Download presentation
Presentation is loading. Please wait.
Published byGerard Harrington Modified over 9 years ago
1
BZUPAGES.COM Introduction to Cisco Devices Interfaces and modules –LAN interfaces (Fast Ethernet, Gigabit Ethernet) –WAN interfaces(Basic Rate Interface (BRI),Synchronous & Asynchronous Serial, T1 Controller Card) Data Communications Equipment (DCE) –Modem –Channel Service Unit/Data Service Unit (CSU/DSU) Data Terminal Equipment (DTE) –Router – PC –Server Demarcation point CPE
2
BZUPAGES.COM Cisco Memory Components ROM Flash RAM NVRAM
3
BZUPAGES.COM Cisco Router Models and Features 800 Series—Fixed-port and fixed-configuration routers that support Asymmetric Digital Subscriber Line (ADSL), ADSL over ISDN, Single-pair High-Speed DSL(G.SHDSL), Serial, and ethernet to an external cable modem or DSL connections. 3700 Series—Modular multiservice access routers that support built-in Fast Ethernet LAN ports and WAN/voice modular slots. They can support branch offices. 7200 Series—Can be used with an Enterprise Edge or Service Provider Edge environment. They can support Fast Ethernet, Gigabit Ethernet, and Packet. Chassis slots are open for installation of more than 70 network interfaces.
4
BZUPAGES.COM Cisco Switch Models and Features 2950 Series—Includes a fixed-configuration switch that can support both Fast Ethernet and Gigabit Ethernet connections. Monitoring network and system state. 3500 Series—Are stackable switches that can employ Cisco Switch Clustering technology, and support Layer 3 functionality. 4000 Series—Can support high-density copper, fiber-based interfaces, Fast Ethernet,Gigabit Ethernet connections, and Layer 3 functionality. 6500 Series—Can support Power over Ethernet (PoE) devices, 10/100Mbps ethernet ports, 10/100/1000Mbps ethernet ports, 10Gbps ethernet ports, and Layer 3 functionality. Self-identification of system components. Separate testability of components.
5
BZUPAGES.COM Switching Functionality PDU(Protocol data unit) 4 (transport) TCP segment TCP port 3 (network) Packet Router 2 (data link) Frame Switch/bridge Layer 2 Switching ■ MAC addresses are learned from the incoming frames’ source addresses. ■ A table of MAC addresses and their associated bridge and switch ports is built and maintained. ■ Broadcast and multicast frames are flooded out to all ports (except the one that received the frame). ■ Frames destined for unknown locations are flooded out to all ports (except the one that received the frame). ■ Bridges and switches communicate with each other using the Spanning Tree Protocol to eliminate bridging loops.
6
BZUPAGES.COM Switching Functionality Layer 3 Switching ■ Packets are forwarded at Layer 3, just as a router would do. ■ Packets are switched using specialized hardware, application-specific integrated circuits (ASIC), for high speed and low latency. ■ Packets can be forwarded with security control and quality of service (QoS) using Layer 3 address information. Layer 4 Switching ■ Packets are forwarded using hardware switching, based on both Layer 3 addressing and Layer 4 application information. (Layer 2 addressing is also inherently used.) ■ Layer 4 protocol types (UDP or TCP, for example) in packet headers are examined. ■ Layer 4 segment headers are examined to determine application port numbers.
7
BZUPAGES.COM Switching Functionality Multilayer Switching ■ Packets are forwarded in hardware that combines Layer 2, Layer 3, and Layer 4 switching. ■ Packets are forwarded at wire speed. ■ The traditional Layer 3 routing function is provided using Cisco Express Forwarding (CEF), in which a database of routes to every destination network is maintained and distributed to switching ASICs for very high forwarding performance.
