Acknowledgment: Yogesh Kumar (CCNA, CCNP) For This Guidance Throughout The
Acknowledgment: Yogesh Kumar (CCNA, CCNP) For This Guidance Throughout The
Acknowledgment: Yogesh Kumar (CCNA, CCNP) For This Guidance Throughout The
1
2
CCNA (Certified Network Associate)
In 1993 cisco came out with amazing 4000 router and than
created the more amazing 7000, 2000 and 3000 series routers.
These are still around and evolving. Cisco has since become an
unrivaled worldwide leader in networking for the internet. Its
networking solutions can easily connect users who work from
diverse devices on disparate. Cisco products make it simple for
people to access and transfer information without regards to
differences in time, place or platform.
3
4
5
Network
6
In a typical LAN configuration, one computer is designated as the
file server. It stores all of the software that controls the network,
as well as the software that can be shared by the computers
attached to the network. Computers connected to the file server
are called workstations. The workstations can be less powerful
than the file server, and they may have additional software on
their hard drives. On most LANs, cables are used to connect the
network interface cards in each computer. See the Topology,
Cabling, and Hardware sections of this tutorial for more
information on the configuration of a LAN.
7
One example of a MAN is the MIND Network located in Pasco
County, Florida. It connects all of Pasco's media centers to a
centralized mainframe at the district office by using dedicated
phone lines, coaxial cabling, and wireless communications
providers.
8
Advantages of Installing a LAN
9
• Resource Sharing. Sharing resources is another area in
which a network exceeds stand-alone computers. Most
schools cannot afford enough laser printers, fax machines,
modems, scanners, and CD-ROM players for each computer.
However, if these or similar peripherals are added to a
network, they can be shared by many users.
• Electronic Mail. The presence of a network provides the
hardware necessary to install an e-mail system. E-mail aids
in personal and professional communication for all school
personnel, and it facilitates the dissemination of general
information to the entire school staff. Electronic mail on a
LAN can enable students to communicate with teachers and
peers at their own school. If the LAN is connected to the
Internet, students can communicate with others throughout
the world.
• Flexible Access. School networks allow students to access
their files from computers throughout the school. Students
can begin an assignment in their classroom, save part of it
on a public access area of the network, then go to the media
center after school to finish their work. Students can also
work cooperatively through the network.
• Workgroup Computing. Workgroup software (such as
Lotus Notes) allows many users to work on a document or
project concurrently. For example, educators located at
various schools within a county could simultaneously
10
contribute their ideas about new curriculum standards to the
same document and spreadsheets.
Topology
There are two types of topology: physical and logical. The physical
topology of a network refers to the configuration of cables,
computers, and other peripherals. Logical topology is the method
used to pass the information between workstations. Issues
involving logical topologies are discussed in the section on
protocols.
11
The following sections discuss the physical topologies used in
networks and other related topics.
Bus Linear
12
• Difficult to identify the problem if the entire network shuts
down.
• Not meant to be used as a stand-alone solution in a large
building.
Star
13
Star topology
14
Tree
Tree topology
15
Ring
Ring topology
16
• Future growth. With a star topology, expanding a network
is easily done by adding another concentrator.
• Cable type. The most common cable in schools is
unshielded twisted pair, which is most often used with star
topologies.
Summary Chart:
Coax
Ethernet
Linear Bus Twisted Pair
LocalTalk
Fiber
Coax
Tree Twisted Pair Ethernet
Fiber
Cabling
17
related to the network's topology, protocol, and size.
Understanding the characteristics of different types of cable and
how they relate to other aspects of a network is necessary for the
development of a successful network.
18
Categories of Unshielded Twisted Pair
Type
Use
19
Unshielded Twisted Pair Connector
RJ-45 connector
20
Coaxial Cable
Coaxial cable
21
meters. Thick coaxial cable has an extra protective plastic cover
that helps keep moisture away from the center conductor. This
makes thick coaxial a great choice when running longer lengths in
a linear bus network. One disadvantage of thick coaxial is that it
does not bend easily and is difficult to install.
BNC connector
22
it the standard for connecting networks between buildings, due to
its immunity to the effects of moisture and lighting.
