Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Contributed by iGATE
• The ISO created the OSI to make the IOS more efficient. The
“ISO” acronym is correct as shown.
• To avoid confusion, some people say “International Standard
Organization.”
2. Low Latency
3. No Packet Loss
23
Proprietary and Confidential
December 10, 2019 - 23 -
Unshielded Twisted Pair (UTP) Cable
24
Proprietary and Confidential
December 10, 2019 - 24 -
UTP Implementation
Fiber patch panels similar to the patch panels used with copper cable.
• Hubs concentrate
connections. In
other words, they
take a group of
hosts and allow
the network to see
them as a single
unit.
• Hub is a physical
layer device.
• The other part is the logical topology, which defines how the
media is accessed by the hosts for sending data.
Bridges are Data Link layer devices. Connected host addresses are learned and
stored on a MAC address table. Each bridge port has a unique MAC address
Host A
ARP Request - Broadcast to all hosts
SIEMENS
NIXDORF
„What is the hardware address for IP address 128.0.10.4?“
ARP Reply
SIEMENS
NIXDORF
SIEMENS
NIXDORF
Host B
IP Address: 128.0.10.4
HW Address: 080020021545
A B
A B
Router
A
B
Router R
32 Bits in size
Made up of 4 octets
Each complete 32-bit IP address is broken down into a network part and a
host part. A bit or bit sequence at the start of each address determines the
class of the address. There are 5 IP address classes.
The Class A address was designed to support extremely large networks, with more than
16 million host addresses available. Class A IP addresses use only the first octet to
indicate the network address. The remaining three octets provide for host addresses.
The Class B address was designed to support the needs of moderate to large-
sized networks. A Class B IP address uses the first two of the four octets to
indicate the network address. The other two octets specify host addresses.
The Class C address space is the most commonly used of the original address
classes. This address space was intended to support small networks with a
maximum of 254 hosts.
A Class E address has been defined. However, the Internet Engineering Task
Force (IETF) reserves these addresses for its own research. Therefore, no
Class E addresses have been released for use in the Internet.
The graphic below shows the IP address range of the first octet
both in decimal and binary for each IP address class.
A 100.0.0.0 100.255.255.255
B 150.75.0.0 150.75.255.255
C 200.100.50.0 200.100.50.255
Proprietary and Confidential
December 10, 2019 - 89 -
Public IP Addresses
InterNIC no longer exists and has been succeeded by the Internet Assigned
Numbers Authority (IANA).
No two machines that connect to a public network can have the same IP
address because public IP addresses are global and standardized.
Static assignment
works best on small
networks.
The administrator
manually assigns and
tracks IP addresses
for each computer,
printer, or server on
the intranet.
Network printers,
application servers,
and routers should be
assigned static IP
addresses.
Proprietary and Confidential
December 10, 2019 - 98 -
Introduction to Routers
A router is a special type of computer. It has the same basic components as a
standard desktop PC. However, routers are designed to perform some very
specific functions. Just as computers need operating systems to run software
applications, routers need the Internetwork Operating System software (IOS)
to run configuration files. These configuration files contain the instructions
and parameters that control the flow of traffic in and out of the routers. The
many parts of a router are shown below:
Non-Volatile RAM
Read-Only Memory
ROM has the following characteristics and functions:
In the setup mode, default answers appear in square brackets [ ] following the question.
Press the Enter key to use these defaults.
During the setup process, Ctrl-C can be pressed at any time to terminate the process. When
setup is terminated using Ctrl-C, all interfaces will be administratively shutdown.
When the configuration process is completed in setup mode, the following options will be
displayed:
The startup process of the router normally loads into RAM and executes
one of these operating environments. The configuration register setting can
be used by the system administrator to control the default start up mode for
the router.
To see the IOS image and version that is running, use the show version
command, which also indicates the configuration register setting.
Upon completion of the setup mode a backup copy of the configuration file
may be saved to nonvolatile RAM (NVRAM).
