming frame based on the MAC address of that frame.
broadcast. A data packet that is sent to all nodes on a network. Broadcasts are
identified by a broadcast address.
Cisco IOS Software 479
broadcast domain. A set of all devices that receive broadcast frames originating
from any device within the set. Broadcast domains typically are bounded by
routers because routers do not forward broadcast frames.
buffer. A storage area used for handling data in transit. Buffers are used in
internetworking to compensate for differences in processing speed between
network devices. Bursts of data can be stored in buffers until they can be handled
by slower processing devices. Also called a packet buffer.
bus. A signaling path made up of wires or other media that allow electronic
signals to be sent from one part of a device to another.
C
canonical. Addresses that are sent on the wire with the least significant or low
order bit first. Ethernet addresses are canonical. For each byte of the Ethernet
address the last bit of the byte is sent first.
cell. The basic data unit for ATM switching and multiplexing. Cells contain
identifiers that specify the data stream to which they belong. Each cell consists of
a 5-byte header and 48 bytes of payload.
Cisco IOS Software. Cisco operating system software that provides common
functionality, scalability, and security for all Cisco products. Cisco IOS Software
allows centralized, integrated, and automated installation and management of
internetworks while ensuring support for a wide variety of protocols, media,
services, and platforms.
480 coaxial cable
collision domain. In Ethernet, the network area within which frames that have
collided are propagated. Repeaters and hubs propagate collisions; LAN switches,
bridges, and routers do not.
compression. The running of a data set through an algorithm that reduces the
space required to store, or the bandwidth required to transmit, the data set.
CPU. central processing unit. The main processor for a computing device. The
CPU runs instructions from the operating system to perform device functions.
D
daemon. A program that is not invoked explicitly but lies dormant waiting for
some condition(s) to occur.
debug. An application used by Cisco IOS devices that displays output for
operations being performed by the device. The debug application is extremely
processor intensive and can disrupt network service if not used carefully.
delay. The time between the initiation of a transaction by a sender and the first
response received by the sender. Also, the time required to move a packet from
source to destination over a given path.
DotIQ. A Cisco abbreviation for the IEEE standard 802.IQ that specifies
standards for bridged virtual LANs (VLANs).
E
EIA/TIA. Electronic Industries Alliance/Telecommunications Industry Alliance.
A group that specifies electrical transmission standards. The El A and the TIA have
developed numerous well-known communications standards, including EIA/TIA-
232 and EIA/TIA-449.
expansion slot. A slot in a computer for the installation of cards that provide
additional services such as communications or input/output devices.
F
FCS. frame check sequence. Extra characters added to a frame for error control
purposes. Used in High-Level Data Link Control (HDLC),Frame Relay, and other
data link layer protocols.
filtering. The process by which a network device screens traffic for certain
characteristics such as address, protocol, or application. When a particular
characteristic matches, the traffic is not relayed beyond the filtering process.
flush. A process used by switches to remove aged out entries from the MAC
address table.
hub 483
forwarding. The process by which a network device screens traffic for certain
characteristics such as address, protocol, or application. When a particular
characteristic matches, the traffic is then relayed to the appropriate port based on
these characteristics
forwarding table. A dynamic table built by Layer 2 switches that relates a device
MAC address to a port on the switch so that the filtering and forwarding processes
can take place.
FRAD. Frame Relay access device. Any network device that provides a
connection between a LAN and a Frame Relay WAN.
frame. A logical grouping of information sent as a data link layer unit over a
transmission medium. Often refers to the header and the trailer, used for
synchronization and error control, that surround the user data contained in the
unit. The terms cell, datagram, message, packet, and segment also describe logical
information groupings at various layers of the OSI reference model and in various
technology circles.
G-H
global configuration mode. The main configuration mode for a Cisco IOS
device that configures parameters common to the device or move to other
configuration modes.
holddown. A state into which a route is placed so that routers neither advertise
the route nor accept advertisements about the route for a specific length of time
(the holddown period). Flolddown flushes bad information about a route from all
routers in the network. A route typically is placed in holddown when a link in that
route fails.
hub. In Ethernet, a multiport repeater that acts as the center of a star topology
network.
484 IANA
I
IANA. Internet Assigned Numbers Authority. An organization operated under the
auspices of the ISOC as a part of the IAB. The IANA delegates authority for IP
address space allocation and domain name assignment to the InterNIC and other
organizations. IANA also maintains a database of assigned protocol identifiers
used in the TCP/IP stack, including autonomous system numbers.