Fiber optic cable has the ability to transmit signals over much
longer distances than coaxial and twisted pair. It also has the
capability to carry information at vastly greater speeds. This
capacity broadens communication possibilities to include services
such as video conferencing and interactive services. The cost of
fiber optic cabling is comparable to copper cabling; however, it is
more difficult to install and modify. 10BaseF refers to the
specifications for fiber optic cable carrying Ethernet signals.
23
Fiber Optic Connector
Wireless LANs
Not all networks are connected with cabling; some networks are
wireless. Wireless LANs use high frequency radio signals or
infrared light beams to communicate between the workstations
and the file server. Information is relayed between transceivers as
if they were physically connected. For longer distance, wireless
communications can also take place through cellular telephone
technology or by satellite.
24
Wireless networks are great for allowing laptop computers or
remote computers to connect to the LAN. Wireless networks are
also beneficial in older buildings where it may be difficult or
impossible to install cables. Wireless LANs also have some
disadvantages. They are very expensive, provide poor security,
and are susceptible to electrical interference from lights and
radios. They are also slower than LANs using cabling.
FlexibleCable
The most common type of cable used for the carrier-band
trunk is known as "RG-11 type". This cable is flexible and is about
0.4" in diameter. RG-11 cable is easier to install than semi-rigid
cable. The electrical characteristics of the RG-11 are not as good
as the semi-rigid cable, therefore, the cable-system distance is
limited to about 800 meters. However, this distance is adequate
for most carrier-band network applications.
25
Ethernet
26
standard (ANSI/ASHRAE Standard 135-2001, BACnet--a Data
Communication Protocol for Building Automation and Control
Networks). With the newer BACnet/IP LAN type defined in BACnet
Annex J, and with more and more building owners demanding the
use of Web-browser technology and Internet protocols to view the
status of their buildings, interest in Ethernet, which is perceived to
be the simplest way to link to the Internet, is only going to grow.
Connecting a Web browser to a TCP/IP Ethernet network is easy,
but is that all that is needed to be known about using Ethernet?
There are indeed rules to follow if an Ethernet network is to
perform as intended. This article will discuss some of the issues to
consider.
27
Originally, Ethernet operated only in half- duplex mode, which
allowed transmissions in both directions, but not at the same time
because coaxial cable had only a single shared path for signaling.
Now with twisted-pair and fiber-optic cabling, which have two
distinct paths for signaling, it is possible to configure Ethernet
stations to operate in full-duplex mode with simultaneous
transmitting and receiving over separate paths, assuming star
topology is used.Ethernet is not an easy technology to fully
understand, as evidenced by the fact that the ever-changing IEEE
802.3 specification--and its international version, ISO8802-3--
which governs the technology, is more than 1,500 pages.
28
environment. If a station is too far away, a late collision can occur.
With a late collision, some stations will accept the frame as good,
while others will discard the frame. This is an undesirable situation
that should be avoided.
29
Ethernet hubs extend network length, but only within one
collision domain.
30
midsegments incorporating a total of three hubs. These distance
constraints are limiting, especially in campus settings; however,
there is a way to avoid the confusing rules of shared Ethernet to
achieve greater distances.
31
If too many repeating hubs are cascaded, unreliable operation will
occur because the limits of the collision domain would be violated.
32
domain, while a bridge connects two distinct collision domains.
Why is this important? If a network is limited by distance because
of collision-domain constraints, the addition of a switch effectively
doubles the available distance. This could be important when
connecting buildings and especially important when fiber optics
are used.
33
ISDN
ISDN access
35
lines typically transmit at up to 56 kilobits per second (KBps),
while ISDN lines can transmit at speeds of 64 or 128 KBps.
Connectors
F-connectors are used to connect the drop cable to the station
36
and to attach cables to taps. F-connectors are the type of
connector commonly used to attach antennas to TV sets. For this
reason. there is a wide variety of connectors available with
varying quality Most F-connectors are not suitable for industrial
use.Consumer-grade connectors use the center conductor of the
cable as the center pin of the connector. This wire makes a
questionable contact and has a good chance of damaging the
female contact of the mating connector. In order to define the
characteristics of an F-connector suitable for industrial use, the
Electronic Industries Association, EIA, has formulated the FD
connector specification, Standard 550.