8
BZUPAGES.COM VLAN & Trunking VLAN Frame Identification Frame Identification or Tagging A Unique Identifier as VLAN ID Only Used for Trunk Links Two Methods are Used Inter-Switch Link (ISL) protocol IEEE 802.1Q protocol Both ends must have the same method
9
BZUPAGES.COM VLAN & Trunking Inter-Switch Link Protocol Cisco-proprietary method Layer 2 encapsulating 26-byte header & a 4-byte trailer 15-bit VLAN ID & CRC in trailor double tagging
10
BZUPAGES.COM VLAN & Trunking IEEE 802.1Q Protocol Standardized method Support multiple vendor internal tagging. concept of a native VLAN 4-byte tag just after the source address field 2- bytes for Tag Protocol Identifier (TPID) 2-bytes for Tag Control Information (TCI)
11
BZUPAGES.COM Virtual LAN Trunking prtocol VTP Modes Server mode Client mode Transparent mode
12
BZUPAGES.COM VTP Advertisement
13
BZUPAGES.COM VTP Advertisement
14
BZUPAGES.COM VTP Advertisement
15
BZUPAGES.COM Spanning Tree Potocol
16
BZUPAGES.COM Spanning Tree Protocol Bridging Loops Bridge Protocol Data Units –STP multicast address 01-80-c2-00-00-00. –Configuration BPDU, used for spanning-tree computation –Topology Change Notification (TCN) BPDU, used to announce changes in the network topology Electing a Root Bridge –Bridge Priority (2 bytes)(0-65532) –Default is 32,768. –MAC Address (6 bytes) –Lower is better
17
BZUPAGES.COM Spanning Tree Protocol
18
BZUPAGES.COM Spanning Tree Protocol
19
BZUPAGES.COM Spanning Tree Protocol STP states –Disabled –Blocking –Listening –Learning –Forwarding STP Timers –Hello (2 s) –Forward delay( 15 s) –Max age(20 s)
20
BZUPAGES.COM Spanning Tree Protocol
21
BZUPAGES.COM Routing Functionality Layer 3 Routing –application-specific integrated circuits (ASIC) ■ Packets are forwarded between networks based on Layer 3 addresses. ■ An optimal path is determined for a packet to take through a network to the next router. ■ Packet forwarding involves a table lookup of the destination network, the next-hop router address, and the router’s own outbound interface. ■ An optimal path can be chosen from among many possibilities. ■ Routers communicate with each other using routing protocols. ■ No broadcast, Only multicast
22
BZUPAGES.COM Routing Basics A router is required to properly forward data between clients on different segments. A router is a device that forwards data based on a logical Layer 3 address Many routers support the use of different protocols The routing process usually occurs between physical network interfaces but can also be accomplished between logical network interfaces When a single physical network interface has more than one address assigned, it is said to have a logical interface A router can be any network device with the proper software to make routing decisions
23
BZUPAGES.COM Routing Basics Two key pieces of information are required for any device to route packets: –A route to one or more networks –A destination Layer 3 address The routes to a given network are stored in the memory of the router and are referred to as a routing table On a Router there is an entry for each network and its corresponding network interface kept in memory The table allows the router to properly forward frames out the correct interface This occurs once the frame is received and the destination address has been processed
24
BZUPAGES.COM Routing Basics In standard routing, the route table is consulted every time a frame is received and so it plays a fundamental role in the proper delivery of data A routing table only maintains the best possible route to a destination, not all possible routes Routing table entries have the following functions: –Network destination –Netmask –Gateway –Interface –Metric
25
BZUPAGES.COM Routing Basics The task of populating the routing table is accomplished by using either dynamic routing or static routing Dynamic routing uses routing protocols to build route tables automatically Static routing requires manual route table entries and updates to different networks Layer 3 addressing is critical for end-to-end reachability and does not change throughout the routing process The Layer 2 address moves the packet from one hand-off point or hop to the next The router’s Layer 2 address is the frame’s destination The Layer 3 address remains constant through each hop
26
BZUPAGES.COM Address Resolution Address resolution is the mapping of one address to another It is generally a mapping between a Layer 3 network address (logical) and a Layer 2 hardware address (physical) The reverse process is also address resolution Address resolution is accomplished in one of the following ways: –Table lookup is a rarely used method of address resolution –Closed-form computation is only used in very specific networks and is time consuming to configure –Dynamic message exchange is the most common and involves an exchange of information between two hosts
27
BZUPAGES.COM Address Resolution Address Resolution Protocol (ARP) is used when an IP host has a known destination IP address (Layer 3) and it needs to retrieve the corresponding Layer 2 MAC address from the destination host The ARP cache is used to further reduce the need for broadcasts by storing the IP-to- MAC mapping in memory for a specified duration The ARP Process: –Client A sends out an ARP broadcast –All clients receive and process the broadcast frame but only Machine B responds –Client A receives the response and places Machine B’s MAC address in its ARP cache
28
BZUPAGES.COM Address Resolution ARP locates the Layer 2 address when the Layer 3 address is known Reverse Address Resolution Protocol (RARP) finds the Layer 3 address when the Layer 2 address is known A good example of RARP is found in TCP/IP address reservations and the Boot Protocol (BootP) Using BootP, IP hosts are automatically assigned their configuration information through a BootP server
29
BZUPAGES.COM Routing Protocols Dynamic routing using routing protocols Purpose of routing protocols is to build a routing table with the best routes Routing protocols are categorized into two types: –Distance Vector –Link State
30
BZUPAGES.COM Routing Protocols Distance vector routing protocols are simple Generally they are easy to configure They use simple logic to determine the best path to a given destination The term metric refers to the method or measurement used by the routing protocol logic to determine the best path to a given network A distance vector routing protocol usually uses hop count as its metric A distance vector routing protocol is characterized by how it communicates with other routing devices Distance vector routing protocols use broadcasts to advertise their entire routing table to directly connected peer routers