L
LAN. local-area network. A high-speed, low-error data network covering a
relatively small geographic area (up to a few thousand meters). LANs connect
workstations, peripherals, terminals, and other devices in a single building or in
another geographically limited area. LAN standards specify cabling and signaling
at the physical and data link layers of the OSI model. Ethernet, FDDI, and Token
Ring are widely used LAN technologies.
latency. The delay between the time a device receives a frame and the time that
frame is forwarded out the destination port.
LLC. logical link control (TCP/IP). The higher of the two data link layer
sublayers defined by the IEEE. The LLC sublayer handles error control, flow
control, framing, and MAC-sublayer addressing. The most prevalent LLC
protocol is IEEE 802.2, which includes both connectionless and connection-
oriented variants.
loop. A route where packets never reach their destination, but simply cycle
repeatedly through a constant series of network nodes.
486 MAC
MAC. Media Access Control. The lower of the two sublayers of the data link layer
defined by the IEEE. The MAC sublayer handles access to shared media, such as
whether token passing or contention is used.
motherboard. A printed circuit board that houses the CPU, RAM, and expansion
slots for a personal computer.
MTU. maximum transmission unit. The maximum packet size, in bytes, that a
particular interface can handle.
N
NBMA. nonbroadcast multiaccess. A term describing a multiaccess network that
either does not support broadcasting (such as X.25) or in which broadcasting is not
feasible (for example, a Switched Multimegabit Data Service [SMDS] broadcast).
neighbor (router). In Open Shortest Path First (OSPF), two routers that have
interfaces to a common network. On multiaccess networks, neighbors are
discovered dynamically by the OSPF Hello protocol.
next hop. The next Layer 3 addressed interface for an internetwork path.
non-canonical. Addresses that are sent on the wire with the most significant or
high-order bit first. Token Ring addresses are non-canonical. For each byte of the
Token Ring address, the first bit of the byte is sent first.
O-Q
octet. A term meaning 8 bits in a row. In networking, the term octet often is used
(rather than byte) because some machine architectures employ bytes that are not
8 bits in a row.
PDU. protocol data unit. An OSI term used to describe a unit of data from a
particular layer of the OSI model.
POTS, plain old telephone service. A general term referring to the variety of
telephone networks and services in place worldwide. Sometimes called Public
Switched Telephone Network (PSTN).
printed circuit board (PCB). A multilayer circuit board on which chips are
placed to create computer components.
privileged EXEC mode. A mode used to view and modify the operational and
configurational parameters for a Cisco IOS device. This mode is also used to
access global configuration mode.
protocol. A formal description of a set of rules and conventions that govern how
devices on a network exchange information.
public domain. Computer software that has been written to be shared for free
with everyone. These program and operating systems are free for anyone to use
and/or altere, but cannot be resold or copyrighted by anyone.
R
RADIUS. Remote Authentication Dial-In User Service. A database that provides
a number of authentication services including authenticating modem and ISDN
connections and tracking user connection time.
RAM. random-access memory. A type of volatile memory that can be read and
written by a microprocessor.
RFC. Request For Comments. A document series used as the primary means for
communicating information about the Internet. Some RFCs are designated by the
Internet Architecture Board (IAB) as Internet standards. Most RFCs document
protocol specifications, such as Telnet and File Transfer Protocol (FTP), but some
are humorous or historical. RFCs are available online from numerous sources.
ROM. read-only memory. A type of nonvolatile memory that can be read, but not
written, by the microprocessor.
router. A network layer device that uses one or more metrics to determine the
optimal path along which network traffic should be forwarded. Routers forward
packets from one network to another based on network layer information.
S
SAID. Security Association ID. A value used in IEEE 802.10 FDDI frames for
security purposes.
SPF. Shortest path first is an algorithm developed by Dr. Edsger Dijkstra used by
link state protocols like OSPF and Intermediate System-to-Intermediate System
(IS-IS) to determine the best route through a network system.
switch. 1. A network device that filters, forwards, and floods frames based on the
destination address of each frame. The switch operates at the data link layer of the
Open System Interconnection (OSI) reference model. 2. A general term applied to
an electronic or mechanical device that allows a connection to be established as
necessary and terminated when a session to support no longer exists. 3. In
telephony, a general term for any device, such as a private branch exchange (PBX),
that connects individual phones to phone lines.
switch fabric. The internal connections between the ports of a switch used to
transmit data between end devices connected to these ports.
T
TACACS. Terminal Access Controller Access Control System. An authentication
protocol, developed by the Defense Data Network (DDN) community, that
provides remote access authentication and related services, such as event logging.
User passwords are administered in a central database rather than in individual
routers, providing an easily scalable network security solution.