37
connector to the cable. Most connector failures are a result of
improper installation.
Terminators
In order to minimize the reflections on the cable system,
everything must be terminated: Precision 75 ohm terminators or
terminating taps must be used at the ends of the trunk cable. The
terminators commonly used in cable television are not adequate.
They do not have a good center pin and do not absorb all of the
signal. If a drop port on a tap is not used, it must be terminated
with 75 ohms. The drop port terminators do not have to be
precise-the common cable television terminators are adequate. If
a drop cable attached to a tap is not attached to a station, it must
be terminated with 75 ohms. The cable television terminators are
adequate for this.
38
terminator can be attached to the unused drop cable. In the
meantime, the cable is unterminated. A single unterminated drop
cable will not materially affect the network's operation, but
several unterminated cables might. To preclude this, self-
terminators can be used. The way the self-terminations work is as
follows:
Hubs
39
comes together. A hub is a hardware that acts as a central
connecting point and joins lines in a star network configuration.
Types of Hubs
As you may have already guessed, hubs perform a crucial
function on networks with a star topology. There are many
different types of hubs, each offering specific features that allow
you to provide varying levels of service.
Passive Hub
Passive hubs, as the name suggests, are rather quiescent
creatures. They do not do very much to enhance the performance
of your LAN, nor do they do anything to assist you in
troubleshooting faulty hardware or finding performance
bottlenecks. They simply take all of the packets they receive on a
single port and rebroadcast them across all ports-the simplest
thing that a hub can do. Passive hubs commonly have one
10base-2 port in addition to RJ-45 connectors that connect each
LAN device.
40
network backbone. Other, more advanced passive hubs have AUI
ports that can be connected to the transceiver of your choice to
form a backbone that you may find more advantageous.
Active Hub
Active hubs actually do something other than simply
rebroadcast data. Generally, that have all of the features of
passive hubs, with the added bonus of actually watching the data
sent out. Active hubs take a larger role in Ethernet communication
by implementing a technology called store and forward where the
hubs actually look at the data they are transmitting before
sending it. This is not to say that the hub prioritizes certain
packets of data. It does, however, repair certain “damaged”
packets and will retime the distribution of other packets.
41
Active hubs will also retime and resynchronize certain
packets when they are being transmitted. Certain cable runs may
experience electromagnetic (EM) disturbances that prevent
packets from reaching the hub or the device at the end o the
cable run in timely fashion. In other situations, the packets may
not reach the destination at all.
Bridges :
42
Routers :
Features of Router
43
Routers are able to keep track of multiple active paths. They
keep track of multiple active paths between any given source and
destination network.
• l Identify address
• Traffic Management
• Sharing information
• Performance
44
Routers perform complex tasks. This means they are slower
than bridges because they keep processing data intensively. A
router can be a dedicated box with a port to all networks.
Routable protocols contain information in each packet relating to
the network address of the source and destination nodes.
45
INTERNETWOR
KING
46
INTRODUCTION
When we take two or more LANs or WANs and connect them via a
router, and configure a logical network addressing scheme with a
protocol such as IP.Routers are used to connect networks together
and route packets of data from one network to another. Two
advantage of using routers in our network are:-
• Packet switching
• Packet filtering
• Internetworking communication
• Path selection
47
Packet switching: Here routers use data in packets
whose IP addressing is provided.
INTERNETWORKING MODELS
When networks first came into being, computers could typically
communicate only with computersfrom the same manufacturer.
For example, companies ran either a complete DECnet solutionor
an IBM solution—not both together. In the late 1970s, theOpen
Systems Interconnection (OSI)reference model was created by the
International Organization for Standardization (ISO) to breakthis
barrier.
48
It divides the network communication process into smaller
and simpler components, thus aiding component
development, design, and troubleshooting.
It allows multiple-vendor development through
standardization of network components.
It encourages industry standardization by defining what
functions occur at each layer of the model.
It allows various types of network hardware and software to
communicate.
