Contents
PART 1 INTRODUCTION TO INTERNETWORKING
Chapter 1 The Internetworking Model
The Evolution of Networks
1960s and 1970s: Centralized Processing
1970s and 1980s: Networks
1980s and 1990s: Internetworks
1990s: Global Internetworking
Network Types and Devices
Local-Area Networks (LANs)
Wide-Area Networks (WANs)
Enterprise Networks
Network Design Goals
The Layered Model
Why Use a Layered Model?
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
Peer-to-Peer Communications
Data Encapsulation and Headers
Step 1: Buildthe Data
Step 2: Package Data for End-to-End Transport
Step 3: Append Network Address in Header
Step 4: Append Local Address
in Data-Link Header
Step 5: Convert to Bits for Transmission
Summary
Chapter One Test: The Internetworking Model
Applications and Upper Layers
Application Layer
Presentation Layer
Text and Data Formatting and Conversion
Graphics Formatting and Conversion
Audio and Video Formatting and Conversion
Session Layer
Transport Layer
Multiplexing
Connection-Oriented Sessions
Flow Control and Congestion Avoidance
Flow Control with Windowing
Positive Acknowledgment
Summary
Chapter 2 Test: Applications and Upper Layers
Physical and Data Link Layers
Basic Data-Link and Physical Layer Functions
LAN Standards and Standards Organizations
LAN Data Link Sublayers
LLC Sublayer Functions
MAC Sublayer Functions
Physical and Logical Addressing
MAC Addresses
Finding the MAC Address
Common LAN Technologies
Ethernet and IEEE 802.3
The Ethernet/802.3 Physical Layer
The Ethernet/802.3 Interface
Ethernet/802.3 Operation
Ethernet/802.3 Broadcasts and Multicasts
Ethernet Frame Types
Ethernet/802.3 Reliability
High-Speed Ethernet Options
Token Ring and IEEE 802.5
Physical Layer: Token Ring/802.5
The Token Ring/802.5 Interface
Token Ring/802.5 Operation
Token Rmg/802.5 Media Control
Token Ring/802.5 Active Monitor
Token Ring/802.5 Reliability
FDDI
Physical Layer: FDDI
The FDDI Interface
FDDI Dual-Ring Reliability
Common WAN Technologies
Physical Layer: WAN
Data Link Layer: WAN Protocols
Synchronous Data Link Control (SDLC)
High-Level Data Link Control (HDLC)
Link Access Procedure, Balanced (LAPB)
Frame Relay
Point-to-Point Protocol (PPP)
Integrated Services Digital Network (ISDN)
Summary
Chapter 3 Test: Physical and Data Link Layers
Chapter 4 Network Layer and Path Determination
Network Layer Basics
Path Determination
Communicating Path Information
Addressing: Network and Host
Protocol Addressing Variations
TCP/IP Network Addressing
Other Protocol Addressing
Routing Uses Network Addresses
Routed Versus Routing Protocol
Routed Protocol
Routing Protocol
Network-Layer Protocol Operations
Multiprotocol Routing
Static Versus Dynamic Routes
Static Route Example
Default Route
Adapting to Topology Change
Dynamic Routing Operations
Representing Distance with Metrics
Routing Protocols
Distance Vector Routing
Distance Vector Network Discovery
Distance Vector Topology Changes
Problem: Routing Loops
Symptom: Counting to Infinity
Solution: Defining a Maximum
Solution: Split Horizon
Solution: Poison Reverse
Solution: Hold-Down Timers
Solution: Triggered Updates
Implementing Solutions in Multiple Routes
Link-State Routing
Link-State Network Discovery
Link-State Topology Changes
Link-State Concerns
Problem: Link-State Updates
Solution: Link-State Mechanisms
Comparing Distance Vector Routing to Link-State
Routing
Hybrid Routing
Basic Routing Processes
LAN-to-LAN Routing
LAN-to-WAN Routing
Summary
Chapter four Test: Network Layer
and Path Determination
Chapter 5 Basic Router Operations
