- Page 2 and 3:
Understanding the Network A Practic
- Page 4 and 5:
IOS Authentication and Accounting S
- Page 6 and 7:
About the Reviewers These reviewers
- Page 8 and 9:
Tell Us What You Think As the reade
- Page 10 and 11:
mostly dealt with interconnecting m
- Page 12 and 13:
• A short introduction to SNMP Ap
- Page 14 and 15:
In theory, a computer network can o
- Page 16 and 17:
Coaxial cable has a single solid co
- Page 18 and 19:
• Radio transmission—It is achi
- Page 20 and 21:
• Baseband transmission applies t
- Page 22 and 23:
Ring Topology Figure 1.3. The bus t
- Page 24 and 25:
Packets and frames are often used a
- Page 26 and 27:
Asynchronous transmission involves
- Page 28 and 29:
Figure 1.6. Collision handling unde
- Page 30 and 31:
In a ring topology, a token is pass
- Page 32 and 33:
Repeaters The repeater was introduc
- Page 34 and 35:
the network. If your 50-node networ
- Page 36 and 37:
Figure 1.12. A collection of nodes
- Page 38 and 39:
their destination, type, and conten
- Page 40 and 41:
shop, you are using Novell's Direct
- Page 42 and 43:
Figure 1.14. The OSI and Internet r
- Page 44 and 45:
Layer 7: Application This layer pro
- Page 46 and 47:
end-to-end, sequenced data delivery
- Page 48 and 49:
outer, the delivery path might be d
- Page 50 and 51:
and network transport is a very imp
- Page 52 and 53:
Figure 1.16. The "bottom up" commun
- Page 54 and 55:
Chapter 2. The Networker's Guide to
- Page 56 and 57:
Internet Society, a nonprofit organ
- Page 58 and 59:
• First, it performs translations
- Page 60 and 61:
Figure 2.2. The IP header. • Vers
- Page 62 and 63:
To assist in the reassembly process
- Page 64 and 65:
Figure 2.3. IP address classes comp
- Page 66 and 67:
taking the natural mask of the addr
- Page 68 and 69:
Classful Subnetting Examples The im
- Page 70 and 71:
21 2,000 8,000 255.255.248.0 22 1,0
- Page 72 and 73:
classful-based address space model.
- Page 74 and 75:
Table 2.6. Classless Network Addres
- Page 76 and 77:
NOTE Because CIDR is used for addre
- Page 78 and 79: will connect in the future, it is b
- Page 80 and 81: Routers are also called intermediat
- Page 82 and 83: IP datagrams for which the local ho
- Page 84 and 85: 1. The Layer 3 to Layer 2 address m
- Page 86 and 87: 3. Router B—Router B receives the
- Page 88 and 89: connected networks. Figure 2.11 ill
- Page 90 and 91: Figure 2.12. A simple regional (ISP
- Page 92 and 93: gw1, gw2, gw4 3 gw1, gw3, gw4 3 gw1
- Page 94 and 95: Dynamic routing might not be requir
- Page 96 and 97: The transport layer as a whole repr
- Page 98 and 99: window to reflect changes in the pa
- Page 100 and 101: The TCP Header The TCP header provi
- Page 102 and 103: 53 DNS (Domain Name Service) 67 BOO
- Page 104 and 105: SNMP Simple Network Management Prot
- Page 106 and 107: uses both TCP and UDP for service d
- Page 108 and 109: RFC 974 Mail routing and the domain
- Page 110 and 111: Figure 3.1. Physical versus logical
- Page 112 and 113: Figure 3.2. The AppleTalk protocol
- Page 114 and 115: AppleTalk Address Resolution Protoc
- Page 116 and 117: of 400 microseconds, in addition to
- Page 118 and 119: Along with the SAP, there is a 5-by
- Page 120 and 121: delivery is a best-effort delivery
- Page 122 and 123: • DDP checksum (long header only)
- Page 124 and 125: eachable within the internetwork. T
- Page 126 and 127: information from the router's other
- Page 130 and 131: AURP also provides facilities for h
- Page 132 and 133: interaction. Each element can be us
- Page 134 and 135: Table 3.1. A Sample Zone Table Zone
- Page 136 and 137: AppleTalk Data-Stream Protocol Appl
- Page 138 and 139: Networked file systems were availab
- Page 140 and 141: Table 3.2. IPX Encapsulation Scheme
- Page 142 and 143: The network address is 32 bits in l
- Page 144 and 145: • Source port a 16-bit field that
- Page 146 and 147: Figure 3.15. SAP message format.