Telnet. The standard terminal emulation protocol in the TCP/IP protocol stack.
Telnet is used for remote terminal connection, enabling users to log in to remote
systems and use resources as if they were connected to a local system. Telnet is
defined in RFC 854.
492 TFTP
TFTP. Trivial File Transfer Protocol. A simplified version of FTP that allows files
to be transferred from one computer to another over a network, usually without the
use of client authentication (for example, username and password).
trunk. 1. A physical and logical connection between two switches across which
network traffic travels. A backbone is composed of a number of trunks. 2. A
telephone company connection between two central offices (COs) or between a
CO and a private branch exchange (PBX).
trunking. The Cisco term used to describe marking Layer 2 VLAN identifiers on
ISL or IEEE 802.IQ links between network devices.
twisted pair. Physical medium consisting of two insulated wires twisted around
one another to decrease electromagnetic interference.
U-Z
UNIX. An operating system developed in 1969 at Bell Laboratories. UNIX has
gone through several iterations since its inception, which include UNIX 4.3 BSD
(Berkeley Standard Distribution), developed at the University of California at
Berkeley, and UNIX System V, Release 4.0, developed by AT&T.
A B
AAA servers, 78 backbone layer, 51
abbreviating commands, 321 backoff algorithms, 61
access layer (hierarchical network model), 50 backplane components, 10
access points, 127 backup IOS images, 409-411
access technologies, 293 balanced hybrid routing protocols, 268-269
ATM, 301 EIGRP, 271
DSL,296-299 bandwidth, 73,143
Frame Relay, 299-300 on Ethernet LANs, 159
HDLC, 294-295 on point-to-point WAN connections, 288
ISDN, 295-296 base 16 numbering system, 22
PPP,293-294 converting to binary, 23-26
SONET, 302-303 converting to decimal, 23-24
access VPNs, 110 best path selection, 267
accounting, 79 BGP (Border Gateway Protocol), 272
acknowledgment process, TCP three-w7ay binary numbering system, 14
handshakes, 210 converting to decimal, 20
address classes, 229-231 converting to hexadecimal, 25
address space, calculating, 249-250 bits, 14-15
addresses, network layer, 70-71 tokens, 54
adds, moves, and changes, 412-414 boot field, router configuration, 400
administratively disabling routers, 358 boot system command, 397
ADSL (asymmetric DSL), 297 boot system flash command, 397
analog modems, 305 boot system rom command, 397
APNIC (Asia Pacific Network Information Centre), boot system tftp command, 397
236 booting Cisco IOS devices, 332
application layer Catalyst switches, 332-337
OSI model, 34 Cisco routers, 337-343, 395
TCP/IP protocol stack, 40 bootloader, 396
applications. See also network applications bootstrap code, 395, 397
TCP/IP, 202 branch offices, 48
ARIN (American Registry for Internet Numbers), BRI (Basic Rate Interface), 296
229,236 bridging, 67, 162-163
ARP (Address Resolution Protocol), 258 frame forwarding decision process, 67
local ARP, 192 transparent, 67
messages, 193 broadcast addresses, 157, 232, 247-248
local broadcasts, 233
ARP cache, 192
496 broadcast domains
remote
Telnet sessions, displaying, 388-389 E
Telnet sessions, establishing, 387
Telnet sessions, re-establishing, 389 editing mode (CLI), 324-325
Telnet sessions, suspending, 389 EEPROM (erasable programmable read-only
Telnet sessions, verifying, 388-389 memory), 12
removable storage, 8 EGPs (Exterior Gatewav Protocols), 264
repeaters, 59 BGP, 272
routers, 96, 255 EIA/TIA-232 standard, 101
encapsulation process, 256 EIA/TLA-568 (SP-2840) Commercial Building
functions performed, 74 Telecommunications Wiring Standards, 133
routing tables, 257 EIGRP (Enhanced IGRP), 268-271
routes, displaying, 391 email client applications, 30
selecting, 77 EMI (electromagnetic interference), 121
startup, 332 enable passwords, 340
switches, 68-69, 76, 96 enable secret passwords, 340
traffic, displaying information, 382 encapsulation, 36-37,203
URL prefixes, 407 routing process, 256
virtual circuits, 97 ending Telnet sessions, 390
voice gateways, 77 enterprise services, 51
DHCP (Dynamic Host Configuration Protocol), 195 entries in routing tables, 258-259
directed broadcasts, 233, 247 error messages, CLI, 321
disconnect command, 390 establishing VLAN membership, 176
displaying Ethernet, 85, 87-88,155
active Telnet sessions, 388-389 bandwidth consumption, 159
device information with CDP, 379-380 bridging, 162-163
interface status, 383 collision domains, 158-159
neighboring device information, connection media, 133,136
