Annex B Basic Networking

Slides:



Advertisements
Similar presentations
Chapter 2 Network Models.
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
OSI Model.
Introduction To Networking
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
OIS Model TCP/IP Model.
IP Network Basics. For Internal Use Only ▲ Internal Use Only ▲ Course Objectives Grasp the basic knowledge of network Understand network evolution history.
Data Communications and Networks
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
OSI Model Honolulu Community College Cisco Academy Training Center
OSI Reference Model & Layered Communication Sritrusta Sukaridhoto.
Presentation on Osi & TCP/IP MODEL
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
The OSI Model.
Computer Networks. Introduction Computer Network2 A History Lesson of Networking 1969 – ARPANET, first packet switched network consist of UCLA, Stanford,
TCP/IP TCP/IP LAYERED PROTOCOL TCP/IP'S APPLICATION LAYER TRANSPORT LAYER NETWORK LAYER NETWORK ACCESS LAYER (DATA LINK LAYER)
NSH0503/01/11041 Overview Computer Network Technology By Diyurman Gea.
Layer 3: Internet Protocol.  Content IP Address within the IP Header. IP Address Classes. Subnetting and Creating a Subnet. Network Layer and Path Determination.
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
Open System Interconnection Describe how information from a software application in one computer moves through a network medium to a software application.
The OSI Model A Framework for Communications David A. Abarca July 19, 2005.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
Data Communication Network Models
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Roadmap  Introduction to Basics  Computer Network – Components | Classification  Internet  Clients and Servers  Network Models  Protocol Layers.
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
Chapter 9 Introduction To Data-Link Layer 9.# 1
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Networking Using the OSI Model.
Network Protocols and Standards
Network Communication Overview
Chapter 5: Making Networks Work
Computer Networks.
Chapter 5 Network and Transport Layers
Click to edit Master subtitle style
The OSI Model and the TCP/IP Protocol Suite
Chapter 1 Introduction Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
What the OSI Protocol Layers Do
OSI Protocol Stack Given the post man exemple.
Layered Architectures
Lecturer, Department of Computer Application
Understand the OSI Model Part 2
Networking for Home and Small Businesses – Chapter 6
DEPARTMENT OF COMPUTER SCIENCE
IOS Network Model 2nd semester
Net 431: ADVANCED COMPUTER NETWORKS
Networking for Home and Small Businesses – Chapter 6
The OSI Model and the TCP/IP Protocol Suite
Protocols and the TCP/IP Suite
Chapter 3: Open Systems Interconnection (OSI) Model
Process-to-Process Delivery:
TCP/IP Protocol Suite: Review
Lecture 2: Overview of TCP/IP protocol
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
OSI Model OSI MODEL.
Protocols and the TCP/IP Suite
Networking for Home and Small Businesses – Chapter 6
The OSI Model and the TCP/IP Protocol Suite
Kyle Broussard, Alexandra Mikolai,
Open System Interconnect (OSI).
Objectives: 1.Identify different internet protocol (IP) 2.Configure sample of IP address 3.Appreciate and relate protocol in our life.
Presentation transcript:

Annex B Basic Networking In this lesson we will be discussing Basic Networking. BVTC III-SG-B1-1

Terminal Learning Objective (1) Action: The Student will state the course objectives and demonstrate an understanding of Basic sub-netting, OSI Model, Switching and VLAN Architecture. BVTC III-SG-B1-2

Terminal Learning Objective (2) Conditions: The Student is given the student guide and a classroom environment & emplaced the BVTC III system on a WIN-T network. BVTC III-SG-B1-3

Terminal Learning Objective (3) Standard: The Student has met the standard when he/she can correctly identify VLAN and IP Addresses needed for the BVTC III components and their relationship on the network. BVTC III-SG-B1-4

Enabling Learning Objectives Introduction to IP Addressing and Sub-netting OSI Model Switching and VLAN Architecture BVTC III-SG-B1-5

Introduction to IP Addressing and Sub-netting Basic Networking BVTC III-SG-B1-6

IP Addressing and Subnet Masks One of the most important concepts of Internetworking. It is essential you understand how IP Addresses are used in a network. BVTC III-SG-B1-7

The IP Address (1) 148 43 200 1 148.43.200.1 Is made up of 4 octets. Each octet is 8 bits in length. Each IP address is 32 bits in length. 148.43.200.1 148 43 200 1 10010100 00101011 11001000 00000001 Dotted-Decimal Notation - To make Internet addresses easier for human users to read and write, IP addresses are often expressed as four decimal numbers, each separated by a dot. This format is called dotted-decimal notation. Dotted-decimal notation divides the 32-bit Internet address into four 8-bit (byte) fields and specifies the value of each field independently as a decimal number with the fields separated by dots. BVTC III-SG-B1-8

