Chapter1 The Internetworking Model 3
The Evolution of Networks 3
1960s and 1970s:Centralized Processing 3
PART1 INTRODUCTION TO INTERNETWORKING 3
1970s and 1980s:Networks 4
Presentation Layer 5
1980s and 1990s:Internetworks 6
1990s:Global Internetworking 7
NetworkTypes and Devices 9
Local-Area Networks(LANs) 9
Wide-Area Networks(WANs) 10
Enterprise Networks 12
Network Design Goals 13
The Layered Model 14
Why Use a Layered Model? 14
Application Layer 15
Session Layer 16
Transport Layer 16
Network Layer 16
Data Link Layer 16
Physical Layer 16
Peer-to-Peer Communications 17
Data Encapsulation and Headers 18
Step1:Build the Data 19
Step2:Package Data for End-to-End Transport 20
Step3:Append Network Address in Header 20
Step4:Append Local Address in Data-Link Header 20
Step5: Convert to Bits for Transmission 20
Summary 21
Chapter One Test: The Internetworking Model 22
Reviewing Command History 24
Application Layer 25
Chapter2 Applications and Upper Layers 25
Text and Data Formatting and Conversion 27
Pressentation Layer 27
Graphics Formatting and Conversion 28
Audio and Video Formatting and Conversion 28
Session Layer 28
Transport Layer 29
Multiplexing 30
Connection-Oriented Sessions 31
Flow Control and Congestion Avoidance 32
Flow Control with Windowing 33
Positive Acknowledgment 35
Summary 36
Chapter Two Test:Applications and Upper Layers 37
Chapter3 Physical and Data Link Layers 39
Basic Data-Link and Physical Layer Functions 39
LAN Standards and Standards Organizations 40
LAN Data Link Sublayers 41
LLC Sublayer Functions 42
MAC Sublayer Functions 42
Physical and Logical Addressing 43
MAC Addresses 43
Finding the MAC Address 44
Common LAN Technologies 46
Ethernet and IEEE802.3 46
The Ethernet/802.3Physical Layer 47
The Ethernet/802.3Interface 48
Ethernet/802.3Operation 49
Ethernet/802.3Broadcasts and Multicasts 50
Ethernet Frame Types 50
Ethernet/802.3Reliability 52
High-Speed Ethernet Options 53
Token Ring and IEEE802.5 55
Physical Layer: Token Ring/802.5 56
The Token Ring/802.5 Interface 57
Token Ring/802.5 Operation 58
Token Ring/802.5 Media Control 59
Token Ring/802.5 Active Monitor 60
Token Ring/802.5 Reliability 60
FDDI 61
Physical Layer: FDDI 62
The FDDI Interface 63
FDDI Dual-Ring Reliability 63
Common WAN Technologies 64
Physical Layer: WAN 66
High-Level Data Link Control(HDLC) 67
Link Access Procedure, Balanced(LAPB) 67
Synchronous Data Link Control(SDLC) 67
Data Link Layer: WAN Protocols 67
Point ╰o-Point Protocol (PPP) 68
Integrated Services Digital Network(ISDN) 68
Summary 68
Frame Relay 68
Chapter Three Test: Physical and Data Link Layers 69
Chapter4 Network Layer and Path Determination 71
Network Layer Basics 71
Path Determination 72
Communicating Path Information 73
Addressing: Network and Host 74
Protocol Addressing Variations 75
TCP/IP Network Addressing 76
Other Protocol Addressing 77
Routing Uses Network Addresses 78
Routed Versus Routing Protocol 79
Routed Protocol 79
Routing Protocol 79
Network-Layer Protocol Operations 80
Multiprotocol Routing 81
Static Versus Dynamic Routes 82
Static Route Example 82
Default Roure 83
Adapting to Topology Change 84
Dynamic Routing Operations 85
Representing Distance with Metrics 86
Routing Protocols 87
Distance Vector Routing 88
Distance Vector Network Discovery 89
Distance Vector Topology Changes 90
Problem: Routing Loops 91
Symptom: Counting to Infinity 92
Solution: Defining a Maximum 92
Solution: Poison Reverse 93
Solution: Split Horizon 93
Solution: Hold-Down Timers 94
Solution: Triggered Updates 95
Implementing Solutions in Multiple Routes 96
Link-State Routing 98
Link-State Network Discovery 98
Link-State Topology Changes 100
Link-State Concerns 100
Problem: Link-State Updates 101
Solution: Link-State Mechanisms 103
Comparing Distance Vector Routing to Link-State Routing 103
Hybrid Routing 104
Basic Routing Processes 105
LAN-to-LAN Routing 105
LAN-to-WAN Routing 106
Summary 107
Chapter Four Test: Network Layer and Path Determination 108
Chapter5 Basic Router Operations 111