The goal of the startup routines for Cisco IOS software is to start the router
operations. To do this, the startup routines must accomplish the following:
• Make sure that the router hardware is tested and functional.
• Find and load the Cisco IOS software.
• Find and apply the startup configuration file or enter the setup
mode.
When a Cisco router powers up, it performs a power-on self test (POST).
During this self test, the router executes diagnostics from ROM on all
hardware modules.
Proprietary and Confidential
December 10, 2019 - 108 -
After the Post…
After the POST, the following events occur as the router initializes:
Step 1
The generic bootstrap loader in ROM executes. A bootstrap is a simple set of instructions that
tests hardware and initializes the IOS for operation.
Step 2
The IOS can be found in several places. The boot field of the configuration register determines
the location to be used in loading the IOS. If the boot field indicates a flash or network load,
boot system commands in the configuration file indicate the exact name and location of the
image.
Step 3
The operating system image is loaded.
Step 4
The configuration file saved in NVRAM is loaded into main memory and executed one line at a
time. The configuration commands start routing processes, supply addresses for interfaces,
and define other operating characteristics of the router.
Step 5
If no valid configuration file exists in NVRAM, the operating system searches for an available
TFTP server. If no TFTP server is found, the setup dialog is initiated.
The show version command displays information about the Cisco IOS
software version that is currently running on the router. This includes the
configuration register and the boot field settings.
Use the show version command to identify router IOS image and boot
source. To find out the amount of flash memory, issue the show flash
command.
Proprietary and Confidential
December 10, 2019 - 113 -
Router Configuration
As a security feature the Cisco IOS software separates sessions into two
access levels, user EXEC mode and privileged EXEC mode. The privileged
EXEC mode is also known as enable mode.
The following command moves the router into global configuration mode
When specific configuration modes are entered, the router prompt changes
to indicate the current configuration mode.
Typing exit from one of these specific configuration modes will return the
router to global configuration mode. Pressing Ctrl-Z returns the router to all
the way back privileged EXEC mode.
Proprietary and Confidential
December 10, 2019 - 121 -
Configuration of a Router
POST
BOOT STRAP
Setup Mode
Proprietary and Confidential
December 10, 2019 - 122 -
In Setup mode, there will be a message,
“Would You Like To Enter The Initial Configuration [Y/N]”
:
If “Y” then, initial configuration starts.
If “N” would you like to terminate the auto installation?
Press “RETURN” to get started……You will land on the
default prompt of the Router “ ROUTER >”.
Router(config)#hostname Tokyo
Tokyo(config)#
125
Proprietary and Confidential
December 10, 2019 - 125 -
Message Of The Day (MOTD)
Router(config)#Interface Ethernet 0
Router(config-if)#Ip Address 200.150.1.254 255.255.255.0
Router(config-if)#no shutdown
Router(config-if)#^Z
Router#Show Int E0
Router(config)#Interface Serial 0
Router(config-if)#Ip Address 150.10.1.1 255.255.0.0
Router(config)#clock rate 56000
Router(Config-if)# bandwidth 64
Router(config-if)#No shutdown
Router(config-if)#^Z
show interfaces – Displays all the statistics for all the interfaces on the router.
show int s0/1 – Displays statistics for interface Serial 0/1
show controllers serial – Displays information-specific to the interface hardware
show clock – Shows the time set in the router
show hosts – Displays a cached list of host names and addresses
show users – Displays all users who are connected to the router
show history – Displays a history of commands that have been entered
show flash – Displays info about flash memory and what IOS files are stored there
show version – Displays info about the router and the IOS that is running in RAM
show ARP – Displays the ARP table of the router
show start – Displays the saved configuration located in NVRAM
show run – Displays the configuration currently running in RAM
show protocol – Displays the global and interface specific status of any configured
Layer 3 protocols
• Previlege Password
• Virtual Terminal Password
• Console Password
• Auxillary Password
Router#conf t
Router(config)#Line vty 0 4
Router(config-line)#Login
Router(config-line)#password cisco
Router(config-line)#^Z
Router#conf t
Router(config)#Line Console 0
Router(config-line)#Login
Router(config-line)#Password cisco
Router(config-line)#^Z
Router#conf t
Router(config)#Line Aux 0
Router(config-line)#Login
Router(config-line)#Password cisco
Router(config-line)#^Z
Router# sh cdp interface(shows the details of the interface of the local decive.)