The IP Address (2) Host Network Mask Is essentially anything on the network that is capable of receiving and transmitting IP packets, such as a workstation (computer) or a router. Each host must be supplied with a unique IP address. Network Is the media that is used to interconnect hosts. The network portion of the address designates your location in the overall topology. Mask A mask is applied to the address to define which portion of the address is network specific and which is host specific. IP addressing is based on the concept of hosts and networks. A host is essentially anything on the network that is capable of receiving and transmitting IP packets, such as a workstation or a router.   The hosts are connected together by one or more networks (segments). The IP address of any host consists of its network address plus its own host address on the network. Routers other than your local router deliver packets to your network, not to the hosts. A mask is used to determine the network and host portion of an IP address. When applied to an IP address, it quite simply defines a range of addresses. The mask determines which IP addresses reside on a given network or segment. The mask is written in the same dotted decimal notation format as the IP address but it is limited to contiguous binary variations, meaning it is a series of all ones, then all zeros. The number of 'ones' in the mask determines the number of network bits in the IP address. BVTC III-SG-B1-9

Decimal to Binary Conversion (1) A decimal number can be represented by a group of binary 1s and 0s. Computers do not understand decimal numbers. They communicate in 1s and 0s, electrical highs and lows. BVTC III-SG-B1-10

Decimal to Binary Conversion (2) 1 =01010101 85 BVTC III-SG-B1-11

Decimal to Binary Conversion (3) BVTC III-SG-B1-12

Decimal to Binary Conversion (4) 7 128 64 32 16 8 4 2 1 1 00000111 A Decimal Is A Binary BVTC III-SG-B1-13

Decimal to Binary Conversion (5) 67 128 64 32 16 8 4 2 1 1 01000011 A Decimal Is A Binary BVTC III-SG-B1-14

Classful IP Addressing Network Number Host Number What network are we in? Which user on that network are we? Network 148.43.0.0 /16 Host 148.43.200.76 Classful IP Addressing   When Internet Protocol was first standardized in September 1981, the specification required that each system attached to an IP-based internet be assigned a unique 32-bit Internet address value. Some systems, such as routers, which have interfaces to more than one network, must be assigned a unique IP address for each network interface. The first part of an Internet address identifies the network on which the host resides, while the second part identifies the particular host on the given network. This created the two-level addressing hierarchy. Network-Prefix Host-Number Network-Number Host-Number In recent years, the network-number field has been referred to as the network-prefix because the leading portion of each IP address identifies the network number. All hosts on a given network share the same network-prefix (the 148.43 in the picture above) but must have a unique host-number. Similarly, any two hosts on different networks must have different network-prefixes but may have the same host-number. BVTC III-SG-B1-15

Primary Address Classes . . . Class A Class B Class C 1 0 1 1 0 = Network = Host Primary Address Classes   In order to provide the flexibility required to support different size networks, the designers decided that the IP address space should be divided into three main address classes - Class A, Class B, and Class C. This is often referred to as classful addressing because the address space is split into three predefined classes, groupings, or categories. Each class fixes the boundary between the network-prefix and the host-number at a different point within the 32-bit address. One of the fundamental features of classful IP addressing is that each address contains a self-encoding key that identifies the dividing point between the network-prefix and the host-number. For example, if the first two bits of an IP address are 1-0, the dividing point falls between the 15th and 16th bits. This simplified the routing system during the early years of the Internet because the original routing protocols did not supply a deciphering key or mask with each route to identify the length of the network-prefix. BVTC III-SG-B1-16

Other Classes Class D (IP Multicasting) 224 – 239 . . . . . . Class D (IP Multicasting) 1 1 1 0 1 1 1 1 1 224 – 239 Class E (Experimental) 240 – 254 BVTC III-SG-B1-17

Subnet Masking (1) A bit for bit comparison is conducted between the address & mask. The address bits that align with ones in the mask are considered network. The address bits that align with zeros in the mask are considered host. The point at which the mask changes from ones to zeros divides the address into network and host portions. BVTC III-SG-B1-18

Subnet Masking (2) 148.43.200.1/24 or 255.255.255.0 Address: Mask: 10010100 . 00101011 . 11001000 . 00000001 11111111 . 11111111 . 11111111 . 00000000 10010100 . 00101011 . 11001000 . 00000000 10010100 . 00101011 . 11001000 . 11111111 148 . 43 . 200 . 0-255 Address: Mask: Range: Network Host You will often see the mask as a slash prefix (/) This represents the number of bits that are on (ones) BVTC III-SG-B1-19