- Page 148 and 149: C 899 (SNAP) Fa1/0 R 88 [02/01] via
- Page 150 and 151: published in the IBM PC Network Tec
- Page 152 and 153: Msg.Receive.Datagram Receives a dat
- Page 154 and 155: Chapter 4. LAN Internetworking Tech
- Page 156 and 157: 802.3u. The IEEE standardization pr
- Page 158 and 159: value, as the source and destinatio
- Page 160 and 161: There are several baseband line sig
- Page 162 and 163: data communication cabling system c
- Page 164 and 165: • Photons versus electrons—Fibe
- Page 166 and 167: Multimode's larger size permits mul
- Page 168 and 169: Figure 4.4. The FDDI-MIC, ST-type,
- Page 170 and 171: Figure 4.6. 10Base-T multiport repe
- Page 172 and 173: When Fast Ethernet first became a s
- Page 174 and 175: the operating rate of the MAC incre
- Page 176 and 177: [†] To accommodate for 1,000 Base
- Page 178 and 179:
• Preamble (7 bytes)—Every devi
- Page 180 and 181:
Figure 4.8. The SNAP and 802.3 (Nov
- Page 182 and 183:
A broadband MAU operates in many re
- Page 184 and 185:
Figure 4.10. 10Base-5 network expan
- Page 186 and 187:
gives it a maximum cable segment di
- Page 188 and 189:
Because the hub is effectively the
- Page 190 and 191:
Figure 4.15. A 10Base-5/10Base-T ne
- Page 192 and 193:
10Base-FL 10Base-FL is the IEEE sta
- Page 194 and 195:
This interface is only specified fo
- Page 196 and 197:
connectors. The 100Base-FX PMD oper
- Page 198 and 199:
100VG-AnyLAN operates over Category
- Page 200 and 201:
not a physical interface. Rather, a
- Page 202 and 203:
distances between 500m and 550m are
- Page 204 and 205:
the burst timer. When a transmittin
- Page 206 and 207:
cost anywhere from two to six times
- Page 208 and 209:
management, but also ring station c
- Page 210 and 211:
includes ring station insertions an
- Page 212 and 213:
has a minimum frame size of 22 byte
- Page 214 and 215:
• Beacon (BCN)—Two classificati
- Page 216 and 217:
Figure 4.20. 4/16 Token Ring data l
- Page 218 and 219:
Figure 4.21. Single and multiple MA
- Page 220 and 221:
o IBM Type 3 cabling, data-grade un
- Page 222 and 223:
Figure 4.23. FDDI backbone utilizin
- Page 224 and 225:
the next station. When a station ha
- Page 226 and 227:
• Connection management—Connect
- Page 228 and 229:
mirrors that redirect the light awa
- Page 230 and 231:
dial-on-demand synchronous and asyn
- Page 232 and 233:
The PSTN Hierarchy The U.S. PSTN is
- Page 234 and 235:
LEC-CO has interconnection trunk li
- Page 236 and 237:
transmission system that could redu
- Page 238 and 239:
Multiplexers TDM and STDM data tran
- Page 240 and 241:
often employed when using PSTN carr
- Page 242 and 243:
NOTE The "DS" abbreviation is used
- Page 244 and 245:
permits the entire circuit to be se
- Page 246 and 247:
Ordering Your T1 Today, the common
- Page 248 and 249:
DTE status indicators. Most integra
- Page 250 and 251:
standard, and it can be used for ST
- Page 252 and 253:
SONET/SDH Operation Although SONET
- Page 254 and 255:
Figure 5.8. STS and SDH base rate f
- Page 256 and 257:
SS7 Components The SS7 signaling sy
- Page 258 and 259:
Figure 5.10. SS7 reference model. T
- Page 260 and 261:
The problem with ISDN was its actua
- Page 262 and 263:
Speed Dialing Supplemental Caller I
- Page 264 and 265:
• Network Termination type 2 (NT2
- Page 266 and 267:
its for control data), and operates
- Page 268 and 269:
ISDN Addressing ISDN PRI and BRI ci
- Page 270 and 271:
The endpoint, which can be a router
- Page 272 and 273:
PSN networks are commonly referred
- Page 274 and 275:
This topology is limited to the cap
- Page 276 and 277:
ATM uses a connection-oriented, vir
- Page 278 and 279:
provided was a set of specification
- Page 280 and 281:
STP = Shielded Twisted Pair UTP = U
- Page 282 and 283:
• Minimum Cell Rate (MCR)—Defin
- Page 284 and 285:
The SAR footer contains two fields:
- Page 286 and 287:
Figure 5.20. ATM Forum-defined priv
- Page 288 and 289:
HDLC medium-dependent frame consist
- Page 290 and 291:
• LCP link connection and negotia
- Page 292 and 293:
Figure 5.22. PPP frame format. The
- Page 294 and 295:
Additional Resources Ali Syed. Digi
- Page 296 and 297:
LANs now use dedicated, high-speed
- Page 298 and 299:
Bridges do forward traffic between
- Page 300 and 301:
Bridging Functionality The first LA
- Page 302 and 303:
idge port from which the packet was
- Page 304 and 305:
forwarded by bridge 1), it assumes
- Page 306 and 307:
The root election process is won ba
- Page 308 and 309:
Figure 6.6. A Token Ring network in
- Page 310 and 311:
and so on) should be localized as g
- Page 312 and 313:
• Link aggregation or fat pipe te
- Page 314 and 315:
ackbones are also still common, par
- Page 316 and 317:
Switch Ports and Related Functions
- Page 318 and 319:
Port Trunking (Link Aggregation) Et
- Page 320 and 321:
the spanning tree is also recalcula
- Page 322 and 323:
mirroring does just what its name s
- Page 324 and 325:
Segment port addressing was the PAS
- Page 326 and 327:
Typically, when evaluating switch a
- Page 328 and 329:
10Mbps bt = 100 nsec 16Mbps bt = 63
- Page 330 and 331:
switch configuration, add the confi
- Page 332 and 333:
also required to provide any switch
- Page 334 and 335:
grouped into VLAN groups consisting
- Page 336 and 337:
ULP-based VLANs are a comparatively
- Page 338 and 339:
with a specific VLAN. A ULP-based V
- Page 340 and 341:
The mapping layer provides the mech
- Page 342 and 343:
In addition to better overall netwo
- Page 344 and 345:
The third reason is perhaps an exte
- Page 346 and 347:
hardware-based routers is essential
- Page 348 and 349:
"Classical IP over ATM." Keeping in
- Page 350 and 351:
Historically, due to ATM's faster o
- Page 352 and 353:
LAN transmission protocols operate
- Page 354 and 355:
etween the different ELANS must be
- Page 356 and 357:
upon startup. After the LEC is conf
- Page 358 and 359:
equires that a datagram encapsulati
- Page 360 and 361:
traffic flow management issues that
- Page 362 and 363:
Cisco Systems, Inc. Cisco IOS Switc
- Page 364 and 365:
Cisco's router product line is quit
- Page 366 and 367:
ROM is used on the 1600, 2500, 2600
- Page 368 and 369:
Cisco also has a Windows-based tool
- Page 370 and 371:
Pin 7 Brown to Pin 6 Pin 6 White to
- Page 372 and 373:
• A PC will use the Cisco "termin
- Page 374 and 375:
Step 8. This command starts the ter
- Page 376 and 377:
• Major release (MR), according t
- Page 378 and 379:
There are two methods for installin
- Page 380 and 381:
Privileged EXEC The privileged EXEC
- Page 382 and 383:
To exit out of configuration EXEC m
- Page 384 and 385:
• • • or • To save the ru
- Page 386 and 387:
'copy system:/running-config' Addr
- Page 388 and 389:
Cisco provides a wealth of informat
- Page 390 and 391:
Here is another example, to display
- Page 392 and 393:
--More-- uses the Spacebar to scro
- Page 394 and 395:
The privileged EXEC command will p
- Page 396 and 397:
7200router#dir /all Directory of sl
- Page 398 and 399:
Router#configure network Host or ne
- Page 400 and 401:
the variations of the show command.