Starting Up a Router
External Configuration Sources
Internal Configuration Components
RAM/DRAM
NVRAM
Flash Memory
ROM
Interfaces
Auxiliary Ports
System Startup Overview
Accessing the User Interface
Router Modes
User EXEC Mode
Privileged EXEC Mode
ROM Monitoi- Mode
Setup Mode
RXBoot Mode
Global Configuration Mode
Other Configuration Modes
Logging In to the Router
Using Passwords
Individual Line Passwords
Privileged EXEC Mode Password
Encrypted Passwords
Using a Password
User Mode Command List
Privileged Mode Command List
Context-Sensitive Help
Using Enhanced Editing Commands
Reviewing Command History
Examining Router Status
show version Command
show startup-config Command
and show running-config Command
show interfaces Command
show protocols Command
Summary
Chapter Five Test: Basic Router Operations
Chapter 6 Configuring a Router
Loading Configuration Files
Loading Configuration Files-
Releases Before 10.3
Loading Configuration Files from a TFTP Server
Fundamental Configuration Tasks
Overview of Router Modes
Configuring Router Identification
Password Configuration
Console Password
Virtual Terminal Password
Privileged EXEC Mode Password
Password Encryption
Configuring and Managing an Interface
The show interfaces Command
Interpreting Interface Status
Configuring a Serial Line
Determining DCE/DTE Status
Verifying Your Changes
Shutting Down an Interface
Verifying Configuration Changes-
Release 10.3 and Later
Verifying Configuration Changes-
Releases Before 10.3
Saving Configuration Changes--Release 10.3+ 152
Saving Configuration Changes-
Releases Before 10.3
Managing the Configuration Environment
Locating the Cisco lOS Software
Determining the Current
Configuration Register Value
Boot System Options in Software
Preparing for a Network Backup Image
Viewing Available Memory
and the Image Filename
Creating Software Image Backup
Upgrading the Image from the Network
Overwriting an Existing Image
Creating or Changing a Configuration Using Setup
Mode
Setup Mode Global Parameters
Setup Mode Interface Parameters
Setup Mode Script Review
Summary
Chapter Six Test: Configuring a Router
Discovering and Accessing Other Cisco Routers
Cisco Discovery Protocol Overview
Using CDP on a Local Router
Altering CDP Parameters
Showing CDP Neighbors
Showing CDP Entries for a Neighboring Device
Summary
Chapter 7 Test: Discovering and Accessing
Other Cisco Routers
NETWORKING PROTOCOL SUITES
TCP/IP Overview
TCP/IP Protocol Stack
Application Layer Overview
Transport Layer Overview
TCP Segment Format
Port Numbers
TCP Port Number
TCP Handshake/Open Connection
TCP Simple Acknowledgment and Windowing
TCP Sequence and Acknowledgment Numbers
UDP Segment Format
Internet Layer Overview
IP Datagram
Internet Control Message Protocol (ICMP)
ICMP Testing
part 2 Address Resolution Protocol
Reverse ARP
Summary
Chapter 8 Test: TCP/IP Overview
Chapter 9 IP Addressing
TCP/IP Address Overview
IP Addressing Overview
IP Address Classes
IP Address Bit Patterns
The First Octet Rule
Concepts of IP Address Configuration
Host Addresses
Addressing Without Subnets
Addressing with Subnets
Subnetting Addressing
Subnet Mask
Decimal Equivalents of Bit Patterns
Subnet Mask Without Subnets
Subnet Mask with Subnets
Subnet Planning
Class B Subnet Planning Example
Class C Subnet Planning Example
Broadcast Addresses
Configuration Commands
Configuring IP Addresses
IP Host Names
Name Server Configuration
Name-to-Address Schemes
Display Host Names
Verifying Address Configuration
Telnet Command
Simple Ping Command
Extended Ping Command
Trace Command
Summary