Starting Up a Router 111
External Configuration Sources 112
Internal Configuration Components 113
RAM/DRAM 113
NVRAM 113
Flash Memory 113
ROM 114
Interfaces 114
Auxiliary Ports 114
System Startup Overview 114
Accessing the User Interface 116
Router Modes 116
ROM Monitor Mode 117
Privileged EXEC Mode 117
User EXEC Mode 117
RXBoot Mode 118
Global Configuration Mode 118
Setup Mode 118
Other Configuration Modes 119
Logging In to the Router 119
Using Passwords 119
Individual Line Passwords 120
Privileged EXEC Mode Password 120
Encrypted Passwords 120
Using a Password 121
User Mode Command 121
Privileged Mode Command List 122
Context-Sensitive Help 123
Using Enhanced Editing Commands 123
Examining Router Status 125
show version Command 127
show startup-config Command and show running-config Command 128
show interfaces Command 128
show protocols Command 130
Summary 130
Chapter Five Test: Basic Router Operations 131
Chapter6 Configuring a Router 133
Loading Configuration Files 134
Loading Configuration Files—Releases Before10.3 135
Loading Configuration Files from a TFTP Server 135
Fundamental Configuration Tasks 136
Overview of Router Modes 136
Configuring Router Identification 138
Password Configuration 140
Console Password 140
Privileged EXEC Mode Password 141
Virtual Terminal Password 141
Password Encryption 142
Configuring and Managing an Interface 142
The show interfaces Command 143
Interpreting Interface Status 144
Configuring a Serial Line 145
Determining DCE/DTE Status 147
Verifying Your Changes 148
Shutting Down an Interface 148
Verifying Configuration Changes—Release 10.3and Later 149
Saving Configuration Changes—Release10.3+ 152
Saving Configuration Changes—Releases Before10.3 153
Managing the Configuration Environment 153
Locating the Cisco IOS Software 154
Determining the Current Configuration Register Value 155
Boot System Options in Software 157
Preparing for a Network Backup Image 158
Viewing Available Memory and the Image Filename 159
Greating Software Image Backup 161
Upgrading the Image from the Network 162
Overwriting an Existing Image 164
Creating or Changing a Configuration Using Setup Mode 165
Setup Mode Global Parameters 166
Setup Mode Interface Parameters 167
Setup Mode Script Review 168
Summary 169
Chapter Six Test: Configuring a Router 170
Chapter7 Discovaring and Accessing Other Cisco Routers 175
Cisco Discovery Protocol Overvew 175
Using CDP on a Local Router 177
Altering CDP Parameters 178
Showing CDP Neighbors 179
Showing CDP Entries for a Neighboring Device 180
Summary 181
Chapter Seven Test: Discovering and Accessing Other Cisco Routers 182
PART2 NETWORKING PROTOCOL SUITES 187
Chapter8 TCP/IP Overview 187
TCP/IP Protocol Stack 188
Application LayerOverview 189
Transport Layer Overview 190
TCP Segment Format 191
Port Numbers 192
TCP Port Numbers 193
TCP Handshake/Open Connection 194
TCP Simple Acknowledgment and Windowing 195
TCP Sequence and Acknowledgment Numbers 197
Internet Layer Overview 198
UDP Segment Format 198
IP Datagram 199
Internet Control Message Protocol(ICMP) 200
ICMP Testing 201
Address Resolution Protocol 203
Reverse ARP 203
Summary 204
Chapter Eight Test: TCP/IP Overview 205
Chapter9 IP Addressing 207
TCP/IP Address Overview 207
IP Addressing Overview 208
IP Address Classes 209
IP Address Bit Patterns 210
The First Octet Rule 211
Host Addresses 212
Concepts of IP Address Configuration 212
Addressing Without Subnets 213
Addressing with Subnets 214
Subnetting Addressing 215
Subnet Mask 216
Decimal Equivalents of Bit Patterns 216
Subner Mask Without Subnets 217
Subnet Planning 218
Subnet Mask with Subnets 218
Class B Subnet Planning Example 220
Class C Subnet Planning Example 220
Broadcast Addresses 221
Configuration Commands 222
Configuring IP Addresses 223
IP Host Names 224
Name Server Configuration 224
Display Host Names 225
Name-to-Address Schemes 225
Verifying Address Configuration 226
Telnet Command 227
Simple Ping Command 227
Extended Ping Command 228
Trace Command 229
Smmary 230