Router# sh cdp traffic (shows the packet sent, received, lost etc.)
To disable CDP….,
1. Switching
2. Routing
Switch#configure terminal
Switch(config)#vlan 3
Switch(config-vlan)#name
Vlan3
Switch(config-vlan)#exit
Switch(config)#end
Switch#vlan database
Switch(vlan)#vlan 3
VLAN 3 added:
Name: VLAN0003
Switch(vlan)#exit
APPLY completed.
Exiting....
Switch#configure terminal
Switch(config)#no vlan 3
Switch(config)#end
Switch#vlan database
Switch(vlan)#no vlan 3
VLAN 3 deleted:
Name: VLAN0003
Switch(vlan)#exit
APPLY completed.
Exiting....
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1 enet 100001 1500 - - - - - 1002 1003
2 enet 100002 1500 - - - - - 0 0
51 enet 100051 1500 - - - - - 0 0
52 enet 100052 1500 - - - - - 0 0
…
• Displays the MAC address table information for the specified interface in the specified VLAN
..
. . .
• Cannot create,
change, or delete • Creates, modifies, and
VLANs deletes VLANs locally
• Forwards only
advertisements • Forwards
• Synchronizes advertisements
VLAN • Does not
configurations synchronize VLAN
• Does not save in configurations
NVRAM • Saves configuration in
NVRAM
Proprietary and Confidential
December 10, 2019 - 163 -
VTP Operation
Switch(config)#vtp server
• Configures VTP server mode
Switch(config)#vtp pruning
• Enables VTP pruning in the domain
Switch#configure terminal
Switch(config)#vtp server
VTP Version : 2
Configuration Revision : 247
Maximum VLANs supported locally : 1005
Number of existing VLANs : 33
VTP Operating Mode : Client
VTP Domain Name : Lab_Network
VTP Pruning Mode : Enabled
VTP V2 Mode : Disabled
VTP Traps Generation : Disabled
MD5 digest : 0x45 0x52 0xB6 0xFD 0x63 0xC8 0x49 0x80
Configuration last modified by 0.0.0.0 at 8-12-99 15:04:49
Switch#
169
Proprietary and Confidential
December 10, 2019 - 169 -
Verifying the VTP Configuration (Cont.)
VTP statistics:
Summary advertisements received : 7
Subset advertisements received : 5
Request advertisements received : 0
Summary advertisements transmitted : 997
Subset advertisements transmitted : 13
Request advertisements transmitted : 3
Number of config revision errors : 0
Number of config digest errors : 0
Number of V1 summary errors : 0
• Addresses are the same as in the route summarization figure, except that
Class B network 172 has been replaced by Class C network 192.
Proprietary and Confidential
December 10, 2019 - 174 -
CIDR Example
NAT
Translates between local addresses and public ones
Many private hosts share few global addresses
translate reserve
To be pool
translated
map
NAT
exclude exclude
NAT Router
Proprietary and Confidential
December 10, 2019 - 187 -
How does NAT know when to return the
public IP address to the pool?
free
NAT
Pool
• Inside Local
• The term “inside” refers to an address used for a host inside an enterprise.
It is the actual IP address assigned to a host in the private enterprise
network.
• Inside Global
• NAT uses an inside global address to represent the inside host as the
packet is sent through the outside network, typically the Internet.
• A NAT router changes the source IP address of a packet sent by an inside
host from an inside local address to an inside global address as the packet
goes from the inside to the outside network.
• Outside Global
– The term “outside” refers to an address used for a host outside an
enterprise, the Internet. An outside global is the actual IP address assigned
to a host that resides in the outside network, typically the Internet.