Chapter Nine Test: IP Address Configuration
Chapter 10 IP Routing Configuration
Basic Mechanisms and Commands of IP Routing
Setting Up the Initial IP Routing Table
Understanding How IP Routing
Learns Destinations
Specifying Administrative Distance Values
Configuring Static Routes
Configuring Default Routers
Grouping into Autonomous Systems
Using Interior or Exterior Routing Protocols
Routing Protocol Problems
Interior IP Routing Protocols
Completing the IP Routing Configuration Tasks
Configuring Dynamic Routing
Configuring RIP
Configuring RIP Router Commands
Viewing IP RIP Information
Configuring IGRP
Understanding IGRP Operation
Flash Updates
Poison Reverse
Holddowns
Split Horizon
Using the IGRP Composite Metric
Unequal-Cost Load Balancing Feature
Creating an IGRP Routing Process
Displaying IGRP Routing Information
Summary
Chapter Ten Test: IP Routing Configuration
Chapter 11 Configuring Novell IPX
IPX Routing Overview
Cisco Routers in NetWare Networks
Novell NetWare Protocol Suite
Key Novell NetWare Features
Novell IPX Addressing
How to Determine the IPX Address
Multiple Novell Encapsulations
Novell and Cisco Encapsulation Names
Novell Uses RIP for Routing
SAP: Supporting Service Advertisements
GNS: The Get Nearest Server Process
Configuring IPX Routing
Novell IPX Global Configuration Commands
ipx routing Command
ipx maximum-paths Command
ipx route destination-net next-hop Command
Novell IPX Interface Configuration Commands
interface Command
ipx network Command
Novell IPX Configuration Example
Verifying and Monitoring IPX Routing
Monitoring the Status of an IPX Interface
Monitoring IPX Routing Tables
Monitoring the Novell IPX Servers
Monitoring IPX Traffic
Troubleshooting IPX Routing
Troubleshooting IPX SAP
Summary
Chapter Eleven Test: Configuring Novell IPX
Chapter 12 Configuring AppleTalk
AppleTalk Overview
AppleTalk Protocol Stack
AppleTalk Features
Nonextended or Extended Networks
AppleTalk Addressing
Extended Addressing
AppleTalk Address Acquisition
Limiting Requests for Services
AppleTalk Services
Locating AppleTalk Services
Configuring AppleTalk
AppleTalk Configuration Tasks
AppleTalk Configuration Commands
appletalk routing Command
appletalk protocol Command
appletalk cable-range Command
appletalk zone Command
AppleTalk Configuration Example
Discovery Mode
Discovery Mode Example
Verifying Your AppleTalk Configuration
Monitoring AppleTalk
Summary
Chapter Twelve Test: Configuring AppleTalk
Chapter 13 Basic Traffic Management with Access Lists
Access Lists Overview
Why Use Access Lists?
Standard Access Lists
Extended Access Lists
How Access Lists Work
A List of Tests: Deny or Permit
Access List Command Overview
How to Identify Access Lists
TCP/IP Access Lists
Testing Packets with IP Access Lists
Key Concepts for IP Access Lists
How to Use Wildcard Mask Bits
Matching Any IP Address
Matching a Specific IP Host Address
IP Standard Access Configuration
Example 1: Permit My Network Only
Example 2: Deny a Specific Host
Example 3: Deny a Specific Subnet
Extended IP Access Lists
Extended Access List Configuration
Example 1: Deny FTP for EO
Example 2: Deny Only Telnet out of EO;
Permit All Other Traffic
Named Access Lists
Where to Place IP Access Lists
Verifying Access Lists
Monitoring Access List Statements
Novell IPX Access Lists
Testing Packets Using Novell Access Lists
Key Concepts for IPX Access Lists
Controlling IPX Overhead
IPX Standard Access List Configuration
Standard IPX Access List Example
IPX Extended Access List Configuration
Normal IPX SAP Operation
How to Use SAP Filters