Chapter Nine Test: IP Address Configuration 231
Chapter10 IP Routing Configuration 233
Basic Mechanisms and Commands of IP Routing 233
Setting Up the Initial IP Routing Table 233
Understanding How IP Routing Learns Destinations 235
Specifying Administrative Distance Values 235
Configuring Static Routes 237
Configuring Default Routers 239
Grouping into Autonomous Systems 239
Using Interior or Exterior Routing Protocols 240
Routing Protocol Problems 242
Interior IP Routing Protocols 242
Completing the IP Routing Configuration Tasks 243
Configuring Dynamic Routing 243
Configuring RIP 244
Configuring RIP Router Commands 245
Viewing IP RIP Information 247
Configuring IGRP 249
Understanding IGRP Operation 250
Flash Updates 250
Poison Reverse 250
Holddowns 250
Split Horizon 251
Using the IGRP Composite Metric 251
Unequal-Cost Load Balancing Feature 253
Creating an IGRP Routing Process 254
Displaying IGRP Routing Information 256
Summary 258
Chapter Ten Test: IP Routing Configuration 259
Chapter11 Configuring Novell IPX 263
IPX Routing Overview 263
Cisco Routers in NetWare Networks 263
Novell NetWare Protocol Suite 264
Key Novell NetWare Features 265
Novell IPX Addressing 267
How to Determine the IPX Address 267
Multiple Novell Encapsulations 268
Novell and Cisco Encapsulation Names 269
Novell Uses RIP for Routing 270
SAP: Supporting Service Advertisements 272
GNS: The Get Nearest Server Process 273
Configuring IPX Routing 274
Novell IPX Global Configuration Commands 275
ipx routing Command 275
ipx maximum-paths Command 275
ipx route destination-net next-hop Command 276
Novell IPX Interface Configuration Commmands 276
interface Command 276
ipx network Command 276
Novell IPX Configuration Example 277
Verifying and Monitoring IPX Routing 278
Monitoring the Status of an IPX Interface 279
Monitoring IPX Routing Tables 280
Monitoring the Novell IPX Servers 282
Monitoring IPX Traffic 283
Troubleshooting IPX Routing 283
Troubleshooting IPX SAP 284
Summary 285
Chapter Eleven Test: Configuring Novell IPX 286
Chapter12 Configuring Apple Talk 289
Apple Talk Oveview 289
Apple Talk Protocol Stack 289
Apple Talk Features 291
Nonextended or Extended Networks 291
Apple Talk Addressing 292
Extended Addressing 293
AppleTalk Address Acquisition 294
Limiting Requests for Services 295
Apple Talk Services 296
Locating Apple TalkServices 297
Configuring Apple Talk 298
AppleTalk Configuration Tasks 298
appletalk protocol Command 299
appletalk routing Command 299
AppleTalk Configuration Commands 299
appletalk cable-range Command 300
appletalk zone Command 300
Apple Talk Configuration Example 300
Discovery Mode 302
Discovery Mode Example 303
Verifying Your Apple Talk Configuration 304
Monitoring AppleTalk 305
Summary 307
Chapter Twelve Test: Configuring AppleTalk 308
Chapter13 Basic Traffic Management with Access Lists 311
Access Lists Overview 311
Why Use Access Lists? 311
Standard Access Lists 313
Extended Access Lists 313
How Access Lists Work 314
A List of Tests: Deny or Permit 315
Access List Command Overview 317
How to Identify Access Lists 317
TCP/IP Access Lists 318
Testing Packets with IP Access Lists 319
Key Concepts for IP Access Lists 319
How to Use Wildcard Mask Bits 320
Matching Any IP Address 322
Matching a Specific IP Host Address 323
IP Standard Access Configuration 324
Example1: Permit My Network Only 324
Example2: Deny a Specific Host 325
Example3: Deny a Specific Subnet 326
Expended IP Access Lists 327
Extended Access List Configuration 328
Example1: Deny FTP for EO 329
Example2: Deny Only Telnet out of E0; Permit All Other Traffic 330
Named Access Lists 331
Where to Place IP Access Lists 333
Verifying Access Lists 333
Monitoring Access List Statements 334
Novell IPX Access Lists 334
Testing Packets Using Novell Access Lists 335
Key Concepts for IPX Access Lists 335
Controlling IPX Overhead 337
IPX Standard Access List Configuration 338
Standard IPX Access List Example 339
IPX Extended Access List Configuration 340
Normal IPX SAP Operation 341
How to Use SAP Filters 342