Subnet Masking (3) 148.43.200.1/25 or 255.255.255.128 Address: Mask: 10010100 . 00101011 . 11001000 . 00000001 11111111 . 11111111 . 11111111 . 10000000 10010100 . 00101011 . 11001000 . 00000000 10010100 . 00101011 . 11001000 . 01111111 148 . 43 . 200 . 0-127 Address: Mask: Range: Network Host BVTC III-SG-B1-20

Subnet Masking (4) 148.43.200.1/26 or 255.255.255.192 Address: Mask: 10010100 . 00101011 . 11001000 . 00000001 11111111 . 11111111 . 11111111 . 11000000 10010100 . 00101011 . 11001000 . 00000000 10010100 . 00101011 . 11001000 . 00111111 148 . 43 . 200 . 0-63 Address: Mask: Range: Network Host BVTC III-SG-B1-21

Subnet Masking (5) 148.43.200.1/27 or 255.255.255.224 Address: Mask: 10010100 . 00101011 . 11001000 . 00000001 11111111 . 11111111 . 11111111 . 11100000 10010100 . 00101011 . 11001000 . 00000000 10010100 . 00101011 . 11001000 . 00011111 148 . 43 . 200 . 0-31 Address: Mask: Range: Network Host BVTC III-SG-B1-22

Subnet Masking (6) 148.43.200.1/28 or 255.255.255.240 Address: Mask: 10010100 . 00101011 . 11001000 . 00000001 11111111 . 11111111 . 11111111 . 11110000 10010100 . 00101011 . 11001000 . 00000000 10010100 . 00101011 . 11001000 . 00001111 148 . 43 . 200 . 0-15 Address: Mask: Range: Network Host BVTC III-SG-B1-23

Subnet Masking (7) 148.43.200.1/29 or 255.255.255.248 Address: Mask: 10010100 . 00101011 . 11001000 . 00000001 11111111 . 11111111 . 11111111 . 11111000 10010100 . 00101011 . 11001000 . 00000000 10010100 . 00101011 . 11001000 . 00000111 148 . 43 . 200 . 0-7 Address: Mask: Range: Network Host BVTC III-SG-B1-24

Available Hosts in a Network 148.43.200.0 255.255.255.240 148.43.200.0 Network Address 148.43.200.1 148.43.200.14 148.43.200.15 Broadcast Address Hosts; or usable IP’s BVTC III-SG-B1-25

Network Address The network address is used by routers to identify and route packets to the correct destination. The network address can be identified by having all 0s in the host field. The network address cannot be assigned to a computer or host. Network Address Examples 148.43.200.0 255.255.255.0 148.43.200.128 255.255.255.128 148.43.200.64 255.255.255.192 148.43.200.96 255.255.255.224 BVTC III-SG-B1-26

Broadcast Address The broadcast address is used by routers and hosts to send packets to all computers on a network at one time. The broadcast address can be identified by having all 1s in the host field. The broadcast address cannot be assigned to a computer or host. 148.43.200.255 255.255.255.0 Broadcast Address Examples 148.43.200.127 255.255.255.128 148.43.200.63 255.255.255.192 148.43.200.95 255.255.255.224 BVTC III-SG-B1-27

Subnet Masking Template (Blank) IP address plus Subnet prefix _ _ _ _ _ _ _ _ IP Address Converted to Binary Subnet Mask Converted to Binary _ _ _ _ _ _ _ _ All zeroes in the Host Field gives you the Network address _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ All ones in the Host field gives you the broadcast Address _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Where the 1s end and the 0s begin, draw a VERTICAL line of demarcation to represent the division of the network specific bits and host specific bits. Convert the binary back to Dotted decimal, this is your Network IP address Convert the binary back to Dotted decimal, this is your Broadcast IP address BVTC III-SG-B1-28

Basic Subnetting PE Instructor will now lead the students through several sub-netting exercises. BVTC III-SG-B1-29