- Page 402 and 403:
no ip address shutdown ! interface
- Page 404 and 405:
Router(config)#hostname Concord-GW
- Page 406 and 407:
Configuring AppleTalk and IPX IP, h
- Page 408 and 409:
Ridge-GW(config-if)#ipx update inte
- Page 410 and 411:
S&M 31-31 Total of 4 zones Ridge-GW
- Page 412 and 413:
Concord-GW(config-line)#privilege l
- Page 414 and 415:
UNIX systems. To setup LPD, first t
- Page 416 and 417:
Setting up the dial access has two
- Page 418 and 419:
Or from a adjacent DCHP server usin
- Page 420 and 421:
If you use AAA instead of local aut
- Page 422 and 423:
conf-reg changes, be sure that you
- Page 424 and 425:
Help is available by typing ? or he
- Page 426 and 427:
1. In rommon, use the or command
- Page 428 and 429:
Setting Up TFTP Boot By default, th
- Page 430 and 431:
[OK - 9212736/16777216 bytes] Verif
- Page 432 and 433:
After your images are loaded, you n
- Page 434 and 435:
Router7200#format slot0: Format ope
- Page 436 and 437:
91% Download Complete! program load
- Page 438 and 439:
NOTE For more information about NTP
- Page 440 and 441:
timestamps debug> for debug message
- Page 442 and 443:
00:00:08: %LINK-3-UPDOWN: Interface
- Page 444 and 445:
Local-AS#config t Enter configurati
- Page 446 and 447:
#Logging for all internal routers l
- Page 448 and 449:
Subject: gw routers log Date: Wed,
- Page 450 and 451:
Kerberos (introduced in IOS version
- Page 452 and 453:
http://www.pdc.kth.se/kth-krb/ http
- Page 454 and 455:
local-AS#config t Enter configurati
- Page 456 and 457:
Now the router's login is back to i
- Page 458 and 459:
After the daemon is built and added
- Page 460 and 461:
PPPuser Authentication-Type = Realm
- Page 462 and 463:
and The authorization process work
- Page 464 and 465:
There are three accounting notice o
- Page 466 and 467:
Chapter 8. TCP/IP Dynamic Routing P
- Page 468 and 469:
The Routing Information Protocol (R
- Page 470 and 471:
operate at Fast Ethernet speeds and
- Page 472 and 473:
Figure 8.3. A route-diverse network
- Page 474 and 475:
Network Convergence Convergence is
- Page 476 and 477:
The important differences between D
- Page 478 and 479:
192.119.17.192 /26 192.119.18.0 /26
- Page 480 and 481:
19.66 17.64 /26 17.1 19.66 18.0 /24
- Page 482 and 483:
the network is directly connected,
- Page 484 and 485:
• Ease of use • Reliability •
- Page 486 and 487:
As a rule, static routes have a rol
- Page 488 and 489:
Figure 8.7. An example network usin
- Page 490 and 491:
Figure 8.8. The RIPv1 and RIPV2 mes
- Page 492 and 493:
Figure 8.9. Route poisoning example
- Page 494 and 495:
within the AS, and classful route s
- Page 496 and 497:
OSPF is designed to operate in both
- Page 498 and 499:
Figure 8.11. The OSPF router class
- Page 500 and 501:
In Figure 8.12, the ABRs need to kn
- Page 502 and 503:
that provide a way for routers to e
- Page 504 and 505:
o Hello—Messages are used to crea
- Page 506 and 507:
If any of the steps do not meet the
- Page 508 and 509:
The manner in which a route entry i
- Page 510 and 511:
own traversing their network backbo
- Page 512 and 513:
BGP is based on the vector distance
- Page 515 and 516:
All BGP messages use a 19-byte head
- Page 517 and 518:
Tanenbaum Andrew S. Computer Networ
- Page 519 and 520:
When constructing access control li
- Page 521 and 522:
ACL (using the ACL ID number) is as
- Page 523 and 524:
NOTE In situations where you are fi
- Page 525 and 526:
asbr-a2(config)#access-list 1 deny
- Page 527 and 528:
Interior Gateway Routing Protocol O
- Page 529 and 530:
Rsh BSD Remote Shell TCP 512 Ftp Fi
- Page 531 and 532:
Defense Against IP Denial of Servic
- Page 533 and 534:
http://www.cert.org/ http://www.roo
- Page 535 and 536:
suppress the zone name propagation
- Page 537 and 538:
! access-list 601 permit nbp 1 obje
- Page 539 and 540:
Nlsp Match on NetWare Link State Pr