SAP Filter Configuration Commands 343
AppleTalk Access Lists 346
Verifying IPX Access Lists 346
Testing Packets Using AppleTalk Access Lists 347
AppleTalk Network Structures 348
Key Concepts for AppleTalk Access Lists 349
AppleTalk Access List Procedures 350
AppleTalk Access List Commands 351
ZIP Reply Filter Configuration 352
Verifying AppleTalk Access Lists 353
Summary 353
Chapter Thirteen Test: Basic Traffic Management with Access Lists 354
PART3 WIDE-AREA NETWORKING 359
Chapter14 Introduction to WAN Connections 359
WAN Services 359
Interfacing WAN Service Providers 360
Customer Premises Equipment(CPE) 361
Demarcation 361
Toll Network 362
Local Loop 362
Central Office(CO)Switch 362
Subscriber to Provider Interface 363
Using WAN Services with Routers 364
WAN Frame Format Summary 364
An Overview of PPP 366
Layering PPP Elements 367
PPP LCP Configuration Options 368
PPP Session Establishment 369
Phase1: Link Establishment 369
Phase2: Authentication(Optional) 369
Phase3: Network-Layer Protocol 370
Selecting a PPP Authentication Protocol 370
PAP 370
CHAP 371
Configuring PPP Authentication 372
Summary 374
Verifying PPP 374
Chapter Fourteen Test: Introduction to Serial Connections 375
Chapter15 Configuring X.25 377
X.25 Overview 377
X.25 Protocol Stack 378
X.25 DTE and DCE 379
X.25{X.121}Addressing Format 380
X.25Encapsulation 382
X.25Virtual Circuits 382
SVC Usage 383
Single Protocol Virtual Circuits 384
Multiprotocol Virtual Circuits 385
Configuring X.25 385
encapsulation x25 Command 386
x25 map Command 387
x25 address Command 387
x.25 Configuration Example 388
Additional Configuration Tasks 389
Configuring X.25 VC Ranges 389
Configuring X.25 Packer Sizes 390
Configuring X.25 Window Parameters 391
X.25 Additional Configuration Example 392
Setting Up the Router as a Switch 393
X.25 Local and XOT Switching 394
Monitoring X.25 395
Summary 396
Chapter Fifteen Test: Configuring X.25 397
Chapter 16 Configuring Frame Relay 399
Frame Relay Overview 399
Data-Link Connection Identifier(DLCI) 400
Frame Relay Terminology 400
Local Access Rate 400
Local Management Interface(LMI) 401
Committed Information Rate(CIR) 402
Oversubscription 402
Committed Burst(Bc) 402
Excess Burst 402
Forward Explicit Congestion Notification (FFCN) 403
Backward Explicit Congestion Notification(BECN) 403
Discard Eligibility(DE)Indicator 403
Frame Relay Operation 403
Configuring Frame Relay 405
Configuring Optional Commands 407
Verifying Frame Relay Operation 408
Selecting a Frame Relay Topology 409
Partial-Mesh Topology 410
Reachability and Resource Issues for Frame Relay 410
Star Topology 410
Full-Mesh Toplogy 410
Resolving Reachability and Resource Issues: Subinterfaces 411
Configuring Subinterfaces 413
Multipoint Subinterfaces Configuration Example 414
Point-to-Point Subinterfaces Configuration Example 416
Summary 417
Chapter Sixteen Test: Configuring Frame Relay 419
APPENDIXES 423
Appendix A Chapter Test Answer Key 423
Appendix B Configuring DECnet 431
Overview of DECnet 431
Node Assignments 433
Designated Routers 434
Routers Pass Information 434
Level 1 and Level 2 Routing 435
DECnet Configuration Commands 435
DECnet Configuration Tasks 435
DECnet Configuration Commands 437
DECnet Configuration Example 437
Configuring DECnet Access Lists 438
DECnet Access List Commands 439
Controlling DECnet Example 439
Monitoring DECnet 440
Appendix C Configuring Banyan VINES 441
VINES Overview 441
Network Number 442
Subnet Number 442
Hello Messages 443
Host Address Assignment 443
Cisco VINES Network Number 443
Configuring VINES 444
VINES Configuration Commands 444
VINES Access Lists 446
Monitoring VIENS Operation 447
Appendix D Autolnstalling Configuration Data 449
Appendix E Decimal to Hexadecimal and Binary Conversion Table 453
Appendix F Password Recovery 461
Technique #1 462
Technique #2 464
Appendix G Frame Relay Examples and Configurations 467
AppleTalk over Frame Relay Example 467
Configuring IPX over Frame Relay Example 468
Frame Relay Switching Example 470
Appendix H Glossary 473
Index 513