OSI Model Basic Networking BVTC III-SG-B1-30

The OSI Model (1) Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer 7 6 5 4 3 1 2 The OSI (Open Systems Interconnection) model uses a layered architecture to standardize the levels of service and the interaction types for networked computers. In 1978, the International Standards Organization (ISO) released a set of specifications that described network architecture for connecting dissimilar devices.   In 1984, the ISO released a revision of this model and called it the Open Systems Interconnection (OSI) reference model. Why OSI Was Developed OSI was first developed to provide a consistent method for transmitting and receiving data through the network. It was originally designed as a separate protocol suite in the late 1970s. All devices supporting the universal protocol would communicate by using a well-defined and well-understood process. The TCP/IP protocol suite became the industry standard, however. The OSI 'model' has become a framework and learning tool, whose terms are widely used to describe or discuss equipment network interaction. Vendors describe or even design network products based on the specifications of the OSI model. It provides terms to explain how network hardware and software work together in a layered fashion to make communications possible. It also helps with troubleshooting by providing a frame of reference that describes how components are supposed to function. BVTC III-SG-B1-31

The OSI Model (2) Application Layers Data Flow Application Layer Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Application Layers Data Flow Upper Layers   The three upper layers of the OSI reference model are often referred to as the Application Layers. These layers deal with the user interface, data formatting, and application access. Lower Layers The four lower layers of the OSI model are responsible for defining how data is transferred across a physical wire, through internetworking devices, to the desired end station or host. We will briefly discuss the upper layers, but the remainder of this chapter will focus heavily on the lower layers and how they interact in the tactical data network. BVTC III-SG-B1-32

The OSI Model Upper Layers Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer TELNET HTTP SMTP ASCII JPEG GIF APPLICATION ACCESS SCHEDULING EXAMPLES User Interface (Application Interface) How data is presented. Special processing such as encryption and compression. Establishing, managing, and terminating communication sessions. The application layer is the highest layer of the OSI model. It is the point where the user or application interfaces with the protocols to gain access to the network. For example, a word processor is serviced by file transfer services, an internet browser is serviced by http/www, and Microsoft Outlook is serviced by SMTP.   The presentation layer determines the formatting of the data being sent. It provides a variety of coding and conversion functions that are applied to the application layer data. These functions ensure that data sent from the application layer of one system can be read by the application layer of another system. An example is jpeg and gif formats of images displayed on web pages. This formatting ensures that all web browsers, regardless of operating system, can display the images. Compression or encryption take place at this layer, if used. The session layer is responsible for establishing, managing, and terminating communications sessions between presentation layer entities. Communications at the layer consists of service requests and responses that occur between applications located in different devices. An example of coordination would be between an email server and an email client. BVTC III-SG-B1-33

The OSI Model Lower Layers Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer *Reliable or unreliable delivery *Error correction before retransmit *Provide logical addressing which routers use for path determination *Combines bits into bytes and bytes into frames *Access to media using MAC address *Error detection not correction *Move bits between devices *Specifies voltage, wire speed, and pin-out cables TCP UDP SPX IP IPX 802.3/802.2 HDLC PPP EIA/TIA-232 V.35 RS-442 EXAMPLES It is the responsibility of the protocol stack to provide communications between the network devices. A protocol stack is the set of rules that define how information travels across the network. An example of this would be TCP/IP. The OSI reference model provides the basic framework common to most protocol stacks.   Each layer of the model allows data to pass across the network. These layers exchange information to provide communications between the network devices. The layers communicate with one another using protocol data units (PDUs). These PDUs control what information is added to the user data. PDUs are covered in more detail on the next page. BVTC III-SG-B1-34

Encapsulation As the transmitted user data travels down the OSI stack, bits are added to the header or trailer by each layer. This is encapsulation. Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Segment Packet Frame Bits Upper Layer Data TCP IP LLC MAC FCS/CRC 0110111100011101110111101111101111110111101110111011101 Received data travels up the OSI stack. Header and trailer bits are stripped off as they are examined at each layer. Finally, only the user data remains. This process is called decapsulation, also called de-encapsulation. Because a PDU includes different information as it goes up or down the layers, it is given a name according to the information it is carrying. Information added at the transport layer is called the TCP header; the PDU is then referred to as a segment.   When passed down to the network layer, an IP header is placed on the PDU, which is then referred to as a packet. The data link layer actually has two sub layers: the logical link control layer (LLC) and the media access layer (MAC). When this data is added, it is referred to as a frame. The complete product is referred to as bits after the frame has been formatted into electrical signals at the correct voltage levels representing binary highs and lows on the physical media. This method of passing data down the stack and adding header information is called encapsulation. After the data travels across the network and is received at the destination machine, the process is reversed and is called decapsulation. The concept of encapsulation is relatively simple. Pretend that you were sending a package through the post office. The first thing you would do is decide what you are sending (Upper Layer information). Then you would wrap the package for shipment. If you sent it priority mail (TCP/UDP), you would add that label. You might even add a note for the receiving end to call when the package is delivered (TCP). You would then address the package -- the portion of the address containing the city, state, and zip code is the IP (or network) address, while the remaining address references the local street address for the destination (LLC and MAC). You might then place special tape to verify if the package has been tampered with (FCS/CRC), and if the package had been tampered or altered in some way, the recipient could refuse to accept the package. Frame Check Sequence (FCS) and Cyclical Redundancy Check (CRC) is two different methods for error checking/detection. We will not go into detail about either. The key is to remember that they both provide an error detection algorithm to test the integrity of the packet received. Do not confuse this with error recovery. Error recovery is performed at the transport layer and is covered in further detail later in this chapter. BVTC III-SG-B1-35