379-382 connector requirements, 133
traffic information, 382-383 CSMA/CD, 61,86
user EXEC mode commands, 319-320 Fast Ethernet, 90-91
distance vector routing protocols, 265, 270 Gigabit Ethernet, 91-92
RIP,269 hubs, 60
distribution layer (hierarchical network IEEE 802.3 physical layer wiring standards,
model), 51 57-59
DIX Ethernet, 86 segments, 155
DLCIs (data-link connection identifiers), 300 communication between devices, 157-158
documenting network topology, 383-384, 390 maximum lengths, 156
with ping command, 390 selecting for campus networks, 132-133
with traceroute command, 391-392 switching, 163-164
dotted decimal notation, 72,229 bandwidth allocation, 165
download speed, units of measurement, 15 flooding, 168
DS3 (digital signal level 3), 301 frames, 167
DSL (Digital Subscriber Line), 296-297 identifying features, 164—165
standards, 297-299 loops, 168-169
WAN connections, 147 OSI layer functionality, 166
DSLAMs, 77 STP,170
DTE (data terminal equipment), 144, 299, 356 UTP implementation, 136-139
DUAL (Diffusing Update Algorithm) finite-state VLANs, 173-174
machine, 269-271 benefits of, 175
dual-ring topology, 54 communication between, 176
dynamic routes, 257 components of, 175
establishing membership, 176
exansion buses, 9
EXEC sessions, 315
exec-timeout 0 0 command, 354
expansion cards, 9
500 expansion slots
MHz (megahertz), 6, 16
microsegmentation, 68,164 O
mobile users, 48
modems, 97,305 OC (optical carrier) standards, 302
analog, 305 octets, 71,228
cable, 306-308 OIR (online insertion and removal), 413
modular serial ports, 145 open networking systems, 32
MOTD (message-of-the-day) banners, configuring, optical networking, Cisco ONS 15454 networking
353 system, 78
motherboard, 7 optimization, 259
expansion buses, 9 OSI reference model, 32
multicast transmission, 158 application layer, 34
multilayer switches, 76 data communications process, 36
multimode fiber-optic cable, 126 de-encapsulation, 38-39
multiplexing point-to-point WAN connections, 289-291 encapsulation, 36-37
data link layer, 35,155
bridges, 67
N CoS services, 65
frame forwarding decision process, 67
internetworking device
NAT (Network Address Translation), 236 functionality, 62
NCPs (Network Control Programs), 294 LLC sublayer frames, 64—65
neighboring devices, displaying CDP information, MAC sublayer frames, 63-64
379-381 switches, 68 -69
netboot command, 397 layers correlated to TCP/IP protocol
network access layer (TCP/IP protocol stack, 185
stack), 41 physical layer
network addresses, 73 cabling, 121
network applications, 29-30 coaxial cable, 123-124
network environment, documenting, 383-384 comparing media, 128-129
network ID, 233 fiber-optic cable, 125-126
network layer (OSI reference model), 35 selecting LAN cabling options,
addresses, 70-71 131-133,136
internetworking device functionality, twisted-pair cable, 121-123
69-70 UTP implementation, 136-139
IP addressing, 71 WAN implementations, 141-147
logical addresses, 71 wireless, 126-128
QoS marking, 72 multilayer devices, 76
router operation, 73-74 network layer, 35
network topology, documenting, 390 addresses, 70-71
with ping command, 390 internetworking device functionality,
with traceroute command, 391-392 69-70
NICs (network interface cards), 6, 11,27 logical addresses, 71
installing, 12 QoS marking, 72
wireless, 126 router operation, 73-74
no cdp enable command, 380 peer-to-peer communication, 39-40
no cdp run command, 380 physical layer, 35
NOS (network operating system), 28 broadcast domains, 59
notebook computers, 10 collision domains, 59
NT1 devices, 146 connectors, 57-59
numbering systems hubs, 60
binary, 14 internetworking device functionality, 56-57
converting to decimal, 20 media, 57-59
converting to hexadecimal, 25 repeaters, 59
decimal, converting to binary, 16-17, 20 presentation layer, 34
hexadecimal, 14,22 session layer, 34
converting to binary, 23-26 transport layer, 35
converting to decimal, 23-24 internetworking device functionality, 75-76
NVRAM (non-volatile RAM), 362, 396
504 OSPF (Open Shortest Path First)
WANs, 94-96
access technologies, 293
ATM, 301
DSL, 296-299
Frame Relay, 299-300
HDLC, 294—295
ISDN, 295-296
PPP,293-294
SONET, 302-303
asynchronous router connections, 148-149
circuit-switched, 286
connection technologies, 285
data link layer protocols, 102-103
devices, 96
CSU/DSU, 98
modems, 97
routers, 96
switches, 96
virtual circuits, 97
link types, 100
modems, 305
analog, 305
cable, 306-308
packet-switched, 287
physical layer, 100-101, 141-142
cable connections, 147
DSL connections, 147
ISDN BRI connections, 146-147