It prevents changes in one layer from affecting other layers,
so it does not hamper development.
49
Network communication and the OSI model
• Two computers should be running on the same protocol in
order to communicate with each other.l Each layer
communicates with its equivalent 'peer' layer on the other
computer via the lower layers of the model.
• Each layer provides services for the layer above and uses the
services of the layer below.
OSI-TCP/IP
51
PHYSICAL LAYER:
52
• The network medium
• Hub
• Repeater
• Media converter
IEEE divides the function of the Data Link layer into two sub
layers.
• The Media Access Control sub layer defines the way in which
multiple NICs share a single transmission medium.
53
It covers the following:
Logical topology
bus or ring
Addressing
Network Layer
This layer is efficient in converting the frames of Data Link
layer into packets . Each network has an address called
the IP address or network address. It helps in translating
between hardware address (address of the NIC card) and
network address. Thus the layer becomes important when
a network uses a device called router to link two different
networks each having a different network address.
Basically routers are hardware devices that work at the
Network layer.l This characteristic makes them useful for
extended networks like WAN (Wide Area Networks).
Routers
Transport Layer
• The basic function of the Transport layer is to accept data
from the Session layer split it up into smaller units if need be
pass these to the Network layer and ensure that all the
54
pieces arrive correctly at the other end. The Transport layer
is a true source-to-destination or end-to-end layer.The
Transport layer is also responsible for splitting 'messages'
from the Session layer into smaller packet format where
sequence numbers are used by the receiver to rebuild the
messages correctly.
Session Layer
The Session layer allows users on different machines to establish
sessions between them.
Presentation Layer :
• The Presentation layer transforms data between the format
required for the network and the format required for the
application. l The Presentation layer is responsible for
converting the data sent by the layer above i.e. the
55
Application layer into a proper format for communication
over the network.
Application Layer :
• This is the highest layer of the OSI model. The Application
layer is the layer at which the users interact with the
network. All the operating systems fall in this category. Note:
It is not just the applications running on the operating
systems that make up the Application layer but the operating
system itself. lOne of the most utilized services provided by
the Application layer is file transfer.Other services provided
by the Application layer include:
• Network print
• Electronic mail
The Cisco hierarchical model can help you design, implement, and
maintain a scalable,reliable, cost-effective hierarchical
internetwork. Cisco defines three layers of hierarchy.
The following are the three layers and their typical functions:
57
The core layer is literally the core of the network. At the top of the
hierarchy, the core layer is responsible for transporting large
amounts of traffic both reliably and quickly. The only purpose of
the network’s core layer is to switch traffic as fast as possible. The
traffic transported across the core is common to a majority of
users. However, remember that user data is processed at the
distribution layer, which forwards the requests to the core if
needed. If there is a failure in the core, every single user can be
affected. Therefore, fault tolerance at this layer is an issue. The
core is likely to see large volumes of traffic, so speed and latency
are driving concerns here. Given the function of the core, we can
now consider some design specifics. Let’s start with some things
we don’t want to do:
Design with speed in mind. The core should have very little
latency.
58
The Distribution Layer
The distribution layer is sometimes referred to as the workgroup
layer and is the communication point between the access layer
and the core. The primary functions of the distribution layer are to
provide routing, filtering, and WAN access and to determine how
packets can access the core,if needed.The
Routing
59
The Access Layer
The access layer controls user and workgroup access to
internetwork resources. The access layer is sometimes referred to
as the desktop layer. The network resources most users need will
be available locally. The distribution layer handles any traffic for
remote services. The following are some of the functions to be
included at the access layer:
IP
ADDRESSING
60
INTRODUCTION:
IP Terminology
Bit:- A bit is one digit, either a 1 or a 0.
61
Byte:- A byte is 7 or 8 bits, depending on whether parity is used.
For the rest of this chapter,always assume a byte is 8 bits.
Binary , as in
10101100.00010000.00011110.00111000
Hexadecimal, as in AC.10.1E.38
62
All these examples truly represent the same IP address.
Hexadecimal is not often used as dotted-decimal is used.