31
BZUPAGES.COM Routing Protocols Convergence is the time it takes for a given set of routers to learn routes to all networks Convergence describes the time it takes a set of routers to learn of a change in the network Distance vector routing protocols generally take longer to converge than link state protocols because they use a periodic route advertisement schedule
32
BZUPAGES.COM Routing Protocols A routing loop occurs when routers get confused during update operations, causing frames to bounce back and forth between a set of interfaces Two easy methods to identify routing loops: –Tracert or traceroute TCP/IP utilities –View the routing table and the metric associated with the network Prevent routing loops by using the following software based methods: –Split horizon –Hold-down timers –Triggered updates –Hop count limits –Poisoning
33
BZUPAGES.COM Routing Protocols Link state routing protocols are more intelligent than distance vector protocols The metric used by most link state protocols is bandwidth allowing more complex routing configurations Routing protocols capable of making complex decisions use a mathematical formula or algorithm for deriving the best path or route to a given network Some link state protocols are capable of determining the best route to a destination network based on the following: –Delay –Load –Reliability –MTU
34
BZUPAGES.COM Routing Protocols When more than one metric is used it is referred to as a composite metric Link state protocols only send updates when changes occur, and they only send the changes, not the entire route table Link state protocols use multicast and unicast traffic instead of broadcast traffic Link state routers also develop an overall picture of the networks available by establishing neighbor relationships
35
BZUPAGES.COM Administrative Classification Routing protocols are also separated by an administrative classification based on where they are used in the networking environment: –Interior routing protocols or interior gateway protocols –Exterior routing protocols or exterior gateway protocols Interior gateway protocols (IGPs) are used within a company’s network infrastructure to maintain routing tables and policies set by the network administrators The two industry standard IGPs are: –Routing Information Protocol –Open Shortest Path First
36
BZUPAGES.COM Administrative Classification RIP is a distance vector protocol that uses hop count for its metric when determining the best route to a given network In most implementations, RIP uses split horizon, hop count limit, and poisoning for routing loop prevention RIP is a classful routing protocol The shortest path as measured by Open Shortest Path First (OSPF) is actually the fastest path based on bandwidth Shortest refers to the shortest time OSPF is used in large networks and ones requiring more intelligence than distance vector routing protocols
37
BZUPAGES.COM Administrative Classification OSPF communicates using unicast and multicast packets It only transmits changes or updates to the routing table when they occur It uses hello packets to determine the current state of a link between itself and its neighbors It utilizes a link state database to maintain a local view of the entire routing environment The configuration possibilities using OSPF –Areas –Autonomous system (AS) –Backbone router –Area border router (ABR) –Autonomous system boundary router (ASBR)
38
BZUPAGES.COM Administrative Classification The decision making process of EGPs is far more complex than that of internal protocols The power and routing flexibility associated with EGPs requires knowledge and understanding of the complex nature of your network and its traffic EGPs can let you influence and manage traffic only as it enters or leaves your AS One member of EGPs is the Exterior Gateway Protocol (EGP) EGP was the first protocol developed that allowed isolation of autonomous systems EPG is not used today and is replaced by the Border Gateway Protocol
39
BZUPAGES.COM Administrative Classification Border Gateway Protocol (BGP) version 4 is the most widely used exterior protocol in the world BGP is a well established standard and commonly used by ISPs and in very large companies there are actually two different classifications of BGP –internal –external iBGP is used for internal routing eBGP is used for external routing iBGP functions under different rules than eBGP If two routers running BGP are in the same AS, they are running an iBGP connection
40
BZUPAGES.COM Administrative Classification BGP communication starts by establishing peers Once the peers have been established, BGP routing information is exchanged and updated as necessary BGP is an advanced distance vector protocol that uses triggered updates for communicating changes in the routing environment Routing loops in BGP are avoided by using the AS-path attribute BGP uses active TCP sessions that are setup and continuously maintained. Convergence in the routing environment is very fast BGP has features that you can use to help speed the convergence of the network routes under your control
41
BZUPAGES.COM Hierarchical Routing Hierarchical routing depends on hierarchical addressing It is a routing technique originally designed to help reduce the size of the routing tables on the Internet as well as speed up the overall routing process The concept uses an address block or blocks to represent different sections of a network Summarizing routes is often referred to as supernetting networks The process of summarization is built around the binary bit patterns just as in subnetting The difference is that rather than extending the subnet mask by adding bits, we remove bits
42
BZUPAGES.COM Hierarchical Routing By using summarization, you reduce the routing tables on each router To accomplish the summarization, you need to determine how many bits to unmask or un-subnet in order to make the networks appear as one big address block The routing protocol must transmit the network prefix along with the network address during route advertisements
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.