- Page 541 and 542:
oute-map identifier, which associat
- Page 543 and 544:
ehave this way by default. With IP,
- Page 545 and 546:
To ensure that the proper router ac
- Page 547 and 548:
Network Address Translation Interne
- Page 549 and 550:
The IOS NAT implementation can prov
- Page 551 and 552:
This approach allows the administra
- Page 553 and 554:
equired) can be sent across public
- Page 555 and 556:
Encrypted GRE Tunnels To create enc
- Page 557 and 558:
Displaying Tunnel Information To mo
- Page 559 and 560:
persephone(config-if)#service-modul
- Page 561 and 562:
Displaying PPP-Related Configuratio
- Page 563 and 564:
NOTE Although ISDN bearer channels
- Page 565 and 566:
leibniz(config-if)#ppp multilink le
- Page 567 and 568:
access-list 100 permit tcp any any
- Page 569 and 570:
MTU 1500 bytes, BW 64 Kbit, DLY 200
- Page 571 and 572:
T - traffic engineered route Gatewa
- Page 573 and 574:
15. jupiter(config-if)#appletalk zo
- Page 575 and 576:
Figure 9.4. Point-to-point and poin
- Page 577 and 578:
interface to feed each VLAN, a sing
- Page 579 and 580:
Figure 9.5. A full-mesh FR point-to
- Page 581 and 582:
interface serial0.5 point-to-point
- Page 583 and 584:
! hostname robin ! interface serial
- Page 585 and 586:
circuit descriptor, is the PVC ID u
- Page 587 and 588:
1. Establish the signaling PVC betw
- Page 589 and 590:
• — Displays global inbound and
- Page 591 and 592:
Additional Resources Chappel Laura
- Page 593 and 594:
using a single router or pair of ro
- Page 595 and 596:
Table 10.2. IOS Administrative Dist
- Page 597 and 598:
C 172.16.192.0/21 is directly conne
- Page 599 and 600:
outer#show ip masks 172.16.0.0 Mask
- Page 601 and 602:
When the route table is flushed, th
- Page 603 and 604:
Although static routing is not an i
- Page 605 and 606:
Gateway of last resort is 192.168.0
- Page 607 and 608:
! To reach networks of asbr-a1 via
- Page 609 and 610:
192.168.160.0/30 is subnetted, 1 su
- Page 611 and 612:
• • Router(config)#ip forward-p
- Page 613 and 614:
has no need for your routing inform
- Page 615 and 616:
Control commands: RIP is an IGP,
- Page 617 and 618:
IOS allows you to adjust how the RI
- Page 619 and 620:
In situations where you have networ
- Page 621 and 622:
Global interface subprocess comma
- Page 623 and 624:
flash updates (when changes occur b
- Page 625 and 626:
outer in the process. The idea behi
- Page 627 and 628:
IPX EIGRP functionality is similar
- Page 629 and 630:
• provides operational informati
- Page 631 and 632:
As with all debugging commands, use
- Page 633 and 634:
EIGRP). In addition, like IGRP and
- Page 635 and 636:
To get our feet wet, let's configur
- Page 637 and 638:
For OSPF, at least one interface mu
- Page 639 and 640:
According to the routing table, eve
- Page 641 and 642:
of a previous entry. Again, OSPF se
- Page 643 and 644:
172.16.0.0/16 is variably subnetted
- Page 645 and 646:
9,600 9.6 (9,600 baud modem) 10417
- Page 647 and 648:
network 192,168.12.252 0.0.0.0 area
- Page 649 and 650:
Designated and Backup Designated Ro
- Page 651 and 652:
Figure 10.3. A point-to-multipoint
- Page 653 and 654:
• Neighbor ID Pri State Dead Time
- Page 655 and 656:
Configuration commands: In C
- Page 657 and 658:
Figure 10.5. AppleTalk network segm
- Page 659 and 660:
Configuration commands:
- Page 661 and 662:
Figure 10.6. A multipoint access In
- Page 663 and 664:
classful networks. All that matters
- Page 665 and 666:
network 192.168.2.0 mask 255.255.25
- Page 667 and 668:
The command shown above sets up the
- Page 669 and 670:
Figure 10.7. The EBGP and IBGP peer
- Page 671 and 672:
• —Another very useful tool, th
- Page 673 and 674:
outer over the other. Earlier in th
- Page 675 and 676:
identifies the routes as directly c
- Page 677 and 678:
or from a specific set of networks.