The window registry is a good examples of program that
stroes a mechine’s IP address in hex. The advantage of
hierarchical is that it can handle a large addresses namely
4.3 billon. The disadvantage of the flat addressing scheme, an
the reason it’s not used for IP addressing, relates to routing.
Network Addressing
The network address (which can also be called the network
number) uniquely identifies each network. Every machine on the
same network shares that network address as part of its IP
address. In the IP address 172.16.30.56, for example, 172.16 is
the network address.The node address is assigned to, and
uniquely identifies, each machine on a network. This part of the
address must be unique because it identifies a particular machine
—an individual—as opposed to a network, which is a group. This
number can also be referred to as a host address. In the sample IP
address 172.16.30.56, the 30.56 is the node address.The
designers of the Internet decided to create classes of networks
63
based on network size. For the small number of networks
possessing a nodes. The class distinction for networks between
very large and very by the class designation of one’s network.
Summary of the three classes of networks
MULTICAS
CLASS D
T
CLASS E RESEARCH
0xxxxxxx
If we turn the other 7 bits all off and then turn them all on,
we’ll find the Class A range of network addresses:
00000000 = 0
64
01111111 = 127
10000000 = 128
10111111 = 191
Class A Addresses
In a Class A network address, the first byte is assigned to the
network address and the three remaining bytes are used for the
node addresses. The Class A format is as follows:
network.node.node.node
65
particular network would have the distinctive network address of
49.
Class A network addresses are 1 byte long, with the first bit of
that byte reserved and the 7 remaining bits available for
manipulation (addressing). As a result, the maximum number of
Class A networks that can be created is 128. Why? Because each
of the 7 bit positions can be either a 0 or a 1, thus 27, or 128. To
complicate matters further, the network address of all 0s (0000
0000) is reserved to designate the default route (see Table 2.4 in
the previous section). Additionally, the address 127, which is
reserved for diagnostics, can’t be used either, which means that
you can really only use the numbers 1 to 126 to designate Class A
network addresses. This means the actual number of usable Class
A network addresses is 128 minus 2, or 126. The IP address
127.0.0.1 is used to test the IP stack on an individual node and
cannot be used as a valid host address.
Each Class A address has 3 bytes (24-bit positions) for the node
address of a machine. This means there are 224—or 16,777,216—
unique combinations and, therefore, precisely that many possible
unique node addresses for each Class A network.
The valid hosts are the numbers in between the network address
and the broadcast address:
66
host addresses is that the host bits can’t all be turned off or all be
on at the same time.
Class B Addresses
In a Class B network address, the first 2 bytes are assigned to the
network address and the remaining 2 bytes are used for node
addresses. The format is as follows:
network.network.node.node
67
Class C Addresses
The first 3 bytes of a Class C network address are dedicated to the
network portion of the address, with only 1 measly byte remaining
for the node address. Here’s the format:
network.network.network.node
68
RESERVED ADDRESS
ADDRESS CLASS
SPACE
10.0.0.0 THROUGH
CLASS A
10.255.255.255
172.16.0.0 THROUGH
CLASS B
172.31.255.255
192.168.0.0 THROUGH
CLASS C
192.168.255.255
PRIVATE IP ADDRESSES:
The people who created the IP addresses scheme also
created what we call private IP addresses. These addresses
can be used on a private network, but they are not
routable through the Internet.
SUBNETTING BASICS
BENEFITS OF SUBNETTING:
• Simplified management
69
• Facilitated spanning of large geographical distances
Subnet masks:
• A subnet mask is a 32 -bit value that allows the
recipient of IP packets to distinguish the network ID
portion of the IP address from the host ID portion of
the IP address.
70
DEFAULT
CLASS FORMET
SUBNETMASK
A Network.node.node.node 255.0.0.0
Network.network.node.no
B 255.255.0.0
de
Network.network.network
C 255.255.255.0
.node
CIDR VALUES:
CIDR VALUES
SUBNET MASK
255.0.0.0 /8
71
255.128.0.0 /9
255.192.0.0 /10
255.244.0.0 /11
255.240.0.0 /12
255.248.0.0 /13
255.252.0.0 /14
255.254..0.0 /15
255.255.0.0 /16
255.255.128.0 /17
255.255.192.0 /18
255.255.224.0 /19
255.255.240.0 /20
255.255.248.0 /21
255.255.252.0 /22
255.255.254.0 /23
255.255.255.0 /24
255.255.255.128 /25
255.255.255.192 /26
255.255.255.224 /27
255.255.255.224 /27
255.255.255.240 /28
72
255.255.255.248 /29
73
WHAT ARE THE VALID HOSTS ?