serial connections, 142-145
point-to-point, 287
bandwidth, 288
multiplexing, 289-291
provider service types, 96
service providers, 98-100
signaling standards, 98-100
WDM (wavelength division multiplexing), 291
well-known port numbers, 209
where command (UNIX), 389
who command (UNIX), 389
windowing, TCP flow control, 213-214
wireless networks, 126, 128
wiring, IEEE 802.3 standards, 57, 59
X-Z
X.21 standard, 101
xDSL, 297
♦
Cisco Systems
CCNA Self-Study:
Introduction to Cisco Networking Technologies
(INTRO)
SELF-STUDY
Prepare for the CCNA INTRO exam 640-821 CCNA Self-Study: Introduction to Cisco Networking Technologies (INTRO) is a
or CCNA exam 640-801 with a Cisco autho¬ Cisco® authorized, self-paced learning tool for fundamental CCNA® knowledge. This
rized self-study guide. You’ll learn how to: book helps you become literate in the basics of internetworking, TCP/IP, and the use
■ Describe the basic components of a of Cisco IOS® Software on Cisco switches and routers. An excellent introduction to
PC, the OSI model, and fundamental computer networking, this book addresses fundamental terms and concepts as well
networking concepts and terminology as basic procedures for working with the Cisco command-line interface (CLI) to
configure and operate Cisco IOS devices.
■ Create a simple Ethernet network and
describe the components and functions Designed as a self-study guide for the INTRO component of the CCNA exam, this
of an Ethernet LAN
comprehensive tutorial imparts important knowledge and skills necessary to describe
■ Determine the most appropriate network and identify major network and WAN components along with their functions and
topology for typical user requirements purposes. This book covers topics on network types, network media, switching fun¬
damentals, TCP/IP, IP addressing and routing, WAN technologies, operating and
■ Describe issues related to shared LANs,
configuring Cisco IOS devices, and managing network environments. Divided into
add hubs and switches to expand an
Ethernet LAN, and optimize LANs
three core parts, this book covers internetworking basics, internetworking layers,
and administering Cisco devices. Each chapter ends with extensive review questions
■ Define how networks can be connected to test your knowledge acquisition.
by routing protocols and how data is
transmitted via routed networks Full of detailed information and easy-to-grasp tutorials, CCNA Self-Study: Introduction
to Cisco Networking Technologies (INTRO) presents fundamental internetworking
■ Test the connectivity between hosts on a
terms, concepts, and components and shows you how to apply this information to
routed network
configure basic network connectivity via serial and LAN networks using PCs, hubs,
■ Construct a network addressing scheme routers, and switches. Whether you are studying to become CCNA certified or are simply
with subnet mask computations seeking to gain a better understanding of networking fundamentals using the Open
■ Compare UDP to TCP and explain the
Systems Interconnection (OSI) seven layer model, you will benefit from the information
functions of both protocols in communicat¬ presented in this book.
ing with sites not on an Ethernet LAN
CCNA Self-Study: Introduction to Cisco Networking Technologies (INTRO) is part
■ Define major WAN access technologies of a recommended learning path from Cisco Systems® that includes simulation and
hands-on training from authorized Cisco Learning Partners and self-study products
■ Verify the default configuration of Cisco
from Cisco Press. To find out more about instructor-led training, e-learning, and
IOS devices
hands-on instruction offered by authorized Cisco Learning Partners worldwide,
■ Use Cisco IOS commands to determine please visit www.cisco.com/go/authorizedtraining.
network operational status and performance
Steve McQuen7> CCIE® No. 6108, is an instructor, technical writer, and
internetworking consultant with more than 10 years of networking industry
This volume is in the Certification Self-Study ® experience. He is a certified Cisco Systems instructor teaching routing and
Series offered by Cisco Press’1. Books in this switching concepts to internetworking professionals throughout the world. Steve is
series provide officially developed training also a consultant with Intrellix LLC (www.intrellix.com), an internetworking consulting
solutions to help networking professionals company specializing in post sales consulting services.
understand technology implementations and
prepare for the Cisco Career Certifications
examinations.
CCNA