• Outside Local
– NAT uses an outside local address to represent the outside host as the
packet is sent through the private enterprise network.
– A NAT router changes a packet’s destination IP address, sent from an
outside global address to an inside host, as the packet goes from the outside
to the inside network.
There are different types of NAT that can be used, which are
• Static NAT
• Dynamic NAT
• Overloading NAT with PAT (NAPT)
• The dynamic entry in the NAT table stays in there as long as traffic
flows occasionally.
• If a new packet arrives, and it needs a NAT entry, but all the pooled
IP addresses are in use, the router simply discards the packet.
single public
IP address
private IP network
WAN
(e.g. SOHO)
local IP @,
registered IP @,
local TU port # mapping
assigned TU port #
199
TU....TCP/UDP
Proprietary and Confidential
December 10, 2019 Fig. 10 NAPT (TI1332EU02TI_0003 New Address Concepts,- 199
19)-
PAT Configuration
Broadcasts and multicasts frames are flooded out all ports, except the one on
which the frame was received.
The switches continue to propagate broadcast traffic over and over. This is
called a broadcast storm. This will continue until one of the switches is
disconnected. The network will appear to be down or extremely slow.
207
Proprietary and Confidential
December 10, 2019 - 207 -
Logical Loop Free Topology Created with STP
Ethernet bridges
and switches can
implement the IEEE
802.1D Spanning-
Tree Protocol and
use the spanning-
tree algorithm to
construct a loop
free shortest path
network.
Shortest path is
based on
cumulative link
costs.
Link costs are
based on the speed
of the link.
The first decision that all switches in the network make, is to identify
the root bridge. The position of the root bridge in a network will affect
the traffic flow.
The BID consists of a bridge priority that defaults to 32768 and the
switch base MAC address.
When a switch first starts up, it assumes it is the root switch and
sends BPDUs. These BPDUs contain the switch MAC address in both
the root and sender BID. As a switch receives a BPDU with a lower
root BID it replaces that in the BPDUs that are sent out. All bridges
see these and decide that the bridge with the smallest BID value will
be the root bridge.
• Upgrade to STP.
A default route is actually a special static route that uses this format:
• The show ip route command is used to make sure that the static
route is present in the routing table.
Router
Switch
Router Router
Router
Router
Switch What is
an optimal
route ?
Routing protocols
includes the following:
Examples of routing
protocols that support
the IP routed protocol
are:
RIP, IGRP,
OSPF, BGP,
and EIGRP.
Sometimes static routes are used for backup purposes. A static route can
be configured on a router that will only be used when the dynamically
learned route has failed. To use a static route in this manner, simply set the
administrative distance higher than that of the dynamic routing protocol
being used.
Proprietary and Confidential
December 10, 2019 - 231 -
Routed Protocols
232
Proprietary and Confidential
December 10, 2019 - 232 -
IGP and EGP
EGP
Exterior Gateway
Protocols are used
for routing between
Autonomous Systems
AS 1000 AS 3000
IGP
Interior Gateway Protocols are
used for routing decisions
AS 2000 within an Autonomous System.
AS 1000 AS 3000
EGP
EGP IGP
EGP
AS 2000
Proprietary and Confidential
December 10, 2019 - 234 -
IGP and EGP
2 Hops
1 Hop 1 Hop
192.16.5.0
Port 1
130.24.13.1/24
130.24.13.0/24
130.24.25.0/24 Router A
RIP-1: 130.24.0.0
Port 2 200.14.13.0/24
130.24.36.0/24 200.14.13.2/24
GAD(config)#router rip
GAD(config-router)#network 172.16.0.0
248
Proprietary and Confidential
December 10, 2019 - 248 -
Problem: Counting to Infinity
252
Proprietary and Confidential
December 10, 2019 - 252 -
Triggered Updates
When a route fails, an update is sent immediately rather than waiting on the
update timer to expire.