255.255.255.192= subnetmask
The number right before the value of the next subnet is all
host bit turned on and equals the broadcast address.
74
IP ROUTING
75
ROUTING BASICS:
When an internetwork is created by connecting WANs and
LANs to a router there is a need to configure logical
network address, such as IP addresses to all hosts on the
internetwork so that they can communicate across that
internetwork. The term routing is used for taking a packet
from one device and sending it through the network to
another device on a different network. Routers don’t care
about hosts. They only care about networks and the best
path to each network. The logical network address of the
destination host is used to get packets to a network through
a routed network, then the hardware address of host is used
to deliver the packets from a router to correct destination
host.
76
The routers learns about remote networks from neighbor
routers or from an administrator. The routers then builds a
routing table that describes how to find the remote network.
If a network is directly connected, then routers already
knows how to get it. If network isn’t connected , the router
must learn how to get to it in two ways:
• Static Routing
• Dynamic Routing
STATIC ROUTING
77
routing, meaning that someone must handtype all network
locations into a routing table. It satic routing is used, the
administrator is responsible for updating all changes by hand
into all routers
[administrative_distance] [permanent]
78
Ip route : This command used to create the static route.
DEFAULT ROUTING:
• PC 1-ETHERNET 0(E0)
• PC2-ETHERNET 0(E0)
• PC3-ETHERNET 0(E0)
DYNAMIC ROUTING:
ROUTING PROTOCOLS
• RIP
• IGRP
• EIGRP
• OSPF
ROUTING PROTOCOLS:
There are three classes of routing protocols:
Distance vector:
80
The distance vector protocols find the best path to a remote
network by judging distance. Each time a packet goes
through a router that’s called a hop. The router with least
number of hops to the network is determined to be the
best path. The vector indicates the direction to the remote
network. Both RIP and IGRP are distance- vector routing
protocols. They send the entire routing table to directly
connected neighbors.
Link state:
In link state protocols, also called shortest-path-first
protocols, the routers each create three separate tables. One
of these tables keep track of directly attached neighbors,
one determines the topology of entire internetwork, and one
is used as the routing table. Link state routers know more
81
about the internetwork than any distance-vector routing
protocol. Link-OSPF is an IP routing protocol that is
completely link state. Link state protocol send updates
containing the state of their own links to all other routers
on the network.
IGRP Matrics
83
The 8539 is a single value, as calculated based on bandwidth and
delay. The metric is calculated (by default) as the sum of the
inverse of the minimum bandwidth, plus the cumulative delay on
all links in the route. In other words, the higher the bandwidth, the
lower the metric; the lower the cumulative delay, the lower the
metric.
FEATURES OF EIGRP
Considered classless.
84
Support for summaries and discontiguous networks.
NEIGHBOUR DISCOVERY :
AS numbers match
Identical metric
85
one has left or gone down.EIGRP routers must alsi continue
receiving Hellos from their neighbors.
FEASIBLE DISTANCE:
REPORTED DISTANCE:
NEIGHBOR TABLE :
86
There is one neighbor table for each protocol-dependent
module. Sequence numbers are used to match
acknowledgments with update packets. The last sequence
number received from the neighbor is recorded so that out
of order packets can be detected.
ROUTERS
87
Routers
Routers are network layer equipment which forwards the incoming
packets towards the required destination.
88
ip access group 100 out
ROUTER COMPONENTS
89
• Flash memory : Flash contains the Cisco IOS Software image.
Some routers run the Cisco IOS image directly from flash
and do not need to transfer it to RAM.