Transport Layer TCP UDP Physical Layer Data Link Layer Network Layer Transport Layer In order to connect two devices in the fabric of the network, a connection or session must be established. The transport layer defines the end-to-end station establishment guidelines. TCP UDP Connection-Oriented Connectionless Trusted Un-trusted Reliable Unreliable Specifically, the transport layer defines the following functions:   Allows end stations to assemble and disassemble multiple upper-layer segments into the same transport layer data stream. This is accomplished by assigning upper-layer application identifiers. Within the TCP/IP protocol suite (discussed a little later in this chapter), these identifiers are known as port numbers. The OSI reference model refers to these a Service Access Points (SAPs). The transport layer uses these port numbers to identify application layer entities such as FTP and Telnet. Allows applications to request reliable data transport between communicating end systems to accomplish the following: Ensure that segments delivered will be acknowledged back to the sender. Provide for retransmission of any segments that are not acknowledged. Put segments back into their correct sequence order at the receiving end. Provide congestion avoidance and control. BVTC III-SG-B1-36

TCP Header and UDP Header Source Port Dest. Sequence Number ACK Offset Reserved Flags Window Size Checksum Urgent Options Pad 2 2 4 4 4 6 6 2 2 2 3 1 Length UDP Header 2 2 2 2 TCP provides for reliable data transfer, which is also referred to as trusted and/or connection oriented. This is accomplished by using Sequence and Acknowledgement fields in the TCP header. It also uses the Window Size to adjust when an acknowledgement is required. This allows the two computers to negotiate the amount of packets sent before an acknowledgement must be provided.   UDP is referred to as unreliable, un-trusted, and/or connectionless oriented. As you can see in the header above there is not much information sent with a UDP packet other than the source and destination port. BVTC III-SG-B1-37

Switching and VLAN Architecture Basic Networking BVTC III-SG-B1-38

Why VLANs? BVTC III-SG-B1-39 SW - A SW - B SW - C Subnet A Subnet C Subnet B The above example depicts three separate subnets using three individual ports on one router. It is also required that the three subnets be physically connected to a designated switch. Example of switching utilizing individual ethernet ports on the router. BVTC III-SG-B1-39

VLAN Example with Sub-Interfaces One Physical Ethernet Interface SW - 2 SW - 3 SW - 1 The above example depicts one port on the router utilizing sub-interface and VLANs being utilized. The use of VLANs makes it possible for the users in each of the three subnets to be physically separated but act as though they are directly connected. Example of switching utilizing sub-interfaces on the router. Users for all VLANs can now be dispersed throughout the switching topology. BVTC III-SG-B1-40

Trunk Interface interface GigabitEthernet0/0.358 description Voice VLAN encapsulation dot1Q 358 ip address 143.249.241.254 255.255.255.0 no ip proxy-arp ip pim sparse-dense-mode ip policy route-map PBR_ClientSide service-policy input Voice-Remark No shutdown The above example depicts a Router configuration for an interface. BVTC III-SG-B1-41

VLAN Access interface GigabitEthernet0/5 switchport access vlan 59 switchport mode access switchport voice vlan 58 no mdix auto spanning-tree portfast The above depicts a normal switch port configuration. Users can obtain access to a designated VLAN or subnet by granting access to the VLAN on the port the user is connecting to. BVTC III-SG-B1-42

VLAN Trunk (1) BVTC III-SG-B1-43 The above depicts a typical trunk between two switches. BVTC III-SG-B1-43

VLAN Trunk (2) interface GigabitEthernet0/1 description (SFP1 1000 LX/LH) Trunk to JNN NT2S or Access Case switchport trunk encapsulation dot1q switchport trunk allowed vlan 1,3-6,58,59,61-74,222-224,226,233,801,803,804 switchport trunk allowed vlan add 990,1002-1005 switchport mode trunk The above depicts a port on a switch which has been configured as a Trunk to another device. BVTC III-SG-B1-44