SAP Filter Configuration Commands
Verifying IPX Access Lists
AppleTalk Access Lists
Testing Packets Using AppleTalk Access Lists
AppleTalk Network Structures
Key Concepts for AppleTalk Access Lists
AppleTalk Access List Procedures
AppleTalk Access List Commands
ZIP Reply Filter Configuration
Verifying AppleTalk Access Lists
Summary
Chapter Thirteen Test: Basic Traffic Management
with Access Lists
PART 3 WlDE-AREA NETWORKING
Chapter 14 Introduction to WAN Connections
WAN Services
Interfacing WAN Service Providers
Customer Premises Equipment (CPE)
Demarcation
Local Loop
Central Office (CO) Switch
Toll Network
Subscriber to Provider Interface
Using WAN Services with Routers
WAN Frame Format Summary
An Overview of PPP
Layering PPP Elements
PPP LCP Configuration Options
PPP Session Establishment
Phase 1: Link Establishment
Phase 2: Authentication (Optional)
Phase 3: Network-Layer Protocol
Selecting a PPP Authentication Protocol
PAP
CHAP
Configuring PPP Authentication
Verifying PPP
Summary
Chapter Fourteen Test:
Introduction to Serial Connections
Chapter 15 Configuring X.25
X.25 Overview
X.25 Protocol Stack
X.25 DTE and DCE
X.25 (X.12l) Addressing Format
X.25 Encapsulation
X.25 Virtual Circuits
SVC Usage
Single Protocol Virtual Circuits
Multiprotocol Virtual Circuits
Configuring X.25
encapsulation x25 Command
x25 address Command
x25 map Command
X.25 Configuration Example
Additional Configuration Tasks
Configuring X.25 VC Ranges
Configuring X.25 Packet Sizes
Configuring X.25 Window Parameters
X.25 Additional Configuration Example
Setting Up the Router as a Switch
X.25 Local and XOT Switching
Monitoring X.25
Summary
Chapter Fifteen Test: Configuring X.25
Chapter 16 Configuring Frame Relay
Frame Relay Overview
- Frame Relay Terminology
Local Access Rate
Data-Link Connection Identifier (DLCI)
Local Management Interface (LMI) 401
Committed Information Rate (CIR) 402
Oversubscription
Committed Burst (Bc)
Excess Burst
Forward Explicit Congestion Notification
(FECN)
Backward Explicit Congestion Notification
(BECN)
Discard Eligibility (DE) Indicator
Frame Relay Operation
Configuring Frame Relay
Configuring Optional Commands
Verifying Frame Relay Operation
Selecting a Frame Relay Topology
Star Topology
Full-Mesh Topology
Partial-Mesh Topology
Reachability and Resource Issues for Frame Relay
Resolving Reachability and Resource Issues:
Subinterfaces
Configuring Subinterfaces
Multipoint Subinterfaces Configuration Example
Point-to-Point Subinterfaces
Configuration Example
Summary
Chapter Sixteen Test: Configuring Frame Relay
APPENDIXES
Appendix A Chapter Test Answer Key
Appendix B Configuring DECnet
Overview of DECnet
Node Assignments
Routers Pass Information
Designated Routers
Level 1 and Level 2 Routing
DECnet Configuration Commands
DECnet Configuration Tasks
DECnet Configuration Commands
DECnet Configuration Example
Configuring DECnet Access Lists
DECnet Access List Commands
Controlling DECnet Example
Monitoring DECnet
Appendix C Configuring Banyan VINES
VINES Overview
Network Number
Subnet Number
Cisco VINES Network Number
Host Address Assignment
Hello Messages
Configuring VINES
VINES Configuration Commands
VINES Access Lists
Monitoring VINES Operation
Appendix D Autolnstalling Configuration Data
Appendix E Decimal to Hexadecimal
and Binary Conversion Table
Appendix F Password Recovery
Technique #1
Technique #2
Appendix G Frame Relay Examples and Configurations
AppleTalk over Frame Relay Example
Configuring IPX over Frame Relay Example
Frame Relay Switching Example
Appendix H Glossary
Index