VIRTUAL LANs
(VLANs)
90
VLAN Basics
By default, routers allow broadcasts only within the originating
network, but switches forward broadcasts to all segments. The
reason it’s called a flat network is because it’s one broad cast
domain, not because its actual design is physically flat. Another
one—security This one’s a real problem because within the typical
layer 2 switched internetwork, all users can see all devices by
default .Ana you cant’s stop devices from broadcasting, nor users
from trying to respond to broadcasts. Your security options are
dismally limited to placing passwords on the servers and other
devices.
91
• A group of users needing high security can be put into a
VLAN so that no users outside of the VLAN can communicate
with them.
Configuring A VLAN
VLAN Trunking Protocol (VTP) is a layer 2 messaging protocol
that maintains VLAN configuration consistency throughout a
common administrative domain by managing VLAN
additions, deletions, and name changes across multiple
switches. VTP server updates are propagated to all
connected switches in the network, which reduces the need
for manual configuration (promotes scaling) and minimizes
the risk of errors cause by duplicate names or incorrect VLAN
types. VTP operates in server, client or transparent mode.
The default is serer mode. VLAN updates are not propagated
over the network until a management domain name is
specified.
RouterA(config)#int fa0/26
RouterA(config-if)#trunk on desirable
RouterA(config-if)#exit
RouterA(config)#address-violation {s | d | i}
92
RouterA(config)#exit
RouterA#show vtp
RouterA#show trunk A
RouterA#config T
RouterA(Config)#int fa0/26
RouterA(Config-if)#vlan-membership static 7
RouterA(Config-if)#exit
RouterA(Config)#exit
93
Frame Relay
Introduction
• Variable-length packets
• Statistical multiplexing
• (DTE)
95
The connection between a DTE device and a DCE device
consists of both a physical layer component and a link
component.
96
Cisco’s
Wireless
Technologie
s
97
INTRODUCTION TO WIRLESS TECHNOLOGY
This should make it pretty clear to you that understanding all the
various types of WLANs you can implement is imperative to
creating the LAN solution that best meets the specific
requirements of the unique situation you’re dealing with. Also
98
important to note is the fact that the 802.11 specifications were
developed so that there would be no licensing required in most
countries—to ensure the user the freedom to install and operate
without any licensing or operating fees.
This means that any manufacturer can create products and sell
them at a local computer store or wherever. It also means that all
our computers should be able to communicate wirelessly without
configuring much, if anything at all. Various agencies have been
around for a very long time to help govern the use of wireless
devices, frequencies, standards, and how the frequency
spectrums are used.
AGENCIES PURPOSE
Creates and maintains
Institute of Electrical and
operational
Electronics Engineers (IEEE)
standards
Regulates the use of
Federal Communications
wireless devices
Commission (FCC)
in the U.S.
European Chartered to produce
Telecommunications common
Standards Institute (ETSi) standards in Europe
99
Promotes and tests for
Wi-Fi Alliance WLAN
interoperability
Educates and raises
consumer
WLAN Association (WLANA) awareness regarding
WLANs
Wireless starts with 802.11, and there are various other up-
and-coming standard groups as well, like 802.16 and 802.20.
And there’s no doubt that cellular networks will become huge
players in our wireless future. But for now, we’re going to
concentrate on the 802.11 standards committee and
subcommittees.IEEE 802.11 was the first, original
standardized WLAN at 1 and 2Mbps. It runs in the 2.4GHz
radio frequency and was ratified in 1997 even though we
didn’t see many products pop up until around 1999 when
802.11b was introduced.
100
IEEE 802.11g 54Mbps, 2.4GHz standard (backward
compatible with 802.11b)
IEEE 802.11h Dynamic Frequency Selection (DFS) and
Transmit Power Control (TPC)
at 5Ghz
IEEE 802.11i Enhanced security
IEEE 802.11j Extensions for Japan and U.S. public safety
IEEE 802.11k Radio resource measurement enhancements
IEEE 802.11m Maintenance of the standard; odds and ends
IEEE 802.11n Higher throughput improvements using MIMO
(multiple input, multiple
output antennas)
IEEE 802.11p Wireless Access for the Vehicular Environment
(WAVE)
IEEE 802.11r Fast roaming
101