- Page 679 and 680:
hostname ABR-a57 ! access-list 1 de
- Page 681 and 682:
asbr-b2(config)#Access-list 1 permi
- Page 683 and 684:
RFC 1586 Guidelines for Running OSP
- Page 685 and 686:
Actually, the purpose of network an
- Page 687 and 688:
Topology Maps An updated network to
- Page 689 and 690:
Protocol analyzers exist for FDDI,
- Page 691 and 692:
Packet Internet Groper (Ping) Ping
- Page 693 and 694:
Ping implementations vary from plat
- Page 695 and 696:
# 4. Set the mailtarget (who is get
- Page 697 and 698:
echo $size-Bit Loss Statistics > $t
- Page 699 and 700:
traceroute to www.yahoo.com (204.71
- Page 701 and 702:
samples will tell you what you need
- Page 703 and 704:
and low utilization measurements va
- Page 705 and 706:
network needs to be partitioned int
- Page 707 and 708:
Network Errors Knowing the amount a
- Page 709 and 710:
NOTE On switched Ethernet segments
- Page 711 and 712:
frame or token, and are commonly at
- Page 713 and 714:
This process begins with the transm
- Page 715 and 716:
you can use the DSU/CSU to collect
- Page 717 and 718:
1. Look at the big picture and then
- Page 719 and 720:
Managing these complex systems was
- Page 721 and 722:
necessary for maintaining the effic
- Page 723 and 724:
• Configuration management—In l
- Page 725 and 726:
Protocol (SMGP) and the OSI Common
- Page 727 and 728:
sequential order. It provides a mea
- Page 729 and 730:
functional perspective, BER employs
- Page 731 and 732:
• DESCRIPTION—Details the role
- Page 733 and 734:
SEQUENCE OF. The SEQUENCE type is u
- Page 735 and 736:
Figure 11.2. The MIB hierarchy. The
- Page 737 and 738:
Figure 11.3. The SNMP view of the I
- Page 739 and 740:
Figure 11.5. SNMP v1 and SNMP v2 da
- Page 741 and 742:
• Request ID—This field is used
- Page 743 and 744:
supports MIB-II, RMON, AppleTalk, I
- Page 745 and 746:
name. Quite often different communi
- Page 747 and 748:
Figure 11.10. Windows NT 4.0 SNMP T
- Page 749 and 750:
the Component Type screen appears,
- Page 751 and 752:
Figure 11.14. The Add/Remove Progra
- Page 753 and 754:
Figure 11.16. Selecting the compone
- Page 755 and 756:
different versions of Windows 95. F
- Page 757 and 758:
Figure 11.20. The Macintosh SNMP Ag
- Page 759 and 760:
Therefore, even if your UNIX implem
- Page 761 and 762:
management packets, MAC packets, so
- Page 763 and 764:
interpretation of the data for netw
- Page 765 and 766:
RFC 1907 RFC 1910 RFC 1944 RFC 2011