Triggered updates, used in conjunction with route poisoning, ensure that all
routers know of failed routes before any holddown timers can expire.
Proprietary and Confidential
December 10, 2019 - 253 -
Triggered Updates Graphic
Holddowns
Holddowns are used to prevent regular update messages from inappropriately reinstating a
route that may not be up.
Split horizons
Split horizons are derived from the premise that it is usually not useful to send information
about a route back in the direction from which it came.
Today, IGRP is showing its age, it lacks support for variable length subnet masks (VLSM).
Rather than develop an IGRP version 2 to correct this problem, Cisco has built upon IGRP's
legacy of success with Enhanced IGRP.
The distance vector algorithm are also known as Bellman-Ford algorithms. They have
nonspecific information about distant networks and no knowledge of distant routers.
A link-state routing algorithm maintains full knowledge of distant routers and how they
interconnect. Link-state routing uses:
• Topological database
A topological database is a collection of information gathered from LSAs.
• SPF algorithm
The shortest path first (SPF) algorithm is a calculation performed on the
database resulting in the SPF tree.
– Neighbor table:
– Topology table:
– Routing table:
The next several slides explain various OSPF terms one per slide.
267
Proprietary and Confidential
December 10, 2019 - 267 -
OSPF Term: Area
268
Proprietary and Confidential
December 10, 2019 - 268 -
OSPF Term: Link Cost
269
Proprietary and Confidential
December 10, 2019 - 269 -
OSPF Term: Forwarding Database
Router(config)#
Router(config-router)#
Router#
show ip protocols
• Verifies the configured IP routing protocol
processes, parameters and statistics
Router#
show ip route ospf
• Displays all OSPF routes learned by the router
Router#
show ip ospf interface
• Displays the OSPF router ID, area ID and
adjacency information
Proprietary and Confidential
December 10, 2019 - 295 -
Verifying OSPF Operation (Cont.)
Router#
show ip ospf
• Displays the OSPF router ID, timers, and statistics
Router#
show ip route
When the hold time expires, the Diffusing Update Algorithm (DUAL),
which is the EIGRP distance vector algorithm, is informed of the
topology change and must recalculate the new topology.
Proprietary and Confidential
December 10, 2019 - 312 -
Topology Table
The topology table is made up of all the EIGRP routing tables in the
autonomous system.
DUAL takes the information supplied in the neighbor table and the topology
table and calculates the lowest cost routes to each destination. By tracking
this information, EIGRP routers can identify and switch to alternate routes
quickly.
The information that the router learns from the DUAL is used to determine
the successor route, which is the term used to identify the primary or best
route.
A copy is also placed in the topology table.
Every EIGRP router maintains a topology table for each configured network
protocol. All learned routes to a destination are maintained in the topology
table.
The EIGRP routing table holds the best routes to a destination. This
information is retrieved from the topology table. Each EIGRP router
maintains a routing table for each network protocol.
There can be up to four successor routes for any particular route. These
can be of equal or unequal cost and are identified as the best loop-free
paths to a given destination.
EIGRP relies on hello packets to discover, verify, and rediscover neighbor routers.
Rediscovery occurs if EIGRP routers do not receive hellos from each other for a
hold time interval but then re-establish communication.
EIGRP routers send hellos at a fixed but configurable interval, called the hello
interval. The default hello interval depends on the bandwidth of the interface.
Each router constructs a topology table that contains information about how
to route to a destination network.
The Topology heading identifies the preferred primary route, called the
successor route (Successor), and, where identified, the backup route,
called the feasible successor (FS). Note that it is not necessary to have an
identified feasible successor.
318
Proprietary and Confidential
December 10, 2019 - 318 -
Configuring EIGRP
This is the boundary where the network address ends, as defined by class-
based addressing.
This means that even though RTC is connected only to the subnet 2.1.1.0,
it will advertise that it is connected to the entire Class A network, 2.0.0.0.
• VPN
• MPLS
• VPLS
• QoS
• VOIP
• Telepresence
• Multicasting
• BGP